RLSA-2025:17085
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipa-client-4.12.2-15.el10_0.4.s390x.rpm
c5ec511591d51314b0f3a3ee45d105ce5a861da5170e09abce69c29eed55c0f1
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-encrypted-dns-4.12.2-15.el10_0.4.s390x.rpm
7e1b74a3a39a84369d72375da987593332f1c481f32f066895d5618f2eb748a6
ipa-client-epn-4.12.2-15.el10_0.4.s390x.rpm
9655c60d014eb0255ae1b20b285cf0062ddce41f99011b89052e060c5954565c
ipa-client-samba-4.12.2-15.el10_0.4.s390x.rpm
89cd3f42c9677aed40af8de9e96ab9a1e132fa66657d03ce3b9f4fc67d834d9d
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-server-4.12.2-15.el10_0.4.s390x.rpm
5fb38176ea6bfa97639343c4a6b0bbe3907cc2d021bf74d2cba777f75df10d70
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-encrypted-dns-4.12.2-15.el10_0.4.s390x.rpm
d661259e8c3dff2e664b816d21e247375fb4287fcc59c82eac446e418c3528ef
ipa-server-trust-ad-4.12.2-15.el10_0.4.s390x.rpm
6b8a355afdc37627dc534fc429112e27fcb49963665ab385ccfafe63038b68c7
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
RLSA-2025:21485
Moderate: java-25-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for java-25-openjdk.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit.
Security Fix(es):
* JDK: Enhance Path Factories (CVE-2025-53066)
* JDK: Enhance Certificate Handling (CVE-2025-53057)
* JDK: Enhance String Handling (CVE-2025-61748)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Note that the OpenJDK 25 package does not yet include FIPS support. This is expected to be reinstated in a future update.
none-appstream-rpms
java-25-openjdk-25.0.1.0.8-2.el10.s390x.rpm
c080fe224751ba406284ebab5058fd0df2be946b288e008081c0fe0e845d6538
java-25-openjdk-demo-25.0.1.0.8-2.el10.s390x.rpm
ba2623ba817f87eeef271448efbcc7efdb7dcba8765733fe6b61bc914b8d2e2e
java-25-openjdk-devel-25.0.1.0.8-2.el10.s390x.rpm
adc20c8a536e3acfff3efc5338da3350496b0ab93cbdb83d4bb4a712a5137ebb
java-25-openjdk-headless-25.0.1.0.8-2.el10.s390x.rpm
9b8df49a6eb2fc480b2eb4dece668782ab760c6788801fed5cb5cc4c341693d4
java-25-openjdk-javadoc-25.0.1.0.8-2.el10.s390x.rpm
b5386f14f38a3952bd080f1316004ff0cc5cd35dba984a0b10fcbf293faa8396
java-25-openjdk-javadoc-zip-25.0.1.0.8-2.el10.s390x.rpm
094b8fbf3a5c1b66463216448c7d9c530657ea7f9514176d69333ff786444c4e
java-25-openjdk-jmods-25.0.1.0.8-2.el10.s390x.rpm
4210cc956435ef952394a5ee5dd9f45bdc1988baa928fa73c22feefe57e0a1f8
java-25-openjdk-src-25.0.1.0.8-2.el10.s390x.rpm
012e413a46e4fddb99921e581da5e2371806c0e939be03c1ae59d77235fd60f4
java-25-openjdk-static-libs-25.0.1.0.8-2.el10.s390x.rpm
94cf0b5f7c5927361e44e5a770b08a2c9550dc561900f27502c83db1b18136f6
RLSA-2025:21691
Important: haproxy security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for haproxy.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
Security Fix(es):
* haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
haproxy-3.0.5-4.el10_1.1.s390x.rpm
094fa21c9b9837284ae463a10c5f05339cf9ae288e99859c7d5502cfffca1010
RLSA-2025:21936
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.6-2.el10_1.s390x.rpm
77f3f50c2603a0370ac1474b3409e08d640d4187a81c4bfb86e46a8b35773b97
valkey-devel-8.0.6-2.el10_1.s390x.rpm
bcca35f069d7c68be5eaa34cd242f71ced239dcdd27997339ff00298cd54f15d
RLSA-2025:18320
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: firefox: Memory safety bugs (CVE-2025-11714)
* thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709)
* thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710)
* thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708)
* thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715)
* thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.4.0-2.el10_0.s390x.rpm
2ce0acfec02c317ce2ff5b966316bb45bfafe5919c2fa965d4c195755cadffe9
RLSA-2025:21816
Moderate: delve and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for golang, delve.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Go Programming Language.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-1.25.3-1.el10_1.s390x.rpm
ed54b753d05863400d1c0388cc5e81dc4bff98f689d292daa83930834fb394fd
golang-bin-1.25.3-1.el10_1.s390x.rpm
82ea11929d5031838c6c2ea8fbb884ab50d639cd441d026f2e4d35c85d8ed6dc
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-race-1.25.3-1.el10_1.s390x.rpm
c16ee0db4e98056433f8e3bf71858c3c3920d767f249df4b41856f22814e5a3e
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
go-toolset-1.25.3-1.el10_1.s390x.rpm
c9865168d26d805a8fff8fe6288192701fe6cd4c4e62ab287a32da7974d42096
RLSA-2025:18154
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* thunderbird: firefox: Memory safety bugs (CVE-2025-11714)
* thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709)
* thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710)
* thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708)
* thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715)
* thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.4.0-3.el10_0.s390x.rpm
b745c1b88c3740edff2dfb1ceddc58cd33cc4757a10d35d01d348ad6ff1e9c0d
RLSA-2025:18152
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-8.0-8.0.21-1.el10_0.s390x.rpm
9f3e4191438164ab4ae964bfd3cc6059239e30f3023f9246a8a046923e90049b
aspnetcore-runtime-dbg-8.0-8.0.21-1.el10_0.s390x.rpm
597df23baa29d0f420bf0a7fdfd180ce72c8460b199f7e75bc62ae2710b5838c
aspnetcore-targeting-pack-8.0-8.0.21-1.el10_0.s390x.rpm
5ed39a1b9c7002cc59aa1b5138b2db0fd43174fffd7c8a57be7a16a3b49cb38a
dotnet-apphost-pack-8.0-8.0.21-1.el10_0.s390x.rpm
7aafa05347af5f0367587de89b7bc7e1a6c8ea866ae65233eb74fdf926e901f4
dotnet-hostfxr-8.0-8.0.21-1.el10_0.s390x.rpm
b58d765494ac8664fb4a156a782e9d2ef43fedb657d42c4060b3a58676abfc1e
dotnet-runtime-8.0-8.0.21-1.el10_0.s390x.rpm
f28a44691f7a6c0b44d63f73e6ed5d5da5ab0db67de1d46532983826217666c2
dotnet-runtime-dbg-8.0-8.0.21-1.el10_0.s390x.rpm
57626005a51b45fd5aff5849d19d253403103478b1b5ab907ef26ae815f6b96b
dotnet-sdk-8.0-8.0.121-1.el10_0.s390x.rpm
53fe47813990c378a1250ecc3823bae051ce73070435201b0d6daa121a656f14
dotnet-sdk-dbg-8.0-8.0.121-1.el10_0.s390x.rpm
9c43ae06d7fb9274e2da224fe1fc5287d72927014262f6cb798b8b34baabf5b1
dotnet-targeting-pack-8.0-8.0.21-1.el10_0.s390x.rpm
d1a133213400ff21522244140402e7734a4f6a677ca59e8bbf38a8822936bebb
dotnet-templates-8.0-8.0.121-1.el10_0.s390x.rpm
6a5c8186ebd77064fdbcc25b601f8563bb71257e2127147ed7e8c0f0c4045a3c
RLSA-2025:18153
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-9.0-9.0.10-1.el10_0.s390x.rpm
d560147142c31709fb3a5e891936179d517559579ed8fb82347f9ed78b6d3b67
aspnetcore-runtime-dbg-9.0-9.0.10-1.el10_0.s390x.rpm
3f927fe0bfa32f91fe078dfb96eda38a0ca804cababaa4f73fbdef0a8fbe15a5
aspnetcore-targeting-pack-9.0-9.0.10-1.el10_0.s390x.rpm
f08831c02f755e1a7c9ae3c9476daf74ec062b46b64e3a0d173c9a46f1365343
dotnet-apphost-pack-9.0-9.0.10-1.el10_0.s390x.rpm
3f4988c7ca1ced1a736f5af9f7556e4e85e815f8058bcc87b904b25efa4c314e
dotnet-host-9.0.10-1.el10_0.s390x.rpm
74af3077e96962a276ca8c9b1a94e6624b3db37f208b0150d20768221983dde5
dotnet-hostfxr-9.0-9.0.10-1.el10_0.s390x.rpm
03637244869afa32a98bef203a8c9daed27cdd537a58ea81f1222333b4e17961
dotnet-runtime-9.0-9.0.10-1.el10_0.s390x.rpm
b36aedc0e5019ed861796443a3b3796ebd8e046dd6f8fdcddfcd562df66fa2e4
dotnet-runtime-dbg-9.0-9.0.10-1.el10_0.s390x.rpm
5815ed43e6a0f1bfc97645a0e2c6b148ab480efc1a1ae5ca53bd13d03a58cef9
dotnet-sdk-9.0-9.0.111-1.el10_0.s390x.rpm
8b6e03e3b61cfa767150c615c147ef6d62e403b5cc8c52cdf1e868e34c89d6f9
dotnet-sdk-dbg-9.0-9.0.111-1.el10_0.s390x.rpm
4e347799edeed9cf01b6a3146ebaa70ee1022782ea723f2683c8fc56ab088d88
dotnet-targeting-pack-9.0-9.0.10-1.el10_0.s390x.rpm
0829e751702bb10466c8d3ac74eda8e5da134f333e084d0bef70f2014b09177b
dotnet-templates-9.0-9.0.111-1.el10_0.s390x.rpm
495494986e6f518e98851c7f93f6b5b538df3194b1da43ff7d1cc74546043e54
netstandard-targeting-pack-2.1-9.0.111-1.el10_0.s390x.rpm
30e52217592f9cb656f9a4a2d1a312ae8df1aa1ed925841a8d6a49dc4b5c2041
RLSA-2025:18183
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_0.7.s390x.rpm
3f0a7f05127d06b6310895ab1fe144ac4bb57615e55bd34d9365cab286e9b71e
libsoup3-devel-3.6.5-3.el10_0.7.s390x.rpm
cd394ed8bb763a76b05fe28af56f6e23c56adad0ebf5b5e5c01778324416d98a
RLSA-2025:19156
Important: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libtiff.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Libtiff Write-What-Where (CVE-2025-9900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libtiff-4.6.0-6.el10_0.1.s390x.rpm
57e92a9cf7fb7a6cf070aa996c12f5c6857347b54098ccc27ffc4a9e8635ad66
libtiff-devel-4.6.0-6.el10_0.1.s390x.rpm
065f458398c83ac39f40acb2919a33013332682b6813f7a4a3573ee997f410cc
RLSA-2025:19435
Moderate: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)
* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)
* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
xorg-x11-server-Xwayland-24.1.5-5.el10_0.s390x.rpm
e049e8795c6b8e036741b0b4b55e9d7be1236c4b44723d9191dbaf14351ea188
RLSA-2025:19675
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.6-1.el10_0.s390x.rpm
5eda418209d516d9d86932511b0d5a58debbb46aff7031d93f5ed8549790f56e
valkey-devel-8.0.6-1.el10_0.s390x.rpm
442c790fe70772cc76511cff21a1f1abfc85efcf78618f6332ee27c8d13cf2fc
RLSA-2025:19720
Low: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Low
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_0.9.s390x.rpm
df32b1700638e1d6ce0d6ab6ec1f445365365494a8b4b1dbb43466ec7101fc33
libsoup3-devel-3.6.5-3.el10_0.9.s390x.rpm
a68faf88af01078608b39e8133026794b1e7a3fa468d860fd9996a718b97cc01
RLSA-2025:19772
Important: qt6-qtsvg security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for qt6-qtsvg.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices.
Security Fix(es):
* qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtsvg-6.8.1-1.el10_0.1.s390x.rpm
ba0e062ce5956e5a054e17e9d774bac0523dd9255a5b6eda73a973c4e6813492
qt6-qtsvg-devel-6.8.1-1.el10_0.1.s390x.rpm
10e433c09b8b8a1105685dcf7d118723bdc61b5b19810bc0ce917517984c710d
RLSA-2025:22012
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.41.6-1.el10_1.s390x.rpm
d7deb9d2a817c90c1f59f04df03cb6f222e9236dd1477b932b7d72b9f399b328
buildah-tests-1.41.6-1.el10_1.s390x.rpm
76500d86e81671da7cd3e747a7935b50755b855d2a3e4397569c361135931be6
RLSA-2025:22361
Moderate: qt6-qtquick3d security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for qt6-qtquick3d.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Qt 6 Quick3D library.
Security Fix(es):
* assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtquick3d-6.9.1-1.el10_1.1.s390x.rpm
10de78cdb9b91d25d85bf95603de8b4f5d92e75ce4bcc8d58b7c70d3c8241da1
qt6-qtquick3d-devel-6.9.1-1.el10_1.1.s390x.rpm
9d1d1b8983e1d2c83662fd7a827d484d7f666876ab00627f80496ff11385f4d5
RLSA-2025:22394
Moderate: qt6-qtsvg security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for qt6-qtsvg.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices.
Security Fix(es):
* qtsvg: Uncontrolled recursion in Qt SVG module (CVE-2025-10728)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtsvg-6.9.1-2.el10_1.2.s390x.rpm
d52e38bd486ed427752fe8c6a8db82038bcc0b36ffab5f14e4bec9931e6fb3ef
qt6-qtsvg-devel-6.9.1-2.el10_1.2.s390x.rpm
4a758d54c5e85ef0cb9c2dbad6004f560d78c0a2bbd81e7697fff721736b7d76
RLSA-2025:23035
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
* firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
* firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
* firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.6.0-1.el10_1.s390x.rpm
8b94a60bb04235aee30d96579f8506dcc8ce04bdc2580db6ff44170e0f041c30
RLSA-2025:23008
Moderate: mysql8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for mysql8.4.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.
Security Fix(es):
* mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040)
* mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mysql8.4-8.4.7-1.el10_1.s390x.rpm
46c4cda16caec23d5dd40ca022aa28ede1c345e1d266e0ed3eeb8fb7dd0c1948
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-libs-8.4.7-1.el10_1.s390x.rpm
6b25876f6a21cdba604454363b8f57347d6ea61f6d493e313d6358e1d220f449
mysql8.4-server-8.4.7-1.el10_1.s390x.rpm
39c6f08cc27cdadd9315f9a9d28975a130eb92093a2ddd884bf79455cefef724
RLSA-2025:23052
Important: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
RLSA-2025:23050
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for tomcat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Denial of service (CVE-2025-61795)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
RLSA-2025:23083
Important: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: Access of Uninitialized Pointer in Wireshark (CVE-2025-13499)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
wireshark-4.4.2-4.el10_1.1.s390x.rpm
fea65606d271bc9c05a5662837de9e7c24b61ce01c6738b29d49ef816245c533
wireshark-cli-4.4.2-4.el10_1.1.s390x.rpm
92ad354e40d511dc0845c5cd6924faee7c612a9cf2db43a4c6067dbd8e697285
RLSA-2025:23088
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-21.el10_1.s390x.rpm
736f2ee3ac0b1a7ca95f1bafbbf394df6f50f2822a128300e72d25e8f2c0a7c7
grafana-selinux-10.2.6-21.el10_1.s390x.rpm
bdee0602491f2902d6323f716ff29de9c9ed2133767fd9509c8a34e8a55bcc3d
RLSA-2025:23139
Moderate: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion (CVE-2025-12105)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.7.s390x.rpm
40b2dd574be20068a9d8824098c50d6f2b1e2d278617d569487e2348cabdfdea
libsoup3-devel-3.6.5-3.el10_1.7.s390x.rpm
4a6dc12543435bdd0356156ce018f53ae2b01ff140ce49aa4f24a18b20eedd58
RLSA-2025:23201
Important: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for keylime.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Keylime: Registrar allows identity takeover via duplicate UUID registration (CVE-2025-13609)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
keylime-tools-7.12.1-11.el10_1.3.s390x.rpm
5b12f77bed971dbb937975e9c39af2a7d78a034bf77a0d804f3d8c5227134b97
keylime-verifier-7.12.1-11.el10_1.3.s390x.rpm
869205bb1ae2490783f4b575cd57dddfde12a41039185770a8d2603fddf2c288
python3-keylime-7.12.1-11.el10_1.3.s390x.rpm
964a761a9026d83540305ebd569a5dafb605e53ae180a2607f92574602e79dfb
keylime-7.12.1-11.el10_1.3.s390x.rpm
87922d1c16d51d8650799fd8e41541faf227b07e8f7dc60256b3f301764b6242
keylime-base-7.12.1-11.el10_1.3.s390x.rpm
d120e8160f7786e151094229da7a319ff93d638b8e46a280d07f350df24d6f52
keylime-registrar-7.12.1-11.el10_1.3.s390x.rpm
9d87b0017e3328df17ca13ca783a288e91f0e1acc210f005ecaf3758b369d115
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-tenant-7.12.1-11.el10_1.3.s390x.rpm
6b3b319999cc5b98ba16abe9e3797f381d7355e144daadb2d3a856694d33196e
RLSA-2025:20478
Moderate: zziplib security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for zziplib.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-appstream-rpms
zziplib-0.13.78-2.el10.s390x.rpm
a16e447699c63bd1e671f573cf74bd5efaadc92d7ab7ce1e37589a48e0516da1
zziplib-utils-0.13.78-2.el10.s390x.rpm
b411c09d0c8f90effce78b1a866bd1664608d7a1559c542da819074da557e0cd
RLSA-2025:21002
Important: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for squid.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects.
Security Fix(es):
* squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
squid-6.10-6.el10_1.1.s390x.rpm
78a71c1b593830b588fc629f4e22841cf3a8e9c9337266b13e733b0511f5fb91
RLSA-2025:20994
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipa-client-4.12.2-24.el10_1.1.s390x.rpm
b5f0ac2fa002f92deb579dfbffbb4bbd1be4dbd6200346da9096be1f318dcf32
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-encrypted-dns-4.12.2-24.el10_1.1.s390x.rpm
7f622a9452b88711a056498b4e11de2402c18da23dcfd4454a7dbb7231ca574b
ipa-client-epn-4.12.2-24.el10_1.1.s390x.rpm
80b574bb4a4ef2486eec8510af6c0ffda4c2ce5f1cf436aa577b163f99d91a9a
ipa-client-samba-4.12.2-24.el10_1.1.s390x.rpm
a54bdf8c28985ed0c5c99420ea5590cb272fe5209d9203e7ce36c70144cf1923
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-server-4.12.2-24.el10_1.1.s390x.rpm
02a4162976b019246b5125bc9a2e0f41230ba74ca3f5781e0f86077ac90f3d39
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-encrypted-dns-4.12.2-24.el10_1.1.s390x.rpm
47819e338d70de175be075e6cc29fe8f1d921b496be9b6fa9f756dfb81e69b92
ipa-server-trust-ad-4.12.2-24.el10_1.1.s390x.rpm
c6ab500a568b020683271c0880e3324575f7b0c89b4019096982a0b0bcd4f558
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
RLSA-2025:21032
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.6.s390x.rpm
d27c470f14c64e56306a8a438867ef750a6610f62ddb35464c43f79e7a2ecc77
libsoup3-devel-3.6.5-3.el10_1.6.s390x.rpm
e60bc2ccde55c492299bece3979425d9dd7094ec089accd53833f26771623e18
RLSA-2025:21037
Important: qt6-qtsvg security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for qt6-qtsvg.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices.
Security Fix(es):
* qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtsvg-6.9.1-2.el10_1.1.s390x.rpm
b45f7e68f81df6c22957d07dddb0725765f50928a0a0d8035646ceee51b120b4
qt6-qtsvg-devel-6.9.1-2.el10_1.1.s390x.rpm
89c8f025ceeb8f43663be6c99b1e39e2d0f8abf0425e0fad9eb5f4cd13a43e6b
RLSA-2025:21034
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for bind.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778)
* bind: Cache poisoning due to weak PRNG (CVE-2025-40780)
* bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
bind-9.18.33-10.el10_1.2.s390x.rpm
c641d62bb7b728c5bad186017530fe13ff3ea147a4a53e16bb762b66dd9057a2
bind-chroot-9.18.33-10.el10_1.2.s390x.rpm
2e1dfa1fe1df8730a25a6e6717d466dcf6b676bc2bf4b7831dd5e680fa2aa282
bind-dnssec-utils-9.18.33-10.el10_1.2.s390x.rpm
e2c47a9b87760c43bd5cae91c92b7b38066fa89987f7df2987883d361b40e382
bind-libs-9.18.33-10.el10_1.2.s390x.rpm
386c2136967ed2fca52d8f5e82dddc9d13a34de77f1c6e217183e43fad094c03
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-utils-9.18.33-10.el10_1.2.s390x.rpm
ed2397d2bf451013b74ae78f0fddc91f75f332435f139879da521d4e5971db9c
RLSA-2025:21142
Important: python-kdcproxy security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for python-kdcproxy.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088)
* python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
RLSA-2025:21220
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.6.0-6.el10_1.s390x.rpm
2331dee9f0f237222f658b0aae98a6a6da78c6fd44057a176cbc34da2ed508d0
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-remote-5.6.0-6.el10_1.s390x.rpm
8516a1f1dc8f802f60ad7590c3c552c9b558a7c981460c8140bbf87e731da581
RLSA-2025:21281
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018)
* firefox: Use-after-free in the Audio/Video component (CVE-2025-13014)
* firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016)
* firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019)
* firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020)
* firefox: Race condition in the Graphics component (CVE-2025-13012)
* firefox: Spoofing issue in Firefox (CVE-2025-13015)
* firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013)
* firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.5.0-2.el10_1.s390x.rpm
aba81bc6f8b00ca8505b12f21facdf7b1aafe565e37bddb00ffe6f6757d4ebf8
RLSA-2025:21843
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018)
* firefox: Use-after-free in the Audio/Video component (CVE-2025-13014)
* firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016)
* firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019)
* firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020)
* firefox: Race condition in the Graphics component (CVE-2025-13012)
* firefox: Spoofing issue in Firefox (CVE-2025-13015)
* firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013)
* firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.5.0-2.el10_1.s390x.rpm
6443ba24fa97052046adfccb8f8dfcbd8cff6aef30b2eb94a3f7130f836e2ded
RLSA-2025:23294
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-1.20.0-2.el10_1.s390x.rpm
76ec2236f0d8a1816e035c05940b80c067f94ad9725b01c2ae7b666eb2679861
skopeo-tests-1.20.0-2.el10_1.s390x.rpm
adeb9e16d11369c8b566a7ed3f53aa91bbd89b67c22142d53f84ae9c6885f08a
RLSA-2025:23295
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.6.0-8.el10_1.s390x.rpm
d9cca30a5d1afc87a26f172278b556a75135c745dda22e11e80128542c3ea6e1
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-remote-5.6.0-8.el10_1.s390x.rpm
8dce0170eefab2a07107ac3f68ba41933e86b15fb9ad689925a54acfe701dbec
RLSA-2025:23664
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation (CVE-2025-68156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.135.0-2.el10_1.s390x.rpm
ddd0e38e1f62c607dda45e1fc5f7b0d3e9dce4f3d6800579818bd2f210fe91b7
RLSA-2025:23667
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* git-lfs: Git LFS may write to arbitrary files via crafted symlinks (CVE-2025-26625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
git-lfs-3.6.1-4.el10_1.s390x.rpm
c6bb4385657c0a167441099202efb8e6e1369b4cd1935a39d376f1ac60e3dae8
RLSA-2025:23738
Important: mod_md security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for mod_md.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.
Security Fix(es):
* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_md-2.4.26-4.el10_1.s390x.rpm
bada7e4835306b65df0628978af4ff61d67710d727a51350bed04c1b953b4192
RLSA-2025:23932
Important: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for httpd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082)
* httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200)
* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
httpd-2.4.63-4.el10_1.3.s390x.rpm
e77358200666c9487856cb09ae709cff6904881cc955e047bdde013b6a27b6d0
httpd-core-2.4.63-4.el10_1.3.s390x.rpm
4d518623d67a0ef999fb2c793dc8d68a5199f0ece1dfb3bf8ee8e7749589b2b2
httpd-devel-2.4.63-4.el10_1.3.s390x.rpm
2400e79efc230fba921c3bab2c957dded21e1095cd3b12899f705880e5c75dd6
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-tools-2.4.63-4.el10_1.3.s390x.rpm
0dde7f88959e577c3fb79509baa9dae1583e68262119fe9d001759391a2fa7a0
mod_ldap-2.4.63-4.el10_1.3.s390x.rpm
3912589e1be9ebe1335ad346fe65277f1a09da6af9d73ceb2245009509aaa424
mod_lua-2.4.63-4.el10_1.3.s390x.rpm
de2ecbe3940e55c8d4d0ed783a434b510afb4dc6ca390d74486483893533d619
mod_proxy_html-2.4.63-4.el10_1.3.s390x.rpm
a000f5004c694eefc9ec5052f9a442127eaa7ae47c1cb25a2b8d0ea385e0e21d
mod_session-2.4.63-4.el10_1.3.s390x.rpm
3b49da8348d07e1440e4960100e4ac4fe116bce59e5b1054a1fd74fe1aea4974
mod_ssl-2.4.63-4.el10_1.3.s390x.rpm
6ffac653e245f98569ba5b74d01bd0c3f3967ce664905ea0aef3b48216a84896
RLSA-2025:23141
Moderate: ruby security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* resolv: Denial of Service in resolv gem (CVE-2025-24294)
* rexml: REXML denial of service (CVE-2025-58767)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ruby-3.3.10-11.el10_1.s390x.rpm
b6701ef738e884035c87b325d3fb33a903c64e070357ed58bba972f2fe903a0f
ruby-bundled-gems-3.3.10-11.el10_1.s390x.rpm
57d15d555a42054d6fc340a63d6c36790a2555fa9d1410a0dfcd2e6cc8b8f966
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-devel-3.3.10-11.el10_1.s390x.rpm
a9fb260589b1412eb9dc613abce1bb2edc661c7398f18443a975528034973ab8
rubygem-bigdecimal-3.1.5-11.el10_1.s390x.rpm
6239e9d1dcd244bc9504777b966a99b19cabed4f20229a82d4568d524363a46e
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-io-console-0.7.1-11.el10_1.s390x.rpm
a413ca21b4ce62fb9f36061b4572374b2444efa203f57493b20ae21a0d1d1db6
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-json-2.7.2-11.el10_1.s390x.rpm
d531d9146ca4b3138ee4f230168e637ab4b403d2b65fa96977fe7f9c467ea9d1
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-psych-5.1.2-11.el10_1.s390x.rpm
12811912a937839ece2815d72466d963229e9d9b7a6a3716d137b26326c019f2
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rbs-3.4.0-11.el10_1.s390x.rpm
5fda546c564024b71927dbaab85b0334db69f841826a1410acb76d2171bd5ac3
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
ruby-libs-3.3.10-11.el10_1.s390x.rpm
c805c6cc2010fb12a1a7eda87d4c5b232dc0b39c207b86630b24c81a321de037
RLSA-2026:0025
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
* firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
* firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
* firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.6.0-1.el10_1.s390x.rpm
280bf4d6ea818277f69774dae73930974121948ba58e0d976051b8fa8d5ae2bf
RLSA-2026:0525
Moderate: postgresql16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for postgresql16.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package.
Security Fix(es):
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
postgresql-server-devel-16.11-1.el10_1.s390x.rpm
30a03255740b04baf3e667f33b0a4a3c79b0a6c0c6aedf7383a6225d07415514
postgresql-docs-16.11-1.el10_1.s390x.rpm
813255fc9d180268044aefa2f9dd8f3724f29c4c8499f54b058e1f0e1ee852cf
postgresql-16.11-1.el10_1.s390x.rpm
4f61c6c70e603a5ea2de06f2f6f8d2c264a061a13a3f4df663b35325ebe24512
postgresql-pltcl-16.11-1.el10_1.s390x.rpm
7c11190420cd662d24fae9673cfc19eeee0e9902464484644ade3b0e1be8f4eb
postgresql-plperl-16.11-1.el10_1.s390x.rpm
280e4d93af28d9d49f3a8c164914cea10c7542be6cd3f6dcff9f7a2ea4e409f5
postgresql-upgrade-16.11-1.el10_1.s390x.rpm
d360047834534e69fc9e86415b8905cd0f000d9855d05b7385387b0de4e92c93
postgresql-upgrade-devel-16.11-1.el10_1.s390x.rpm
cb1355766f7c33c49a4e4e3930a168ef9027c053b346adeb6d98195464b34c27
postgresql-server-16.11-1.el10_1.s390x.rpm
450f2f945f2d3b65d4a5237787befdcdbbe6dfc8a04702db1a231da101b4255a
postgresql-private-libs-16.11-1.el10_1.s390x.rpm
470e1730e28885cfef21e7f6d356e45f562b6d556b2f8fa2fdeadeb33601b9ee
postgresql-test-16.11-1.el10_1.s390x.rpm
8478e5b13c72af133ea9e5d9438560a03bdd0cc4a778ba338f35d9e9f9b529b8
postgresql-contrib-16.11-1.el10_1.s390x.rpm
3b5119e4ef049a1fde17f93ac630b75dd6ac57ba37cc3c2556f19f76b5ced86e
postgresql-static-16.11-1.el10_1.s390x.rpm
c400f1695c2972ca6b6a0a8f3bcde31c18e222f786f3948074d1883cc8e5f2b1
postgresql-plpython3-16.11-1.el10_1.s390x.rpm
7db5412d302a42b8b86435307d6d5fe1491b754e2113780848fd78b3a724109a
postgresql-private-devel-16.11-1.el10_1.s390x.rpm
a53479e7c66369caaf3e6367a19af5e8c6ddd333eddd34625ad64ee2758a0e77
RLSA-2026:0423
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins) (CVE-2025-14523)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-devel-3.6.5-3.el10_1.8.s390x.rpm
5b833628e30f752549be42c319458e0efd4bb69cc6733614a33bbb1f33f5d439
libsoup3-3.6.5-3.el10_1.8.s390x.rpm
b2a372122df1dd971092a0e861660a8b78abfa5f8b550b7c7c5d5795134e5a6c
RLSA-2026:0436
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-tests-1.41.8-1.el10_1.s390x.rpm
76628edfca608c8a48dd23f33967b372514d3ab1a5889664d21c3faa6cb11dfb
buildah-1.41.8-1.el10_1.s390x.rpm
d407fd48fa41c1e03dc67b6026af3b8b418b8c2406090e54381d7cca5809d969
RLSA-2026:0770
Important: gpsd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for gpsd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. With gpsd, multiple GPS client applications (such as navigational and war-driving software) can share access to a GPS without contention or loss of data. Also, gpsd responds to queries with a format that is substantially easier to parse than NMEA 0183.
Security Fix(es):
* gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing (CVE-2025-67269)
* gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling (CVE-2025-67268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gpsd-clients-3.26.1-1.el10_1.1.s390x.rpm
bbe36a79c5e8f9fea43821c34ba008ade625fb4d087e373e72609490baa1f29c
python3-gpsd-3.26.1-1.el10_1.1.s390x.rpm
df1cf19636429bfa38ff683699a089293a5620d7010d2f82e28ac4127bf1d14e
gpsd-3.26.1-1.el10_1.1.s390x.rpm
ab257e7edde070954bc35d5f738956719bb26b7e4ad63916df590d78ae3415da
RLSA-2026:0545
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-5.6.0-11.el10_1.s390x.rpm
00920354fbfa33b366536884ccfb5358fa0bcfb109299109b1e1634b64a18874
podman-remote-5.6.0-11.el10_1.s390x.rpm
1d09dd84a53b96907cc320b5862c7948a5689df0efae9a7311d1573fb88956c2
RLSA-2026:0606
Moderate: vsftpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for vsftpd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The vsftpd packages include a Very Secure File Transfer Protocol (FTP) daemon, which is used to serve files over a network.
Security Fix(es):
* vsftpd: vsftpd: Denial of service via integer overflow in ls command parameter parsing (CVE-2025-14242)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
vsftpd-3.0.5-10.el10_1.1.s390x.rpm
e307944ea0eedcfdba00bb3fbe07b1aa88b2f51988b899e7803119e2523165e2
RLSA-2026:0668
Important: net-snmp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for net-snmp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Security Fix(es):
* net-snmp: buffer overflow via a specially crafted packet can cause a crash in snmptrapd (CVE-2025-68615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
net-snmp-agent-libs-5.9.4-15.el10_1.2.s390x.rpm
3bff074443e7c96aef28674b111980a1ab108869cfdd035820940df292f92bf0
python3-net-snmp-5.9.4-15.el10_1.2.s390x.rpm
c54729b7490c6912395ecd88f439ed4806258ce343a8bcaef9829697d1d903b9
net-snmp-devel-5.9.4-15.el10_1.2.s390x.rpm
b2cc9411e700a39e46085d13b6b7428f5d79ea157bc6451fc4bf9eb9deff4dac
net-snmp-5.9.4-15.el10_1.2.s390x.rpm
972a344ea76302075041f633b7e4d897e598a2b96b9f82be00bc71844ddb8177
net-snmp-libs-5.9.4-15.el10_1.2.s390x.rpm
e2a6f65360ba6d3d23de0f2d868d8865a2be53936be4d7893ef1f29e4a235aa7
net-snmp-perl-module-5.9.4-15.el10_1.2.s390x.rpm
c799b3620e4229b6764aa33725be152cd37ff66c97d6681bc90d020779405861
net-snmp-utils-5.9.4-15.el10_1.2.s390x.rpm
6a4d7819af12397e3559aa5ba604893d3b8e92513447b475f4f0081636015751
net-snmp-perl-5.9.4-15.el10_1.2.s390x.rpm
62ab50c26a56ed8fb424fe57a811f00cbae733f88f0aac5b41ba92baa334859a
RLSA-2026:0922
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-race-1.25.5-1.el10_1.s390x.rpm
686f1e7659d8e6162292a25fc5200cfda210caa3f991c738ef9e1e37eaa11668
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-bin-1.25.5-1.el10_1.s390x.rpm
951f862f1e5e1d8ee5fc6837832e7f882888bdd0d8e201040cdd470af4b42bba
go-toolset-1.25.5-1.el10_1.s390x.rpm
1eb53a6fe6b01ac108896117fe70f8bd21c4175c4307f6123b148b874b426cb9
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-1.25.5-1.el10_1.s390x.rpm
8ae103cfa099d756945cfc36fd119670eae6a2cce0eb1d8d0bd8ac5f9d660f9b
RLSA-2026:1597
Moderate: iperf3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for iperf3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: iperf Heap Buffer Overflow (CVE-2025-54349)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
iperf3-3.17.1-5.el10_1.s390x.rpm
70298e01e3af93f5c6e71638c346683c9ef50d35f34403778018479071a1e2f8
RLSA-2026:1628
Important: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for php.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)
* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)
* php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
php-8.3.29-1.el10_1.s390x.rpm
0d9afab54ea160a272d177863b2af98fd55a07b5c2a1198d1a4b953c3638bb40
php-common-8.3.29-1.el10_1.s390x.rpm
0dc80056ff11858466fa85c317e91b89a1159d5a4b92e6e31257db1fc3d020b9
php-pdo-8.3.29-1.el10_1.s390x.rpm
f610211ff01176acdf9b6056156359feca6a48dc1da36fbddbda3bc61b0c7e61
php-embedded-8.3.29-1.el10_1.s390x.rpm
b6470d9b72879af479613f5d79db6068a35d93005f051164c8db7efec54a2caa
php-ffi-8.3.29-1.el10_1.s390x.rpm
25c5d2b11f6b31ea371da23764a41c47d24aab628aa6479df235055bb3d59536
php-gd-8.3.29-1.el10_1.s390x.rpm
305d7f96e1aa371df08b51bc9b1b9d6a6e481d396775d57e6db2476d472aa3e9
php-soap-8.3.29-1.el10_1.s390x.rpm
03a4a4f4ca252783375835acb976a356a28c7bab4caf4cecb03e6b832307829d
php-process-8.3.29-1.el10_1.s390x.rpm
afb4718b0135d38a40dce4f245686a1a262b86930fcc5ee945d35ed5e39838d4
php-devel-8.3.29-1.el10_1.s390x.rpm
6990876662b95d3cf07cebff884cbc9a2e261dd214a43c141191c076106948d2
php-mysqlnd-8.3.29-1.el10_1.s390x.rpm
d122434e827a94abbbf4a6ce1aecc3966000ec69731c988dabefa8ace3c05296
php-dbg-8.3.29-1.el10_1.s390x.rpm
170d5e2979a4f343c6e755292a065e814b86f87a41f24065d57851bd8a874e9a
php-ldap-8.3.29-1.el10_1.s390x.rpm
f111beff55e7f27742635232040a077c8424948d8dbd5394bb92cddd7d117697
php-gmp-8.3.29-1.el10_1.s390x.rpm
8178c2c4e1a60697ddf5589c0333d0972131587de06efd9692aa4caf7605b77a
php-dba-8.3.29-1.el10_1.s390x.rpm
14746768a8d57a8d8a9ea17bf1a43c802b383c2b1b6fa7874b5b2028b9162699
php-bcmath-8.3.29-1.el10_1.s390x.rpm
031b9da3e403af452a42d85b16adb33cfa85bf3e1f3240dcb3164a14d62ead9e
php-snmp-8.3.29-1.el10_1.s390x.rpm
249a61427edaa5c13075058a6e1b6669c4add8b53698b2f02e913648b951c995
php-fpm-8.3.29-1.el10_1.s390x.rpm
facb750dea13c29306d12b26a107eb5d6a89d8bd53ba4dfa8c78c1140173f6cc
php-mbstring-8.3.29-1.el10_1.s390x.rpm
fbb3df8c8e1c68ef5143f01add3623538c64eecc00efbbc12387821d2a00afba
php-pgsql-8.3.29-1.el10_1.s390x.rpm
5f992dc6211058506af353c58f727daf9ea3b94d05217dd60959c85f2c60d496
php-opcache-8.3.29-1.el10_1.s390x.rpm
40e92132ed350b27862dd67cb2430bfed9993f827d016060954b5fa970e6e1c2
php-cli-8.3.29-1.el10_1.s390x.rpm
96e8b1b689fa802494190271ed3288f5baa455b1bfa40650f6a80b19a08430ac
php-xml-8.3.29-1.el10_1.s390x.rpm
ce72eb932cfc7e64507e18c0a3cd2b14637f706e1259e4d73acc0263f87c55ca
php-odbc-8.3.29-1.el10_1.s390x.rpm
85b0e611d7a3bd9c8d648defc57f400098f51906c6880948915f3fd5e32242b4
php-intl-8.3.29-1.el10_1.s390x.rpm
a48e7f587049e3660b845c0858b007792b974ecf32c4b61e02e942fc2ee99b0f
php-enchant-8.3.29-1.el10_1.s390x.rpm
671fa91c7a71dd38e51d9189e7f7bd13f9c4d5f141c748338d650e8b16ed2114
RLSA-2026:1714
Moderate: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* Wireshark: NULL Pointer Dereference in Wireshark (CVE-2025-9817)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
wireshark-4.4.2-4.el10_1.2.s390x.rpm
3b94b935cfaa53a03d2f759ac836b937ac0e1db565c8525d7adc7f0134c42195
wireshark-cli-4.4.2-4.el10_1.2.s390x.rpm
5da885b114213f3a735e3b82d61774b4595efa6241b3c74531944ede4ef98cb1
RLSA-2026:1715
Important: golang-github-openprinting-ipp-usb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang-github-openprinting-ipp-usb.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipp-usb-0.9.27-4.el10_1.s390x.rpm
1ced2d075832448815077a8fb203ee64b7077d8f79237e7c7febae58071c650d
RLSA-2026:2182
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (CVE-2026-0719)
* libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-devel-3.6.5-3.el10_1.9.s390x.rpm
36714e060462cf28e86dbe4068fb4d1b913960614a56c609dbd4c41a8630a1a0
libsoup3-3.6.5-3.el10_1.9.s390x.rpm
ba864472fbfc14532faa3264bdb4cb169ff85fe463b7b21446a9692a20bdc79f
RLSA-2026:1905
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-redfish-4.16.0-13.el10_1.2.s390x.rpm
c1784d0ec68cae92f1a5deb8b66518be696e5643fc5440797f21f7acce8f8048
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-common-4.16.0-13.el10_1.2.s390x.rpm
642d29383baeb5e9a098fd813bd4178a161b001b1fc116cbf172aaeb4b828b7b
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-all-4.16.0-13.el10_1.2.s390x.rpm
835a7f3a62ef1977c1e49d4e5b99f538da0f003b096e70b27316f95b39d45704
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-kubevirt-4.16.0-13.el10_1.2.s390x.rpm
28ae0ae935e88d932946b34d4ee885e4b1475d947a71e248c4e5bf2c72d00811
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-kdump-4.16.0-13.el10_1.2.s390x.rpm
c963c723101deacd277e33520c2e4c2bc4783125fcaea2ff677cb625fa450d5e
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-zvm-4.16.0-13.el10_1.2.s390x.rpm
28cb6dc2892ad35f04216a88afbb48ec6eecb42e89d6643cdd76c0445286eb04
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-lpar-4.16.0-13.el10_1.2.noarch.rpm
0a130538f252739c95f1b60984a0c614bab4f99fbb4e170c49c988d8e80e6065
RLSA-2026:1842
Important: nodejs24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for nodejs24.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
nodejs24-full-i18n-24.13.0-1.el10_1.s390x.rpm
71412fa33dbdd3f7c9dabd173b799af8f2e1b653bda8af05274947efa8bf77e6
nodejs24-libs-24.13.0-1.el10_1.s390x.rpm
56c0a2f20f4e2bc361045b48b5578cf1e549920d377ee0fcd998168907a6173a
nodejs24-24.13.0-1.el10_1.s390x.rpm
4deda29bae616ceb26f25e48dbe87fad39893f24862a379fa906d76e739087a7
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-devel-24.13.0-1.el10_1.s390x.rpm
83dc9d3e6803b3cf9845566ba41c27d3cff9c5e9619b2c98449cde8adc93b4ca
RLSA-2026:1843
Important: nodejs22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for nodejs22.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
nodejs-npm-10.9.4-1.22.22.0.3.el10_1.s390x.rpm
ddcbbfa9e99527af0d1ef89191adbee760a0ecc41f1d82a19606b5d5da6ddac9
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-full-i18n-22.22.0-3.el10_1.s390x.rpm
0819c1cbb393641053a82685da29b5f8a764bb3ce6afcb81563411d2bcfbb622
nodejs-22.22.0-3.el10_1.s390x.rpm
95b695250e716cd91164e23d4dde29f58afee6f945549855645724ae8fec402e
nodejs-libs-22.22.0-3.el10_1.s390x.rpm
baf1a838595eb3919c52e513093d6d71dba8ba34bc2985c2b0172bcb82df531c
nodejs-devel-22.22.0-3.el10_1.s390x.rpm
f1e67a569aaa04fe50cae52302025aa5497297094af6cbe714b75f35de12f580
RLSA-2026:1831
Moderate: qemu-kvm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* qemu-kvm: VNC WebSocket handshake use-after-free (CVE-2025-11234)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qemu-img-10.0.0-14.el10_1.5.s390x.rpm
28f11f964571647024257953d3ab0abc8ae17fa3d1212f9d72bc52b03445acf1
qemu-kvm-audio-pa-10.0.0-14.el10_1.5.s390x.rpm
3c630bf578b89e022aa2476c31f2096d9acd59d9a4b8bb02377287528856789a
qemu-kvm-tools-10.0.0-14.el10_1.5.s390x.rpm
fee0b60a26887b1c29df213b7a1ec794a8615ba79496d890b1156df10ed63474
qemu-kvm-block-curl-10.0.0-14.el10_1.5.s390x.rpm
7acd590765baea8570a16a56bc56e3d9f1cf0a5733e5a1ec6b013936fcef5ccb
qemu-guest-agent-10.0.0-14.el10_1.5.s390x.rpm
bc68c93b9b67b8bbb6b39969078e0f5eae01ba3dd2db7923cfc8b74c0772afca
qemu-pr-helper-10.0.0-14.el10_1.5.s390x.rpm
936b8fe72b343123eff3a81e4dcda83f6de28c298979b70aca021b97fbe58f6c
qemu-kvm-docs-10.0.0-14.el10_1.5.s390x.rpm
8baa38c5c2c9460c0aec0e6008f29b169b8deb80ea46590e9eb80b8c99d13b2e
qemu-kvm-device-display-virtio-gpu-10.0.0-14.el10_1.5.s390x.rpm
e60726bcbfa5ef7f9218ce70bbe309b796c9fbd0464b39234a6480b3548a6340
qemu-kvm-device-display-virtio-gpu-ccw-10.0.0-14.el10_1.5.s390x.rpm
a8f8505010a800369a08ef491af81851fe94b0ffa9914194d5c87c542184af2a
qemu-kvm-block-blkio-10.0.0-14.el10_1.5.s390x.rpm
dbc9a5907ef505a9b67ad9cdb8ac377608ee1fbb822c1add38aff8ffcb73f5c2
qemu-kvm-10.0.0-14.el10_1.5.s390x.rpm
285c3325f4c700f49f7740f4d1cb17af39209cb30d255b7ab8d262adc3cd38a3
qemu-kvm-core-10.0.0-14.el10_1.5.s390x.rpm
30ed0b3b1572743c73f1a2b04f42a70f5ea7007d83d2b380aed9df325bb5ae58
qemu-kvm-device-usb-host-10.0.0-14.el10_1.5.s390x.rpm
fca8e7ee34040bbb312f3f66052a6b367d324d95dfd94225e328ed339e6dc393
qemu-kvm-common-10.0.0-14.el10_1.5.s390x.rpm
c782b4bf77b536cb4917b0fe0910ba81688bf96d18a8acd555090b5e0e0ce6ba
qemu-kvm-block-rbd-10.0.0-14.el10_1.5.s390x.rpm
d9ef3cef4d93b80972a92f6bd8a0d68507bd36b01a1811954b2328d87c8bb6ab
RLSA-2026:2225
Critical: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Critical
An update is available for keylime.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
keylime-tenant-7.12.1-11.el10_1.4.s390x.rpm
751780863d7313725e190a5d0dd87526293f7a586a77b892ee494d524d1a11dd
keylime-base-7.12.1-11.el10_1.4.s390x.rpm
e20fc58d56c41740a2b1f8c2efed4eb7b861040a1d47389051fca555bd591496
keylime-registrar-7.12.1-11.el10_1.4.s390x.rpm
b491fa47b5d2f1c0266ac7c26e0149beee83d89954c2ef25571f135363a251ed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
python3-keylime-7.12.1-11.el10_1.4.s390x.rpm
887904ee40c165f98a616144eefb53dc105a64c1d90433b5ab03adb868fa203f
keylime-7.12.1-11.el10_1.4.s390x.rpm
169a8da1bc72f32b407eef88c342988b9e06daae61556624bbfe5eea31255cf4
keylime-verifier-7.12.1-11.el10_1.4.s390x.rpm
60467b4950b2ed36f434875aeab9f9c482b1c6f365c5fd6f4d65dbe1305d9e94
keylime-tools-7.12.1-11.el10_1.4.s390x.rpm
78638221f01e369255f81a21e0bc1125874ffdc7a90e77748404b5a67c5abdd0
RLSA-2026:2222
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. (CVE-2026-23530)
* freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability (CVE-2026-23884)
* freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server (CVE-2026-23883)
* freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution (CVE-2026-23533)
* freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. (CVE-2026-23531)
* freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow (CVE-2026-23534)
* freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow (CVE-2026-23532)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
freerdp-3.10.3-5.el10_1.1.s390x.rpm
346f34e29f9ee459c0ea81a33d8c1c6b3a027570c7dc2523f325febcaa4fa2e0
freerdp-libs-3.10.3-5.el10_1.1.s390x.rpm
8f035e797feda9d2b8b26fcf1d7be6858f9087d47dd74712627299885f26a01d
libwinpr-3.10.3-5.el10_1.1.s390x.rpm
b9a9a98fa8d988114bbee3e0a4b27faf252665f05fb67ad99732a614c8a5b3aa
RLSA-2026:2410
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.10.s390x.rpm
5a720256cd0ba017258d74292461aaac31e33cf534b36bddd312daf970be58b1
libsoup3-devel-3.6.5-3.el10_1.10.s390x.rpm
23ed537941604e02b3495e246ae184f22928f524fb7d0b4272beac62f8725526
RLSA-2026:2706
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-race-1.25.7-1.el10_1.s390x.rpm
780354e02c218ec75e11e87410f09421aaceaab5b9fb615b040ab29fc0dd5b46
golang-1.25.7-1.el10_1.s390x.rpm
805de494ae7e766857dd7f5385b20b35d8720319a7226b870a2910456d751b81
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
go-toolset-1.25.7-1.el10_1.s390x.rpm
1496372d26c3a506e28a7a1a3e49008bbbbb4aa6d4696ba8dfd4c17dce7c3d69
golang-bin-1.25.7-1.el10_1.s390x.rpm
9811a9f38c5f506f4f2b101d7b599375fa7d4c30c4736a118599f1c3a487da69
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
RLSA-2026:2914
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-selinux-10.2.6-22.el10_1.s390x.rpm
8dbb6c62620b9550dc4ed95be477a26a6d3e30d82140763a4c62ba6222e5dc41
grafana-10.2.6-22.el10_1.s390x.rpm
ed80deb4d3a0acfbd4cc5f8ad03b7dc4663153d33a7233e86c74c32b00fde89b
RLSA-2026:3035
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-pcp-5.3.0-2.el10_1.s390x.rpm
cbf51fc63b319014d2146b9fe991c8599872a8a90baa6f1dacf7ad9bae2ea1f2
RLSA-2026:3033
Important: munge security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for munge.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.
Security Fix(es):
* MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
munge-0.5.15-11.el10_1.s390x.rpm
e8807f77c74fc541ea604b09c15ff653e23ee3110a825452a80e6c5700f71eb1
munge-libs-0.5.15-11.el10_1.s390x.rpm
80c927e161cd93c65a43e22d0269c8ea8512f8e60d308ab8cb9aa46fefc61e23
RLSA-2026:3068
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22855)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22853)
* freerdp: FreeRDP global-buffer-overflow (CVE-2026-22858)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22859)
* freerdp: FreeRDP: Denial of Service via use after free in ecam_channel_write (CVE-2026-24678)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
freerdp-libs-3.10.3-5.el10_1.2.s390x.rpm
0ffe196a964c6c2758b7d403a22829b4686135e1438155c2f82176ee00317459
libwinpr-3.10.3-5.el10_1.2.s390x.rpm
4439947ff3719b69a64cb4fe3b373114ebeb1d9077d5c4bac55cad80a8358322
freerdp-3.10.3-5.el10_1.2.s390x.rpm
d445b61d82ef6fbed8189cf5c670a6bddb37146784dbcc5dace38516f9ce8dd5
RLSA-2026:3092
Important: golang-github-openprinting-ipp-usb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang-github-openprinting-ipp-usb.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipp-usb-0.9.27-5.el10_1.s390x.rpm
140ed6ff6ac0b0729ad5919db6887c454aa4d0ef05a7d5b64468c20c09908982
RLSA-2026:3094
Important: protobuf security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for protobuf.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* python: protobuf: Protobuf: Denial of Service due to recursion depth bypass (CVE-2026-0994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
protobuf-lite-3.19.6-15.el10_1.s390x.rpm
0a7e501129161fe5c8007eac6f147e81cb5c3fd3c3cb63a5d4de7c848d34f3da
protobuf-3.19.6-15.el10_1.s390x.rpm
a182bfc0987320ffad699fcb1e5c0382c3de4c9008e15ba940c81cadd50ca09e
python3-protobuf-3.19.6-15.el10_1.s390x.rpm
c405f5d65e1291b39ddc3192c261de7a75ccf449fa7bd3dfaa43c99b730cdd68
RLBA-2025:5309
Moderate:mod_proxy_cluster bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
none-appstream-rpms
mod_proxy_cluster-1.3.21-1.el10.s390x.rpm
9f431fc45a1b24a5bbc8614a0b379a8e523cd1d3f9737f1a228b33a06d31d19e
RLSA-2025:7496
Important: libxslt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxslt.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism.
Security Fix(es):
* libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855)
* libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libxslt-1.1.39-7.el10_0.s390x.rpm
c48df5c4008b261821b1876a477c55a4e929ca7e9c125d6ba4bc0e2fc1d1f9dd
libxslt-devel-1.1.39-7.el10_0.s390x.rpm
89022114a51f6459c010357911983f95d1873207f60cca6c12fb18b6618cd809
RLSA-2025:7466
Moderate: delve and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for delve, golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible.
Security Fix(es):
* golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341)
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-1.23.7-1.el10_0.s390x.rpm
3f8c2f188bd93cb4621b82017c3e0b5f4bd20231d3f8433a9eb3253b592d37b5
golang-bin-1.23.7-1.el10_0.s390x.rpm
4f232c11f850f4fa20f89f320f7faf34306a1807686301dbb9d2e84bfad27908
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
go-toolset-1.23.7-1.el10_0.s390x.rpm
f09cd899a3473caaa632df0d127079305ca8a12a60410b8e5f44fc82591b05e3
RLSA-2025:7476
Important: python-jinja2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python-jinja2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
RLSA-2025:7484
Important: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gvisor-tap-vsock-0.8.5-1.el10_0.s390x.rpm
db30d54e0256b09a381585470eccb1f9d67e9627153003ac5e4771fe5d7198a2
gvisor-tap-vsock-gvforwarder-0.8.5-1.el10_0.s390x.rpm
34e65c86c33e17912dd48d2fa1a8ae2c773160ebb648108e7ea1dd07fe50b7fa
RLSA-2025:7500
Important: perl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for perl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes (CVE-2024-56406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
perl-5.40.2-512.1.el10_0.s390x.rpm
53c7d5df7a650501e1e65f564fe7e5fff1792de68e4d8414dcba61a1570a62db
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-B-1.89-512.1.el10_0.s390x.rpm
83c0ad6654ba2505fedc6de1b0230746127e45fac1e133370f42964f0f9b89a1
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-devel-5.40.2-512.1.el10_0.s390x.rpm
8b6c12f49e8ad626171d3f6fbe0eb1ab4564957d1b12c20ecc9eb2d6b75c4d1c
perl-Devel-Peek-1.34-512.1.el10_0.s390x.rpm
8cd3ce0814f23c7b037c438f7181de8d20a4e133efd7e60d219ad14158c2aa4b
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-DynaLoader-1.56-512.1.el10_0.s390x.rpm
1ba6b825edb685950358d55725ca1c0dc905a5bba4c1e24203d32f5d827d0ee3
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-Errno-1.38-512.1.el10_0.s390x.rpm
04bbfb7b15f905906398a66baccfed3b1b5f98b8c15ea57008b337bd25b1a1a6
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-Fcntl-1.18-512.1.el10_0.s390x.rpm
bdd5b6fd315089b2305b6c91feecf2e4ee87239dede1170b2cc98e9e5d366fd1
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-DosGlob-1.12-512.1.el10_0.s390x.rpm
36bf1d35a9e992bc004580afc7f51c83bca1ee2ba66f13868eeb2d0885156662
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-GDBM_File-1.24-512.1.el10_0.s390x.rpm
d8c489e8e292653328a72e9e2a65f4f08e112b4751e68f0918f1ea1a4d2a036d
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Hash-Util-0.32-512.1.el10_0.s390x.rpm
2d63b7449e4a88d25a7806b9cf47d070632a7d1861084ab977e3822d07fb5896
perl-Hash-Util-FieldHash-1.27-512.1.el10_0.s390x.rpm
0f4cc195a319ae2d9afe3d98c77139c10b815efc74dea94984cee7b95f70d56a
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Langinfo-0.24-512.1.el10_0.s390x.rpm
9fa6e6f47f1ba1513f6e9b6e8945b0d27f77a4d3730164db0f8b45bdc843c8c3
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-interpreter-5.40.2-512.1.el10_0.s390x.rpm
7d682feb62141a1e53049500491f31f201085a873511b725725936d554d85ddd
perl-IO-1.55-512.1.el10_0.s390x.rpm
85e09f8804b46f4de7dd8601b132bba60b03882cdb489770b044a02efe1c57c4
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-lib-0.65-512.1.el10_0.s390x.rpm
4a8e1044b483f9f4b91742787dbd879dc546b721eceeefee0ae7e2eeffe8e6e4
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libs-5.40.2-512.1.el10_0.s390x.rpm
4fb67745239da72e085078613382c08247b85593fb77e1865dfdcf474ead2c80
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-mro-1.29-512.1.el10_0.s390x.rpm
2ad3913368c1ad88e3c3b6d772fc45dc1a67cd15e25c741da2e7dc9a1102c055
perl-NDBM_File-1.17-512.1.el10_0.s390x.rpm
7890d1b1ec0869749a379c1852409fbfbe33901406fa6d5ef4b99ff4201a99bf
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-ODBM_File-1.18-512.1.el10_0.s390x.rpm
268139c2bf1dfa25d45831799ff0257c673520bd93fc9982f2650b68f99a5e95
perl-Opcode-1.65-512.1.el10_0.s390x.rpm
3bc3a3a4736b0c0aacc9a77d892dd7556d745f9fd0796078a9939c226b71f3ef
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-ph-5.40.2-512.1.el10_0.s390x.rpm
69a3b30f226cfbb9581a95c19105f4f5f66b0d7e8592d51c80baa0410dc5c6db
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-POSIX-2.20-512.1.el10_0.s390x.rpm
50264387ce0709451347293bffd8a093721fe5ffb64afbf9ea9e2d5860e24a88
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Sys-Hostname-1.25-512.1.el10_0.s390x.rpm
edd0399d14ae2237e7146a313194464fa708c1885581f02c0f2a26ac50145336
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-Piece-1.3401-512.1.el10_0.s390x.rpm
12d0004f2f7201855e8485c8a53aa7efda9fd1ca6e0b14ea3151b089db421f7d
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
RLSA-2025:7494
Moderate: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
RLSA-2025:7497
Moderate: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for tomcat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API (CVE-2024-52316)
* tomcat: Apache Tomcat: DoS in examples web application (CVE-2024-54677)
* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
RLSA-2025:7490
Important: mod_auth_openidc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for mod_auth_openidc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_auth_openidc-2.4.15-4.el10_0.1.s390x.rpm
9c79bb495690a6d2dcd81c66de8af002d7347f2020ebb7989b6a7c6f6defbea0
RLSA-2025:7458
Important: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
xorg-x11-server-Xwayland-24.1.5-3.el10_0.s390x.rpm
907088662b025e6c863e80197be24d40d23f108cdf2f4376c82b186bd4f01313
RLSA-2025:7462
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-9.el10_0.s390x.rpm
de4388d05991482ba35cce59e915a29a3dea025677e97e8198986aae8f664870
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-remote-5.4.0-9.el10_0.s390x.rpm
dee880820091ade914d90369d26e6c8b69959475cbd96595bb1de7bd314a066b
RLSA-2025:7482
Moderate: git security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for git.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
git-2.47.1-2.el10_0.s390x.rpm
c358e59bbb5c1aaba50873fd982499a742c4e6845974ac8d4a018a6946d5886b
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-core-2.47.1-2.el10_0.s390x.rpm
917949e0c184978eadd6b240ad7b08ae6f5d0f6192ba26b41de622cdc46d5620
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-credential-libsecret-2.47.1-2.el10_0.s390x.rpm
c2650ca277e4922c3db1ea116933be04cc3e6e6c0454160178620cf55c3d37ff
git-daemon-2.47.1-2.el10_0.s390x.rpm
e119d11a12ab682de928a699f7072f46fa73d9e61c7e4682f69ede6b0ca59932
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
RLSA-2025:7478
Moderate: corosync security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for corosync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software.
Security Fix(es):
* corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
corosynclib-3.1.9-1.el10_0.1.s390x.rpm
0bd41e252bd353ba8aff5d9d007e7c0d36cad85e4bf89356a6d943122c358136
RLSA-2025:7489
Important: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for php.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
* php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
php-8.3.19-1.el10_0.s390x.rpm
d2fd92ecd949c784f03dece565064bf57592eef3653b9ee996f85fc781c41d11
php-bcmath-8.3.19-1.el10_0.s390x.rpm
f4169ae00f73769aec1e4d1440a76ef50cb645cd1d6a03ca6f552aed47ae3631
php-cli-8.3.19-1.el10_0.s390x.rpm
cdcc6f42269fa6ebc6af6d419e6d3cb63b7f642f7726b0319faaf6ff9130bf86
php-common-8.3.19-1.el10_0.s390x.rpm
8c923f7cbf8e196953494a330bc7e2cca4498ce3ea1238b982042e1166a1d60c
php-dba-8.3.19-1.el10_0.s390x.rpm
e1b906ee2829317334081ca09fdecb446bbda7b15f71acf158b067ece61b426a
php-dbg-8.3.19-1.el10_0.s390x.rpm
e3c832bc1d02988f304a2882326ee1b413cd1f28c173a965d9b974541f48247f
php-devel-8.3.19-1.el10_0.s390x.rpm
6c21b668f6fdb1483724ac77fb31ac26e0d17674814b480b1b82b715fc79fa26
php-embedded-8.3.19-1.el10_0.s390x.rpm
00a9d06b452488d532c591c8ad4bf6ee62173786740c4acaaa0e4aa177dbe3db
php-enchant-8.3.19-1.el10_0.s390x.rpm
5566a3acdd8deb395e6a5771b77adf90b50c65d52b45b83a5f2a6e30230d685f
php-ffi-8.3.19-1.el10_0.s390x.rpm
00c1ac27a7db8de8e76123d95dca24b90200fe1e83807c6e5857b5fed3b6cd98
php-fpm-8.3.19-1.el10_0.s390x.rpm
e4af38f2bb7e12b1b105bb9cd0d081d0c88eb31b86b9017aaf5d3bf2db165e2a
php-gd-8.3.19-1.el10_0.s390x.rpm
ba7bd7cdf1ebf4f2922f67e35963e3f7be45e7e5bbee6d4a65c905d07f3956bb
php-gmp-8.3.19-1.el10_0.s390x.rpm
046a970a8f94340ed68a4fc03ff2cc9eb37e5708f49de768c8cd8b7b3e5409ea
php-intl-8.3.19-1.el10_0.s390x.rpm
fb6c4ae61733ea0d273b3fc23dd503fe0f5628e02a523bb622f7713e385ace20
php-ldap-8.3.19-1.el10_0.s390x.rpm
fabf3e848ea14bb6d2209ba477a4f4e06fb13125c4035352ae0562b6b31638aa
php-mbstring-8.3.19-1.el10_0.s390x.rpm
344185dcb009b6cb0b3978557ae1222417b949d06549c95519281efb057179a3
php-mysqlnd-8.3.19-1.el10_0.s390x.rpm
c57acbc6149e60b915fbaebaa4a5f98811bff65f2c095f87524018f56f120b47
php-odbc-8.3.19-1.el10_0.s390x.rpm
687804b8bcc5d730278b3b6a90dd5e71e01d31d2568fd01d2fb40f9f7489772a
php-opcache-8.3.19-1.el10_0.s390x.rpm
13998eba7610510b7052f6a7fc3bb0efe510d3847ee32e6bb4c8cab9362e1ee5
php-pdo-8.3.19-1.el10_0.s390x.rpm
94c4027d9393078859a1630ee69e02cba0523a58ee2edc70d30d5a73d6d14f82
php-pgsql-8.3.19-1.el10_0.s390x.rpm
acff450ae8f7ae89de37bc5953d223905de32708143ec22c2cea7c6a75162b40
php-process-8.3.19-1.el10_0.s390x.rpm
d47c3bee78306369431f8d192e52e37f4cfc75081baf70b0876f541f49201eff
php-snmp-8.3.19-1.el10_0.s390x.rpm
68d7e070c9d1dbe75f9f5914b147495b52c5fa13362fe21418f8143c7f3e3416
php-soap-8.3.19-1.el10_0.s390x.rpm
593ad502f63699862ce381b3b3431d77955dc49ade9338b7f464081888487587
php-xml-8.3.19-1.el10_0.s390x.rpm
bae8722c2aaeab6c0e688184730261f867ede88bd867201ef9b6ef176621f841
RLSA-2025:7479
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)
* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.107.0-9.el10_0.s390x.rpm
5fcdbf78aa0d0c295089b5a9d5bbe8ef0b1b8b02d5096df3ac3111affa3b24bb
RLSA-2025:7509
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.3-1.el10_0.s390x.rpm
ab121b5be89459f52667109a7432ec184d66884c0711fd79c9b93f402efbc374
valkey-devel-8.0.3-1.el10_0.s390x.rpm
f144f596761466b0b047eda1d8c82c1e720dbf7421ed54e61544f55f931551b2
RLSA-2025:7467
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-1.18.1-1.el10_0.s390x.rpm
43beb2cfc25aa10383dafbbb45f1812753fbf1801c1ce91ec679f76906db9d72
skopeo-tests-1.18.1-1.el10_0.s390x.rpm
94da84b01dce79668cff7afd169baf4c0bcd54594717d6623ee45d6c83a687cd
RLSA-2025:7459
Moderate: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.39.4-1.el10_0.s390x.rpm
c5a611621645cc6cf81b2557db7965a4822cfe9b5c561800a3f3355558b7d731
buildah-tests-1.39.4-1.el10_0.s390x.rpm
58a925180291e0f3e4805a1ae8eb1ac419d71f1f1a5b468bf935bc6cf6036fd7
RLSA-2025:7457
Moderate: exiv2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for exiv2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: Use After Free in Exiv2 (CVE-2025-26623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
exiv2-0.28.3-3.el10_0.2.s390x.rpm
1ee348fa7b74e0543739eb5b3d8a2f181770c59272ad01c94ecc25c07bc33afa
exiv2-libs-0.28.3-3.el10_0.2.s390x.rpm
067c33c4ca40b6f4a45974940caa75810265c516133e89838208f0d970890cc5
RLSA-2025:7592
Important: yggdrasil security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for yggdrasil.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.
Security Fix(es):
* yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
yggdrasil-0.4.5-3.el10_0.s390x.rpm
32850687833077453a2f8ae2b97b04e60b9d0ea1568df94489245737f328c11a
RLSA-2025:7593
Moderate: ghostscript security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for ghostscript.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ghostscript-10.02.1-16.el10_0.s390x.rpm
f0f049e71ddb812f4d58a429b67354d577764e4d9a8ecfbaab130f059f19d809
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
libgs-10.02.1-16.el10_0.s390x.rpm
05fdfd3e13a35c9216c64c1aaeb83ed910c1de62debb9f02f6001bda5afd1f2a
RLSA-2025:7599
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-8.0-8.0.16-1.el10_0.s390x.rpm
734830ee9d92c4a200eef8a394d37cdfd49d3d9b2d34e965491b54fcaa04eb90
aspnetcore-runtime-dbg-8.0-8.0.16-1.el10_0.s390x.rpm
67932381f364bae2c7b92318d84cccd5f443476473d486e6723ad207c5ebcfaf
aspnetcore-targeting-pack-8.0-8.0.16-1.el10_0.s390x.rpm
0fd4309b5ccb319ecf680900fe4a5d8ad2baeba1653696f7d42a969fb389b634
dotnet-apphost-pack-8.0-8.0.16-1.el10_0.s390x.rpm
c70541771f30fc7530496837118ab7b2ee010c92edf0999822d907c3119a048c
dotnet-hostfxr-8.0-8.0.16-1.el10_0.s390x.rpm
e199957e25fd7787bac5e038d35c4f31e450d8e89dbeb737d9a20daf7303f87c
dotnet-runtime-8.0-8.0.16-1.el10_0.s390x.rpm
ca1663b0b1cc99289d18212fef8783fd2f2fc62a1814e1e5f32585f1e06436f4
dotnet-runtime-dbg-8.0-8.0.16-1.el10_0.s390x.rpm
eef69904e8317c180acac4ab3cc1b9583475ec8554336f4ae3380ccf46c25e08
dotnet-sdk-8.0-8.0.116-1.el10_0.s390x.rpm
da61154a206873db7b4b53b8a847756d048678e98be6cd4bdfc582aa468463b1
dotnet-sdk-dbg-8.0-8.0.116-1.el10_0.s390x.rpm
0fdeea822ca7a0c58a107139ac9d0ad661e6780faf1d7a3310df6d5bb8dab9ac
dotnet-targeting-pack-8.0-8.0.16-1.el10_0.s390x.rpm
882ac654329dd754eb9bfebdddcf7da55d4bb6b572510b59f0cfd8adb8285689
dotnet-templates-8.0-8.0.116-1.el10_0.s390x.rpm
653c933db698466cfe4c467a456ff6ef92ff2e7beabcdf690a5d77ec2aed6812
RLSA-2025:7601
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-9.0-9.0.5-1.el10_0.s390x.rpm
fce03d792e4b27d5893e906cb497bfbd634546fb01855f1ce7b27ba128201c66
aspnetcore-runtime-dbg-9.0-9.0.5-1.el10_0.s390x.rpm
36d937c9b26b1cfaa0b8d486d2fbad8d36a9c897565cfeb361adb7b771a6caa3
aspnetcore-targeting-pack-9.0-9.0.5-1.el10_0.s390x.rpm
1ca11c14e662e22015f742321c214839c3367e111c5264be4f07c95583f6a034
dotnet-apphost-pack-9.0-9.0.5-1.el10_0.s390x.rpm
29e7f3bf50960899221fb1aa0938fb73c49de0d106b0b36d9af668383d0b8605
dotnet-host-9.0.5-1.el10_0.s390x.rpm
a7ce903795640208d6ebf565f7bf66a27ef32ddef93e51d78f3df95a88a16ca6
dotnet-hostfxr-9.0-9.0.5-1.el10_0.s390x.rpm
2550229c45785a4670ebbfa8c9e35273fa849f95ec82809ca78ae8f27f698fb6
dotnet-runtime-9.0-9.0.5-1.el10_0.s390x.rpm
083929c90b1e8a10da4064ce9b66bdd1703688cd9d85d71f35545ed09c197c40
dotnet-runtime-dbg-9.0-9.0.5-1.el10_0.s390x.rpm
21ccec70a762c98f42e9fe9c1495a842735e8893d8861d10216370d2b9d3bf48
dotnet-sdk-9.0-9.0.106-1.el10_0.s390x.rpm
34162f06640b733f0cfb03cff0b6e2d457190694e9c4df8d1e40600754a1bbc5
dotnet-sdk-dbg-9.0-9.0.106-1.el10_0.s390x.rpm
5a78ed6b6d8ca68eb9da97d5e99ac58d18dbcb24c84ba624aa7cf53194946396
dotnet-targeting-pack-9.0-9.0.5-1.el10_0.s390x.rpm
93ed9ca9fd157734537ea91ef4fa690cf22116f9a646309bb076a95c51de3e4c
dotnet-templates-9.0-9.0.106-1.el10_0.s390x.rpm
0253149230d8dffa9e1eb1ee16b8476a8fc3541993be387699172aea834375f0
netstandard-targeting-pack-2.1-9.0.106-1.el10_0.s390x.rpm
b60d8257d41abe0b000556c3c950677c1d8560850c8bd0bb4b5cc487bc017694
RLSA-2025:7892
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-17.el10_0.s390x.rpm
d24f75b7a77ee2a119a13b894ddabc8292d0a8d36ea28b13f8d1f2e404acacd2
grafana-selinux-10.2.6-17.el10_0.s390x.rpm
92df37e3f489788b31ba88f4c2c09cdcdb629e76915bdff928925c0c91db60b3
RLSA-2025:8047
Moderate: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-unbound-1.20.0-10.el10_0.s390x.rpm
6bfbf1c9a02f80a670e9e3a890423b41822ba561e9eb9ea9b0bd88edfd80b876
unbound-1.20.0-10.el10_0.s390x.rpm
70280d9dfcad63990e10943fc292c4694e0590d743749a76b7bf21dd0b54f659
unbound-anchor-1.20.0-10.el10_0.s390x.rpm
36af05f0224ad8f02f076e70b1da32f553728284762cdb71bc36b76285995520
unbound-dracut-1.20.0-10.el10_0.s390x.rpm
a100a7dc1d790efde5a58a22ce72b96054d8337f05205c2210e78bde2477ebbe
unbound-libs-1.20.0-10.el10_0.s390x.rpm
f85b61c05937f8000c261a9b72fbcb2f607c11f9ecb183582a71c9cf3c62b915
RLSA-2025:8125
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Out-of-bounds access when resolving Promise objects (CVE-2025-4918)
* firefox: Out-of-bounds access when optimizing linear sums (CVE-2025-4919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.10.1-1.el10_0.s390x.rpm
92458af7da518db79ed907450518c639d7a62ae3a57508bedd5eb6969e13d6e6
RLSA-2025:8128
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
* libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907)
* libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035)
* libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_0.6.s390x.rpm
91f53a43213db1bd2adf10d271f0b463a054a5aeb644acb05e1dff6b673da439
libsoup3-devel-3.6.5-3.el10_0.6.s390x.rpm
92f19811517b5b1300db9e69d1e1e71e5d0ac030035f2b131a649b604c9688b9
RLSA-2025:8131
Moderate: ruby security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186)
* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)
* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ruby-3.3.8-10.el10_0.s390x.rpm
2e5d566d336c94abed0a199bb0273cc7212fa5982957d6df8d3b170084d29adb
ruby-bundled-gems-3.3.8-10.el10_0.s390x.rpm
75800d769f9738243110862f5134ad554747cd9e000beecf0dc881418407b69c
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-devel-3.3.8-10.el10_0.s390x.rpm
7f337b6f43ea60089021f61a415e892bc266a76c1b3c003d0f961aafeb85d1b6
rubygem-bigdecimal-3.1.5-10.el10_0.s390x.rpm
ab8f4dda3616f77a6ae2e9a48e486d57aa2991e2228bea9502a6b951cd766934
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-io-console-0.7.1-10.el10_0.s390x.rpm
240eab8b348530bdf857fc7519ac7f2ecf3fcf4d867a25ca1496261e5ae8430c
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-json-2.7.2-10.el10_0.s390x.rpm
e7173edea8dd7e917446962ee1e9cf8efb3f7c90eab7356d95783eb7dd63c35e
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-psych-5.1.2-10.el10_0.s390x.rpm
a00f98009df5d79b4e03c19a85dfeb22463417d2578f27732733b6896c559a1e
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rbs-3.4.0-10.el10_0.s390x.rpm
a681b87812ee3e4575792bbc26b30cf0d32e508eb60400f65d3673458a41f8ae
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
ruby-libs-3.3.8-10.el10_0.s390x.rpm
95df1a26a8a842614ae0ab873401bffa6774ab701b97a458be8c83859e792a01
RLSA-2025:8135
Important: python-tornado security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python-tornado.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-tornado-6.4.2-1.el10_0.1.s390x.rpm
a410888eb44e35c6c69d0150f09224f82c440e6b0a64fabbc1bb0de3f5e152a7
RLSA-2025:8184
Important: gstreamer1-plugins-bad-free security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gstreamer1-plugins-bad-free-1.24.11-2.el10_0.s390x.rpm
4835b615dfa9a519abd8b92f1c95280e4d47483f144011101c5f4b561182936b
gstreamer1-plugins-bad-free-libs-1.24.11-2.el10_0.s390x.rpm
d4798fe97fe6c97c542d7fb69485739c9c44d34aff7a962f17d7ad2288cc0a4b
RLSA-2025:8196
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909)
* thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875)
* thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877)
* thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.10.1-1.el10_0.s390x.rpm
c41bab8258cc88f64c0847a006564cf7d495d902b0b9051bfbd840bf09d296ad
RLSA-2025:8341
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)
* firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)
* firefox: thunderbird: Memory safety bugs (CVE-2025-5268)
* firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)
* firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)
* firefox: thunderbird: Memory safety bug (CVE-2025-5269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.11.0-1.el10_0.s390x.rpm
1ddbcf40c693f80ccdd932c1f1ca347af13b71f27f0e2d0c2a478f520ac40c23
RLSA-2025:8477
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
golang-1.23.9-1.el10_0.s390x.rpm
abdc39413be094b19847a9f7a928e2ab612956ddaabc31c928575249e95fb460
golang-bin-1.23.9-1.el10_0.s390x.rpm
e1d785f43f6f6e47e24cb112cc4d218788ab47eb8316b64a68416191f6ffe200
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
go-toolset-1.23.9-1.el10_0.s390x.rpm
06410342708de522e105329b85728db0650c37595aa64c028f69b44679edc7f7
RLSA-2025:8493
Important: nodejs22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for nodejs22.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
nodejs-22.16.0-1.el10_0.s390x.rpm
8aecf5e6780e8335734116b50bc35b517d1eb6373041b78ac2eb11d0b4c9fa28
nodejs-devel-22.16.0-1.el10_0.s390x.rpm
978ffe9becad8fcd437195fed9db30775a770cd81e1fe3097de535c97e11c856
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-full-i18n-22.16.0-1.el10_0.s390x.rpm
8dcaf090c7639a329f175808b593ae6d94dde6dcb2c58fe36479247c41451456
nodejs-libs-22.16.0-1.el10_0.s390x.rpm
e556ea4bbbc3d6d417180638361d3c7db01a206c1b78106282aefeaf9d3c866b
nodejs-npm-10.9.2-1.22.16.0.1.el10_0.s390x.rpm
dad63ab56a84d312e0944da806c9b820494da5c65f7aed94ca3b249803e33c3b
RLSA-2025:8550
Important: varnish security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for varnish.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: request smuggling attacks (CVE-2025-47905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
varnish-7.6.1-2.el10_0.1.s390x.rpm
a266dd07b2087d2da00326f137421759064ad76e8c1b5e4c6481763a62de22a1
varnish-docs-7.6.1-2.el10_0.1.s390x.rpm
e74c3ca57def387f3294a59a04d23c226bd7e9c1286ed5c84fae51ffbcd178b3
RLSA-2025:8608
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918)
* firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919)
* firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)
* firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)
* firefox: thunderbird: Memory safety bugs (CVE-2025-5268)
* firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)
* firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)
* firefox: thunderbird: Memory safety bug (CVE-2025-5269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.11.0-1.el10_0.s390x.rpm
b57a5ed688df2ec2454ef6d23403e0e768d11d0cbe08c119331742cfa3c6cf93
RLSA-2025:8636
Important: perl-FCGI security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for perl-FCGI.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FastCGI Perl bindings.
Security Fix(es):
* perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
perl-FCGI-0.82-13.1.el10_0.s390x.rpm
f17b5225df8b844fdd50da07705a9dc97835dada515803c7d2fa8b5955d1c0c5
RLSA-2025:8666
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-18.el10_0.s390x.rpm
c95e2d9dacc35c885683c5cca750611c242ad8b7bc72104d2e1afbdfdbb3a2e6
grafana-selinux-10.2.6-18.el10_0.s390x.rpm
d001167368ccc8e95536748b5c465f38bac7ebd314104c8c66c39f4c75f8c49d
RLSA-2025:8814
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-8.0-8.0.17-1.el10_0.s390x.rpm
f204a3c646b0b173313e2bbc8e9dc26c76fb2c31c934c475507a9a5dc6c9e4ae
aspnetcore-runtime-dbg-8.0-8.0.17-1.el10_0.s390x.rpm
d13d3d0401502574e37c802cf4209f3d0fd080eaf89ee17aa081077ec74080d7
aspnetcore-targeting-pack-8.0-8.0.17-1.el10_0.s390x.rpm
043d16b52ee735a9fc84dd2b3e98a1c9509b0dabb6862709141ecb05d8ddb335
dotnet-apphost-pack-8.0-8.0.17-1.el10_0.s390x.rpm
561062d0b4fc02c8b2441ed1921b64e272415dc9dfaa923a043fa614200bd9ab
dotnet-hostfxr-8.0-8.0.17-1.el10_0.s390x.rpm
c4a228c7d37c299000abc24374a1e587ffa0ec1ecf1ac871514c887e967ed053
dotnet-runtime-8.0-8.0.17-1.el10_0.s390x.rpm
4e474a8282d7e16c0b9d30d2bd3801d645f54fbedfa45f031b228208290a0593
dotnet-runtime-dbg-8.0-8.0.17-1.el10_0.s390x.rpm
4fd4594a0ecff0e3859a9374eca6b9691246ddbc9a9a77b5b8ff1a0d60ab4890
dotnet-sdk-8.0-8.0.117-1.el10_0.s390x.rpm
eff7f870bef9e071ebdb2f14ed0bfa190043a17f3ed0a4a43772ae776be3b353
dotnet-sdk-dbg-8.0-8.0.117-1.el10_0.s390x.rpm
de41f04cc820c5da143c59d453b41e6d8b708e1308ea182c4fc4561b6863eb32
dotnet-targeting-pack-8.0-8.0.17-1.el10_0.s390x.rpm
eb2c03e91cd9e7539a8e9c0499d67e7baab19676ea9257697e25c45045976ee9
dotnet-templates-8.0-8.0.117-1.el10_0.s390x.rpm
2c09b35ec75ab2f837f0f269d076b9313edaab3ae927681f20b23138b4558c2b
RLSA-2025:8816
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-9.0-9.0.6-1.el10_0.s390x.rpm
5dae98d3155648c87b09b1df756e1b6e6161fe0c5cf9c20a933c15de1745e4ec
aspnetcore-runtime-dbg-9.0-9.0.6-1.el10_0.s390x.rpm
4bc1e8987d59a2ef1303961a4f6294ac634ffb887638e4f77e4a0b0b7e484865
aspnetcore-targeting-pack-9.0-9.0.6-1.el10_0.s390x.rpm
d9d8b81bab6c95ba4fb6d78da2d482c82bbfe39e7d5f996a22582644f5458538
dotnet-apphost-pack-9.0-9.0.6-1.el10_0.s390x.rpm
bb226f0236f9297dc22ab5001cebfd6558067272832a894779d94af0ca965814
dotnet-host-9.0.6-1.el10_0.s390x.rpm
187238d2b0570f1e6852db569d0a554fc3447de47ce34cb15ec1d3a293798ed5
dotnet-hostfxr-9.0-9.0.6-1.el10_0.s390x.rpm
187fcc4d3facea78f178ec5c27cb49b72245173c91445d550474e7eddcb6aa20
dotnet-runtime-9.0-9.0.6-1.el10_0.s390x.rpm
1f08c3bdf583ee258738c6c49a873bd6c9aec3ef878cca7dbd505eff3a59f50e
dotnet-runtime-dbg-9.0-9.0.6-1.el10_0.s390x.rpm
63f99535a7b1868911c38cca6d30f91d6a4b89b771d9b47805c2e8f1f98a6be4
dotnet-sdk-9.0-9.0.107-1.el10_0.s390x.rpm
c99b0a409f2ec65c881b9178f410c6e122dbc0edc00c42ee0602ca955d63523d
dotnet-sdk-dbg-9.0-9.0.107-1.el10_0.s390x.rpm
001a774e9027b8321b37cc51d4b286da2c519b6fd19c08cddf9ab7f9d5c8452c
dotnet-targeting-pack-9.0-9.0.6-1.el10_0.s390x.rpm
4636f710e9eac41cd84741785044dc5e59837f2090d42ae415554d698c255a6f
dotnet-templates-9.0-9.0.107-1.el10_0.s390x.rpm
a04eacf60ef7598f4dd2e0ee920e965aa6091902d7f8002e940643cf0e79e8e5
netstandard-targeting-pack-2.1-9.0.107-1.el10_0.s390x.rpm
31cd4ac8c61819c0715b2fe7f19da7b76ad94e84264aad8db1ae153f34ceff86
RLSA-2025:8915
Moderate: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-pcp-5.2.2-3.el10_0.s390x.rpm
fc2da0b0afe64ef6ae4d6ec3c159c1bf83cac383cce661a29d3d11e51527890b
RLSA-2025:9063
Moderate: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for git-lfs.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
git-lfs-3.6.1-2.el10_0.s390x.rpm
d331fd1c2b61075299d005ac2a6e059f692f81535de199c79c0f1260e060ea5b
RLSA-2025:9120
Important: libvpx security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libvpx.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double-free in libvpx encoder (CVE-2025-5283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libvpx-1.14.1-3.el10_0.s390x.rpm
4ca86e41a6dd1207fe627576de4665173d017dac1f1b05e5ba1129c5ed11d723
RLSA-2025:9121
Moderate: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: Uncontrolled Recursion in Wireshark (CVE-2025-1492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
wireshark-4.4.2-3.el10_0.s390x.rpm
bf6739ad646c0afa5fb58f331cec3d5c4e4de083375019ac8c623790be1e2a33
wireshark-cli-4.4.2-3.el10_0.s390x.rpm
b9fa26c623f66691d99611ef59b06b7bda82c8a3f0124c627f1dc5cebc542296
RLSA-2025:9148
Moderate: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.39.4-2.el10_0.s390x.rpm
fae59327d091177f82ff3cc5689c17ab3422e82b539b004116ff22fb95faa9a9
buildah-tests-1.39.4-2.el10_0.s390x.rpm
f349b801c6690169790805261ee0d9e036572c7baaa3914e06da84744376bbd0
RLSA-2025:9146
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-10.el10_0.s390x.rpm
e7b901fe60ab9118495152e4cd7c9630331f163ff9962a801cd067909e480754
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-remote-5.4.0-10.el10_0.s390x.rpm
1361c31eaf29bfc8b3c9439ef13d3db7c2ac9aa43d3be7bf690c8a0827874bca
RLSA-2025:9149
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-1.18.1-2.el10_0.s390x.rpm
98a1288d40c8657608c3363fcada92b8205ae9f12f1253639d090dae4f803295
skopeo-tests-1.18.1-2.el10_0.s390x.rpm
6c28b34ceca051ec9087c012eb1ad6364596c56000c43c7e09391c038b8e1dbc
RLSA-2025:9151
Moderate: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gvisor-tap-vsock-0.8.5-2.el10_0.s390x.rpm
acf0142507d4c67ceb5010a496fdb9277596060d2e88fe248b7bfd82c403c89b
gvisor-tap-vsock-gvforwarder-0.8.5-2.el10_0.s390x.rpm
c5de16f87016e846faf18f574564b792d27b245395d75f36631e604dee3ea9b9
RLSA-2025:9156
Moderate: golang-github-openprinting-ipp-usb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for golang-github-openprinting-ipp-usb.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipp-usb-0.9.27-3.el10_0.s390x.rpm
33e87fe9c18bee5569ca2b4c509c83b8600d252ad435e0c27356012a77e5b6ac
RLSA-2025:9190
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipa-client-4.12.2-15.el10_0.1.s390x.rpm
e0e7d5fba98b1c5a6de99ff3985d2d34a7c1c55ebe1f2101f7ce3eb13157a999
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-encrypted-dns-4.12.2-15.el10_0.1.s390x.rpm
63675b8c79ee514a09196fde725d0a21346905389560412fdc56868145796453
ipa-client-epn-4.12.2-15.el10_0.1.s390x.rpm
867572f7e0e49d10c4bb40e280adc8a200f95943cbcea6257fb54174c79a6003
ipa-client-samba-4.12.2-15.el10_0.1.s390x.rpm
0611511348671a24ba8ad3e20469da15b08971a2a16d585652e89e029a2e7af9
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-server-4.12.2-15.el10_0.1.s390x.rpm
8861d0f9de5c01c5281f9d0358f99d252dd47f6caec4f9e6432b5b88be255dfc
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-encrypted-dns-4.12.2-15.el10_0.1.s390x.rpm
c5631824d4b85b93abcb4ee5a11496d9585304c9279f0f4394307cb647754908
ipa-server-trust-ad-4.12.2-15.el10_0.1.s390x.rpm
29ad7104957c9cae8ee9e27125405f33e8368cbfb59f9f4c9530e31590c5f84e
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
RLSA-2025:9304
Important: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode (CVE-2025-49177)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
xorg-x11-server-Xwayland-24.1.5-4.el10_0.s390x.rpm
71975ff3b4ace736f51049a903482518d3fb39b25ff70abbe27bf8339919cbdc
RLSA-2025:9307
Moderate: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* gnome-remote-desktop: freerdp: Unauthenticated RDP Packet Causes Segfault in FreeRDP Leading to Denial of Service (CVE-2025-4478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
freerdp-3.10.3-3.el10_0.s390x.rpm
1cff9d3faf0d083391a9a676e7d87d37880dec07b9a960df559aa4279263c745
freerdp-libs-3.10.3-3.el10_0.s390x.rpm
18086fcd95af36427840a9cd9efaaac1020f32f1c636e90891481ca907b64fde
libwinpr-3.10.3-3.el10_0.s390x.rpm
e75c94c769e810676a31cb084adbf69b21c4dd6ea00fde72575e51897548604e
RLSA-2025:9328
Important: libblockdev security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libblockdev.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID.
Security Fix(es):
* libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libblockdev-3.2.0-4.el10_0.s390x.rpm
c441e98487e175036bfe10ab0cd9cb18c358fa60ae061f8a08da48b954f18d3a
libblockdev-crypto-3.2.0-4.el10_0.s390x.rpm
f17eb703f38f4dcf3a63a56a6509d0b69e2726213e6b3ea50d126df9596ecfbb
libblockdev-dm-3.2.0-4.el10_0.s390x.rpm
1e6604504e8f3e086be658b29fe23467b2db518927296d4a8e5dd9157e03f8aa
libblockdev-fs-3.2.0-4.el10_0.s390x.rpm
2b42093b3d8cea74d4037edeff9517edc4741954eeaf68e9759be8ce52851129
libblockdev-loop-3.2.0-4.el10_0.s390x.rpm
23a410102d39c211ba25b7d14b19bf63d8eabbc0fa4aa239859a0a86f1f23c42
libblockdev-lvm-3.2.0-4.el10_0.s390x.rpm
d90dd477f568c1ffd999ffdfb068ca67d280c754eadd4e5a62566f94db7795c0
libblockdev-lvm-dbus-3.2.0-4.el10_0.s390x.rpm
2e79f5bd3d83dc67a0c32015fa62c6171f4419719c94f33447e4429b093359d5
libblockdev-mdraid-3.2.0-4.el10_0.s390x.rpm
8d984ebabf45c1ed2d5fdf974081b49ca6961d9482a85d10277db1ee74696f37
libblockdev-mpath-3.2.0-4.el10_0.s390x.rpm
c0f11430ce90b92502dc2cd8e33218dd9e780ca15591259f2e4d2972ee2645e3
libblockdev-nvdimm-3.2.0-4.el10_0.s390x.rpm
e416304e862e197bcb9ea13f78b07807e5fe050617fa378ddb658423c692ba73
libblockdev-nvme-3.2.0-4.el10_0.s390x.rpm
bf35ebe7e299dc0d96bd36d9c3e1d790109217e15651103c60236f2cfc12ca06
libblockdev-part-3.2.0-4.el10_0.s390x.rpm
fa33b918b882f8a995c42bd3deb419e1d806d68c06d48bb4634fe960969a18af
libblockdev-plugins-all-3.2.0-4.el10_0.s390x.rpm
2fbcd62d9e4a507fd4839b65a93a5c9484a6f92b3e6f5c2460888fae68f7c1ed
libblockdev-s390-3.2.0-4.el10_0.s390x.rpm
2bdef58bcd6f303dfbbe5a9532a72b8214200fb3217872d55a0ddc8df8e7f1a8
libblockdev-smart-3.2.0-4.el10_0.s390x.rpm
654cf7da1ae34e970b800df9146dbc49e6ac33d6a1e33896986560e22db9c286
libblockdev-smartmontools-3.2.0-4.el10_0.s390x.rpm
c4a7ae8f91e9fd572ef9364949fc28448a0ddea20262e5ca8d00c98395969bb9
libblockdev-swap-3.2.0-4.el10_0.s390x.rpm
9a95a6b165f59f0f37ac96b7be5b9dad7d504b11d9bc5af426d2ce8a4c7475a0
libblockdev-tools-3.2.0-4.el10_0.s390x.rpm
1661128ffd1dbf03ad73762126c5227e16dc24246948ff5cb3a11ce650107bd6
libblockdev-utils-3.2.0-4.el10_0.s390x.rpm
fa76918bd662acbd52b1242aa7c2eca5e35b7209bdce59e594331eaf34d6db59
python3-blockdev-3.2.0-4.el10_0.s390x.rpm
e12f13643db7c16ee6a550ce379060c1a47e3f23929fd990dfc33b9d003b81e2
RLSA-2025:9466
Moderate: mod_proxy_cluster security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality.
Security Fix(es):
* mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_proxy_cluster-1.3.22-1.el10_0.2.s390x.rpm
e4a3edc1643bfd50dd06464156cbae24373530f248b33b2409b4d0eed5991992
RLSA-2025:9486
Moderate: qt6-qtbase security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for qt6-qtbase.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling.
Security Fix(es):
* qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtbase-6.8.1-9.el10_0.s390x.rpm
228b2ddc255395e9edfa2e150d1375469b3a74b9e6ff9354bd84f30332297c47
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-devel-6.8.1-9.el10_0.s390x.rpm
a2e0b9a7c01ff7dd980b179228d03aec1bc05df68e89a0a589517eb86445e463
qt6-qtbase-gui-6.8.1-9.el10_0.s390x.rpm
4c564307ab9e9e4e5c519fc34c5196c608e40157d389cb774e29027d76ed7876
qt6-qtbase-mysql-6.8.1-9.el10_0.s390x.rpm
b3e90b3fe49b078ba955a1dfab9417feeb090addb9abd0036e18a424f9219e0e
qt6-qtbase-odbc-6.8.1-9.el10_0.s390x.rpm
e38b08f3cbd2e94d4937ef2823172cb89b765a15293bea6f81114f75fe91bc7b
qt6-qtbase-postgresql-6.8.1-9.el10_0.s390x.rpm
728c7b2f23ac506bf4f3c7b8346edfd641ad248bcb594145381d4e4341c877eb
RLSA-2025:10073
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430)
* firefox: Use-after-free in FontFaceSet (CVE-2025-6424)
* firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429)
* firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.12.0-1.el10_0.s390x.rpm
5ae209a7d0fa66b6a4295c6aacb9e49a9ca91f437812d7469f32e2d842db092c
RLSA-2025:10195
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.12.0-1.el10_0.s390x.rpm
f97141989925de9d2139663b6dba065a0e4f7f4912108d1787db4169fd146fb0
RLSA-2025:10549
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: podman missing TLS verification (CVE-2025-6032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-12.el10_0.s390x.rpm
2e9408f1e4d01e45c1ca92d72420549d3d0ffa52665ecd869f99799ce8144300
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-remote-5.4.0-12.el10_0.s390x.rpm
fe0ddb7a8e3beab6d03d03335ed62444fc932f6c0c50166e0de54bcfd5283fde
RLSA-2025:10635
Moderate: gnome-remote-desktop security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnome-remote-desktop.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment.
Security Fix(es):
* gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gnome-remote-desktop-47.3-2.el10_0.s390x.rpm
7f7334aaf567e78d00f39c6b222eef357a767a9cc50cc36e3affcd539d66e18d
RLSA-2025:10677
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-1.24.4-1.el10_0.s390x.rpm
38cd566c3fed67a5825f9d1e90e369e09479d744dfd6cd06917b4279312df13f
golang-bin-1.24.4-1.el10_0.s390x.rpm
3833fc49c991904a543b8baa6c219c348d27381bb1f030577c3ad9df2bab05d9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-race-1.24.4-1.el10_0.s390x.rpm
745adb0b33fb6c4741acbb1ab1db2aacf4f27ac605b889633f09badbf23bd2e1
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
go-toolset-1.24.4-1.el10_0.s390x.rpm
2a7e562ce0a36d4bc4bf03af0f9e49e07734d56bb1546397e9683db06b7b5b31
RLSA-2025:10873
Important: java-21-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for java-21-openjdk.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* JDK: Better Glyph drawing (CVE-2025-30749)
* JDK: Enhance TLS protocol support (CVE-2025-30754)
* JDK: Improve HTTP client header handling (CVE-2025-50059)
* JDK: Better Glyph drawing redux (CVE-2025-50106)
Bug Fix(es):
* In Rocky Linux 9 and Rocky Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (Rocky Linux-102683, Rocky Linux-102684, Rocky Linux-102685)
* On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (Rocky Linux-90307, Rocky Linux-90308, Rocky Linux-90311)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
java-21-openjdk-21.0.8.0.9-1.el10.s390x.rpm
7eaa72635cd03a450628761f4c3165c1c44858353eb1a6f350e46610e911f4b8
java-21-openjdk-demo-21.0.8.0.9-1.el10.s390x.rpm
2fa25742db87d7adf791b737f8a83764ec574ec384609c2aefa28d86b85ae6f0
java-21-openjdk-devel-21.0.8.0.9-1.el10.s390x.rpm
256a236edd538baa38fe1e735fbfc3d20efb8c191155c7e58ab7c4c633c39cfe
java-21-openjdk-headless-21.0.8.0.9-1.el10.s390x.rpm
325aaf2228f446bea8e0c32b6f1ddabe5a0bc2bc1b61630fd350a4ff82d7e195
java-21-openjdk-javadoc-21.0.8.0.9-1.el10.s390x.rpm
acdb52340446f4fa162d1224d1282183113e8e6038ffe87f73405d8dbca39d2e
java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el10.s390x.rpm
4b0a8c6b51a3bc697b21617487eebfb2eccca0c90c1c83843c0327c2ef45ec27
java-21-openjdk-jmods-21.0.8.0.9-1.el10.s390x.rpm
b5d165e985b6e30f7d3c7696d77768cbb1c3e66caa7c40d5ded8180f7959f7ff
java-21-openjdk-src-21.0.8.0.9-1.el10.s390x.rpm
e5a5e41ff6d087e0d7f45172f581d0678c68e51922084bf38dc877e1a5b09d22
java-21-openjdk-static-libs-21.0.8.0.9-1.el10.s390x.rpm
8bea569ad7b17233113f87d2139f46762c161de35dd67d6e312824ba13e8ecfe
RLSA-2025:11332
Important: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)
* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
RLSA-2025:11401
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Redis Stack Buffer Overflow (CVE-2025-27151)
* redis: Redis Unauthenticated Denial of Service (CVE-2025-48367)
* redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.4-1.el10_0.s390x.rpm
93c1ddcd4bd33a9dcd0af2c1c983c029ffce32d7a26c59a14df725d521b65a17
valkey-devel-8.0.4-1.el10_0.s390x.rpm
28038c2f9bbe9de695fcfa90f019f66259f60ecf7c06da47af0199197d862708
RLSA-2025:11797
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
* firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
* firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
* firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
* firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
* firefox: Memory safety bugs (CVE-2025-8034)
* firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
* firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
* firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.13.0-1.el10_0.s390x.rpm
4aaae03af468ca4857cf758f59b929e60c2431d47a39aaa75bc3c5b9fbf11daf
RLSA-2025:12056
Moderate: perl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for perl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
perl-5.40.2-512.2.el10_0.s390x.rpm
225dad91ad4f39c3f44341fbf44edb91275e73b443605a6996e08005eb79387d
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-B-1.89-512.2.el10_0.s390x.rpm
9607585f172ff903da587fb64e15a57ef11786f72ac1273daf9a109a88cb2d1b
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-devel-5.40.2-512.2.el10_0.s390x.rpm
f331691f2a9a893641c8e5ca55bcee30da7e1b118be22e678aa2926b0822997d
perl-Devel-Peek-1.34-512.2.el10_0.s390x.rpm
9a57875b437b58aa9704dbd48c6a8789ab04d128e27c99e5e1ad82104088f0f0
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-DynaLoader-1.56-512.2.el10_0.s390x.rpm
f41ab6a470e1783c6a7e0da88dac480e4e0233cf8ba567d4d9444572e4c090a9
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-Errno-1.38-512.2.el10_0.s390x.rpm
9663395a4960d2724b9928599edc89870640e129aa81dc09936c0c805117c55d
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-Fcntl-1.18-512.2.el10_0.s390x.rpm
8983b58d0094e375352b2977283ed6847ccddd2b58afa1eac58005e0657d1927
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-DosGlob-1.12-512.2.el10_0.s390x.rpm
b96fbd5c263d7829dd4ca41ceac7f848da0bc2a4ce40d37714298c9e84ce5135
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-GDBM_File-1.24-512.2.el10_0.s390x.rpm
87ff56fc9ae620a4ab19e877abde4a8b1162228fb25ba8a679283c1fdafc9be9
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-Hash-Util-0.32-512.2.el10_0.s390x.rpm
086cf6a9adb18b0906fbc78fcfc99055ba13b256e6dc557f20caa293d9fcfcb7
perl-Hash-Util-FieldHash-1.27-512.2.el10_0.s390x.rpm
1a3767a7b6b11897987254f00560aa36ccf9127ade60118e97cb334380ccad2a
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Langinfo-0.24-512.2.el10_0.s390x.rpm
6245233aace9cc1c6101312ee0adf4e170f9b85f137c759512cbb4cf69446fc5
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-interpreter-5.40.2-512.2.el10_0.s390x.rpm
011361bf926a049b7ed7717970bbf2a0843986ec7cdd29b7deac4dd0732fcaa5
perl-IO-1.55-512.2.el10_0.s390x.rpm
f78212c5219ac572e0d63724dc214973194786dba03d0365f961565ff73a7581
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-lib-0.65-512.2.el10_0.s390x.rpm
5d6fa30821ef12d7862a7f5e1ff9c51778962da8e259101a9311aae078378d2e
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libs-5.40.2-512.2.el10_0.s390x.rpm
8d331675cba0e2c8efe8633a3a05e5387f7779af9ed21378f17fe93d640c28c2
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-mro-1.29-512.2.el10_0.s390x.rpm
f29055987f5da23701b365ab9c4245600dd9f0784d16df0f95d4b1af893a1510
perl-NDBM_File-1.17-512.2.el10_0.s390x.rpm
62418b58a101c2c7d693e10400435dad71ba5cfca779556aaf49c5ca36c75d16
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-ODBM_File-1.18-512.2.el10_0.s390x.rpm
4d3df721878faf208d1bc5e8960c92773ed532c82be8481fcf5f406ebf4ec2a0
perl-Opcode-1.65-512.2.el10_0.s390x.rpm
cebd1aa5be1ec19b2afa24a87a5ab43fd82c49a4ed4b6eb0ae9b624a2eb570b6
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-ph-5.40.2-512.2.el10_0.s390x.rpm
bb3cfeada2d48f981d712ee72ddb654c20c10ee1265fabafc47a1de3fd125669
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-POSIX-2.20-512.2.el10_0.s390x.rpm
fdd43f3d33f67d2b15a270ecf4a1f1447d463966d47b7bb9421f8470e116c5ae
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Sys-Hostname-1.25-512.2.el10_0.s390x.rpm
ada505908144d6983a08e7c411c25a1d5ba34d2ac56a6ca3cc4dc2578b494298
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-Piece-1.3401-512.2.el10_0.s390x.rpm
0eb28c9bceb2b43b6b2e21cf0334ecd9b09133f0e218be72218bcf200ebbe17a
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
RLSA-2025:12064
Important: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for unbound.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbound Cache poisoning (CVE-2025-5994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-unbound-1.20.0-12.el10_0.s390x.rpm
c80613a604434f56fa0cdbbd0ed375d078a853a8c8f8460389d1f091ea90b406
unbound-1.20.0-12.el10_0.s390x.rpm
b516fb428a635c6e23ee905a0b66143f72ce35dc049baa7b1bcef5118ef5e88a
unbound-anchor-1.20.0-12.el10_0.s390x.rpm
02168423d4987c5719a2ff3991121bec91a13006685f5436a4c60d90d4ef8270
unbound-dracut-1.20.0-12.el10_0.s390x.rpm
7942f2054f4eb7cb19e99e61d954d1e310c6879eaf6e50caba37b15bbea8d36b
unbound-libs-1.20.0-12.el10_0.s390x.rpm
dddb99ad02c1e26fcf4f304cb751653f03a7d3af79018271adfb45fbf9376396
RLSA-2025:12188
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
* firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
* firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
* firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
* firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
* firefox: Memory safety bugs (CVE-2025-8034)
* firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
* firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
* firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.13.0-3.el10_0.s390x.rpm
c35d0c40b52454fba2308023b07c72d16c11b9be02c87c0a2896f6d50043bb5b
RLSA-2025:12850
Moderate: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.127.0-1.el10_0.s390x.rpm
69b8406b0047591a824cbc977295e926565e072b0563c5fe18d7cf6326c390c8
RLSA-2025:12862
Moderate: gdk-pixbuf2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.
Security Fix(es):
* gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gdk-pixbuf2-2.42.12-4.el10_0.s390x.rpm
d59f6cbbefb20d3de5e629b9e86de939c80754c63f75c090d1ce2fb5461a6755
gdk-pixbuf2-devel-2.42.12-4.el10_0.s390x.rpm
fea33c31e37b9414967e60497106e596a3fd5a3c66761cd81d9a4cee51638819
gdk-pixbuf2-modules-2.42.12-4.el10_0.s390x.rpm
c000b0eca95c16c7ac52aabe389a1285dc0dde72cf0e10ac2f61f6060ad474fc
RLSA-2025:13674
Important: toolbox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for toolbox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* nvidia-container-toolkit: Privilege Escalation via Hook Initialization in NVIDIA Container Toolkit (CVE-2025-23266)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
toolbox-0.2-1.el10_0.s390x.rpm
231f412f92a235e52567941d1da00b3fdfd8a5fff8d249be8e7ff8ea1dda4f53
RLSA-2025:13941
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-1.24.6-1.el10_0.s390x.rpm
bceb9e44faf6acc7e8bee15eae2d1581814a78341fbf68a348f48ff26c1142fc
golang-bin-1.24.6-1.el10_0.s390x.rpm
b50bfccbb53b9bade29a20523d0061851f10bb9178857c5f993487f1d3b0ec34
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-race-1.24.6-1.el10_0.s390x.rpm
4a542ab1665b59edc26b55552e4456580a684d3147d590bbd899b014c26f5095
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
go-toolset-1.24.6-1.el10_0.s390x.rpm
dbea3f24888fd76f374784d93ee47a07eb065e5d3cdf82a672d9a64a07ca8fcb
RLSA-2025:13944
Important: openjpeg2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for openjpeg2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: OpenJPEG OOB heap memory write (CVE-2025-54874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
openjpeg2-2.5.2-4.el10_0.1.s390x.rpm
3e6995641ccb3c6ff178bc83461c87f58139166288f67a8efa76070201fadfef
RLSA-2025:14178
Important: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988)
* tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
* apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976)
* tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)
* tomcat: Apache Tomcat denial of service (CVE-2025-52520)
* tomcat: Apache Tomcat denial of service (CVE-2025-52434)
* tomcat: Apache Tomcat denial of service (CVE-2025-53506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
RLSA-2025:14179
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for tomcat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988)
* tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
* apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976)
* tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)
* tomcat: Apache Tomcat denial of service (CVE-2025-52520)
* tomcat: Apache Tomcat denial of service (CVE-2025-53506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
RLSA-2025:14417
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182)
* thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179)
* thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180)
* thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.14.0-2.el10_0.s390x.rpm
0656e1edef658a2cd13eb2f68b3ba537b89e556bbe977bd51aee339ec5031b69
RLSA-2025:14592
Important: aide security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for aide.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: improper output neutralization enables bypassing (CVE-2025-54389)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aide-0.18.6-8.el10_0.2.s390x.rpm
36360f1784342fb385ed98b9817aa9c794046fb16a582ceabeb952e7c2533972
RLSA-2025:14625
Moderate: mod_http2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mod_http2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_http2-2.0.29-2.el10_0.1.s390x.rpm
93dc007aea292a54ff6b1574d5e6fc235a24288037a8dbce87ea25e597c77a50
RLSA-2025:14826
Important: postgresql16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for postgresql16.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package.
Security Fix(es):
* postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715)
* postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
postgresql-16.10-1.el10_0.s390x.rpm
63f68dc4936dd76d4c72c1754bdf7faf1d6b3638f9c2ed01c042012fb7e0cb57
postgresql-contrib-16.10-1.el10_0.s390x.rpm
bfda0784c9b309049ce26c896aea507cddfc512c8c714c32fc1dc703f733d973
postgresql-docs-16.10-1.el10_0.s390x.rpm
d9257f22bee13b9eb8e663077236480e685927a8b09ca11417e9d36b3d9835ba
postgresql-plperl-16.10-1.el10_0.s390x.rpm
f0acd06b6ea0f864b2e9b46b05538ece3394b0fd55c7ab4d53298f021a2f95fe
postgresql-plpython3-16.10-1.el10_0.s390x.rpm
0744b055c7de38f8f419c7e28fff9fd52f8c58609b4f175b7666a1d7d1a0a8b5
postgresql-pltcl-16.10-1.el10_0.s390x.rpm
e5ae34499d50de29858965df91b93937162beb602802947b78e2771fc4564986
postgresql-private-devel-16.10-1.el10_0.s390x.rpm
1e35a9cc636eb62e5b782dd21bd7dac2907adde7702b74edda7a9a17c64f2c54
postgresql-private-libs-16.10-1.el10_0.s390x.rpm
42a63e522d532e4cdd885766600e9683c25d92831c7f200056729fefc25a849c
postgresql-server-16.10-1.el10_0.s390x.rpm
53831f3fad17ac17bd576f43191f3d233f9313aaed79b7eace3a4b995139fab6
postgresql-server-devel-16.10-1.el10_0.s390x.rpm
bdc1ea977d5446ec9419205f65932671e45bcc555ee638bf17537be4b54097f4
postgresql-static-16.10-1.el10_0.s390x.rpm
69b92548a431c129e03aac7e490668e293212d62cc72d2e70c65793ec432c745
postgresql-test-16.10-1.el10_0.s390x.rpm
f427ddb6ed1b4785bd124b767ab7dae9fc4dfa9386a47cca00b7dda96c51fab7
postgresql-upgrade-16.10-1.el10_0.s390x.rpm
4ec7a0dc3bc3ff75b0281dc686d23b4a6b0826f74509fe4f02684b2b1625721d
postgresql-upgrade-devel-16.10-1.el10_0.s390x.rpm
378d7710f7e01c62f3963d6b5830f18d93658d33a28792fb2d3d7487f1568ded
RLSA-2025:14844
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182)
* thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179)
* thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180)
* thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.14.0-3.el10_0.s390x.rpm
ba03b5f423ab344016693fba37eb29c53a38e4f712b45273764ef845a2e056b2
RLSA-2025:15020
Important: udisks2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for udisks2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libudisks2-2.10.90-5.el10_0.1.s390x.rpm
ebe8799239f32af4157da1a88740a55e1ea6760db8a5af29e4fbde6baaa7598e
udisks2-2.10.90-5.el10_0.1.s390x.rpm
132b1cbb1b947374b3ac4a8419e1e86db7e7d5100e1b1a76c40e86867625435b
udisks2-iscsi-2.10.90-5.el10_0.1.s390x.rpm
bb9ed951780f4c9f2e2db8b5eb5c2ad64df9db5ac6e4237b0acb569f9eff98d6
udisks2-lsm-2.10.90-5.el10_0.1.s390x.rpm
63a8a4be11e2b72eb4d737de0f933bd53a967c13dcfc259371882cdf1413c51f
udisks2-lvm2-2.10.90-5.el10_0.1.s390x.rpm
6c16686c7d9a3a30845b829551afd89548994da7ce33004f1fa6f96dafb23c85
RLSA-2025:15095
Moderate: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252)
* httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048)
* httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
httpd-2.4.63-1.el10_0.2.s390x.rpm
a5ae480e6000322d1bc2b1943a886a7734c8b553e8c56587924919ae7b6d7e48
httpd-core-2.4.63-1.el10_0.2.s390x.rpm
ddf06306a19dd2b2541140e473eb09a3298d63d662750c1cb8e5ec73d487b68b
httpd-devel-2.4.63-1.el10_0.2.s390x.rpm
59fcdd658832bbfe7cb42c0228f2e375917e5684d7659368033be472c6401487
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-tools-2.4.63-1.el10_0.2.s390x.rpm
c3bf414425c944cb8efc5d25570ebf69737177cd05fedc429aa50bdac52095d0
mod_ldap-2.4.63-1.el10_0.2.s390x.rpm
334e730719dc5fd0346621a767b50b5a692d4fc9b7b555c4c334dae705a1219d
mod_lua-2.4.63-1.el10_0.2.s390x.rpm
feaabf1352d3b096916cd62cd50c15e727ae6c16982ad1eca5ec186eabd27a3a
mod_proxy_html-2.4.63-1.el10_0.2.s390x.rpm
10aa4c0cc9111f952786e5097aa02de9dba9626f94f846e746c1c7a198413e57
mod_session-2.4.63-1.el10_0.2.s390x.rpm
c93f4b8d81181ac2aec3e77994aad8ed434bf63c99b4195e16ebe4c444916116
mod_ssl-2.4.63-1.el10_0.2.s390x.rpm
65feccc6f50b5a1ab597a8f3f58e71f13f0102ab610f44e9af082e1f42eb0c24
RLSA-2025:15699
Moderate: mysql-selinux and mysql8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mysql8.4, mysql-selinux.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.
Security Fix(es):
* openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
* mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
* mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
* mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
* mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
* curl: libcurl: WebSocket endless loop (CVE-2025-5399)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
* mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
* mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
* mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
* mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
* mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
* mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mysql8.4-8.4.6-2.el10_0.s390x.rpm
4e7149e302d5cf487806e27094b6bd81a870308f654626ca014a0305db75a0d0
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-libs-8.4.6-2.el10_0.s390x.rpm
8576aab327d784f9dfa9cff086e1bd74cdb5b762e9050c972bbc4aefcc22ee5d
mysql8.4-server-8.4.6-2.el10_0.s390x.rpm
6b753bf9ffc92316381a0cfd7d5598801504f25f468a6479b7f9c6a4347d8d18
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
RLSA-2025:15901
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: Podman kube play command may overwrite host files (CVE-2025-9566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-13.el10_0.s390x.rpm
67ba8b94b50937f12d7c7323351234f866c75f598ba9650288a857cd5bd2f025
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-remote-5.4.0-13.el10_0.s390x.rpm
67321cb7bb156cce1f79fb696e5a35769cce1ef3aebdf082b0a648a67d6d0190
RLSA-2025:16109
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527)
* firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532)
* firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528)
* firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537)
* firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536)
* firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.3.0-1.el10_0.s390x.rpm
a809fc2bb757ece44c89d1335328d63d44652fdb07acb96d547e2475d3379463
RLSA-2025:16157
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527)
* firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532)
* firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528)
* firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537)
* firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536)
* firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.3.0-1.el10_0.s390x.rpm
a61ce95781eaf1e8fea9657aa3573d29bb909b39e803e3c79771d46384fb524e
RLSA-2025:16432
Moderate: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.127.0-3.el10_0.s390x.rpm
4ad0f3ce79512d4ba0ff4c69adcf1c0255a961bef8f4494a44d9877452ef5910
RLSA-2025:16428
Moderate: libtpms security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libtpms.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtpms is a library providing Trusted Platform Module (TPM) functionality for virtual machines.
Security Fix(es):
* libtpms: Libtpms Out-of-Bounds Read Vulnerability (CVE-2025-49133)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libtpms-0.9.6-11.el10_0.s390x.rpm
6602dfb1378b60b312aa6b5fa3a47f4744dc3ddec5e4916917f9743b48021a72