RLSA-2025:17429 Important: open-vm-tools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for open-vm-tools. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines. Security Fix(es): * open-vm-tools: Local privilege escalation in open-vm-tools (CVE-2025-41244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms open-vm-tools-12.5.0-1.el10_0.1.aarch64.rpm 1721b7639f4fc4bd3828ed3ab036f2dcecfd79be21dd7d991e4c215682767ce6 open-vm-tools-desktop-12.5.0-1.el10_0.1.aarch64.rpm 455d61d38d85865c5ec20dd04eb18ba3dcad54862429dedfae83c868939a1dd5 open-vm-tools-test-12.5.0-1.el10_0.1.aarch64.rpm 7ad884fdf8709b9d1eb5f53b71c71d758f7529f6b06fbfe26114ce19566ab0ff RLSA-2025:21816 Moderate: delve and golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for golang, delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Go Programming Language. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms delve-1.25.2-1.el10_1.aarch64.rpm 474046e009f06b28083d89f6f02929af7cef4ab090d27b937ae60b267632ec20 golang-1.25.3-1.el10_1.aarch64.rpm 7c27557c862ad9d8de91beaebdfc5b427fcc57784efc2c5bdb30b91923f811c0 golang-bin-1.25.3-1.el10_1.aarch64.rpm a11fac4669c56d767161f8663237283c6086629c75943724792539ccf5e9e633 golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-race-1.25.3-1.el10_1.aarch64.rpm d1bca98c25fc87a5180394c791f2c6de376698652dcfda1a16533fffcd55dc7f golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 go-toolset-1.25.3-1.el10_1.aarch64.rpm f73fa3ea149da02599a9c0e4eb882e865f3daca3d4c93ef73af8768d1acddf7b RLSA-2025:17085 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ipa-client-4.12.2-15.el10_0.4.aarch64.rpm e5db4046edb4d57b6e61af2de8a354779be82e79ce6f09f18decb68dee889234 ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab ipa-client-encrypted-dns-4.12.2-15.el10_0.4.aarch64.rpm c11d2eb892721b091086e555ec9967d9ccd7c74d80b313dcddfd2e4cb11beea3 ipa-client-epn-4.12.2-15.el10_0.4.aarch64.rpm a10d27c23bc2714cf2bb80b6f6a3bc4ead462ad1793c07d714ec24b9e64d8406 ipa-client-samba-4.12.2-15.el10_0.4.aarch64.rpm ce516135d0d220c0afa788ddb41186deb4aeb91cf682204549b7630459364e1f ipa-common-4.12.2-15.el10_0.4.noarch.rpm b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f ipa-common-4.12.2-15.el10_0.4.noarch.rpm b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f ipa-common-4.12.2-15.el10_0.4.noarch.rpm b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f ipa-common-4.12.2-15.el10_0.4.noarch.rpm b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm 9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85 ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm 9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85 ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm 9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85 ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm 9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85 ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm 027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm 027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm 027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm 027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1 ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1 ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1 ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1 ipa-server-4.12.2-15.el10_0.4.aarch64.rpm 028db36aac9b7ba3fadec8fcbd79b0114beaed9d440d2e83fd9722e20eccaa73 ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm 2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5 ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm 2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5 ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm 2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5 ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm 2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5 ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm 13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5 ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm 13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5 ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm 13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5 ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm 13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5 ipa-server-encrypted-dns-4.12.2-15.el10_0.4.aarch64.rpm 868a8a293fdb1923dba7bf38fcf416e1d8fc05320d3a5dedac6749d380f86660 ipa-server-trust-ad-4.12.2-15.el10_0.4.aarch64.rpm b4c3b71131389051d4df91fab9e9be5e24cb2760f15fb1190265fd4853b51f47 python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm 71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm 71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm 71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm 71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98 python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98 python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98 python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98 python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm 24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650 python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm 24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650 python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm 24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650 python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm 24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650 RLSA-2025:21485 Moderate: java-25-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for java-25-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit. Security Fix(es): * JDK: Enhance Path Factories (CVE-2025-53066) * JDK: Enhance Certificate Handling (CVE-2025-53057) * JDK: Enhance String Handling (CVE-2025-61748) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Note that the OpenJDK 25 package does not yet include FIPS support. This is expected to be reinstated in a future update. none-appstream-rpms java-25-openjdk-25.0.1.0.8-2.el10.aarch64.rpm 0ee5f6447f39a9fdd6bcc2c4e23bb7d0c1745c4e70b2a471659892aedcdc6c3e java-25-openjdk-demo-25.0.1.0.8-2.el10.aarch64.rpm 6059fa45ac075452fe8c48b2423fbfa30a2ece987e68620d6a99d6f3f47339fd java-25-openjdk-devel-25.0.1.0.8-2.el10.aarch64.rpm bf7c0f221ee136629c3623ab80dafb7bdfedcf5be4815237a52416b60bc1ca26 java-25-openjdk-headless-25.0.1.0.8-2.el10.aarch64.rpm f19fe2ab9a89851a585023ab5d2ba094325b2f5da23f5de7d23440258885a33e java-25-openjdk-javadoc-25.0.1.0.8-2.el10.aarch64.rpm 91a31ba88bc50010d948990aefc3752030d43452c04468cb1988c52a939435de java-25-openjdk-javadoc-zip-25.0.1.0.8-2.el10.aarch64.rpm 7ad6f0bc211e863aff6979a397a27bb7ced5b3183d4290c7a5416cd46c002252 java-25-openjdk-jmods-25.0.1.0.8-2.el10.aarch64.rpm 8bf144405a7b93d59890fe1af07214b13e8eadf93ad8bd179bb574844f5a3ddf java-25-openjdk-src-25.0.1.0.8-2.el10.aarch64.rpm e363bfbda20e71f6182c8ba7366452d5d493e67a18c87be9304217c8fd768e52 java-25-openjdk-static-libs-25.0.1.0.8-2.el10.aarch64.rpm e4348d6f78e60434d34a4399163126387480bb9861b77af4393248d70940a9c6 RLSA-2025:21691 Important: haproxy security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for haproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Security Fix(es): * haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms haproxy-3.0.5-4.el10_1.1.aarch64.rpm e88222e06a8f6e535c31109692fdaf33b893b30e317a975ab4b4946f74cb963b RLSA-2025:21936 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms valkey-8.0.6-2.el10_1.aarch64.rpm c430f69edf8990a904a926952f23268610e2e5b82bffd25915baac1b822420d5 valkey-devel-8.0.6-2.el10_1.aarch64.rpm 3a5ce90dde7ae12fae7378b2693c859dfe2f1ada32efe20d6270ab64b60fcbfa RLSA-2025:18320 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: firefox: Memory safety bugs (CVE-2025-11714) * thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709) * thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710) * thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708) * thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715) * thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-140.4.0-2.el10_0.aarch64.rpm 7f10ab0c46ee01356925411bcfdf78e49cd4799595870951db8cff2b2ccd6a4b RLSA-2025:18154 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * thunderbird: firefox: Memory safety bugs (CVE-2025-11714) * thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709) * thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710) * thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708) * thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715) * thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-140.4.0-3.el10_0.aarch64.rpm 56c17efa72afff182e115cd50017519cd5cfc0b96945c4a1561a670545e9ff84 RLSA-2025:18152 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aspnetcore-runtime-8.0-8.0.21-1.el10_0.aarch64.rpm e2ec6e1ba1ff35db7484016ccf4b430b518d9242dc168e1bf5ebacb9dfc2844b aspnetcore-runtime-dbg-8.0-8.0.21-1.el10_0.aarch64.rpm 6873622ad6b11275ccde052e248c757d7a7ec826d9d71ff7406af351613a9d42 aspnetcore-targeting-pack-8.0-8.0.21-1.el10_0.aarch64.rpm 27eb567942cda06e2b68487a3f1a23fbb6511cee258cfc1d8e921757f8b83936 dotnet-apphost-pack-8.0-8.0.21-1.el10_0.aarch64.rpm 8297b191ceeae760a86d1ae9b8782cc6c7b8fcea91fa80c7425095bda4764564 dotnet-hostfxr-8.0-8.0.21-1.el10_0.aarch64.rpm bc9aee1e2bb6fbed028e4e831cc0e5fdb5d6de5444978f7b11edf179a5245144 dotnet-runtime-8.0-8.0.21-1.el10_0.aarch64.rpm 3f67674d532e4a71604774d249b4dd4c2eb5297069dc661a44c487402b78817a dotnet-runtime-dbg-8.0-8.0.21-1.el10_0.aarch64.rpm f89cec36649bec85ceaf1ae8d487f650e3b42dc7149d7e9b40fd54c56f2a711a dotnet-sdk-8.0-8.0.121-1.el10_0.aarch64.rpm 7b73c22fa01316a043692b11ecec9dd9a99959db503123f978b6d4eb0ddb5b3c dotnet-sdk-dbg-8.0-8.0.121-1.el10_0.aarch64.rpm cd914aeac3c4519baa4ef692ced0a7af539b086d80ba920e35e02a726c144780 dotnet-targeting-pack-8.0-8.0.21-1.el10_0.aarch64.rpm c4afc5b2644c992e937b9ab7cbfd59994c9fa91e617a2affb14b05856e2c22dc dotnet-templates-8.0-8.0.121-1.el10_0.aarch64.rpm d795f0f14208f60340d07c091df12f6a11cbed028cb661faf75520fa9e1b6dfa RLSA-2025:18153 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es): * dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248) * dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315) * dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aspnetcore-runtime-9.0-9.0.10-1.el10_0.aarch64.rpm aae9d669be5b1ad31351daea5fcf9d3daa707b8e3ab910d848eed38be53ec566 aspnetcore-runtime-dbg-9.0-9.0.10-1.el10_0.aarch64.rpm 7a527433a45cbeb1985f0739c4efb502c2ee89321dfd36a4446bd4cac3d7ceff aspnetcore-targeting-pack-9.0-9.0.10-1.el10_0.aarch64.rpm 03778219168b65ec9dc503df3271a53753d2c1d5e7e4b8e6e7db49bf2ec11731 dotnet-apphost-pack-9.0-9.0.10-1.el10_0.aarch64.rpm 3f97bc81dad00bb3e2dde8370107b9b05cf44fa127db36e4c0664004f626e39e dotnet-host-9.0.10-1.el10_0.aarch64.rpm 543cd2aa1e6af4611256d2de51e3c4744257b0127f7162e7af212be63ac5923a dotnet-hostfxr-9.0-9.0.10-1.el10_0.aarch64.rpm 45d73359826c0a60b98df18e8fa022d83a70f16b70a06077f0dd5d3e93454ea8 dotnet-runtime-9.0-9.0.10-1.el10_0.aarch64.rpm 99e542310aa82f7a3a72d1847f75792aa8de2d08bb3583dd71273536833d80a3 dotnet-runtime-dbg-9.0-9.0.10-1.el10_0.aarch64.rpm 0aff7b1743219bfebe68e3b191b849dbbd05edcad20fd7dd17c4cf53d6f79c87 dotnet-sdk-9.0-9.0.111-1.el10_0.aarch64.rpm 4eef71ac2f7f386ec1c909d831030126248d293ad0f596d81736fe7544e99b03 dotnet-sdk-aot-9.0-9.0.111-1.el10_0.aarch64.rpm c32125f7ecc596bd1c79bda5d8c300fe4ed373f1f2c55290ef0f2c6ca82024ff dotnet-sdk-dbg-9.0-9.0.111-1.el10_0.aarch64.rpm 13ed4158de5f1347d98eecac2d1bffcfc56483e794009f2845914cd8f36793a5 dotnet-targeting-pack-9.0-9.0.10-1.el10_0.aarch64.rpm 9e6e6d96c75fc5d7985c0f11e53e7bec73360ae72aa073f487dc181e7ee096e1 dotnet-templates-9.0-9.0.111-1.el10_0.aarch64.rpm 06ab463d0fe5e329151c2fffdc89c6ee6443deac018e1578bc77fb2dcbef9d3b netstandard-targeting-pack-2.1-9.0.111-1.el10_0.aarch64.rpm 5da4ef9a451f69ce545d089ae73a5bb4d893963431bc6e17aebd3f2be694e306 RLSA-2025:18183 Important: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-3.6.5-3.el10_0.7.aarch64.rpm 393b7a7f6e7525b90f240c70e593070ce808134dccf366d36915aa6cd1ba1350 libsoup3-devel-3.6.5-3.el10_0.7.aarch64.rpm 592eb7506bd822c69ce0da9c54d4316e084839d84cce12ef6edf148802d157c8 RLSA-2025:19156 Important: libtiff security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libtiff. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files. Security Fix(es): * libtiff: Libtiff Write-What-Where (CVE-2025-9900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libtiff-4.6.0-6.el10_0.1.aarch64.rpm 6f84ef0aaa354bd034802f3dc1eb402e5fd5478ab7cac2e5d0976531ef81dfca libtiff-devel-4.6.0-6.el10_0.1.aarch64.rpm 95f445d0d99db5a3487731a1836981242ebd6a19e7c320119f10624a67e47194 RLSA-2025:19435 Moderate: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229) * xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230) * xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms xorg-x11-server-Xwayland-24.1.5-5.el10_0.aarch64.rpm 4f69b8fa28df14635738ae52903d1c1d9ddaa54140afec9c48bace989f0f02be RLSA-2025:19675 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms valkey-8.0.6-1.el10_0.aarch64.rpm 5b00d3d5b3b21649c29f05e846e6816b0838f6a263c5ea39fff46ac634b14df0 valkey-devel-8.0.6-1.el10_0.aarch64.rpm abaf90665823a14928c8da7836c0bc86664aeabc1dfb2caf941ce78bd173eb7f RLSA-2025:19720 Low: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Low An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-3.6.5-3.el10_0.9.aarch64.rpm 0a6bd6531a3868cf708fc8111c52c793559fefcc1ef04b3f8a906e1ce898ae43 libsoup3-devel-3.6.5-3.el10_0.9.aarch64.rpm baf0f9600b540f7690c61343fa1f0c86617085dc99978cf810138c3adad41124 RLSA-2025:19772 Important: qt6-qtsvg security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms qt6-qtsvg-6.8.1-1.el10_0.1.aarch64.rpm cb0ce35e32f233baca9adcab79b62e5e5b58e8fb97692a2ce773e8a8b9866051 qt6-qtsvg-devel-6.8.1-1.el10_0.1.aarch64.rpm e5d7aa9388ab9fca8a3556af4269cab85d1bf4948250d2f281881f96f659816a RLSA-2025:22012 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms buildah-1.41.6-1.el10_1.aarch64.rpm 5d03e8f04d5afd5dfb23366a7dc42079e3ab50100fbcbbb166bd1ca0274003f0 buildah-tests-1.41.6-1.el10_1.aarch64.rpm 20812e0a0ce4026f0ff0385e13683de97e4c67ce6ff50c0461fa3b05e87e2074 RLSA-2025:22361 Moderate: qt6-qtquick3d security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qt6-qtquick3d. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt 6 Quick3D library. Security Fix(es): * assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms qt6-qtquick3d-6.9.1-1.el10_1.1.aarch64.rpm 5cfeed0f695030567299e49be4762dd50144ffea9b255a8cf7710493566cf2ea qt6-qtquick3d-devel-6.9.1-1.el10_1.1.aarch64.rpm d92dea864a12be0a4ea168af8598262d7597617bed6bc3a9423dcd2eb2dcfee3 RLSA-2025:22394 Moderate: qt6-qtsvg security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Uncontrolled recursion in Qt SVG module (CVE-2025-10728) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.2.aarch64.rpm 640adf43cbb917a75972a006df9b506ea06601fcbf2f75668c64023a6e3a3011 qt6-qtsvg-devel-6.9.1-2.el10_1.2.aarch64.rpm 83bc81b4b744709945d9447c36a3f607b6b5571a110415b79de8f1e15c7f91f8 RLSA-2025:23035 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333) * firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329) * firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331) * firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-140.6.0-1.el10_1.aarch64.rpm b4ba802905751c6d9b935584335e374a55203439d6ce46a69c5615cc3486a621 RLSA-2025:23008 Moderate: mysql8.4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for mysql8.4. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. Security Fix(es): * mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054) * mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045) * mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040) * mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069) * mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mysql8.4-8.4.7-1.el10_1.aarch64.rpm 8d54ca98f72635094e8c8edbac5952e7d9622b049397e6fc5f1737d7a10e86c3 mysql8.4-common-8.4.7-1.el10_1.noarch.rpm e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056 mysql8.4-common-8.4.7-1.el10_1.noarch.rpm e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056 mysql8.4-common-8.4.7-1.el10_1.noarch.rpm e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056 mysql8.4-common-8.4.7-1.el10_1.noarch.rpm e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056 mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b mysql8.4-libs-8.4.7-1.el10_1.aarch64.rpm 3131f56c5467f301a60c657d75fafe1a650afd86b1c7ff78d93c49a5190b17ce mysql8.4-server-8.4.7-1.el10_1.aarch64.rpm 6405be32440d26bab601d8345611938649611ec6b3602b7bef0a97d2d4f8ff07 RLSA-2025:23052 Important: tomcat9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651) * tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat9-9.0.87-8.el10_1.1.noarch.rpm 7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3 tomcat9-9.0.87-8.el10_1.1.noarch.rpm 7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3 tomcat9-9.0.87-8.el10_1.1.noarch.rpm 7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3 tomcat9-9.0.87-8.el10_1.1.noarch.rpm 7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3 tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm 8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749 tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm 8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749 tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm 8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749 tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm 8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749 tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm 1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3 tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm 1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3 tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm 1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3 tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm 1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3 tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2 tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2 tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2 tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2 tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17 tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17 tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17 tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17 tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm 36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm 36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm 36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm 36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea RLSA-2025:23050 Important: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651) * tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Denial of service (CVE-2025-61795) * tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat-10.1.36-3.el10_1.1.noarch.rpm f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493 tomcat-10.1.36-3.el10_1.1.noarch.rpm f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493 tomcat-10.1.36-3.el10_1.1.noarch.rpm f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493 tomcat-10.1.36-3.el10_1.1.noarch.rpm f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493 tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6 tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6 tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6 tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6 tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm 90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437 tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm 90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437 tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm 90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437 tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm 90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437 tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm 8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478 tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm 8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478 tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm 8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478 tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm 8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478 tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm 778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm 778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm 778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm 778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm 91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm 91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm 91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm 91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f RLSA-2025:23083 Important: wireshark security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for wireshark. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * wireshark: Access of Uninitialized Pointer in Wireshark (CVE-2025-13499) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms wireshark-4.4.2-4.el10_1.1.aarch64.rpm c818afe73d994aa4edf4157680bd2c4bccff56b042fd0742b82956303a01a757 wireshark-cli-4.4.2-4.el10_1.1.aarch64.rpm dc5016334f2d7987d721808b64278b514f7fc2cdcfa39066898adcec09f5f23a RLSA-2025:23088 Moderate: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms grafana-10.2.6-21.el10_1.aarch64.rpm 1f8194f0dd1856385d7dbb400d738ed451bbde6fb7b6b2b713a619a9dfb1c882 grafana-selinux-10.2.6-21.el10_1.aarch64.rpm 5f20645c46cd08a2b0901ee9dd5ae458f09c1583cfa86976b7bfd07562d919e3 RLSA-2025:23139 Moderate: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion (CVE-2025-12105) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-3.6.5-3.el10_1.7.aarch64.rpm 1c5b58cc42e12b093346325241830f2517ac4b99ab97f8296e089b297ee61ff4 libsoup3-devel-3.6.5-3.el10_1.7.aarch64.rpm 3282599046b099a7ea831444a04066fdf078ab10f3667d9e4aead218f28c5013 RLSA-2025:23201 Important: keylime security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for keylime. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Keylime: Registrar allows identity takeover via duplicate UUID registration (CVE-2025-13609) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms keylime-tools-7.12.1-11.el10_1.3.aarch64.rpm c4b6cf21629f6ff81f54f46e11b5e01139ff4d48dcfae1b9ab0e23522382ff6c keylime-verifier-7.12.1-11.el10_1.3.aarch64.rpm cfad819993794b822ac7b468b59fc4cecb8974ed328c4d14fe81c744409c8248 python3-keylime-7.12.1-11.el10_1.3.aarch64.rpm 38b51bc0177829e8050202e43154697217ac2a37f5b8a95832c53087e06ae6cd keylime-7.12.1-11.el10_1.3.aarch64.rpm 77637e24df06aa3f239bc14b939740e01110df8e02137063d9ac0948185bc794 keylime-base-7.12.1-11.el10_1.3.aarch64.rpm 8986a92a8486dc01d7d2f51e118e5dccf48fc7d3a76692e5f1a83cfd6768bf59 keylime-registrar-7.12.1-11.el10_1.3.aarch64.rpm ce1c6bed869275f6720498a850569f60d6e52dd2d10d79d1488d0856cfcd1017 keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914 keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914 keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914 keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914 keylime-tenant-7.12.1-11.el10_1.3.aarch64.rpm 8ec5a15f37fd17141a5474a533c0ad6175687c28442d06c23ff76e4357bca904 RLSA-2025:20478 Moderate: zziplib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for zziplib. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. none-appstream-rpms zziplib-0.13.78-2.el10.aarch64.rpm a5c94c61cf10ae637c65d8100d847d223b104a551e1785dff946626bdf40a39e zziplib-utils-0.13.78-2.el10.aarch64.rpm 9eb2f8f24ed506a762fdc0ade5e4e1f5c9b7ee7df4e48dda54cb88c09d062044 RLSA-2025:21002 Important: squid security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for squid. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms squid-6.10-6.el10_1.1.aarch64.rpm 964726875480bf40cbeb44a6a43cbf6fce34acff4940ad1745f394e341db8b05 RLSA-2025:20994 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ipa-client-4.12.2-24.el10_1.1.aarch64.rpm 9411d624dace98b7a1b3289f847b73712220642596ecdd7bcec9484732d27d33 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-encrypted-dns-4.12.2-24.el10_1.1.aarch64.rpm e4d31880f78037ca3082443c5d072499039137433833a8c36c27f571e07ac1b4 ipa-client-epn-4.12.2-24.el10_1.1.aarch64.rpm f520b9b640d9adb4b00d8865f54b8e2045dae180969de72f7d1b9223c5e8fae8 ipa-client-samba-4.12.2-24.el10_1.1.aarch64.rpm 2bd73688be882bd4bdc835f370172e80847b52127cdce0007f8da90599923a3e ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-server-4.12.2-24.el10_1.1.aarch64.rpm 423c13b6e78e69cf4369468cfdc6cc284bba2f456182b7ac5ea666df432d8637 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-encrypted-dns-4.12.2-24.el10_1.1.aarch64.rpm 59e907f42a11185a8aee72aa07c02345767b57df64b4e56d50a51a9b604bf7c6 ipa-server-trust-ad-4.12.2-24.el10_1.1.aarch64.rpm 61133c1243f672c0c873d46221257f4b99629f4921435b2ce765afeffc83b7f5 python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 RLSA-2025:21032 Important: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-3.6.5-3.el10_1.6.aarch64.rpm afbe9a982f4626bc84763baedc63e5b29cf8b5a1c0cb61e6d6b80da8b5a71d47 libsoup3-devel-3.6.5-3.el10_1.6.aarch64.rpm dc47d85945942bf373f5883ee68ca00653da40fc3daac9c95846f3d44d1fc895 RLSA-2025:21037 Important: qt6-qtsvg security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.1.aarch64.rpm 3ff2cb179c9f265a18f26ab20419e4c5a4fd9b87ccc0287cc5c3a4d823c2aaf0 qt6-qtsvg-devel-6.9.1-2.el10_1.1.aarch64.rpm 501c481eebe8f09b23f581fa7044a4e8a638305ab1588457d10731aefaa4b030 RLSA-2025:21034 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for bind. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms bind-9.18.33-10.el10_1.2.aarch64.rpm 9a2a1d6c52f5d3d9b95dcf5dd958d2582d035e2f5b12cffdf9ebaf703a75c3c9 bind-chroot-9.18.33-10.el10_1.2.aarch64.rpm c33b71ed4823271bfbef945c34209584b4b90cd839cef1050f815c5f50a83fab bind-dnssec-utils-9.18.33-10.el10_1.2.aarch64.rpm c2894d3c9d13f6a54469ca0bc7526ee8724f4f07e49eaafbe67b8250c52d7a85 bind-libs-9.18.33-10.el10_1.2.aarch64.rpm 5add201e2e5ed33099f655fdd378449c7475cf8e8057e414601a4e9ea1d0b8f2 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-utils-9.18.33-10.el10_1.2.aarch64.rpm 74e1400c6aaee4661ca91c87a9b4ce3ab8fa13dbdb1f354d59fdfff7c3d260d2 RLSA-2025:21142 Important: python-kdcproxy security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-kdcproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088) * python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f RLSA-2025:21220 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-5.6.0-6.el10_1.aarch64.rpm 96e064880f0b1668975c0acc48fac3e2dc6575d003732f6ca42571218b08cef6 podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-remote-5.6.0-6.el10_1.aarch64.rpm f7b63269cf30ba5784b142de1b8076f35a579d8a7afd63e2fed66fe13c0a6f9a RLSA-2025:21281 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-140.5.0-2.el10_1.aarch64.rpm d71f0851e7dedf3e96757534aef318d45ca8f9a48dc69cd5da9467926af5c751 RLSA-2025:21843 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-140.5.0-2.el10_1.aarch64.rpm d57b23712cae585fd2a622871bf7a276f8c193cf17ce16a326a30f23c659de59 RLSA-2025:23141 Moderate: ruby security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for ruby. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * resolv: Denial of Service in resolv gem (CVE-2025-24294) * rexml: REXML denial of service (CVE-2025-58767) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ruby-3.3.10-11.el10_1.aarch64.rpm 944623500087134d82fbfa5e13a1b785e33c8c54767ede6e98a07412773a2d07 ruby-bundled-gems-3.3.10-11.el10_1.aarch64.rpm 85c9ec99e95c83130b1f2eaf693d7e0d59c74960f641cc69d68a2cc4b21227de ruby-default-gems-3.3.10-11.el10_1.noarch.rpm 40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1 ruby-default-gems-3.3.10-11.el10_1.noarch.rpm 40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1 ruby-default-gems-3.3.10-11.el10_1.noarch.rpm 40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1 ruby-default-gems-3.3.10-11.el10_1.noarch.rpm 40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1 ruby-devel-3.3.10-11.el10_1.aarch64.rpm 30dd9ebcbf6af48b61778189182888c47790f3b71e6ad8af90cfb35d70165b1e rubygem-bigdecimal-3.1.5-11.el10_1.aarch64.rpm b4c58e85086061d864ca732e5f583db03928cab405fbf07f9dbc5c2a7ba8e90e rubygem-bundler-2.5.22-11.el10_1.noarch.rpm 058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb rubygem-bundler-2.5.22-11.el10_1.noarch.rpm 058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb rubygem-bundler-2.5.22-11.el10_1.noarch.rpm 058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb rubygem-bundler-2.5.22-11.el10_1.noarch.rpm 058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb rubygem-io-console-0.7.1-11.el10_1.aarch64.rpm a499bbe93b18d7d89065ce202a9603b799c45ebc9643e6b80105067a3845202a rubygem-irb-1.13.1-11.el10_1.noarch.rpm e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a rubygem-irb-1.13.1-11.el10_1.noarch.rpm e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a rubygem-irb-1.13.1-11.el10_1.noarch.rpm e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a rubygem-irb-1.13.1-11.el10_1.noarch.rpm e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a rubygem-json-2.7.2-11.el10_1.aarch64.rpm 9a7dcb05ac7b8f22ed2766aec3e7b26d0536462e2ce06057f9983c3851470d96 rubygem-minitest-5.20.0-11.el10_1.noarch.rpm 0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a rubygem-minitest-5.20.0-11.el10_1.noarch.rpm 0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a rubygem-minitest-5.20.0-11.el10_1.noarch.rpm 0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a rubygem-minitest-5.20.0-11.el10_1.noarch.rpm 0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59 rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59 rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59 rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59 rubygem-psych-5.1.2-11.el10_1.aarch64.rpm 1bf9102ffd8e2001c66767d5b2acb2f737fc8c040e519ca9563a968a39f6a900 rubygem-rake-13.1.0-11.el10_1.noarch.rpm 42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f rubygem-rake-13.1.0-11.el10_1.noarch.rpm 42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f rubygem-rake-13.1.0-11.el10_1.noarch.rpm 42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f rubygem-rake-13.1.0-11.el10_1.noarch.rpm 42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f rubygem-rbs-3.4.0-11.el10_1.aarch64.rpm 7d9ba463a2c4b1e647fa2ba8855ebe703d9f441cf6350e7d0337b3c81c676542 rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f rubygem-rexml-3.4.4-11.el10_1.noarch.rpm f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995 rubygem-rexml-3.4.4-11.el10_1.noarch.rpm f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995 rubygem-rexml-3.4.4-11.el10_1.noarch.rpm f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995 rubygem-rexml-3.4.4-11.el10_1.noarch.rpm f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995 rubygem-rss-0.3.1-11.el10_1.noarch.rpm 07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20 rubygem-rss-0.3.1-11.el10_1.noarch.rpm 07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20 rubygem-rss-0.3.1-11.el10_1.noarch.rpm 07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20 rubygem-rss-0.3.1-11.el10_1.noarch.rpm 07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20 rubygems-3.5.22-11.el10_1.noarch.rpm 4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c rubygems-3.5.22-11.el10_1.noarch.rpm 4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c rubygems-3.5.22-11.el10_1.noarch.rpm 4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c rubygems-3.5.22-11.el10_1.noarch.rpm 4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c rubygems-devel-3.5.22-11.el10_1.noarch.rpm 8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e rubygems-devel-3.5.22-11.el10_1.noarch.rpm 8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e rubygems-devel-3.5.22-11.el10_1.noarch.rpm 8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e rubygems-devel-3.5.22-11.el10_1.noarch.rpm 8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm 4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm 4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm 4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm 4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee ruby-libs-3.3.10-11.el10_1.aarch64.rpm 34c666ba26be12535a485d9effb67fefc41176c85429250bd005fe1564486ce4 RLSA-2025:23294 Moderate: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms skopeo-1.20.0-2.el10_1.aarch64.rpm 7e0b87eb16f159a3aee23d90d9bcf47135ad48a1f3588970c1efd3b275793246 skopeo-tests-1.20.0-2.el10_1.aarch64.rpm 13a36d67e893f61499d223239c27741b4a135d357688a6865615b0ac95751ed5 RLSA-2025:23295 Moderate: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-5.6.0-8.el10_1.aarch64.rpm 05cd6e9ec69fd74392992e0cb6b37c88f02137dd5c17bcb3e1e2bdd485688342 podman-docker-5.6.0-8.el10_1.noarch.rpm b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f podman-docker-5.6.0-8.el10_1.noarch.rpm b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f podman-docker-5.6.0-8.el10_1.noarch.rpm b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f podman-docker-5.6.0-8.el10_1.noarch.rpm b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f podman-remote-5.6.0-8.el10_1.aarch64.rpm fc56a7028fbc49bec91238d60e0f6c04ea02850c54f40576d23663193be45e91 RLSA-2025:23664 Important: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation (CVE-2025-68156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms opentelemetry-collector-0.135.0-2.el10_1.aarch64.rpm 7ac7119e3a483c730667fd42c111f0d5e423330257cbbbc7b2f3039c316d9d05 RLSA-2025:23667 Important: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for git-lfs. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * git-lfs: Git LFS may write to arbitrary files via crafted symlinks (CVE-2025-26625) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms git-lfs-3.6.1-4.el10_1.aarch64.rpm 9f9deecc4005d6bb7d02beee6cb2f00c4264dd872ec2c420ce5e79e57aac5fea RLSA-2025:23738 Important: mod_md security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for mod_md. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal. Security Fix(es): * mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mod_md-2.4.26-4.el10_1.aarch64.rpm 6e7ac44867435db96888d3fb19369d1115fe17dc2548e1321ace601377a9faf1 RLSA-2025:23932 Important: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for httpd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082) * httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200) * httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms httpd-2.4.63-4.el10_1.3.aarch64.rpm 05f9ee417d595f5bb6f92a6fecc4013edc2a5f697d3e530a87380d998c6c28cc httpd-core-2.4.63-4.el10_1.3.aarch64.rpm e5c2c17ba36be7d7bc8b7f298b88026bd89c52bdd655f86671e6f52730b03163 httpd-devel-2.4.63-4.el10_1.3.aarch64.rpm af6066c94d5134369d7ff3e10203aa90c37444e58da612f43c220b441af36123 httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75 httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75 httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75 httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75 httpd-manual-2.4.63-4.el10_1.3.noarch.rpm 6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af httpd-manual-2.4.63-4.el10_1.3.noarch.rpm 6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af httpd-manual-2.4.63-4.el10_1.3.noarch.rpm 6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af httpd-manual-2.4.63-4.el10_1.3.noarch.rpm 6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af httpd-tools-2.4.63-4.el10_1.3.aarch64.rpm 5b6115ac068757f1342f4f4b94370f721308e64621b9d6cfb90c9d74f701f1f7 mod_ldap-2.4.63-4.el10_1.3.aarch64.rpm 6767da279e79b84fd25a85877383832a79f7b85e9e0038ecfd3e89372fc9a847 mod_lua-2.4.63-4.el10_1.3.aarch64.rpm 99d8bd89bb02b0cbad0d8d474d64cb193d53cce0d5b75560f5cfe20feb6f6dd0 mod_proxy_html-2.4.63-4.el10_1.3.aarch64.rpm 29c23c7fc6ba160078ca413ef32181d4d5cdc885b572f8cb6a71c8004e6b1ed1 mod_session-2.4.63-4.el10_1.3.aarch64.rpm 101903e397cd5ba54eb44ab62b1dc43bb2a144b6be7f2252b163e67dbd5748ab mod_ssl-2.4.63-4.el10_1.3.aarch64.rpm 60a06e4950d6e8017668c57caf4cd8d406b4a7404d8a66c8ebfec5c3ac5e7aa1 RLSA-2026:0025 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333) * firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329) * firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331) * firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-140.6.0-1.el10_1.aarch64.rpm a4b568a6ebf3d620c8f50bc2a66ab0af9b15e6a27389551a72de69d0c7fd4b7d RLSA-2026:0525 Moderate: postgresql16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for postgresql16. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package. Security Fix(es): * postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms postgresql-docs-16.11-1.el10_1.aarch64.rpm 6ad76302d2e7eeeb12201b3a35d3b70fc257ec19862023f4e01a6310101bfa20 postgresql-contrib-16.11-1.el10_1.aarch64.rpm 29e9f359d0d9f773e5dfd7543b195be35da0ca8f14a2fb8c38f41ede28e3905d postgresql-16.11-1.el10_1.aarch64.rpm 718816baff61e4706caf98ef549665f82f208bf5ae51bff76edae0f86b82c605 postgresql-pltcl-16.11-1.el10_1.aarch64.rpm a1475bfa2ab364b60c7a623acb7a61605d5c786ddc56e7919fb473412cbe4179 postgresql-server-devel-16.11-1.el10_1.aarch64.rpm 84b180c330ebe6e6f0b3c5d8ebd160928dce161192dc616d62a3aa00fd3fa0e9 postgresql-test-16.11-1.el10_1.aarch64.rpm ff240a2ce1814be403a3f2befa9f28cb6d475197709eedc6b8f1b1c66297fc56 postgresql-upgrade-devel-16.11-1.el10_1.aarch64.rpm 0bdfc6adeb8abb606e994dcb083de5eb2b73b2ff6f7c63deadddab589890125d postgresql-server-16.11-1.el10_1.aarch64.rpm e040d1994b686c8b2f9e1b3f8203b503ee3129c481eac127baaec3235ef5217d postgresql-private-libs-16.11-1.el10_1.aarch64.rpm bdb7dd6765a3ccda70bc636aa807be62402a5ce184d6680483ef3922c045e77f postgresql-plpython3-16.11-1.el10_1.aarch64.rpm bcc0ebae0d7a4cc8d4d4b8d156277b92578368759f84284d3a3b4ee1d7e5b1aa postgresql-upgrade-16.11-1.el10_1.aarch64.rpm ffa94e88420a6cd5f1b2c367f7d3d0238e0960de03fc68c9b7d1ec4b275a4983 postgresql-private-devel-16.11-1.el10_1.aarch64.rpm dc8b895ae3c8760701a9c4a7a61ea5b06cd7ab7449c722822412eb1e6b9d56e7 postgresql-plperl-16.11-1.el10_1.aarch64.rpm ae01ac985e7746170f2bc7aac559fcb774ca5231558d21e91a72e684ef6a9a36 postgresql-static-16.11-1.el10_1.aarch64.rpm 7e89f303442b495c9d4c586ccb299c4a6ae8b6c245b5522ee508340d20756448 RLSA-2026:0108 Moderate: gcc-toolset-15-binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for gcc-toolset-15-binutils. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Binutils is a collection of binary utilities, including ar (for creating, modifying and extracting from archives), as (a family of GNU assemblers), gprof (for displaying call graph profile data), ld (the GNU linker), nm (for listing symbols from object files), objcopy (for copying and translating object files), objdump (for displaying information from object files), ranlib (for generating an index for the contents of an archive), readelf (for displaying detailed information about binary files), size (for listing the section sizes of an object or archive file), strings (for listing printable strings from files), strip (for discarding symbols), and addr2line (for converting addresses to file and line). Security Fix(es): * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gcc-toolset-15-binutils-gprofng-2.44-7.el10_1.1.aarch64.rpm 4c28d8d1d45a2110dc07ae0a2fd288111ac9236a19ddffbf7ea05df10756771b gcc-toolset-15-binutils-gold-2.44-7.el10_1.1.aarch64.rpm 1637f6347d55e733ba329f633903b5caee24d072b14a0014e5fbe3feb21d489c gcc-toolset-15-binutils-devel-2.44-7.el10_1.1.aarch64.rpm 1e002624aa98ac73e7ed00e21705da73369ae4949cc0cfb03d20d618354c79c5 gcc-toolset-15-binutils-2.44-7.el10_1.1.aarch64.rpm 4c37a1125e632d47c8e04594021980ff94ebef3d60b32c339062e410489f482d RLSA-2026:0128 Moderate: poppler security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for poppler. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Poppler is a Portable Document Format (PDF) rendering library, used by applications such as Evince. Security Fix(es): * poppler: Out-of-Bounds Read in Poppler (CVE-2025-32365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms poppler-qt6-24.02.0-7.el10_1.aarch64.rpm f591c48441a1d0f2cd28a1ed6f15e22998b1586d70a912a97aa691e345017149 poppler-glib-24.02.0-7.el10_1.aarch64.rpm e5c61ad172e6af32b9cb98b2ee1dfc33771d3b2f3824d171fdaa4941665e0d0a poppler-24.02.0-7.el10_1.aarch64.rpm 9e294ab4e09336f1a19103d41ff958f8c6bd21ef1d042f546078818b4787b4c5 poppler-utils-24.02.0-7.el10_1.aarch64.rpm 2d08080a790ae0f0d70f6fa0cdfc9b0a57a47b414cf92fa0df7cd670affc8c73 poppler-cpp-24.02.0-7.el10_1.aarch64.rpm 23a3fc4d4275bddfea1f9ad481e11fc25c613c368e36daf4c31abc6c82538b47 RLSA-2026:0136 Important: mariadb10.11 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for mariadb10.11. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MariaDB is a community developed fork from MySQL - a multi-user, multi-threaded SQL database server. It is a client/server implementation consisting of a server daemon (mariadbd) and many different client programs and libraries. The base package contains the standard MariaDB/MySQL client programs and utilities. Security Fix(es): * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490) * mariadb: MariaDB Server Crash Due to Empty Backtrace Log (CVE-2023-52969) * mariadb: MariaDB Server Crash (CVE-2023-52971) * mariadb: MariaDB Server Crash via Item_direct_view_ref (CVE-2023-52970) * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mariadb: MariaDB: mariadb-dump utility vulnerable to remote code execution via improper path validation (CVE-2025-13699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mariadb-gssapi-server-10.11.15-1.el10_1.aarch64.rpm 25ebaf09ec9daf6183955b272539effcfe97d9de401e3187107d1cc3497b7c25 mariadb-errmsg-10.11.15-1.el10_1.noarch.rpm 69320eecbd59d79eb9724ace818d407ce4f80529844369f213009d7b602a8ddc mariadb-errmsg-10.11.15-1.el10_1.noarch.rpm 69320eecbd59d79eb9724ace818d407ce4f80529844369f213009d7b602a8ddc mariadb-errmsg-10.11.15-1.el10_1.noarch.rpm 69320eecbd59d79eb9724ace818d407ce4f80529844369f213009d7b602a8ddc mariadb-errmsg-10.11.15-1.el10_1.noarch.rpm 69320eecbd59d79eb9724ace818d407ce4f80529844369f213009d7b602a8ddc mariadb-devel-10.11.15-1.el10_1.aarch64.rpm 8dca652d1afe061496ebb739e68ff623df979f6e4ac60813b1f1780ca39d874e mariadb-server-utils-10.11.15-1.el10_1.aarch64.rpm 9b012c54aa7b16859f21a226b9833d47c1f42bc12f258c9d64716a61b2e708e2 mariadb-embedded-devel-10.11.15-1.el10_1.aarch64.rpm 91f5095c5b0031d120df7a36c64edc2fe935eb4e462f4f0bf5934bca0d29dec3 mariadb-embedded-10.11.15-1.el10_1.aarch64.rpm d8e0c51c5972ecc5a0a08067cf15c68c8304750c2d40d59fbb1fa37b095cc2e1 mariadb-server-10.11.15-1.el10_1.aarch64.rpm 4ecb9b51430cf22f7f4d6916f55bf5a463bebf493139e003e39946eaa6491c25 mariadb-pam-10.11.15-1.el10_1.aarch64.rpm 9a198d50562a0ef5f60f04d3e11769f70d7177d0aeb4e646692f76dd707be0aa mariadb-test-10.11.15-1.el10_1.aarch64.rpm 4fe162f26e1cb8465d1da2eb35e92fbb09a064df0420a03a6afb02deac0ae897 mariadb-client-utils-10.11.15-1.el10_1.aarch64.rpm 00b11bd964e9ce59f1dd43523e3ba2e4188a57f9122e0d405ee53c077b8dd0c6 mariadb-oqgraph-engine-10.11.15-1.el10_1.aarch64.rpm 1f5d16389123051400df3100ab8bd34496de91af7bccff018ed30e2f053346f8 mariadb-backup-10.11.15-1.el10_1.aarch64.rpm 8eb7a4c319c5375fc6625c647a7ed01ffe83914f013fb6bbd4e5dc93afb1751a mariadb-server-galera-10.11.15-1.el10_1.aarch64.rpm 8f87c01d0879edbbffa05d3801279a14398998a560bd9af771c7871a0f045635 mariadb-common-10.11.15-1.el10_1.noarch.rpm f2617fbee4e48f6d49569f3a183c3615a339e8060bdc9a66787b37af5d9177bb mariadb-common-10.11.15-1.el10_1.noarch.rpm f2617fbee4e48f6d49569f3a183c3615a339e8060bdc9a66787b37af5d9177bb mariadb-common-10.11.15-1.el10_1.noarch.rpm f2617fbee4e48f6d49569f3a183c3615a339e8060bdc9a66787b37af5d9177bb mariadb-common-10.11.15-1.el10_1.noarch.rpm f2617fbee4e48f6d49569f3a183c3615a339e8060bdc9a66787b37af5d9177bb mariadb-10.11.15-1.el10_1.aarch64.rpm d415f057c5d8a3623cdaaf27ff359742c860d1f11ea8ee3aa60639e844811423 RLSA-2026:0423 Important: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins) (CVE-2025-14523) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-devel-3.6.5-3.el10_1.8.aarch64.rpm 3f4f87b5be60b806b28e93246d370751671a62ed78e6357ee39b74f7611dfd10 libsoup3-3.6.5-3.el10_1.8.aarch64.rpm 6cb52e9559e9f9d02c3b683204aa9347b898b341757ce047fa0404e8c1273188 RLSA-2026:0436 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms buildah-tests-1.41.8-1.el10_1.aarch64.rpm 9833ea46b5810cdffada23dc8ec60a4da9d965a6559e5586c8d8e19abc5f6042 buildah-1.41.8-1.el10_1.aarch64.rpm 5500e7ef9bfeb59be0a7740ab85c0052a3261b5fbaee1b4b591225fa3385ebc7 RLSA-2026:0770 Important: gpsd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for gpsd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. With gpsd, multiple GPS client applications (such as navigational and war-driving software) can share access to a GPS without contention or loss of data. Also, gpsd responds to queries with a format that is substantially easier to parse than NMEA 0183. Security Fix(es): * gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing (CVE-2025-67269) * gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling (CVE-2025-67268) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gpsd-3.26.1-1.el10_1.1.aarch64.rpm aa7b942c12b1289ac78dbafc7c3743386dcfa9bd90d78b1d4b96f31471809f50 python3-gpsd-3.26.1-1.el10_1.1.aarch64.rpm ed924ee7d3c30bafe53ea4aed5cb73de7640c13b46fd423c72dbf57078b5eb44 gpsd-clients-3.26.1-1.el10_1.1.aarch64.rpm d69b1f1e711d67f49623834e2a8b7728adf864ea07ed90255a98db1d10c6f9df RLSA-2026:0545 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-docker-5.6.0-11.el10_1.noarch.rpm 16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1 podman-docker-5.6.0-11.el10_1.noarch.rpm 16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1 podman-docker-5.6.0-11.el10_1.noarch.rpm 16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1 podman-docker-5.6.0-11.el10_1.noarch.rpm 16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1 podman-remote-5.6.0-11.el10_1.aarch64.rpm 409b19c1ac0d574819f66ee96f6a814956682f22b303f4d91c39c52ee5094447 podman-5.6.0-11.el10_1.aarch64.rpm ac23a66ccb0bd144c95919b107c10db2f683216ab5b153cb74684b79fd15412f RLSA-2026:0606 Moderate: vsftpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for vsftpd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The vsftpd packages include a Very Secure File Transfer Protocol (FTP) daemon, which is used to serve files over a network. Security Fix(es): * vsftpd: vsftpd: Denial of service via integer overflow in ls command parameter parsing (CVE-2025-14242) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms vsftpd-3.0.5-10.el10_1.1.aarch64.rpm 7cd71433abfd12d17b4b4e3ced2b06915ede05deb7a4aca2c60edf95b8e2e3a9 RLSA-2026:0668 Important: net-snmp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for net-snmp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Security Fix(es): * net-snmp: buffer overflow via a specially crafted packet can cause a crash in snmptrapd (CVE-2025-68615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms net-snmp-libs-5.9.4-15.el10_1.2.aarch64.rpm 65128a3a092d39d8e78d70535a81b1f9ad5cfae39b0fe957c5074433fea59cba python3-net-snmp-5.9.4-15.el10_1.2.aarch64.rpm ab8b309838eae7b5d77718e50e41a0988a24cf484cbd73600d5509b28064a05d net-snmp-utils-5.9.4-15.el10_1.2.aarch64.rpm 58f48422e667223e64550c0174799618a8e86bf8f7b6ec3571d65a8d4236fcf3 net-snmp-5.9.4-15.el10_1.2.aarch64.rpm f1d890233f363738ffe1a8c57b11a5ad66f04643f25355a28f1ed456c6ab1b5a net-snmp-perl-5.9.4-15.el10_1.2.aarch64.rpm 3afe21c4ce6d9d0a5bdb5d29d0403eb686a0495194fa7e47a438811e2ec35132 net-snmp-agent-libs-5.9.4-15.el10_1.2.aarch64.rpm 6c6b3896361153e8106021bff52047616c9f42a4a5c1b073754dbe55b2817293 net-snmp-perl-module-5.9.4-15.el10_1.2.aarch64.rpm 110b41f03c7810d8a14b9ec69a4cd36ed87c3f8dcd72767a6505891c14df9987 net-snmp-devel-5.9.4-15.el10_1.2.aarch64.rpm cdde93f16fa29fa7f2adb94fe1c88e42bdd54d7b5f3ca7b582f38fc1aebe037a RLSA-2026:0922 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms golang-tests-1.25.5-1.el10_1.noarch.rpm 37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f golang-tests-1.25.5-1.el10_1.noarch.rpm 37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f golang-tests-1.25.5-1.el10_1.noarch.rpm 37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f golang-tests-1.25.5-1.el10_1.noarch.rpm 37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f golang-docs-1.25.5-1.el10_1.noarch.rpm 509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393 golang-docs-1.25.5-1.el10_1.noarch.rpm 509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393 golang-docs-1.25.5-1.el10_1.noarch.rpm 509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393 golang-docs-1.25.5-1.el10_1.noarch.rpm 509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393 golang-bin-1.25.5-1.el10_1.aarch64.rpm 4762c854bac065ef6b94039ddcb1a4e1a3066afb1cc9f479c1e78afaa22a00a8 go-toolset-1.25.5-1.el10_1.aarch64.rpm f19bc7bd5d38e5e8f56146cb99f3b4af4da352c2f57134b34f0fd539c1276895 golang-misc-1.25.5-1.el10_1.noarch.rpm 0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8 golang-misc-1.25.5-1.el10_1.noarch.rpm 0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8 golang-misc-1.25.5-1.el10_1.noarch.rpm 0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8 golang-misc-1.25.5-1.el10_1.noarch.rpm 0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8 golang-1.25.5-1.el10_1.aarch64.rpm a27db3ba5fe977c26229b9710de1a096165b810c3ad67d02d993731d02826627 golang-race-1.25.5-1.el10_1.aarch64.rpm 7231701f80f4084664c978f9d7b5d6e50d01f73c766ea37ff3c4ae50f5fad52d golang-src-1.25.5-1.el10_1.noarch.rpm 3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a golang-src-1.25.5-1.el10_1.noarch.rpm 3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a golang-src-1.25.5-1.el10_1.noarch.rpm 3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a golang-src-1.25.5-1.el10_1.noarch.rpm 3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a RLSA-2026:1597 Moderate: iperf3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for iperf3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss. Security Fix(es): * iperf3: iperf Heap Buffer Overflow (CVE-2025-54349) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms iperf3-3.17.1-5.el10_1.aarch64.rpm 4f8540a12578f7a072cb2f5058bf14a2e7fba98773e9eeb594856553c7a1093f RLSA-2026:1628 Important: php security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for php. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: heap-based buffer overflow in array_merge() (CVE-2025-14178) * php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177) * php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms php-dbg-8.3.29-1.el10_1.aarch64.rpm 6c4a9c4501908cbe4ab3966087a53f2299b17a56bdd013c51b8343d06acb6d7f php-pgsql-8.3.29-1.el10_1.aarch64.rpm 698bed1e29c40fc9243377bd99f2f129913ed80953c0f6287584524aa122e7ef php-pdo-8.3.29-1.el10_1.aarch64.rpm 5e908033de1d18cffcd91323722ae7e8a947be6cec9e9e33117e8fd63d088508 php-odbc-8.3.29-1.el10_1.aarch64.rpm 6c2ea7d2ea1759a8a1625eb1ae0dbf630d5e59e9e747f074487bbe6a096d5e48 php-xml-8.3.29-1.el10_1.aarch64.rpm 52438f19e8263e7c402d05cbf64603d52fb29243b871937463a70a27bb3a63dd php-embedded-8.3.29-1.el10_1.aarch64.rpm 1d8ed2fa6f50691c098e546f47e3f67a2c99469f10aedff39b83c1b739727240 php-enchant-8.3.29-1.el10_1.aarch64.rpm 15022b6d216a22ae37f49dca37770dc936631cf24bc34f5aa08547095d1dbd87 php-mysqlnd-8.3.29-1.el10_1.aarch64.rpm 08d7ac47d54463eb3658b9b09efd4f786ffc3d3fc29b6131d49134f07738d765 php-ffi-8.3.29-1.el10_1.aarch64.rpm f4101f85f0abebd0545ae7d0e5c1cc9b7810b8ee12c1206c1ef9ca0b35c60a5e php-process-8.3.29-1.el10_1.aarch64.rpm 60d0611d65ab2895acbc71df5cfe350f5047c91ead83ca518dd8b8e05baaa6eb php-fpm-8.3.29-1.el10_1.aarch64.rpm 2d4a8624e7352bac31bb34221b8bbf7fbdb9bd446af957612a43c98815eb339e php-common-8.3.29-1.el10_1.aarch64.rpm e879d95c3aac7698cb001e9f8fd5b0fe9e39fc3d6da2a6a756ac2374d4413f4c php-mbstring-8.3.29-1.el10_1.aarch64.rpm a301b33db156d34c0c1af5453707a963dfbbd37c193e54ed4a5b020ba10bfadc php-intl-8.3.29-1.el10_1.aarch64.rpm a5263e62e993459e5b3835ad656c3f8a21c4504e8bda18fad5f9eb6fc2b7a379 php-dba-8.3.29-1.el10_1.aarch64.rpm 2ff81a0fa27139772e6747f4937379894e220fac501f094577a5e40eef03ddf2 php-cli-8.3.29-1.el10_1.aarch64.rpm a7750c9929643813cbdf80ea556754d4a4de41855b6c5ea1b106ff87b4b9e806 php-soap-8.3.29-1.el10_1.aarch64.rpm f9c127a1b75d2398df4504105a7070bd804c324873dee64361c2ee5fb8265d60 php-snmp-8.3.29-1.el10_1.aarch64.rpm b4cab09969a2bd62317760b3581117fe69053e1dee6f3cfdfef3ee48bb81a985 php-devel-8.3.29-1.el10_1.aarch64.rpm ad5d195bcd2ef9f55f3b947ceec2469b7a43b2642dc34e6a4dce5f23bcd4702c php-opcache-8.3.29-1.el10_1.aarch64.rpm 7d992f5f76033cd8264295fc89a326fe50b857d9da5ad5865626c9c17f883319 php-bcmath-8.3.29-1.el10_1.aarch64.rpm 0199d2e07c7cc004a6a7f8d61a80f892f706e5df07308f6a60dc5e8de5c0cecb php-8.3.29-1.el10_1.aarch64.rpm 87bcdf9ebbf82d38c5e917b373c0038ebbcd74519cc1670a290243a9fadc368a php-gmp-8.3.29-1.el10_1.aarch64.rpm fab3d1b5c1bc42e2e6cea5991d483c96810286a146471a408b0afdce156d2265 php-ldap-8.3.29-1.el10_1.aarch64.rpm 4f0679eb0b54f6a6048e265ed264c0ca43c7179fccd79e5a78ebe73a6078d39f php-gd-8.3.29-1.el10_1.aarch64.rpm 32f4b2510015f09baafdbf20f44bd3292df84ff3f04b0c84ef577b55e49876d2 RLSA-2026:1714 Moderate: wireshark security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for wireshark. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * Wireshark: NULL Pointer Dereference in Wireshark (CVE-2025-9817) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms wireshark-cli-4.4.2-4.el10_1.2.aarch64.rpm 301cf891f788ef5e23c6e62de4a9ee2ed21f8d63138370760d953e1c64ab3c35 wireshark-4.4.2-4.el10_1.2.aarch64.rpm 79b67165f9e7b901538149bf15686cddc6f1ce3b868655fcdb0c6cf0746b0b40 RLSA-2026:1715 Important: golang-github-openprinting-ipp-usb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for golang-github-openprinting-ipp-usb. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables driverless support for USB devices capable of using IPP-over-USB protocol. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ipp-usb-0.9.27-4.el10_1.aarch64.rpm d65cf238385678224b911e2435a2cee0e1e10cf971336e2265730861d7d34ab9 RLSA-2026:2182 Important: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (CVE-2026-0719) * libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-3.6.5-3.el10_1.9.aarch64.rpm 0a37b468e9002a7d6e29e27f4507c426537242d9d0727666b0eeb926a7595150 libsoup3-devel-3.6.5-3.el10_1.9.aarch64.rpm e1a6e92578dc57d26db6cc65a160bb4c42da848b28f9780c8aaece8c0afb49a9 RLSA-2026:1905 Important: fence-agents security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for fence-agents. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. Security Fix(es): * pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm 6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm 6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm 6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm 6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699 fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699 fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699 fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699 fence-agents-common-4.16.0-13.el10_1.2.aarch64.rpm e76a601b5dcdb471addf34ba7149b2fa538e0faff4a8213127f9c36cfb948f03 fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm 744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108 fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm 744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108 fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm 744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108 fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm 744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108 fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62 fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62 fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62 fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62 fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56 fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56 fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56 fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56 fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1 fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1 fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1 fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1 fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm 6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm 6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm 6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm 6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895 fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895 fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895 fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895 fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95 fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95 fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95 fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95 fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm 4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm 4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm 4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm 4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm 6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0 fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm 6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0 fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm 6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0 fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm 6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0 fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm 3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8 fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm 3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8 fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm 3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8 fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm 3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8 fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6 fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6 fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6 fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6 fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm 94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48 fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm 94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48 fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm 94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48 fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm 94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48 fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm 20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272 fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm 20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272 fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm 20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272 fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm 20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272 fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm 59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35 fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm 59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35 fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm 59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35 fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm 59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35 fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm 04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61 fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm 04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61 fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm 04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61 fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm 04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61 fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm 69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm 69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm 69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm 69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm 9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405 fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm 9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405 fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm 9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405 fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm 9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405 fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm 088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm 088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm 088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm 088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83 fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83 fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83 fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83 fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm 2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7 fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm 2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7 fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm 2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7 fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm 2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7 fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm 7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4 fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm 7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4 fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm 7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4 fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm 7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4 fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09 fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09 fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09 fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09 fence-agents-kubevirt-4.16.0-13.el10_1.2.aarch64.rpm 11fffaf6234962f327509a38a4168066fc9c5627c187b92e24369055edec7f85 fence-agents-all-4.16.0-13.el10_1.2.aarch64.rpm e3980a63eef6c0cd6885b889e7f2def942b55ff2acd250d537dada14f3dbd00e fence-agents-redfish-4.16.0-13.el10_1.2.aarch64.rpm a0062478784abb34816ab8fb4002756f029c3a157dfb4303b6b7b92fe486ae88 fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm 20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11 fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm 20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11 fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm 20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11 fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm 20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11 fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c fence-agents-kdump-4.16.0-13.el10_1.2.aarch64.rpm 6bd0ec9931b058130a6cf780c239ef5f4a888a8f1541576d8ee6ab557afe2062 fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm 6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561 fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm 6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561 fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm 6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561 fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm 6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561 fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm 957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578 fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm 957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578 fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm 957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578 fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm 957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578 fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm 5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832 fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm 5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832 fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm 5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832 fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm 5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832 fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm 176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885 fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm 176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885 fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm 176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885 fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm 176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885 fence-agents-lpar-4.16.0-13.el10_1.2.noarch.rpm 0a130538f252739c95f1b60984a0c614bab4f99fbb4e170c49c988d8e80e6065 RLSA-2026:1842 Important: nodejs24 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for nodejs24. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices. Security Fix(es): * nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132) * nodejs: Nodejs denial of service (CVE-2026-21637) * nodejs: Nodejs denial of service (CVE-2025-59466) * nodejs: Nodejs denial of service (CVE-2025-59465) * nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131) * nodejs: Nodejs file permissions bypass (CVE-2025-55130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms nodejs24-full-i18n-24.13.0-1.el10_1.aarch64.rpm b2f2cf0fb2d935358e4056ff27f7c33439d560b1cd9b8ad22513e6dde1aac1fc nodejs24-libs-24.13.0-1.el10_1.aarch64.rpm 06d66ec530f1dcbc878501788cb830b9c4bf65c80d7dc79de737f277a81fef2c nodejs24-24.13.0-1.el10_1.aarch64.rpm a7c63c53a850635da0e96ffbeb893234eee4ce19eb08b844bad1465cdbeba93d nodejs24-devel-24.13.0-1.el10_1.aarch64.rpm 7aaf97e30a39cc5da91bcce16ed5852e417d2da55fed4e488f80af89e3195235 nodejs24-docs-24.13.0-1.el10_1.noarch.rpm 1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0 nodejs24-docs-24.13.0-1.el10_1.noarch.rpm 1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0 nodejs24-docs-24.13.0-1.el10_1.noarch.rpm 1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0 nodejs24-docs-24.13.0-1.el10_1.noarch.rpm 1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0 nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm 47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48 nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm 47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48 nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm 47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48 nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm 47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48 RLSA-2026:1843 Important: nodejs22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for nodejs22. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices. Security Fix(es): * nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132) * nodejs: Nodejs denial of service (CVE-2026-21637) * nodejs: Nodejs denial of service (CVE-2025-59466) * nodejs: Nodejs denial of service (CVE-2025-59465) * nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131) * nodejs: Nodejs file permissions bypass (CVE-2025-55130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms nodejs-docs-22.22.0-3.el10_1.noarch.rpm 12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4 nodejs-docs-22.22.0-3.el10_1.noarch.rpm 12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4 nodejs-docs-22.22.0-3.el10_1.noarch.rpm 12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4 nodejs-docs-22.22.0-3.el10_1.noarch.rpm 12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4 nodejs-npm-10.9.4-1.22.22.0.3.el10_1.aarch64.rpm 7f1d2405e14c38d486c23c7d113c9e2864c8b1c30723e07687140f71e95a9134 nodejs-libs-22.22.0-3.el10_1.aarch64.rpm 343340f93ef462e5125f157e5d8637e9f5a5588bb5eb6846c0fe8d9328df6cf5 nodejs-22.22.0-3.el10_1.aarch64.rpm 3631edce758706d83cba8c9bc19e864293f215f6bae43217275bf88f527858df nodejs-full-i18n-22.22.0-3.el10_1.aarch64.rpm c3056b4675b5eba4703041b8e552450ff720c063914b01ceeebb0833b3cc8558 nodejs-devel-22.22.0-3.el10_1.aarch64.rpm 41d826fab39802c657b1de01dd4e6812519ebbe9deb4499ba1190df2179630a7 RLSA-2026:1831 Moderate: qemu-kvm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qemu-kvm. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix(es): * qemu-kvm: VNC WebSocket handshake use-after-free (CVE-2025-11234) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms qemu-kvm-device-display-virtio-gpu-10.0.0-14.el10_1.5.aarch64.rpm 6ec02f07bee2f43669897d8869a12b44e1c1c19bfea8729f4eaa67ad5ecf3b10 qemu-kvm-audio-pa-10.0.0-14.el10_1.5.aarch64.rpm 2bb8a46f38c8c6d70aecc1810dfdb9f15f0a095560bd223e34fad8c210a191b3 qemu-kvm-device-usb-redirect-10.0.0-14.el10_1.5.aarch64.rpm 57beeea3faee8bf8e37efbe0aa512659d6fb67eda0a067de00c5d054684abe6e qemu-kvm-device-usb-host-10.0.0-14.el10_1.5.aarch64.rpm c35d1281aa55e8e54424566045679deeefba271c1133785f566139853924d3c3 qemu-kvm-docs-10.0.0-14.el10_1.5.aarch64.rpm e46c6cd807c20579279668987549ae04c8db75d0d9502cae160d434afce10e6b qemu-pr-helper-10.0.0-14.el10_1.5.aarch64.rpm ae60f8e8b3a42b65c024abcc80df0a21eba2a4c7b25ae78c5664079f720b2152 qemu-guest-agent-10.0.0-14.el10_1.5.aarch64.rpm 92cab52a4dc32731bf774edfa083fc1c068e3996bfaa7c01afc9f38a0905e3d4 qemu-kvm-device-display-virtio-gpu-pci-10.0.0-14.el10_1.5.aarch64.rpm 28d9e1d14fdeaf4518d6d27e28db1c881e1212322466e08d6e312cfed56daa3c qemu-kvm-tools-10.0.0-14.el10_1.5.aarch64.rpm b419b13648fdaccb721c492e7e01abcf17e9366975cac319edece1235bbab3df qemu-kvm-10.0.0-14.el10_1.5.aarch64.rpm 324bd7aa5987737d351a77c045096d0144dd3d7036b91dd43d02d0eded844d56 qemu-kvm-core-10.0.0-14.el10_1.5.aarch64.rpm 0df0fc8aaec9b4daf196fe604d2cf16022541620e9b75f870288f165b6547668 qemu-kvm-block-curl-10.0.0-14.el10_1.5.aarch64.rpm 17a1b9e23f9e67d4b3ea735ebf4518ee01f353a2bc6809c6967f96a306704182 qemu-kvm-block-rbd-10.0.0-14.el10_1.5.aarch64.rpm fbc6a1b3c369a3d247f85a0a68313e18aead765cb9eb74ec9ef141ee425d0d2b qemu-kvm-common-10.0.0-14.el10_1.5.aarch64.rpm 70512fe02a4f1c8febb835418015e08b9967b3a037870a2a13de220b1b9812d7 qemu-img-10.0.0-14.el10_1.5.aarch64.rpm cd909500bcd9a362b95d0dc93d00b303f044b8cd25b1d7453e9653451e0d42cc qemu-kvm-block-blkio-10.0.0-14.el10_1.5.aarch64.rpm d5b68f2eda003ef09320281b11ca4b44e8bc08cbc9121b162536f1399269107e RLSA-2026:2225 Critical: keylime security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Critical An update is available for keylime. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution. Security Fix(es): * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms keylime-7.12.1-11.el10_1.4.aarch64.rpm 8def11266f93e32ea6f789eac9e21ffa132ae9e1c93f2b7e262e0f0d793c7451 keylime-tenant-7.12.1-11.el10_1.4.aarch64.rpm 3584f087ff48a41813188e40feeb8780b9f3e387b14e2551432294075020eead python3-keylime-7.12.1-11.el10_1.4.aarch64.rpm 3b61efb7aa539a708f5c5ba81f25ae4cac206ada8d5388ca317954da02ac1448 keylime-verifier-7.12.1-11.el10_1.4.aarch64.rpm cf3d2a6c0776dbf19abad9104fbd5485165d497ad3c44b3f2227e8ae78b9ee46 keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed keylime-tools-7.12.1-11.el10_1.4.aarch64.rpm 39e3108b74ee54f3567712adc88bb4365c8cc9481079a002c8211ead90a157b1 keylime-registrar-7.12.1-11.el10_1.4.aarch64.rpm de8590776235dedd3c9d50bab58fcd36d14e14dc554d26c89ba1e1c358b233e6 keylime-base-7.12.1-11.el10_1.4.aarch64.rpm eddba0fc2d4a40a488b1dccc084748ae774e97b0813dbc283fb63991da8d1e4d RLSA-2026:2222 Important: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for freerdp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. (CVE-2026-23530) * freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability (CVE-2026-23884) * freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server (CVE-2026-23883) * freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution (CVE-2026-23533) * freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. (CVE-2026-23531) * freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow (CVE-2026-23534) * freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow (CVE-2026-23532) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libwinpr-3.10.3-5.el10_1.1.aarch64.rpm 6c50e3a53dce27ef6b780370b217b34ecaeb8228e680b4fe8f00c8b802d0b475 freerdp-libs-3.10.3-5.el10_1.1.aarch64.rpm 9a79651a569b97e28e68d7dc5b3538f4ad1dad04412b6dca936c234a7c96f978 freerdp-3.10.3-5.el10_1.1.aarch64.rpm e8ac5ce229a3c8ff3d7dc10872818e02c9e9f18de1e430367815c54895431fdd RLSA-2026:3443 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * Valkey: Valkey: Data tampering and denial of service via improper null character handling in Lua scripts (CVE-2025-67733) * valkey: Valkey: Denial of Service via invalid clusterbus packet (CVE-2026-21863) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms valkey-devel-8.0.7-1.el10_1.aarch64.rpm fb61ab75465a0b50a8e84993434d5906e30538a4e0244c703238324875d1ce4a valkey-8.0.7-1.el10_1.aarch64.rpm 8a735f989883a4a2c16995c4fe277ed4e26a9ebfa0ab030ed2fa586c4246d43f RLSA-2026:2410 Important: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-devel-3.6.5-3.el10_1.10.aarch64.rpm 4c488e987043a34d90a3606e86ad2121463ed2e88137251100129f5378a7648f libsoup3-3.6.5-3.el10_1.10.aarch64.rpm 32b14b7ddeea297a4317e43a824c7b6605fe2367454c42401a38a87cf449ba82 RLSA-2026:2706 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms golang-misc-1.25.7-1.el10_1.noarch.rpm e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de golang-misc-1.25.7-1.el10_1.noarch.rpm e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de golang-misc-1.25.7-1.el10_1.noarch.rpm e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de golang-misc-1.25.7-1.el10_1.noarch.rpm e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de golang-bin-1.25.7-1.el10_1.aarch64.rpm 97aa82b1cf4a2c1bb7d5f3d9ef76d973a4c22e2cb03fb4fe37647a81686df78a golang-race-1.25.7-1.el10_1.aarch64.rpm 3c604feaf2a939a0b417ad9255e57dea543d7bdadad84dd43d0023cf0a18d38b golang-docs-1.25.7-1.el10_1.noarch.rpm 27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1 golang-docs-1.25.7-1.el10_1.noarch.rpm 27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1 golang-docs-1.25.7-1.el10_1.noarch.rpm 27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1 golang-docs-1.25.7-1.el10_1.noarch.rpm 27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1 golang-1.25.7-1.el10_1.aarch64.rpm bf9bfa259b5b58712f5a5a6d7b0b36a43b75acad3398a779495575bf93c9aa5d golang-tests-1.25.7-1.el10_1.noarch.rpm a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6 golang-tests-1.25.7-1.el10_1.noarch.rpm a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6 golang-tests-1.25.7-1.el10_1.noarch.rpm a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6 golang-tests-1.25.7-1.el10_1.noarch.rpm a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6 go-toolset-1.25.7-1.el10_1.aarch64.rpm f573b951ff1ad692fa7a27660c24c4efa6c47efebd651bfd70f21e1c809823ad golang-src-1.25.7-1.el10_1.noarch.rpm f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68 golang-src-1.25.7-1.el10_1.noarch.rpm f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68 golang-src-1.25.7-1.el10_1.noarch.rpm f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68 golang-src-1.25.7-1.el10_1.noarch.rpm f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68 RLSA-2026:2914 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721) * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms grafana-10.2.6-22.el10_1.aarch64.rpm df5eea01d376f334298ec08e65a22231fd28884ecbaef4c18625db3b3cb02ce9 grafana-selinux-10.2.6-22.el10_1.aarch64.rpm aabd1540901ad0f4dc0773a0a5fe4e2e574172e713ea201e3a15e89e4a949d84 RLSA-2026:3035 Important: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for grafana-pcp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms grafana-pcp-5.3.0-2.el10_1.aarch64.rpm 7a79916864d96dbd96353f8a650a2084f37d95ad9b195c4d90b8dd6d3ed731a4 RLSA-2026:3033 Important: munge security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for munge. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods. Security Fix(es): * MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms munge-libs-0.5.15-11.el10_1.aarch64.rpm ea2666a262fda12c14d91430e7c4484d10dabf2470234547519ad6bbb840700a munge-0.5.15-11.el10_1.aarch64.rpm c9f26b9deba2140a1c19492908024fe6d71b72c52050b383887a6f55bc702313 RLSA-2026:3068 Important: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for freerdp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22855) * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22853) * freerdp: FreeRDP global-buffer-overflow (CVE-2026-22858) * freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22859) * freerdp: FreeRDP: Denial of Service via use after free in ecam_channel_write (CVE-2026-24678) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms freerdp-3.10.3-5.el10_1.2.aarch64.rpm 4b3effbb143be7b78275f25a2664fc73cb25e34126a92ca56cbd57c3f3b73d95 libwinpr-3.10.3-5.el10_1.2.aarch64.rpm 2ab2849c3e37b845507323d69c74bc42b93b85a4bc9324a1c4795ad897927e48 freerdp-libs-3.10.3-5.el10_1.2.aarch64.rpm 811887e2d37cb5b41f0e3c90aac1fda17dcfad6f0d2db7d741e86d9c5c4ffaf4 RLSA-2026:3092 Important: golang-github-openprinting-ipp-usb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for golang-github-openprinting-ipp-usb. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables driverless support for USB devices capable of using IPP-over-USB protocol. Security Fix(es): * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ipp-usb-0.9.27-5.el10_1.aarch64.rpm dc86dc842d9e17d3015ead567165ac7ecdfd0af52e0e0f9a6ff0697fdba44336 RLSA-2026:3094 Important: protobuf security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for protobuf. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data. Security Fix(es): * python: protobuf: Protobuf: Denial of Service due to recursion depth bypass (CVE-2026-0994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms protobuf-3.19.6-15.el10_1.aarch64.rpm 806d72f2dbe36e24f79718dcac08dc3b79e9adf74221dd51d1287a9da654a83e python3-protobuf-3.19.6-15.el10_1.aarch64.rpm de0dd3fa70dabe679539ddc5fdfb34d12408567ed7e512c73d027c3f279d1f8f protobuf-lite-3.19.6-15.el10_1.aarch64.rpm b317b737289c9bdbcb1e71781f4d3db4c5df8bed043a820507228a3363685a8b RLSA-2026:3208 Moderate: 389-ds-base security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for 389-ds-base. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms 389-ds-base-libs-3.1.3-7.el10_1.aarch64.rpm 26b1e9f8faa3da5b5fe0cb221f30acd04e96dbb95673845c9d73cd268e14d0d4 python3-lib389-3.1.3-7.el10_1.noarch.rpm 3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48 python3-lib389-3.1.3-7.el10_1.noarch.rpm 3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48 python3-lib389-3.1.3-7.el10_1.noarch.rpm 3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48 python3-lib389-3.1.3-7.el10_1.noarch.rpm 3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48 389-ds-base-3.1.3-7.el10_1.aarch64.rpm 319a5967f68a7b84ca3b6d2092010deba75e63bc0c41c9093322fc589f2d9f3a 389-ds-base-snmp-3.1.3-7.el10_1.aarch64.rpm 072a0fb2e3b73d53175d3a581f304a72e5649e7dcb5bceadd3b59e67be87c6fa RLSA-2026:3297 Important: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms buildah-tests-1.41.8-2.el10_1.aarch64.rpm 81def32dbc068938bc433c46c6f4e2e731d74330b7678e5a2ee91b405a9cdafd buildah-1.41.8-2.el10_1.aarch64.rpm b133eb1c0c0277c9acd944697416b888997c8691cbf4f1d6467715502a46127c RLSA-2026:3336 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-remote-5.6.0-12.el10_1.aarch64.rpm 57d0c788a64ff153f4993fc5bd786247f6c5bf002762688cde516aae95284337 podman-5.6.0-12.el10_1.aarch64.rpm 95b483f618429f5bfd2d8d9b32954abaf47b4cee5dc10551a436b07dfa7a58b7 podman-docker-5.6.0-12.el10_1.noarch.rpm 2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41 podman-docker-5.6.0-12.el10_1.noarch.rpm 2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41 podman-docker-5.6.0-12.el10_1.noarch.rpm 2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41 podman-docker-5.6.0-12.el10_1.noarch.rpm 2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41 RLSA-2026:3343 Important: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729) * golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726) * crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms skopeo-1.20.0-3.el10_1.aarch64.rpm e60d2ca35fad0c0e137f93ce4dd0c5a1daa15cecceb565840ddf9d500e0165a9 skopeo-tests-1.20.0-3.el10_1.aarch64.rpm 8c5658f0ae5d9790ef3bb8901ee31ba6b579aca7d994b9487afad0eb4d9dd0de RLSA-2026:3354 Important: python-pyasn1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-pyasn1. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm 1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1 python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm 1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1 python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm 1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1 python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm 1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1 python3-pyasn1-0.6.2-1.el10_1.noarch.rpm ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1 python3-pyasn1-0.6.2-1.el10_1.noarch.rpm ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1 python3-pyasn1-0.6.2-1.el10_1.noarch.rpm ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1 python3-pyasn1-0.6.2-1.el10_1.noarch.rpm ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1 RLSA-2026:3361 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * libvpx: Heap buffer overflow in libvpx (CVE-2026-2447) * firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785) * firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793) * firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771) * firefox: Integer overflow in the Audio/Video component (CVE-2026-2774) * firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776) * firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781) * firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766) * firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769) * firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787) * firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768) * firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783) * firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788) * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784) * firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759) * firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762) * firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761) * firefox: Privilege escalation in the Messaging System component (CVE-2026-2777) * firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790) * firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763) * firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792) * firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786) * firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789) * firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760) * firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772) * firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779) * firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767) * firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764) * firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765) * firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780) * firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778) * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758) * firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791) * firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-140.8.0-2.el10_1.aarch64.rpm 4cbeddaaae9df0afd49202d212dde4ac7aaa00938a2e0b01bb9ce2f364a98229 RLBA-2025:5309 Moderate:mod_proxy_cluster bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section. none-appstream-rpms mod_proxy_cluster-1.3.21-1.el10.aarch64.rpm 567e144ffb1debfbf00214e4c7bc8028c85c378a94778d9b2a412f2dd7cd1d9f RLSA-2025:7496 Important: libxslt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libxslt. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855) * libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libxslt-1.1.39-7.el10_0.aarch64.rpm 2c2049284e086642a3a5834230af404fb8fc06dea5c6b89ec32bae0eabf659cc libxslt-devel-1.1.39-7.el10_0.aarch64.rpm 54d3d7ebcd90bbcf6acfb166d9d83e5e9e3c40059650da50751b6b85ccf48364 RLSA-2025:7466 Moderate: delve and golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for delve, golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341) * golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336) * crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms delve-1.24.1-1.el10_0.aarch64.rpm 43b67a30f6a7b5120dbfe0832ed7aded227d8b3c1300aac3f1377975a146d2bf golang-1.23.7-1.el10_0.aarch64.rpm 2ad1768aa859d614e78941007634212262b0c962be17bcfceb9fdde58d3c11d9 golang-bin-1.23.7-1.el10_0.aarch64.rpm 2193abfa49e85b02c944761bf58711259cff4bdf52c2a7d6156a21fbf3397c11 golang-docs-1.23.7-1.el10_0.noarch.rpm a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4 golang-docs-1.23.7-1.el10_0.noarch.rpm a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4 golang-docs-1.23.7-1.el10_0.noarch.rpm a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4 golang-docs-1.23.7-1.el10_0.noarch.rpm a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4 golang-misc-1.23.7-1.el10_0.noarch.rpm 7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f golang-misc-1.23.7-1.el10_0.noarch.rpm 7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f golang-misc-1.23.7-1.el10_0.noarch.rpm 7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f golang-misc-1.23.7-1.el10_0.noarch.rpm 7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f golang-src-1.23.7-1.el10_0.noarch.rpm 96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a golang-src-1.23.7-1.el10_0.noarch.rpm 96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a golang-src-1.23.7-1.el10_0.noarch.rpm 96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a golang-src-1.23.7-1.el10_0.noarch.rpm 96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a golang-tests-1.23.7-1.el10_0.noarch.rpm 859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f golang-tests-1.23.7-1.el10_0.noarch.rpm 859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f golang-tests-1.23.7-1.el10_0.noarch.rpm 859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f golang-tests-1.23.7-1.el10_0.noarch.rpm 859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f go-toolset-1.23.7-1.el10_0.aarch64.rpm b46b83129917694dd54178ce8a011b76669e4e46041f27712ce1630fd17c2cfc RLSA-2025:7476 Important: python-jinja2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python-jinja2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms python3-jinja2-3.1.6-1.el10_0.noarch.rpm 0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287 python3-jinja2-3.1.6-1.el10_0.noarch.rpm 0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287 python3-jinja2-3.1.6-1.el10_0.noarch.rpm 0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287 python3-jinja2-3.1.6-1.el10_0.noarch.rpm 0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287 RLSA-2025:7484 Important: gvisor-tap-vsock security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for gvisor-tap-vsock. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gvisor-tap-vsock-0.8.5-1.el10_0.aarch64.rpm f59ebe5e29c3b66679c009633b758ad84e1da0b9352c542942bdd364b96a31ce gvisor-tap-vsock-gvforwarder-0.8.5-1.el10_0.aarch64.rpm 31614db8686d23ca2ae325d444d968929638ae13b9c11619ecd77f72f068fd64 RLSA-2025:7500 Important: perl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for perl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes (CVE-2024-56406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms perl-5.40.2-512.1.el10_0.aarch64.rpm 7dc7c9215a8c55a6d61391778acb503aa984863d66b86e33a9ce1d26041a7b18 perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322 perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322 perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322 perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322 perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm 2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223 perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm 2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223 perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm 2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223 perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm 2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223 perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm 47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm 47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm 47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm 47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e perl-autouse-1.11-512.1.el10_0.noarch.rpm 2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c perl-autouse-1.11-512.1.el10_0.noarch.rpm 2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c perl-autouse-1.11-512.1.el10_0.noarch.rpm 2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c perl-autouse-1.11-512.1.el10_0.noarch.rpm 2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c perl-B-1.89-512.1.el10_0.aarch64.rpm a8f027099b0a4879cb28cec6070a9e6122b311eb184a5eb3fc6e89a405c373fc perl-base-2.27-512.1.el10_0.noarch.rpm 64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4 perl-base-2.27-512.1.el10_0.noarch.rpm 64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4 perl-base-2.27-512.1.el10_0.noarch.rpm 64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4 perl-base-2.27-512.1.el10_0.noarch.rpm 64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4 perl-Benchmark-1.25-512.1.el10_0.noarch.rpm 74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae perl-Benchmark-1.25-512.1.el10_0.noarch.rpm 74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae perl-Benchmark-1.25-512.1.el10_0.noarch.rpm 74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae perl-Benchmark-1.25-512.1.el10_0.noarch.rpm 74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae perl-blib-1.07-512.1.el10_0.noarch.rpm 9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf perl-blib-1.07-512.1.el10_0.noarch.rpm 9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf perl-blib-1.07-512.1.el10_0.noarch.rpm 9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf perl-blib-1.07-512.1.el10_0.noarch.rpm 9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536 perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536 perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536 perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536 perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm 6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm 6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm 6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm 6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm 6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8 perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm 6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8 perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm 6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8 perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm 6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8 perl-debugger-1.60-512.1.el10_0.noarch.rpm 8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65 perl-debugger-1.60-512.1.el10_0.noarch.rpm 8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65 perl-debugger-1.60-512.1.el10_0.noarch.rpm 8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65 perl-debugger-1.60-512.1.el10_0.noarch.rpm 8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65 perl-deprecate-0.04-512.1.el10_0.noarch.rpm 9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75 perl-deprecate-0.04-512.1.el10_0.noarch.rpm 9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75 perl-deprecate-0.04-512.1.el10_0.noarch.rpm 9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75 perl-deprecate-0.04-512.1.el10_0.noarch.rpm 9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75 perl-devel-5.40.2-512.1.el10_0.aarch64.rpm 8fe702260b36c7b6986da648869549792b1927c0a8ecba474a4ad49484de5bd5 perl-Devel-Peek-1.34-512.1.el10_0.aarch64.rpm 97aec9ea064b691452543add3a00ef9b0ab12be34fa2fcbf0d80063c1ca0860b perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed perl-diagnostics-1.40-512.1.el10_0.noarch.rpm 9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f perl-diagnostics-1.40-512.1.el10_0.noarch.rpm 9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f perl-diagnostics-1.40-512.1.el10_0.noarch.rpm 9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f perl-diagnostics-1.40-512.1.el10_0.noarch.rpm 9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f perl-DirHandle-1.05-512.1.el10_0.noarch.rpm d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa perl-DirHandle-1.05-512.1.el10_0.noarch.rpm d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa perl-DirHandle-1.05-512.1.el10_0.noarch.rpm d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa perl-DirHandle-1.05-512.1.el10_0.noarch.rpm d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa perl-doc-5.40.2-512.1.el10_0.noarch.rpm ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc perl-doc-5.40.2-512.1.el10_0.noarch.rpm ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc perl-doc-5.40.2-512.1.el10_0.noarch.rpm ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc perl-doc-5.40.2-512.1.el10_0.noarch.rpm ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6 perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6 perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6 perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6 perl-DynaLoader-1.56-512.1.el10_0.aarch64.rpm 3527fa9847563d5c47af3123e596ea2ce7d15692ba48b4c44cf481627d4c8e22 perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm 1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74 perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm 1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74 perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm 1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74 perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm 1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74 perl-English-1.11-512.1.el10_0.noarch.rpm b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06 perl-English-1.11-512.1.el10_0.noarch.rpm b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06 perl-English-1.11-512.1.el10_0.noarch.rpm b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06 perl-English-1.11-512.1.el10_0.noarch.rpm b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06 perl-Errno-1.38-512.1.el10_0.aarch64.rpm dddaae45a02b9d91a0b493024354ad900a5ab17bd1b866d34977751a90b24579 perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm 673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96 perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm 673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96 perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm 673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96 perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm 673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96 perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5 perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5 perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5 perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5 perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9 perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9 perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9 perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9 perl-Fcntl-1.18-512.1.el10_0.aarch64.rpm 2c7a386e31ac78a114b6618fbccb2ec5246357de4f0859f445250c1ab8943421 perl-fields-2.27-512.1.el10_0.noarch.rpm 76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6 perl-fields-2.27-512.1.el10_0.noarch.rpm 76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6 perl-fields-2.27-512.1.el10_0.noarch.rpm 76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6 perl-fields-2.27-512.1.el10_0.noarch.rpm 76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6 perl-File-Basename-2.86-512.1.el10_0.noarch.rpm 18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a perl-File-Basename-2.86-512.1.el10_0.noarch.rpm 18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a perl-File-Basename-2.86-512.1.el10_0.noarch.rpm 18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a perl-File-Basename-2.86-512.1.el10_0.noarch.rpm 18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a perl-FileCache-1.10-512.1.el10_0.noarch.rpm 2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20 perl-FileCache-1.10-512.1.el10_0.noarch.rpm 2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20 perl-FileCache-1.10-512.1.el10_0.noarch.rpm 2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20 perl-FileCache-1.10-512.1.el10_0.noarch.rpm 2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20 perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm 1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382 perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm 1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382 perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm 1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382 perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm 1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382 perl-File-Copy-2.41-512.1.el10_0.noarch.rpm fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74 perl-File-Copy-2.41-512.1.el10_0.noarch.rpm fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74 perl-File-Copy-2.41-512.1.el10_0.noarch.rpm fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74 perl-File-Copy-2.41-512.1.el10_0.noarch.rpm fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74 perl-File-DosGlob-1.12-512.1.el10_0.aarch64.rpm 572b0593a287886441f83e80059723ba095cf0a1ce5871ce0c65054f8b4f9916 perl-File-Find-1.44-512.1.el10_0.noarch.rpm 4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6 perl-File-Find-1.44-512.1.el10_0.noarch.rpm 4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6 perl-File-Find-1.44-512.1.el10_0.noarch.rpm 4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6 perl-File-Find-1.44-512.1.el10_0.noarch.rpm 4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6 perl-FileHandle-2.05-512.1.el10_0.noarch.rpm 3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a perl-FileHandle-2.05-512.1.el10_0.noarch.rpm 3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a perl-FileHandle-2.05-512.1.el10_0.noarch.rpm 3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a perl-FileHandle-2.05-512.1.el10_0.noarch.rpm 3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a perl-File-stat-1.14-512.1.el10_0.noarch.rpm 69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65 perl-File-stat-1.14-512.1.el10_0.noarch.rpm 69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65 perl-File-stat-1.14-512.1.el10_0.noarch.rpm 69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65 perl-File-stat-1.14-512.1.el10_0.noarch.rpm 69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65 perl-filetest-1.03-512.1.el10_0.noarch.rpm 40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388 perl-filetest-1.03-512.1.el10_0.noarch.rpm 40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388 perl-filetest-1.03-512.1.el10_0.noarch.rpm 40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388 perl-filetest-1.03-512.1.el10_0.noarch.rpm 40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388 perl-FindBin-1.54-512.1.el10_0.noarch.rpm 9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038 perl-FindBin-1.54-512.1.el10_0.noarch.rpm 9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038 perl-FindBin-1.54-512.1.el10_0.noarch.rpm 9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038 perl-FindBin-1.54-512.1.el10_0.noarch.rpm 9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038 perl-GDBM_File-1.24-512.1.el10_0.aarch64.rpm 9daaaf18ac1607c04c89dea1a41ffa623ece24c8008e3b51e057a789892a7605 perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm 99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767 perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm 99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767 perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm 99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767 perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm 99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767 perl-Hash-Util-0.32-512.1.el10_0.aarch64.rpm eed84aab149ae14e6e701f3b9c72bf9f492e4f9fd129262f24483cb76774fab5 perl-Hash-Util-FieldHash-1.27-512.1.el10_0.aarch64.rpm 54159906ccfc4cc6c260bcaf3287863759df1b512b06063308d5a9b7c0c20638 perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm 6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30 perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm 6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30 perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm 6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30 perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm 6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30 perl-I18N-Langinfo-0.24-512.1.el10_0.aarch64.rpm 5838a11ffdbfc2687aaf1bc4939248d40eadc7541808e5694b6661a5cf784f7a perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm 7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm 7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm 7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm 7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b perl-if-0.61.000-512.1.el10_0.noarch.rpm 0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51 perl-if-0.61.000-512.1.el10_0.noarch.rpm 0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51 perl-if-0.61.000-512.1.el10_0.noarch.rpm 0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51 perl-if-0.61.000-512.1.el10_0.noarch.rpm 0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51 perl-interpreter-5.40.2-512.1.el10_0.aarch64.rpm 52e65ddc7b2455fba0f2638899566d289897bff41ef171060404555c6067fdec perl-IO-1.55-512.1.el10_0.aarch64.rpm 2f2e7d4b164c5ddfc5c06157ba6df5e6ca1d81d6503761d5057720109ff844cf perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769 perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769 perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769 perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769 perl-less-0.03-512.1.el10_0.noarch.rpm 670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680 perl-less-0.03-512.1.el10_0.noarch.rpm 670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680 perl-less-0.03-512.1.el10_0.noarch.rpm 670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680 perl-less-0.03-512.1.el10_0.noarch.rpm 670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680 perl-lib-0.65-512.1.el10_0.aarch64.rpm a3025a3a239e5baf5be513e5014968569e4480a6a3fea735a4f1a0e9d80efce5 perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm 41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2 perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm 41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2 perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm 41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2 perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm 41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2 perl-libs-5.40.2-512.1.el10_0.aarch64.rpm 5c00da41ee5de69845c2e6a705fa58f6b9778b5492a103ee139bc9b13f33c4d2 perl-locale-1.12-512.1.el10_0.noarch.rpm d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53 perl-locale-1.12-512.1.el10_0.noarch.rpm d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53 perl-locale-1.12-512.1.el10_0.noarch.rpm d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53 perl-locale-1.12-512.1.el10_0.noarch.rpm d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53 perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm 0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm 0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm 0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm 0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea perl-macros-5.40.2-512.1.el10_0.noarch.rpm 29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4 perl-macros-5.40.2-512.1.el10_0.noarch.rpm 29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4 perl-macros-5.40.2-512.1.el10_0.noarch.rpm 29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4 perl-macros-5.40.2-512.1.el10_0.noarch.rpm 29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4 perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754 perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754 perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754 perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754 perl-Memoize-1.16-512.1.el10_0.noarch.rpm d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508 perl-Memoize-1.16-512.1.el10_0.noarch.rpm d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508 perl-Memoize-1.16-512.1.el10_0.noarch.rpm d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508 perl-Memoize-1.16-512.1.el10_0.noarch.rpm d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508 perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa perl-mro-1.29-512.1.el10_0.aarch64.rpm 5c3a3aadded1673e3dec9df428d43fbc1715447821fdc5dd82c843ab4150a38e perl-NDBM_File-1.17-512.1.el10_0.aarch64.rpm 71326520b3fc6aeeb7ee2040349e0d784d620d132d2d8a5626a074bd733ae240 perl-Net-1.04-512.1.el10_0.noarch.rpm 3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001 perl-Net-1.04-512.1.el10_0.noarch.rpm 3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001 perl-Net-1.04-512.1.el10_0.noarch.rpm 3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001 perl-Net-1.04-512.1.el10_0.noarch.rpm 3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001 perl-NEXT-0.69-512.1.el10_0.noarch.rpm 9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a perl-NEXT-0.69-512.1.el10_0.noarch.rpm 9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a perl-NEXT-0.69-512.1.el10_0.noarch.rpm 9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a perl-NEXT-0.69-512.1.el10_0.noarch.rpm 9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a perl-ODBM_File-1.18-512.1.el10_0.aarch64.rpm b3a4718af4143d0af0f054299500770b704594fd05b226f02d06ecd05bccf223 perl-Opcode-1.65-512.1.el10_0.aarch64.rpm c5a8c4dbffd9c17230a54cfa56b4117cb6e5cb416dfac8088f5d4a6395ac65ea perl-open-1.13-512.1.el10_0.noarch.rpm 5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5 perl-open-1.13-512.1.el10_0.noarch.rpm 5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5 perl-open-1.13-512.1.el10_0.noarch.rpm 5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5 perl-open-1.13-512.1.el10_0.noarch.rpm 5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5 perl-overload-1.37-512.1.el10_0.noarch.rpm 9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502 perl-overload-1.37-512.1.el10_0.noarch.rpm 9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502 perl-overload-1.37-512.1.el10_0.noarch.rpm 9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502 perl-overload-1.37-512.1.el10_0.noarch.rpm 9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502 perl-overloading-0.02-512.1.el10_0.noarch.rpm 1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b perl-overloading-0.02-512.1.el10_0.noarch.rpm 1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b perl-overloading-0.02-512.1.el10_0.noarch.rpm 1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b perl-overloading-0.02-512.1.el10_0.noarch.rpm 1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b perl-ph-5.40.2-512.1.el10_0.aarch64.rpm ddd93186af4c8a84388f097d005a0f29609878cfda54ae5340b4393b23a8f733 perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22 perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22 perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22 perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22 perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm 8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2 perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm 8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2 perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm 8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2 perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm 8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2 perl-POSIX-2.20-512.1.el10_0.aarch64.rpm d846e335703fa153448fb7e4d3426d6f40fbf0bac5fc3c1c47ffa9aa5f1362cf perl-Safe-2.46-512.1.el10_0.noarch.rpm 6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f perl-Safe-2.46-512.1.el10_0.noarch.rpm 6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f perl-Safe-2.46-512.1.el10_0.noarch.rpm 6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f perl-Safe-2.46-512.1.el10_0.noarch.rpm 6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm 51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5 perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm 51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5 perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm 51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5 perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm 51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5 perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm 8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88 perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm 8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88 perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm 8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88 perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm 8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88 perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm 28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800 perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm 28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800 perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm 28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800 perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm 28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800 perl-sigtrap-1.10-512.1.el10_0.noarch.rpm d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6 perl-sigtrap-1.10-512.1.el10_0.noarch.rpm d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6 perl-sigtrap-1.10-512.1.el10_0.noarch.rpm d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6 perl-sigtrap-1.10-512.1.el10_0.noarch.rpm d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6 perl-sort-2.05-512.1.el10_0.noarch.rpm f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740 perl-sort-2.05-512.1.el10_0.noarch.rpm f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740 perl-sort-2.05-512.1.el10_0.noarch.rpm f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740 perl-sort-2.05-512.1.el10_0.noarch.rpm f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740 perl-subs-1.04-512.1.el10_0.noarch.rpm 8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4 perl-subs-1.04-512.1.el10_0.noarch.rpm 8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4 perl-subs-1.04-512.1.el10_0.noarch.rpm 8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4 perl-subs-1.04-512.1.el10_0.noarch.rpm 8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4 perl-Symbol-1.09-512.1.el10_0.noarch.rpm 17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969 perl-Symbol-1.09-512.1.el10_0.noarch.rpm 17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969 perl-Symbol-1.09-512.1.el10_0.noarch.rpm 17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969 perl-Symbol-1.09-512.1.el10_0.noarch.rpm 17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969 perl-Sys-Hostname-1.25-512.1.el10_0.aarch64.rpm f913df04a84483c8d382a75da4a77675a48c2267fcb97ae3987b04b7d41d04ed perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm 66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm 66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm 66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm 66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm 9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621 perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm 9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621 perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm 9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621 perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm 9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621 perl-Test-1.31-512.1.el10_0.noarch.rpm 526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98 perl-Test-1.31-512.1.el10_0.noarch.rpm 526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98 perl-Test-1.31-512.1.el10_0.noarch.rpm 526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98 perl-Test-1.31-512.1.el10_0.noarch.rpm 526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98 perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm 4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506 perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm 4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506 perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm 4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506 perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm 4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506 perl-Thread-3.05-512.1.el10_0.noarch.rpm cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd perl-Thread-3.05-512.1.el10_0.noarch.rpm cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd perl-Thread-3.05-512.1.el10_0.noarch.rpm cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd perl-Thread-3.05-512.1.el10_0.noarch.rpm cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm 86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749 perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm 86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749 perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm 86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749 perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm 86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749 perl-Tie-4.6-512.1.el10_0.noarch.rpm c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff perl-Tie-4.6-512.1.el10_0.noarch.rpm c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff perl-Tie-4.6-512.1.el10_0.noarch.rpm c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff perl-Tie-4.6-512.1.el10_0.noarch.rpm c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff perl-Tie-File-1.09-512.1.el10_0.noarch.rpm 81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4 perl-Tie-File-1.09-512.1.el10_0.noarch.rpm 81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4 perl-Tie-File-1.09-512.1.el10_0.noarch.rpm 81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4 perl-Tie-File-1.09-512.1.el10_0.noarch.rpm 81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4 perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm 21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09 perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm 21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09 perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm 21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09 perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm 21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09 perl-Time-1.04-512.1.el10_0.noarch.rpm 1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed perl-Time-1.04-512.1.el10_0.noarch.rpm 1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed perl-Time-1.04-512.1.el10_0.noarch.rpm 1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed perl-Time-1.04-512.1.el10_0.noarch.rpm 1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed perl-Time-Piece-1.3401-512.1.el10_0.aarch64.rpm 5a67baed9ade1c8d6d6f5dead733eaf1e33cb2c5b654a92841e8da156b4b6663 perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088 perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088 perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088 perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088 perl-User-pwent-1.05-512.1.el10_0.noarch.rpm 2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e perl-User-pwent-1.05-512.1.el10_0.noarch.rpm 2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e perl-User-pwent-1.05-512.1.el10_0.noarch.rpm 2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e perl-User-pwent-1.05-512.1.el10_0.noarch.rpm 2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e perl-utils-5.40.2-512.1.el10_0.noarch.rpm b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a perl-utils-5.40.2-512.1.el10_0.noarch.rpm b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a perl-utils-5.40.2-512.1.el10_0.noarch.rpm b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a perl-utils-5.40.2-512.1.el10_0.noarch.rpm b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a perl-vars-1.05-512.1.el10_0.noarch.rpm 5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6 perl-vars-1.05-512.1.el10_0.noarch.rpm 5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6 perl-vars-1.05-512.1.el10_0.noarch.rpm 5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6 perl-vars-1.05-512.1.el10_0.noarch.rpm 5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6 perl-vmsish-1.04-512.1.el10_0.noarch.rpm 1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb perl-vmsish-1.04-512.1.el10_0.noarch.rpm 1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb perl-vmsish-1.04-512.1.el10_0.noarch.rpm 1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb perl-vmsish-1.04-512.1.el10_0.noarch.rpm 1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb RLSA-2025:7494 Moderate: tomcat9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat9-9.0.87-5.el10_0.noarch.rpm b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2 tomcat9-9.0.87-5.el10_0.noarch.rpm b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2 tomcat9-9.0.87-5.el10_0.noarch.rpm b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2 tomcat9-9.0.87-5.el10_0.noarch.rpm b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2 tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm 9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116 tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm 9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116 tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm 9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116 tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm 9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116 tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899 tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899 tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899 tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899 tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm 633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm 633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm 633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm 633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm 6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm 6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm 6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm 6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b tomcat9-lib-9.0.87-5.el10_0.noarch.rpm b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c tomcat9-lib-9.0.87-5.el10_0.noarch.rpm b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c tomcat9-lib-9.0.87-5.el10_0.noarch.rpm b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c tomcat9-lib-9.0.87-5.el10_0.noarch.rpm b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm 18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197 tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm 18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197 tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm 18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197 tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm 18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197 tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm 249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm 249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm 249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm 249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e RLSA-2025:7497 Moderate: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API (CVE-2024-52316) * tomcat: Apache Tomcat: DoS in examples web application (CVE-2024-54677) * tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat-10.1.36-1.el10_0.noarch.rpm 4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610 tomcat-10.1.36-1.el10_0.noarch.rpm 4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610 tomcat-10.1.36-1.el10_0.noarch.rpm 4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610 tomcat-10.1.36-1.el10_0.noarch.rpm 4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610 tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm 9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm 9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm 9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm 9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm 6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm 6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm 6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm 6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm 3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5 tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm 3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5 tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm 3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5 tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm 3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5 tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff tomcat-lib-10.1.36-1.el10_0.noarch.rpm ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5 tomcat-lib-10.1.36-1.el10_0.noarch.rpm ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5 tomcat-lib-10.1.36-1.el10_0.noarch.rpm ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5 tomcat-lib-10.1.36-1.el10_0.noarch.rpm ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5 tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e tomcat-webapps-10.1.36-1.el10_0.noarch.rpm 5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571 tomcat-webapps-10.1.36-1.el10_0.noarch.rpm 5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571 tomcat-webapps-10.1.36-1.el10_0.noarch.rpm 5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571 tomcat-webapps-10.1.36-1.el10_0.noarch.rpm 5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571 RLSA-2025:7490 Important: mod_auth_openidc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for mod_auth_openidc. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix(es): * mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mod_auth_openidc-2.4.15-4.el10_0.1.aarch64.rpm f5004a29d6093b56e49bea5398a6702c6370ae6b614a409638532f8e1d1cf584 RLSA-2025:7458 Important: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632) * X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594) * xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601) * xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600) * xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599) * xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598) * xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597) * xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596) * Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms xorg-x11-server-Xwayland-24.1.5-3.el10_0.aarch64.rpm 4a428db076d0f1e5aa0cd2fa9d679da294a75d3f26fad58ae93769cb2dc9eab8 RLSA-2025:7462 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-5.4.0-9.el10_0.aarch64.rpm aae5c5ac1cd7fcce7904d4e9846b23ce728719339813051bef5e84b4ec2b70b2 podman-docker-5.4.0-9.el10_0.noarch.rpm 7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329 podman-docker-5.4.0-9.el10_0.noarch.rpm 7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329 podman-docker-5.4.0-9.el10_0.noarch.rpm 7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329 podman-docker-5.4.0-9.el10_0.noarch.rpm 7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329 podman-remote-5.4.0-9.el10_0.aarch64.rpm 6e025e537dd056a986555093b9e2061e4654fdeaf2caf1f645741131847633f3 RLSA-2025:7482 Moderate: git security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for git. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Security Fix(es): * git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms git-2.47.1-2.el10_0.aarch64.rpm a88e3bfdcc17ad3663277449ab689560db89bdd72c91472ca81dd82faff4cd0f git-all-2.47.1-2.el10_0.noarch.rpm bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22 git-all-2.47.1-2.el10_0.noarch.rpm bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22 git-all-2.47.1-2.el10_0.noarch.rpm bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22 git-all-2.47.1-2.el10_0.noarch.rpm bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22 git-core-2.47.1-2.el10_0.aarch64.rpm 1282845b31c497a7ffd8394843ed4c79c6c32451fed01257b49003f1c26e0be1 git-core-doc-2.47.1-2.el10_0.noarch.rpm dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113 git-core-doc-2.47.1-2.el10_0.noarch.rpm dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113 git-core-doc-2.47.1-2.el10_0.noarch.rpm dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113 git-core-doc-2.47.1-2.el10_0.noarch.rpm dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113 git-credential-libsecret-2.47.1-2.el10_0.aarch64.rpm 862ab4ada0e9972532f7c7f42adcad297036e254187d43b00f8a58e9acd3a2b9 git-daemon-2.47.1-2.el10_0.aarch64.rpm f692742870f8565adead8a3513d52dd8d75a8a4e255282968a56a8e9e68cbacc git-email-2.47.1-2.el10_0.noarch.rpm 302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9 git-email-2.47.1-2.el10_0.noarch.rpm 302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9 git-email-2.47.1-2.el10_0.noarch.rpm 302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9 git-email-2.47.1-2.el10_0.noarch.rpm 302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9 git-gui-2.47.1-2.el10_0.noarch.rpm d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a git-gui-2.47.1-2.el10_0.noarch.rpm d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a git-gui-2.47.1-2.el10_0.noarch.rpm d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a git-gui-2.47.1-2.el10_0.noarch.rpm d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a git-instaweb-2.47.1-2.el10_0.noarch.rpm a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7 git-instaweb-2.47.1-2.el10_0.noarch.rpm a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7 git-instaweb-2.47.1-2.el10_0.noarch.rpm a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7 git-instaweb-2.47.1-2.el10_0.noarch.rpm a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7 gitk-2.47.1-2.el10_0.noarch.rpm b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc gitk-2.47.1-2.el10_0.noarch.rpm b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc gitk-2.47.1-2.el10_0.noarch.rpm b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc gitk-2.47.1-2.el10_0.noarch.rpm b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc git-subtree-2.47.1-2.el10_0.noarch.rpm 46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2 git-subtree-2.47.1-2.el10_0.noarch.rpm 46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2 git-subtree-2.47.1-2.el10_0.noarch.rpm 46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2 git-subtree-2.47.1-2.el10_0.noarch.rpm 46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2 git-svn-2.47.1-2.el10_0.noarch.rpm 3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28 git-svn-2.47.1-2.el10_0.noarch.rpm 3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28 git-svn-2.47.1-2.el10_0.noarch.rpm 3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28 git-svn-2.47.1-2.el10_0.noarch.rpm 3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28 gitweb-2.47.1-2.el10_0.noarch.rpm 0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd gitweb-2.47.1-2.el10_0.noarch.rpm 0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd gitweb-2.47.1-2.el10_0.noarch.rpm 0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd gitweb-2.47.1-2.el10_0.noarch.rpm 0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd perl-Git-2.47.1-2.el10_0.noarch.rpm a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db perl-Git-2.47.1-2.el10_0.noarch.rpm a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db perl-Git-2.47.1-2.el10_0.noarch.rpm a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db perl-Git-2.47.1-2.el10_0.noarch.rpm a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm 43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0 perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm 43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0 perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm 43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0 perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm 43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0 RLSA-2025:7478 Moderate: corosync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for corosync. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software. Security Fix(es): * corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms corosynclib-3.1.9-1.el10_0.1.aarch64.rpm 12d12308d43f7ebb4a58e719c103b31a973f8cf43ec7b8130b3f367448740e4f RLSA-2025:7489 Important: php security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for php. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Security Fix(es): * php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217) * php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736) * php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734) * php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219) * php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861) * php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms php-8.3.19-1.el10_0.aarch64.rpm 2b7bbde608db7c9fcd866ac4fa37d38284a07feac5bc6994c25d792bb8ee326d php-bcmath-8.3.19-1.el10_0.aarch64.rpm 3b09c0857a258bf80ba0714820ee86f48c03de87bf466ffe24195ff78cc378d0 php-cli-8.3.19-1.el10_0.aarch64.rpm 6ce9ef0fa55797529cb67fd1095e0d73fb12117f261a41d1e3e7c1459a4e58a8 php-common-8.3.19-1.el10_0.aarch64.rpm a7f0bf365bf421dfed0390de349477ebb45cd0935463445be15f36f88edf3ed8 php-dba-8.3.19-1.el10_0.aarch64.rpm ffc21f19dba9646109392134921e82dbc16677a7befe98e791e338d16d212097 php-dbg-8.3.19-1.el10_0.aarch64.rpm debedd72814913ffd9590b2b07245c45cccdb01b1bf6d4cee733fb1a0cab32ff php-devel-8.3.19-1.el10_0.aarch64.rpm d6978b2f37a645aa184bef2fb7faaa70e53286193bb917bd7c4431635d3f8eb3 php-embedded-8.3.19-1.el10_0.aarch64.rpm 396f73f73a0748c864be3bc4ee68173a81f3eba66d60eafe5443c5fabf26db0b php-enchant-8.3.19-1.el10_0.aarch64.rpm 1771089f90d1ce305e37b279e994ff7586599d29bdf2845d941d913f32b7ef76 php-ffi-8.3.19-1.el10_0.aarch64.rpm d34877bc30fa98707a4ada9679c571ccff4175b9df74b49481753b5a36a801b0 php-fpm-8.3.19-1.el10_0.aarch64.rpm 68ecb22d629710629d8bd6f4b61a58feb2152f5bae695168e733d4ab9b2d9192 php-gd-8.3.19-1.el10_0.aarch64.rpm 923089ce99a1b66f71d4d2cc1424611f71f2891ea78114927561371aa98fe27a php-gmp-8.3.19-1.el10_0.aarch64.rpm 780ba082ca85076fbd0412ee58221a4ac4324c7448dd473b96bee60e86ddc381 php-intl-8.3.19-1.el10_0.aarch64.rpm 76dc4f09a00f3ecca19942707a684e14962814966d225965a5a67ccb6180171e php-ldap-8.3.19-1.el10_0.aarch64.rpm ae667da5d09dd783bb79098cc6a0596fb80be4f8c9126c1600e504757ea7b027 php-mbstring-8.3.19-1.el10_0.aarch64.rpm 6e3e7c8a11fed0c650c90cd106441b38027283c22cc9acd784e809215a5c63bb php-mysqlnd-8.3.19-1.el10_0.aarch64.rpm 6d86978406227e93bb3ee5e159de93e2e36168321834743673cb36478d4f8e9a php-odbc-8.3.19-1.el10_0.aarch64.rpm 55b01bd6992f430125f2fa26d3eab0b06d9e8ee62afb27f8e444effaf379cf1f php-opcache-8.3.19-1.el10_0.aarch64.rpm 48b62e61bfe6fc6031e1101e83fa29ec35c1fe1e6624734138b64732cc68ba0b php-pdo-8.3.19-1.el10_0.aarch64.rpm 0d06cdfbb3ae9a1c6cb2a744b149f7079333aa56842a2c839959ab0dd4dacd37 php-pgsql-8.3.19-1.el10_0.aarch64.rpm 1c3cdfabaf98cf9cf7b1702841386394da3fdd7c819ab21f3885af752d186980 php-process-8.3.19-1.el10_0.aarch64.rpm 75b460d2911455e81325c8d00df579b9bb7417005c7fc957332df24df3446abb php-snmp-8.3.19-1.el10_0.aarch64.rpm e2d750598c581c520b7f071a40b84ba7001a8346f9b262ba51517bd95dea08b5 php-soap-8.3.19-1.el10_0.aarch64.rpm f31b159a560909ca0fa5357d4f2d855da5253ee1ba8ca7837c4cc9a568bc0e7e php-xml-8.3.19-1.el10_0.aarch64.rpm cc4e7dc66f7ee29b4b8a7de0b232dca9d0c8a50a3fdf0f2f7847e16328618df8 RLSA-2025:7479 Important: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) * golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868) * github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786) * golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms opentelemetry-collector-0.107.0-9.el10_0.aarch64.rpm df4d486cdfc5cc1043ab1c8ff1d1c20e68cc5e87630e998bc83973bd7ef1cd76 RLSA-2025:7509 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms valkey-8.0.3-1.el10_0.aarch64.rpm 18061271f9471788e6e4c1f50abe55b591a40293b2f5b916b839baba1543e47b valkey-devel-8.0.3-1.el10_0.aarch64.rpm 719399532b37a0b00cfaad8cd6f60261ccb4ebdafcbc0d12cc1fc6833a904193 RLSA-2025:7467 Moderate: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms skopeo-1.18.1-1.el10_0.aarch64.rpm b80f9f6d3b9dadef786257c91fa91316976d863f2d8b33150c9444c415972086 skopeo-tests-1.18.1-1.el10_0.aarch64.rpm 84433b3a8f46f3e5d06a17f30a37e0d32c09146de75d4b675dda5ddcc8e30557 RLSA-2025:7459 Moderate: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms buildah-1.39.4-1.el10_0.aarch64.rpm e8ea0d25aef77a9bea9ae374430f45538702ea5f6120afcc9c4726cb2a5e5e8c buildah-tests-1.39.4-1.el10_0.aarch64.rpm ffed8fb218b48fc6d1cfacb96ae3543ab3f406c7a7d8c9865fbd5380fe362f7b RLSA-2025:7457 Moderate: exiv2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for exiv2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats. Security Fix(es): * exiv2: Use After Free in Exiv2 (CVE-2025-26623) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms exiv2-0.28.3-3.el10_0.2.aarch64.rpm 8d43edb00c691b981eae36dfe00bbc6669eebbccd16790683a37de153e4b7013 exiv2-libs-0.28.3-3.el10_0.2.aarch64.rpm 337e28fea3ba8edf6f2dccc627119db70139563956cf5bda7b9071aba0369a75 RLSA-2025:7592 Important: yggdrasil security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for yggdrasil. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker. Security Fix(es): * yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms yggdrasil-0.4.5-3.el10_0.aarch64.rpm beea4d7fc17a73b4e00928122f3b09faa3569a0db9432cd872ebe7a9b651ce4c RLSA-2025:7593 Moderate: ghostscript security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for ghostscript. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed. Security Fix(es): * Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ghostscript-10.02.1-16.el10_0.aarch64.rpm 9f363958513942357d3a8072ab9caa791506fb89f1736dd5ba72228802d6332f ghostscript-doc-10.02.1-16.el10_0.noarch.rpm f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7 ghostscript-doc-10.02.1-16.el10_0.noarch.rpm f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7 ghostscript-doc-10.02.1-16.el10_0.noarch.rpm f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7 ghostscript-doc-10.02.1-16.el10_0.noarch.rpm f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7 ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058 ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058 ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058 ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058 ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea libgs-10.02.1-16.el10_0.aarch64.rpm d1cdc3782f5f2a27551e72dcfc2a6dba92fee914e58a3fceff6048cd36317b32 RLSA-2025:7599 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aspnetcore-runtime-8.0-8.0.16-1.el10_0.aarch64.rpm 9f04c8f076a8e7db4286fe4612fbd58cefbeacc1ecbc4e3a18471c88d39f8d73 aspnetcore-runtime-dbg-8.0-8.0.16-1.el10_0.aarch64.rpm 79e2bb90cd0be88722d576bdc2bd610dae7c4220cbfdf1ff51a379cac2ab84f7 aspnetcore-targeting-pack-8.0-8.0.16-1.el10_0.aarch64.rpm 8f48aaae18366533db35aa8e4544bd1b46dbe635b4e24adc7dfbaf50ec861bba dotnet-apphost-pack-8.0-8.0.16-1.el10_0.aarch64.rpm 5b49945d281acaf0e7fc27a0bf880580d54f5388e69d2db9e7cdd3fe1c8e532b dotnet-hostfxr-8.0-8.0.16-1.el10_0.aarch64.rpm f590c4540ae16a904d520defbdc99a6afe8be1fef244986c2f9c8f7e0fb7174f dotnet-runtime-8.0-8.0.16-1.el10_0.aarch64.rpm cb5ad0088be8164bae07226af50ceafdc3521ce0d2e4bec6c7640ee14e6f316a dotnet-runtime-dbg-8.0-8.0.16-1.el10_0.aarch64.rpm 25021f30be2b8578d4c5fd1a2bb06ed045b82cdc13d86cf551f77d66c2fa6823 dotnet-sdk-8.0-8.0.116-1.el10_0.aarch64.rpm d861c5429f4d5539908df0e011241cea4027730183ddddf79b3d40fd60925cca dotnet-sdk-dbg-8.0-8.0.116-1.el10_0.aarch64.rpm ccace88b3125a4b80f2a1488c5cb6c74c1582af27d55af187f267b7f225f8ea8 dotnet-targeting-pack-8.0-8.0.16-1.el10_0.aarch64.rpm 0a96856399a15f8e05721b14b249b0f721a1d583e2455bdc009a0cd1995efd59 dotnet-templates-8.0-8.0.116-1.el10_0.aarch64.rpm 99445be0065789af35b869ae80d0b41cf0b6b9d1b445730ff7612161c340dd67 RLSA-2025:7601 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es): * dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aspnetcore-runtime-9.0-9.0.5-1.el10_0.aarch64.rpm d7762d78b3846423cfb7ee5542833b2cdaf11686a9e1162b875f3bf5452f0108 aspnetcore-runtime-dbg-9.0-9.0.5-1.el10_0.aarch64.rpm 4d4cacac0833ffc30d42f605bad52518d8e11af2b870437e2156499663cd4a74 aspnetcore-targeting-pack-9.0-9.0.5-1.el10_0.aarch64.rpm b9597f486d2a5e6e5be237cfa9506a4a94338c3cca944e43a2d3817a4c4bd20c dotnet-apphost-pack-9.0-9.0.5-1.el10_0.aarch64.rpm 14ea597bddbbf31acf9a25993d83b5ec1f888ecb3ea4d8add07aac841bbd897d dotnet-host-9.0.5-1.el10_0.aarch64.rpm de9f04933f5135a5fe89b6c61d3837f665de84aca474116b892f5d152ecd9db8 dotnet-hostfxr-9.0-9.0.5-1.el10_0.aarch64.rpm a476731a732a8c87a41d20a4dc2068f815d3d1a712f896fae8cfbb02a4d5b28c dotnet-runtime-9.0-9.0.5-1.el10_0.aarch64.rpm 07c73f4d883d13225ab9a19d0ac7e339a5f0d9181e141dd089407c72678b8532 dotnet-runtime-dbg-9.0-9.0.5-1.el10_0.aarch64.rpm d1a295cba69e5e159ba5c5da9e2667c97a56198f5296416de64b520bbbfeaaeb dotnet-sdk-9.0-9.0.106-1.el10_0.aarch64.rpm 59120662a9d54082646afb2ff77f7f1a51a9aca5c468d4b3a99559e8e884b0c2 dotnet-sdk-aot-9.0-9.0.106-1.el10_0.aarch64.rpm c94ea637034eb8ec8f641e54f574410acaa2b944651b4e7ccd093ec71ac2f8db dotnet-sdk-dbg-9.0-9.0.106-1.el10_0.aarch64.rpm 5534acc941b79de7a7ec89e52d72fc32185d76689eb2061ab270afe74dfae26d dotnet-targeting-pack-9.0-9.0.5-1.el10_0.aarch64.rpm 09bf2fcc341230738bf30dbe6a8bc241379fa90a900f89bbc6d80b3cb41c1871 dotnet-templates-9.0-9.0.106-1.el10_0.aarch64.rpm 1a0afc501e4c05087759d19bd9c4740f5bc78e6ca0ecc576c2a39f4a835fb323 netstandard-targeting-pack-2.1-9.0.106-1.el10_0.aarch64.rpm e2608d5bc7e5b5d6cb5d6d2b29ccd9f0b1cd670c5dee7dd41f1fa860e4af1f34 RLSA-2025:7892 Important: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms grafana-10.2.6-17.el10_0.aarch64.rpm 5e9b77d17ee06657ce145929e0524f739456383cade94cddfb136d4b91ac16b1 grafana-selinux-10.2.6-17.el10_0.aarch64.rpm 1db66c315643ac8cd269366526afb4c1706f655719f68e9deee3dc630bb77231 RLSA-2025:8047 Moderate: unbound security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for unbound. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms python3-unbound-1.20.0-10.el10_0.aarch64.rpm 9f2c083f74c844cf485012f53694d4ea50bebc985ecb805b4730f65311db4ba4 unbound-1.20.0-10.el10_0.aarch64.rpm 14bdb1ac09dee8be1336671100a8292d8d9fad2051dffd02d7ae9f5b3c9ea3a5 unbound-anchor-1.20.0-10.el10_0.aarch64.rpm 077ca2c607b17cab94d770df4d25597128651c69e475d5c390380a8ca7d40737 unbound-dracut-1.20.0-10.el10_0.aarch64.rpm 168347a97a7281cfd14e921a6bf5d06677aa86e2502b6c3e432d111e56f4b7ba unbound-libs-1.20.0-10.el10_0.aarch64.rpm e12d92edb46e46a79246248af0ba2e57c49d1a6738f32b7ea46152ba4a35f94f RLSA-2025:8125 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-128.10.1-1.el10_0.aarch64.rpm ddc663c77f923ebec3a09cc8e84fc72a9467efd079750c3e1d2c9a101e08e084 RLSA-2025:8128 Important: libsoup3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Denial of Service attack to websocket server (CVE-2025-32049) * libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907) * libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035) * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libsoup3-3.6.5-3.el10_0.6.aarch64.rpm 8ff908399d99a56961aa0acf6ec3e42ab9f207e0c7de0a6500996201113aed49 libsoup3-devel-3.6.5-3.el10_0.6.aarch64.rpm 2a2d748fa4d17411753dd822a42a0e59604967c7c7a5c30e65ba94fdbe25343d RLSA-2025:8131 Moderate: ruby security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for ruby. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es): * net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186) * CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219) * uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ruby-3.3.8-10.el10_0.aarch64.rpm e3d3b3b6255ad4f0f84a7ff7c041fe7ea893b4a845487e214a2cce8b15342d67 ruby-bundled-gems-3.3.8-10.el10_0.aarch64.rpm 79c2f5428481736f48d1bf4d71ca9972335c6028626d7b8913b8e5c6aa73ecb2 ruby-default-gems-3.3.8-10.el10_0.noarch.rpm 2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d ruby-default-gems-3.3.8-10.el10_0.noarch.rpm 2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d ruby-default-gems-3.3.8-10.el10_0.noarch.rpm 2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d ruby-default-gems-3.3.8-10.el10_0.noarch.rpm 2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d ruby-devel-3.3.8-10.el10_0.aarch64.rpm 3322a77b87b6f60f9de591c7abcac8ed9ecb07f80e4aa20563da3452d4332b3b rubygem-bigdecimal-3.1.5-10.el10_0.aarch64.rpm cdcbb70f068be52bd84a9b60619e68e81316ac133b431363cb73ef899091512f rubygem-bundler-2.5.22-10.el10_0.noarch.rpm d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61 rubygem-bundler-2.5.22-10.el10_0.noarch.rpm d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61 rubygem-bundler-2.5.22-10.el10_0.noarch.rpm d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61 rubygem-bundler-2.5.22-10.el10_0.noarch.rpm d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61 rubygem-io-console-0.7.1-10.el10_0.aarch64.rpm e642314f6e369def1e4674c21b684a6db1d9d70a0c75f0a5a1c15ee03fe5e65f rubygem-irb-1.13.1-10.el10_0.noarch.rpm 47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1 rubygem-irb-1.13.1-10.el10_0.noarch.rpm 47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1 rubygem-irb-1.13.1-10.el10_0.noarch.rpm 47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1 rubygem-irb-1.13.1-10.el10_0.noarch.rpm 47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1 rubygem-json-2.7.2-10.el10_0.aarch64.rpm 5601918c32ab2ecc95425fc21848d3e872234ddfacad56a754c760725fd3dd34 rubygem-minitest-5.20.0-10.el10_0.noarch.rpm 443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72 rubygem-minitest-5.20.0-10.el10_0.noarch.rpm 443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72 rubygem-minitest-5.20.0-10.el10_0.noarch.rpm 443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72 rubygem-minitest-5.20.0-10.el10_0.noarch.rpm 443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72 rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9 rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9 rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9 rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9 rubygem-psych-5.1.2-10.el10_0.aarch64.rpm 2ebd5b6912c0eaeb879d07b0fe8c59330b5eebe58d211af22e2e5df8c0756271 rubygem-rake-13.1.0-10.el10_0.noarch.rpm 18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84 rubygem-rake-13.1.0-10.el10_0.noarch.rpm 18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84 rubygem-rake-13.1.0-10.el10_0.noarch.rpm 18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84 rubygem-rake-13.1.0-10.el10_0.noarch.rpm 18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84 rubygem-rbs-3.4.0-10.el10_0.aarch64.rpm 3dacf56b91c1dc3845fa199b7e6eb883a4aa0090dcf1a348b2d621bea83b0e99 rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm 656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0 rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm 656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0 rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm 656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0 rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm 656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0 rubygem-rexml-3.3.9-10.el10_0.noarch.rpm f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a rubygem-rexml-3.3.9-10.el10_0.noarch.rpm f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a rubygem-rexml-3.3.9-10.el10_0.noarch.rpm f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a rubygem-rexml-3.3.9-10.el10_0.noarch.rpm f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a rubygem-rss-0.3.1-10.el10_0.noarch.rpm 312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a rubygem-rss-0.3.1-10.el10_0.noarch.rpm 312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a rubygem-rss-0.3.1-10.el10_0.noarch.rpm 312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a rubygem-rss-0.3.1-10.el10_0.noarch.rpm 312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a rubygems-3.5.22-10.el10_0.noarch.rpm bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be rubygems-3.5.22-10.el10_0.noarch.rpm bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be rubygems-3.5.22-10.el10_0.noarch.rpm bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be rubygems-3.5.22-10.el10_0.noarch.rpm bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be rubygems-devel-3.5.22-10.el10_0.noarch.rpm d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527 rubygems-devel-3.5.22-10.el10_0.noarch.rpm d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527 rubygems-devel-3.5.22-10.el10_0.noarch.rpm d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527 rubygems-devel-3.5.22-10.el10_0.noarch.rpm d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527 rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517 rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517 rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517 rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517 rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm 79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm 79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm 79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm 79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da ruby-libs-3.3.8-10.el10_0.aarch64.rpm 3047cd6bffc21c866379fba799f8f0bd24ffc831039a01e7ed0947910385a96a RLSA-2025:8135 Important: python-tornado security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for python-tornado. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms python3-tornado-6.4.2-1.el10_0.1.aarch64.rpm 538bbb2e6525be224cddd28de4ceb6eff51e66d269930101e0357fa4b817e685 RLSA-2025:8184 Important: gstreamer1-plugins-bad-free security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for gstreamer1-plugins-bad-free. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gstreamer1-plugins-bad-free-1.24.11-2.el10_0.aarch64.rpm ea858f7ba32aa49adbc5155a4d39ec83ffac617993353e1827e808f2efae35c0 gstreamer1-plugins-bad-free-libs-1.24.11-2.el10_0.aarch64.rpm c7c845023a336b83e6539eb532da647615b8d14e42e484fa394af342a4f95b74 RLSA-2025:8196 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909) * thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875) * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877) * thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-128.10.1-1.el10_0.aarch64.rpm f815272496337abb938f0df455da55cfe7bc88cdc4da3dfaa23a6ecd8a1afefc RLSA-2025:8341 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-128.11.0-1.el10_0.aarch64.rpm 8e7fe33789bef842b37ee3f95c92f8e2d2cbd20ae889937252b72cb534c2da16 RLSA-2025:8477 Moderate: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms golang-tests-1.23.9-1.el10_0.noarch.rpm 3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9 golang-1.23.9-1.el10_0.aarch64.rpm 214838533d4f16dde82db9015e0f3216204774391b9797b3a3462f49b946cf39 golang-bin-1.23.9-1.el10_0.aarch64.rpm 91feafb36fcf948cef64bc503232bd950c8f473fc6bc0e2d0c1b214adbcdf330 golang-docs-1.23.9-1.el10_0.noarch.rpm bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7 golang-docs-1.23.9-1.el10_0.noarch.rpm bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7 golang-docs-1.23.9-1.el10_0.noarch.rpm bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7 golang-docs-1.23.9-1.el10_0.noarch.rpm bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7 golang-misc-1.23.9-1.el10_0.noarch.rpm 69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced golang-misc-1.23.9-1.el10_0.noarch.rpm 69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced golang-misc-1.23.9-1.el10_0.noarch.rpm 69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced golang-misc-1.23.9-1.el10_0.noarch.rpm 69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced golang-src-1.23.9-1.el10_0.noarch.rpm 431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8 golang-src-1.23.9-1.el10_0.noarch.rpm 431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8 golang-src-1.23.9-1.el10_0.noarch.rpm 431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8 golang-src-1.23.9-1.el10_0.noarch.rpm 431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8 golang-tests-1.23.9-1.el10_0.noarch.rpm 3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9 golang-tests-1.23.9-1.el10_0.noarch.rpm 3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9 golang-tests-1.23.9-1.el10_0.noarch.rpm 3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9 go-toolset-1.23.9-1.el10_0.aarch64.rpm e65cd9c4219c6766f8b4fe11ba111569622f1fb0f90aeb39a49555422bdc6711 RLSA-2025:8493 Important: nodejs22 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for nodejs22. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices. Security Fix(es): * nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms nodejs-22.16.0-1.el10_0.aarch64.rpm e068aebe64784517741581d5b515d18c091a928cab1cda91e1b1f21ea09ae36c nodejs-devel-22.16.0-1.el10_0.aarch64.rpm 1180e50876c81caae1d254c96892c864f4f31d11eace6361831385b04cd98cde nodejs-docs-22.16.0-1.el10_0.noarch.rpm f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995 nodejs-docs-22.16.0-1.el10_0.noarch.rpm f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995 nodejs-docs-22.16.0-1.el10_0.noarch.rpm f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995 nodejs-docs-22.16.0-1.el10_0.noarch.rpm f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995 nodejs-full-i18n-22.16.0-1.el10_0.aarch64.rpm 226925b681748d46ec02b52fa9212bf70de0fe8aab5585ab75af2b263c990728 nodejs-libs-22.16.0-1.el10_0.aarch64.rpm d0c8c67f783a6a601e217e9decf3078c616518b86db8f9a9de73f2c6a1395ab6 nodejs-npm-10.9.2-1.22.16.0.1.el10_0.aarch64.rpm ccc316b8739541fd7e2f29208446bfd4e6ef812a5c9f8ba3ec1f45ecfa8f0832 RLSA-2025:8550 Important: varnish security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for varnish. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up. Security Fix(es): * varnish: request smuggling attacks (CVE-2025-47905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms varnish-7.6.1-2.el10_0.1.aarch64.rpm a028f0a346651208b2faa4658432d1da990580575c55ee4b00b08a9d30a34df3 varnish-docs-7.6.1-2.el10_0.1.aarch64.rpm 6d9691835d72bc337ccde1a986c97c4afefbc84bbfa7e2a388717d01deea4dd0 RLSA-2025:8608 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918) * firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919) * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267) * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264) * firefox: thunderbird: Memory safety bugs (CVE-2025-5268) * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266) * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263) * firefox: thunderbird: Memory safety bug (CVE-2025-5269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-128.11.0-1.el10_0.aarch64.rpm ca9894e6e7a37f80729f5ef86110f5d4cd2244d8fe45d058b510bb054cfb5025 RLSA-2025:8636 Important: perl-FCGI security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for perl-FCGI. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FastCGI Perl bindings. Security Fix(es): * perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms perl-FCGI-0.82-13.1.el10_0.aarch64.rpm 12d4b7f294a54818bbc71f823841d9c8d230b3bf3deca7437593aa7282f8f657 RLSA-2025:8666 Moderate: grafana security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grafana. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms grafana-10.2.6-18.el10_0.aarch64.rpm 5ec6d797e4092fcdab3e79b666dc711343b6497a2e89a48013882a864f0a02dd grafana-selinux-10.2.6-18.el10_0.aarch64.rpm 2da1fdd10c9127a03da7ade8081f0563a564e4c287b632329784165c1f7f7041 RLSA-2025:8814 Important: .NET 8.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet8.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aspnetcore-runtime-8.0-8.0.17-1.el10_0.aarch64.rpm ea11a7a3f4a3fcd5bd59ef04fc54cd0de54ef46e3e9cd83d380f71365ce4e5ec aspnetcore-runtime-dbg-8.0-8.0.17-1.el10_0.aarch64.rpm dea386f1a9c079a35f44afeffba18314219c473656109b67a8963ed7e7911090 aspnetcore-targeting-pack-8.0-8.0.17-1.el10_0.aarch64.rpm 2165259f409c299009037623e1a19261086c7de52eaff437e7034555d1101b6d dotnet-apphost-pack-8.0-8.0.17-1.el10_0.aarch64.rpm 289fbba0c6437cfa0c72da69b10715978f2c858bb0fb2cc2d73862c86302179e dotnet-hostfxr-8.0-8.0.17-1.el10_0.aarch64.rpm 554776cb7ca5ed84350bb0cc3f94813ea7d849ed58706568e073b64975c31a6b dotnet-runtime-8.0-8.0.17-1.el10_0.aarch64.rpm c1de70c25acc557e578796c17818a825eaf3116192c151788c2d79eb68bbdee1 dotnet-runtime-dbg-8.0-8.0.17-1.el10_0.aarch64.rpm e0592311bdbca2501406e40dc4779e13277907ba2b45ba3720ebbbf2428122ae dotnet-sdk-8.0-8.0.117-1.el10_0.aarch64.rpm 83cf0c847c33f029b03edf2c92d947cf041ff80f0aa8d0f4de1f57eeda4be212 dotnet-sdk-dbg-8.0-8.0.117-1.el10_0.aarch64.rpm d95a300c0bc82396be2ae2a4a7b21c8f3a7def7365518363a6c07819c4d61d64 dotnet-targeting-pack-8.0-8.0.17-1.el10_0.aarch64.rpm dc39173f2eefe868dd6c78070f707edcc9f82a18947b9029c0c8c31615b0235b dotnet-templates-8.0-8.0.117-1.el10_0.aarch64.rpm 0a301971876eb27381dccdfa7dc0cf845646e8603097e2261cdd429e8efe8f84 RLSA-2025:8816 Important: .NET 9.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for dotnet9.0. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es): * dotnet: .NET Remote Code Vulnerability (CVE-2025-30399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aspnetcore-runtime-9.0-9.0.6-1.el10_0.aarch64.rpm 2630d01a35da7ba52379e8230c411cfb1f07b2bce382347874809ae4464215aa aspnetcore-runtime-dbg-9.0-9.0.6-1.el10_0.aarch64.rpm e2d6cfd177af9ea959b3b32ca531c9f71a8d4dec482d22d83713555f12084f66 aspnetcore-targeting-pack-9.0-9.0.6-1.el10_0.aarch64.rpm 1ad5a8eb2e743e4b82671307457540cd5c597f5e7114d883d76e2819ece742a5 dotnet-apphost-pack-9.0-9.0.6-1.el10_0.aarch64.rpm 11d65f15b3c76e6ce1f48b7bef71c4ab2632a1f269591ea19f64692fd6cf8fd5 dotnet-host-9.0.6-1.el10_0.aarch64.rpm aeeb037fcdfa1e767682aeb714fae10fc53b9482deb3d85aa6cab7e1862f5199 dotnet-hostfxr-9.0-9.0.6-1.el10_0.aarch64.rpm f84f6acbb39aab92de7fb6088678bd764d277b75b9906c41d38b0f6949b92747 dotnet-runtime-9.0-9.0.6-1.el10_0.aarch64.rpm 9a3c749d2174e236b0a6aa34a8bb3dcfe5443e4a7c9b362c6bde85b6c6119350 dotnet-runtime-dbg-9.0-9.0.6-1.el10_0.aarch64.rpm fc5a1e7e9dd4315b88311fb76f256e496237c7f76d343f139f9564db95c75bd2 dotnet-sdk-9.0-9.0.107-1.el10_0.aarch64.rpm 2319013c3d69dfd9dec9577e661049fda94b82ce6450a7e9987980d772b5598e dotnet-sdk-aot-9.0-9.0.107-1.el10_0.aarch64.rpm 010267412220c6204331e5a0af5d36e295f79facfd020ba2377e5fc7d31f68cd dotnet-sdk-dbg-9.0-9.0.107-1.el10_0.aarch64.rpm 680f8cc407143b14fcb3124b96c65e01e9927e122bc3504013c140ea42751e61 dotnet-targeting-pack-9.0-9.0.6-1.el10_0.aarch64.rpm 4fdc067534349619343583196e0970840d6e172d5d0fa8584cd1b95bbd291249 dotnet-templates-9.0-9.0.107-1.el10_0.aarch64.rpm 34cfad8620e035ea0acde05502b86087048c73d18252a3874c9c17e960c2ad9d netstandard-targeting-pack-2.1-9.0.107-1.el10_0.aarch64.rpm 0bc48992f5bcd7245e7a5aa2d25e1450ee94458ecc0353074a01a026d123d446 RLSA-2025:8915 Moderate: grafana-pcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for grafana-pcp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms grafana-pcp-5.2.2-3.el10_0.aarch64.rpm 9803453c5afe2511b26a2621a2a8708d574d816ef21f3c6ad065b835a215262c RLSA-2025:9063 Moderate: git-lfs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for git-lfs. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms git-lfs-3.6.1-2.el10_0.aarch64.rpm 02b07fa85180b39d0e95119b5a67b7c5ff1d84e91778ac135ea9678b2cc4f073 RLSA-2025:9120 Important: libvpx security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libvpx. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Security Fix(es): * libvpx: Double-free in libvpx encoder (CVE-2025-5283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libvpx-1.14.1-3.el10_0.aarch64.rpm afdf5a1c581eab2548015dc04b09175d0e5262d9e4e2049edff71cf16757544b RLSA-2025:9121 Moderate: wireshark security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for wireshark. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix(es): * wireshark: Uncontrolled Recursion in Wireshark (CVE-2025-1492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms wireshark-4.4.2-3.el10_0.aarch64.rpm e3287fe24e29fa3e753576227ffdb3763350584e02ab5bf74508d478c9258c8f wireshark-cli-4.4.2-3.el10_0.aarch64.rpm b61d3af66853fc5430c98411fc44aaad4fc9cfa7c34af11e9e391b05832fff52 RLSA-2025:9148 Moderate: buildah security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms buildah-1.39.4-2.el10_0.aarch64.rpm a6c7341e5bb916800458e7d3c2047b0161055e8171dce1ad6dd588ad7557b756 buildah-tests-1.39.4-2.el10_0.aarch64.rpm 4754030f20380a92032fca0c36bdbcf0b673bae8ce0bcdf7802d396586522bb1 RLSA-2025:9146 Moderate: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-5.4.0-10.el10_0.aarch64.rpm 82c1499b97b5518e72e5ae7a6eb93abd349a6e9f04c1b541527fd8fedf2fc2e1 podman-docker-5.4.0-10.el10_0.noarch.rpm 72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f podman-docker-5.4.0-10.el10_0.noarch.rpm 72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f podman-docker-5.4.0-10.el10_0.noarch.rpm 72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f podman-docker-5.4.0-10.el10_0.noarch.rpm 72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f podman-remote-5.4.0-10.el10_0.aarch64.rpm 6c13d2e086bc8c5d0c4e19d4bd81fe1f2888f04aaf232313571daa638c9ed931 RLSA-2025:9149 Moderate: skopeo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for skopeo. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms skopeo-1.18.1-2.el10_0.aarch64.rpm 564c3950698964f67cb49eb14983c5a598e057dd71db24462476fb01a72a5cae skopeo-tests-1.18.1-2.el10_0.aarch64.rpm bee5889d3b1d0840fe21bfdba72530beaf93bc8191b6e1a041185440e8f55226 RLSA-2025:9151 Moderate: gvisor-tap-vsock security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gvisor-tap-vsock. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gvisor-tap-vsock-0.8.5-2.el10_0.aarch64.rpm c8222f0577fc11cbb5371c9573d381a1dec9035025086ffdacd3eddd2692623a gvisor-tap-vsock-gvforwarder-0.8.5-2.el10_0.aarch64.rpm 1f588cef07960d0ece8fb708bfe0dd68c5e4bfe020ed31500a69481dae746013 RLSA-2025:9156 Moderate: golang-github-openprinting-ipp-usb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang-github-openprinting-ipp-usb. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables driverless support for USB devices capable of using IPP-over-USB protocol. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ipp-usb-0.9.27-3.el10_0.aarch64.rpm 56f06cdff6a16f3c9e852cfbd0ac13ad5fa6bc0701da418313a6e57d76e2fc19 RLSA-2025:9190 Important: ipa security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms ipa-client-4.12.2-15.el10_0.1.aarch64.rpm f87ad8d36d73036e1000f63cfcb8a56dd50d4db79d93b2a40c00537e8262a4f9 ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm 6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207 ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm 6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207 ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm 6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207 ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm 6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207 ipa-client-encrypted-dns-4.12.2-15.el10_0.1.aarch64.rpm 1ebbfa8917c083a341b7d4d7d1262bf82c3116315fc634ef776f6615f7c88c07 ipa-client-epn-4.12.2-15.el10_0.1.aarch64.rpm 70aad74c1bbc3bbeb89369dae460695c79f2bce35a5aa385cd6201f86363fd05 ipa-client-samba-4.12.2-15.el10_0.1.aarch64.rpm 6caa0f3d3f2dd5ccd682796100b71dc6173ced18cf266dbe3885197c26365f09 ipa-common-4.12.2-15.el10_0.1.noarch.rpm bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423 ipa-common-4.12.2-15.el10_0.1.noarch.rpm bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423 ipa-common-4.12.2-15.el10_0.1.noarch.rpm bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423 ipa-common-4.12.2-15.el10_0.1.noarch.rpm bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423 ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm 9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4 ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm 9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4 ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm 9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4 ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm 9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4 ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm 862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81 ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm 862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81 ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm 862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81 ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm 862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81 ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881 ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881 ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881 ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881 ipa-server-4.12.2-15.el10_0.1.aarch64.rpm 2ba31e8249e9721a80c0a627f6cd09b3d64c952079650a657a8f5f501d5347fa ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm 89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm 89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm 89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm 89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm 7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4 ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm 7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4 ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm 7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4 ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm 7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4 ipa-server-encrypted-dns-4.12.2-15.el10_0.1.aarch64.rpm 660d24b6811b0e46280503eff197ca97d7072162d2691827d0a377335ff22039 ipa-server-trust-ad-4.12.2-15.el10_0.1.aarch64.rpm 7431ee688906310eaa0c3762b4f6de1edfafb3175e059d010b302a9e8b121476 python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm 3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm 3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm 3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm 3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm 8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm 8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm 8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm 8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm 9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7 python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm 9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7 python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm 9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7 python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm 9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7 RLSA-2025:9304 Important: xorg-x11-server-Xwayland security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for xorg-x11-server-Xwayland. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Xwayland is an X server for running X clients under Wayland. Security Fix(es): * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode (CVE-2025-49177) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179) * xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms xorg-x11-server-Xwayland-24.1.5-4.el10_0.aarch64.rpm ab5708c0db650688c39fe888a672b3fc749b62eef6a3dbf80c291eff86aa1a1c RLSA-2025:9317 Moderate: delve security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible. Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms delve-1.24.1-2.el10_0.aarch64.rpm fbb44109671e3b8dc12519ae2492ac307c7cd4aabf06103531793422799c8467 RLSA-2025:9307 Moderate: freerdp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for freerdp. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. Security Fix(es): * gnome-remote-desktop: freerdp: Unauthenticated RDP Packet Causes Segfault in FreeRDP Leading to Denial of Service (CVE-2025-4478) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms freerdp-3.10.3-3.el10_0.aarch64.rpm bc3e15be3f4660526401034582822c7e5aa4e015b35a7c0c2f8e901423e8f828 freerdp-libs-3.10.3-3.el10_0.aarch64.rpm 4b94793f1cf0c4d0a2b9ab4ab885ed40624a4a8ba2e897a48f720ec9706ff8e3 libwinpr-3.10.3-3.el10_0.aarch64.rpm e69a660618cf68be3b40ff89463868ec49575199a9d3d2700ab5c14a953f20b7 RLSA-2025:9328 Important: libblockdev security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for libblockdev. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID. Security Fix(es): * libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libblockdev-3.2.0-4.el10_0.aarch64.rpm c3d776f908ebc2dba71dba1781c382b5e946ab7fdbe09d305b57634cff770c10 libblockdev-crypto-3.2.0-4.el10_0.aarch64.rpm abb72cd41e687dcf19231646cae5b88ad5862119df03dcf751c8b0f690f9cee2 libblockdev-dm-3.2.0-4.el10_0.aarch64.rpm da1942a432abbab9b588db736276f7635ee8a49249f2429e11630c1cdecfee9e libblockdev-fs-3.2.0-4.el10_0.aarch64.rpm a32268d30147949e0be26cda4397bea7aea2e55098c2f3a2c278b35e1065d5fa libblockdev-loop-3.2.0-4.el10_0.aarch64.rpm a7d6b0cae146bc1d426fdee4455bb322365744a3e599f66598c3a48a7ecc6d44 libblockdev-lvm-3.2.0-4.el10_0.aarch64.rpm 90f6c31ddbb4ed65832d878963030d5ceccdb0001bdcea16d2059b5d09d82a65 libblockdev-lvm-dbus-3.2.0-4.el10_0.aarch64.rpm 62ae6eb50c415016f24b5e017384854ca939e682c679af958380f6fb795cb772 libblockdev-mdraid-3.2.0-4.el10_0.aarch64.rpm 7c84153a33ffdb1c624fa7056b831cfeeaae5b8814e4660352c2a61b6b3eab76 libblockdev-mpath-3.2.0-4.el10_0.aarch64.rpm c74e745b5ce9136c7e8c2e4e3ec8ad7db50dd77b45e116b62c668677709d608f libblockdev-nvdimm-3.2.0-4.el10_0.aarch64.rpm 85400b62388d1f6a7419963198ab32aaafafabad595a0f1836f89a2fbe18da44 libblockdev-nvme-3.2.0-4.el10_0.aarch64.rpm ee9355921916a47355b9148ad8ccb9ad3ceb7aa29671b56a8c7ff3d2cf3a342e libblockdev-part-3.2.0-4.el10_0.aarch64.rpm e43678f42ad500e2be7f4e88e9ad15c8588e11e69d83585ec7e681b6f428db69 libblockdev-plugins-all-3.2.0-4.el10_0.aarch64.rpm 0e2b8af5dc7266fab04b83b93f7687cf81af142ce5ef3652fddabd8228cffea2 libblockdev-smart-3.2.0-4.el10_0.aarch64.rpm 8ce98f718db2c7240dce07d89d5899c2cc2c5b73cd56c8d15461280b9e3aee5a libblockdev-smartmontools-3.2.0-4.el10_0.aarch64.rpm 1f75e57154a087287eddb4092b464fffde9a9d4498327adaa1fe7979b66ebc3b libblockdev-swap-3.2.0-4.el10_0.aarch64.rpm 26678e6b11c2678750858b18ea322f91cd8b5b7674d87de36ea7e3b3bfa2dabb libblockdev-tools-3.2.0-4.el10_0.aarch64.rpm 6c349faa5f35d23f4878eea30403afaf8b35686009375146fba6bdb9979c1b46 libblockdev-utils-3.2.0-4.el10_0.aarch64.rpm 8c14cca3c13d2d285d232ab3ee375d201afea7925350e52f91dc166d41b9bced python3-blockdev-3.2.0-4.el10_0.aarch64.rpm 07ee873e954c6fc433fffae39c09a7615cca3d6ff586b0fac3258ca81187b3d8 RLSA-2025:9466 Moderate: mod_proxy_cluster security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_proxy_cluster. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality. Security Fix(es): * mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mod_proxy_cluster-1.3.22-1.el10_0.2.aarch64.rpm f98cabb7ed902267b4c42ff0b284957b492984a35684ff2bede485bea840ba57 RLSA-2025:9486 Moderate: qt6-qtbase security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for qt6-qtbase. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling. Security Fix(es): * qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms qt6-qtbase-6.8.1-9.el10_0.aarch64.rpm 95d6015c0ea514bfa8d5f8711af4dc2beeeb6a41010618467db925e5b444ee0b qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm 1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm 1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm 1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm 1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e qt6-qtbase-devel-6.8.1-9.el10_0.aarch64.rpm 8349d53861d311281d0a8ebf7cf510cb69e5db72f67e5949a705978e60c89931 qt6-qtbase-gui-6.8.1-9.el10_0.aarch64.rpm 6b253de0506015aa884307280198e1cac7650238f7448c22d6d1b8a41470e989 qt6-qtbase-mysql-6.8.1-9.el10_0.aarch64.rpm c1be7acb70544d4fb345034ede6d0607411032061b32ca61b910a6e6999bca06 qt6-qtbase-odbc-6.8.1-9.el10_0.aarch64.rpm 77d9b789229ea721a392abeb8080ea829431cfcd8707968feb9a56ab0ea63626 qt6-qtbase-postgresql-6.8.1-9.el10_0.aarch64.rpm de7377b705467535876b141f243c930ca55c0ebe8857b1d95c5ea16cd59fb575 RLSA-2025:10073 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430) * firefox: Use-after-free in FontFaceSet (CVE-2025-6424) * firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429) * firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-128.12.0-1.el10_0.aarch64.rpm d1ed13f1479697b51679f74af77f3576692e98c1fd135e48e195e4fd4717cade RLSA-2025:10195 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-128.12.0-1.el10_0.aarch64.rpm fed366e1f80fcb4b2ccba049e424ec7bcf035e10214dc78d2c7e6aeaf56c464e RLSA-2025:10549 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: podman missing TLS verification (CVE-2025-6032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-5.4.0-12.el10_0.aarch64.rpm 06efffc4dddaaa33508de3103d8f541200e1cbfd6201bfdc1606f442cc00a0f0 podman-docker-5.4.0-12.el10_0.noarch.rpm 50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15 podman-docker-5.4.0-12.el10_0.noarch.rpm 50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15 podman-docker-5.4.0-12.el10_0.noarch.rpm 50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15 podman-docker-5.4.0-12.el10_0.noarch.rpm 50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15 podman-remote-5.4.0-12.el10_0.aarch64.rpm 71cea8fe64c8e8dbc61efc9a09313b5e516579671afbb477e47f324401b39996 RLSA-2025:10635 Moderate: gnome-remote-desktop security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gnome-remote-desktop. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment. Security Fix(es): * gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gnome-remote-desktop-47.3-2.el10_0.aarch64.rpm 830e187f28a75a2bf54f6cf634b023559d0191ae78e3aae39991a61a191c6d07 RLSA-2025:10677 Moderate: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms golang-1.24.4-1.el10_0.aarch64.rpm 980e55d2e8a9c353c0a3ec784b14dff052b76e4c40e21e1305bd7b45347efc6d golang-bin-1.24.4-1.el10_0.aarch64.rpm 23ba13ceb85b13980a440e73e3364973a8efee54334c44a4e3bf8e478064ba57 golang-docs-1.24.4-1.el10_0.noarch.rpm f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9 golang-docs-1.24.4-1.el10_0.noarch.rpm f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9 golang-docs-1.24.4-1.el10_0.noarch.rpm f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9 golang-docs-1.24.4-1.el10_0.noarch.rpm f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9 golang-misc-1.24.4-1.el10_0.noarch.rpm c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a golang-misc-1.24.4-1.el10_0.noarch.rpm c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a golang-misc-1.24.4-1.el10_0.noarch.rpm c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a golang-misc-1.24.4-1.el10_0.noarch.rpm c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a golang-race-1.24.4-1.el10_0.aarch64.rpm 413b128c46d0daea5e4e55e946192c83007424acad4e5932d0611b6038055079 golang-src-1.24.4-1.el10_0.noarch.rpm f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434 golang-src-1.24.4-1.el10_0.noarch.rpm f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434 golang-src-1.24.4-1.el10_0.noarch.rpm f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434 golang-src-1.24.4-1.el10_0.noarch.rpm f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434 golang-tests-1.24.4-1.el10_0.noarch.rpm e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f golang-tests-1.24.4-1.el10_0.noarch.rpm e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f golang-tests-1.24.4-1.el10_0.noarch.rpm e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f golang-tests-1.24.4-1.el10_0.noarch.rpm e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f go-toolset-1.24.4-1.el10_0.aarch64.rpm a3f0d12fa45db2c0b0f0f929e2c0540a763a78519ed78a43c01561d6c86acb02 RLSA-2025:10873 Important: java-21-openjdk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for java-21-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit. Security Fix(es): * JDK: Better Glyph drawing (CVE-2025-30749) * JDK: Enhance TLS protocol support (CVE-2025-30754) * JDK: Improve HTTP client header handling (CVE-2025-50059) * JDK: Better Glyph drawing redux (CVE-2025-50106) Bug Fix(es): * In Rocky Linux 9 and Rocky Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (Rocky Linux-102683, Rocky Linux-102684, Rocky Linux-102685) * On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (Rocky Linux-90307, Rocky Linux-90308, Rocky Linux-90311) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms java-21-openjdk-21.0.8.0.9-1.el10.aarch64.rpm d8f41de4e9daeff92c9c05033361120f8b108357537af9e957efa62e33e74b0c java-21-openjdk-demo-21.0.8.0.9-1.el10.aarch64.rpm 54557fa28bdd6339b3eb2cdd3fca2ca3355ee7c4537aa68bccdbda46dc50dafa java-21-openjdk-devel-21.0.8.0.9-1.el10.aarch64.rpm cf06081c0208a031eac2898d713c808111e1e3cf20e68c0a1f2546a55cb40391 java-21-openjdk-headless-21.0.8.0.9-1.el10.aarch64.rpm dd2e64fafc8ddd4be6208bff883e5d81b2bb5775eba54d4b53c27bce8614c498 java-21-openjdk-javadoc-21.0.8.0.9-1.el10.aarch64.rpm e2af22fad19e7ec43e0e26cc89a82428740e4c57511be405343367aca02a4ca0 java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el10.aarch64.rpm 220021d27900977a1fc90e5c554b4fe3da03d47f777475bf9d392d4ba9e029f4 java-21-openjdk-jmods-21.0.8.0.9-1.el10.aarch64.rpm 4d9847a358e92f9cfac08a95f628af3658fe1b1ff3f441e6ab883d0047c5de0c java-21-openjdk-src-21.0.8.0.9-1.el10.aarch64.rpm 5094731d64fc7427cc485c30a2beec31fc2d45307f44c1b4bbc8fbd894bd99b4 java-21-openjdk-static-libs-21.0.8.0.9-1.el10.aarch64.rpm aa68c5bc3ed6b3f9f8e7f7dac68be1ff434dd877e5d0194e2dcb1a38e4159c7b RLSA-2025:11332 Important: tomcat9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337) * tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat9-9.0.87-5.el10_0.1.noarch.rpm 7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd tomcat9-9.0.87-5.el10_0.1.noarch.rpm 7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd tomcat9-9.0.87-5.el10_0.1.noarch.rpm 7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd tomcat9-9.0.87-5.el10_0.1.noarch.rpm 7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm 3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40 tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm 3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40 tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm 3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40 tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm 3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40 tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033 tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033 tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033 tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033 tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm 38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm 38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm 38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm 38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883 tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883 tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883 tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883 tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm 29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm 29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm 29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm 29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm 0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm 0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm 0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm 0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459 tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459 tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459 tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459 RLSA-2025:11401 Important: valkey security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Redis Stack Buffer Overflow (CVE-2025-27151) * redis: Redis Unauthenticated Denial of Service (CVE-2025-48367) * redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms valkey-8.0.4-1.el10_0.aarch64.rpm f05d1299c00a25bcfbb9b0d475a9b418bf58732acd4f4afc527bf4cdfef1d9ee valkey-devel-8.0.4-1.el10_0.aarch64.rpm 6b8c08f6f477ec956d4601cb59b8a771e6e67bec467e0c5e24bef678e84d34f4 RLSA-2025:11797 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-128.13.0-1.el10_0.aarch64.rpm 11493c038658b01fc58838ea15239b682a0b9fdbef8850d4f1a88204dff20c85 RLSA-2025:12056 Moderate: perl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for perl. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms perl-5.40.2-512.2.el10_0.aarch64.rpm 7948ba076307dcfc2f479983f7888a4a949d9c56dd2b5434ce259f4460e7ea6b perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7 perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7 perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7 perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7 perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf perl-autouse-1.11-512.2.el10_0.noarch.rpm 022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f perl-autouse-1.11-512.2.el10_0.noarch.rpm 022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f perl-autouse-1.11-512.2.el10_0.noarch.rpm 022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f perl-autouse-1.11-512.2.el10_0.noarch.rpm 022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f perl-B-1.89-512.2.el10_0.aarch64.rpm 7fa5aa568d2d4b9a07c05cc74c1062e56a8ee638d296875d43135cb761420c21 perl-base-2.27-512.2.el10_0.noarch.rpm 23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30 perl-base-2.27-512.2.el10_0.noarch.rpm 23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30 perl-base-2.27-512.2.el10_0.noarch.rpm 23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30 perl-base-2.27-512.2.el10_0.noarch.rpm 23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30 perl-Benchmark-1.25-512.2.el10_0.noarch.rpm 7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c perl-Benchmark-1.25-512.2.el10_0.noarch.rpm 7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c perl-Benchmark-1.25-512.2.el10_0.noarch.rpm 7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c perl-Benchmark-1.25-512.2.el10_0.noarch.rpm 7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c perl-blib-1.07-512.2.el10_0.noarch.rpm 26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668 perl-blib-1.07-512.2.el10_0.noarch.rpm 26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668 perl-blib-1.07-512.2.el10_0.noarch.rpm 26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668 perl-blib-1.07-512.2.el10_0.noarch.rpm 26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668 perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm 142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm 142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm 142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm 142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm 088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71 perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm 088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71 perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm 088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71 perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm 088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71 perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm 594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm 594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm 594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm 594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d perl-debugger-1.60-512.2.el10_0.noarch.rpm 116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363 perl-debugger-1.60-512.2.el10_0.noarch.rpm 116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363 perl-debugger-1.60-512.2.el10_0.noarch.rpm 116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363 perl-debugger-1.60-512.2.el10_0.noarch.rpm 116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363 perl-deprecate-0.04-512.2.el10_0.noarch.rpm f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16 perl-deprecate-0.04-512.2.el10_0.noarch.rpm f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16 perl-deprecate-0.04-512.2.el10_0.noarch.rpm f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16 perl-deprecate-0.04-512.2.el10_0.noarch.rpm f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16 perl-devel-5.40.2-512.2.el10_0.aarch64.rpm d51ade732713ecbca1918c4a1b36775e4ec6a69c666dd8505c0a8d289fdade5b perl-Devel-Peek-1.34-512.2.el10_0.aarch64.rpm a7e45143c7832b91e0d7819674182a02d612a88220a219ff8c6f07a3a7eac38b perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm 3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm 3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm 3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm 3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab perl-diagnostics-1.40-512.2.el10_0.noarch.rpm 391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba perl-diagnostics-1.40-512.2.el10_0.noarch.rpm 391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba perl-diagnostics-1.40-512.2.el10_0.noarch.rpm 391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba perl-diagnostics-1.40-512.2.el10_0.noarch.rpm 391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba perl-DirHandle-1.05-512.2.el10_0.noarch.rpm 3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7 perl-DirHandle-1.05-512.2.el10_0.noarch.rpm 3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7 perl-DirHandle-1.05-512.2.el10_0.noarch.rpm 3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7 perl-DirHandle-1.05-512.2.el10_0.noarch.rpm 3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7 perl-doc-5.40.2-512.2.el10_0.noarch.rpm 1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac perl-doc-5.40.2-512.2.el10_0.noarch.rpm 1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac perl-doc-5.40.2-512.2.el10_0.noarch.rpm 1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac perl-doc-5.40.2-512.2.el10_0.noarch.rpm 1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm 4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6 perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm 4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6 perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm 4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6 perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm 4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6 perl-DynaLoader-1.56-512.2.el10_0.aarch64.rpm b69a39827da36b95969b4531d6a7b02be03d6cb1723bb7ffa30fff29e985b6e3 perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a perl-English-1.11-512.2.el10_0.noarch.rpm cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59 perl-English-1.11-512.2.el10_0.noarch.rpm cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59 perl-English-1.11-512.2.el10_0.noarch.rpm cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59 perl-English-1.11-512.2.el10_0.noarch.rpm cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59 perl-Errno-1.38-512.2.el10_0.aarch64.rpm d4ac06dc6ef634652523029e15928e4fe98a8f716017f9e52af3dc30500856c4 perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674 perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674 perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674 perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674 perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd perl-Fcntl-1.18-512.2.el10_0.aarch64.rpm 7594a2b1928b3401459544d90574fa6772d2cb14a3ea7730ffa853d998694169 perl-fields-2.27-512.2.el10_0.noarch.rpm a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743 perl-fields-2.27-512.2.el10_0.noarch.rpm a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743 perl-fields-2.27-512.2.el10_0.noarch.rpm a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743 perl-fields-2.27-512.2.el10_0.noarch.rpm a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743 perl-File-Basename-2.86-512.2.el10_0.noarch.rpm 0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8 perl-File-Basename-2.86-512.2.el10_0.noarch.rpm 0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8 perl-File-Basename-2.86-512.2.el10_0.noarch.rpm 0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8 perl-File-Basename-2.86-512.2.el10_0.noarch.rpm 0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8 perl-FileCache-1.10-512.2.el10_0.noarch.rpm ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3 perl-FileCache-1.10-512.2.el10_0.noarch.rpm ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3 perl-FileCache-1.10-512.2.el10_0.noarch.rpm ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3 perl-FileCache-1.10-512.2.el10_0.noarch.rpm ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3 perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm 36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm 36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm 36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm 36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f perl-File-Copy-2.41-512.2.el10_0.noarch.rpm eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0 perl-File-Copy-2.41-512.2.el10_0.noarch.rpm eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0 perl-File-Copy-2.41-512.2.el10_0.noarch.rpm eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0 perl-File-Copy-2.41-512.2.el10_0.noarch.rpm eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0 perl-File-DosGlob-1.12-512.2.el10_0.aarch64.rpm 9b685dfaddf72186b02a525c11b23d8c172f706aa07f52d2b3ef31c695f3dc52 perl-File-Find-1.44-512.2.el10_0.noarch.rpm 1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8 perl-File-Find-1.44-512.2.el10_0.noarch.rpm 1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8 perl-File-Find-1.44-512.2.el10_0.noarch.rpm 1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8 perl-File-Find-1.44-512.2.el10_0.noarch.rpm 1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8 perl-FileHandle-2.05-512.2.el10_0.noarch.rpm da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf perl-FileHandle-2.05-512.2.el10_0.noarch.rpm da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf perl-FileHandle-2.05-512.2.el10_0.noarch.rpm da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf perl-FileHandle-2.05-512.2.el10_0.noarch.rpm da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf perl-File-stat-1.14-512.2.el10_0.noarch.rpm e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307 perl-File-stat-1.14-512.2.el10_0.noarch.rpm e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307 perl-File-stat-1.14-512.2.el10_0.noarch.rpm e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307 perl-File-stat-1.14-512.2.el10_0.noarch.rpm e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307 perl-filetest-1.03-512.2.el10_0.noarch.rpm d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b perl-filetest-1.03-512.2.el10_0.noarch.rpm d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b perl-filetest-1.03-512.2.el10_0.noarch.rpm d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b perl-filetest-1.03-512.2.el10_0.noarch.rpm d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b perl-FindBin-1.54-512.2.el10_0.noarch.rpm 309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f perl-FindBin-1.54-512.2.el10_0.noarch.rpm 309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f perl-FindBin-1.54-512.2.el10_0.noarch.rpm 309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f perl-FindBin-1.54-512.2.el10_0.noarch.rpm 309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f perl-GDBM_File-1.24-512.2.el10_0.aarch64.rpm c6198178d2a20d29e9bb21aa01c483854c8e5f7ad1403f2ef0ee2ac5b4d96d12 perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm 4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3 perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm 4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3 perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm 4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3 perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm 4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3 perl-Hash-Util-0.32-512.2.el10_0.aarch64.rpm a385e0c59b1002bd94b0bdb03d74e8cd12f23f60247e272c2429be4b5c10592b perl-if-0.61.000-512.2.el10_0.noarch.rpm 5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f perl-Hash-Util-FieldHash-1.27-512.2.el10_0.aarch64.rpm 0ca9d9424dd9cbccea743ee91fcfbc6d4811be0c6dfd4781212fe8ebcea20805 perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280 perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280 perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280 perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280 perl-I18N-Langinfo-0.24-512.2.el10_0.aarch64.rpm bc9c9667e65d31825104919960b5459ee7874e970a1c9a1f9ed1bc02c3c5de6c perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm 76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8 perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm 76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8 perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm 76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8 perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm 76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8 perl-if-0.61.000-512.2.el10_0.noarch.rpm 5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f perl-if-0.61.000-512.2.el10_0.noarch.rpm 5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f perl-if-0.61.000-512.2.el10_0.noarch.rpm 5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f perl-interpreter-5.40.2-512.2.el10_0.aarch64.rpm a9851763a8da1f4a639dcb654aeefbe2a9112fc0e691b3fa0ae061081857f389 perl-IO-1.55-512.2.el10_0.aarch64.rpm 7276cb0bf769d5333463a77d55d39bb1fbf4c1b0e3595261c2b3131793ed49a2 perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm 86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm 86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm 86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm 86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b perl-less-0.03-512.2.el10_0.noarch.rpm b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d perl-less-0.03-512.2.el10_0.noarch.rpm b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d perl-less-0.03-512.2.el10_0.noarch.rpm b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d perl-less-0.03-512.2.el10_0.noarch.rpm b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d perl-lib-0.65-512.2.el10_0.aarch64.rpm 2e52144d22a3433b883b64c5e4466d57302c63ad36e73907e172164b1019bca5 perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm 7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm 7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm 7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm 7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d perl-libs-5.40.2-512.2.el10_0.aarch64.rpm 2f3935015b179b436c28850455f7dc954d9a5c432222102fd097a53f0641960d perl-locale-1.12-512.2.el10_0.noarch.rpm a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18 perl-locale-1.12-512.2.el10_0.noarch.rpm a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18 perl-locale-1.12-512.2.el10_0.noarch.rpm a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18 perl-locale-1.12-512.2.el10_0.noarch.rpm a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18 perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm 39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6 perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm 39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6 perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm 39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6 perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm 39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6 perl-macros-5.40.2-512.2.el10_0.noarch.rpm c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf perl-macros-5.40.2-512.2.el10_0.noarch.rpm c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf perl-macros-5.40.2-512.2.el10_0.noarch.rpm c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf perl-macros-5.40.2-512.2.el10_0.noarch.rpm c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm 6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31 perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm 6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31 perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm 6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31 perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm 6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31 perl-Memoize-1.16-512.2.el10_0.noarch.rpm a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207 perl-Memoize-1.16-512.2.el10_0.noarch.rpm a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207 perl-Memoize-1.16-512.2.el10_0.noarch.rpm a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207 perl-Memoize-1.16-512.2.el10_0.noarch.rpm a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207 perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm 3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm 3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm 3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm 3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc perl-mro-1.29-512.2.el10_0.aarch64.rpm 21dc14812bb8301c026a0e1463785ddac818d2a445b5ebdc202b95ab7de783d9 perl-NDBM_File-1.17-512.2.el10_0.aarch64.rpm 0af6555aed977f6ffb264dfed57449b1f6fec73d5f4613ff02c6383046a9ce9d perl-Net-1.04-512.2.el10_0.noarch.rpm 589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f perl-Net-1.04-512.2.el10_0.noarch.rpm 589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f perl-Net-1.04-512.2.el10_0.noarch.rpm 589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f perl-Net-1.04-512.2.el10_0.noarch.rpm 589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f perl-NEXT-0.69-512.2.el10_0.noarch.rpm 6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107 perl-NEXT-0.69-512.2.el10_0.noarch.rpm 6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107 perl-NEXT-0.69-512.2.el10_0.noarch.rpm 6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107 perl-NEXT-0.69-512.2.el10_0.noarch.rpm 6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107 perl-ODBM_File-1.18-512.2.el10_0.aarch64.rpm a6c86cc35741c32f00e548e37b834fcc2d7359a1ed524a9bc303601117040921 perl-Opcode-1.65-512.2.el10_0.aarch64.rpm 85ac36e06f9409698d9f00a3c5d0880a47180a2eb0051684f725a3cf1f3bd994 perl-open-1.13-512.2.el10_0.noarch.rpm e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa perl-open-1.13-512.2.el10_0.noarch.rpm e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa perl-open-1.13-512.2.el10_0.noarch.rpm e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa perl-open-1.13-512.2.el10_0.noarch.rpm e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa perl-overload-1.37-512.2.el10_0.noarch.rpm ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f perl-overload-1.37-512.2.el10_0.noarch.rpm ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f perl-overload-1.37-512.2.el10_0.noarch.rpm ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f perl-overload-1.37-512.2.el10_0.noarch.rpm ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f perl-overloading-0.02-512.2.el10_0.noarch.rpm 418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b perl-overloading-0.02-512.2.el10_0.noarch.rpm 418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b perl-overloading-0.02-512.2.el10_0.noarch.rpm 418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b perl-overloading-0.02-512.2.el10_0.noarch.rpm 418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b perl-ph-5.40.2-512.2.el10_0.aarch64.rpm 22e97580f74820a2b1d63970c46faaed8b5b2544aa117f6e35ee650c1c3fb836 perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm 9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16 perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm 9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16 perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm 9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16 perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm 9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16 perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm 56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87 perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm 56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87 perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm 56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87 perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm 56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87 perl-POSIX-2.20-512.2.el10_0.aarch64.rpm 27c6ea27094bf56bb74de3ab820198d953163372c546871f620ef1d9a791cc52 perl-Safe-2.46-512.2.el10_0.noarch.rpm d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d perl-Safe-2.46-512.2.el10_0.noarch.rpm d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d perl-Safe-2.46-512.2.el10_0.noarch.rpm d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d perl-Safe-2.46-512.2.el10_0.noarch.rpm d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm 7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061 perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm 7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061 perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm 7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061 perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm 7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061 perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm 4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm 4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm 4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm 4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm 15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164 perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm 15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164 perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm 15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164 perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm 15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164 perl-sigtrap-1.10-512.2.el10_0.noarch.rpm d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819 perl-sigtrap-1.10-512.2.el10_0.noarch.rpm d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819 perl-sigtrap-1.10-512.2.el10_0.noarch.rpm d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819 perl-sigtrap-1.10-512.2.el10_0.noarch.rpm d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819 perl-sort-2.05-512.2.el10_0.noarch.rpm 9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867 perl-sort-2.05-512.2.el10_0.noarch.rpm 9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867 perl-sort-2.05-512.2.el10_0.noarch.rpm 9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867 perl-sort-2.05-512.2.el10_0.noarch.rpm 9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867 perl-subs-1.04-512.2.el10_0.noarch.rpm 6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173 perl-subs-1.04-512.2.el10_0.noarch.rpm 6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173 perl-subs-1.04-512.2.el10_0.noarch.rpm 6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173 perl-subs-1.04-512.2.el10_0.noarch.rpm 6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173 perl-Symbol-1.09-512.2.el10_0.noarch.rpm e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7 perl-Symbol-1.09-512.2.el10_0.noarch.rpm e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7 perl-Symbol-1.09-512.2.el10_0.noarch.rpm e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7 perl-Symbol-1.09-512.2.el10_0.noarch.rpm e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7 perl-Sys-Hostname-1.25-512.2.el10_0.aarch64.rpm 7baff002fb0be478168ba578e78d829393e5fc5ffe6c67d17ceb20864b8af143 perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0 perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0 perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0 perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0 perl-Test-1.31-512.2.el10_0.noarch.rpm 7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99 perl-Test-1.31-512.2.el10_0.noarch.rpm 7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99 perl-Test-1.31-512.2.el10_0.noarch.rpm 7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99 perl-Test-1.31-512.2.el10_0.noarch.rpm 7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99 perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm 25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586 perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm 25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586 perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm 25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586 perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm 25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586 perl-Thread-3.05-512.2.el10_0.noarch.rpm 491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6 perl-Thread-3.05-512.2.el10_0.noarch.rpm 491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6 perl-Thread-3.05-512.2.el10_0.noarch.rpm 491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6 perl-Thread-3.05-512.2.el10_0.noarch.rpm 491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6 perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm 638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm 638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm 638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm 638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb perl-Tie-4.6-512.2.el10_0.noarch.rpm 5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e perl-Tie-4.6-512.2.el10_0.noarch.rpm 5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e perl-Tie-4.6-512.2.el10_0.noarch.rpm 5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e perl-Tie-4.6-512.2.el10_0.noarch.rpm 5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e perl-Tie-File-1.09-512.2.el10_0.noarch.rpm 979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa perl-Tie-File-1.09-512.2.el10_0.noarch.rpm 979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa perl-Tie-File-1.09-512.2.el10_0.noarch.rpm 979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa perl-Tie-File-1.09-512.2.el10_0.noarch.rpm 979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6 perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6 perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6 perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6 perl-Time-1.04-512.2.el10_0.noarch.rpm 9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f perl-Time-1.04-512.2.el10_0.noarch.rpm 9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f perl-Time-1.04-512.2.el10_0.noarch.rpm 9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f perl-Time-1.04-512.2.el10_0.noarch.rpm 9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f perl-Time-Piece-1.3401-512.2.el10_0.aarch64.rpm af73491311a4636cc0421836471909daf4e99144a50192a9fc567d7a15d02147 perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm 8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm 8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm 8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm 8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e perl-User-pwent-1.05-512.2.el10_0.noarch.rpm 61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68 perl-User-pwent-1.05-512.2.el10_0.noarch.rpm 61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68 perl-User-pwent-1.05-512.2.el10_0.noarch.rpm 61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68 perl-User-pwent-1.05-512.2.el10_0.noarch.rpm 61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68 perl-utils-5.40.2-512.2.el10_0.noarch.rpm c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8 perl-utils-5.40.2-512.2.el10_0.noarch.rpm c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8 perl-utils-5.40.2-512.2.el10_0.noarch.rpm c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8 perl-utils-5.40.2-512.2.el10_0.noarch.rpm c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8 perl-vars-1.05-512.2.el10_0.noarch.rpm 877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380 perl-vars-1.05-512.2.el10_0.noarch.rpm 877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380 perl-vars-1.05-512.2.el10_0.noarch.rpm 877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380 perl-vars-1.05-512.2.el10_0.noarch.rpm 877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380 perl-vmsish-1.04-512.2.el10_0.noarch.rpm b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7 perl-vmsish-1.04-512.2.el10_0.noarch.rpm b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7 perl-vmsish-1.04-512.2.el10_0.noarch.rpm b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7 perl-vmsish-1.04-512.2.el10_0.noarch.rpm b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7 RLSA-2025:12064 Important: unbound security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for unbound. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix(es): * unbound: Unbound Cache poisoning (CVE-2025-5994) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms python3-unbound-1.20.0-12.el10_0.aarch64.rpm 1370cfd438a1ead65254034ff22f42341a9cd37994c533f8093bbddfeb0bfcc8 unbound-1.20.0-12.el10_0.aarch64.rpm dbcd0ba597e2da1a185f6534aa7a42e63ddbc9743429b000051db0d33c781787 unbound-anchor-1.20.0-12.el10_0.aarch64.rpm eb243da277db7cc9f15bca492e32ea78224d599af6c4fc65a95799742a1bbc41 unbound-dracut-1.20.0-12.el10_0.aarch64.rpm e5a245971fe91032608d7a4face7670c8860ab4450a3f19cfc23541966aad76c unbound-libs-1.20.0-12.el10_0.aarch64.rpm 450c1635f509aa9b4c4ec07883f5aa523e32d990e70c7d09fabb2f476fa46b55 RLSA-2025:12188 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028) * firefox: thunderbird: Memory safety bugs (CVE-2025-8035) * firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031) * firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027) * firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030) * firefox: Memory safety bugs (CVE-2025-8034) * firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033) * firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032) * firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-128.13.0-3.el10_0.aarch64.rpm 72301ddc442e46f2e4bbcacd1ad46a528f321c82928095195d8c4768ec0792f2 RLSA-2025:12850 Moderate: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms opentelemetry-collector-0.127.0-1.el10_0.aarch64.rpm 10803eb9084883de2678d983a79c8b57997f2993f1a7089f6fc3f22a33f27d69 RLSA-2025:12862 Moderate: gdk-pixbuf2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms gdk-pixbuf2-2.42.12-4.el10_0.aarch64.rpm bd44c505cf720205e8221654c6dcf3035e5d4d9b57dd5800f78a3763b1801c7c gdk-pixbuf2-devel-2.42.12-4.el10_0.aarch64.rpm d33cb7dc0fd2cf6a8ef78fd6a1f5f9be9e22d5099a6f91a1b387b4a5e98cf689 gdk-pixbuf2-modules-2.42.12-4.el10_0.aarch64.rpm 5dea460b53ee2e034aa08c6a2bf28bccec8b55d03e3602e94ab4b9d196c9ef26 RLSA-2025:13674 Important: toolbox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for toolbox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI. Security Fix(es): * nvidia-container-toolkit: Privilege Escalation via Hook Initialization in NVIDIA Container Toolkit (CVE-2025-23266) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms toolbox-0.2-1.el10_0.aarch64.rpm 639c7133a6d4af439f5eecb2d41d37a4b71da036189ad7828cfc641e07ce261b RLSA-2025:13941 Important: golang security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for golang. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The golang packages provide the Go programming language compiler. Security Fix(es): * cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms golang-1.24.6-1.el10_0.aarch64.rpm 59c4a451d7e6bc7ba104db85f1cd04335fd889acf03c1a8caa202df30ea0fd19 golang-bin-1.24.6-1.el10_0.aarch64.rpm 1addd829d2a39b4f5d084e7c3e491f3295c8bb371eeff61b8b797bfdda6d755c golang-docs-1.24.6-1.el10_0.noarch.rpm c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1 golang-docs-1.24.6-1.el10_0.noarch.rpm c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1 golang-docs-1.24.6-1.el10_0.noarch.rpm c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1 golang-docs-1.24.6-1.el10_0.noarch.rpm c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1 golang-misc-1.24.6-1.el10_0.noarch.rpm 9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7 golang-misc-1.24.6-1.el10_0.noarch.rpm 9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7 golang-misc-1.24.6-1.el10_0.noarch.rpm 9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7 golang-misc-1.24.6-1.el10_0.noarch.rpm 9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7 golang-race-1.24.6-1.el10_0.aarch64.rpm 5d1a671f785bb5cd44206e06a59fd343c9068187a5c579e69090637f64b33b2b golang-src-1.24.6-1.el10_0.noarch.rpm aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9 golang-src-1.24.6-1.el10_0.noarch.rpm aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9 golang-src-1.24.6-1.el10_0.noarch.rpm aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9 golang-src-1.24.6-1.el10_0.noarch.rpm aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9 golang-tests-1.24.6-1.el10_0.noarch.rpm e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491 golang-tests-1.24.6-1.el10_0.noarch.rpm e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491 golang-tests-1.24.6-1.el10_0.noarch.rpm e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491 golang-tests-1.24.6-1.el10_0.noarch.rpm e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491 go-toolset-1.24.6-1.el10_0.aarch64.rpm d61fdb69cf82dacd7aef544a67bcd589059558cf5a0caa2a1b6bbe641b2d6433 RLSA-2025:13944 Important: openjpeg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for openjpeg2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenJPEG is an open source library for reading and writing image files in JPEG2000 format. Security Fix(es): * openjpeg: OpenJPEG OOB heap memory write (CVE-2025-54874) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms openjpeg2-2.5.2-4.el10_0.1.aarch64.rpm 4e609ec883b5b2f0e00d991afc56c60e88c8c6e600d5bc065a92f32512084c84 RLSA-2025:14178 Important: tomcat9 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat9. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-52434) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat9-9.0.87-5.el10_0.3.noarch.rpm 74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae tomcat9-9.0.87-5.el10_0.3.noarch.rpm 74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae tomcat9-9.0.87-5.el10_0.3.noarch.rpm 74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae tomcat9-9.0.87-5.el10_0.3.noarch.rpm 74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1 tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1 tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1 tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1 tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm 27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01 tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm 27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01 tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm 27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01 tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm 27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01 tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm 661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm 661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm 661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm 661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751 tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751 tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751 tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751 tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm 56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm 56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm 56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm 56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm 197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3 tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm 197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3 tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm 197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3 tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm 197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3 tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0 tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0 tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0 tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0 RLSA-2025:14179 Important: tomcat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for tomcat. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988) * tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125) * apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976) * tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989) * tomcat: Apache Tomcat denial of service (CVE-2025-52520) * tomcat: Apache Tomcat denial of service (CVE-2025-53506) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms tomcat-10.1.36-1.el10_0.2.noarch.rpm ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b tomcat-10.1.36-1.el10_0.2.noarch.rpm ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b tomcat-10.1.36-1.el10_0.2.noarch.rpm ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b tomcat-10.1.36-1.el10_0.2.noarch.rpm ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556 tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556 tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556 tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556 tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm 40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm 40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm 40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm 40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625 tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625 tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625 tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625 tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834 tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834 tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834 tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834 RLSA-2025:14417 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-128.14.0-2.el10_0.aarch64.rpm 8021d23980e6eaf4d756b751caba4f8e299816ed4d5872891a6b8298ac454d93 RLSA-2025:14592 Important: aide security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for aide. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions. Security Fix(es): * aide: improper output neutralization enables bypassing (CVE-2025-54389) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms aide-0.18.6-8.el10_0.2.aarch64.rpm 31c3c97e21cf56d8aa6416f5084fbb010eb003765b5e8fbfe57073c1f13aaf61 RLSA-2025:14625 Moderate: mod_http2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mod_http2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers. Security Fix(es): * httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mod_http2-2.0.29-2.el10_0.1.aarch64.rpm b6d8d920e34e84024b1ddee381bc1ae8530e1c65de09c17aa73e349bfab8e866 RLSA-2025:14826 Important: postgresql16 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for postgresql16. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package. Security Fix(es): * postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715) * postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms postgresql-16.10-1.el10_0.aarch64.rpm 6fffa109992b6454304b1d391ba602e5f28410bc97766498ddb55fe024ce53df postgresql-contrib-16.10-1.el10_0.aarch64.rpm 7ca2027c04188036e6a035e6016a6c4ebecf6b35ba301c8f38e6fdd3aec1325d postgresql-docs-16.10-1.el10_0.aarch64.rpm 4cecd69122d8c9ab4d78e5c69f1e5057aa29dd1459d7823c0819fdfc76167e87 postgresql-plperl-16.10-1.el10_0.aarch64.rpm da5043babcfae9dfa958426dee7a19fa1cc2a618b7684986eeab66de87cac094 postgresql-plpython3-16.10-1.el10_0.aarch64.rpm 9a9e2fcc50ea01f044d0e5629201d6f2ca40ab7ef10752da32b418d7e35f830f postgresql-pltcl-16.10-1.el10_0.aarch64.rpm 78d3444758c3b1cc167b979457fbbcb9de80f29c96de4d4f67f6e4929472c256 postgresql-private-devel-16.10-1.el10_0.aarch64.rpm 0b2e016dd46a800371eb71c1939c40e6d172038e9a962ce07370b598c9f6db96 postgresql-private-libs-16.10-1.el10_0.aarch64.rpm f28d394ad17a0fb46a3aa8b0c68037aa80307dddb12d414980d8667debbe8344 postgresql-server-16.10-1.el10_0.aarch64.rpm 4c475ef0f895d22b7404a4a4ec0fdb6f5146bd16e60c93ec312f3505cfdc0225 postgresql-server-devel-16.10-1.el10_0.aarch64.rpm 89ff8d4e1082e7af2a4ca47246a0e9e5501cebe5f9537737322b55c32cecd185 postgresql-static-16.10-1.el10_0.aarch64.rpm 541ce40e8b5854fd4be38b2235915cd55825791ff61cc28c63d568c01ac1e464 postgresql-test-16.10-1.el10_0.aarch64.rpm b089517a0cc70ad45209bb96927af55990fb39cff829f60cb5ca0c09109947af postgresql-upgrade-16.10-1.el10_0.aarch64.rpm 6248863faf3daff9633b7fb37c0c0e835999f3f74e6300666a2ed3f58489d483 postgresql-upgrade-devel-16.10-1.el10_0.aarch64.rpm e712801f63431317bca28ca4cc74b9cdb72d9500e7c2c989c2fda312f302bb56 RLSA-2025:14844 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182) * thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179) * thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180) * thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181) * thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-128.14.0-3.el10_0.aarch64.rpm 740a1e1c00ccd393792876da789b99894f6702351d1ed5d18a76e7d0b7d82760 RLSA-2025:15020 Important: udisks2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for udisks2. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies. Security Fix(es): * udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libudisks2-2.10.90-5.el10_0.1.aarch64.rpm 0576af01bfa34f97811294dd23649d946e67255b5e30f3e3684dd32e175f6fd0 udisks2-2.10.90-5.el10_0.1.aarch64.rpm 7077c6062ab0878227b0dc981b6396c7ec6964d1f666d4fca42a9a7851999d65 udisks2-iscsi-2.10.90-5.el10_0.1.aarch64.rpm a4eff6d0580b9a043c2fff9a6d8e229565fb613615167bb049d7c3e26fc7aa5e udisks2-lsm-2.10.90-5.el10_0.1.aarch64.rpm 0a5578d363ffbf45779aec5fb24d000b5e950f4de4a72ec5eedc83f9868ce725 udisks2-lvm2-2.10.90-5.el10_0.1.aarch64.rpm 5eed3dffdec9ade14c3424fc71e46b97258410ca2d4f95e11e75d3e0d9cb0e13 RLSA-2025:15095 Moderate: httpd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for httpd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) * httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms httpd-2.4.63-1.el10_0.2.aarch64.rpm 6cea1701c9dae5042886268c3d16dd16eb74f687cbbf81bb359c3122d71ca8ab httpd-core-2.4.63-1.el10_0.2.aarch64.rpm 3bc795192ef970272157cb8f0ee59091f94e1459e646481fa715f0b1f19069e0 httpd-devel-2.4.63-1.el10_0.2.aarch64.rpm f31cb41a72f691d39906d2ed904f58855cf86e69802da581511a8cf893155e37 httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm 5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673 httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm 5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673 httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm 5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673 httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm 5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673 httpd-manual-2.4.63-1.el10_0.2.noarch.rpm f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887 httpd-manual-2.4.63-1.el10_0.2.noarch.rpm f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887 httpd-manual-2.4.63-1.el10_0.2.noarch.rpm f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887 httpd-manual-2.4.63-1.el10_0.2.noarch.rpm f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887 httpd-tools-2.4.63-1.el10_0.2.aarch64.rpm 7556909c3606c7a8436c962294c9abd4f7195b88aad4e5c0c7f7ae11d7d1813a mod_ldap-2.4.63-1.el10_0.2.aarch64.rpm a4f0d41ba3250620e7d50196347cee63bcf6eb1d8f2b608a12f4c97f6e2aadc2 mod_lua-2.4.63-1.el10_0.2.aarch64.rpm 9e6193fb99115fab98a16df8ce3e000638ad92a254b0eee086ceef4eab92fa6b mod_proxy_html-2.4.63-1.el10_0.2.aarch64.rpm bf06e5422ccff323dc4206d297cb640f420668ec2fd3cc48792e2ce774bec0d5 mod_session-2.4.63-1.el10_0.2.aarch64.rpm 33f6fc88db7abf9f03897c609e8bb731b3dddb06abd29f90a63923bb0dbdf872 mod_ssl-2.4.63-1.el10_0.2.aarch64.rpm e7397ecfd5a8c65afea39be46bdb4b456f118fd465023b063b24554e3b0ad0a2 RLSA-2025:15699 Moderate: mysql-selinux and mysql8.4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for mysql8.4, mysql-selinux. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files. Security Fix(es): * openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176) * mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688) * mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699) * mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687) * mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696) * mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705) * mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575) * mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685) * mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581) * mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703) * mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693) * mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584) * mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684) * curl: libcurl: WebSocket endless loop (CVE-2025-5399) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092) * mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077) * mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085) * mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082) * mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087) * mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084) * mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100) * mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098) * mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096) * mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms mysql8.4-8.4.6-2.el10_0.aarch64.rpm 697d4d8ec6f4f03ac95959e09ff1df722284dc7d4d9efd405f98fe735d728101 mysql8.4-common-8.4.6-2.el10_0.noarch.rpm b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c mysql8.4-common-8.4.6-2.el10_0.noarch.rpm b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c mysql8.4-common-8.4.6-2.el10_0.noarch.rpm b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c mysql8.4-common-8.4.6-2.el10_0.noarch.rpm b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm 4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0 mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm 4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0 mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm 4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0 mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm 4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0 mysql8.4-libs-8.4.6-2.el10_0.aarch64.rpm 0e8a8e33180134c110f049ed836265a2189c048e6b745871cc1f7a21bce6d8d7 mysql8.4-server-8.4.6-2.el10_0.aarch64.rpm aa48465ce6e4fb50c8f06114894f5c2663a05689cf7717ef8dade8dd89c8828f mysql-selinux-1.0.14-1.el10_0.noarch.rpm 6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025 mysql-selinux-1.0.14-1.el10_0.noarch.rpm 6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025 mysql-selinux-1.0.14-1.el10_0.noarch.rpm 6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025 mysql-selinux-1.0.14-1.el10_0.noarch.rpm 6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025 RLSA-2025:15901 Important: podman security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * podman: Podman kube play command may overwrite host files (CVE-2025-9566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms podman-5.4.0-13.el10_0.aarch64.rpm 8a80c615a19cddafc08963572e8f25bdf1fdc3169629e354ce3ccae869e3dfaa podman-docker-5.4.0-13.el10_0.noarch.rpm d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963 podman-docker-5.4.0-13.el10_0.noarch.rpm d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963 podman-docker-5.4.0-13.el10_0.noarch.rpm d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963 podman-docker-5.4.0-13.el10_0.noarch.rpm d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963 podman-remote-5.4.0-13.el10_0.aarch64.rpm 1af574e69db90adc73d42f81ac65965a1a5622c8a78c2c848b369eed974efd43 RLSA-2025:16109 Important: firefox security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms firefox-140.3.0-1.el10_0.aarch64.rpm b8d13747225299e999c26eac1088fe785b0460eb93f7e78e6e10796e4c5db3cf RLSA-2025:16157 Important: thunderbird security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527) * firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532) * firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528) * firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537) * firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536) * firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms thunderbird-140.3.0-1.el10_0.aarch64.rpm 9b8038f0576d6d9138d123cf6e5ae82d622d4492cd344cdc572d50ad7a045d08 RLSA-2025:16432 Moderate: opentelemetry-collector security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for opentelemetry-collector. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry Security Fix(es): * net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms opentelemetry-collector-0.127.0-3.el10_0.aarch64.rpm 9473a67556c27fd9cb2e81fce975b6ee3cf4b388830c31c03eca88212dc79f40 RLSA-2025:16428 Moderate: libtpms security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 10 1 Moderate An update is available for libtpms. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines. Security Fix(es): * libtpms: Libtpms Out-of-Bounds Read Vulnerability (CVE-2025-49133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-appstream-rpms libtpms-0.9.6-11.el10_0.aarch64.rpm 0fbd2094685d8174e0296a6f7114216da3410a37a87cfb812b3b843e7124a1ae