RLSA-2025:17085
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipa-client-4.12.2-15.el10_0.4.ppc64le.rpm
f389a32428dacbac1d264a0ff4365eed95bb35a1f23af242bd450169eea279d0
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-common-4.12.2-15.el10_0.4.noarch.rpm
bf2ffd4b0910fc72cae5d3600870555b49c6996b5ffe3867900c2b05488185ab
ipa-client-encrypted-dns-4.12.2-15.el10_0.4.ppc64le.rpm
b12703b3a3946335871f1aa571f79ccfd7e8dda484cb8423c4035e982bfb3afa
ipa-client-epn-4.12.2-15.el10_0.4.ppc64le.rpm
9ebd76b424efa48741ebbd4637a20feb07776b14bb0dbec42a5f7ab6759f263e
ipa-client-samba-4.12.2-15.el10_0.4.ppc64le.rpm
cf3206729669ea52a129493c91a852e7728bd167ba00f67cf4f833aec5083f35
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-common-4.12.2-15.el10_0.4.noarch.rpm
b669a87218c94c65720ded545b0be47d09d53823ffde3e44b2c800a7e960c40f
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-4.12.2-15.el10_0.4.noarch.rpm
9fcc498fdbeb59c1f3666a1fb65744fd3309ea356e2daa95b5f488134c90fc85
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-luna-4.12.2-15.el10_0.4.noarch.rpm
027300560ce6195962457cfbd64af0060014a378f1c90bcfe1dac67ec716839e
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-selinux-nfast-4.12.2-15.el10_0.4.noarch.rpm
b0ce410d8e96f7ac938714aedf2a6088ffc94cb80fd7d3f6e5dc92863e80eaa1
ipa-server-4.12.2-15.el10_0.4.ppc64le.rpm
826070bfdddc550bbf4a3bc52acfb6ac36445b744dc843dc92d4abe05c1cfb66
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-common-4.12.2-15.el10_0.4.noarch.rpm
2d4629a5a13c49f35fa9ca50e3257dfec870ea8d687bf18bd9f9ec7b53fcf2d5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-dns-4.12.2-15.el10_0.4.noarch.rpm
13cb1b4a2b64c0636a2902942e932bba7691219c1c0b1b6105ad6d4db00c6ba5
ipa-server-encrypted-dns-4.12.2-15.el10_0.4.ppc64le.rpm
830a9846814cddb9f21f77b1bae3efe154084d08603062365c213c5c6be35e65
ipa-server-trust-ad-4.12.2-15.el10_0.4.ppc64le.rpm
a871e5aefae5e1c7a4f0196c21b6ccfc6888a56e75b8c6b2e1d9081b022af07a
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipaclient-4.12.2-15.el10_0.4.noarch.rpm
71d58a186df583d49049166b6469053fdca1b8f222122ce67b52f7da9a81e0ab
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipalib-4.12.2-15.el10_0.4.noarch.rpm
ed44dd38a1d5d1918c30602fbb7e80d254231254f0d053b82b347d34c0246e98
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
python3-ipaserver-4.12.2-15.el10_0.4.noarch.rpm
24f51609ea8226d2f14c8873ec839e2e8bcaa6c00297792a1f09bc4e1d53b650
RLSA-2025:21485
Moderate: java-25-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for java-25-openjdk.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit.
Security Fix(es):
* JDK: Enhance Path Factories (CVE-2025-53066)
* JDK: Enhance Certificate Handling (CVE-2025-53057)
* JDK: Enhance String Handling (CVE-2025-61748)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Note that the OpenJDK 25 package does not yet include FIPS support. This is expected to be reinstated in a future update.
none-appstream-rpms
java-25-openjdk-25.0.1.0.8-2.el10.ppc64le.rpm
d62ebbf88ae78b97b6f5e21b322bfd24732f31acd84b8820da0b25428a1c24fa
java-25-openjdk-demo-25.0.1.0.8-2.el10.ppc64le.rpm
063454f32caedad445f45d498a466ad89a3e2fc5ed5da3426392ab5b1697e903
java-25-openjdk-devel-25.0.1.0.8-2.el10.ppc64le.rpm
8c431709d013835f4ea5ef8bd6fc391caadb223f7a6c7a297bf5de2eea5181b0
java-25-openjdk-headless-25.0.1.0.8-2.el10.ppc64le.rpm
068b7e906d3d3a4155cbe6a018507dfdeb0be653c142eaa4b53a9d90c1a61f00
java-25-openjdk-javadoc-25.0.1.0.8-2.el10.ppc64le.rpm
af3e66de1ea9a23b8caecd29e9ceae693413bd71e5b3782bf0d1084c0a652448
java-25-openjdk-javadoc-zip-25.0.1.0.8-2.el10.ppc64le.rpm
66cbcc435a93b5b20d928f077b043e14773f60cc62b39d71ad3797d17014277b
java-25-openjdk-jmods-25.0.1.0.8-2.el10.ppc64le.rpm
a4f1c115accd7b91f486909f6e95abe5a9cea23590dd65be2b7472a6d532c432
java-25-openjdk-src-25.0.1.0.8-2.el10.ppc64le.rpm
e3deeccca165c0948bb0c6ffd5ddf17105a3bb7406635da0b7bbe1ca9aad0950
java-25-openjdk-static-libs-25.0.1.0.8-2.el10.ppc64le.rpm
736917bf0c0a78e1bf7eb0b8e1077708b657f2a273d421b4592502818359a96f
RLSA-2025:21691
Important: haproxy security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for haproxy.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications.
Security Fix(es):
* haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
haproxy-3.0.5-4.el10_1.1.ppc64le.rpm
a1e85fca01fb0bd262b7f4dd9d49d23cfa71fd16690f9c7022c57c8247d4f95d
RLSA-2025:21936
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.6-2.el10_1.ppc64le.rpm
ceab16b2e95e558d4b3d1f0172a05ca00bdae1bf967115b64b127f3b20b85b86
valkey-devel-8.0.6-2.el10_1.ppc64le.rpm
bd75f6ed6b26e3c5dcebb4d587e57109cacaf33000ea9d89035a1efbdd43f3d3
RLSA-2025:18320
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: firefox: Memory safety bugs (CVE-2025-11714)
* thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709)
* thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710)
* thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708)
* thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715)
* thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.4.0-2.el10_0.ppc64le.rpm
37c81867a6ece6999c0452e0262d30c601a5916c53494b677d2beb11be0390c2
RLSA-2025:21816
Moderate: delve and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for golang, delve.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Go Programming Language.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
delve-1.25.2-1.el10_1.ppc64le.rpm
975ca5f2e8d588be7c220db733f28fd09a36c42dad5eb31e322e939b1016465a
golang-1.25.3-1.el10_1.ppc64le.rpm
82036eedb2c1c5259cb7ec7dcc7b891071d259a13a0a771d112c7d1147cf80c0
golang-bin-1.25.3-1.el10_1.ppc64le.rpm
bd324fef5973bb496a8607e52218fbeb2e5331b324820e072565a0bbb5a0bf1d
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-docs-1.25.3-1.el10_1.noarch.rpm
9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-misc-1.25.3-1.el10_1.noarch.rpm
e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a
golang-race-1.25.3-1.el10_1.ppc64le.rpm
e3ad8f83b44266cb00b53d32f2361e13dd8c4a15ea493c3d366a582a0d8017ff
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-src-1.25.3-1.el10_1.noarch.rpm
fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
golang-tests-1.25.3-1.el10_1.noarch.rpm
ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370
go-toolset-1.25.3-1.el10_1.ppc64le.rpm
df6b078dddc06b8fc7a281ffe69ef4cd4ed10399001cdc634968149443cd42ea
RLSA-2025:18154
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* thunderbird: firefox: Memory safety bugs (CVE-2025-11714)
* thunderbird: firefox: Out of bounds read/write in a privileged process triggered by WebGL textures (CVE-2025-11709)
* thunderbird: firefox: Cross-process information leaked due to malicious IPC messages (CVE-2025-11710)
* thunderbird: firefox: Use-after-free in MediaTrackGraphImpl::GetInstance() (CVE-2025-11708)
* thunderbird: firefox: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type (CVE-2025-11712)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 (CVE-2025-11715)
* thunderbird: firefox: Some non-writable Object properties could be modified (CVE-2025-11711)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.4.0-3.el10_0.ppc64le.rpm
a100340e24bee106a7b3ec062a2f982ebde06b5c585390d64897751039e66914
RLSA-2025:18152
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.121 and .NET Runtime 8.0.21.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-8.0-8.0.21-1.el10_0.ppc64le.rpm
1fdbc7d324647d2af6c7fd62dbbb334f3d7fa18a7079f60d74adafbde0093dc8
aspnetcore-runtime-dbg-8.0-8.0.21-1.el10_0.ppc64le.rpm
16d651197fd34b97a441cab9aba2cf1a62080ebb86b7d0559825baa2b448bc7b
aspnetcore-targeting-pack-8.0-8.0.21-1.el10_0.ppc64le.rpm
4c3cc17cc5a8d34abb81e054d42bd7f7d85407c77514f8fb7156873a6a68689b
dotnet-apphost-pack-8.0-8.0.21-1.el10_0.ppc64le.rpm
107628f6872c7cacbde5152171065d1225befd60b3b8faa5284af6a96a731395
dotnet-hostfxr-8.0-8.0.21-1.el10_0.ppc64le.rpm
24312b82c94e86207cffffce706192d01cf8aa112d434572577cca64c6f3739d
dotnet-runtime-8.0-8.0.21-1.el10_0.ppc64le.rpm
27deedb3551a8e315dfaae365203cdb60706935e2083c46c31e37cba1f573095
dotnet-runtime-dbg-8.0-8.0.21-1.el10_0.ppc64le.rpm
56b506a1e66eb78ae9e48b0a42696bcca954a3c360cfc7ae4313af73047d801d
dotnet-sdk-8.0-8.0.121-1.el10_0.ppc64le.rpm
c7d4a0de30b6f29df22111418b6ea7993b17f2e7b4288767d0365f344a6a06da
dotnet-sdk-dbg-8.0-8.0.121-1.el10_0.ppc64le.rpm
58c23e05af1289a36d2647979d2d83c37a7024b00426a8ca2be4524d54705978
dotnet-targeting-pack-8.0-8.0.21-1.el10_0.ppc64le.rpm
bd336b1d88c244c3286b6d32fb82368e056ab3d86396b3b882d532032609bedc
dotnet-templates-8.0-8.0.121-1.el10_0.ppc64le.rpm
e0644b1a706fd7ac43dbbb2b80ec1334d049fbca85f51c7d6ad94f48b5768f32
RLSA-2025:18153
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.111 and .NET Runtime 9.0.10.Security Fix(es):
* dotnet: .NET Information Disclosure Vulnerability (CVE-2025-55248)
* dotnet: .NET Security Feature Bypass Vulnerability (CVE-2025-55315)
* dotnet: .NET Denial of Service Vulnerability (CVE-2025-55247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-9.0-9.0.10-1.el10_0.ppc64le.rpm
40fa5f528858419a9fa0f957bb3a0f4177b7765fb8067495835407430e1fff28
aspnetcore-runtime-dbg-9.0-9.0.10-1.el10_0.ppc64le.rpm
ec472fd3ff21305c4be673deaaddf632058c18bd30a0002fdc3d8ca8336352f5
aspnetcore-targeting-pack-9.0-9.0.10-1.el10_0.ppc64le.rpm
f7d058ce5fccf0bc299e995cfc8685b14fb659c2c5931de0db2e2f36dd2a8d10
dotnet-apphost-pack-9.0-9.0.10-1.el10_0.ppc64le.rpm
50ec23c510e0ef6e7c950aa897d30e98dcf3d15ee1d2c8717ad3b54417242391
dotnet-host-9.0.10-1.el10_0.ppc64le.rpm
6e06fbae59e4c3c24815d5ebd8875d29085ac61bf73c6cdc1df1f4ec74b8ea7f
dotnet-hostfxr-9.0-9.0.10-1.el10_0.ppc64le.rpm
b27b1e85a40f5d54b3f2c921a07f9ca597ea412f436d74e49b5ea03355b55009
dotnet-runtime-9.0-9.0.10-1.el10_0.ppc64le.rpm
558025cbcd40525d5abcc8595908633901d066a0234d600d8c6bfddde77ae00c
dotnet-runtime-dbg-9.0-9.0.10-1.el10_0.ppc64le.rpm
9ef44b0d79979c5e6c706909f48186ff4485786bfadef46ef30d4e84dd3a0692
dotnet-sdk-9.0-9.0.111-1.el10_0.ppc64le.rpm
145ef5a296b8ea6d05cf38ce4fb9194ec347b15c6c5395117a218042ca9b9742
dotnet-sdk-dbg-9.0-9.0.111-1.el10_0.ppc64le.rpm
6c2915df71c19f7d8db6edc2a48787ceeb2e178b98b0a0e34beca63f6af8f88f
dotnet-targeting-pack-9.0-9.0.10-1.el10_0.ppc64le.rpm
6c55c4dcb261e5024ffc769df55cb68a36d496b073f8a0d31fbc2fdcdb062a0c
dotnet-templates-9.0-9.0.111-1.el10_0.ppc64le.rpm
d0be9ec8e2a32854f211997533c449c46fa7f065b95f0052f97b48c3ba50846f
netstandard-targeting-pack-2.1-9.0.111-1.el10_0.ppc64le.rpm
737ebda3880ce138f00b010c32291a638479b3d2eb863aacde419cfb989409a4
RLSA-2025:18183
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_0.7.ppc64le.rpm
6429a05672ab309f1e15c715af7e6290af4e70c4da3ff84a7cebec51aeae7ce3
libsoup3-devel-3.6.5-3.el10_0.7.ppc64le.rpm
92f58930c91a3540654621e37f86b412e540f3b82c597d6e6ef156a516a49bbc
RLSA-2025:19156
Important: libtiff security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libtiff.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.
Security Fix(es):
* libtiff: Libtiff Write-What-Where (CVE-2025-9900)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libtiff-4.6.0-6.el10_0.1.ppc64le.rpm
e571f7fdf3308ff9d81627599ab82bec35705899e9f7c4903a554115bdcdb822
libtiff-devel-4.6.0-6.el10_0.1.ppc64le.rpm
6fc7171494c44d311e6b8a048fe035d2dfe42985851b06df3e286f4eba5dba59
RLSA-2025:19435
Moderate: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg: xmayland: Use-after-free in XPresentNotify structure creation (CVE-2025-62229)
* xorg: xwayland: Use-after-free in Xkb client resource removal (CVE-2025-62230)
* xorg: xmayland: Value overflow in XkbSetCompatMap() (CVE-2025-62231)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
xorg-x11-server-Xwayland-24.1.5-5.el10_0.ppc64le.rpm
a54ed457bba5287b30caa90b308ff9b832580ea957925e77382e13ab1535bb9b
RLSA-2025:19675
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
* Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
* Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
* Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.6-1.el10_0.ppc64le.rpm
90accdd737d33229b6a950f06348e6538198b84a860fd363eb6b20e4bba35c8c
valkey-devel-8.0.6-1.el10_0.ppc64le.rpm
0a6b62892a2d35e5ab6f4e0fec5656276362678d649c05222a0bce6ec70f7070
RLSA-2025:19720
Low: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Low
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_0.9.ppc64le.rpm
53b6a5b08edbb7c166c3535e01c1573fafc7efb03b993abec99071b8a53e21c8
libsoup3-devel-3.6.5-3.el10_0.9.ppc64le.rpm
ee8bf01a14e462d205fecd7e8cb2e0551c7df7493d74dcbe08441372290a89f2
RLSA-2025:19772
Important: qt6-qtsvg security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for qt6-qtsvg.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices.
Security Fix(es):
* qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtsvg-6.8.1-1.el10_0.1.ppc64le.rpm
4c5a3d5d1f584267d68f38d6a6db13554fc1b06f2bd361fcf7360dbf2946ea51
qt6-qtsvg-devel-6.8.1-1.el10_0.1.ppc64le.rpm
d32b76d997624a4d83ae5304706eb4e86e6b8564862615a1ce5a0a8e531f01cb
RLSA-2025:22012
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.41.6-1.el10_1.ppc64le.rpm
e6f9acf0b9d45ba46c4a0251c8a2ee64d4e5e593a79902e8c765a82c17435238
buildah-tests-1.41.6-1.el10_1.ppc64le.rpm
603ca29733b3007d9749ac0e0f2000144e3db2f2dbcacbf7ee1374a2b923c363
RLSA-2025:22361
Moderate: qt6-qtquick3d security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for qt6-qtquick3d.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Qt 6 Quick3D library.
Security Fix(es):
* assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtquick3d-6.9.1-1.el10_1.1.ppc64le.rpm
d0f776bba4f5a3d39a9ccf9c713c3f94f03ed34d62b3df68b6999a1d778c9ddd
qt6-qtquick3d-devel-6.9.1-1.el10_1.1.ppc64le.rpm
1dd2afb9bcaae17ff5049b374af18002e4400ff5a481de298b89ecec9c80586e
RLSA-2025:22394
Moderate: qt6-qtsvg security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for qt6-qtsvg.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices.
Security Fix(es):
* qtsvg: Uncontrolled recursion in Qt SVG module (CVE-2025-10728)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtsvg-6.9.1-2.el10_1.2.ppc64le.rpm
30dcfd5572ff40aea5891acfb996ed3eb32b7ac2aa59b42bfe98492158754f7b
qt6-qtsvg-devel-6.9.1-2.el10_1.2.ppc64le.rpm
e7f2ccaa52cb65a14ac595816ca6095ae7e307d443a7e14037fd80485f687c06
RLSA-2025:23035
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
* firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
* firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
* firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.6.0-1.el10_1.ppc64le.rpm
374e0d5e9d140571ac973651b3268884c7abaffff3f93f6769a68728d0c67341
RLSA-2025:23008
Moderate: mysql8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for mysql8.4.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.
Security Fix(es):
* mysql: DML unspecified vulnerability (CPU Oct 2025) (CVE-2025-53053)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53044)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53062)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53054)
* mysql: InnoDB unspecified vulnerability (CPU Oct 2025) (CVE-2025-53045)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53040)
* mysql: Components Services unspecified vulnerability (CPU Oct 2025) (CVE-2025-53069)
* mysql: Optimizer unspecified vulnerability (CPU Oct 2025) (CVE-2025-53042)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mysql8.4-8.4.7-1.el10_1.ppc64le.rpm
72fab6c119938894943d2581d311a969d979374377d874c2876b85789e0d7e8b
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-common-8.4.7-1.el10_1.noarch.rpm
e8ec68c244bd06db9f32dc93d71f733d7643bcdba0969553fd2968abcde61056
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-errmsg-8.4.7-1.el10_1.noarch.rpm
c956ef5c3dc121f79a41086b473d6c274856a3d4b5532134099b9fd082f6997b
mysql8.4-libs-8.4.7-1.el10_1.ppc64le.rpm
bf8cf234863eb7ff2895d987b2521a55e14fc73aa56f9463d2fe6068fc2c0dd5
mysql8.4-server-8.4.7-1.el10_1.ppc64le.rpm
9426cbfa2983c466322c162f4b6acbc53525ebd277c1e6998728bbc94231df64
RLSA-2025:23052
Important: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-9.0.87-8.el10_1.1.noarch.rpm
7cb5590482ebdaddcbbcc94193841985acbc24a97dd733ad433d4aae10f049e3
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-admin-webapps-9.0.87-8.el10_1.1.noarch.rpm
8f02b67c2c971db9acd8c1abcf7755fbcc5d5bbfe13a3c751ac4cca4f1fb8749
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-docs-webapp-9.0.87-8.el10_1.1.noarch.rpm
1450c24d9c1bbc753470d72e048496c4a53440d72dfeb83263d072167543b2d3
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-el-3.0-api-9.0.87-8.el10_1.1.noarch.rpm
aeb97317e8764d3e5a34e98b3497e42423342cdd3528389f6d16d3d2882ffce2
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-jsp-2.3-api-9.0.87-8.el10_1.1.noarch.rpm
fb073920aa88369e9357f674e08aad249f602afd88abf632b4e247288b7f3b17
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-lib-9.0.87-8.el10_1.1.noarch.rpm
36627b3f5df782484dd4f166526c3a53f9bc85759b4c47e5fa65ec326dc097eb
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-servlet-4.0-api-9.0.87-8.el10_1.1.noarch.rpm
f69f116d2eb2b097c73b3a29fa5ab70b64be7918b5c595083f4fe1a6bcd6baef
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
tomcat9-webapps-9.0.87-8.el10_1.1.noarch.rpm
e69a9ba31bebb341d955e267012dce698882592c2bf0ea0e8b1681bc64e1e3ea
RLSA-2025:23050
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for tomcat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat: Bypass of rules in Rewrite Valve (CVE-2025-31651)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Denial of service (CVE-2025-61795)
* tomcat: org.apache.tomcat/tomcat-catalina: Apache Tomcat: Directory traversal via rewrite with possible RCE (CVE-2025-55752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-10.1.36-3.el10_1.1.noarch.rpm
f9de65559b1d36fada76879998ed02b85338697dc97a36ee317fc5aaef8c0493
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-admin-webapps-10.1.36-3.el10_1.1.noarch.rpm
ba2127f13424b7ef9c46ee3c1932be1eadc142a4e9f5df6bb0161659490f84e6
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-docs-webapp-10.1.36-3.el10_1.1.noarch.rpm
90e83c4283a81b358bb0d7f9c4330bc05d54607bfe5a892233eb3ce26ed60437
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-el-5.0-api-10.1.36-3.el10_1.1.noarch.rpm
8bd07c2f0f6d3cae1d10aa2209a16e867c26eb73aa2c824dad456eb18b164478
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-jsp-3.1-api-10.1.36-3.el10_1.1.noarch.rpm
778970678c930f76cb71d2673800d653f77eeec1c7bcede1d5b6cf20d8e1266e
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-lib-10.1.36-3.el10_1.1.noarch.rpm
adb09daaaca930ba42e0d3bfef2ca2b98550a98cf188b51abd82c8cea6446fee
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-servlet-6.0-api-10.1.36-3.el10_1.1.noarch.rpm
e5a3d01edd1133ac65bd6a72d417223e420eb0139cb886e74336827bb2b2e38b
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
tomcat-webapps-10.1.36-3.el10_1.1.noarch.rpm
91eec5407c25a1837a75508aee6b24c3ed68bc49ed361e4b4d093dcf20104e8f
RLSA-2025:23083
Important: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: Access of Uninitialized Pointer in Wireshark (CVE-2025-13499)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
wireshark-4.4.2-4.el10_1.1.ppc64le.rpm
a77da86809b4abedac84c4b63fb260d5f107fdedcc8a01af7b53ad44aadfb665
wireshark-cli-4.4.2-4.el10_1.1.ppc64le.rpm
8671ff16edc11bb59b38d6cde59ddc96a633b654e06eb9b1d6124520cc740daf
RLSA-2025:23088
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-21.el10_1.ppc64le.rpm
f360c457af9a6e40d3f19beab2c8e033dc4a334b99fa13094d0b5be315ae1966
grafana-selinux-10.2.6-21.el10_1.ppc64le.rpm
9d986760c6a6670af5c28184c13ba8191854b5a31f833c28e099c6d00b583730
RLSA-2025:23139
Moderate: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion (CVE-2025-12105)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.7.ppc64le.rpm
cd85ab7d1d07c555834117f57955cbd5d3583fe206a6da2394cca8913a2971b6
libsoup3-devel-3.6.5-3.el10_1.7.ppc64le.rpm
add6ed3e29ca8acdc710d0e2861193f2818ae6726476bffc9aae203ebb607137
RLSA-2025:23201
Important: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for keylime.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Keylime: Registrar allows identity takeover via duplicate UUID registration (CVE-2025-13609)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
keylime-tools-7.12.1-11.el10_1.3.ppc64le.rpm
956b3cc15047154c4111efdcf15389e817ac46fbc2a7989d9bdc582940a5e7f1
keylime-verifier-7.12.1-11.el10_1.3.ppc64le.rpm
d06baed89993b97b7301a3d95762236ebea8d126814412aa4b526349a634e81d
python3-keylime-7.12.1-11.el10_1.3.ppc64le.rpm
538e13cc7c08f534d15c20737e3b5002682598f7ca26d5c5f471adedde24019f
keylime-7.12.1-11.el10_1.3.ppc64le.rpm
b053d46950f0fabf2d7dbcec09797b8594c726a065a40aa8e7774ab43b03e521
keylime-base-7.12.1-11.el10_1.3.ppc64le.rpm
ea1b9077a1f6f73e1930d9cce513af3c119689a7f7cdb9aa7bff15e06992cdf1
keylime-registrar-7.12.1-11.el10_1.3.ppc64le.rpm
9bcddef156e1ba7630ab55bf35132a3dc72e229cfd0739c7eb43c2e270187b6c
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-selinux-7.12.1-11.el10_1.3.noarch.rpm
b47e065a613fca8753074843dc80b00630a87bea49c40544a70f1d245bf2d914
keylime-tenant-7.12.1-11.el10_1.3.ppc64le.rpm
eb4fee5dce5a6c8e9c4dfc16c45f1451d3c74071bed26f7ee1291d38842afcd9
RLSA-2025:20478
Moderate: zziplib security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for zziplib.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The zziplib is a lightweight library to easily extract data from zip files.
Security Fix(es):
* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
none-appstream-rpms
zziplib-0.13.78-2.el10.ppc64le.rpm
ae4b0c4e9d7ffa903372f0755f8df8d9ad8f57361c8d0612ab851dbc9bab57b9
zziplib-utils-0.13.78-2.el10.ppc64le.rpm
43b6a725c316cf3cfc67c58948cb6295b269109f08e759126f6406165aebc93d
RLSA-2025:21002
Important: squid security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for squid.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects.
Security Fix(es):
* squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
squid-6.10-6.el10_1.1.ppc64le.rpm
85569c6b2ba707749477b641af6de5c5362c7a1f9786cf210aab0eb1fd75f3e1
RLSA-2025:20994
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipa-client-4.12.2-24.el10_1.1.ppc64le.rpm
6346095123843e74477f6b08922469b821de146467e8c5ffbc1b7f1c04e4eeac
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm
1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1
ipa-client-encrypted-dns-4.12.2-24.el10_1.1.ppc64le.rpm
27c8448584cb735b96bc4eccd86b39616d0fdfc9c477bf7a93160386a73daeda
ipa-client-epn-4.12.2-24.el10_1.1.ppc64le.rpm
6771e9bdd068f4c9de6ced1fb63bc21df5dd0e622092f5e9aa0e8801c8f5b53a
ipa-client-samba-4.12.2-24.el10_1.1.ppc64le.rpm
ff1b0bf5552f662744790fc5a7531ee3ca081ddcfabb01dcc05c4e702490b5fe
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-common-4.12.2-24.el10_1.1.noarch.rpm
c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm
75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm
5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm
47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c
ipa-server-4.12.2-24.el10_1.1.ppc64le.rpm
3b2bcaeab3cd9b6f3fc931bef45aa7c1cf99b90af92ce123d52a8d2714e10f89
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm
d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm
1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c
ipa-server-encrypted-dns-4.12.2-24.el10_1.1.ppc64le.rpm
f647c79d7a9d04c10b6f000da3d29c3ef5aff1639cd288a8fa63295dfe0c7916
ipa-server-trust-ad-4.12.2-24.el10_1.1.ppc64le.rpm
31381af8ccff3dda7b8333e52f5df4bc10e10d5d17a05f7e52e7b47cc974da64
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm
fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm
d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm
0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4
RLSA-2025:21032
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945)
* libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.6.ppc64le.rpm
3c1fe612f2a763f0234356f11e266b2d1c421cd041c2c77dfc782c453a84b624
libsoup3-devel-3.6.5-3.el10_1.6.ppc64le.rpm
149979228fb76e9ec6e4ebd2d195413637a64fa8372c1ef64732e28102aff67b
RLSA-2025:21037
Important: qt6-qtsvg security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for qt6-qtsvg.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices.
Security Fix(es):
* qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtsvg-6.9.1-2.el10_1.1.ppc64le.rpm
2b54c002ee4dd00e5e80218455261fa5d3070a819b3be3ddf5c4da7641b98e24
qt6-qtsvg-devel-6.9.1-2.el10_1.1.ppc64le.rpm
a0d426a1694d4a498285be6c3270d35c490313188179ab344d3ab502bce5b20d
RLSA-2025:21034
Important: bind security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for bind.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778)
* bind: Cache poisoning due to weak PRNG (CVE-2025-40780)
* bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
bind-9.18.33-10.el10_1.2.ppc64le.rpm
0fe6e2fe8433782a73f330463006dd435e92152a146b54e46045547118c81bb6
bind-chroot-9.18.33-10.el10_1.2.ppc64le.rpm
e5ead56377ff39b69cf395ff7155f96f9d649a07e89efee5c2e26732a0c1a544
bind-dnssec-utils-9.18.33-10.el10_1.2.ppc64le.rpm
2cf17d703d351248d073888c5043ef73d40b991ed89d5e399c674f8b29b812ea
bind-libs-9.18.33-10.el10_1.2.ppc64le.rpm
6fa80861b617252fcef5872aa7cb99426eb195859462cdff3ff55bce7afa88c6
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-license-9.18.33-10.el10_1.2.noarch.rpm
2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16
bind-utils-9.18.33-10.el10_1.2.ppc64le.rpm
66933bfd91251a33164169680b26a086541e6c6812aebae4c677a045ded6b224
RLSA-2025:21142
Important: python-kdcproxy security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for python-kdcproxy.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088)
* python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm
92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f
RLSA-2025:21220
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.6.0-6.el10_1.ppc64le.rpm
4d7bff57d5cdc50ec0496a7e31e6715e475b6d52389d883e654dabde5bb5344f
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-docker-5.6.0-6.el10_1.noarch.rpm
6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf
podman-remote-5.6.0-6.el10_1.ppc64le.rpm
28b7832871e7ac4ae6c0b71b10b3ca6f835c6e04fc3ef041f58cd148fb749aec
RLSA-2025:21281
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018)
* firefox: Use-after-free in the Audio/Video component (CVE-2025-13014)
* firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016)
* firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019)
* firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020)
* firefox: Race condition in the Graphics component (CVE-2025-13012)
* firefox: Spoofing issue in Firefox (CVE-2025-13015)
* firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013)
* firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.5.0-2.el10_1.ppc64le.rpm
729856097fdfa98b3ac94726df16914614859f97ece54d7889da8d97954f8e49
RLSA-2025:21843
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018)
* firefox: Use-after-free in the Audio/Video component (CVE-2025-13014)
* firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016)
* firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019)
* firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020)
* firefox: Race condition in the Graphics component (CVE-2025-13012)
* firefox: Spoofing issue in Firefox (CVE-2025-13015)
* firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013)
* firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.5.0-2.el10_1.ppc64le.rpm
4492eca6a39e55e4a221ce8085153604a3d1f18776437933556cc9765a95f25f
RLSA-2025:23141
Moderate: ruby security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* resolv: Denial of Service in resolv gem (CVE-2025-24294)
* rexml: REXML denial of service (CVE-2025-58767)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ruby-3.3.10-11.el10_1.ppc64le.rpm
284684d50f9ee23c7f25d1678fe8ee24bb90ecd645916999e8a6dac79b7ea06c
ruby-bundled-gems-3.3.10-11.el10_1.ppc64le.rpm
ee831bf440771b0c7dde0bc6019353edcadc506a518736a65f54af796711b4ab
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-default-gems-3.3.10-11.el10_1.noarch.rpm
40f44efb34d21198b1c29a0929c4c51675d04e983cd81465f8cf1532b07441b1
ruby-devel-3.3.10-11.el10_1.ppc64le.rpm
5a9bf997316c039c4e81063a7935cb8c78a25c45e219ebc68fcf708010bac1a2
rubygem-bigdecimal-3.1.5-11.el10_1.ppc64le.rpm
25bbb8a6ee9a71104ab4b755b8968ed536127a27b2139e2d3d289db3ec25c6fe
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-bundler-2.5.22-11.el10_1.noarch.rpm
058f37cc1517c22c9bbb5bd1fca687bfa62588b74e84fe713ee7461bdd23e8bb
rubygem-io-console-0.7.1-11.el10_1.ppc64le.rpm
3295f2ec79cbd57c32a14136d16b954236813cf83c5445f7477ee17f607c8db8
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-irb-1.13.1-11.el10_1.noarch.rpm
e4edd538b5968a839b91e449d8349daec2f196776c60d9077d93d5967f77596a
rubygem-json-2.7.2-11.el10_1.ppc64le.rpm
d8fe80bac4288b866cb40cfe2bea02a2ae166937cd6e2a24b92cfd790f772c21
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-minitest-5.20.0-11.el10_1.noarch.rpm
0434b5728cd4944228035d9b77680d2858734453f31d74c391c56f8c2d67d98a
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-power_assert-2.0.3-11.el10_1.noarch.rpm
d0bde6352c0ae723efdc4a97696de00def0d82f6a8e8ef7e2400afccce648d59
rubygem-psych-5.1.2-11.el10_1.ppc64le.rpm
fd5a1b992e1e96397f9ab665c8a59530499d7d11767ac6eeef207f2f320350c6
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rake-13.1.0-11.el10_1.noarch.rpm
42114b64369326aa4a84ad5f32f116690e712ea7ed501003737ce2bde8ab583f
rubygem-rbs-3.4.0-11.el10_1.ppc64le.rpm
e5260f2f77304bfad5f781df65e74527d751fe82e8a97776617b1d616265d709
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rdoc-6.6.3.1-11.el10_1.noarch.rpm
e71510b81e9beb13670a44249383320eb7c5fa1d774a38adf64bbc7df697536f
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rexml-3.4.4-11.el10_1.noarch.rpm
f5ce0a935c6cd55f8b83cae6456ffb26c1a8b64e2ad50ee51e84267fc4207995
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygem-rss-0.3.1-11.el10_1.noarch.rpm
07912be4be20e8c39e41041841ad3d5e259a8f3cafedc1e6b69b92a9f58c5a20
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-3.5.22-11.el10_1.noarch.rpm
4619bd0477a6a2b7bdfed9977c03765198f1c4f300874e94133bb6a3ff80934c
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygems-devel-3.5.22-11.el10_1.noarch.rpm
8d675850b3900bef9a8445e114d3bdcec9a1043b871e659daa0a1b64b9b5f72e
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-test-unit-3.6.1-11.el10_1.noarch.rpm
4567bdec139bad08bd4c25cc304bcd6729fa5765f351f045dd9c6cf89e9e609c
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
rubygem-typeprof-0.21.9-11.el10_1.noarch.rpm
d513b152dafea61d7a1f55ad03e2e1ebd0a489a4593a77434377e57c089e87ee
ruby-libs-3.3.10-11.el10_1.ppc64le.rpm
b0ac10924d01acedc6690a0ee971120c5397c73f910944152bc8301c4bb4546b
RLSA-2025:23294
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-1.20.0-2.el10_1.ppc64le.rpm
3d641335169bdddde767bb5e2d0eb5b96710b131c8a2079ce1cdc6df3e4a8b42
skopeo-tests-1.20.0-2.el10_1.ppc64le.rpm
cf5ac1bb3e0801b77e3b9a2130ef278a77e213a8e079870e5c938be7ea67c4ef
RLSA-2025:23295
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.6.0-8.el10_1.ppc64le.rpm
6c19329db8d75e8d64d9f5334e836b083e5181bf62447c206ca60e64bbb46aeb
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-docker-5.6.0-8.el10_1.noarch.rpm
b8dfeb260bbe9bea9e3be8bc0e4fc7c6f61cd18d5ce124845e41bedfb126c84f
podman-remote-5.6.0-8.el10_1.ppc64le.rpm
20db79286eb2194ccec78333eaee2bb6e58cc5df5f18c3c61410376f9fe8f026
RLSA-2025:23664
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* github.com/expr-lang/expr: Expr: Denial of Service via uncontrolled recursion in expression evaluation (CVE-2025-68156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.135.0-2.el10_1.ppc64le.rpm
a7046558848e4cd5561544a14cc3844cf3add0b198df29a9113f1556373ab243
RLSA-2025:23667
Important: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for git-lfs.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* git-lfs: Git LFS may write to arbitrary files via crafted symlinks (CVE-2025-26625)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
git-lfs-3.6.1-4.el10_1.ppc64le.rpm
f15510728d6979fe071adfb33c514aeeeee1e80968e2048c52351c9c358dbd6d
RLSA-2025:23738
Important: mod_md security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for mod_md.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
This module manages common properties of domains for one or more virtual hosts. Specifically it can use the ACME protocol to automate certificate provisioning. Certificates will be configured for managed domains and their virtual hosts automatically, including at renewal.
Security Fix(es):
* mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals (CVE-2025-55753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_md-2.4.26-4.el10_1.ppc64le.rpm
6cc35b4c9e0dbaef9725dc57c7b6975dd92e0d1e5d65ad11a7de95a96b03de16
RLSA-2025:23932
Important: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for httpd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Apache HTTP Server: CGI environment variable override (CVE-2025-65082)
* httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo (CVE-2025-66200)
* httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=... (CVE-2025-58098)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
httpd-2.4.63-4.el10_1.3.ppc64le.rpm
db20dc8e8a0ef960d5913d04674a65d5edb62747314a6fe58d481e85165488df
httpd-core-2.4.63-4.el10_1.3.ppc64le.rpm
51e7bcb9c30cdd3caea1033d28ed31bab28f295ee668a40d9baee9f5962bbecb
httpd-devel-2.4.63-4.el10_1.3.ppc64le.rpm
68932047cca50ba8884cbd6cc3381233b6ee7da4f88fc58846916818def01a69
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-filesystem-2.4.63-4.el10_1.3.noarch.rpm
ecf3854d6a4894a4600c34687ac57b55daae3e1a185750514a825ac7b1500d75
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-manual-2.4.63-4.el10_1.3.noarch.rpm
6949a406e6a3155db79dc44fc713116f5b40b1d345b6749ab09b2d783faa80af
httpd-tools-2.4.63-4.el10_1.3.ppc64le.rpm
3347ca7f7795d6f067c0d91a6bfd69e58310de11d832abbf15f61d78ad0f6be6
mod_ldap-2.4.63-4.el10_1.3.ppc64le.rpm
0105476d2c03673850f3d4941a99b7037a8d601466cf2adfb42a51d3ba02fbc5
mod_lua-2.4.63-4.el10_1.3.ppc64le.rpm
72a9672d8e216653107fe5556d668a17f745bf93e01e01ca2ac3d4df9ad148b7
mod_proxy_html-2.4.63-4.el10_1.3.ppc64le.rpm
e4c01b3d19839d23c0b2786fb4ce378cde81eeb22270ec25e12d241bed67e505
mod_session-2.4.63-4.el10_1.3.ppc64le.rpm
db6e88d29e11d41ead328a3db50f3fa800431d45c69ddf3d3dcaf0a1ca9a11fd
mod_ssl-2.4.63-4.el10_1.3.ppc64le.rpm
fb72f6bb33aab4cf81c66a2efaaf4166092e5521d5d576b5d0c2e13a39d01511
RLSA-2026:0025
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
* firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
* firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
* firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
* firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
* firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.6.0-1.el10_1.ppc64le.rpm
72334578ca11a61f6765d60c0b98d70404eb1975bf557e0ef6a1eccc0bf4ce5b
RLSA-2026:0525
Moderate: postgresql16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for postgresql16.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package.
Security Fix(es):
* postgresql: libpq undersizes allocations, via integer wraparound (CVE-2025-12818)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
postgresql-upgrade-16.11-1.el10_1.ppc64le.rpm
dd559eb3ce730b6465d6dcdfb8307c5f6e31e721bc784423dd3dc4a5858b4817
postgresql-contrib-16.11-1.el10_1.ppc64le.rpm
f0ddd9321735241ea5e34cd4f5ba05b60deb0f5ec692d7256aa5b8a5fc23b4fa
postgresql-private-devel-16.11-1.el10_1.ppc64le.rpm
d0841a1d92392b06f5a6c4c6f5fe74a9ed64948ef761a041985d2adc4d87f8e0
postgresql-server-16.11-1.el10_1.ppc64le.rpm
f1441a6f60f4f82aac3804221ebf5e1957274c8574b332de7c970898bed9f933
postgresql-docs-16.11-1.el10_1.ppc64le.rpm
765926c048d54766cbc1e75d9f1056a13a1b05795c57932f0bbe69c461b91c69
postgresql-private-libs-16.11-1.el10_1.ppc64le.rpm
704016b6d3f1b3f769ea61225d2630653a3e7f2c3d945cc1053934d3658e9053
postgresql-static-16.11-1.el10_1.ppc64le.rpm
aa027d2c5e470662f310643f44312e8b988d050cea169ef31609da522ef509f2
postgresql-upgrade-devel-16.11-1.el10_1.ppc64le.rpm
a774215161ead3adb062bd0526fd3fadec327268e98236764ddf0ffd0a8f6a11
postgresql-server-devel-16.11-1.el10_1.ppc64le.rpm
72a86445b578719d728380e0070334fada941ccd05f37b7f74409897df4d3485
postgresql-plpython3-16.11-1.el10_1.ppc64le.rpm
bbaf931bdda5cd22816a8acacafb7d8bb142a587bb8b683c46e8c819754fa32d
postgresql-pltcl-16.11-1.el10_1.ppc64le.rpm
9034db5ffc1a72c9c6674066725b2eb63718b1dda1d11db776b2a026b3c92f9b
postgresql-test-16.11-1.el10_1.ppc64le.rpm
0f6c44363e59698b6eb1a12d1529785b606d2746ee411842ff6af6fb58443a1a
postgresql-16.11-1.el10_1.ppc64le.rpm
d51dbfac5f3dd8e6a474354748206c62d52e1f07f725d26af90e2b04218f6be0
postgresql-plperl-16.11-1.el10_1.ppc64le.rpm
a27b58fca2f9bfd6d5ad3e3ef61cb0b29d5adb082c6e4b78017770620dd1dbe3
RLSA-2026:0423
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins) (CVE-2025-14523)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.8.ppc64le.rpm
8f26796f76fedbdb26b6868e929a82c9f5c450163432c0e8e3e71a51b22ff8e8
libsoup3-devel-3.6.5-3.el10_1.8.ppc64le.rpm
3f2c9256548244d40ca25cad01c2fe4d97f2786b4f6b1c246575ae8bf190194e
RLSA-2026:0436
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.41.8-1.el10_1.ppc64le.rpm
a8301bf82e56fed6a610e73c8e871547c9b983affac407a71513a2c7c3660a8d
buildah-tests-1.41.8-1.el10_1.ppc64le.rpm
61e54ab889e6eeb891bf5b8a1cfedf4e81ed3a618f46de040baaa720286604c8
RLSA-2026:0770
Important: gpsd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for gpsd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
gpsd is a service daemon that mediates access to a GPS sensor connected to the host computer by serial or USB interface, making its data on the location/course/velocity of the sensor available to be queried on TCP port 2947 of the host computer. With gpsd, multiple GPS client applications (such as navigational and war-driving software) can share access to a GPS without contention or loss of data. Also, gpsd responds to queries with a format that is substantially easier to parse than NMEA 0183.
Security Fix(es):
* gpsd: gpsd: Denial of Service due to malformed NAVCOM packet parsing (CVE-2025-67269)
* gpsd: gpsd: Arbitrary code execution via heap-based out-of-bounds write in NMEA2000 packet handling (CVE-2025-67268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-gpsd-3.26.1-1.el10_1.1.ppc64le.rpm
40dd0d403814da2ba1fd25d8a1f0e641dba06edf3711c63af790f9920c122e64
gpsd-3.26.1-1.el10_1.1.ppc64le.rpm
8f2d29d5740b9c7ee17eef9d59be3fdb8d64e351ee2283f6ce38637834a9f803
gpsd-clients-3.26.1-1.el10_1.1.ppc64le.rpm
e6aee18425e1ba68abc9da476445c563f358d8e8d9cf847fad31f4d8a2586667
RLSA-2026:0545
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS (CVE-2025-47913)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-docker-5.6.0-11.el10_1.noarch.rpm
16c5e9f16eb94c5e9b7fe3a1eda9b8ea23b083e81067e88b0f31f4d7582476a1
podman-5.6.0-11.el10_1.ppc64le.rpm
af3243134fd99af87663ec09ce483db6aabc3d8acc6398f9761b0d93559cebba
podman-remote-5.6.0-11.el10_1.ppc64le.rpm
4297d92d697415df0d046046f594eb9dd89fa8da093ffa5f7dbe24b57345ba02
RLSA-2026:0606
Moderate: vsftpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for vsftpd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The vsftpd packages include a Very Secure File Transfer Protocol (FTP) daemon, which is used to serve files over a network.
Security Fix(es):
* vsftpd: vsftpd: Denial of service via integer overflow in ls command parameter parsing (CVE-2025-14242)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
vsftpd-3.0.5-10.el10_1.1.ppc64le.rpm
3d07fcf9b05715c7337329be2a950e4727ec1727c2f7b06b89039876ad495cac
RLSA-2026:0668
Important: net-snmp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for net-snmp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Security Fix(es):
* net-snmp: buffer overflow via a specially crafted packet can cause a crash in snmptrapd (CVE-2025-68615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
net-snmp-perl-module-5.9.4-15.el10_1.2.ppc64le.rpm
2807a937710eb0e73d5665b46c269b04993a8d116e83f4e637367f964e14a1c2
net-snmp-agent-libs-5.9.4-15.el10_1.2.ppc64le.rpm
8ad71fbefc7ced51749ae2fac221fe153b686fb49de510cd49976682feb33af7
net-snmp-5.9.4-15.el10_1.2.ppc64le.rpm
b984dbadd657c44c2dc380af118b6319c55a79b3f8ae0a40ad5f419430ba27b0
net-snmp-perl-5.9.4-15.el10_1.2.ppc64le.rpm
8b796ddfaa35bc43c393bd25b9fbf1d180dbe65a840d94d5b0bc01efde1d8e18
net-snmp-libs-5.9.4-15.el10_1.2.ppc64le.rpm
be1b07d2d11c50161acc1e6fa17f1a40f7eebb6cb7f9a9fd77531597db8c61f5
net-snmp-devel-5.9.4-15.el10_1.2.ppc64le.rpm
5884e342c732cc0eedea9047623dd87d4e86e7b644189b4464ace12c086c8350
python3-net-snmp-5.9.4-15.el10_1.2.ppc64le.rpm
841e5decd8a62020780e637196bc3fb2b237e7954bbfd49936c7f1d363149fdd
net-snmp-utils-5.9.4-15.el10_1.2.ppc64le.rpm
bfcef1d90d743ab13cf431f469261c307879aa38ad1fe28694e0916e8f4bc3c5
RLSA-2026:0922
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-tests-1.25.5-1.el10_1.noarch.rpm
37193f1ea5fe167f83ebd687d22a6c0911a285d06a3865a229f59e019e02323f
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-docs-1.25.5-1.el10_1.noarch.rpm
509934389da150ab8af62eadc5261fc91afbeb1f02291b5dd3b94fb73fd64393
golang-bin-1.25.5-1.el10_1.ppc64le.rpm
9d06dae9c4e1fa18f17e783c3000a70c60e8568cce3504066deb1a5193cc3926
golang-1.25.5-1.el10_1.ppc64le.rpm
c4b2bff21ffc48a28dee4fa3260e2cc16f0000c91937b8736d29135a55de3ea3
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-misc-1.25.5-1.el10_1.noarch.rpm
0baede789c6eb9f29fb31fc4f2eeac953f7f11de4464a6e5f54155744799cac8
golang-race-1.25.5-1.el10_1.ppc64le.rpm
cdd01d29f446a46b3b035e79ae4d4ff7f9222d26939d4d598b1068a79083c5a2
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
golang-src-1.25.5-1.el10_1.noarch.rpm
3471f8593ee325afc1423143bb49a46d3676a5dbfa904a095a1bb8820e61a05a
go-toolset-1.25.5-1.el10_1.ppc64le.rpm
1d87c2b71d86c749fcbcc96a9cfaf641d3bbce8d0ab47de6ca8e88676a7c012b
RLSA-2026:1597
Moderate: iperf3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for iperf3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Iperf is a tool which can measure maximum TCP bandwidth and tune various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, and data-gram loss.
Security Fix(es):
* iperf3: iperf Heap Buffer Overflow (CVE-2025-54349)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
iperf3-3.17.1-5.el10_1.ppc64le.rpm
a073a90c3513401109dc8fef89f28440e05f60c24f175c8b3d5b92a20b62e24e
RLSA-2026:1628
Important: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for php.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: heap-based buffer overflow in array_merge() (CVE-2025-14178)
* php: PHP: Information disclosure via getimagesize() function when reading multi-chunk images (CVE-2025-14177)
* php: PHP: Denial of Service via invalid character sequence in PDO PostgreSQL prepared statement (CVE-2025-14180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
php-opcache-8.3.29-1.el10_1.ppc64le.rpm
7a1b60b8c09c5a7b75bf3d05952ff29a04e4e319c3a308d5c68362575b3bc4cc
php-xml-8.3.29-1.el10_1.ppc64le.rpm
3714a19be98d05bb6337c69871d7096e8f1454640fe1df8fef136859d8e7e8ff
php-gmp-8.3.29-1.el10_1.ppc64le.rpm
51c2707340227476a7d25622542463934823e75ce6e781adfff92bed5de397b4
php-odbc-8.3.29-1.el10_1.ppc64le.rpm
19baaea818e7cc0bb3552e8d7244c87c57da57dc6084034f1a8bd1bdba4fc613
php-dbg-8.3.29-1.el10_1.ppc64le.rpm
6050a2288bc1e3d1d74f7714024fdc80e8d265adb4092468ad3438ab80d6a958
php-pdo-8.3.29-1.el10_1.ppc64le.rpm
a7d856fee83d73728202b25af905cd17337ab5f4cbdbf08a811a23fc6043e273
php-dba-8.3.29-1.el10_1.ppc64le.rpm
e5896276e8a40fb75b39cbb1a63dec56f56692e3969301f8626d8336a89db51f
php-embedded-8.3.29-1.el10_1.ppc64le.rpm
4b238252507a45bf67f00dcd060c946d403236719deae8863ba4cde442f00f3a
php-fpm-8.3.29-1.el10_1.ppc64le.rpm
da5471cbf488cebb4358091b243f5248a4c72d8f602839abb0087ecd859e7e97
php-common-8.3.29-1.el10_1.ppc64le.rpm
69c2e186d5a5aa425c37441b0932d36bb5f47f3c5215f34a3a9a5a55ac60eab8
php-mysqlnd-8.3.29-1.el10_1.ppc64le.rpm
9dbc8141a9dce6971755abfea3ad3951d1eefa93a8df15c06f807595b029af49
php-8.3.29-1.el10_1.ppc64le.rpm
e008669d477fbaa72b1487c08187e4f82b8f6e73c9a7aa1f171d64e5a03090e8
php-pgsql-8.3.29-1.el10_1.ppc64le.rpm
db61482444c53f05b1ea4193e47ee429bcba7e99b1d0bc78b7e6b4ef67afd599
php-ffi-8.3.29-1.el10_1.ppc64le.rpm
e1378101c2643260ae22cd268bcc4eb3c6658187c06774505abd36bdfa05d84a
php-devel-8.3.29-1.el10_1.ppc64le.rpm
9018d7a2bb0b31902dc96c0a0efb7832b355c3e6bbe424985814fd4be77da062
php-ldap-8.3.29-1.el10_1.ppc64le.rpm
aa2cd6310813bb914ffbc285e214a08251d55c9986c6911b4e3a5e5884a30dbd
php-soap-8.3.29-1.el10_1.ppc64le.rpm
25d14b7c1d5925f68f8198aeeb0c20d7fca20a6137ad09a3ed9dbdfcadcce71b
php-snmp-8.3.29-1.el10_1.ppc64le.rpm
59ffc4acfe4afe7b18be46cae55c139500bc56b20cd89cf6a2780347f8757f02
php-cli-8.3.29-1.el10_1.ppc64le.rpm
f939a5e00f4b3fee7b6b65a26c623599c5cbe6ff467b99ecab8727c05750a998
php-enchant-8.3.29-1.el10_1.ppc64le.rpm
580826f68ac1cf81a21dd465da00c0f2059161ee520d61038b09a31170d446a7
php-bcmath-8.3.29-1.el10_1.ppc64le.rpm
34630dc36310cc94bdde3b8384ab87ab72e80912cd3769c7af0e75255365656a
php-intl-8.3.29-1.el10_1.ppc64le.rpm
d151106da88659dc38dfafc7a8baa4231e73468f7dd1b8fe3cd3eb9405bd105a
php-mbstring-8.3.29-1.el10_1.ppc64le.rpm
725c68ae7ed85b5d97058be8bdeca46bddfa8686b3ef49c5ea9e33a24953cce8
php-gd-8.3.29-1.el10_1.ppc64le.rpm
e2cb87a84739797d50bb16e3c33817818d98e6d371d92f7f37184b43a1e072e5
php-process-8.3.29-1.el10_1.ppc64le.rpm
4a905634b280fd7934374520e2a717f7542aa2714cfdabd124c7ba9eb1d22c1b
RLSA-2026:1714
Moderate: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* Wireshark: NULL Pointer Dereference in Wireshark (CVE-2025-9817)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
wireshark-cli-4.4.2-4.el10_1.2.ppc64le.rpm
269caec44f2086f1a3d0e88750c6ed561048b49cf4b2e27bf070e73ac8d4e262
wireshark-4.4.2-4.el10_1.2.ppc64le.rpm
d211cf33240e55edda0843f9c9b6bc669424faeeea4958e3ada6cdce21667662
RLSA-2026:1715
Important: golang-github-openprinting-ipp-usb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang-github-openprinting-ipp-usb.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipp-usb-0.9.27-4.el10_1.ppc64le.rpm
051b8f06a663b1bab5684c068a8ab32c9f133896c0dc7eb4942dcb3c9cb73665
RLSA-2026:2182
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (CVE-2026-0719)
* libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_1.9.ppc64le.rpm
5bfff046cdd34f9e6957f571d310881cec5b3028c88cf4d379efc2041314573f
libsoup3-devel-3.6.5-3.el10_1.9.ppc64le.rpm
51faefdf3df3aca2f9ab5a127131096020d22c975492e3d3a9bd941077da9acb
RLSA-2026:1905
Important: fence-agents security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for fence-agents.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
* pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ipdu-4.16.0-13.el10_1.2.noarch.rpm
6d6b49af741df947e13524e43e0955aa2c0f52403d8bf836334e6c951c07664b
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-ilo-ssh-4.16.0-13.el10_1.2.noarch.rpm
f7b20f7e215b4808d5083ef2fdb88b7fe6852b022696e398c5923317cb84e699
fence-agents-all-4.16.0-13.el10_1.2.ppc64le.rpm
8e3168ac6bc001644332910751f34a0c7706e73919cbcbfd4224c3d7f038a2bc
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-intelmodular-4.16.0-13.el10_1.2.noarch.rpm
744983f9b876d2e6204e4fa9f7ccf98b53900005a2c60501e820359f56301108
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-cisco-ucs-4.16.0-13.el10_1.2.noarch.rpm
fa3c44b37e4e9b99ecde0486d8ffdb9b7686e34e6f96a5a7a1ca25e3e96f342e
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-heuristics-ping-4.16.0-13.el10_1.2.noarch.rpm
da9c4f59307029c579f0231587b0f226112896e8d9524a0072cba6995bcd8f62
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-vmware-soap-4.16.0-13.el10_1.2.noarch.rpm
db27ed6e5c4c2bedc1c57e6d188c2fb8eb1b4190db5e3ccf2bc85cd699e31c56
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-hpblade-4.16.0-13.el10_1.2.noarch.rpm
a13f18f3a7352dbb80c55920b5804ac145c308861beb7f98d23cb04ce6fb55c1
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-virsh-4.16.0-13.el10_1.2.noarch.rpm
6946997cd0e441920755d88aae9fc5e3dff75ac1a8d70a71a78728c2d4ecf17f
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ilo2-4.16.0-13.el10_1.2.noarch.rpm
ad6341e317306438f9eb28bf844390b525aa784bdcd3d86ca3201141bc319895
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-ifmib-4.16.0-13.el10_1.2.noarch.rpm
c352c5b8f487314eb9267a04de69cff78ab1cf752e767ed24dcc9ee172d06f95
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-emerson-4.16.0-13.el10_1.2.noarch.rpm
4d41c05e178981fa8db8579bf696f853f15a1ea37354bbe12366f1b70c49142f
fence-agents-kubevirt-4.16.0-13.el10_1.2.ppc64le.rpm
7c1068380c6f077f13268a3b3fcfb05bf9e781b613a024ffea7a28daaa6a052c
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-apc-4.16.0-13.el10_1.2.noarch.rpm
6069ff740536ce03e921217bbcc695237f025395e8675551bede3ba6b2a2a9e0
fence-agents-kdump-4.16.0-13.el10_1.2.ppc64le.rpm
75b68fe709f49d7e7e29c4d0299df21f089a6ff0ca871850b229346e93b8cf45
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-ibmblade-4.16.0-13.el10_1.2.noarch.rpm
3d8158d5f7fad1e6437ab26b4ebb670d22bc2bffacd74debda5eca8fbc5d99e8
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-sbd-4.16.0-13.el10_1.2.noarch.rpm
f00dd62eab14ee407ca82c221c62884e7a7015f8faa54b8f1ea0f448f9502ca6
fence-agents-openstack-4.16.0-13.el10_1.2.ppc64le.rpm
e4a3824d76c57ae989b921e4cb69c001c6caa44bab827dbf679c9e76a0433122
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-amt-ws-4.16.0-13.el10_1.2.noarch.rpm
94f12803ea6b260f160dad9c1da96ca3eab05aaacfd02ed23457c52e051b1a48
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-rsb-4.16.0-13.el10_1.2.noarch.rpm
db6c37fa9ffa72f12c41d25c5a6182a9a712196e9438e62f70332f930d5526cf
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-apc-snmp-4.16.0-13.el10_1.2.noarch.rpm
ac8ec113d3e4561b7ad8cc68dc070a75892c982c2accd5e90838a19f7684667d
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-vmware-rest-4.16.0-13.el10_1.2.noarch.rpm
20573bb73c629bbaa9630fc494c081d0b5050bf42fc24f2c2bc048df656ff272
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ibm-powervs-4.16.0-13.el10_1.2.noarch.rpm
59aba5896367a98b1c2fc5d2ddb177d18a415f74504d32a1ba40be7e1d2a2e35
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-ipmilan-4.16.0-13.el10_1.2.noarch.rpm
04d3d314ab0871cb6b3a2e5b675e043493c3d322e4a78e51075d51e3b0589a61
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-mpath-4.16.0-13.el10_1.2.noarch.rpm
69f5e537c670b4b47389c422b242cd9a62d5f5f28a09bc47c3a58397601902ec
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-ilo-moonshot-4.16.0-13.el10_1.2.noarch.rpm
9d70edbb0cd1a6268436c33a1e99c54d9f56c3fa8c7f0140d04ba88547648405
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-brocade-4.16.0-13.el10_1.2.noarch.rpm
088994c92aa2eed0381485f4fcbb0c4a6d6d5d38011614fc0cfc133ecc7ea5ce
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-scsi-4.16.0-13.el10_1.2.noarch.rpm
a3c22cbaf14cd9c68558c19337b5e4d82d6ed053c3e3798aa9fdb60db8538b83
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-ilo-mp-4.16.0-13.el10_1.2.noarch.rpm
c938db8c5d2443f7a19598454d72eb7d4cc00f4c460e2db8aa0cae6c323dc40e
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-drac5-4.16.0-13.el10_1.2.noarch.rpm
2cbd0cba564e2dc0c8f1df64abb3633714c5cfce3cca1f62bab8212b0e02c1b7
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-cisco-mds-4.16.0-13.el10_1.2.noarch.rpm
7ec071eefb60bebdcb40ac3b4d3dde0211749971d7a01296dfe45deb5110e6f4
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-bladecenter-4.16.0-13.el10_1.2.noarch.rpm
b6ca56e874c07d826cbc2c6db3ed94cae4164f3a892b7a428297eeea98219d09
fence-agents-redfish-4.16.0-13.el10_1.2.ppc64le.rpm
f29884e41c1be2262c1c7c0ea3eca0672d5fb372ec5016c530e9a482928e8d49
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eaton-snmp-4.16.0-13.el10_1.2.noarch.rpm
20384778df91636f46cee3afb7d0ffbcb5153d988d4fe84f48df27276066bc11
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-eps-4.16.0-13.el10_1.2.noarch.rpm
c394a51084efead2948dd570410324d03a3f7ad7536d02a7ca00aedf7c7e2a6c
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-wti-4.16.0-13.el10_1.2.noarch.rpm
6a0c5faaebea74abe72a2fe4b1aa6f14c69b0f31376863858d5d7c45abfca561
fence-agents-common-4.16.0-13.el10_1.2.ppc64le.rpm
3a9e1fca42fd206bc1fbc7c62bf26f00b01c48ee1b3a16a80544dc16ab8c31cb
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-ibm-vpc-4.16.0-13.el10_1.2.noarch.rpm
957b8b2ba4630b26ed33a390e830e4cfe18212722e40bb0734b6943471b29578
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rhevm-4.16.0-13.el10_1.2.noarch.rpm
5790c225105735536180d29888748191f67188e202ca93084b61cb61e9fc0832
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-rsa-4.16.0-13.el10_1.2.noarch.rpm
176fd22fc375634e906848efe06cb418e9b0209dd59442ffa99d05d1c3372885
fence-agents-lpar-4.16.0-13.el10_1.2.noarch.rpm
0a130538f252739c95f1b60984a0c614bab4f99fbb4e170c49c988d8e80e6065
RLSA-2026:1842
Important: nodejs24 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for nodejs24.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a platform built on Chrome's JavaScript runtime for easily building fast, scalable network applications. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, perfect for data-intensive real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
nodejs24-devel-24.13.0-1.el10_1.ppc64le.rpm
5fd1bfaab2b82ea84d7c424733bb57912f846a2247a14b62f21dc926401f29b6
nodejs24-libs-24.13.0-1.el10_1.ppc64le.rpm
533fe84212ce2b7530b9e4c389a52985206f83b78e818695088bfa30ce00dfc7
nodejs24-full-i18n-24.13.0-1.el10_1.ppc64le.rpm
36bbebe1cb52b495d84725833f1dd93be4149eb2ba2f350a323317204e004200
nodejs24-24.13.0-1.el10_1.ppc64le.rpm
a0fd6b20b7b987567c6bed2144a4886a5149402a9b71c05a3084e1fe1dfd3d5b
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-docs-24.13.0-1.el10_1.noarch.rpm
1d2e9d7d3bbf686a1862ba194782f22e5eb522f1643084d926e5ba576ab067d0
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
nodejs24-npm-11.6.2-1.24.13.0.1.el10_1.noarch.rpm
47139c6e8c75276e94a4d2cc6f41ac80bd7d7eb07b95f00f1db117d1754e7b48
RLSA-2026:1843
Important: nodejs22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for nodejs22.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Nodejs filesystem permissions bypass (CVE-2025-55132)
* nodejs: Nodejs denial of service (CVE-2026-21637)
* nodejs: Nodejs denial of service (CVE-2025-59466)
* nodejs: Nodejs denial of service (CVE-2025-59465)
* nodejs: Nodejs uninitialized memory exposure (CVE-2025-55131)
* nodejs: Nodejs file permissions bypass (CVE-2025-55130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
nodejs-libs-22.22.0-3.el10_1.ppc64le.rpm
9e0c522f612a81a6fc340454036b94f6b6d5eccd90291f833c2cc062cde7d76e
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-docs-22.22.0-3.el10_1.noarch.rpm
12418e04b77a2c1137c2647a82575b946895b7fc9ae0b47193086ae6efb251f4
nodejs-full-i18n-22.22.0-3.el10_1.ppc64le.rpm
0977d32935bde88b590c5d3fd804c2b095b138bf6b71057f34edbdc3f558d1ec
nodejs-devel-22.22.0-3.el10_1.ppc64le.rpm
6ce4968d8bc90d063c82a2dded03b198360d2e9d7f3f2da2c9a26a009a5e7c32
nodejs-22.22.0-3.el10_1.ppc64le.rpm
36928d9be09af2e77948dc8412c39694c923080971ccd1dbde689470db4288b0
nodejs-npm-10.9.4-1.22.22.0.3.el10_1.ppc64le.rpm
99fe99b75a4c9192c3ce029fce32d46d9e5bcaa39d29969f4c5cd6422c580de0
RLSA-2026:1831
Moderate: qemu-kvm security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for qemu-kvm.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.
Security Fix(es):
* qemu-kvm: VNC WebSocket handshake use-after-free (CVE-2025-11234)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qemu-guest-agent-10.0.0-14.el10_1.5.ppc64le.rpm
216c1735419776ed8c1d6cf1ff2d7e37e82afb5fa118bd841eb6f741d66e60f3
qemu-img-10.0.0-14.el10_1.5.ppc64le.rpm
60a37e17890429f931c51e73417a99e7c50c3127fb774f0fbdba929ee39ed08d
RLSA-2026:2225
Critical: keylime security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Critical
An update is available for keylime.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.
Security Fix(es):
* keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing client-side TLS authentication (CVE-2026-1709)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
keylime-7.12.1-11.el10_1.4.ppc64le.rpm
393ad9013113ff824fd8fd95d9ab7821ee249bf5c00e0945089f021237aedaaa
python3-keylime-7.12.1-11.el10_1.4.ppc64le.rpm
e1b82002b8cb6fed34cb026b99227b601668b998dc3177931c84441232546e3b
keylime-base-7.12.1-11.el10_1.4.ppc64le.rpm
5540bb94000fa0edb13ce4e34b783b6b25ab6ad96823a4188d37d1c5b3fb6cf5
keylime-tenant-7.12.1-11.el10_1.4.ppc64le.rpm
b4a7d4a13d6ceedb46925b04fb91e1aa041a1ca09a7f4122edbead9e2a547939
keylime-registrar-7.12.1-11.el10_1.4.ppc64le.rpm
c2fba559802c7310cab8abaa3a7fffbc6f402d58cef8309da666c1aa6ae056b6
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-selinux-7.12.1-11.el10_1.4.noarch.rpm
cf74ec0786a2fb42cf5d46aeb335f4a59596ac3b4c0f380088d7dc98a4912fed
keylime-tools-7.12.1-11.el10_1.4.ppc64le.rpm
4d991a3f7eb93bdca68ad56718205e85d9291511d2cb76ab7f22f111d9e0ca0a
keylime-verifier-7.12.1-11.el10_1.4.ppc64le.rpm
8cb3b6585540d4f5f25cb4a2158eb2281e69c7a39621fd5ae299855248ca945d
RLSA-2026:2222
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP: Heap buffer overflow leading to denial of service and potential code execution from a malicious server. (CVE-2026-23530)
* freerdp: FreeRDP: Denial of Service and potential code execution via use-after-free vulnerability (CVE-2026-23884)
* freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server (CVE-2026-23883)
* freerdp: FreeRDP: Heap buffer overflow leads to denial of service and potential code execution (CVE-2026-23533)
* freerdp: FreeRDP: Heap buffer overflow via crafted RDPGFX surface updates leads to denial of service and potential code execution. (CVE-2026-23531)
* freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow (CVE-2026-23534)
* freerdp: FreeRDP: Denial of Service and potential code execution via client-side heap buffer overflow (CVE-2026-23532)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
freerdp-libs-3.10.3-5.el10_1.1.ppc64le.rpm
763902f8cef3ee5dc831aa721e0dc24f577812d6f7ff26e51e96891c133f6e92
freerdp-3.10.3-5.el10_1.1.ppc64le.rpm
6ad34eca6367ea24616daf5f456444efc1ecf821d6109cb1461942626c9691e2
libwinpr-3.10.3-5.el10_1.1.ppc64le.rpm
6d7a52789c802da6b7e602d12f9f8b7eb1ae52532e501ae20a64057d15bafed2
RLSA-2026:3443
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* Valkey: Valkey: Data tampering and denial of service via improper null character handling in Lua scripts (CVE-2025-67733)
* valkey: Valkey: Denial of Service via invalid clusterbus packet (CVE-2026-21863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-devel-8.0.7-1.el10_1.ppc64le.rpm
af5bf534379a971b7d590cfcf852b49cd4e1c4a2080b00cadccd4ed2bc8b7d65
valkey-8.0.7-1.el10_1.ppc64le.rpm
4ee4ba3841f8245601715cac89a200aa0d99058431dbe9d3de6f74323dcc6bfa
RLSA-2026:2410
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-devel-3.6.5-3.el10_1.10.ppc64le.rpm
2f17252154011feb41cdec07edf54fa03aea82114767f7f8b3cdd8c1427902e2
libsoup3-3.6.5-3.el10_1.10.ppc64le.rpm
cf9ebca8a62519361954208ca137b6b1dd4526bb17e36688dc8f1b5f361b7870
RLSA-2026:2706
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* cmd/cgo: Potential code smuggling via doc comments in cmd/cgo (CVE-2025-61732)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-misc-1.25.7-1.el10_1.noarch.rpm
e919b39c47979171d95fba6b72cbe2c625a403eb2d65dc8417c5a5b4cf5ef7de
golang-race-1.25.7-1.el10_1.ppc64le.rpm
c789b563bd811c8a7bb0be90466a94fd40f561e0b099a966711434a5b7322276
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-docs-1.25.7-1.el10_1.noarch.rpm
27e6ef9ca5cf6b646ea3832990b77afbdef885afd9c6768c360cc95d1d5c87e1
golang-1.25.7-1.el10_1.ppc64le.rpm
bf7f61e734ddba9b467101c89f087f8243b6db76ef23188f9c4ea8d75c7dedf8
go-toolset-1.25.7-1.el10_1.ppc64le.rpm
38d1b9a345fa85f4183e1eef94da11b1da2de167bdc48d5ce7df4819feffa5d0
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-tests-1.25.7-1.el10_1.noarch.rpm
a5c9084a174853dde1a972c47efc09986f37062a178d9846e02f2964cabc0bb6
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-src-1.25.7-1.el10_1.noarch.rpm
f155d31640cca7f4abb754b982b9f359504bc9047e1852dc24d168bb3f631e68
golang-bin-1.25.7-1.el10_1.ppc64le.rpm
93c39cf36f50c0335ec0d762ea4991f9d88306b494c9a0968c2b2a13735f8f49
RLSA-2026:2914
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* grafana/grafana/pkg/services/dashboards: Grafana Dashboard Permissions Scope Bypass Enables Cross?Dashboard Privilege Escalation (CVE-2026-21721)
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-22.el10_1.ppc64le.rpm
189ae5787f8d4444029cf06d156e1a4bfbe98ff22f93f5cba8dbdb06a7acdda2
grafana-selinux-10.2.6-22.el10_1.ppc64le.rpm
ff6a0784be10e4a81e804ceb79c4d172c53f815feb3ac8dd765a769bd8fdb63c
RLSA-2026:3035
Important: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for grafana-pcp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-pcp-5.3.0-2.el10_1.ppc64le.rpm
f9621e1aa5292b3b8468d97b5054d806cdf206ed1c91ada102f94427743b878f
RLSA-2026:3033
Important: munge security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for munge.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods.
Security Fix(es):
* MUNGE: MUNGE has a buffer overflow in message unpacking allows key leakage and credential forgery (CVE-2026-25506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
munge-libs-0.5.15-11.el10_1.ppc64le.rpm
14babf96cb5662a96e915f0729de0711a1292a904b7669bd2af92c5346b4fd8c
munge-0.5.15-11.el10_1.ppc64le.rpm
730a0bdb2a27ddc6b96896e7e614331b19cc40c8d8272c240da82afada1cb74f
RLSA-2026:3068
Important: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22855)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22853)
* freerdp: FreeRDP global-buffer-overflow (CVE-2026-22858)
* freerdp: FreeRDP heap-buffer-overflow (CVE-2026-22859)
* freerdp: FreeRDP: Denial of Service via use after free in ecam_channel_write (CVE-2026-24678)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
freerdp-libs-3.10.3-5.el10_1.2.ppc64le.rpm
5828f1373d5c296e488638682fe274434b290473d8b2b89a56c5b192774d7ed4
libwinpr-3.10.3-5.el10_1.2.ppc64le.rpm
d0317d4690f86ca4b074c8d4906bfe3127aca6eec3c8f6878b2bb77bad4b38c1
freerdp-3.10.3-5.el10_1.2.ppc64le.rpm
53cc6f97805683ea9b49d486f3bc745d0b9a40fde6a19b415a8e5ee90cc41523
RLSA-2026:3092
Important: golang-github-openprinting-ipp-usb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for golang-github-openprinting-ipp-usb.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipp-usb-0.9.27-5.el10_1.ppc64le.rpm
45145775d062d6171c2adbe2ec6c66b943d4fe6dc0143d3a362f82fc81afe7e5
RLSA-2026:3094
Important: protobuf security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for protobuf.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The protobuf packages provide Protocol Buffers, Google's data interchange format. Protocol Buffers can encode structured data in an efficient yet extensible format, and provide a flexible, efficient, and automated mechanism for serializing structured data.
Security Fix(es):
* python: protobuf: Protobuf: Denial of Service due to recursion depth bypass (CVE-2026-0994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-protobuf-3.19.6-15.el10_1.ppc64le.rpm
6988a6644a645440a047e90aba7a0757daa61b54da24440519125ab65b94ef7a
protobuf-lite-3.19.6-15.el10_1.ppc64le.rpm
9b63e3058784efab72b29146b60bbad221948de836f70759f7962d301add2bae
protobuf-3.19.6-15.el10_1.ppc64le.rpm
af1853cac6dafeacd9d505913837679e8759cccad979b69d4b2216a9d490010e
RLSA-2026:3208
Moderate: 389-ds-base security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Moderate
An update is available for 389-ds-base.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: 389-ds-base: Remote Code Execution and Denial of Service via heap buffer overflow (CVE-2025-14905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
389-ds-base-3.1.3-7.el10_1.ppc64le.rpm
a1f7e30d9b05bc079c10784c78e3fea3904b5a749d5e7cb0107f364efa350db7
389-ds-base-libs-3.1.3-7.el10_1.ppc64le.rpm
fef965e587803105bcc3be208da977c7d49d52821edd63c87ad97194bc82f46e
389-ds-base-snmp-3.1.3-7.el10_1.ppc64le.rpm
1d08015e976f93b995b2c1ec5b6c2992047199f6bbbcd1ce991862a7f461995d
python3-lib389-3.1.3-7.el10_1.noarch.rpm
3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48
python3-lib389-3.1.3-7.el10_1.noarch.rpm
3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48
python3-lib389-3.1.3-7.el10_1.noarch.rpm
3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48
python3-lib389-3.1.3-7.el10_1.noarch.rpm
3de41c1f87bf374e89d73ff11abb7793efb0c38be054059155cde52dc2d29e48
RLSA-2026:3297
Important: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-tests-1.41.8-2.el10_1.ppc64le.rpm
bf5018c18728e8af09954d6c820c1d2989b56047f078ffea572117c3bada3890
buildah-1.41.8-2.el10_1.ppc64le.rpm
9572e7642de497cdeff0fe1f6dd4f83ecd07dd8c18c4793bb676be6d917619b4
RLSA-2026:3336
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: archive/zip: Excessive CPU consumption when building archive index in archive/zip (CVE-2025-61728)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-remote-5.6.0-12.el10_1.ppc64le.rpm
360e0936daf3453cd5199691a0c27a0cb13a0f233eda1c74237bed98b3cc1964
podman-docker-5.6.0-12.el10_1.noarch.rpm
2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41
podman-docker-5.6.0-12.el10_1.noarch.rpm
2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41
podman-docker-5.6.0-12.el10_1.noarch.rpm
2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41
podman-docker-5.6.0-12.el10_1.noarch.rpm
2dd7bd90122e6ba9f8bd5e0acc65c7395f2d0160075dfdf770e2df9ff4cb4f41
podman-5.6.0-12.el10_1.ppc64le.rpm
7331f2cc190b4f868c87a3c0c6f417d5a219aeada569d7950cf6ee800adca742
RLSA-2026:3343
Important: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate (CVE-2025-61729)
* golang: net/url: Memory exhaustion in query parameter parsing in net/url (CVE-2025-61726)
* crypto/tls: Unexpected session resumption in crypto/tls (CVE-2025-68121)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-tests-1.20.0-3.el10_1.ppc64le.rpm
463d322d76a632684d3454382bba071580466c88a1d88d7c907f5169842a6c07
skopeo-1.20.0-3.el10_1.ppc64le.rpm
82be481433385cc312abdfb7b92b15175cb0d3d45ad362bccf72048605dae3a2
RLSA-2026:3354
Important: python-pyasn1 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for python-pyasn1.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* pyasn1: pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID (CVE-2026-23490)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm
1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1
python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm
1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1
python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm
1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1
python3-pyasn1-modules-0.6.2-1.el10_1.noarch.rpm
1c60e78956141e52bf419861d056c95bcbddda4c480f855146d603ddf86e41e1
python3-pyasn1-0.6.2-1.el10_1.noarch.rpm
ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1
python3-pyasn1-0.6.2-1.el10_1.noarch.rpm
ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1
python3-pyasn1-0.6.2-1.el10_1.noarch.rpm
ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1
python3-pyasn1-0.6.2-1.el10_1.noarch.rpm
ce218548da8b604e37639340da121a27df8b87cc1901835fb99135a70de2dfd1
RLSA-2026:3361
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* libvpx: Heap buffer overflow in libvpx (CVE-2026-2447)
* firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785)
* firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793)
* firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771)
* firefox: Integer overflow in the Audio/Video component (CVE-2026-2774)
* firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776)
* firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781)
* firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766)
* firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769)
* firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787)
* firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768)
* firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783)
* firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788)
* firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784)
* firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759)
* firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762)
* firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761)
* firefox: Privilege escalation in the Messaging System component (CVE-2026-2777)
* firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790)
* firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763)
* firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792)
* firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786)
* firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789)
* firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757)
* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760)
* firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772)
* firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779)
* firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767)
* firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764)
* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782)
* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765)
* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780)
* firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778)
* firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758)
* firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791)
* firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.8.0-2.el10_1.ppc64le.rpm
172e251ee25f06b18c79e8771d479c8ceef2e006c6eadda1cb4b50e3b6440098
RLBA-2025:5309
Moderate:mod_proxy_cluster bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
none-appstream-rpms
mod_proxy_cluster-1.3.21-1.el10.ppc64le.rpm
75fddaa79eaeb59ceacf6d16ac7083f35b4c3d2b1c5a2d50c2a6b738f6ef8655
RLSA-2025:7496
Important: libxslt security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxslt.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism.
Security Fix(es):
* libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855)
* libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libxslt-1.1.39-7.el10_0.ppc64le.rpm
bbb137e3a36b77de72ede7a3d7387f537eccaac8ead1eb0bcc9f1af2a6925049
libxslt-devel-1.1.39-7.el10_0.ppc64le.rpm
ea9a5ca6ab7867af2df744b7563231ffe77791b65414c64515f8a57e53e2adef
RLSA-2025:7466
Moderate: delve and golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for delve, golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible.
Security Fix(es):
* golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341)
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
delve-1.24.1-1.el10_0.ppc64le.rpm
a068857d8c215dfa0f1144869b78c627d6da600ae27179f16379bb965024e649
golang-1.23.7-1.el10_0.ppc64le.rpm
aaebd2d14fdabf28ca2e2dd7ae3c68c691e6c55f942032d2d8cc24dc66f64302
golang-bin-1.23.7-1.el10_0.ppc64le.rpm
bb1268254943ccbf3c8e4593bcf3036527be19f80e52a9947048bb2fc7a65838
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-docs-1.23.7-1.el10_0.noarch.rpm
a173b0da2e4752bfec1cf06f363224f6fa16ddba7370e6f2ffb8247587a4bcf4
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-misc-1.23.7-1.el10_0.noarch.rpm
7bc05ee75edf98cb9343ef66d21fe35c1c592c61ba91484f778ac863170b4c0f
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-src-1.23.7-1.el10_0.noarch.rpm
96f3dbb87940a6cfb09e7cc728c9fa35b1823688d51cdc133a0f9d051890835a
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
golang-tests-1.23.7-1.el10_0.noarch.rpm
859c5d5d9e4832afaeaf815e3564bfe80ada878f8e9efec2845d1c0e0cadbe4f
go-toolset-1.23.7-1.el10_0.ppc64le.rpm
09a3e329a7906a0b2391f0df2c585ae71401f75c26e681ef7515755b4b1a5665
RLSA-2025:7476
Important: python-jinja2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python-jinja2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* jinja2: Jinja sandbox breakout through attr filter selecting format method (CVE-2025-27516)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
python3-jinja2-3.1.6-1.el10_0.noarch.rpm
0be3f5f469b49779d362bfeb982bfa4e089c5ba06907aea63c842224e044f287
RLSA-2025:7484
Important: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gvisor-tap-vsock-0.8.5-1.el10_0.ppc64le.rpm
c5ec77866c66900ee2de1c82464fa9fe6daad80844cd0890b89c15fc8ccca6ae
gvisor-tap-vsock-gvforwarder-0.8.5-1.el10_0.ppc64le.rpm
d33ef319403a82e649fbbd937fed592a41c06d98fbb2e74523e7581c6e60d8e2
RLSA-2025:7500
Important: perl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for perl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Perl 5.34, 5.36, 5.38 and 5.40 are vulnerable to a heap buffer overflow when transliterating non-ASCII bytes (CVE-2024-56406)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
perl-5.40.2-512.1.el10_0.ppc64le.rpm
18135929bd09d45ff8a63df92eb5be2bfa99ff1a92cc2b88ee7310e20a82e369
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-Attribute-Handlers-1.03-512.1.el10_0.noarch.rpm
df82bff8696134f3dc521dd8b8443178771c46142a732b5626990b8c50b7f322
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoLoader-5.74-512.1.el10_0.noarch.rpm
2b4fca6da03e83a1f282dd4752b9f8f01c285fbabd0ff41d03ab8726d63cf223
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-AutoSplit-5.74-512.1.el10_0.noarch.rpm
47d60990ce13c089eea37d3a61fcd0f19f9cd592c76e7f37c61feabc2dc9b63e
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-autouse-1.11-512.1.el10_0.noarch.rpm
2aed9a5c5c3c64195602f3745dfae8ce3810635d8cffadc3c000cc890ddd103c
perl-B-1.89-512.1.el10_0.ppc64le.rpm
3a28c4f900361c76cd07de9b71302b34041530615513f5f9bcc9aad583180184
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-base-2.27-512.1.el10_0.noarch.rpm
64cb01cd07d0b974b1fe31dafc1ee5b2de90cd38f9e6a7885ec3903b83e8f0b4
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-Benchmark-1.25-512.1.el10_0.noarch.rpm
74ac8e111917550e3ae4bdc752e4021ce8d84ac96ea09db372c5902e59db11ae
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-blib-1.07-512.1.el10_0.noarch.rpm
9105b51ea0d25e084761b4c0090ac6a7920e6ec963b8205050ef0bd5953b9adf
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Class-Struct-0.68-512.1.el10_0.noarch.rpm
b0a5b9a9669ac59df8d16e5f193cc73e2cf6533f56f865fafc28ef0c9bcbe536
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-Config-Extensions-0.03-512.1.el10_0.noarch.rpm
6f685d02211fce93b0617d99de4c02719ee94e418aaafa7e907a88e11fd861ec
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-DBM_Filter-0.06-512.1.el10_0.noarch.rpm
6f8f99b4dd16050e8554ca0dd65a11c063a26dfdffb224a626ccb3ae0633c5f8
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-debugger-1.60-512.1.el10_0.noarch.rpm
8fc7bfa0a4fe63fd2e0da152b148598355d27c933e2460d2e9cc79050b352a65
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-deprecate-0.04-512.1.el10_0.noarch.rpm
9f0afea047f8b7135faf0867cddc951eb1866c137a2cdc16ed9d99c6498aba75
perl-devel-5.40.2-512.1.el10_0.ppc64le.rpm
63286206684164cbe3156669a77158b3684476ce708083c4e72caeef28c8d4ed
perl-Devel-Peek-1.34-512.1.el10_0.ppc64le.rpm
656d1a66f3201af9b257f34904df99db692d823f603e9ee2d84641ecb7df7a28
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-Devel-SelfStubber-1.06-512.1.el10_0.noarch.rpm
c5e20dc46a76c81d39581bec7dba3cd34e8bcbd55d0d1695738030c898c97bed
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-diagnostics-1.40-512.1.el10_0.noarch.rpm
9b993ecbf537f9b8cf7fcc2bba8e9237dcbe10fbd1e00fe8b8055b5e3d6a7a8f
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-DirHandle-1.05-512.1.el10_0.noarch.rpm
d64e1eccf3366c9be2a3998b26bdb732314caedfede71f45729f2b66e700a3aa
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-doc-5.40.2-512.1.el10_0.noarch.rpm
ccbbf526615bcc2b8076d26e5b957bd587df1185b8a89f10050c80049edd50fc
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-Dumpvalue-2.27-512.1.el10_0.noarch.rpm
cae22391d31b927192b3be47b2727061f4455c0a2102000ae3ccdec554d5e0f6
perl-DynaLoader-1.56-512.1.el10_0.ppc64le.rpm
3f229420db61ede8501df39d6b67c87a777fc5f4830e32182ef4adad04786dc4
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-encoding-warnings-0.14-512.1.el10_0.noarch.rpm
1fbd441fd14bde577f07caa18c9a65a54555bbc379fc93216692240e744d8d74
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-English-1.11-512.1.el10_0.noarch.rpm
b29f221e1a50532d874cd57b0640ccdab73bef336d474dc63b91370b064faa06
perl-Errno-1.38-512.1.el10_0.ppc64le.rpm
d696001791c30aae9fbe7472a558b2c32fa5ba18ca418cbdc66c9fc1398fe19d
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Constant-0.25-512.1.el10_0.noarch.rpm
673d5d8970de686dee8373ff9f98ac1c2402e68c83f39265122a76385961bc96
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Embed-1.35-512.1.el10_0.noarch.rpm
fdb1db30f202624588f7cbf745a4a6c8fca01afdf97210a5770510e7b9c2ace5
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-ExtUtils-Miniperl-1.14-512.1.el10_0.noarch.rpm
e72582fed4537442ae4e4a003b1dda5d9698598fb496633807bc081f0e9c15b9
perl-Fcntl-1.18-512.1.el10_0.ppc64le.rpm
bbabf9836f92be622a8c37c9bb9176e38026a639b8d8610541167a675c5a73c7
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-fields-2.27-512.1.el10_0.noarch.rpm
76406839f2803d7b0cb0e251407e0b2a962badf80d05a23875258f25fce023b6
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-File-Basename-2.86-512.1.el10_0.noarch.rpm
18fe7a38257dc997a05f6c6c28982b7eeb3b2f3e5faf691fb96d0e937841428a
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-FileCache-1.10-512.1.el10_0.noarch.rpm
2b487ea17c1aa09778b7dbbd7ac1b47dc6a93b26530fe20371b2bdb51258ad20
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Compare-1.100.800-512.1.el10_0.noarch.rpm
1881005b6b2bde554c16be1802d9bbcd5a909de38ee51ffec32a02583ddb0382
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-Copy-2.41-512.1.el10_0.noarch.rpm
fba17e4e04679f16bd6d6504978b8c6d087c92272c84dee25556d094a11c6d74
perl-File-DosGlob-1.12-512.1.el10_0.ppc64le.rpm
5856110c8454ab037b3f05292f85131bc1d0a2ac84f9aef8b6f976d86c8f90fd
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-File-Find-1.44-512.1.el10_0.noarch.rpm
4340329aebc6d4e2a20a4a0262490a02eab3c3f8c14cdbc56167041bfc406da6
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-FileHandle-2.05-512.1.el10_0.noarch.rpm
3e39fb116ad7d27753bedcef1a6e820f63a60b4c5063bc43fdb243b9650a993a
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-File-stat-1.14-512.1.el10_0.noarch.rpm
69584b304b37a71085d1b1999832552e3dc1f121fa56d4f69a4e29a2e537fa65
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-filetest-1.03-512.1.el10_0.noarch.rpm
40840e2b871078b6563e722341b7b125b6c9d53966929daeca5120eb6c5dd388
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-FindBin-1.54-512.1.el10_0.noarch.rpm
9cad58324085e230d93182830c46360a175d1a0ffba308ceebc7b25f5a7a8038
perl-GDBM_File-1.24-512.1.el10_0.ppc64le.rpm
a5d91617747a078013ce0af2ca6ddb8f3fff97425957457ecd1451475f67734d
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Getopt-Std-1.14-512.1.el10_0.noarch.rpm
99dcfad5e06149134c3ec786f6740c6c72b20ab6edb1cdc03369e2d4b2eb7767
perl-Hash-Util-0.32-512.1.el10_0.ppc64le.rpm
da76cedc7e2c682caf56a0fb20f51984c919ca41c188829fde96007cc388cdf7
perl-Hash-Util-FieldHash-1.27-512.1.el10_0.ppc64le.rpm
fa7aa5f900251fa35f73fa9a70a9b3bba97ad83546cabd2db2c26b8ca00c056d
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Collate-1.02-512.1.el10_0.noarch.rpm
6d20a8498404c9197de54883101b165edfe2b93c5c62070b361e40ae8e3b7f30
perl-I18N-Langinfo-0.24-512.1.el10_0.ppc64le.rpm
54255dbe62a9be23bfe8e535ebbadd82d5a7b4b209b430cae159f2ad310709cf
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-I18N-LangTags-0.45-512.1.el10_0.noarch.rpm
7f3c00984f9daf4674a3946e5cd3e42d38241c28cd50a538ad65b933038acb3b
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-if-0.61.000-512.1.el10_0.noarch.rpm
0e7302913d6133623cbe84b6f7cac2e372e6b05d5f79158b1856baf46a731c51
perl-interpreter-5.40.2-512.1.el10_0.ppc64le.rpm
395b1e3ed45b1264fcd78fa0ce73fa672c5db9e1685714b6eb2bc94637b5d6f5
perl-IO-1.55-512.1.el10_0.ppc64le.rpm
5b7ea07fe2b92efaeab4852e29be44f51577e30c4b9b478026759cf6c730e93c
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-IPC-Open3-1.22-512.1.el10_0.noarch.rpm
b457c4435a6f06fbc648180db5a51c4438d66b150001498f77ea7c211b372769
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-less-0.03-512.1.el10_0.noarch.rpm
670ebc3d46f7503f84b3d69f79b0cb7ff7958b8e7253c1b33c195be31fc9e680
perl-lib-0.65-512.1.el10_0.ppc64le.rpm
20a2eb126e54f7f84d503913c7c51af9f06fdd759e01ce5e3053edcce0c4587a
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libnetcfg-5.40.2-512.1.el10_0.noarch.rpm
41de6c67a452247623014006b4ddb34678ea17acceb43e9df3d2c76725d51ae2
perl-libs-5.40.2-512.1.el10_0.ppc64le.rpm
04856621c2836e541b0daf355f87f154d92b3fbd0859634704515884a9ee78de
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-locale-1.12-512.1.el10_0.noarch.rpm
d20218fb1d4cfb6ba774c3c65ada3fc3ed221a352046a7888d828c9cc1f04b53
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-Locale-Maketext-Simple-0.21-512.1.el10_0.noarch.rpm
0748651e441428a3fe630edd8e59c7c4bd1298c11f73609870dd47f6f1fdbdea
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-macros-5.40.2-512.1.el10_0.noarch.rpm
29508d63ad1c04709cc244b49fee772f1b739c98a5cf40ef77655047e9cb9ab4
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Math-Complex-1.62-512.1.el10_0.noarch.rpm
c65895672c9bb24c35443a82c397d44f2f1eaba3153f78cac25c474240025754
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-Memoize-1.16-512.1.el10_0.noarch.rpm
d7bce1afae95fba04201089bb45eda58f4a6dffe75e15396ae01735f47020508
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-meta-notation-5.40.2-512.1.el10_0.noarch.rpm
ceb2b652e10eb44fa6b0ab9d404ea5d1a504148c788298974b7f0dda845c996b
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-Module-Loaded-0.08-512.1.el10_0.noarch.rpm
c4802ec4db4c080bf27de5740f4460b02dac0afcf04c90e96895d73d81e70caa
perl-mro-1.29-512.1.el10_0.ppc64le.rpm
185c2cfcc2c49cc213e591e65313f415bfe2a14540939301e6bb02fab8a1a20b
perl-NDBM_File-1.17-512.1.el10_0.ppc64le.rpm
8608798125648d4ec472bb6376dc20da06172b76cba998e82fcf68e31e6d13f5
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-Net-1.04-512.1.el10_0.noarch.rpm
3f05fb3a1ccdbf490a8da8d17a6b2f49eb891ce079d12d37896a678226717001
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-NEXT-0.69-512.1.el10_0.noarch.rpm
9bc98bc8feb85d727a82b56b0005d351538fa826649abcdc0d7f94dda0a3f72a
perl-ODBM_File-1.18-512.1.el10_0.ppc64le.rpm
a95de6bcb5df09e2e51b8d59a2e4560a951fcc41b821efc2534df6443fe18f1b
perl-Opcode-1.65-512.1.el10_0.ppc64le.rpm
2b7953689ad3377cd5168f983d276f08b2d9f429ae508f487210f2e97efaf9bf
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-open-1.13-512.1.el10_0.noarch.rpm
5805aba0d8aac827b89fa9b1c6af7998c911c1189b0967b32307a0216270d0d5
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overload-1.37-512.1.el10_0.noarch.rpm
9c701c301917c4cd0a536917ee80b2fc29c532745afa6d840aac1e73ae420502
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-overloading-0.02-512.1.el10_0.noarch.rpm
1567b7808f7d0a3664abddb60175c5009f301886b2b15a1c81ead50987300c5b
perl-ph-5.40.2-512.1.el10_0.ppc64le.rpm
c10f4e58eba544124f5ac410e894eb5e21a037d215a42f24861cbfce84ef7398
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Functions-1.14-512.1.el10_0.noarch.rpm
eeb09288b3ad9d99f248311e87142e9a46f7bc9989727a881b363ba4f6005c22
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-Pod-Html-1.35-512.1.el10_0.noarch.rpm
8221ab5df8c2b1ee30ecb1582bbdf7ec18586516e5c84ebf0cb4f6555da9a7c2
perl-POSIX-2.20-512.1.el10_0.ppc64le.rpm
6a1bbacbb21be77005401ee07f1e4bb223854ccef9ffda396a003bb6b735dbaa
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Safe-2.46-512.1.el10_0.noarch.rpm
6144a8a3c79c9e5a80b8607af9c539b134abb4008bcfa2eb0880a18a8459441f
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-Search-Dict-1.07-512.1.el10_0.noarch.rpm
51c258972fdd46bbd373502c17e6b48644f119ea220152a0d3a4b51c1700a0c5
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelectSaver-1.02-512.1.el10_0.noarch.rpm
8431cdd6e9d962bbf1298e488b9e5af8bc7f184ecb81ddadb8fadf58ca223e88
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-SelfLoader-1.27-512.1.el10_0.noarch.rpm
28d0a2be3dc6a6d05b9e81f46a68fee3d91b26b4461388400dce5b0f27966800
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sigtrap-1.10-512.1.el10_0.noarch.rpm
d02f886ef561027bc19c4418b8de4b5bc7537fe3d35a17db4c2be08d5db132f6
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-sort-2.05-512.1.el10_0.noarch.rpm
f1430143b9693f9bc1e12d1a9df1544d48cd424fc43c3ba61502be710bc60740
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-subs-1.04-512.1.el10_0.noarch.rpm
8918c1a21617b7914d8634e7eac6abde85e395b50e6a6e321b93a3968e7f3da4
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Symbol-1.09-512.1.el10_0.noarch.rpm
17ead97396a311f64f762f306ccf538c25d49404c16e5012fcfff7795db9a969
perl-Sys-Hostname-1.25-512.1.el10_0.ppc64le.rpm
c053e32b88f1e41419a549407f3899cf11833515f7c6c587a2f98ab258a26b47
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-Complete-1.403-512.1.el10_0.noarch.rpm
66b362c03c004559eb0df57b25449a54fee5c3c473bf9ad824a949a0b9b7de9a
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Term-ReadLine-1.17-512.1.el10_0.noarch.rpm
9634510df64298d518d9da81f0498e3c32b5770f5b09ca13b173d29b223c7621
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Test-1.31-512.1.el10_0.noarch.rpm
526ad97e3b7dcd8863fc3e778974b1472368f7d1a8f17b80a05788fa8a6fdd98
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Text-Abbrev-1.02-512.1.el10_0.noarch.rpm
4281e15c48c90708addcc97d41dd25ed9b69c773df3edfc024191d6446d1a506
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-3.05-512.1.el10_0.noarch.rpm
cc65ce65130f119bce6de89dccb7175ccb960bd6bbbbb2adfc271c4f74ea68cd
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Thread-Semaphore-2.13-512.1.el10_0.noarch.rpm
86a92e6eb3c9000fb6ea1184ee93b94e0fb0a3ebb51fc4a69672ddf1dbb39749
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-4.6-512.1.el10_0.noarch.rpm
c504397313693520cb3b5ac42a41f4e460526b0a166eba98ebfe0267c58f9aff
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-File-1.09-512.1.el10_0.noarch.rpm
81d7b7e5cbc4c391f219ebb42adc67dabfe157c3f33b1d3f1ad9e54aa2b884d4
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Tie-Memoize-1.1-512.1.el10_0.noarch.rpm
21cc178b7ea848ba45ef3ffa2fe36ed8904fcae31f89b18a48d6cc535ac83a09
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-1.04-512.1.el10_0.noarch.rpm
1086aba3487a8b2a57d839272fb1e3cf43753f814604070a7469ef0e965d27ed
perl-Time-Piece-1.3401-512.1.el10_0.ppc64le.rpm
7408d193d98dcc57576e30f47ec6d25f4d3b0bf2fc27728e983448bbf05668ff
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-Unicode-UCD-0.78-512.1.el10_0.noarch.rpm
e946bb7b7bea19f5129b8a8f51f60b33fb9ef11f48252c61ba0821caa8348088
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-User-pwent-1.05-512.1.el10_0.noarch.rpm
2e134003c8129f2b32aa4fe533959d092ec05a46c8dcca4388ba21cc680aef6e
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-utils-5.40.2-512.1.el10_0.noarch.rpm
b57e93b65d5b1b9382282af8ae96173bc97169fa2afabb3eb3890745f973e30a
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vars-1.05-512.1.el10_0.noarch.rpm
5a825accc7d995c71c719ec15ab84221c533a3abe6be6b061381d7606a4854b6
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
perl-vmsish-1.04-512.1.el10_0.noarch.rpm
1105ceabfffbdb6623a09ef153437cf83399cf3c9e90886af08debdef5ea9efb
RLSA-2025:7494
Moderate: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-9.0.87-5.el10_0.noarch.rpm
b437e4fc937d6b74f899196746d369a6a92329101a31896fa56218c02f46d8f2
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-admin-webapps-9.0.87-5.el10_0.noarch.rpm
9d89438b2d7d2e13b6ca687b167d642ffaeaa56759ff8ae29ed4b0c6f999c116
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-docs-webapp-9.0.87-5.el10_0.noarch.rpm
da4573e35e6a878c5d8b183fca36afb47d21bd6ddf6986b5036c8fda3a50c899
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-el-3.0-api-9.0.87-5.el10_0.noarch.rpm
633995220500848334199accb63d5fb50138965dc0ea0be7ba15ff6781f0bfcf
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.noarch.rpm
6998f6dff03a9fe84d0f74fe7d58d24d7e852dc4120eece360bfad99e4fd026b
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-lib-9.0.87-5.el10_0.noarch.rpm
b4ad34cca71a8de6a211fca37ab3c96e9b9c7ea305fed7b854295b1b4b834f5c
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.noarch.rpm
18e71ac028c3f2d5029044ab9c6f2b8b1f9e7807d493ae50a4cc5ca943de0197
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
tomcat9-webapps-9.0.87-5.el10_0.noarch.rpm
249400041e694a3f0a2163c207d03ea61a785931ebc8a089e7b48bfaf645da9e
RLSA-2025:7497
Moderate: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for tomcat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API (CVE-2024-52316)
* tomcat: Apache Tomcat: DoS in examples web application (CVE-2024-54677)
* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-10.1.36-1.el10_0.noarch.rpm
4cf0f9042968d70ef2898c37fac49a01de1b1cfa3c328bb07b209e3d8dbff610
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-admin-webapps-10.1.36-1.el10_0.noarch.rpm
9d6f90224fc1711fe2b7abdd716b0731eeffed54dd5cc1aa367e2b363761005f
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-docs-webapp-10.1.36-1.el10_0.noarch.rpm
6d0065b1bf9c100520228fb27d19e05a21a94c08f7afb93cccc1b8c481217c8a
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-el-5.0-api-10.1.36-1.el10_0.noarch.rpm
3976c9f95398f8f87e813ac6f2c3a79195a292f9e82730aa3c2eaaf89eb584c5
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-jsp-3.1-api-10.1.36-1.el10_0.noarch.rpm
e1d02f3b4da77ba27efd41c2081f47ff826e02cdb6f7178d694c7f0d690a79ff
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-lib-10.1.36-1.el10_0.noarch.rpm
ea3e898fec9e468462d24e57789c94a1715e2bee582c87c2323232f238570be5
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-servlet-6.0-api-10.1.36-1.el10_0.noarch.rpm
ef37f975774200329ec5683bb10febc6cd7f6be8d8713a6834f245f604f6cf1e
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
tomcat-webapps-10.1.36-1.el10_0.noarch.rpm
5001b035bd821674c28eca7704f915abfad1d76546fce19420e00a3452040571
RLSA-2025:7490
Important: mod_auth_openidc security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for mod_auth_openidc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.
Security Fix(es):
* mod_auth_openidc: mod_auth_openidc allows OIDCProviderAuthRequestMethod POSTs to leak protected data (CVE-2025-31492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_auth_openidc-2.4.15-4.el10_0.1.ppc64le.rpm
0303375be4cf9fe87cc6fee1e16bf4415d3427b3e53221898701ec2a5ddf9416
RLSA-2025:7458
Important: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)
* X.Org: Xwayland: Use-after-free of the root cursor (CVE-2025-26594)
* xorg: xwayland: Use-after-free in SyncInitTrigger() (CVE-2025-26601)
* xorg: xwayland: Use-after-free in PlayReleasedEvents() (CVE-2025-26600)
* xorg: xwayland: Use of uninitialized pointer in compRedirectWindow() (CVE-2025-26599)
* xorg: xwayland: Out-of-bounds write in CreatePointerBarrierClient() (CVE-2025-26598)
* xorg: xwayland: Buffer overflow in XkbChangeTypesOfKey() (CVE-2025-26597)
* xorg: xwayland: Heap overflow in XkbWriteKeySyms() (CVE-2025-26596)
* Xorg: xwayland: Buffer overflow in XkbVModMaskText() (CVE-2025-26595)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
xorg-x11-server-Xwayland-24.1.5-3.el10_0.ppc64le.rpm
7e28ad5c3692aa32513d9cb7b918e21a63869b210e1fad6dcaa37af1c9836641
RLSA-2025:7462
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-9.el10_0.ppc64le.rpm
98301a60404ffd8645176c7e931505cdae08bd79eeca8b771872c929d08b7767
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-docker-5.4.0-9.el10_0.noarch.rpm
7ae66cfa21aa2ec6ca3c8a9071719dbd74044bbae59aa125845f0deb025a6329
podman-remote-5.4.0-9.el10_0.ppc64le.rpm
767051642c5a18e0b5fcf03cb17c43831fae87e6c21757eb81d5d749b732e4c5
RLSA-2025:7482
Moderate: git security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for git.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection.
Security Fix(es):
* git: The sideband payload is passed unfiltered to the terminal in git (CVE-2024-52005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
git-2.47.1-2.el10_0.ppc64le.rpm
b9174ec550433b97637a026725e17ddac1a3ad0c6f4a3054e060275f4b50c77d
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-all-2.47.1-2.el10_0.noarch.rpm
bdac5c5ba4bfafed747139711d4f1914945210296dc86facf5432c7f99084f22
git-core-2.47.1-2.el10_0.ppc64le.rpm
9a9854b835ed3867a4b2dd3189ff1ad7fdfc7eac23ac277731db9f20b52a6d3d
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-core-doc-2.47.1-2.el10_0.noarch.rpm
dff88d5bf97778c8ffa84c94fba0c513a974d8a22377dacb9d0d3d144e8ac113
git-credential-libsecret-2.47.1-2.el10_0.ppc64le.rpm
124faca609e02a23259c98099e44c4671d3bd22c170c90282974e9fd8d84a53b
git-daemon-2.47.1-2.el10_0.ppc64le.rpm
74b73d862857537b3b2b8521d5733642985fc4107bbdf0d0183893de8bbcf015
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-email-2.47.1-2.el10_0.noarch.rpm
302cbdefd3aeef9e3cb6a60171ca3ff7359992cb4a9152b7108d104ea115f6d9
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-gui-2.47.1-2.el10_0.noarch.rpm
d7de5ac4a009799fac2ddf54a02931c705ee1a98dfbb9c68d7896e07dd1d639a
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
git-instaweb-2.47.1-2.el10_0.noarch.rpm
a7b51b56a736417cf73bce8edb49e630148261994fafcf7452aadc661590c3f7
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
gitk-2.47.1-2.el10_0.noarch.rpm
b3aee409817b28b7d56de0fb83098e1cc9beb2e16a62e94090dd8cfdebab8fcc
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-subtree-2.47.1-2.el10_0.noarch.rpm
46242bbebcd1ad2839abfd60513fb03fd03784110b4f23a33292b9b36b2767e2
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
git-svn-2.47.1-2.el10_0.noarch.rpm
3bcd83dd028d37947088d1f3cd86a662a008b0ca693c9e3540f7e9b50b858c28
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
gitweb-2.47.1-2.el10_0.noarch.rpm
0decb63454ebe01d56cde889e20f36c21e1a53be754ff0371ace2d49352d47cd
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-2.47.1-2.el10_0.noarch.rpm
a71275b85f0a971d28ad5a09f367052c44662020585c0053e7ae7dda0527c0db
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
perl-Git-SVN-2.47.1-2.el10_0.noarch.rpm
43f3df75d8bf0c722c592f13c33b87d3e1cb0939f38aa0849043d9b7a60c20b0
RLSA-2025:7478
Moderate: corosync security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for corosync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The corosync packages provide the Corosync Cluster Engine and C APIs for Rocky Linux cluster software.
Security Fix(es):
* corosync: Stack buffer overflow from 'orf_token_endian_convert' (CVE-2025-30472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
corosynclib-3.1.9-1.el10_0.1.ppc64le.rpm
efa6cfb7a663cd82a632d2939910af1cf4771b73a0b3ad57e8d6517e0cb932a6
RLSA-2025:7489
Important: php security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for php.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server.
Security Fix(es):
* php: Header parser of http stream wrapper does not handle folded headers (CVE-2025-1217)
* php: Stream HTTP wrapper header check might omit basic auth header (CVE-2025-1736)
* php: Streams HTTP wrapper does not fail for headers with invalid name and no colon (CVE-2025-1734)
* php: libxml streams use wrong content-type header when requesting a redirected resource (CVE-2025-1219)
* php: Stream HTTP wrapper truncates redirect location to 1024 bytes (CVE-2025-1861)
* php: Reference counting in php_request_shutdown causes Use-After-Free (CVE-2024-11235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
php-8.3.19-1.el10_0.ppc64le.rpm
27365e7b68ae85357b71996e9937eb94138d846c49719112593c69aec5b7c55a
php-bcmath-8.3.19-1.el10_0.ppc64le.rpm
24f6c813aedac52f21028c90edbab4187b5705cae6c38f3e4968d8f705ef9a76
php-cli-8.3.19-1.el10_0.ppc64le.rpm
10fa3ba78886f133c2bbd3337c483fd28f7328edada8f71f4747dd6461397ac2
php-common-8.3.19-1.el10_0.ppc64le.rpm
9d3c667b8388d36f7df36ed2901997145c34c255006aad65b71e754b2a876623
php-dba-8.3.19-1.el10_0.ppc64le.rpm
090c068e3b781c2a8c31d706db2badfe39215b8da5c606d92af19cab2a892063
php-dbg-8.3.19-1.el10_0.ppc64le.rpm
0cd8e72d6d7f5c826e2fe39510c400691971f62b5746d355bb47873d3c3f877d
php-devel-8.3.19-1.el10_0.ppc64le.rpm
1051f18a59393016f81b511512f7bfc695cd549746c04938beaa8ad1e009b1a1
php-embedded-8.3.19-1.el10_0.ppc64le.rpm
9a589e03cfb3c7d2848a274c2d6d243e70cc4bb89b24e33c3cee061a7f0a7308
php-enchant-8.3.19-1.el10_0.ppc64le.rpm
ca0f7747c40399312bd17b0ec9f7ec9574cdab7138598dd595eddecf588d9696
php-ffi-8.3.19-1.el10_0.ppc64le.rpm
01cc8c54101310f72a799322fe79a508d7b61bde4bb25d09e1c6116148a5d771
php-fpm-8.3.19-1.el10_0.ppc64le.rpm
2ae783aa3f3aa40c91fcaea90fe14b0b147842019463d5093fc2648276aa601b
php-gd-8.3.19-1.el10_0.ppc64le.rpm
a8605b6dad7c0bccbc275cebdba6a710a3a8edadf5112785215a62ddbc99eb02
php-gmp-8.3.19-1.el10_0.ppc64le.rpm
216447cde7c5818d0f493ad13b413821e6c7030c6c758cbfdee288c4f860c817
php-intl-8.3.19-1.el10_0.ppc64le.rpm
3044158e268516c1cc73fcc33b21eb053ede566c87e0791714dbbcdb199ab06b
php-ldap-8.3.19-1.el10_0.ppc64le.rpm
2d264b5e0c300a7fc1c62a221638442ff30026bf3eb6daab4ab470bf8b88bfd1
php-mbstring-8.3.19-1.el10_0.ppc64le.rpm
17ffb0bd4f058c5812cb39f552d00c8637c21b6351d39678401f645e0aa0dcf6
php-mysqlnd-8.3.19-1.el10_0.ppc64le.rpm
d2ecbf02f95489e27c9a5ab905904748bd75cd8ba415aee1ba16cbee5ce6e860
php-odbc-8.3.19-1.el10_0.ppc64le.rpm
ac901186dc405e9dfe56bafc2bf2ad3276c671370e0e2873d5800ed31759ab3c
php-opcache-8.3.19-1.el10_0.ppc64le.rpm
a0ba671731a17392726082e98a4c3df340215eaad9d5cf5959d2de7343600595
php-pdo-8.3.19-1.el10_0.ppc64le.rpm
c8c2fa575f4cd013f4d83eb5fc89aeb3c0ff21abc225802a2f994ec42678c344
php-pgsql-8.3.19-1.el10_0.ppc64le.rpm
e8d1a0a7e956fcade09ef28cd3f9feeb26067fe41be5364f84a08ccf7ddc5578
php-process-8.3.19-1.el10_0.ppc64le.rpm
3027f0f72be9474693aac549e7f64399d97511973151cf0b915c9c0e3009544f
php-snmp-8.3.19-1.el10_0.ppc64le.rpm
0ce114e92d911cbdd320bd3133a53787095e1119a293d46081c32790239b81b8
php-soap-8.3.19-1.el10_0.ppc64le.rpm
a0b4a2a8aa0e4cd05cf1e088fd4ad640254bde937cd945ea5efbb25e631fdf8e
php-xml-8.3.19-1.el10_0.ppc64le.rpm
5e3131d55234f618d66a9f6e5e3b3d490b4e7c6c43f98694dd209099d1e8e3b4
RLSA-2025:7479
Important: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)
* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.107.0-9.el10_0.ppc64le.rpm
a9946197365450b5879f916d5a727ab5b4d9891c80c63b0f4ee60000fd7a5995
RLSA-2025:7509
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client (CVE-2025-21605)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.3-1.el10_0.ppc64le.rpm
1f56ca9e37ad0f52661ea2e5499e8a1064d390c604f18267bebe490010405371
valkey-devel-8.0.3-1.el10_0.ppc64le.rpm
bc91efedf1607b816e09ddfcca73c244e399c2944d398580993fcafaec0f36ef
RLSA-2025:7467
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-1.18.1-1.el10_0.ppc64le.rpm
f609f7b6e71675f72bfad6d904a233741b724b33324db69f507696201f5ea6a9
skopeo-tests-1.18.1-1.el10_0.ppc64le.rpm
fd06a629cae9e182709b69ed95661a21616b870d1824821381850b1ed960b27d
RLSA-2025:7459
Moderate: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.39.4-1.el10_0.ppc64le.rpm
62b782f632141f48bec05cc000ffb09ffc41a2de582c41d99d91e6955da161e5
buildah-tests-1.39.4-1.el10_0.ppc64le.rpm
3794c6956e53aa6e26e98a7e06e53a5702648a56924ba0f661a1bcd339437124
RLSA-2025:7457
Moderate: exiv2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for exiv2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Exiv2 is a C++ library to access image metadata, supporting read and write access to the Exif, IPTC and XMP metadata, Exif MakerNote support, extract and delete methods for Exif thumbnails, classes to access Ifd, and support for various image formats.
Security Fix(es):
* exiv2: Use After Free in Exiv2 (CVE-2025-26623)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
exiv2-0.28.3-3.el10_0.2.ppc64le.rpm
00c8b18c1eaacc8ac16b80adb43ba19caa329f0a64eaab9e994c36e2e91e9bf4
exiv2-libs-0.28.3-3.el10_0.2.ppc64le.rpm
9c2423a7ab0c06fdfc187811bbb80e5b9fc4ba126592629bb37f4be42f427bea
RLSA-2025:7592
Important: yggdrasil security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for yggdrasil.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.
Security Fix(es):
* yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
yggdrasil-0.4.5-3.el10_0.ppc64le.rpm
1dd07d2c0c82d15e100379ad4c81f80b151d9d26e1cf830223f9366d9e451fc9
RLSA-2025:7593
Moderate: ghostscript security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for ghostscript.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Ghostscript suite contains utilities for rendering PostScript and PDF documents. Ghostscript translates PostScript code to common bitmap formats so that the code can be displayed or printed.
Security Fix(es):
* Ghostscript: NPDL device: Compression buffer overflow (CVE-2025-27832)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ghostscript-10.02.1-16.el10_0.ppc64le.rpm
9f7e1583d76d48df150c53529d9012078a994427a63641e97179df8498afa9d9
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-doc-10.02.1-16.el10_0.noarch.rpm
f4914cfd80f9e897646ac8e36f35e168dff0f5d687bedd1ecc1e5136f57ddfa7
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch.rpm
c86349f057a12bd7dcb6abc7f6f0724a83df500266b99fe894462a62ef242058
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm
f20d5ba7b32a253d2c2a24a263142c8d24062116a76f8bb2d82a0ece4b9875ea
libgs-10.02.1-16.el10_0.ppc64le.rpm
260c71f6227a5a80bf7ffcf3ca3f3ff22b75c540f71431f967e6b5bb893acca0
RLSA-2025:7599
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.116 and .NET Runtime 8.0.16.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-8.0-8.0.16-1.el10_0.ppc64le.rpm
9bd4ec09bea0814527c88e47ee7fdfd3501aff8bcfedd9db52fe6313cb4a0323
aspnetcore-runtime-dbg-8.0-8.0.16-1.el10_0.ppc64le.rpm
23465245e42be90ed89d4ae401565b55b72591eec2079c57e371f117c0bb8cf7
aspnetcore-targeting-pack-8.0-8.0.16-1.el10_0.ppc64le.rpm
45bbdd2086422713f7f791604895d5ee66862cdc18510259aab4c1c880216d69
dotnet-apphost-pack-8.0-8.0.16-1.el10_0.ppc64le.rpm
e5ce4adff34cfe8179a1b8a9c84bba94733ce5860841311c8a218a7b37b4fece
dotnet-hostfxr-8.0-8.0.16-1.el10_0.ppc64le.rpm
6370820ad69372d6a39ac74ae4257d6c7ebe7ce6b9e3beb5feb3fac28dd3ad6f
dotnet-runtime-8.0-8.0.16-1.el10_0.ppc64le.rpm
3ba2b7b44a21d02a8fcb8dec93a28bbef54f34f195a68c2dc9d240b7a248054b
dotnet-runtime-dbg-8.0-8.0.16-1.el10_0.ppc64le.rpm
769e703b90cb2b1072659c6e71a6d00c9898d8cc4ef14fdd1c2f4eec50a4e97e
dotnet-sdk-8.0-8.0.116-1.el10_0.ppc64le.rpm
3ac1c82cc79e06dc0992509d1c1f18903e114f0488a1b1f308ebd0ef3897d3b1
dotnet-sdk-dbg-8.0-8.0.116-1.el10_0.ppc64le.rpm
f797b5a97a0c11df32c58e64842e507ea1b16561dc483179aa43d4bf8b68fcbb
dotnet-targeting-pack-8.0-8.0.16-1.el10_0.ppc64le.rpm
345c5127f6c1b530ceeab096370c2bfa0acdac25b1163a4fd5176e442a902d6e
dotnet-templates-8.0-8.0.116-1.el10_0.ppc64le.rpm
a784c534a5028f9ffcf8b81d54570e3d438dff06c911d7054d788f4bf9680cc8
RLSA-2025:7601
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.106 and .NET Runtime 9.0.5.Security Fix(es):
* dotnet: .NET and Visual Studio Spoofing Vulnerability (CVE-2025-26646)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-9.0-9.0.5-1.el10_0.ppc64le.rpm
cd6633f51c0d6d1ea21543cfac6aa8c63806dd55fd7e95558d7324bc2ee6b576
aspnetcore-runtime-dbg-9.0-9.0.5-1.el10_0.ppc64le.rpm
a35830e2b531b0a0f4e5fb1c496e3aaf82fea163d097298a15371fe8a6e63271
aspnetcore-targeting-pack-9.0-9.0.5-1.el10_0.ppc64le.rpm
d4c00ce04e2efc5c4c145099ef48606c8b4984a5f33c16361828e5e7d4d76291
dotnet-apphost-pack-9.0-9.0.5-1.el10_0.ppc64le.rpm
ca3b5bb8233e17d3271a57d122310f780e7e05c37b2b1caea2d4dc7b9bcf3f93
dotnet-host-9.0.5-1.el10_0.ppc64le.rpm
c8dadd6dec479a9a2511c16c26696c1ba8fc63304ba8eacd99ba34ad440897ea
dotnet-hostfxr-9.0-9.0.5-1.el10_0.ppc64le.rpm
1f78a6f8f55f1f3f21d9d26709de0ae6ef3eb010866bbb7f7b9c3282476d8f62
dotnet-runtime-9.0-9.0.5-1.el10_0.ppc64le.rpm
b5e43c832a743bfbf274937d4c4e3e41df362c40ce738e8242ccd86f5758eb98
dotnet-runtime-dbg-9.0-9.0.5-1.el10_0.ppc64le.rpm
60f91ca556e03dd110405789e24c1b47e145aa196217c0ab29943b0128bd2e8d
dotnet-sdk-9.0-9.0.106-1.el10_0.ppc64le.rpm
7a4ba181012b733f65a69a2333eac397a354de7e8fe5f87cebb224d8ba8a821e
dotnet-sdk-dbg-9.0-9.0.106-1.el10_0.ppc64le.rpm
ca777a3bbc6db77ff0cded8bfa51523c2101c53982cd9afc20776e9876947fb2
dotnet-targeting-pack-9.0-9.0.5-1.el10_0.ppc64le.rpm
73187d17f0732892040a87ea85dd5fdfbff912016f8e3629fdb3435c64b5f521
dotnet-templates-9.0-9.0.106-1.el10_0.ppc64le.rpm
f1a78aed33f133ba3a76b2cc16fc3e3bfc3b0989f9e225fd13c4490ab3324e66
netstandard-targeting-pack-2.1-9.0.106-1.el10_0.ppc64le.rpm
66280a9917200474ec7b04f599457b001b395a1e9bfe2e0d325180f6e9a206b5
RLSA-2025:7892
Important: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect (CVE-2025-4123)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-17.el10_0.ppc64le.rpm
3e30f59c6544dddcecabb1c0d5be119587f48d4475e6cf8066a8175d050c75d8
grafana-selinux-10.2.6-17.el10_0.ppc64le.rpm
60d8116f0d798dcabdf599d738a81dc9cc70756193be5853e7dbc26cc35c7684
RLSA-2025:8047
Moderate: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for unbound.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbounded name compression could lead to Denial of Service (CVE-2024-8508)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-unbound-1.20.0-10.el10_0.ppc64le.rpm
aa884ea858af7338b1a7cbd71e6ec4722cfb60f2a69da35c81dd4d7c3d83096f
unbound-1.20.0-10.el10_0.ppc64le.rpm
e42a3cef2767dc514e06dc6bc37281ce3f0ec08756c62bca5540efd11ea61f4a
unbound-anchor-1.20.0-10.el10_0.ppc64le.rpm
034b93d5a0ec0789fe8b006e97bb6500fba2e21748c33bfa5a1226b61ceeedf4
unbound-dracut-1.20.0-10.el10_0.ppc64le.rpm
6a672ec79903ba56c2b7be13ccca3aa0bdd4f193e1eeb90f7a25702c533bef3d
unbound-libs-1.20.0-10.el10_0.ppc64le.rpm
412b092c060eac45e30b61de3dea8a1be49e280d490a84083381e78e29422847
RLSA-2025:8125
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Out-of-bounds access when resolving Promise objects (CVE-2025-4918)
* firefox: Out-of-bounds access when optimizing linear sums (CVE-2025-4919)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.10.1-1.el10_0.ppc64le.rpm
d955aa08f4ca30fb6bdb96647212a14c5302097b36cc568ac2ee831a0974a992
RLSA-2025:8128
Important: libsoup3 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libsoup3.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago.
Security Fix(es):
* libsoup: Denial of Service attack to websocket server (CVE-2025-32049)
* libsoup: Denial of service in server when client requests a large amount of overlapping ranges with Range header (CVE-2025-32907)
* libsoup: Cookie domain validation bypass via uppercase characters in libsoup (CVE-2025-4035)
* libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libsoup3-3.6.5-3.el10_0.6.ppc64le.rpm
c0a7913dc19a670bc229688f68f088c639c0ae65310c04c2ec03b5020e6bb77a
libsoup3-devel-3.6.5-3.el10_0.6.ppc64le.rpm
83008cd0e04d094d6d2cd386e00da182f4fb952149521068cc70c0458eddcb05
RLSA-2025:8131
Moderate: ruby security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for ruby.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
Security Fix(es):
* net-imap: Net::IMAP vulnerable to possible DoS by memory exhaustion (CVE-2025-25186)
* CGI: Denial of Service in CGI::Cookie.parse (CVE-2025-27219)
* uri: userinfo leakage in URI#join, URI#merge and URI#+ (CVE-2025-27221)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ruby-3.3.8-10.el10_0.ppc64le.rpm
7719b8b5125998ecef59320531d9817e9df36a8d474d7c7545c5b4b18df57e5c
ruby-bundled-gems-3.3.8-10.el10_0.ppc64le.rpm
b306ed3b2cdec955598f8bad56c49641a57871bff736ab1904bf0d396e3eebb0
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-default-gems-3.3.8-10.el10_0.noarch.rpm
2904c2be6de7adbab5728cba1bf5f581345a9ec634bf41d756b327d5df6cdc1d
ruby-devel-3.3.8-10.el10_0.ppc64le.rpm
735c4a625fecfdf255e2cdaf67a4dea40df0cfdefce6227afabb0003240312a9
rubygem-bigdecimal-3.1.5-10.el10_0.ppc64le.rpm
1b09d7af584b956ee8ba0957b45d2cb07311b36c2012d1c12f5f393ab14678b3
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-bundler-2.5.22-10.el10_0.noarch.rpm
d7b4cd0ea6f73904a04b3406e6ae24ec8054e6d370477622248c6da2d0cbba61
rubygem-io-console-0.7.1-10.el10_0.ppc64le.rpm
89685d9151bcff5ef9fabb375dfcec6187207836b9fdde9ef1230334dba258cd
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-irb-1.13.1-10.el10_0.noarch.rpm
47789a9d47f47375f2265bbfba6a021f98d2f2840f774b8c8dcb2d64a11c79f1
rubygem-json-2.7.2-10.el10_0.ppc64le.rpm
6c2f02dd847158bd7441d92dcba331585272c8e16fd103e386b7d6ed2caff945
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-minitest-5.20.0-10.el10_0.noarch.rpm
443713643e31df383a0adb8f57a219441de801e241bcb862d3be37542d8c3d72
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-power_assert-2.0.3-10.el10_0.noarch.rpm
fd83ea41220fdd4bcd8e00f692c937507141e2fac3adae231441766600ac83a9
rubygem-psych-5.1.2-10.el10_0.ppc64le.rpm
5e8801a3ecca9bb53755a22a3237dbb924595473878f0db6c34b862e54b5d8b8
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rake-13.1.0-10.el10_0.noarch.rpm
18f422e254af9edb5743dd00a53c2ce7a4d0e04939a2ab9ac711a7bd264a1e84
rubygem-rbs-3.4.0-10.el10_0.ppc64le.rpm
bdad8453dd4d3f5663d0faa4185fef28923c6161093bd3bd437f87da7d160bed
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rdoc-6.6.3.1-10.el10_0.noarch.rpm
656cedbc171c0d9924948b15bb319b8220c71e29a74a040d6f4a4f1b3358dde0
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rexml-3.3.9-10.el10_0.noarch.rpm
f63afbc11ae33c3c780e6b46f2f7274c2ef874656cfb4633779181a508e8cf9a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygem-rss-0.3.1-10.el10_0.noarch.rpm
312bb55e83f14b500d7a0e5c911f8745d5b5d06a3fcd847fb314c943deb18d1a
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-3.5.22-10.el10_0.noarch.rpm
bb066d3068ce2da7cefc8f9f89d01e223d2870bd4a509e0aad5ebf7432a860be
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygems-devel-3.5.22-10.el10_0.noarch.rpm
d44c057b948919daf238b6b1463d7b1c47c91420a539346ccc8436b77387b527
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-test-unit-3.6.1-10.el10_0.noarch.rpm
cde1cbfe9e860af0cd849fb742cffa0fe5128ceb80f93497b3f8571fa0752517
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
rubygem-typeprof-0.21.9-10.el10_0.noarch.rpm
79fec13dace5e8b27fabccda2bf8904f5279779a88b3a67a4c156db8c03003da
ruby-libs-3.3.8-10.el10_0.ppc64le.rpm
40e561334f5e044c700de6c780498ce479164f63c17b0520081fd0700bec2cc0
RLSA-2025:8135
Important: python-tornado security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python-tornado.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* tornado: Tornado Multipart Form-Data Denial of Service (CVE-2025-47287)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-tornado-6.4.2-1.el10_0.1.ppc64le.rpm
d7a032852ec2feb83775fe318166a64339a7e1c7ef95352b7192a5248a04a5c5
RLSA-2025:8184
Important: gstreamer1-plugins-bad-free security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for gstreamer1-plugins-bad-free.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* GStreamer: GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability (CVE-2025-3887)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gstreamer1-plugins-bad-free-1.24.11-2.el10_0.ppc64le.rpm
45bafaa771ad41efb3a98e5f1dedbb9d07ec7246c7c7471f273d2b25c80cf07f
gstreamer1-plugins-bad-free-libs-1.24.11-2.el10_0.ppc64le.rpm
5e368152e47cdbd30a9befc2ca02082b24f633b611a48cf42a5f3f3a2de6df7f
RLSA-2025:8196
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909)
* thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875)
* thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877)
* thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.10.1-1.el10_0.ppc64le.rpm
07ff1675b9a60ee4889509419923b90f5071f486f7b9c45d936661f28e2294af
RLSA-2025:8341
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)
* firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)
* firefox: thunderbird: Memory safety bugs (CVE-2025-5268)
* firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)
* firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)
* firefox: thunderbird: Memory safety bug (CVE-2025-5269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.11.0-1.el10_0.ppc64le.rpm
cc5d2a9040dacb480f8bb2ea0a6606da13ba7866adf8eb3ddb6965e74425261b
RLSA-2025:8477
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
golang-1.23.9-1.el10_0.ppc64le.rpm
c2d98a48ff94b5709843e9de4ed516a755049c6f236a7778407a0815101446dc
golang-bin-1.23.9-1.el10_0.ppc64le.rpm
adfc81a51a9052069d1a4b8723e31dce43f8399fd2255346e5bf97b96ded2432
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-docs-1.23.9-1.el10_0.noarch.rpm
bdd2760b73c9324ad1b4499a8f0ac93db56f828057b077941bb8e625050d26a7
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-misc-1.23.9-1.el10_0.noarch.rpm
69b802400d4176e7bad9d0c1f1b5d73e5b76c67b3e976c8e150d266ce45a7ced
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-src-1.23.9-1.el10_0.noarch.rpm
431c56db3fafa2e52ebeaf24f7722efd266be7ac65dfbb6ce76ec106d22711b8
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
golang-tests-1.23.9-1.el10_0.noarch.rpm
3215e7950d792a9a14b68b16cc720ae61ec83fe3b50223d9fb441bcaee76e7c9
go-toolset-1.23.9-1.el10_0.ppc64le.rpm
4b83b3ae2316442102b81c8fb4f2128172d640dbadf216496f05aafb11acc23a
RLSA-2025:8493
Important: nodejs22 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for nodejs22.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a platform built on Chrome's JavaScript runtime \ for easily building fast, scalable network applications. \ Node.js uses an event-driven, non-blocking I/O model that \ makes it lightweight and efficient, perfect for data-intensive \ real-time applications that run across distributed devices.
Security Fix(es):
* nodejs: Remote Crash via SignTraits::DeriveBits() in Node.js (CVE-2025-23166)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
nodejs-22.16.0-1.el10_0.ppc64le.rpm
77876e19dfda570a1d76b69c37b07aa87e0441ef04d16edec6523b93e46127bc
nodejs-devel-22.16.0-1.el10_0.ppc64le.rpm
df52a1bf9bd72055d5a0a8e93704d42504e5acfbdfcf7f4274d1829a5c356397
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-docs-22.16.0-1.el10_0.noarch.rpm
f120d25fe9ff48ab63fa1691b7c726ce10a6aea9d36e5fd8d312b8da1618d995
nodejs-full-i18n-22.16.0-1.el10_0.ppc64le.rpm
34be15973076114f476adbf6599c7ff437d5fd6900c89e3295d21be4981e0054
nodejs-libs-22.16.0-1.el10_0.ppc64le.rpm
804ac396031ff526b6658fdb7ebac1477546d084ec5e689ecfea493a9d0d6cbb
nodejs-npm-10.9.2-1.22.16.0.1.el10_0.ppc64le.rpm
4bbfdc18a76256ccfa4400fa82da495a12e0e4df7ac800cf1ac362e3a14510c5
RLSA-2025:8550
Important: varnish security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for varnish.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.
Security Fix(es):
* varnish: request smuggling attacks (CVE-2025-47905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
varnish-7.6.1-2.el10_0.1.ppc64le.rpm
0dd5802c006772c443a13204943110ed83fbf752d9a889a449e5da7edeae1732
varnish-docs-7.6.1-2.el10_0.1.ppc64le.rpm
83e7779118ee667d190412ded06196abd493a11d0ec2b9477aff1438e1c07e7d
RLSA-2025:8608
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918)
* firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919)
* firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)
* firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)
* firefox: thunderbird: Memory safety bugs (CVE-2025-5268)
* firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)
* firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)
* firefox: thunderbird: Memory safety bug (CVE-2025-5269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.11.0-1.el10_0.ppc64le.rpm
971f634394b1a11512569c837bd3fe0d76658406f5558ec6d17bdc52a49973ab
RLSA-2025:8636
Important: perl-FCGI security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for perl-FCGI.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FastCGI Perl bindings.
Security Fix(es):
* perl-fcgi: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library (CVE-2025-40907)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
perl-FCGI-0.82-13.1.el10_0.ppc64le.rpm
8a62689e2eda86046a963fd8e38694aaa816252d6cc3a905954c0ca6fc1c58ad
RLSA-2025:8666
Moderate: grafana security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grafana.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB & OpenTSDB.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-10.2.6-18.el10_0.ppc64le.rpm
3f348bc98ec160a4f81d2eb0c5253cefeb88d389a6cb6c8ce7506865b96bc6fa
grafana-selinux-10.2.6-18.el10_0.ppc64le.rpm
422f48a81d41b71a015964b13a456581efa985e707c04093ca97e16a021f8f40
RLSA-2025:8814
Important: .NET 8.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet8.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 8.0.117 and .NET Runtime 8.0.17.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-8.0-8.0.17-1.el10_0.ppc64le.rpm
f2363182f1c07d814ca5174423a5f719d2adbbad14385e69e127afe6fa33447d
aspnetcore-runtime-dbg-8.0-8.0.17-1.el10_0.ppc64le.rpm
ddfd32f61d03d6704d7f8830a3d6a78b0e3580e68a56ad295b3832a94d3c4f5e
aspnetcore-targeting-pack-8.0-8.0.17-1.el10_0.ppc64le.rpm
2aec363648dac33266dd132ac89e93ab59c8d289093b7c4579aac322d65c3945
dotnet-apphost-pack-8.0-8.0.17-1.el10_0.ppc64le.rpm
f0bfb61595c79a56ed7db31fd2c1f577b8cbfda0369f73d127aa59f3f818ebf1
dotnet-hostfxr-8.0-8.0.17-1.el10_0.ppc64le.rpm
7d4d8dfce7e5e128bdae703e279be5c95b515eb69a90d70ead99575f14ad687f
dotnet-runtime-8.0-8.0.17-1.el10_0.ppc64le.rpm
694c6964ac0d3433e9f452c75dc0d451bb82e3852970c89c54fa1bcf97830a34
dotnet-runtime-dbg-8.0-8.0.17-1.el10_0.ppc64le.rpm
38e87b84d96eec3adec7cddbb765ca62da8fbbceaf55a97120777617680c7970
dotnet-sdk-8.0-8.0.117-1.el10_0.ppc64le.rpm
8e7d6db41fe3b539f8c598e0c4178a0a024bf1a78ea66ecf0b9f8af222adad35
dotnet-sdk-dbg-8.0-8.0.117-1.el10_0.ppc64le.rpm
cdcc072281771505be647edf99e499151d3b2ef972292d74450b4295d6c8125f
dotnet-targeting-pack-8.0-8.0.17-1.el10_0.ppc64le.rpm
7d157710386dcfaeb36574155d5d5bd42b977f397c490aa5fc7c9e3e4368f55c
dotnet-templates-8.0-8.0.117-1.el10_0.ppc64le.rpm
d96354ded365fdd75e301f9d831af20f1b785b18a63d6634bf4021fc24fdbceb
RLSA-2025:8816
Important: .NET 9.0 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for dotnet9.0.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
.NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address a security vulnerability are now available. The updated versions are .NET SDK 9.0.107 and .NET Runtime 9.0.6.Security Fix(es):
* dotnet: .NET Remote Code Vulnerability (CVE-2025-30399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aspnetcore-runtime-9.0-9.0.6-1.el10_0.ppc64le.rpm
99cdd0826209de6a9a97329272af861d61becc93611048f8693099c373c9b987
aspnetcore-runtime-dbg-9.0-9.0.6-1.el10_0.ppc64le.rpm
69747b6afb147b45ae696b175d70f958381418c0f0b25eea045987f03d6805ba
aspnetcore-targeting-pack-9.0-9.0.6-1.el10_0.ppc64le.rpm
90c284cafba231e004decadfd4e3a2a30d4b8f40c0a3599084848b3ce349c4d6
dotnet-apphost-pack-9.0-9.0.6-1.el10_0.ppc64le.rpm
7ff6d3c920e33196df9dd1745fe96e1e8ececcdbfaf5b6e285d9dc40a45c9593
dotnet-host-9.0.6-1.el10_0.ppc64le.rpm
4f1dd84301a7171a8d41e6d3992e0354385319c8adb440282b7c6f9a4813b25c
dotnet-hostfxr-9.0-9.0.6-1.el10_0.ppc64le.rpm
05b0f608b055bec11bf3f0aa6492a106e28997f6a8127af06abb96a7fd7a75fe
dotnet-runtime-9.0-9.0.6-1.el10_0.ppc64le.rpm
af6b50bf9c42ffcd29edc7385d6356404535ed43f026377d858a31829c04f0af
dotnet-runtime-dbg-9.0-9.0.6-1.el10_0.ppc64le.rpm
372f251016f19b61af8034f14f9a4a5e515d6bafd6921acd3f4b34d574d8de9b
dotnet-sdk-9.0-9.0.107-1.el10_0.ppc64le.rpm
7b027907b4740640d8e9c516fc0f74698de393dfd1b38d7458351622fbcddf62
dotnet-sdk-dbg-9.0-9.0.107-1.el10_0.ppc64le.rpm
222d8108af1781ed34dfb5b1d1e075232b1c150d6af3e9a825dd704f4157b130
dotnet-targeting-pack-9.0-9.0.6-1.el10_0.ppc64le.rpm
d188821106f4881c725fda4bffe34b553048439ea6bb2916471cce90074c8a75
dotnet-templates-9.0-9.0.107-1.el10_0.ppc64le.rpm
3f84b21588aa4fcd35ab742974c5c6acdcb45517bb371fd7e4e4b45dec44cf8c
netstandard-targeting-pack-2.1-9.0.107-1.el10_0.ppc64le.rpm
43386ce97daa47d366c1ee96f9d976d6f1b2a3d3dba285b18d56a66136963873
RLSA-2025:8915
Moderate: grafana-pcp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grafana-pcp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Grafana plugin for Performance Co-Pilot includes datasources for scalable time series from pmseries and Redis, live PCP metrics and bpftrace scripts from pmdabpftrace, as well as several dashboards.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
grafana-pcp-5.2.2-3.el10_0.ppc64le.rpm
b8a3e0d7fd971839bdb11db20e7fef482daf88dc9f9fea3e5c19813b8eca2714
RLSA-2025:9063
Moderate: git-lfs security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for git-lfs.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Git Large File Storage (LFS) replaces large files such as audio samples, videos, datasets, and graphics with text pointers inside Git, while storing the file contents on a remote server.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
git-lfs-3.6.1-2.el10_0.ppc64le.rpm
7603e1a0790f9afe219881db9c4abc5be7f793f91f02d2b7c02355e0f7990989
RLSA-2025:9120
Important: libvpx security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libvpx.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format.
Security Fix(es):
* libvpx: Double-free in libvpx encoder (CVE-2025-5283)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libvpx-1.14.1-3.el10_0.ppc64le.rpm
7a13e3097090103520fd2f8d048f71fe9b59f5ece7224cafaafd4ead006fd1cc
RLSA-2025:9121
Moderate: wireshark security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for wireshark.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network.
Security Fix(es):
* wireshark: Uncontrolled Recursion in Wireshark (CVE-2025-1492)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
wireshark-4.4.2-3.el10_0.ppc64le.rpm
064e0f8461f5fb71aaa103dc111977d438923c88f44cde3224e72e412b7300be
wireshark-cli-4.4.2-3.el10_0.ppc64le.rpm
b66f031a5fd5509267ae0c8c1a5597d07888ec488cc680c0951857ba05cae25f
RLSA-2025:9148
Moderate: buildah security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for buildah.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
buildah-1.39.4-2.el10_0.ppc64le.rpm
d95d14e90606fbfe7088696ef0838dbf8bb7f9be983be507d5b6f90f4b38aa90
buildah-tests-1.39.4-2.el10_0.ppc64le.rpm
55ae074dbf91442102294caa7bf28660546c9bbb9c82d9c7a2870fce272436f1
RLSA-2025:9146
Moderate: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-10.el10_0.ppc64le.rpm
13e9a39540bffc8c993898b49c401cac9614e2f70b37cdbfda4b264afe4888eb
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-docker-5.4.0-10.el10_0.noarch.rpm
72ee4b59f086d755726270ee648923634a2c7363eaecb7668975444143214d9f
podman-remote-5.4.0-10.el10_0.ppc64le.rpm
ad564d62bc40e5a2d2cf3ada37e566a725b2cb828b0b2622957df7d91eeb9df3
RLSA-2025:9149
Moderate: skopeo security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for skopeo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The skopeo command lets you inspect images from container image registries, get images and image layers, and use signatures to create and verify files.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
skopeo-1.18.1-2.el10_0.ppc64le.rpm
afe3f9be49e17482dc5544aa6f40f08c93d8270577e7cbdec83891e2f232d140
skopeo-tests-1.18.1-2.el10_0.ppc64le.rpm
9f4d3d7f0cb0360426561ff8da3723607b65310a57520d8d6fa656540fa6a4ca
RLSA-2025:9151
Moderate: gvisor-tap-vsock security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gvisor-tap-vsock.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
A replacement for libslirp and VPNKit, written in pure Go. It is based on the network stack of gVisor. Compared to libslirp, gvisor-tap-vsock brings a configurable DNS server and dynamic port forwarding.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gvisor-tap-vsock-0.8.5-2.el10_0.ppc64le.rpm
8a35fcbfdaa968c7d9b875708cb04e66cc92890f01b28fce5703f24474157910
gvisor-tap-vsock-gvforwarder-0.8.5-2.el10_0.ppc64le.rpm
c6dad32bc06e92f29ef375bcf10ca5fbbf8310a0763576f326497aa39bcc47a9
RLSA-2025:9156
Moderate: golang-github-openprinting-ipp-usb security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for golang-github-openprinting-ipp-usb.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
HTTP reverse proxy, backed by IPP-over-USB connection to device. It enables
driverless support for USB devices capable of using IPP-over-USB protocol.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipp-usb-0.9.27-3.el10_0.ppc64le.rpm
89d9a708850a6bff9af6d3a02b8e512178978a296fc1496cd2218350134e2926
RLSA-2025:9190
Important: ipa security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for ipa.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
ipa-client-4.12.2-15.el10_0.1.ppc64le.rpm
12ed97a766e4487f5d6ad47a9f8255e17c4d0172b2d85b7d7643fb52ff9693b0
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-common-4.12.2-15.el10_0.1.noarch.rpm
6c1ae01a5131f824bf97c644496f68706f567b22085c430ca56bc03afb053207
ipa-client-encrypted-dns-4.12.2-15.el10_0.1.ppc64le.rpm
1e12165431f9c843def81b3e7f417e5c089b3aed2add26d02c1760cccc4283ea
ipa-client-epn-4.12.2-15.el10_0.1.ppc64le.rpm
1c7e32c3c7065c05d2535fb9f375fb176f9ef36a7a003e931511f83798a5399d
ipa-client-samba-4.12.2-15.el10_0.1.ppc64le.rpm
7ca09b30a86d10580441d8df70baf8d5b35aa942ed6429aedacca12a59ea94f0
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-common-4.12.2-15.el10_0.1.noarch.rpm
bd4658263915b86e0754a48dfef208eb3a06aeacef66b87e1e3e413c2c0d9423
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-4.12.2-15.el10_0.1.noarch.rpm
9392af39d79b05f3d3584c5e2f8defe0aa763b7c26df19606b6ae69882e9d7f4
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-luna-4.12.2-15.el10_0.1.noarch.rpm
862cf3612971baf244e116d8f0860b18b99683e48e3a976f62be514c9e5ebe81
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-selinux-nfast-4.12.2-15.el10_0.1.noarch.rpm
da232069356f6a7fed12c9b12c17d4e08adda805fbe718e9ffe83ce286498881
ipa-server-4.12.2-15.el10_0.1.ppc64le.rpm
420d28ee18760d3aec50f1f49c4a66c1f27c20e6843d47154647b7da54eafafe
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-common-4.12.2-15.el10_0.1.noarch.rpm
89236fce67fe052cb19173070c2f50c2b514b865567328686e46a6f845ab302c
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-dns-4.12.2-15.el10_0.1.noarch.rpm
7303e5d8311880f7cae2058f4ed51096749cd5afa1d58e4303823207aefcfce4
ipa-server-encrypted-dns-4.12.2-15.el10_0.1.ppc64le.rpm
ddf2d5742c9f5c755d5bdb4fc31c553ef1235510431e3a75e0edef14fb071635
ipa-server-trust-ad-4.12.2-15.el10_0.1.ppc64le.rpm
7889be23a4aa24a6daa80265ec131b9acff5de333eaf6a986461600a05ee76ff
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipaclient-4.12.2-15.el10_0.1.noarch.rpm
3acf20126fa2ebd03bd719db4b3fdee63e40f34cfc4a805cca9042354485004c
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipalib-4.12.2-15.el10_0.1.noarch.rpm
8296ccacd4fbd8cea4f94f0f3442e6dac1ef32e62d3c197cdfe69cdb6876b69b
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
python3-ipaserver-4.12.2-15.el10_0.1.noarch.rpm
9c5d1580ae5902f184e00a231e6482c31dcb76da4b9d3d4feaea0d772ff7bbd7
RLSA-2025:9304
Important: xorg-x11-server-Xwayland security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xorg-x11-server-Xwayland.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Xwayland is an X server for running X clients under Wayland.
Security Fix(es):
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Out-of-Bounds Read in X Rendering Extension Animated Cursors (CVE-2025-49175)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in Big Requests Extension (CVE-2025-49176)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Data Leak in XFIXES Extension's XFixesSetClientDisconnectMode (CVE-2025-49177)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Unprocessed Client Request Due to Bytes to Ignore (CVE-2025-49178)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer overflow in X Record extension (CVE-2025-49179)
* xorg-x11-server-Xwayland: xorg-x11-server: tigervnc: Integer Overflow in X Resize, Rotate and Reflect (RandR) Extension (CVE-2025-49180)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
xorg-x11-server-Xwayland-24.1.5-4.el10_0.ppc64le.rpm
8573851261300da7182da0b618dd359131e9e815f478cec4d1e440bb35450159
RLSA-2025:9317
Moderate: delve security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for delve.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible.
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
delve-1.24.1-2.el10_0.ppc64le.rpm
7d4a466c6ad894e15375b95dae0db48ae81a216417fb13a06c3d611fb4ce281b
RLSA-2025:9307
Moderate: freerdp security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for freerdp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox.
Security Fix(es):
* gnome-remote-desktop: freerdp: Unauthenticated RDP Packet Causes Segfault in FreeRDP Leading to Denial of Service (CVE-2025-4478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
freerdp-3.10.3-3.el10_0.ppc64le.rpm
f4d4e7785c4ef5c8c45040f7f71462638a0ca8f3da7add75e34918a706d9b409
freerdp-libs-3.10.3-3.el10_0.ppc64le.rpm
de1f0b059ad8d543fcacfd34cd41dc384c07d59e8aa589bced6c9ef040879e62
libwinpr-3.10.3-3.el10_0.ppc64le.rpm
c1379305477cf4943da1df306af21ec5e39cb33ea587e787204d335dc0ed2f17
RLSA-2025:9328
Important: libblockdev security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libblockdev.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libblockdev packages provide a C library with GObject introspection support used for low-level operations on block devices. The library serves as a thin wrapper around plug-ins for specific functionality, such as LVM, Btrfs, LUKS, or MD RAID.
Security Fix(es):
* libblockdev: LPE from allow_active to root in libblockdev via udisks (CVE-2025-6019)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libblockdev-3.2.0-4.el10_0.ppc64le.rpm
226ce7711dfa087f71257bd3a7613f1c0d4310bff2ebcaebe503e9cdfd2ab490
libblockdev-crypto-3.2.0-4.el10_0.ppc64le.rpm
cf17d113527e71d4f650020632f6173dbc0406595df8c8bb8d8d2e2eba9bb7ee
libblockdev-dm-3.2.0-4.el10_0.ppc64le.rpm
950639cf5630d956b7b31b9db528c48335f20e3d7a28c74b903ae2b30b62a443
libblockdev-fs-3.2.0-4.el10_0.ppc64le.rpm
c4ad6b122a4ae2322ba007ab6482e779c8eb4b9395e5fb49cb4e46d89fb32dc7
libblockdev-loop-3.2.0-4.el10_0.ppc64le.rpm
f6e150cb8a5e1f75beafd75425d3d411e7d3143e22434c4bff922af5509a1c02
libblockdev-lvm-3.2.0-4.el10_0.ppc64le.rpm
4221a626c44e33a13e7f262e3566e91596e951dc7ccf3374a241772384b30d93
libblockdev-lvm-dbus-3.2.0-4.el10_0.ppc64le.rpm
13ce041d6cc767efc793ed8ad2acb3cbbf08aabd72793c2174f9ff8fa1b21d22
libblockdev-mdraid-3.2.0-4.el10_0.ppc64le.rpm
04c0aff9b269c5a765b16ce2f0025f4204ffd717c8587925d3a98bc3348a7f3e
libblockdev-mpath-3.2.0-4.el10_0.ppc64le.rpm
929d8420ca04bba453ccb13a6ac214d9534af48f1601c74ddf37926ff6f89bb1
libblockdev-nvdimm-3.2.0-4.el10_0.ppc64le.rpm
bfbf8fbe38f76f416a9bbf988239f7c2c12d415df3de1a43a82a5f72267d3ae5
libblockdev-nvme-3.2.0-4.el10_0.ppc64le.rpm
e864bd90e01b7ecc742ee586ea0b71e6d7999811f73b2c676f80eaf70fbb665b
libblockdev-part-3.2.0-4.el10_0.ppc64le.rpm
b03fe6ecfee6711c249552e74d824dfc468294946c11f356482cd17dc3d54364
libblockdev-plugins-all-3.2.0-4.el10_0.ppc64le.rpm
7d9b2874542be70920bc751c050aab850df59c36736f50592c3ccf9d5e78a1a7
libblockdev-smart-3.2.0-4.el10_0.ppc64le.rpm
3d58b8537fd97e1afad48faf4d7444aab6f751d35508f7581737430126001e84
libblockdev-smartmontools-3.2.0-4.el10_0.ppc64le.rpm
76dc247674341349309e65701fe78a655a34a275d48286223d697d3cc4b18db4
libblockdev-swap-3.2.0-4.el10_0.ppc64le.rpm
5a09111f18d88737726491952d481a1a9a313b820da61cadfb1bd92a9b316715
libblockdev-tools-3.2.0-4.el10_0.ppc64le.rpm
721c747960426d9b3ee1cbb360fcd7ad7c7b31be7f12976af4a6c08a568af115
libblockdev-utils-3.2.0-4.el10_0.ppc64le.rpm
773cf0e0e86d88f4c18d76545ac25e0f4bb67a322617c7ba1fd9eed551e7f119
python3-blockdev-3.2.0-4.el10_0.ppc64le.rpm
b9158cb742c9545e994aaf1f0adbef49f10978579728ba8cf18e9ef9dd10e6c0
RLSA-2025:9466
Moderate: mod_proxy_cluster security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mod_proxy_cluster.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality.
Security Fix(es):
* mod_proxy_cluster: mod_proxy_cluster unauthorized MCMP requests (CVE-2024-10306)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_proxy_cluster-1.3.22-1.el10_0.2.ppc64le.rpm
975136108f1d50ca650d434c7c907223ff32a5bada25f7b34c17b7613b1eb93b
RLSA-2025:9486
Moderate: qt6-qtbase security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for qt6-qtbase.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Qt is a software toolkit for developing applications. This package contains base tools, like string, xml, and network handling.
Security Fix(es):
* qt5: qt6: QtCore Assertion Failure Denial of Service (CVE-2025-5455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
qt6-qtbase-6.8.1-9.el10_0.ppc64le.rpm
478d34baebec30e704cc043d3ef7604d6e782f7bcfaa0c9d0bdb35ffc54b65c6
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-common-6.8.1-9.el10_0.noarch.rpm
1cb71dc28df65692eeb4c2716a3648f044980fa7291152664beaccd2b7f5185e
qt6-qtbase-devel-6.8.1-9.el10_0.ppc64le.rpm
d78daf9780f648063df29f63ee46a86c4b62d28497dd3641c7a19931fd3640c6
qt6-qtbase-gui-6.8.1-9.el10_0.ppc64le.rpm
3990e3ec80abc8fb3e1cd37872cdc9a8052cea6a119feb7900386ad2ec769928
qt6-qtbase-mysql-6.8.1-9.el10_0.ppc64le.rpm
9534f4b58df22744217e1cb9740c051cff7e00dabeb92961ec6a2134a0f58786
qt6-qtbase-odbc-6.8.1-9.el10_0.ppc64le.rpm
8481a5187ad0481fd3888b09727c765947aa7cc72319c08c4cb1dbf9112c2c4f
qt6-qtbase-postgresql-6.8.1-9.el10_0.ppc64le.rpm
137e9451620b9a9a54df29db2497ccc9c9ebe46754e8baf0322f0eae1e4849e1
RLSA-2025:10073
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: Content-Disposition header ignored when a file is included in an embed or object tag (CVE-2025-6430)
* firefox: Use-after-free in FontFaceSet (CVE-2025-6424)
* firefox: Incorrect parsing of URLs could have allowed embedding of youtube.com (CVE-2025-6429)
* firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID (CVE-2025-6425)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.12.0-1.el10_0.ppc64le.rpm
904be00dd88d57027c74484b43c7b2e9fbd1a24f3dcb3abde7b963a4c0e19221
RLSA-2025:10195
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-5986)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.12.0-1.el10_0.ppc64le.rpm
19252d6a82542afa9ada6b573b6a524e5dfafbd805f88a10e24696cdf40f7f06
RLSA-2025:10549
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: podman missing TLS verification (CVE-2025-6032)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-12.el10_0.ppc64le.rpm
1e491312e38d5c65a938d4bcd30a55c63e0c3e31b3606fc989ca3c43416cfe3a
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-docker-5.4.0-12.el10_0.noarch.rpm
50e57d06c0b4b9b5f81adc49cece6f8a36edbae57426c6f6b3b6cf9939b0ab15
podman-remote-5.4.0-12.el10_0.ppc64le.rpm
fc170c5db79ed14b41cf3e32a9d559f99cdc716fac911e7f819ba67efa9aacb3
RLSA-2025:10635
Moderate: gnome-remote-desktop security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnome-remote-desktop.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GNOME Remote Desktop is a remote desktop and screen sharing service for the GNOME desktop environment.
Security Fix(es):
* gnome-remote-desktop: Uncontrolled Resource Consumption due to Malformed RDP PDUs (CVE-2025-5024)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gnome-remote-desktop-47.3-2.el10_0.ppc64le.rpm
7426fd8e41574c6d1afefd6afdad421b924bd573367e8161c6dca453ab2b5224
RLSA-2025:10677
Moderate: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-1.24.4-1.el10_0.ppc64le.rpm
cf38b25b9bd77347f9137cf8b120010807c4e028012b2a0353dbf5690c53a44d
golang-bin-1.24.4-1.el10_0.ppc64le.rpm
01b07ff34f8102fdd1e586cf1acf8e830a37cad1451117d1fb304e341400cd3d
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-docs-1.24.4-1.el10_0.noarch.rpm
f55ec9fb24d751ffe3187f8ca6c2726708bdf26cc2e04ed86d7500edf65a2eb9
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-misc-1.24.4-1.el10_0.noarch.rpm
c34922495aa0d17cd7ea49e63ba69169799423420eaf62cebd336663b16ba28a
golang-race-1.24.4-1.el10_0.ppc64le.rpm
f1530d81f303c6506edf40d168e0a582da1ae8ee05640a749658c14e1a0935a9
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-src-1.24.4-1.el10_0.noarch.rpm
f49a704a94a6fae26328780398d8a6f588082da9aa5dafa3d777cf1a0eb27434
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
golang-tests-1.24.4-1.el10_0.noarch.rpm
e2ce7eb27332c70ecc199fc129838f7f8b37a285a616b50b04779e5e62e0c77f
go-toolset-1.24.4-1.el10_0.ppc64le.rpm
0aeea8cc3aee168b1b8abd20449b15dea8e93b38c382f71144a2e59ca65a74f3
RLSA-2025:10873
Important: java-21-openjdk security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for java-21-openjdk.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The OpenJDK 21 packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* JDK: Better Glyph drawing (CVE-2025-30749)
* JDK: Enhance TLS protocol support (CVE-2025-30754)
* JDK: Improve HTTP client header handling (CVE-2025-50059)
* JDK: Better Glyph drawing redux (CVE-2025-50106)
Bug Fix(es):
* In Rocky Linux 9 and Rocky Linux 10 systems, the default graphical display system is Wayland. The use of Wayland in these systems causes a failure in the traditional X11 method that java.awt.Robot uses to take a screen capture, producing a blank image. With this update, the RPM now recommends installing the PipeWire package, which the JDK can use to take screen captures in Wayland systems (Rocky Linux-102683, Rocky Linux-102684, Rocky Linux-102685)
* On NUMA systems, the operating system can choose to migrate a task from one NUMA node to another. In the G1 garbage collector, G1AllocRegion objects are associated with NUMA nodes. The G1Allocator code assumes that obtaining the G1AllocRegion object for the current thread is sufficient, but OS scheduling can lead to arbitrary changes in the NUMA-to-thread association. This can cause crashes when the G1AllocRegion being used changes mid-operation. This update resolves this issue by always using the same NUMA node and associated G1AllocRegion object throughout an operation. (Rocky Linux-90307, Rocky Linux-90308, Rocky Linux-90311)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
java-21-openjdk-21.0.8.0.9-1.el10.ppc64le.rpm
dfaa5acf05f1830d338b7d05e15f0c508c631182a2a58fc5e929419031992a98
java-21-openjdk-demo-21.0.8.0.9-1.el10.ppc64le.rpm
17df7f6beb2b57b96d05eff79e57c1d25a6d80662e68266993ff64245bae3693
java-21-openjdk-devel-21.0.8.0.9-1.el10.ppc64le.rpm
da244ad298fb5b1be2ecc36b59df42b45f6e2f6fe0b1cd1d8ef8bb5148425aa8
java-21-openjdk-headless-21.0.8.0.9-1.el10.ppc64le.rpm
c40287e317dee387b5b68624b08a5580e3241b939306c200cd8757e2e0ad0d44
java-21-openjdk-javadoc-21.0.8.0.9-1.el10.ppc64le.rpm
092ba4065cb7bdc278f704c81520b1fa36a5760df11717879415b1fa2484ec59
java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el10.ppc64le.rpm
b3acfe433cd3665bb909b2eee35f6a1b2c61bc664add1e0ee8c9471974d6a63c
java-21-openjdk-jmods-21.0.8.0.9-1.el10.ppc64le.rpm
e251cdfd84acc55349b1d5a670e96c59b247e6d88fca759387e2a86c2911222a
java-21-openjdk-src-21.0.8.0.9-1.el10.ppc64le.rpm
13f3a07f171df295f2320802d884e4ddddf637811e027d423ec33bdb5bca4639
java-21-openjdk-static-libs-21.0.8.0.9-1.el10.ppc64le.rpm
425e9b3332ed6fd6377319f8a968297d8816e455125a746571eb9425bd83ce68
RLSA-2025:11332
Important: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Incomplete fix for CVE-2024-50379 - RCE due to TOCTOU issue in JSP compilation (CVE-2024-56337)
* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame (CVE-2025-31650)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-9.0.87-5.el10_0.1.noarch.rpm
7c11353e58e4822db9739e90e1b99462f3be11ed491be1beb1be7807545181bd
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-admin-webapps-9.0.87-5.el10_0.1.noarch.rpm
3d6851aa27bf852945314cbad8a11ba59df3e3cbe7ed6ac0e5a5f29c58225d40
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-docs-webapp-9.0.87-5.el10_0.1.noarch.rpm
a9f4d0eeabb6df8ffa9e7a332446f5a161ada29c77a0d38fb801fc826504e033
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-el-3.0-api-9.0.87-5.el10_0.1.noarch.rpm
38b76b62dec96d2400b4a5030c61a93d6865897a63fd032a2b9f1076eafe9c2d
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.1.noarch.rpm
cf01a3d83ada8424330926b49aaa536c4dfb24576f057cc989a0b3a14c441883
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-lib-9.0.87-5.el10_0.1.noarch.rpm
29e509374ef0700c32eb589736d9d80bddbe255b252cd9f927e1e3f21bf5ec3e
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.1.noarch.rpm
0ca600cd745cbb59544aafe2278a75381d4da269d7ac01aaeb9b61eba69210df
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
tomcat9-webapps-9.0.87-5.el10_0.1.noarch.rpm
f5b988b6558b3992d98428ec7af5cf620fc24157d925e3ab1cb9fa27488fa459
RLSA-2025:11401
Important: valkey security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for valkey.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Security Fix(es):
* redis: Redis Stack Buffer Overflow (CVE-2025-27151)
* redis: Redis Unauthenticated Denial of Service (CVE-2025-48367)
* redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability (CVE-2025-32023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
valkey-8.0.4-1.el10_0.ppc64le.rpm
97961d5ab5d066abcb4053616945f1f4483998456f1ecb44005baaa7eb135a4d
valkey-devel-8.0.4-1.el10_0.ppc64le.rpm
ca1c013a53b0b83b5d7f7b3921770d07fcab2b22ba07e472f6d4bad1846ec2fa
RLSA-2025:11797
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
* firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
* firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
* firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
* firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
* firefox: Memory safety bugs (CVE-2025-8034)
* firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
* firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
* firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.13.0-1.el10_0.ppc64le.rpm
3140a63855c75ef9bd4fd2653fb07e3ee9e50034e07496b1898d8c31165ac05d
RLSA-2025:12056
Moderate: perl security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for perl.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Perl is a high-level programming language that is commonly used for system administration utilities and web programming.
Security Fix(es):
* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
perl-5.40.2-512.2.el10_0.ppc64le.rpm
e0974f9748c382d076974de7b86799ae146d882371b6ab23b2c0e50af7ac7093
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-Attribute-Handlers-1.03-512.2.el10_0.noarch.rpm
a50a47c9c8189cf7eec48d586f8816aa6273e5a84e24c8b38c98b3396378e0d7
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoLoader-5.74-512.2.el10_0.noarch.rpm
d11dee873d7d98224cb8b63b805b266025ff6e7a7c0bbddea102a1aef6b4c1ef
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-AutoSplit-5.74-512.2.el10_0.noarch.rpm
fc83da5b9f60869db73ea9335d11b087da8977bab44b669d2fc21d5ce7eedbdf
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-autouse-1.11-512.2.el10_0.noarch.rpm
022a86f3a5975a041799ad17b807e59e335f57a29b3fcd9e7624ae13d9fc343f
perl-B-1.89-512.2.el10_0.ppc64le.rpm
5c418ff850ceacda6cfa2f2446f6006bba6f6adc007f164eea916225429f4044
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-base-2.27-512.2.el10_0.noarch.rpm
23294c4ee06f04f99e734a520e7118b3f69b4e973afdcfa435e7fdffacb6cb30
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-Benchmark-1.25-512.2.el10_0.noarch.rpm
7f17cc9401a6998858fbfc634fd8cacb305dd95c5557fa60dd1efc7f9e40dd6c
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-blib-1.07-512.2.el10_0.noarch.rpm
26f1caf1fa8a54fea467f5e126a8b9d295cc763ee5e84029137ee6dd9ad12668
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Class-Struct-0.68-512.2.el10_0.noarch.rpm
142b33b254ad949b08e59aa746019c53c09a6f9b1e8f16612c23a2222c7890bd
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-Config-Extensions-0.03-512.2.el10_0.noarch.rpm
088dd306bf83eb27d4800a7dc8a74248a7655b27025f6a1096a32664ad3f7e71
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-DBM_Filter-0.06-512.2.el10_0.noarch.rpm
594a8f1acb1be8bea0d80d76529e16e209ab76632573ec320a3a255c1d93030d
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-debugger-1.60-512.2.el10_0.noarch.rpm
116632d66aecb227ec01b561039c998967e38b11605a08c26c6975f100d3f363
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-deprecate-0.04-512.2.el10_0.noarch.rpm
f9b6c6d93abe972e0898aed2bd517c9dd7492b589cc43f0f542ef879705eaa16
perl-devel-5.40.2-512.2.el10_0.ppc64le.rpm
f1bbfd39ff69566413ead66033d09f9247fb0210ef73c56318c2a930cefc31ac
perl-Devel-Peek-1.34-512.2.el10_0.ppc64le.rpm
251bb93e78fd93661b39828c2ddabbbd0578f5e5da98368ec988a18f5a75efd5
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-Devel-SelfStubber-1.06-512.2.el10_0.noarch.rpm
3333f3ddba623e1659029a71773b6fdd8b06009f52f630c617f5f06869d193ab
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-diagnostics-1.40-512.2.el10_0.noarch.rpm
391498cf663012d9ec9bd910b4bf53cf4234304cea25b142debbb91bda3c79ba
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-DirHandle-1.05-512.2.el10_0.noarch.rpm
3b7143910af7251015a7a91b80280ebe2390424ccb7e1ce5172d6fe3a2b579a7
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-doc-5.40.2-512.2.el10_0.noarch.rpm
1f2e5dc38f4e1c91f43dac6269bb11d7c025b27eb55e7f4eb6461ea0220704ac
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-Dumpvalue-2.27-512.2.el10_0.noarch.rpm
4e035ced3d3eae3c988ec32be73475af7f253d99e8fe456d829cbca7887fd3e6
perl-DynaLoader-1.56-512.2.el10_0.ppc64le.rpm
c7839d86d0db1363fdc18e97e3a54c9c943631ae348245d36e9836c7ce05ffbf
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-encoding-warnings-0.14-512.2.el10_0.noarch.rpm
e0901d24894adcac12d89343604cf3e8775024483b6a83d3d5913153c41faf8a
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-English-1.11-512.2.el10_0.noarch.rpm
cace3f6ec93d1dddf2a3880e90a746967df8ad4b18c65e3fab3d6d2837962a59
perl-Errno-1.38-512.2.el10_0.ppc64le.rpm
e94006c782869f0281c8df1b700e552a85d905c3ead2342d1c4d429b59e10cc0
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Constant-0.25-512.2.el10_0.noarch.rpm
a5254c20224062ab3e006e8a816d71f6a6f7c392afebeaf67c08189a04820674
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Embed-1.35-512.2.el10_0.noarch.rpm
a3a81991583e28184db2748eb512c1a95788568a6da7aafaa5ec0fc4a39b594d
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-ExtUtils-Miniperl-1.14-512.2.el10_0.noarch.rpm
bff285dd9b50eac452554962e9533a81440ab5b293a5f8a131ed217e159b4abd
perl-Fcntl-1.18-512.2.el10_0.ppc64le.rpm
13d92e385094426d5948e279b89dbb0b1bef620745d0378b3f735214cbe58015
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-fields-2.27-512.2.el10_0.noarch.rpm
a5185e8c106dd42e6900b9594a894c8640301c4454d6e9130996d1d2c6619743
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-File-Basename-2.86-512.2.el10_0.noarch.rpm
0e52e24b6fe11614f52f85fac01887550aca5af48322b7297add18f8bae07af8
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-FileCache-1.10-512.2.el10_0.noarch.rpm
ddcec09ad7b7e78312d597efb775fd0795aca5064ba933ac3ba53de6ffb70ed3
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Compare-1.100.800-512.2.el10_0.noarch.rpm
36d9a304d4513dd8ab9b8e98d02cc609541bdbba22be1ea88b247e37ca61671f
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-Copy-2.41-512.2.el10_0.noarch.rpm
eed099e78ffcf4332ed8a29bfb6ea948717fc3b61b312e205a8a3bb3783abcb0
perl-File-DosGlob-1.12-512.2.el10_0.ppc64le.rpm
11a9a172270f23fd57b685e2b43c6bdb86e0856564778bfc7ddcf1a9cc5c75a2
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-File-Find-1.44-512.2.el10_0.noarch.rpm
1d72ea44720cc2edbea27771dd5708935c2b1f1165c12b7bd8053a281e31bff8
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-FileHandle-2.05-512.2.el10_0.noarch.rpm
da293f041854918ba2ed671bc86e0fa2495c7c6bb6bb4ae6c1d1555aa0543ccf
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-File-stat-1.14-512.2.el10_0.noarch.rpm
e68ec3b54e4a04236a01260f76f52453974a71e4ba14a85a92357e611f8f0307
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-filetest-1.03-512.2.el10_0.noarch.rpm
d722cf0a055e441a8e7f804a6cb287f292ea823b01ffa0fd6aa6b9232d28a82b
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-FindBin-1.54-512.2.el10_0.noarch.rpm
309befe99d17047346772695df54eb58575c000cd4da46652dfc56edc7da597f
perl-GDBM_File-1.24-512.2.el10_0.ppc64le.rpm
2a22c31880b603137aed58c092af2da0c99369c3b4f3ffeedfa609a6f380812f
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-Getopt-Std-1.14-512.2.el10_0.noarch.rpm
4c704ab2ee391d717797366dd5ed6e0b4972c6915dbaf0ed0079f4cb23dd2fb3
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-Hash-Util-0.32-512.2.el10_0.ppc64le.rpm
e2298d69e3670b0bb5deefc39ff8ff60443a95404894123c4c11d6672851447d
perl-Hash-Util-FieldHash-1.27-512.2.el10_0.ppc64le.rpm
dc6947fe1ac1e78e1631b00de0d806bf1206ea15f1ce19839eeefd1d0bdfc215
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Collate-1.02-512.2.el10_0.noarch.rpm
bcba8afa4f930466ff0b74cd168d0223e120524176ce70249b765a1b1b7dd280
perl-I18N-Langinfo-0.24-512.2.el10_0.ppc64le.rpm
7a173d0c97c3488e64cee0c73c7c17938ef988d4e84fc8d7cc049e7e7a5281a1
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-I18N-LangTags-0.45-512.2.el10_0.noarch.rpm
76f6d8df29b37d36d869d540fe00fab661009cb9985b188caf23892bad7b52a8
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-if-0.61.000-512.2.el10_0.noarch.rpm
5f355e52e71146d71223f34451b5ff1c11bc471ae8eeb0a1a84258d15c32594f
perl-interpreter-5.40.2-512.2.el10_0.ppc64le.rpm
799e6fad8e4d3ad54e5f36754505b4d193dadc9af3ab3516c18d8d8e6b03a85e
perl-IO-1.55-512.2.el10_0.ppc64le.rpm
6d952077d0596e5f3d6ad86e6501b75e44a1cedad48de76788bfd1cae087f059
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-IPC-Open3-1.22-512.2.el10_0.noarch.rpm
86b148a2756784bdcbdaff5cff28c5393ac52f4bf0216907756b57a5ba5ca92b
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-less-0.03-512.2.el10_0.noarch.rpm
b5e848124b09387112c1d4231c76c8def385bc0538c73b2c6ec9aa685fa9200d
perl-lib-0.65-512.2.el10_0.ppc64le.rpm
b31adde6ca21d8471da61bd16d2664a47226a2b83b92c2f250403c105f265ac5
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libnetcfg-5.40.2-512.2.el10_0.noarch.rpm
7efe3f4939bc66049dfb3820be0b55a361dfc104ba96d7878399dee3e3d68a5d
perl-libs-5.40.2-512.2.el10_0.ppc64le.rpm
5755c41ca4dff41545eb90e0332715f41ab6a20929716b6d6c689f63e6362aec
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-locale-1.12-512.2.el10_0.noarch.rpm
a9a3b66e223867d6208946406f5b1edf6726034cdb86c60594d1d1df8381fa18
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-Locale-Maketext-Simple-0.21-512.2.el10_0.noarch.rpm
39e29184aa99c21e97a57e97dc02717f90d377f12a3202b0e93b71ce1ff113c6
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-macros-5.40.2-512.2.el10_0.noarch.rpm
c338c5d3a9bd8a1c1235f1c8da239f29b9d62bf58788f9983355db0106722eaf
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Math-Complex-1.62-512.2.el10_0.noarch.rpm
6be88deaf0001307cb42142a066d5bbb8355ca3c066f287cc1dfb6c70135de31
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-Memoize-1.16-512.2.el10_0.noarch.rpm
a8b43a7f26e0da134f559117be6ec1246f4403594c78bd2c028b93ee08086207
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-meta-notation-5.40.2-512.2.el10_0.noarch.rpm
e1de3da0d11590cde4c2f31ea22160f937639c4cb14852569b46be28b046c8ee
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-Module-Loaded-0.08-512.2.el10_0.noarch.rpm
3639e9e7b65277a67c7409fe4f020b3913c7ef6b948bf577ed1ae9aa34f71efc
perl-mro-1.29-512.2.el10_0.ppc64le.rpm
c6bd2788a587dce2e41e5b4c8caea8932ec596708e0f6511d32589869931bdf9
perl-NDBM_File-1.17-512.2.el10_0.ppc64le.rpm
860f86cecfff6a67040c29729558bfbecb55b8b4ab0d0791e611a1d80bdf6bc3
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-Net-1.04-512.2.el10_0.noarch.rpm
589d4504637d13e2435420455917884df8727581aa80fae5b51020650ac8169f
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-NEXT-0.69-512.2.el10_0.noarch.rpm
6cf667a4e215805092c31399b07088b9b53ac30571429737c26ff5633c93f107
perl-ODBM_File-1.18-512.2.el10_0.ppc64le.rpm
92cb933d1ff81e45f602bcec873e735fd3bc520b6edf31020c46a107fa802555
perl-Opcode-1.65-512.2.el10_0.ppc64le.rpm
6747aab419e88b9ce3cd3125526fe1dafe9592e843ddb49169cc9c21563d5b32
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-open-1.13-512.2.el10_0.noarch.rpm
e6faf552b3ef8663aa5c008bb0170bd1937c21b052e19b38338b17af0140a2fa
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overload-1.37-512.2.el10_0.noarch.rpm
ef05e1e0a8d4186fd2b5fc8e9726345b0d14a30e4a7eb7a66943aa51c6032a4f
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-overloading-0.02-512.2.el10_0.noarch.rpm
418913e1c6335e9aa8f039fa6903dbba59d713bc902191272692c655b2d8f63b
perl-ph-5.40.2-512.2.el10_0.ppc64le.rpm
81122a465debbf2ecb0f96eb9072a6e9db003db2763c23c9f3587bf0813edb2e
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Functions-1.14-512.2.el10_0.noarch.rpm
9544e913bae26609c973b6fac8ef231fa230e79b79966696f27dc6169b0cce16
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-Pod-Html-1.35-512.2.el10_0.noarch.rpm
56640ad227c8fb21e7f72fde247757f01d905d585bea3ede000adc8db4072b87
perl-POSIX-2.20-512.2.el10_0.ppc64le.rpm
0f9cbf4465d39f1a8c27923755a33e3e1c812d2e8a1863b3f5b4c7d388b95adb
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Safe-2.46-512.2.el10_0.noarch.rpm
d8b10fade999abb3271355112bd700b47920bc3556996606e99cc4ac445e682d
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-Search-Dict-1.07-512.2.el10_0.noarch.rpm
7a93698979506fa211d4570b90132e5368cc45829985baec494f877a38ec0061
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelectSaver-1.02-512.2.el10_0.noarch.rpm
4971816006a6fd214274853c95c74c1e4af34acb2fa145d7c36d3533f115969d
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-SelfLoader-1.27-512.2.el10_0.noarch.rpm
15a01d37dcd6c51415b3d2eb973d5e64ffe93455587282661129f31e39a37164
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sigtrap-1.10-512.2.el10_0.noarch.rpm
d322121627446cea0a0ce9a162ac1e5cbc3c21fed5454a614f9f3231bcd6e819
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-sort-2.05-512.2.el10_0.noarch.rpm
9a656d27009bec4a4203f84e041407805e48189799413db9637a51d307666867
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-subs-1.04-512.2.el10_0.noarch.rpm
6f51e398f25184efd9fa656c36b32f4a66b84db33473a0084c09d2564b1fa173
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Symbol-1.09-512.2.el10_0.noarch.rpm
e44ddbdba11f7108309e1e8268ded90b30b45d4559d329b7598c194491e65cb7
perl-Sys-Hostname-1.25-512.2.el10_0.ppc64le.rpm
6f4a988d84b5637bd717c5690ecd244a1094e0047ddf29f6531f24f566a9c688
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-Complete-1.403-512.2.el10_0.noarch.rpm
bca25218698dc5bec307ab2833f95c80979801a3a50bde8578e87f5b0a9e9c6e
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Term-ReadLine-1.17-512.2.el10_0.noarch.rpm
eacdcb68a50137a0b436f0c843963dd397f6a08953c66383e62b6cc416203cf0
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Test-1.31-512.2.el10_0.noarch.rpm
7e9be4015583373451563d4ec380e02dd4acceb46311be07128844cee2bd3c99
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Text-Abbrev-1.02-512.2.el10_0.noarch.rpm
25b62a751bb2a0357cfcf9b4a9e159bbacbefd6cfe0748265e62219dc9683586
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-3.05-512.2.el10_0.noarch.rpm
491d0f80e3d887e45c217e46256d581c90fb3cb07830cc546e2a6f5691b629f6
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Thread-Semaphore-2.13-512.2.el10_0.noarch.rpm
638204720d76bfff46b4232b6bac608876be8f587b9c7f3d1009e3dedf806dcb
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-4.6-512.2.el10_0.noarch.rpm
5c0753c9b84119f97ee29a79a6f85d2b9b8e7b43e7ccceff30076e592529fb4e
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-File-1.09-512.2.el10_0.noarch.rpm
979470cf5a306f3c4dea61028b98b449ca8befcfe02987ef6e147c7321f6d3fa
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Tie-Memoize-1.1-512.2.el10_0.noarch.rpm
caab07ab606928b27eff25c56d245649147171e90b94c8f4ebc6168c2c04d1a6
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-1.04-512.2.el10_0.noarch.rpm
9f0208c626290f1e4e435ec425e901cb8c2db44c8e1caa64fc244a9172006d4f
perl-Time-Piece-1.3401-512.2.el10_0.ppc64le.rpm
1f96a114b28342113f20ac8b4674d00780533682dc0361acbb17eb26d0bbe0f0
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-Unicode-UCD-0.78-512.2.el10_0.noarch.rpm
8127dfa5d5006949b78316bea4cd438b83f616dbb2c9160dee0d3c88dd354d8e
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-User-pwent-1.05-512.2.el10_0.noarch.rpm
61be0c87a8ef400af759697ab882a54dc62018958aa86f3a3f6a2bac93666b68
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-utils-5.40.2-512.2.el10_0.noarch.rpm
c89e6e8052e14ed8e1c2d3c9c09ef67d1f90be7705d624293c916ee926fd4ae8
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vars-1.05-512.2.el10_0.noarch.rpm
877c2bdd38a85c3510e06a9a271b5badc4b80c917109f39f65f3ca4796eca380
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
perl-vmsish-1.04-512.2.el10_0.noarch.rpm
b2e68ff6ffa4970afdeff6e1d9988decbf7cabe45d08dabee3d6b41284f869d7
RLSA-2025:12064
Important: unbound security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for unbound.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver.
Security Fix(es):
* unbound: Unbound Cache poisoning (CVE-2025-5994)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
python3-unbound-1.20.0-12.el10_0.ppc64le.rpm
eacbec48176d44cf77248b3afda76b3123a1fa4d33d647d33c0ad3a0cb2ed60f
unbound-1.20.0-12.el10_0.ppc64le.rpm
c1709def0a6f06f7b7ee79533ca8133d24fca9ce100d31e721f75df4a3a3db3c
unbound-anchor-1.20.0-12.el10_0.ppc64le.rpm
e1ea07f1a3373071a8712b3b57093fa4b8895c8fded387b9153eacf3e1e5a373
unbound-dracut-1.20.0-12.el10_0.ppc64le.rpm
27fc442fc5e3b5d951261cb887b6c444cafb958a89bea63645ebd3aa3394e48f
unbound-libs-1.20.0-12.el10_0.ppc64le.rpm
78666d8eb8660a39844ecae4a98f22c3d7d576575c0a8c64148442a245716b34
RLSA-2025:12188
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
* firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
* firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
* firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
* firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
* firefox: Memory safety bugs (CVE-2025-8034)
* firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
* firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
* firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.13.0-3.el10_0.ppc64le.rpm
c2abf212ce6ffec192eb0a6a82afe4e0851873f46f1a238703d9c873f27eb0b2
RLSA-2025:12850
Moderate: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.127.0-1.el10_0.ppc64le.rpm
ff481c51c20da3c327b59317ce9deddc670030762a2185dd6db818659110c20a
RLSA-2025:12862
Moderate: gdk-pixbuf2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gdk-pixbuf2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter.
Security Fix(es):
* gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
gdk-pixbuf2-2.42.12-4.el10_0.ppc64le.rpm
43cd89835828f64a51ecda3f79b9ba6bdc13713cd0341198938689542a255df7
gdk-pixbuf2-devel-2.42.12-4.el10_0.ppc64le.rpm
488b60e0ba9031d92087200e39e5de41167cf67ae5d1d700de35f587ce9364cb
gdk-pixbuf2-modules-2.42.12-4.el10_0.ppc64le.rpm
2734628dcf2b2ff3346e0cdb36b5db88c8c7ab4269cbe6e9675359c14de349db
RLSA-2025:13674
Important: toolbox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for toolbox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Toolbox is a tool for Linux operating systems, which allows the use of containerized command line environments. It is built on top of Podman and other standard container technologies from OCI.
Security Fix(es):
* nvidia-container-toolkit: Privilege Escalation via Hook Initialization in NVIDIA Container Toolkit (CVE-2025-23266)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
toolbox-0.2-1.el10_0.ppc64le.rpm
b50bfd506454353c11f85bd34123990509381f84e8fa765cb468af7230c712af
RLSA-2025:13941
Important: golang security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for golang.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The golang packages provide the Go programming language compiler.
Security Fix(es):
* cmd/go: Go VCS Command Execution Vulnerability (CVE-2025-4674)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
golang-1.24.6-1.el10_0.ppc64le.rpm
6f3f1e01fcf4b2c5467de0aa7c2af87c876c133c81cc765e0d4714049084b03a
golang-bin-1.24.6-1.el10_0.ppc64le.rpm
230106ecf727ed6fc1f27e5e572999602abd1f4c70b8eebc852f3baddc38c8b5
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-docs-1.24.6-1.el10_0.noarch.rpm
c8015b335c5881328c5e1ea21aab8e9487e278ded209f83b111b0a870925aea1
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-misc-1.24.6-1.el10_0.noarch.rpm
9d833125417d6f49f9dc2a9c19bf9454ea27c78b6d319168faff5c6491b640b7
golang-race-1.24.6-1.el10_0.ppc64le.rpm
f7d23e0fbcb6bf7f8c328f64d2f7c3ae9a8f034d48ddcdcc620ee593b1d0aa2a
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-src-1.24.6-1.el10_0.noarch.rpm
aace02df66e63925e08917bd1704188ea6726490a414e5f5f1f5b9b0ff6051c9
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
golang-tests-1.24.6-1.el10_0.noarch.rpm
e7152f56606fe5f068a38d2d2e40d491f9670cc56cb216e7c1d8fc558ffd4491
go-toolset-1.24.6-1.el10_0.ppc64le.rpm
05498ffb63104c517bbd78f9d040c3d1e39a2199e07dfb6df4539fc429595f45
RLSA-2025:13944
Important: openjpeg2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for openjpeg2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
OpenJPEG is an open source library for reading and writing image files in JPEG2000 format.
Security Fix(es):
* openjpeg: OpenJPEG OOB heap memory write (CVE-2025-54874)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
openjpeg2-2.5.2-4.el10_0.1.ppc64le.rpm
e59fa5b2b2195983dab81dc7e7f857bf2f898ee1e3b8353fb2c07f803bbc3065
RLSA-2025:14178
Important: tomcat9 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for tomcat9.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security Fix(es):
* tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988)
* tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
* apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976)
* tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)
* tomcat: Apache Tomcat denial of service (CVE-2025-52520)
* tomcat: Apache Tomcat denial of service (CVE-2025-52434)
* tomcat: Apache Tomcat denial of service (CVE-2025-53506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-9.0.87-5.el10_0.3.noarch.rpm
74e2a6fbef93fe6dada5062baa99ea2ae81539c66150c379e326ceff3d5f00ae
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-admin-webapps-9.0.87-5.el10_0.3.noarch.rpm
d5991ed5ea05046e1b9ded1ee71728137bf6cd5265e7a85fd43cc234b4a63cf1
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-docs-webapp-9.0.87-5.el10_0.3.noarch.rpm
27e9f00f4b4db5a618c88766816ea04e334e413b81d6df87309f92e797f2af01
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-el-3.0-api-9.0.87-5.el10_0.3.noarch.rpm
661c5eb96bedd37e4dd1988be1912a09dfb4246df01619be0a95decb6a739a0a
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-jsp-2.3-api-9.0.87-5.el10_0.3.noarch.rpm
d564b100d3af37696d23407cbec19f38dc10d5f263bc6463526307f297f9e751
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-lib-9.0.87-5.el10_0.3.noarch.rpm
56221df788f2fd94b729cbc24645ef14577c2a60e21394c4ccebbe3c466e437a
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-servlet-4.0-api-9.0.87-5.el10_0.3.noarch.rpm
197343759673b4df77e1cd4b653ff18640c1145a111abcf65f293bdf2cd640b3
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
tomcat9-webapps-9.0.87-5.el10_0.3.noarch.rpm
a92fb0bc741de5bed29ded39ffc1090c13d44d8e4663ed876455b9ec62dc79f0
RLSA-2025:14179
Important: tomcat security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for tomcat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Apache Tomcat DoS in multipart upload (CVE-2025-48988)
* tomcat: Apache Tomcat: Security constraint bypass for pre/post-resources (CVE-2025-49125)
* apache-commons-fileupload: Apache Commons FileUpload DoS via part headers (CVE-2025-48976)
* tomcat: http/2 "MadeYouReset" DoS attack through HTTP/2 control frames (CVE-2025-48989)
* tomcat: Apache Tomcat denial of service (CVE-2025-52520)
* tomcat: Apache Tomcat denial of service (CVE-2025-53506)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-10.1.36-1.el10_0.2.noarch.rpm
ecb917e318806b30780490e980d3321c09c3a9d0a55191e03a6e6aa155bb2f9b
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-admin-webapps-10.1.36-1.el10_0.2.noarch.rpm
a170a83d4db067f3716cc75b312457ae573a69b8abc08e35bf067456dd8d6556
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-docs-webapp-10.1.36-1.el10_0.2.noarch.rpm
afc999a8b23e6e5bcd6fa3cb5dd0cec0c53b7092bdb3c8f5763ba7523102d44c
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-el-5.0-api-10.1.36-1.el10_0.2.noarch.rpm
d74a96e6451c0457caf006ecf5cb3f9c05a335f5155526ff7e43ea76d96de5ec
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-jsp-3.1-api-10.1.36-1.el10_0.2.noarch.rpm
40f0d2b7943d8439b32a461f3b324e8add8d7a2eb2989ca4c685b0a4ff0806bd
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-lib-10.1.36-1.el10_0.2.noarch.rpm
ae430958b25c1ff702c75b963827c5cd5c79c9d0e1b7cc97c10a86e80c3e2625
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-servlet-6.0-api-10.1.36-1.el10_0.2.noarch.rpm
eafac0514a1c171b579247cb0bd32de6b9e6446344213797e664d21eb1f5ee3f
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
tomcat-webapps-10.1.36-1.el10_0.2.noarch.rpm
b7378649e8898b6bbbbaaf8633261fdfb57139d41c243d6269728b2a2ecaf834
RLSA-2025:14417
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182)
* thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179)
* thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180)
* thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-128.14.0-2.el10_0.ppc64le.rpm
3930333478ad8580e19894fed667202725a3c3de7f59721e1d44f3ab41efa9c4
RLSA-2025:14592
Important: aide security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for aide.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Advanced Intrusion Detection Environment (AIDE) is a utility that creates a database of files on the system, and then uses that database to ensure file integrity and detect system intrusions.
Security Fix(es):
* aide: improper output neutralization enables bypassing (CVE-2025-54389)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
aide-0.18.6-8.el10_0.2.ppc64le.rpm
99e2841901daebf41544f6927e334f6e0fc41829b79ea239ba9dadc911c5dd73
RLSA-2025:14625
Moderate: mod_http2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mod_http2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mod_http2-2.0.29-2.el10_0.1.ppc64le.rpm
dbf669b3389ca736c408096363fe8fdcebcd437c91256d22b9d1d51104d4bd5b
RLSA-2025:14826
Important: postgresql16 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for postgresql16.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
PostgreSQL is an advanced Object-Relational database management system (DBMS). The base postgresql package contains the client programs that you'll need to access a PostgreSQL DBMS server, as well as HTML documentation for the whole system. These client programs can be located on the same machine as the PostgreSQL server, or on a remote machine that accesses a PostgreSQL server over a network connection. The PostgreSQL server can be found in the postgresql-server sub-package.
Security Fix(es):
* postgresql: PostgreSQL executes arbitrary code in restore operation (CVE-2025-8715)
* postgresql: PostgreSQL code execution in restore operation (CVE-2025-8714)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
postgresql-16.10-1.el10_0.ppc64le.rpm
d8f5e1edf3c909eea113ae4ce2a12b79c83c2af644b458d1a5c4c5cc864aad22
postgresql-contrib-16.10-1.el10_0.ppc64le.rpm
66f3bbad03c826a60e2bcadaa8b07d5fb0a163e2795cf7caa33f5ae00b8f45d1
postgresql-docs-16.10-1.el10_0.ppc64le.rpm
e4231c4571d28148fbe06ff95feca558595e8a553f5b0c3b01a5d42428c345ee
postgresql-plperl-16.10-1.el10_0.ppc64le.rpm
4ebb6abca403cf9d1adbb9db7c1621313d2e5c8080cf1e02a89db04050d13c0a
postgresql-plpython3-16.10-1.el10_0.ppc64le.rpm
b7bd05556f75c2770c40ee71a980a42b570594de2661d0317806424a56be3ade
postgresql-pltcl-16.10-1.el10_0.ppc64le.rpm
7ecdd4c606cebf9b430b3802de021237918374eeee76c1dc938725e34d92dbc3
postgresql-private-devel-16.10-1.el10_0.ppc64le.rpm
3536e19ac5a62fdcde2eaa92cab4ed5b00907a63879ab77024c3ec21d120edbd
postgresql-private-libs-16.10-1.el10_0.ppc64le.rpm
42c53ef54fa41a5f9c6477886196536d5e515bd6877f5b4854d28d00d8f7475f
postgresql-server-16.10-1.el10_0.ppc64le.rpm
39f5bfbd72f1dd2002279418b16613a9c43ae433d2581ba7dc8da550a273f52e
postgresql-server-devel-16.10-1.el10_0.ppc64le.rpm
6f54789ae20d2562ce883eda649ac2ea1207df6542ef65fd5e7f7ddb769f82ae
postgresql-static-16.10-1.el10_0.ppc64le.rpm
62b7d1cb6c954499b58878e79a37680400b2ba5ac5ba131ff55fc6f7fb2104f9
postgresql-test-16.10-1.el10_0.ppc64le.rpm
9d7dc3fc1d9b8e838f35a4cb02ea1b773487c6a0c931e18b1e0587821f568d43
postgresql-upgrade-16.10-1.el10_0.ppc64le.rpm
91cb49626362596feb444bbe89b3943fa7f279c578b0fc1a327c052e588cd8aa
postgresql-upgrade-devel-16.10-1.el10_0.ppc64le.rpm
80824e75ea5967cc09d90e1407d89e497c7560e0b294587ee2209b774a954786
RLSA-2025:14844
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Denial-of-service due to out-of-memory in the Graphics: WebRender component (CVE-2025-9182)
* thunderbird: firefox: Sandbox escape due to invalid pointer in the Audio/Video: GMP component (CVE-2025-9179)
* thunderbird: firefox: Same-origin policy bypass in the Graphics: Canvas2D component (CVE-2025-9180)
* thunderbird: firefox: Uninitialized memory in the JavaScript Engine component (CVE-2025-9181)
* thunderbird: firefox: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142 (CVE-2025-9185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-128.14.0-3.el10_0.ppc64le.rpm
e337737ddce424b8184e99dd27ce4158a7c6ca507724b0d70f257d519685cc10
RLSA-2025:15020
Important: udisks2 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for udisks2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Udisks project provides a daemon, tools, and libraries to access and manipulate disks, storage devices, and technologies.
Security Fix(es):
* udisks: Out-of-bounds read in UDisks Daemon (CVE-2025-8067)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
libudisks2-2.10.90-5.el10_0.1.ppc64le.rpm
45402a08a0ba5f1e9f94797bfe8743cb9ef98b1da814012b174a345c13b32fb0
udisks2-2.10.90-5.el10_0.1.ppc64le.rpm
83ed8f58610e909e0ca3cfe404a28c7d618241fd5b34c2bea402070e4e9be103
udisks2-iscsi-2.10.90-5.el10_0.1.ppc64le.rpm
1dc286d255b2d49d6e2de81cda4bf9b1aed5ee5398c9f2ef56001fb28d0fc545
udisks2-lsm-2.10.90-5.el10_0.1.ppc64le.rpm
11c93367168ed39e36be356256e15805661b56a350deb97e4397f138f2997a60
udisks2-lvm2-2.10.90-5.el10_0.1.ppc64le.rpm
e9d8b79796d8af9b1fe9818e60ac13d374c7c60ea2f62b635b681c403d5c772c
RLSA-2025:15095
Moderate: httpd security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for httpd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252)
* httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048)
* httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
httpd-2.4.63-1.el10_0.2.ppc64le.rpm
86f78403642b2ef30ba5e2395649f25c61af4ce2825fc1911b286c1c55f01f5a
httpd-core-2.4.63-1.el10_0.2.ppc64le.rpm
70b2ab17391ffc9c0328f4bbb186b205f1095a914ee38facd6fe08291fbb3ca5
httpd-devel-2.4.63-1.el10_0.2.ppc64le.rpm
040257f72f3651c29e830fa52e5ed97cbb37e505e86c0fe84dfc4ad1f7512bab
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-filesystem-2.4.63-1.el10_0.2.noarch.rpm
5be7b3a8027ace91358c2f798e53f4dcc46b2e434314f8c1cca16d3d37b96673
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-manual-2.4.63-1.el10_0.2.noarch.rpm
f55510c6628918f1cb42924ddff3203f84c000b1cd1e4db33205dc9ed5d67887
httpd-tools-2.4.63-1.el10_0.2.ppc64le.rpm
b1146137223e53ffe903990239cd5276dc1169bf5c704206497ddb397a1b8180
mod_ldap-2.4.63-1.el10_0.2.ppc64le.rpm
0b73ae6bf8898ed78efd3ba2fc22f66978bd5211bbba6b7b45346179682d3045
mod_lua-2.4.63-1.el10_0.2.ppc64le.rpm
fd057813ac996c1478f84dfbf6f4728956f185d640abceac83ff4fb3615f3c89
mod_proxy_html-2.4.63-1.el10_0.2.ppc64le.rpm
3449e8b74264d37bbbaf0bd4d94b79f8ec4e94c8a27b6d515be30d95c1c6495d
mod_session-2.4.63-1.el10_0.2.ppc64le.rpm
013953f909a162396eafb18fe5a38a218cefdcbe2f5112ec28bf39be3994f067
mod_ssl-2.4.63-1.el10_0.2.ppc64le.rpm
5a014b29d039dc10ea948920b734145fd7edbd3568ba12feebb94b5c70c786e2
RLSA-2025:15699
Moderate: mysql-selinux and mysql8.4 security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for mysql8.4, mysql-selinux.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
MySQL is a multi-user, multi-threaded SQL database server. MySQL is a client/server implementation consisting of a server daemon (mysqld) and many different client programs and libraries. The base package contains the standard MySQL client programs and generic MySQL files.
Security Fix(es):
* openssl: Timing side-channel in ECDSA signature computation (CVE-2024-13176)
* mysql: mysqldump unspecified vulnerability (CPU Apr 2025) (CVE-2025-30722)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30688)
* mysql: Stored Procedure unspecified vulnerability (CPU Apr 2025) (CVE-2025-30699)
* mysql: UDF unspecified vulnerability (CPU Apr 2025) (CVE-2025-30721)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30682)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30683)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30715)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21574)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21585)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21588)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30681)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-21577)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30687)
* mysql: DML unspecified vulnerability (CPU Apr 2025) (CVE-2025-21580)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30696)
* mysql: PS unspecified vulnerability (CPU Apr 2025) (CVE-2025-30705)
* mysql: Parser unspecified vulnerability (CPU Apr 2025) (CVE-2025-21575)
* mysql: Options unspecified vulnerability (CPU Apr 2025) (CVE-2025-21579)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30685)
* mysql: Components Services unspecified vulnerability (CPU Apr 2025) (CVE-2025-30704)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-21581)
* mysql: Optimizer unspecified vulnerability (CPU Apr 2025) (CVE-2025-30689)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30695)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30703)
* mysql: InnoDB unspecified vulnerability (CPU Apr 2025) (CVE-2025-30693)
* mysql: DDL unspecified vulnerability (CPU Apr 2025) (CVE-2025-21584)
* mysql: Replication unspecified vulnerability (CPU Apr 2025) (CVE-2025-30684)
* curl: libcurl: WebSocket endless loop (CVE-2025-5399)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50092)
* mysql: mysqldump unspecified vulnerability (CPU Jul 2025) (CVE-2025-50081)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50079)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50077)
* mysql: DML unspecified vulnerability (CPU Jul 2025) (CVE-2025-50078)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50091)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50101)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50093)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50099)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50085)
* mysql: Components Services unspecified vulnerability (CPU Jul 2025) (CVE-2025-50086)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50082)
* mysql: Encryption unspecified vulnerability (CPU Jul 2025) (CVE-2025-50097)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50104)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50087)
* mysql: Stored Procedure unspecified vulnerability (CPU Jul 2025) (CVE-2025-50080)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50088)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50083)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50084)
* mysql: Thread Pooling unspecified vulnerability (CPU Jul 2025) (CVE-2025-50100)
* mysql: DDL unspecified vulnerability (CPU Jul 2025) (CVE-2025-50094)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50098)
* mysql: InnoDB unspecified vulnerability (CPU Jul 2025) (CVE-2025-50096)
* mysql: Optimizer unspecified vulnerability (CPU Jul 2025) (CVE-2025-50102)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
mysql8.4-8.4.6-2.el10_0.ppc64le.rpm
8d322b737824f36cac7420a7e0bbae54654e07ab7ae22642fb4328b32176b2f6
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-common-8.4.6-2.el10_0.noarch.rpm
b00f64905687fb131a234fa7eb8cfbf01c82d55158e117d99ce6b0f8dfff877c
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-errmsg-8.4.6-2.el10_0.noarch.rpm
4e4119b62c7395860583065fc1a0792e5cf336b0e3820babc0b39cc7de6528f0
mysql8.4-libs-8.4.6-2.el10_0.ppc64le.rpm
1cbc402b71669afaa18f08f97a8a24545dbc500ab6b63ccd774d4f5600d40771
mysql8.4-server-8.4.6-2.el10_0.ppc64le.rpm
402f00cc69f6b7ce562ab645a351eb32f5af72164d8421331b20c89eee1c35f6
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
mysql-selinux-1.0.14-1.el10_0.noarch.rpm
6e96fc73b86d1fcb2205efe0362501f06665351449502bf0ca4bd11e15c17025
RLSA-2025:15901
Important: podman security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for podman.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes.
Security Fix(es):
* podman: Podman kube play command may overwrite host files (CVE-2025-9566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
podman-5.4.0-13.el10_0.ppc64le.rpm
1257878a9597714c8d456b490652997a230744ed44a21eb99d2d97ba6c5eca81
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-docker-5.4.0-13.el10_0.noarch.rpm
d244c5274a4dcfb729f6b4dbaa6d690299fe89c525f5c66f69555dfca5fe9963
podman-remote-5.4.0-13.el10_0.ppc64le.rpm
c8fca4ca25859fafb779585d6b9b6051f1d6abcd7d543431ad27d761e717341e
RLSA-2025:16109
Important: firefox security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for firefox.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
* firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527)
* firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532)
* firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528)
* firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537)
* firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536)
* firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
firefox-140.3.0-1.el10_0.ppc64le.rpm
63bfe56a9cd4914ab9bc507868f61f64f736e5f7cb7cf867f6fbbbb95e7f3ee2
RLSA-2025:16157
Important: thunderbird security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for thunderbird.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
* firefox: thunderbird: Sandbox escape due to use-after-free in the Graphics: Canvas2D component (CVE-2025-10527)
* firefox: thunderbird: Incorrect boundary conditions in the JavaScript: GC component (CVE-2025-10532)
* firefox: thunderbird: Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component (CVE-2025-10528)
* firefox: thunderbird: Same-origin policy bypass in the Layout component (CVE-2025-10529)
* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143 (CVE-2025-10537)
* firefox: thunderbird: Information disclosure in the Networking: Cache component (CVE-2025-10536)
* firefox: thunderbird: Integer overflow in the SVG component (CVE-2025-10533)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
thunderbird-140.3.0-1.el10_0.ppc64le.rpm
5a59a27db632234ed2284d741ebebf71b4f6153f01b370a0627c410f3bec9edb
RLSA-2025:16432
Moderate: opentelemetry-collector security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for opentelemetry-collector.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Collector with the supported components for a Rocky Enterprise Software Foundation build of OpenTelemetry
Security Fix(es):
* net/http: Sensitive headers not cleared on cross-origin redirect in net/http (CVE-2025-4673)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-appstream-rpms
opentelemetry-collector-0.127.0-3.el10_0.ppc64le.rpm
061f5f4bdec453241e14489fa6c5ba4d5be27bc2f7cb1611d04e5331971d8291