RLSA-2025:16904
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: cifs: Fix the smbd_response slab to allow usercopy (CVE-2025-38523)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
* kernel: s390/sclp: Fix SCCB present check (CVE-2025-39694)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.37.1.el10_0.ppc64le.rpm
4251c725d694635693c7b0a8dfec3d49d784745eab4e8c931d67e2b8f1aae299
kernel-abi-stablelists-6.12.0-55.37.1.el10_0.noarch.rpm
3fbf24402be38c7ed320f3ae10a186a223678e657e499ba10a16b2f7a5d10c7d
kernel-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
50a1b3adf89d82f686c8a048d67476f1a005c51fb18e0a7302531e02b7622816
kernel-debug-6.12.0-55.37.1.el10_0.ppc64le.rpm
17e7f59fd9334c17a28f7060fff40b1fd82259d58499fdd28c065ea859b0d96e
kernel-debug-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
465f71ba640a6dde54295f9a2b3138ab9e209a828224772d9b1bc44d404c1cbd
kernel-debuginfo-common-ppc64le-6.12.0-55.37.1.el10_0.ppc64le.rpm
65445b669b38342a56d776b6bbf31150cb2d7a50e86b3cf12e91811804d8efac
kernel-debug-modules-6.12.0-55.37.1.el10_0.ppc64le.rpm
bdcc784fd9259efaaacb798a6ede0fb9b793e9f99fe520fdc9b10111a0fbf12c
kernel-debug-modules-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
60aafd9a7bfb5cc58f07f06828765359b0b692cd0c5388a9b394ea31d956bd61
kernel-debug-modules-extra-6.12.0-55.37.1.el10_0.ppc64le.rpm
03974968b63f4a7fa8d18c4cb073265ba1bc4ba5fb89530658ea5c8f74813941
kernel-modules-6.12.0-55.37.1.el10_0.ppc64le.rpm
deb6dcaf579052ff819bc5de7d52b4302239cf3ad328e39d59ead4f23a750931
kernel-modules-core-6.12.0-55.37.1.el10_0.ppc64le.rpm
38bdd097cf76e0a7b811eb9935712fa06d5e1bf4f29249648b9ddff9d2c46d24
kernel-modules-extra-6.12.0-55.37.1.el10_0.ppc64le.rpm
b2ec988e9bbedc1c8ff6f820f50fa7c342441d9969d9954d728d33168d380ef5
kernel-tools-6.12.0-55.37.1.el10_0.ppc64le.rpm
bf6d5424311dfbc27d197feff9a19da8007ee9b4d7ab69b171a342a751acfcec
kernel-tools-libs-6.12.0-55.37.1.el10_0.ppc64le.rpm
937b5364d005d68c25d9662c27ae8a32b84a1931091621f3f82075d481a16cbc
RLBA-2025:6597
Critical:libxml2 bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libxml2-2.12.5-5.el10_0.ppc64le.rpm
edd2b8705e12594c2f24e20a5039dc2f4a6701632d3a9dcb55f33d07f78f9158
python3-libxml2-2.12.5-5.el10_0.ppc64le.rpm
b84281fdb4798d298343fdb0f7f65fe517945d54a0acf261254914c8a975b1a7
RLBA-2025:6470
Critical:rsync bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Critical
An update is available for rsync.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
rsync-3.4.1-2.el10.ppc64le.rpm
091c2ffbb2a7da015a1a208e47d3f69038fb2d6f2406c15880e4fdf40f90831d
RLSA-2025:7510
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: heap buffer over-read in header_gnu_longlink (CVE-2024-57970)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libarchive-3.7.7-2.el10_0.ppc64le.rpm
ea0709b52d5a5f5f96a19f2368d8749fe0e73624e0814984476525f137ad924f
RLSA-2025:7517
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* SQLite: integer overflow in SQLite (CVE-2025-3277)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
sqlite-libs-3.46.1-4.el10_0.ppc64le.rpm
2a771b4844e4224307ebdc690afe2bef509d7bc6996de11b26366ff103e51d4c
RLSA-2025:7512
Moderate: expat security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for expat.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Expat is a C library for parsing XML documents.
Security Fix(es):
* libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
expat-2.7.1-1.el10_0.ppc64le.rpm
31d83d9cb28c9ba1eeacce4da87c5bf1698816738bd241c29bfc25b6d413e679
RLSA-2025:7524
Important: xz security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for xz.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short.
Security Fix(es):
* xz: XZ has a heap-use-after-free bug in threaded .xz decoder (CVE-2025-31115)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
xz-5.6.2-4.el10_0.ppc64le.rpm
1534bdc9d3346e4d7ec168c8985bccf9e2d118508d75199560de3533033aea21
xz-libs-5.6.2-4.el10_0.ppc64le.rpm
35677c0a208d4e901a9bbf3cf51c83350f1d089cfd306f413f289faf57237c81
RLSA-2025:7956
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (CVE-2025-21966)
* kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (CVE-2025-21993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.12.1.el10_0.ppc64le.rpm
8c06f223b8ab5347de53e12f7dd435bdfc1d88260660715d2e030353699b074d
kernel-abi-stablelists-6.12.0-55.12.1.el10_0.noarch.rpm
194eacc688bd06e08d48bfe82957f7a94a7dcc01bf064d883cc248a459358878
kernel-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
d41f7de8f2277361dea5d1b6d83342be7291c2427e78297a335d92e053ded26c
kernel-debug-6.12.0-55.12.1.el10_0.ppc64le.rpm
d1e27faf47b8dd64d2562b6c56c107c390bd3ee6a3cd7a8223a66376c2635adc
kernel-debug-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
f625bf920f724429d8b0c522892aa6354b24af5dc59d004b4b04e438fad59d02
kernel-debuginfo-common-ppc64le-6.12.0-55.12.1.el10_0.ppc64le.rpm
e45ade1b7e53991154023bc677bfbc839c362b47ca33a3f7f97119a35d70127b
kernel-debug-modules-6.12.0-55.12.1.el10_0.ppc64le.rpm
8ab0a0f9bcc067e6ba552878c00b3f2382c45ba4c9968bda7dfd42d68ecbfd2b
kernel-debug-modules-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
ad2491a0dd81ecacd3f7d1132b557330045f20ec6d0fe7991102d59156345c43
kernel-debug-modules-extra-6.12.0-55.12.1.el10_0.ppc64le.rpm
22101102e0187dbcc36e684c9e4a7308c7a5b4aef551857ec8e08d31e13abdc1
kernel-modules-6.12.0-55.12.1.el10_0.ppc64le.rpm
a20522a30bba3a035a748b4354fc9a6812458fe355c115603d8c226b4a6cebb1
kernel-modules-core-6.12.0-55.12.1.el10_0.ppc64le.rpm
662590ea489e50453862a08050930baf126e790a349309e2ec4fe9611fd2b943
kernel-modules-extra-6.12.0-55.12.1.el10_0.ppc64le.rpm
1f100c04f5ea445c7af7030923558c219f4cecd1ece401bf7d30a4730e7e6a26
kernel-tools-6.12.0-55.12.1.el10_0.ppc64le.rpm
f4926bb43324ac529b70780f8f042b0751e62ae55da4aef6b468a46fe04b1512
kernel-tools-libs-6.12.0-55.12.1.el10_0.ppc64le.rpm
ed5d6cdae96f3851283b91d6567a4147830c9f064833f9d64ca6e686ac4f8595
RLSA-2025:8137
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104)
* kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-abi-stablelists-6.12.0-55.13.1.el10_0.noarch.rpm
9e1ce56f9492f7150fa2bb8f79bfcf2e14d1c87c2f91556842d693939abe0a00
RLSA-2025:8374
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.14.1.el10_0.ppc64le.rpm
ce3ba7c7298248b991f11eaa30da242b4456788831fc1271a384ce25532784cc
kernel-abi-stablelists-6.12.0-55.14.1.el10_0.noarch.rpm
32cba9d640a36cc56e8e5efadc78769875cb8af10fc6d38884dc6289cb634396
kernel-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
c5af7ed4a764f847a84aefe428ea5980fca3f35c5651a2ab76a35048c8b06fbb
kernel-debug-6.12.0-55.14.1.el10_0.ppc64le.rpm
0778dbc730378a0dac3e9c8ee509b7606ed1b2f4421674c3d141fac962e61050
kernel-debug-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
4e7d9bea25ab07874b09cc6084fb963b74a296bc1d2eebf00bb996b67c95e63e
kernel-debuginfo-common-ppc64le-6.12.0-55.14.1.el10_0.ppc64le.rpm
97b0a24d4c1058029c0622311919a48e5e8ee1ee4d442a7194ee7b6809604478
kernel-debug-modules-6.12.0-55.14.1.el10_0.ppc64le.rpm
8c7b472c40d144c399fe6628898f4f4d40de79a7ee88017cdb6cae3f366e23e0
kernel-debug-modules-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
3372ce5e2934043d7e742e03bfa30f4c075bc1e21e10fddfcd98c35e5987c79a
kernel-debug-modules-extra-6.12.0-55.14.1.el10_0.ppc64le.rpm
2a2ff873d476f83fbec5b8591aa8325faf57b281856eb9dccebb990dcfc02fa7
kernel-modules-6.12.0-55.14.1.el10_0.ppc64le.rpm
954a61d9b985c0f0d1465debeeab9e0ec97c97a29e52c4d5a6c3b98cfafdc9e3
kernel-modules-core-6.12.0-55.14.1.el10_0.ppc64le.rpm
371d8e2cd1df5dc964b252b6ded6fb9f83c521586e0e0bbdf62abc2cd4d87e03
kernel-modules-extra-6.12.0-55.14.1.el10_0.ppc64le.rpm
9766ff287a481ed6953d77be7a65f95e7f0fa040030b1598be9f43ae660bfae4
kernel-tools-6.12.0-55.14.1.el10_0.ppc64le.rpm
a68697d3d8bf00b10f4c5a26ddd1ade3abc738b38cc97f8243e6b37ac0592f17
kernel-tools-libs-6.12.0-55.14.1.el10_0.ppc64le.rpm
23fdd9f81f488546f86e2f9c0d28ed46028323430fc27ca6fa31419a4819fb28
RLSA-2025:8669
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: discard packets if the transport changes (CVE-2025-21669)
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.16.1.el10_0.ppc64le.rpm
9d8d76ad63334cc454e3ad2ed9bcf4589b14511a7cf5d1a05b460439cd7cadbc
kernel-abi-stablelists-6.12.0-55.16.1.el10_0.noarch.rpm
feaa5a9ee92af48ee3dc8347175890f307d8afb6ddd7158f2553ad79f18db09f
kernel-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
847ab134478514af2246b0bb4f97f3b02df32741cb125207f2634684f031f569
kernel-debug-6.12.0-55.16.1.el10_0.ppc64le.rpm
aef3a58ae6b6ceceff5bbe32c96209243cad32e1c9fdb1feaf396d4cf9243fe6
kernel-debug-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
eed65492f3972dd0df5884ec47e73fe0264b4746394f281a68f5ae4ba13d4fae
kernel-debuginfo-common-ppc64le-6.12.0-55.16.1.el10_0.ppc64le.rpm
e0ab4cdcf81fc6f1b06ed98b5c36a8a3dec9ffdba7c4b137cc0b0ea6b85d5bc0
kernel-debug-modules-6.12.0-55.16.1.el10_0.ppc64le.rpm
d8bbffd27f54d0daf0bf542ec2cb975c7ffc57910b60ed88742803efe65687d5
kernel-debug-modules-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
62ae058731139eafbde3dfee4111d63308503f1634aab55c8ffbce9c50e875b5
kernel-debug-modules-extra-6.12.0-55.16.1.el10_0.ppc64le.rpm
089405183100ccc66b75d3f258feeea2507113c9ee57cdeecab25c969e71a4fe
kernel-modules-6.12.0-55.16.1.el10_0.ppc64le.rpm
de1402291113d3659c9b945d26698f5e5d5002f2d3da91b126bedc97f002b9fa
kernel-modules-core-6.12.0-55.16.1.el10_0.ppc64le.rpm
e3ce2836dc9c8863d5ef4e318c784a048163fab9bc4583f57f6179217cf944ff
kernel-modules-extra-6.12.0-55.16.1.el10_0.ppc64le.rpm
9c49089740f00177dc669203e260ebccea74d54bf08e8ff63a92f44a984a7902
kernel-tools-6.12.0-55.16.1.el10_0.ppc64le.rpm
6f22f2f3e9fc9df62c465d63497fab248ac3bddf1fdb504d676d36ae98f8ac33
kernel-tools-libs-6.12.0-55.16.1.el10_0.ppc64le.rpm
816affe72c16e608a05372beb4b62718e43dedb0c90d05a53a61115db08b7030
RLSA-2025:9079
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: keys: Fix UAF in key_put() (CVE-2025-21893)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.17.1.el10_0.ppc64le.rpm
26dc6c08034041e32fc40f044760e5210c76067de518eb2ead8c0c4c446e018a
kernel-abi-stablelists-6.12.0-55.17.1.el10_0.noarch.rpm
0aa4547c865b2d2b94d16eb85e3a3639b6bc80b226b5ccafa29e73486dba56d4
kernel-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
cc12772dd502ae1e237c7724d224b9d39be4a5f66361cd4a6b9af03cb520d47d
kernel-debug-6.12.0-55.17.1.el10_0.ppc64le.rpm
2c681ab84cc499ec8f499d6ab0434c81925ea2cc58595bcc722006ecb5a44747
kernel-debug-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
f91d0622ba1c383c7c4887875247f81529f87f9e2b616d636ab2d81e1ac5fb18
kernel-debuginfo-common-ppc64le-6.12.0-55.17.1.el10_0.ppc64le.rpm
a4cfa27a62f6b85d595cce062311c34cca2326f2211eac8927d27f13c85d7944
kernel-debug-modules-6.12.0-55.17.1.el10_0.ppc64le.rpm
19c09c8fd8850f141d72c92e9f8ebd450f7b44e317e8cbdfec8bef67ce630b13
kernel-debug-modules-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
b00d955edba69b86c1171cff56781fabb87a16900cb6c76cdd1faf8b23289097
kernel-debug-modules-extra-6.12.0-55.17.1.el10_0.ppc64le.rpm
dc5901cab867067e786d069ddeb20e7f7ccd6bc05b9b53ee393f1b13e52c7701
kernel-modules-6.12.0-55.17.1.el10_0.ppc64le.rpm
3941ed3669a79d2f208ff3cafc8be77eac16217786751bce1dbe303568640d0f
kernel-modules-core-6.12.0-55.17.1.el10_0.ppc64le.rpm
28a557fea259e55dfd08360493c06d2fda2310849cedc1fdde2aba67dbbe1fc2
kernel-modules-extra-6.12.0-55.17.1.el10_0.ppc64le.rpm
ccacf4af1c8e8ffac7527b3577cf7a4d5b01c42919cabb9830561a293a2e1313
kernel-tools-6.12.0-55.17.1.el10_0.ppc64le.rpm
908e1083917105545cf5f8ae0fd565708c2bfbb90fa183ef7f111796708ded72
kernel-tools-libs-6.12.0-55.17.1.el10_0.ppc64le.rpm
5a1812f6f3e4166a686e09e2e583e65031c208368f24ad9a9aac8acbb0083c17
RLSA-2025:9178
Important: kea security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Loading a malicious hook library can lead to local privilege escalation (CVE-2025-32801)
* kea: Insecure handling of file paths allows multiple local attacks (CVE-2025-32802)
* kea: Insecure file permissions can result in confidential information leakage (CVE-2025-32803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kea-2.6.3-1.el10_0.ppc64le.rpm
4560d36698231689af6a3543dc465a134f15ee404c2855657d14d2c22d7cb905
kea-libs-2.6.3-1.el10_0.ppc64le.rpm
eab9a65071684579b6efe894842a13687bd44b3db288f8004f04835688b5f253
RLSA-2025:9348
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.18.1.el10_0.ppc64le.rpm
5d1cc82d596e9cf63374e181bb9a73a1c13e7c6103e5759430dc078fdc03ac9f
kernel-abi-stablelists-6.12.0-55.18.1.el10_0.noarch.rpm
e063a9934075cdf92f2288d5e3044c1ac2fe2073dffca6cf00b75397526e25b5
kernel-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
0672e3e4f499336c1cbb4456dd7f0f2ffb32848a21e08bbabca76b76d5d655c3
kernel-debug-6.12.0-55.18.1.el10_0.ppc64le.rpm
27061f6fb34bcba4f2b8daea2b414d0647c9ed53ab2923f80dd562e4c5d02a33
kernel-debug-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
4104390916cba6d29152357254902f7d3269e38b99cd0d3bbbb9b2977dc3fcdc
kernel-debuginfo-common-ppc64le-6.12.0-55.18.1.el10_0.ppc64le.rpm
d49b5ed2aab238d59eae95f054e53f9e446a3532796e2d90049bd4d8b1bf1956
kernel-debug-modules-6.12.0-55.18.1.el10_0.ppc64le.rpm
5e0f8d44bce9d5f9ce02f65d40639b2a03430c94770ced44a71216541e4b4d90
kernel-debug-modules-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
8ad5b7f11004834bb6b8f52c23e891648ff5a08a9bcf123d5cda2c2d61fff6b5
kernel-debug-modules-extra-6.12.0-55.18.1.el10_0.ppc64le.rpm
0f2e6262d35f09e01aa0c848c4e4f8bac958698455ccd47c0e1f83bc3ee8bf08
kernel-modules-6.12.0-55.18.1.el10_0.ppc64le.rpm
4c2626874cd5bc84962b81e8498f898b3fb99fd95fd75af3d281985545ae1fd2
kernel-modules-core-6.12.0-55.18.1.el10_0.ppc64le.rpm
e311c1dd90310083cc53dbdc26d99afa1db7747cf1df939e939f61cca2cda3ff
kernel-modules-extra-6.12.0-55.18.1.el10_0.ppc64le.rpm
2ddfd35ffedea932fb8fb654b19c8ada543a83dc62dd5d3e19082f2f63601c30
kernel-tools-6.12.0-55.18.1.el10_0.ppc64le.rpm
a98fa5bb370fe3b42a0882f97cd7cd312d8de3a002217952a5620a85d412ea10
kernel-tools-libs-6.12.0-55.18.1.el10_0.ppc64le.rpm
fbd29667331b2779af65a23d645de179993c8e545b5b861f4caab5a566af9ae1
RLSA-2025:9418
Moderate: krb5 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for krb5.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC).
Security Fix(es):
* krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
krb5-libs-1.21.3-8.el10_0.ppc64le.rpm
a623ad6758163e68cc4829fb55c553cb82c1dacae57a70bb8ebf915bac863057
krb5-pkinit-1.21.3-8.el10_0.ppc64le.rpm
0cd2dc777efae59b6dd283ec8c71baca3cb79d0a67f1dd83858bdb475e3800da
krb5-server-1.21.3-8.el10_0.ppc64le.rpm
8b013b851cd55fff76c3d5a9c05608fe0b1f2bfebedb5bcaa2fca535ae546242
krb5-server-ldap-1.21.3-8.el10_0.ppc64le.rpm
4da3f09a31abe2578f1a95a3ad6c38f7445b4560c71fddae3e9f6aea28e74f02
krb5-workstation-1.21.3-8.el10_0.ppc64le.rpm
72c1a168531268de790e8efc6f46fd785bad4f9b188ba4391cc222204b50b262
libkadm5-1.21.3-8.el10_0.ppc64le.rpm
085514d23b97d45f69666471574cdc5d4bbd1ed2cf56c9364c9e578357978376
RLSA-2025:9420
Moderate: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Buffer Overflow vulnerability in libarchive (CVE-2025-25724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libarchive-3.7.7-3.el10_0.ppc64le.rpm
63746cccf6719cd5c7d60813903cd49fbdab0005f374ce3c889ad7e1193fc0ec
RLSA-2025:10140
Important: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Tarfile extracts filtered members when errorlevel=0 (CVE-2025-4435)
* cpython: Bypass extraction filter to modify file metadata outside extraction directory (CVE-2024-12718)
* cpython: Extraction filter bypass for linking outside extraction directory (CVE-2025-4330)
* python: cpython: Arbitrary writes via tarfile realpath overflow (CVE-2025-4517)
* cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory (CVE-2025-4138)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
python3-3.12.9-2.el10_0.2.ppc64le.rpm
a1d7a1a03cc5167b2a792862bb80e8bbdb617d35285f95acaebc2c598bf3cb33
python3-libs-3.12.9-2.el10_0.2.ppc64le.rpm
0c8161ff47384e15c1038a6f4cce29daca84f00608d2f06dd2417c6f4c07008b
RLSA-2025:10371
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.20.1.el10_0.ppc64le.rpm
89a7fdb188b27d79f720a061e9ada94f4affb6bfbcc4c7170837a679fe1d141b
kernel-abi-stablelists-6.12.0-55.20.1.el10_0.noarch.rpm
7f0f719d07cae7c95661ea18298fda995d430686e6bbc75d3c2c62e2d30fb670
kernel-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
9c7f468b2dd6b616dc79915e66d8389200dd80659aed36c0451893777c8faf56
kernel-debug-6.12.0-55.20.1.el10_0.ppc64le.rpm
111a0f65db3ff16a62307c33fea7cefdfbd735d4072093d3d1b2ca37ae3d8786
kernel-debug-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
703f4dd3ffe18e753d2aea80368683acacd839428276302f865c73426645e322
kernel-debuginfo-common-ppc64le-6.12.0-55.20.1.el10_0.ppc64le.rpm
286b9c6afb51bc6a3026e976c8bf55b4606d9b10a17b0405e756e74d8c7ec65c
kernel-debug-modules-6.12.0-55.20.1.el10_0.ppc64le.rpm
f6fc185d269415a5fa3144bee7a06785b27b56e46f26ae7721a1a14e95cda7c3
kernel-debug-modules-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
056ea33839a98488339ef4d31c9615a1a4f46bc778b3cfb8576d00264e40fa6d
kernel-debug-modules-extra-6.12.0-55.20.1.el10_0.ppc64le.rpm
7193185b54b49a6800072e75a2e9b1eeca54708cb339b8536668a488bb57983b
kernel-modules-6.12.0-55.20.1.el10_0.ppc64le.rpm
7ea8e5916fa4632595b9c600d58a70d9077313e007de300ce37f9440cb7ff9c9
kernel-modules-core-6.12.0-55.20.1.el10_0.ppc64le.rpm
391e5165800fd8563068487d6da05b812714bbaa4597fc753563edfad1f82592
kernel-modules-extra-6.12.0-55.20.1.el10_0.ppc64le.rpm
aace55210cda2ec05d0160b80d0de913774e5ee7ecd11a3c9f5e8e196313247f
kernel-tools-6.12.0-55.20.1.el10_0.ppc64le.rpm
87cc48f1b62b9e45e6a56aa8205ab8e7bebe18b2b93d40d1a96066b7297e80e7
kernel-tools-libs-6.12.0-55.20.1.el10_0.ppc64le.rpm
4e7793874221859a0ad95d8f5e70399230d8236d3641d2a0188b28b956651f7f
RLSA-2025:10630
Important: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)
* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)
* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)
* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libxml2-2.12.5-7.el10_0.ppc64le.rpm
d8d429f506ac5fde52608f3cf62bfef95a8f07faa3c14143765c68bb67a200c9
python3-libxml2-2.12.5-7.el10_0.ppc64le.rpm
91e575349a63c47779233fcf0fa0767b61b6673b6b8cc924b0dff8492f09fc2f
RLSA-2025:10854
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: exfat: fix random stack corruption after get_block (CVE-2025-22036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.21.1.el10_0.ppc64le.rpm
e5684c47f9156fa82086d9448967b2bb99a4918265afed65e60914013b96147d
kernel-abi-stablelists-6.12.0-55.21.1.el10_0.noarch.rpm
1fc7cd85030ce5b1aef35bae014a586162cce5c776157a0e8eddef6f2be2dbd7
kernel-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
6a96caec8819ab79b552221cf65c5d7e3b3cac39ab4065943ba141c4fb5554bb
kernel-debug-6.12.0-55.21.1.el10_0.ppc64le.rpm
a5846e8e0c835bb8f921f23da9caf736bce7ae5b3e924b20fbef9b7699561891
kernel-debug-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
99a3e45a0b537d90760b6d3d2c10edf5562366c33231282a1c0cbdd01a1068fb
kernel-debuginfo-common-ppc64le-6.12.0-55.21.1.el10_0.ppc64le.rpm
7a3009745418428f854f0de388a056bae6bd3dd4a707f7758d33b134f777f04c
kernel-debug-modules-6.12.0-55.21.1.el10_0.ppc64le.rpm
d33e164a920d8d4991437315ec2525fda98c87dc5114af8b9b4d084a013b6d6f
kernel-debug-modules-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
3b3f188cc206b06f1f9e5fb7037cb5cde63799561953a151eb5990d6878c946a
kernel-debug-modules-extra-6.12.0-55.21.1.el10_0.ppc64le.rpm
f25b0a6675031fabacfcb571de2eccad72e5bd22c6a46598045dfebd94fca47f
kernel-modules-6.12.0-55.21.1.el10_0.ppc64le.rpm
0e04f35f8da2a3fd8842f0f88cc4e48a276e37efe31e131fb5321e95516ec317
kernel-modules-core-6.12.0-55.21.1.el10_0.ppc64le.rpm
4c60debc6f030b3ad503e99574d92e421403fbcdfe24b69e3979347d32a5ae2d
kernel-modules-extra-6.12.0-55.21.1.el10_0.ppc64le.rpm
52eee8f65aeae13fcfd8d7e3948f4dea2c1d55463884b1605ed518ac3b197e3f
kernel-tools-6.12.0-55.21.1.el10_0.ppc64le.rpm
a772507c955df23ee2fb9dae398375916ea5c137f2e3c3cd581806fbde283103
kernel-tools-libs-6.12.0-55.21.1.el10_0.ppc64le.rpm
85480492843d84d6f802ad5ec1f0d82079d4e47473d206640010b9bae7375e98
RLSA-2025:10855
Moderate: glib2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glib2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Security Fix(es):
* glib: buffer overflow in set_connect_msg() (CVE-2024-52533)
* glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
glib2-2.80.4-4.el10_0.6.ppc64le.rpm
88f58fe793b1bba133b0396a2e197f4c257ff2c77205f92d7fc5ae052b8f7d9e
RLSA-2025:11066
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Vector register overwrite bug in glibc (CVE-2025-5702)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
glibc-2.39-43.el10_0.ppc64le.rpm
d971d9307923deabb39ade17fb59f1fb707510c4a6a9f4599529647e7d59d576
glibc-all-langpacks-2.39-43.el10_0.ppc64le.rpm
7f336711c3defb81ae09b44470cf4d9eff41b8b784d0a8c9f1e9f3952ee5ad26
glibc-common-2.39-43.el10_0.ppc64le.rpm
d8bf9ad4e9fccc7e65a150cffc274f85b7486038501562118c400dffd9622bbc
glibc-gconv-extra-2.39-43.el10_0.ppc64le.rpm
25f7e2a4918874edf70ae5b40d9e139f757ebbc6245094bd9c593869a758e609
glibc-langpack-aa-2.39-43.el10_0.ppc64le.rpm
ff8494eea85c37d06e3890294bbdf9323e8c8f286332b8445c5c17e09cc3dffb
glibc-langpack-af-2.39-43.el10_0.ppc64le.rpm
34b650baa1591e9e3d60bd329d4813be518814ed770a4769522ba734c4b80d88
glibc-langpack-agr-2.39-43.el10_0.ppc64le.rpm
27da02048504c76462e0105b7d8711768003889d1f4e1302aa98f4f015ef465e
glibc-langpack-ak-2.39-43.el10_0.ppc64le.rpm
3523e6e16e7842abdb92747e0b92ff6fd50fb3021184972e6f0e7cf29863af27
glibc-langpack-am-2.39-43.el10_0.ppc64le.rpm
077cae1cdd556e5665a8703aa661943aa2279c005c6e06e579ca171cd3fafb52
glibc-langpack-an-2.39-43.el10_0.ppc64le.rpm
b41ab718663a8917f6d822eaba6ee5e51644ed757d4fa482987cf648fb6c04b0
glibc-langpack-anp-2.39-43.el10_0.ppc64le.rpm
01c3d448b621824a12063be4aa91dadef48eea1371ef78b23bcfb7146d08f3c9
glibc-langpack-ar-2.39-43.el10_0.ppc64le.rpm
a20d81a59f625c60312ad287dc74f8e67ef3110fd5ec439800566b86e5bf07e8
glibc-langpack-as-2.39-43.el10_0.ppc64le.rpm
be79e234ff1f05c1fa636367ea29efc8d84cbb0245c3e41e71c3ab65eec6c074
glibc-langpack-ast-2.39-43.el10_0.ppc64le.rpm
0c7b95a28a4b812f1de0e36b4e26957f8e0d0a9ff6eaebf6235326e00b76c008
glibc-langpack-ayc-2.39-43.el10_0.ppc64le.rpm
dc0b3ac55a0a04da9192231e29032075dec820936352a2d9a1fb26f8f4578365
glibc-langpack-az-2.39-43.el10_0.ppc64le.rpm
0a80febfb4c62ff9918db016edbbff65d4c5abe8a5d70a0caa1c140bdb635ffb
glibc-langpack-be-2.39-43.el10_0.ppc64le.rpm
b499f4bfcca5df075c6f993dd5b005e74f54c16c5cfdde58f8d7ad175ce4ddac
glibc-langpack-bem-2.39-43.el10_0.ppc64le.rpm
422a548e8c99343e9f6bdb0a53563c6c4f5d93d63a176aa5dacb2c81a1609904
glibc-langpack-ber-2.39-43.el10_0.ppc64le.rpm
bf0c97f801baf464c3336ea46431cbf13ee989b5e33a1ed0a7ddab444e38c82d
glibc-langpack-bg-2.39-43.el10_0.ppc64le.rpm
6f05c4c5adc93b5fc6dbf874e04a7d63e0a870848a078fa89a29cb9a39280ca2
glibc-langpack-bhb-2.39-43.el10_0.ppc64le.rpm
b2b428d8d9ff3d4f1b64c12d68ddd28fc450a947750dcfae1070097ff88b3620
glibc-langpack-bho-2.39-43.el10_0.ppc64le.rpm
e3da3202d32fef7632a8bb16590003d287c2dbd99c4efe4495e97d1cb942a9d6
glibc-langpack-bi-2.39-43.el10_0.ppc64le.rpm
0e722e6aae30e1a2a14ad1a05de8dc74c3c3857b24b331348441032b7625fc4f
glibc-langpack-bn-2.39-43.el10_0.ppc64le.rpm
134f8a885a7df47c946c6d18d25e0979743c1b2b69fa42b397d1f14a6a56a002
glibc-langpack-bo-2.39-43.el10_0.ppc64le.rpm
a0141655e24b80bf64de164aca76e3fc5bbc030e1ed57bdfede3282fdedd0d3c
glibc-langpack-br-2.39-43.el10_0.ppc64le.rpm
d07aeb65db523980174498d37fee4ef614a914e8087bf2a41b5cd9c4cf00b2b3
glibc-langpack-brx-2.39-43.el10_0.ppc64le.rpm
ddf4ee04238e7381639f86e0d268b68adaf183b27839f6e867871cb4143c99a4
glibc-langpack-bs-2.39-43.el10_0.ppc64le.rpm
4f607a429a908f71527e4e2d3538ca222bb73a8e41c44bfa51922662d418905a
glibc-langpack-byn-2.39-43.el10_0.ppc64le.rpm
43b3bbc404a2b9f9c37eddf5e1b2976fc1bf21101497804eee6b6054eca6f9ee
glibc-langpack-ca-2.39-43.el10_0.ppc64le.rpm
d1c7709c188977881037f319e12704a37de49624e8bf2b38b757356cdbffdd53
glibc-langpack-ce-2.39-43.el10_0.ppc64le.rpm
4e1ab9a7b6bd37a8d6265cca9f2bff5f838d551d5a4c34b505da3cf8b5eb4578
glibc-langpack-chr-2.39-43.el10_0.ppc64le.rpm
072a6f74b6abc17e7e8d2b3ae726cf459affdbe3322a983124597d4c0146ab88
glibc-langpack-ckb-2.39-43.el10_0.ppc64le.rpm
6c04bca039754548d6c2312e5dc763f14b3d8b0d2539e7b601a24fc0bbd3da50
glibc-langpack-cmn-2.39-43.el10_0.ppc64le.rpm
e2aac1044f58a39afbdd50baeef1e6644124f9fc5561a4d2b379c09876ec963c
glibc-langpack-crh-2.39-43.el10_0.ppc64le.rpm
65a1b2dc5aa3a5d27087584ad498ff337b080e195c5609708815178abdfeedfb
glibc-langpack-cs-2.39-43.el10_0.ppc64le.rpm
a71954c72a2c75637b0952370abea04f651cc302618c39e927f2487de4bcd699
glibc-langpack-csb-2.39-43.el10_0.ppc64le.rpm
d5ec738facdd7279211ee12191856cf31d22e3583f019603d84a766d185b8db5
glibc-langpack-cv-2.39-43.el10_0.ppc64le.rpm
b8a6734bc0d637603e2beb94357ffb2133fa6e3f59a46f9022c5d04aee2dd7ee
glibc-langpack-cy-2.39-43.el10_0.ppc64le.rpm
6636b6ce0316453bca7964b2c3a629f4340aa48894c5b716a293625d2fa2bbfe
glibc-langpack-da-2.39-43.el10_0.ppc64le.rpm
cfbae7f44bd201d5f89c24d8aa72cd41012c2dee329d240533bb312e2f85c5ea
glibc-langpack-de-2.39-43.el10_0.ppc64le.rpm
80c448e76a706ed9c1c8a2ae2b712fc830e6460d5845003a7ce004cd0db461b7
glibc-langpack-doi-2.39-43.el10_0.ppc64le.rpm
d4033718aed7a11323c156f7cf2123406c7e6ebdd80c0890e79f98c0ca9dd86e
glibc-langpack-dsb-2.39-43.el10_0.ppc64le.rpm
1ccc70900f6622005522b77a5baf675f6f687cce9e613039628755f10bd9d612
glibc-langpack-dv-2.39-43.el10_0.ppc64le.rpm
55d5fbeb0be9f873457f516f290551b0bbbe233f60075b578ee67a360f02074f
glibc-langpack-dz-2.39-43.el10_0.ppc64le.rpm
bd0925d4e501f329d15812768d0b39e26949a35dd0bb6d0740729acdc08bec49
glibc-langpack-el-2.39-43.el10_0.ppc64le.rpm
59a03f40132b8d7da45d9436811e09d26ef6c16e759f646992f05c80dacd3874
glibc-langpack-en-2.39-43.el10_0.ppc64le.rpm
cbf94d69c12eb14838d937e50e7727252f141eb3999088d31029c4a6963bb729
glibc-langpack-eo-2.39-43.el10_0.ppc64le.rpm
2d860c0e605f907cf9d6b34cc48adabcfb0f99df66ff55025fe7bf4e0fd27e91
glibc-langpack-es-2.39-43.el10_0.ppc64le.rpm
bf02540dc9029a9d70c2510e6b6c999a7deda5be3573a39aaf04b3dec85b2c7b
glibc-langpack-et-2.39-43.el10_0.ppc64le.rpm
8a15df0cd70e90525bdfb56049233a37debed51a0d6c7b8ef718f184f6a0e413
glibc-langpack-eu-2.39-43.el10_0.ppc64le.rpm
e20428fb06c96de2d7051fc45c232fd2543cbdaf2a40115501763a8839957789
glibc-langpack-fa-2.39-43.el10_0.ppc64le.rpm
5dccda4f0f024a5076a5ba6c900d0290df33db0c1adbd5e346eff31c3a79baf2
glibc-langpack-ff-2.39-43.el10_0.ppc64le.rpm
d23b3aee3edb9fdd113a201526e4e825f808d857c8046fd87fd5fb92ffcf5907
glibc-langpack-fi-2.39-43.el10_0.ppc64le.rpm
34542ba588e2294e947c17e39f010d6c1936c6d91079d6231796788b3d15da1e
glibc-langpack-fil-2.39-43.el10_0.ppc64le.rpm
f38269479454b6e2fc5d2f8b3fa22dc8cadf32bd58118948c65d8dc4cd8cac8b
glibc-langpack-fo-2.39-43.el10_0.ppc64le.rpm
0afef66ba0468c9e2a268579307f8aecb08cdbe4910d4594469ff71942a385a2
glibc-langpack-fr-2.39-43.el10_0.ppc64le.rpm
47b75671d9f3e3a4d2c60f07f14230846c72d72feb77836c8c33fe1811f9e48e
glibc-langpack-fur-2.39-43.el10_0.ppc64le.rpm
241f0e36bad90a08256d4e821446fc30a01a0f670e34d012199fd54829ce8045
glibc-langpack-fy-2.39-43.el10_0.ppc64le.rpm
9dd765553f28cbfc091f29b54fa5226ac281b0638605a48f04d88d436893ea77
glibc-langpack-ga-2.39-43.el10_0.ppc64le.rpm
03350ce2dc2bc2b05cc77f537c1012dab9e9bc8d601d5de03e0ba488dbd6b3cf
glibc-langpack-gbm-2.39-43.el10_0.ppc64le.rpm
3fecc54bdd2e778b332885666a26a8b56cc5e7739f9f52ff1a6a030b97d319d0
glibc-langpack-gd-2.39-43.el10_0.ppc64le.rpm
667c707fbd545bd6f91aa89308359135dc3605a32dba49a3c93f7e7655f80f99
glibc-langpack-gez-2.39-43.el10_0.ppc64le.rpm
718915a44110e716a2fd145f8b2d6bec2ad3c48e1a9495096822fefc2637b16b
glibc-langpack-gl-2.39-43.el10_0.ppc64le.rpm
b7b77c2d47b6f4544c814b61c0d1502a0b511b0b3952a82426897873732cb278
glibc-langpack-gu-2.39-43.el10_0.ppc64le.rpm
dc3af3a6e723de69d3f88c46e8f34da5281540c272f7b45d1cd66c6054065465
glibc-langpack-gv-2.39-43.el10_0.ppc64le.rpm
87eb9e099ed80af56dda7834f65797a1ca0fc470ac5cde680e1bdba4ecba4150
glibc-langpack-ha-2.39-43.el10_0.ppc64le.rpm
ca50e498a116ccc4da2a0279fbcfed2ad78227cacb040e8f06ab95aa0d2d86ad
glibc-langpack-hak-2.39-43.el10_0.ppc64le.rpm
b0f923f4f4fbb254229dca23386583783c3ee635a65200b8aae4cd951f7aed0b
glibc-langpack-he-2.39-43.el10_0.ppc64le.rpm
10f703ddc80559c592cce87e08ae2bdc4b6f4c46d58477c0f58985b3d348093a
glibc-langpack-hi-2.39-43.el10_0.ppc64le.rpm
233f5336b04d68e0f74f0d6ef50d63ee5db7b6ff42af70db04ca4cf141a14bea
glibc-langpack-hif-2.39-43.el10_0.ppc64le.rpm
bc0edcf08847d3d4ed788b4cc5b16a76d3b0110c0fe5f79c8d5242f15885b0a3
glibc-langpack-hne-2.39-43.el10_0.ppc64le.rpm
6797c441b84fa388787d6c1e5372e8f0d6db3620390ab79097fb8d49f5513410
glibc-langpack-hr-2.39-43.el10_0.ppc64le.rpm
f4a30903d8dfbf063ecf224a91c6537ae3cc0b3f9d7725b64d10e61c3251aa5e
glibc-langpack-hsb-2.39-43.el10_0.ppc64le.rpm
5cbe0cfd560168447b8bec8ef8a0b9e084cfa30594aaf816871882108e540536
glibc-langpack-ht-2.39-43.el10_0.ppc64le.rpm
fcfce3aae6663f7cb6abf336344d65b02e29d0c45afe72e826bbf49b7f0e4a67
glibc-langpack-hu-2.39-43.el10_0.ppc64le.rpm
ed672351557af3c986fb218cb74985f2dc010ff096b2eeb20976e4d40806da0b
glibc-langpack-hy-2.39-43.el10_0.ppc64le.rpm
9bb029312248e926f4785b3c58c9edff59ff7ade977b7ea13e836f5dc58de865
glibc-langpack-ia-2.39-43.el10_0.ppc64le.rpm
1d0e3ca9eac17e54e3f80dc3591117936eb189dc40022e53be9519732fa00249
glibc-langpack-id-2.39-43.el10_0.ppc64le.rpm
b600bd6a28c89853f8c6fa26afa4f9fae2f5479038d5905e301761090beb9223
glibc-langpack-ig-2.39-43.el10_0.ppc64le.rpm
758549292bc32948acf8677b236e8731053efddc4769368190fe91c16fee1f11
glibc-langpack-ik-2.39-43.el10_0.ppc64le.rpm
2e9cf8d536308c19bae4d64364d03c5ab1c83acd3be5b02afcae8748d2f9cb43
glibc-langpack-is-2.39-43.el10_0.ppc64le.rpm
da7febb295ba2f1febd3aed3818aca00b0685ffd6a0971bf82c3e72a342d9048
glibc-langpack-it-2.39-43.el10_0.ppc64le.rpm
3e1234d4d3bafcc69460aebf03358b7c315ff03784a5c01c3645b0b711edeae9
glibc-langpack-iu-2.39-43.el10_0.ppc64le.rpm
f2fb977c5fbce386b6cafbfb0a560bfe7f1d7d1ff7cab85df9d3bf4bee89600f
glibc-langpack-ja-2.39-43.el10_0.ppc64le.rpm
885230a4634dba8469f43df409a5411d2ab679da0f6bb0a9c871420e6986007f
glibc-langpack-ka-2.39-43.el10_0.ppc64le.rpm
2f7ee5d9d820b295228ca71e180863b989024059f1f83f6fbf6483e3c6b3c130
glibc-langpack-kab-2.39-43.el10_0.ppc64le.rpm
d0aef3accebca09a147d907f489c293f62f060d958b748fb8e262d73b9b530cd
glibc-langpack-kk-2.39-43.el10_0.ppc64le.rpm
835ce38ac3ba52e8ed75d489cfc9f210793ac77647d25cf715fb6080cd79c20f
glibc-langpack-kl-2.39-43.el10_0.ppc64le.rpm
38ff94cec190ee638c1938a973ec9159e9204e10b01b37e739dba3cc30b1ad1c
glibc-langpack-km-2.39-43.el10_0.ppc64le.rpm
e74804a07e339aa0261a82c8e9372da7b4d3747823a6f5f0261748ce3f89ce27
glibc-langpack-kn-2.39-43.el10_0.ppc64le.rpm
c35e3419d1ec01354048d60ae1397fa9490a65aa0e992b13fb227045fd0f5412
glibc-langpack-ko-2.39-43.el10_0.ppc64le.rpm
2687c9080ec40f749c79550f3ef007fde741945fea4ddf9a0311c6cc7861172b
glibc-langpack-kok-2.39-43.el10_0.ppc64le.rpm
584345d477fab0e11d6ab5eb04c2182d78866e179acc6696edf9559122ed9025
glibc-langpack-ks-2.39-43.el10_0.ppc64le.rpm
bf544d81dc6cbb16b93674a71f792ac85961d4a8312391c847b763c8ab54595c
glibc-langpack-ku-2.39-43.el10_0.ppc64le.rpm
73d429a0dca9f8df9a2a5a7cc9431481f1c7b5f3375b1f6573143473f8c4a959
glibc-langpack-kv-2.39-43.el10_0.ppc64le.rpm
b1be58c563af3f531788def25b11d9654a9c049c61b1bffadfcabf35bf574b1a
glibc-langpack-kw-2.39-43.el10_0.ppc64le.rpm
124902cfdb448ea93537440b0f47f67e751b4e64f9e798162afb66cde23f1db2
glibc-langpack-ky-2.39-43.el10_0.ppc64le.rpm
9ed0b494a3e3228038f276848c0702429ac33b2d77f1f47d125211b48c43011f
glibc-langpack-lb-2.39-43.el10_0.ppc64le.rpm
c6c5f035df02d3693118fc07d3ab232c056fd802c341c6b41a7ac567f3aa7a15
glibc-langpack-lg-2.39-43.el10_0.ppc64le.rpm
e89672dff68baeb57fe66a362037315e1a946bb2bbfa8cb3b8060bd29fedab31
glibc-langpack-li-2.39-43.el10_0.ppc64le.rpm
538af41ee0ab3f85ee901651866eb8fcd3d13f9a984430d2b9bfd1c8b9731939
glibc-langpack-lij-2.39-43.el10_0.ppc64le.rpm
24e7fcfff0121808c6e4c46a2a41f29a0d5f078b47d27e42133724c86a5586e5
glibc-langpack-ln-2.39-43.el10_0.ppc64le.rpm
df56bc5a99552fd03760c489fa37aaf8c209c14f38a8d39203478948c9fcf81a
glibc-langpack-lo-2.39-43.el10_0.ppc64le.rpm
0535f43be59f28370f77753dde19a6d45df7d8a2a2209de338f02c2cbda2bbb2
glibc-langpack-lt-2.39-43.el10_0.ppc64le.rpm
41d8b186577a192c52905362fd0be918d166a526cd0612d30c74300d6b4757f3
glibc-langpack-lv-2.39-43.el10_0.ppc64le.rpm
1e11d522eab7541fd7c7892eb75e1ae2c0f9c17ff904121506c318b420845069
glibc-langpack-lzh-2.39-43.el10_0.ppc64le.rpm
6e4c19a4c6e49e827a3d1081dd57853dc8f6755e293ca6366e81ad802492f99f
glibc-langpack-mag-2.39-43.el10_0.ppc64le.rpm
433168e2ca73b0252dec19edccefa64a55a080ba43dd27549b2c858e601940b1
glibc-langpack-mai-2.39-43.el10_0.ppc64le.rpm
ea44a3549a974170278d41cfd0a625e8c1bc1f794a6b820a304dcbbdd2d0a764
glibc-langpack-mfe-2.39-43.el10_0.ppc64le.rpm
86de35b94c80b2efbd129fd152dfdef031975ac7f9d707b558684454e03834b9
glibc-langpack-mg-2.39-43.el10_0.ppc64le.rpm
3991a5103d9e80e99658b0197d9a9c425bf4c27516564b1392b01685f66b4aba
glibc-langpack-mhr-2.39-43.el10_0.ppc64le.rpm
2e7c0ac9a46c480ead1dfd8b917b54beaa586f5d63f9e69ee47e1b402ffa8403
glibc-langpack-mi-2.39-43.el10_0.ppc64le.rpm
09e53a358ff798808794db0b69533e41d110226ea1f0994cd49c462af99aa8b5
glibc-langpack-miq-2.39-43.el10_0.ppc64le.rpm
a0d717abd6e183475ad60d6eed65829ee892e6d57404ebcbd3c2ba2e28982aa9
glibc-langpack-mjw-2.39-43.el10_0.ppc64le.rpm
c14fadf25c316769531ea026af27e504f2f709f739135850fb3d4069620d7b53
glibc-langpack-mk-2.39-43.el10_0.ppc64le.rpm
d6f2ce5054d90386f1cc5bd6885cc3eb028bab2673c01376eaf174a20098926e
glibc-langpack-ml-2.39-43.el10_0.ppc64le.rpm
b2f5d32b780610314139f6020a4f051d9dc65c70d80d879ecfa8f49176cfa112
glibc-langpack-mn-2.39-43.el10_0.ppc64le.rpm
99ab6b16cf2086c9b2ce95acf9fb33a7470a477dfcc68ea2f5383b0c27c15040
glibc-langpack-mni-2.39-43.el10_0.ppc64le.rpm
a131aea520cd07a29e752aa2b9a5c83ca8659df463afd34e19ea714ce52a2c14
glibc-langpack-mnw-2.39-43.el10_0.ppc64le.rpm
0fdb8a96741ab23996c6d7a301b3d39f787e11ebd0af9f8e9f360f148a78b370
glibc-langpack-mr-2.39-43.el10_0.ppc64le.rpm
9af10d4d337191548cfa7e994751683ff0cc9d687e68d6b50f59b9ef899259cc
glibc-langpack-ms-2.39-43.el10_0.ppc64le.rpm
7a6f76d088af754fc57e0427263393234f2f6c5e1f88ef151f1f6a6415e06ebb
glibc-langpack-mt-2.39-43.el10_0.ppc64le.rpm
9a2d182b49268299d03e1798d1aee40f69491edbe56d903b333c221a6b64a711
glibc-langpack-my-2.39-43.el10_0.ppc64le.rpm
3336c9accf98e74431488372d898f5d0bd7e3c32d6dae8376e4a1a27451ada0d
glibc-langpack-nan-2.39-43.el10_0.ppc64le.rpm
bf107c99cde2b68a85c0e2da10c5c2a6a11d90e5a602159090a8fba1791ed28c
glibc-langpack-nb-2.39-43.el10_0.ppc64le.rpm
705dec468257e4ef39d6bb611576cf45f78d999836cacdd167808600fe5d2bc7
glibc-langpack-nds-2.39-43.el10_0.ppc64le.rpm
6506b63133df8bb21ce7c17ac90d2b74d1dca2e6481d2fe794e715da862ffb61
glibc-langpack-ne-2.39-43.el10_0.ppc64le.rpm
a3b8bd8954796dcd3fe084c25ee9a9b514d5c605891ecc058d7844a19c42c8ca
glibc-langpack-nhn-2.39-43.el10_0.ppc64le.rpm
47557dfa362f69971c1a67889d17fa8a8a9995ec820ec72429928d7ffd87221e
glibc-langpack-niu-2.39-43.el10_0.ppc64le.rpm
519762b75b76e716df1d7a4c2af8564fb32b0aedac5ad96ba99146bc77354283
glibc-langpack-nl-2.39-43.el10_0.ppc64le.rpm
83a4a7826e10f53b1b9d401b9c18d8b496d3a0fa6c7fdff663dc6907ba2bd793
glibc-langpack-nn-2.39-43.el10_0.ppc64le.rpm
35cd9785edc51759d80e4e496afa25a4514487c85c81c8939d1649bd7b084998
glibc-langpack-nr-2.39-43.el10_0.ppc64le.rpm
57b17941b2ac877774c07449be5585dbc48a4b90a8424caddea066c0f19f6786
glibc-langpack-nso-2.39-43.el10_0.ppc64le.rpm
0831163f518c703a2c08a8376eaf7037c338b186f34834dcd7e661f984c8e461
glibc-langpack-oc-2.39-43.el10_0.ppc64le.rpm
2b1530de712cbcc2ebc68bcbd58c5b960c1fa539ff21d6fc2428dd5b058b3604
glibc-langpack-om-2.39-43.el10_0.ppc64le.rpm
3364584ec034b24972b12471f4d1afb33b0d46ffb76e4f98e96064c8d82b63d3
glibc-langpack-or-2.39-43.el10_0.ppc64le.rpm
eaaf6d70d30b94b888cc2b8f2c1bc1c7ec24860a30a439fd7757de5160d15dcd
glibc-langpack-os-2.39-43.el10_0.ppc64le.rpm
54558cab0e1006b65bfab4ebaa1e36ddb1f3c3ca598e8116fb5505dab0eee5e2
glibc-langpack-pa-2.39-43.el10_0.ppc64le.rpm
86ac7d68e26504d1ee252bd0cd5b4c8b7645c86e737b254fa17cc67163274c59
glibc-langpack-pap-2.39-43.el10_0.ppc64le.rpm
4b96bfefb02f9269831f6a57036ff45b08bdfe4208cf16bb1c7114af7350c5c8
glibc-langpack-pl-2.39-43.el10_0.ppc64le.rpm
2f4b628e9ae4f29901cb247b15d100e60e0f1cae86a39a74b2f3594d82b149c4
glibc-langpack-ps-2.39-43.el10_0.ppc64le.rpm
f19f7b66229655b6440a1a06d5cf4d3a04dc4203336dca6224417565fe47d213
glibc-langpack-pt-2.39-43.el10_0.ppc64le.rpm
b78d9d9e8a96df9a59783326705e1148212ef5e319598713c7bbcb86b576be04
glibc-langpack-quz-2.39-43.el10_0.ppc64le.rpm
7bc6ab7961551fd35fbd142973e8f69f010dc7f558f92eed03a1d7cf3832be3e
glibc-langpack-raj-2.39-43.el10_0.ppc64le.rpm
323b91830f934cdb544dec00fe2dc7f13e43c5fe386e87b75e42934ddcee0448
glibc-langpack-rif-2.39-43.el10_0.ppc64le.rpm
378062c0de9458d31bf1452f9768d144b3b481739a4a26c3b1e6f5b8de21a922
glibc-langpack-ro-2.39-43.el10_0.ppc64le.rpm
77d6c6c87833f1ba445958defeb0fa4ef62ce7fe0dd1f103cbd4e2387f31663c
glibc-langpack-ru-2.39-43.el10_0.ppc64le.rpm
9fd046399682256dfdd59836b2f2a013ccc5ec22bbf00088a01dbd3451376bb8
glibc-langpack-rw-2.39-43.el10_0.ppc64le.rpm
b75c263dfd25c98b51cd4c6d1c16b344559458e886fb5d48c7e5efb683a1ae2e
glibc-langpack-sa-2.39-43.el10_0.ppc64le.rpm
bc328bc63384557fcce968b3b261cd9da85f00529803d57864da700db1af83d4
glibc-langpack-sah-2.39-43.el10_0.ppc64le.rpm
eb7997dc5ca3e3663676455c441592826e2519e3aaf66891fdcff52613d6bc1b
glibc-langpack-sat-2.39-43.el10_0.ppc64le.rpm
2b0ab21211ce4081953d948854c1d3f7c348f65762f94b0b8c4009dd6a95d1d5
glibc-langpack-sc-2.39-43.el10_0.ppc64le.rpm
04848f378580d5bb90da19902ab9d7e16c92ce9fb15e5b013b0b4b90648b9285
glibc-langpack-sd-2.39-43.el10_0.ppc64le.rpm
0d7635b1aa659a86c195f329ac699907b4893f1929f6f1ee2e76dcd331f5f817
glibc-langpack-se-2.39-43.el10_0.ppc64le.rpm
0a88d26c88eadc40ae97548fa71fb401ec177c9fed29d3f387aaffbcf2f9c368
glibc-langpack-sgs-2.39-43.el10_0.ppc64le.rpm
bc50cbab712b031868b00aafe50187ab92797d4c5dc3549b35ddf58011b781a0
glibc-langpack-shn-2.39-43.el10_0.ppc64le.rpm
ca7236c907ec2c96542c4cb3707fe6c2aa21eb5a5a84e651c9619a192e30c723
glibc-langpack-shs-2.39-43.el10_0.ppc64le.rpm
e28d6f7d5730b98d50d7f18a2b9ecdd5f457c4ed3305dff328928beee7d97fab
glibc-langpack-si-2.39-43.el10_0.ppc64le.rpm
a65088c2871eb0d404b8a21ccb7018790ee4278952fb88695b7bcd064b716f08
glibc-langpack-sid-2.39-43.el10_0.ppc64le.rpm
e799a1655f392492f25d9b9e218301a6abe8aa7b915f85933019fc3f4e7fe877
glibc-langpack-sk-2.39-43.el10_0.ppc64le.rpm
1b3cf3df817b4eae2618faed6edd20885896651b30b95f58a137f036aa95adcb
glibc-langpack-sl-2.39-43.el10_0.ppc64le.rpm
68161b3a2f8e95c3486ddd0499871b71d5ae4a7b3c8bd2b52771d39bd6f0a362
glibc-langpack-sm-2.39-43.el10_0.ppc64le.rpm
5b006841653365c7a26f35af223c84037f33cb667bf8df5fa390cf2362ffbab5
glibc-langpack-so-2.39-43.el10_0.ppc64le.rpm
36fb33865107000d520ebdc5661ac74348b4e19fcebec35c4ba5e45bfc457423
glibc-langpack-sq-2.39-43.el10_0.ppc64le.rpm
e1313270f96272e58a63a7e5ecf49cbb0f14bb621603abd612e4c72303066924
glibc-langpack-sr-2.39-43.el10_0.ppc64le.rpm
6d755434c92f4691629e04bcda81456a762038fab0720a1108dea04ad636a6d6
glibc-langpack-ss-2.39-43.el10_0.ppc64le.rpm
71503db7b33881d8aa97cfd14db1f0c125a8f3cd543bd7839ec7eeb8c0850d81
glibc-langpack-ssy-2.39-43.el10_0.ppc64le.rpm
25882bdcb1bb4ea98eb4ba5f21c7490c5d557fc7fd444af5955184ee3f89d227
glibc-langpack-st-2.39-43.el10_0.ppc64le.rpm
848986665ce1a23f6164aa948c697d8b28efc563bb768eee929dd70fe74ebdf7
glibc-langpack-su-2.39-43.el10_0.ppc64le.rpm
affbae311952a745d4953c7c1af3d89dd430876ad22325fb310e25c583ac528a
glibc-langpack-sv-2.39-43.el10_0.ppc64le.rpm
78cbba5a4ee1b7d560acf8417266c6f865e81d8342476dd27fdf0fd13c7a6fc8
glibc-langpack-sw-2.39-43.el10_0.ppc64le.rpm
f6ecdbaafdd7b609acadcf9a24776896940dbe2360186194c42a3bfea5cac4f0
glibc-langpack-syr-2.39-43.el10_0.ppc64le.rpm
c7e3f8422bb3abb86c42b56b84b5a271ae691bfd1f0b06e47244bc1852c102f9
glibc-langpack-szl-2.39-43.el10_0.ppc64le.rpm
f7cc3f16a7d8b010696e11f19c736cc29a691adcc0f1727e51016a64a7ad2359
glibc-langpack-ta-2.39-43.el10_0.ppc64le.rpm
f804574fca04218380147312bb4a9bf342bfb1f56b62b17518cbc07c32d9e807
glibc-langpack-tcy-2.39-43.el10_0.ppc64le.rpm
1471c9755dcfc85a69ec87963966ac80d83cb50005ab21140e8fe1b74eb60995
glibc-langpack-te-2.39-43.el10_0.ppc64le.rpm
b7cdc8c19c49ed98e82b69d06bb4482210066c216bfe5e190b63657f2dc7d6c7
glibc-langpack-tg-2.39-43.el10_0.ppc64le.rpm
a5d4ed4f4e57103db8a103c645eec228d9253bac3d6529bb39754a05f8ef2646
glibc-langpack-th-2.39-43.el10_0.ppc64le.rpm
af75f2df955398a148f1f3f0b33400fc1c3ea1927bee4a05665ba68c5a59bf61
glibc-langpack-the-2.39-43.el10_0.ppc64le.rpm
e8754066384c8b3b9bd364c4070718415de7e11353285c601b32cbf9aaa9e203
glibc-langpack-ti-2.39-43.el10_0.ppc64le.rpm
f9e10296244c010e516c854c1f572100e31ae3d0b50198aa7cc84fc13cfbf34c
glibc-langpack-tig-2.39-43.el10_0.ppc64le.rpm
3fe5fbca5fbdf2a510d9c12c1372105d5a7369653f6ab4903bc92cce808ca497
glibc-langpack-tk-2.39-43.el10_0.ppc64le.rpm
506e7de81e12ad94e91e92b605954bc792064cbacb54bdacb0c31f1baadde73a
glibc-langpack-tl-2.39-43.el10_0.ppc64le.rpm
073c945baf85338002404e67ccf2c6f73e0c6085e8adbf0ffada205f90dd2974
glibc-langpack-tn-2.39-43.el10_0.ppc64le.rpm
68e11b557b890753569f7d01d02af18f0cfd57bf00d8e27b96fde55fe9afd88f
glibc-langpack-to-2.39-43.el10_0.ppc64le.rpm
5b97b16d708404dc214df65ea264e1f763a4a7deff072031cd6df5a10e283b9e
glibc-langpack-tok-2.39-43.el10_0.ppc64le.rpm
c0089d3f5dd971c2057a0af316f65752289cbf72f9a0843f4cfb2d234310a462
glibc-langpack-tpi-2.39-43.el10_0.ppc64le.rpm
b124c69a4717dfd879433dd51bef5354916571eefc5a3715794e9482dbb78e7d
glibc-langpack-tr-2.39-43.el10_0.ppc64le.rpm
005d1653f49b33150c40ca771d78438df4896351aa620d660441c660273c0998
glibc-langpack-ts-2.39-43.el10_0.ppc64le.rpm
57fce4acf39dbfa155119263d2f32105dcc2c82999422fd9becf268b4299b064
glibc-langpack-tt-2.39-43.el10_0.ppc64le.rpm
e504f20f026f841290dc13cd569c44eff51f6218e86704ce43c16844654471e3
glibc-langpack-ug-2.39-43.el10_0.ppc64le.rpm
73bb2341f41675135541444c8000e13af5c32c26a9ff8f56577edab4834815aa
glibc-langpack-uk-2.39-43.el10_0.ppc64le.rpm
55b160456a12499753441319cfbee5d521d178065683804f44ae6111e691a74f
glibc-langpack-unm-2.39-43.el10_0.ppc64le.rpm
14290c227f4a81a50d60545ccf1fd7ee511c93f11233da4026dc38eaf768a0c6
glibc-langpack-ur-2.39-43.el10_0.ppc64le.rpm
f2ae36e9f438bc74620d4110b7010fc4bd20195fd002203ff6b66286bdc16e0b
glibc-langpack-uz-2.39-43.el10_0.ppc64le.rpm
dc40fa9ca2d0d9891fae59cfef78f9ec50ef9a2b6b158b9ba6b6923ebd8a7a1b
glibc-langpack-ve-2.39-43.el10_0.ppc64le.rpm
5c14d42a1c0f80be356cf4448d535348abf8f7e6ea993d54bc4fd5f7bc6bae77
glibc-langpack-vi-2.39-43.el10_0.ppc64le.rpm
3ce4884a79560fa4e9102457c42bb08ed6c15ce9c133c381b4eb15b3b9e24a7f
glibc-langpack-wa-2.39-43.el10_0.ppc64le.rpm
24720128a30aa6c6c9233d148ff5a3c14bb2657b76a71cbfb786230d3404218d
glibc-langpack-wae-2.39-43.el10_0.ppc64le.rpm
5d1deba538967a8c2f26375f37ce068d691caf46fe5bfd6b8f79fbdc0089f501
glibc-langpack-wal-2.39-43.el10_0.ppc64le.rpm
12b5b6242acaf8bcfb6b23f35c4213b2f9ee389bfee1ab55743acd0133f56e8c
glibc-langpack-wo-2.39-43.el10_0.ppc64le.rpm
aac194b26d02b124c2545730d9d6484ceb368beeb1d0b27a135012b7af518690
glibc-langpack-xh-2.39-43.el10_0.ppc64le.rpm
ce68eabb0d987e6c505c078021d3a66c5a6c92055c23ce16c60ddd3975a78e47
glibc-langpack-yi-2.39-43.el10_0.ppc64le.rpm
868998d1d8ebfb189a29aba70fd30953dc3167d568694a7fa6971c44d8fb0eed
glibc-langpack-yo-2.39-43.el10_0.ppc64le.rpm
7435a3def4cb310de7a49796c4a9bdf3deff8f8f9762992f88a69f9f8a71cc78
glibc-langpack-yue-2.39-43.el10_0.ppc64le.rpm
c8e86c897c6d68407f8ba973b62ac488ea10d6b0d6fbef5c4a8ec75c74833353
glibc-langpack-yuw-2.39-43.el10_0.ppc64le.rpm
dbb64fe3a611a0a5747d2da20e8ef95e39aa8b6b4696fa51222c908bdc6498f9
glibc-langpack-zgh-2.39-43.el10_0.ppc64le.rpm
e57578c07679904a26e9de1b29480a7a7ff65d7f681054497a0a1a26e139e0c7
glibc-langpack-zh-2.39-43.el10_0.ppc64le.rpm
afe83c57f63fb516f6a3297c765ba47a866bef97ef4aa431aaba7223bfe2824d
glibc-langpack-zu-2.39-43.el10_0.ppc64le.rpm
cb6a219fc76992fb6d98e7051f66fe40a3154522d4b5f44f8645ab4fdb9fde3a
glibc-minimal-langpack-2.39-43.el10_0.ppc64le.rpm
984b05d19c429b3d15e480d2637ff1b6609bde3910a0a43728415aefa7e6b145
libnsl-2.39-43.el10_0.ppc64le.rpm
efbd21cae344463efb047fee4ca9e78afe5559114a1f08b622ed2ef054e6f695
RLSA-2025:11428
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-abi-stablelists-6.12.0-55.22.1.el10_0.noarch.rpm
8c81c8d5df21d003ebd91b6d779e670b725da918f25105a6955e42381c3966ff
RLSA-2025:11537
Important: sudo security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sudo.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.
Security Fix(es):
* sudo: LPE via host option (CVE-2025-32462)
* sudo: LPE via chroot option (CVE-2025-32463)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
sudo-1.9.15-8.p5.el10_0.2.ppc64le.rpm
08ddab348329d11b01c4517a4578d58c549bcf0eecb4c81171c17aaa189b4423
RLSA-2025:11855
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (CVE-2025-38088)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.24.1.el10_0.ppc64le.rpm
a7536ec78f61908503cca419404a9d716cded5c910d303438d772d2747674116
kernel-abi-stablelists-6.12.0-55.24.1.el10_0.noarch.rpm
299bfcaa3fe0b313a66477b4dc757da3b4ac7cfc6e1794d3103e57bf71423de8
kernel-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
65163dc74ab6e674687367521af383d0486e328e2369f2ff9aa7be8c91db63eb
kernel-debug-6.12.0-55.24.1.el10_0.ppc64le.rpm
0ab30be582ee71a1a3db2d2af173e59af1a647b6558914634b581e7419f16ef3
kernel-debug-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
f8354d0a85bb25b03cdfd620765020889714d12047f3dea11f9fcde3d17ffe03
kernel-debuginfo-common-ppc64le-6.12.0-55.24.1.el10_0.ppc64le.rpm
738cdb7abc0f2b5f2fc874fae39545d1554cbd3e3efe2708435b8a2439b74d9a
kernel-debug-modules-6.12.0-55.24.1.el10_0.ppc64le.rpm
83cc121521700a170cbb367230bc1c9f16324ce8c1999a9e321a3154c5b0489e
kernel-debug-modules-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
8eafa4669f3104f0b1dacaa828c15ad68df5d652b184e707a551e6d122bd5a6c
kernel-debug-modules-extra-6.12.0-55.24.1.el10_0.ppc64le.rpm
44b26702620099847dd51e0153add8a7f1dd19be15395bd189975cb392402f95
kernel-modules-6.12.0-55.24.1.el10_0.ppc64le.rpm
18e9064432458c162ee7a621d225e12f4bcf5ffeb7c74fb78948f34bc0d9139f
kernel-modules-core-6.12.0-55.24.1.el10_0.ppc64le.rpm
491e9fc4db3e24c9e5d57699ee5641282cff60af93c783c04cbf805ce5278e11
kernel-modules-extra-6.12.0-55.24.1.el10_0.ppc64le.rpm
11ffe7620c7553cbce3bf010694a74f79bca9e0d5a7b2e46f7e612f249c1ce27
kernel-tools-6.12.0-55.24.1.el10_0.ppc64le.rpm
5b3cf17f8b7581e1350082e55be55c15fbf76b6f93ba4ee1a913e343bdfeea0d
kernel-tools-libs-6.12.0-55.24.1.el10_0.ppc64le.rpm
5590f283fde59e86149aaba81b0f347c812d412c128b001e5a0360520d497d02
RLSA-2025:11888
Moderate: icu security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for icu.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The International Components for Unicode (ICU) library provides robust and full-featured Unicode services.
Security Fix(es):
* icu: Stack buffer overflow in the SRBRoot::addTag function (CVE-2025-5222)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libicu-74.2-5.el10_0.ppc64le.rpm
8974d5f60ce7e3de1eeac7cdfee91d2a4692f72003d03f4614982169550ae51c
RLSA-2025:11933
Important: sqlite security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for sqlite.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server.
Security Fix(es):
* sqlite: Integer Truncation in SQLite (CVE-2025-6965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
sqlite-libs-3.46.1-5.el10_0.ppc64le.rpm
7865cafee91ec78917f0f104dce3ebf2e078b15780bdfd00efc0e20951788edb
RLSA-2025:12662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
* kernel: nvme-tcp: sanitize request list handling (CVE-2025-38264)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.25.1.el10_0.ppc64le.rpm
247e9f3cca9d347b0c0dfa5a6def411c8d7d897e052f1caf7dad90e24f3142ae
kernel-abi-stablelists-6.12.0-55.25.1.el10_0.noarch.rpm
34d9bc8a1b62f7ed279226e375c6701c331bb9e2dc0ba021bb00b8150af7d780
kernel-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
363c3c6e4150a5ffbb378de7087276a3dd8cf4f1b5d9753054af74ceedf040d7
kernel-debug-6.12.0-55.25.1.el10_0.ppc64le.rpm
a4b55da2362ba8b3ac532c9f6da0e4f219da8f1c015eb3a4406ad583e1111c42
kernel-debug-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
16240550d78326d74e71b6bf9f3d823da40db6223a1b5c18a3dc450d5f428967
kernel-debuginfo-common-ppc64le-6.12.0-55.25.1.el10_0.ppc64le.rpm
bee39608968337daa13857c17a8aaad9d83959d9736c8dd535d8f1b7a384c42b
kernel-debug-modules-6.12.0-55.25.1.el10_0.ppc64le.rpm
55bc202d570a766d107de1ef3aeb745278f538f010c4f94c97bd685d9488958a
kernel-debug-modules-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
bbe52cee0d4306e2a3584f32765902ea3f1d5f1a5259feee870b5357286d2cd5
kernel-debug-modules-extra-6.12.0-55.25.1.el10_0.ppc64le.rpm
d0540f735caf71523fc14786ac8962481e7349949c342dbea307726c158e9828
kernel-modules-6.12.0-55.25.1.el10_0.ppc64le.rpm
f604f64f5e334990af9f98b86c784f3ac98a139678bfdd96375be78d2c1d10d8
kernel-modules-core-6.12.0-55.25.1.el10_0.ppc64le.rpm
e79e3ea25d0cc4b9ca1fe44c6b4d8bea61032ea6e2f637b3065802a7246869b8
kernel-modules-extra-6.12.0-55.25.1.el10_0.ppc64le.rpm
ae4ddfd5eef614df7a179121f3c48a3bf2cc44d2a5534ef06c5a83118895b5a7
kernel-tools-6.12.0-55.25.1.el10_0.ppc64le.rpm
b8bf7d5909513ee740e8737fdecb2422659fe3416f425ea351f29389f7de572b
kernel-tools-libs-6.12.0-55.25.1.el10_0.ppc64le.rpm
176ef47f741142a4e129c875f6bce2fb5f967482739a03476cbce404d0661a99
RLSA-2025:13240
Moderate: glibc security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for glibc.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Double free in glibc (CVE-2025-8058)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
glibc-2.39-46.el10_0.ppc64le.rpm
6506860f1442a74c3ff36fe96ff8be467cf7c8efbcf15fdbb32444f3b36d6af8
glibc-all-langpacks-2.39-46.el10_0.ppc64le.rpm
99d2259c44af7ef906d29bec1b14f026932e55af19d662e28935e24c1415c22a
glibc-common-2.39-46.el10_0.ppc64le.rpm
1769daca93eee16edf2125f335626e919b454c0e3d15482ed2134f25a4622e19
glibc-gconv-extra-2.39-46.el10_0.ppc64le.rpm
66c412c4820aad1bad8a789b94a481cf7652485b2c104acdadb5ae6f2c7c920c
glibc-langpack-aa-2.39-46.el10_0.ppc64le.rpm
cac1d0e69fcf9c2a1702c5e0539262739f1d6267cd1db6d26bc125b8e29176d9
glibc-langpack-af-2.39-46.el10_0.ppc64le.rpm
1f2ae2335865d42b651671695c0c598a85f0cb0090f78da3fde6bfbde0249e29
glibc-langpack-agr-2.39-46.el10_0.ppc64le.rpm
9a195619c86d0c1104cd29e7b360e45bd2bf8ddc862b60006eb100c2b727f5a9
glibc-langpack-ak-2.39-46.el10_0.ppc64le.rpm
160fbec1aca87e8a6eb55d00b957295a41563a5655c3068a2d53810e50f1ca46
glibc-langpack-am-2.39-46.el10_0.ppc64le.rpm
3d71221447da52bde47e07ac5cfbffb740f57667f77f554b0aa9de7ff24ef2a0
glibc-langpack-an-2.39-46.el10_0.ppc64le.rpm
be5ea88386c941ceb48051ce0059b276dedd8735389e41539395c78539715459
glibc-langpack-anp-2.39-46.el10_0.ppc64le.rpm
53cfef71cae80821f375699bb7f9106577622747c0d1451121dd688073958143
glibc-langpack-ar-2.39-46.el10_0.ppc64le.rpm
e2b320e69bf9a9fcd7593b1dbd3d60f9a28c585bffeba9d54af223abadc20502
glibc-langpack-as-2.39-46.el10_0.ppc64le.rpm
519766b05c03d5bf98e8db0e4c277bf483b02ff4e7bb403a71dab010ff4f558d
glibc-langpack-ast-2.39-46.el10_0.ppc64le.rpm
52cef89ba5bda41f8e62417391944babfc595470b994b712fef4504e3fb47967
glibc-langpack-ayc-2.39-46.el10_0.ppc64le.rpm
17fbe193e47967d7cdf2ab96ae40bce1356a109208f999ff2f0b4fa25fa649c5
glibc-langpack-az-2.39-46.el10_0.ppc64le.rpm
3feafdf68120c2b6f55d68c88d0f090e996959a226110a5ff42dbe6eaa03644b
glibc-langpack-be-2.39-46.el10_0.ppc64le.rpm
9e9ff7f6ffd64805abf49a124248b32aa03d9c4be2c7cd683e8b4a2b42a12784
glibc-langpack-bem-2.39-46.el10_0.ppc64le.rpm
d0208b035872eb8b55487a87e45654a4583051982189b3b04e546fe8ebd2c6de
glibc-langpack-ber-2.39-46.el10_0.ppc64le.rpm
3c2247581447f3b25e79393ecc7cc14ddfd31f81e37d6fe7919021290582ce47
glibc-langpack-bg-2.39-46.el10_0.ppc64le.rpm
754a4d3d930711df9108a96e2517889c022679aa22090e4cb45ec58dbbcd010c
glibc-langpack-bhb-2.39-46.el10_0.ppc64le.rpm
621208eaeb01339cb124ef2b59bc7cfa8500cd4ba0fd82fb9ddb72fe7a467287
glibc-langpack-bho-2.39-46.el10_0.ppc64le.rpm
2536d78656ed1b85b78d7d0c4d3fcda1a15546e5ed837340cc9e82543bcd1ef2
glibc-langpack-bi-2.39-46.el10_0.ppc64le.rpm
5811a498cafb15ead8c60d6e30d1feae49c23b9205a7b47184d495714ca601e3
glibc-langpack-bn-2.39-46.el10_0.ppc64le.rpm
7c8c3a115eca62827a1c4705a97526ea341ef984d0ca1f312cb9e8734c47f4b1
glibc-langpack-bo-2.39-46.el10_0.ppc64le.rpm
882c594ffc90194b6af4ef450282dd300d8a285f0ec2d2ae8811b0dd00064d77
glibc-langpack-br-2.39-46.el10_0.ppc64le.rpm
fc0dae08a180043bba7a43ae310ea45ded50f9237134e37540dcdf3b73ea9878
glibc-langpack-brx-2.39-46.el10_0.ppc64le.rpm
895fb6d2d9561a3447a0cebaafc0d0a38dacaa83163c31e99dcd6336c4e22a58
glibc-langpack-bs-2.39-46.el10_0.ppc64le.rpm
ba331ffe41a173ffa2df28f3dfb04e7b62fca300d72762979bfc6a9235cf67ed
glibc-langpack-byn-2.39-46.el10_0.ppc64le.rpm
033f9e19de4fdbbedaf799f47e48281339e4be2787489ed0e08990c48e5fb801
glibc-langpack-ca-2.39-46.el10_0.ppc64le.rpm
31911d386036cdcdb270668218db18d424873526de4ab3615e45baf960e0bcaf
glibc-langpack-ce-2.39-46.el10_0.ppc64le.rpm
3ac735a5e28ab8f78b862edc911cb0dc0af45bb8b68b805c2c90beba5ecff9eb
glibc-langpack-chr-2.39-46.el10_0.ppc64le.rpm
0e0f1442798d1f6e54fc75a448955955ff13a9dd56a56fef7039e79e8e5c9eb6
glibc-langpack-ckb-2.39-46.el10_0.ppc64le.rpm
14bd6d858240985698b08b94d736e030e49c1b31ea3e262a7de567edbf79115e
glibc-langpack-cmn-2.39-46.el10_0.ppc64le.rpm
54f77b193c59a95a93478a937267fb2f48e96e5d3a4e5f04a12b4c6b796b10bb
glibc-langpack-crh-2.39-46.el10_0.ppc64le.rpm
352bc600f43aa4cb7f7c50098124b488cbde6440d0938fa7b87f56abfdf109d2
glibc-langpack-cs-2.39-46.el10_0.ppc64le.rpm
fd1be1c4c350e425e9d73b4061ed9de12c8c7c917238eed60805464cb2102afe
glibc-langpack-csb-2.39-46.el10_0.ppc64le.rpm
1a192d62c86adbc877b04e472c170d91da1c6801803aae9b72e46bf48ff2268c
glibc-langpack-cv-2.39-46.el10_0.ppc64le.rpm
7218419380a60b681f5be0045de6d3cd31543cb981497a867e0609487879e76d
glibc-langpack-cy-2.39-46.el10_0.ppc64le.rpm
4986c0e001244572f7a9550981862dbe738c61287bd471a551a466abaf5087e8
glibc-langpack-da-2.39-46.el10_0.ppc64le.rpm
5c9609bdb4d294512dd34c8075ca108f64ad125c2eec1b4c77024593fc2686f4
glibc-langpack-de-2.39-46.el10_0.ppc64le.rpm
5408354e2eb817ee23a19ebfa634ddbbefc89eaebd875fe5b42eccade1538fd0
glibc-langpack-doi-2.39-46.el10_0.ppc64le.rpm
21329316deb44451656f17070364379bdf99698850c09f840d3d0d0f2019de83
glibc-langpack-dsb-2.39-46.el10_0.ppc64le.rpm
cd6df01ad78ff7f12e5b6f7342d4d047fbf12cb0250ef883ce531496a1db4e68
glibc-langpack-dv-2.39-46.el10_0.ppc64le.rpm
80246465c8f85556df2303d813c0b6f89bf94b231e0c2080fd2fff47da00212d
glibc-langpack-dz-2.39-46.el10_0.ppc64le.rpm
f2e3b4f0633df9e5cd793f677fe406b393bb11df24fb87c439baced11c5e0d9f
glibc-langpack-el-2.39-46.el10_0.ppc64le.rpm
275fe2176a6a5e4aea8ca01e25cf6ff7d1465bf9df93ccec1bfea37d7e54cedf
glibc-langpack-en-2.39-46.el10_0.ppc64le.rpm
37ffa8579f5c908332f50c5d1d39489016751a1b5e5db662d4419a7e7a5032a0
glibc-langpack-eo-2.39-46.el10_0.ppc64le.rpm
81a6e225b041a39f2065720beccaa8af4a567c0e61ee0ed2cfcc482b83292e8d
glibc-langpack-es-2.39-46.el10_0.ppc64le.rpm
154b416e45f1434b66ad5820a182f0e3f28c5e51e44acd260f372bd2055af4b3
glibc-langpack-et-2.39-46.el10_0.ppc64le.rpm
5b0cd05392ff5ce063322364e13efa491717b7e5847de1c2c87a33a9a524350d
glibc-langpack-eu-2.39-46.el10_0.ppc64le.rpm
12928e3a98f9f3a6dfc4cdf9d76eb53c808f41f46e8fdfa56adc446943c1d23d
glibc-langpack-fa-2.39-46.el10_0.ppc64le.rpm
6dc40b1360b1321f1be5052426fe10655574f40a6d7f552c862bdc519dde4daf
glibc-langpack-ff-2.39-46.el10_0.ppc64le.rpm
ad8eebb9dcc3ffa7115b0979de10c7fa6a02367b8a53ddcfd749da6178678abb
glibc-langpack-fi-2.39-46.el10_0.ppc64le.rpm
66fa3d980399262b87876d9a273e8cd3b731b644eed78b0f7713c159b2e6e788
glibc-langpack-fil-2.39-46.el10_0.ppc64le.rpm
f7969cc53a3ee60273df5a56d8e2bebbf5d50cb9ff04326f027587f29ff778d9
glibc-langpack-fo-2.39-46.el10_0.ppc64le.rpm
deccd7f9aa0646be30ea3ea417f41573e36b6f7712fda2fe7101448d86507f40
glibc-langpack-fr-2.39-46.el10_0.ppc64le.rpm
0c1e6e551faada394856dcf9478285981aa25c0c7c50987ddfb611af0b7b9df2
glibc-langpack-fur-2.39-46.el10_0.ppc64le.rpm
ceb8a5611f3ea345b4187ca1be3b9512b88f674b4d3233486c77de08a72a9c3f
glibc-langpack-fy-2.39-46.el10_0.ppc64le.rpm
ef94f575b7b278cb49b3cbdaa9e0ac884e5f25c7a80e557f4ea2e59e1b3cf9c4
glibc-langpack-ga-2.39-46.el10_0.ppc64le.rpm
a1ba1f578dc2260d4f8e50d64339e12e6ce2c31abf532465b3a8d1a95f76d74f
glibc-langpack-gbm-2.39-46.el10_0.ppc64le.rpm
f4e326cf0a6b233c12547730db593dc5daf141209114b57f910e6bad1bd16bc3
glibc-langpack-gd-2.39-46.el10_0.ppc64le.rpm
8942b42341bf4a51810389cfc2ad19073e9ca4354198350646b6f9b1159f6c96
glibc-langpack-gez-2.39-46.el10_0.ppc64le.rpm
c0d94b942e4be1e482bbd634d574bde82a732d31e6276d6b771e74c9a2ac51bc
glibc-langpack-gl-2.39-46.el10_0.ppc64le.rpm
e9f3ca8cb9e0bab5b6c95515ecc397463abd81211c8356ac4d073ae9b25036ab
glibc-langpack-gu-2.39-46.el10_0.ppc64le.rpm
aef25842be417684ed914c86ba7be7d7300cf20c0d7f580dc0e9fdb98726c78f
glibc-langpack-gv-2.39-46.el10_0.ppc64le.rpm
f8486a6c03456c7e438501b09db97c801ea03ef9ca801c6de3c52e722abe3b42
glibc-langpack-ha-2.39-46.el10_0.ppc64le.rpm
a93abf6c553358619382f0e83c6b3d47d9b5d55886d8f2ab0efaa2d9a0d40433
glibc-langpack-hak-2.39-46.el10_0.ppc64le.rpm
839b0dcb19c896d221dfaff0cd17de801344b6f799a2f902f263537b965e6d3c
glibc-langpack-he-2.39-46.el10_0.ppc64le.rpm
4b14e005bb1ba7ffb0127691ea57c4c8d77b93054c0e25d371d1b5a0b047556b
glibc-langpack-hi-2.39-46.el10_0.ppc64le.rpm
4f5232ce44ecc4c263a1d4db887f5f3a9e2f94fb8eb577a5b015aca7537be554
glibc-langpack-hif-2.39-46.el10_0.ppc64le.rpm
2eac1389fb6a3174ecd72d6c3d1ad2ab1d741ee7d14150fbbffdc0102d828217
glibc-langpack-hne-2.39-46.el10_0.ppc64le.rpm
c5e6384a140b9ecd016debb4401baae5a167f11ac76f6743a7f94fca8c430d82
glibc-langpack-hr-2.39-46.el10_0.ppc64le.rpm
9354c7707ea6b09e5516cbf8e4193da2b73a3cf74c5ddbad3e0767185b347238
glibc-langpack-hsb-2.39-46.el10_0.ppc64le.rpm
0e8dc0ca1ca62c9e3c3bc72da21e2eed5d72391e40590b8860af3b62b0d8bea5
glibc-langpack-ht-2.39-46.el10_0.ppc64le.rpm
ea92335685fcb0e0847da4f8d0b7d43f0143aa99b1ee1e87035910dc3947379f
glibc-langpack-hu-2.39-46.el10_0.ppc64le.rpm
2f196a64f9bf28f78ad9d3b91f2c2686a93b3e521f04d9f89b630aa433634fa0
glibc-langpack-hy-2.39-46.el10_0.ppc64le.rpm
0a4489676027e2cc4bd7f1e8b0424322817436b343f568e7957b9657f4db9987
glibc-langpack-ia-2.39-46.el10_0.ppc64le.rpm
1fa6572eefd2936d4f31104d4123b7e75bcaad821c8d62e171e1e77e6000b345
glibc-langpack-id-2.39-46.el10_0.ppc64le.rpm
aa583f6326970f5acacfdd05911ccf73cd5203bf5604b10a401e382576a5ee8d
glibc-langpack-ig-2.39-46.el10_0.ppc64le.rpm
3daf2de665762ed3e0cc6dc06bd3040946bf0ec50c959aeebc18e07d437ce0db
glibc-langpack-ik-2.39-46.el10_0.ppc64le.rpm
d2157ddc948876ffd7d9310ddb2bfe002dafe276d4f460d735c91cb539edcb4f
glibc-langpack-is-2.39-46.el10_0.ppc64le.rpm
3c7421a21b0ec58ca7874d0a736fd85ce33198f51c320c007dcedaa72f0a7362
glibc-langpack-it-2.39-46.el10_0.ppc64le.rpm
21815c1777921c26ab3fe9ba9993bb5af9226a92f7c066dc38e707df48110a74
glibc-langpack-iu-2.39-46.el10_0.ppc64le.rpm
653b063ebc6c955329f96515fed271d2a335570d99d4e03409dff6c3d271cdef
glibc-langpack-ja-2.39-46.el10_0.ppc64le.rpm
d8f65c6c8eb02d4f93a83e6c60345fd486e6e29458d8167d9a98b8e252e75cda
glibc-langpack-ka-2.39-46.el10_0.ppc64le.rpm
1d270a2879aedc2e62c6adc95c3bc6ddbb4859540d40a7c7b825b0e5b266f463
glibc-langpack-kab-2.39-46.el10_0.ppc64le.rpm
94b4ecb4631ce2a109a8f134fa35b027797deb8347c25d6b09f841243bf0fa2e
glibc-langpack-kk-2.39-46.el10_0.ppc64le.rpm
a3fd568a61a181dadffb1b58590d7cafee80a82534091dd40e786f6b61dc26c1
glibc-langpack-kl-2.39-46.el10_0.ppc64le.rpm
e361f7b34c19f41ebcfecba32151d5a1eb0c79a0dfb3f36b871ab0cff1930dfd
glibc-langpack-km-2.39-46.el10_0.ppc64le.rpm
bb3467cfd892e340b65dcf34f191f5a3173504c058df7f9f88021ddf4bbbf8d6
glibc-langpack-kn-2.39-46.el10_0.ppc64le.rpm
bb943fdcd3bc3547f62e59d3b65951abe141c5121be31bab94c9de640deb98a2
glibc-langpack-ko-2.39-46.el10_0.ppc64le.rpm
8e9eb1824e81ba880870a5a632284aca7218a82f7a0f5ab7cd2858b150de5ce5
glibc-langpack-kok-2.39-46.el10_0.ppc64le.rpm
1acae47bdd8fb1ed0d540f55b937fc617d65a93b59fa685f76613209b102340a
glibc-langpack-ks-2.39-46.el10_0.ppc64le.rpm
c7c82227464dcc2dae12c61155bcf62988cf9981b2457d2ee25c5ecd4a244388
glibc-langpack-ku-2.39-46.el10_0.ppc64le.rpm
68598bd14d6d2b56d64771d04d14f6c6dd7a01956c34005417d6d10c4b315780
glibc-langpack-kv-2.39-46.el10_0.ppc64le.rpm
c663861a6335867ec8bcb39139fa24a1b23b010d67d2be28d20fd84d01c47e39
glibc-langpack-kw-2.39-46.el10_0.ppc64le.rpm
ec18b6d50d02ca5a674a8819ecd64699efb22298ecc08cb08e6d1afefd93d7a7
glibc-langpack-ky-2.39-46.el10_0.ppc64le.rpm
7cddf0721ac3e9bdf86bf9001e11a15855cd5c4262f99f201dff619ab94378a3
glibc-langpack-lb-2.39-46.el10_0.ppc64le.rpm
98ccd5d07c7eb8e0b81ce916709baa9fba4c9ada9654d263cfc66a6927ea47c4
glibc-langpack-lg-2.39-46.el10_0.ppc64le.rpm
807cc459b7bd9a5093337b0e741797c2290e5980881351ed8201e7bdd2d19552
glibc-langpack-li-2.39-46.el10_0.ppc64le.rpm
d8951283d5e6759cea9858bc1234143abd3963413115f66c768235004083f464
glibc-langpack-lij-2.39-46.el10_0.ppc64le.rpm
f0eed7414a7b19a1de2caa441070b0364f20a31748d7d2d415c452d5f8e6ff07
glibc-langpack-ln-2.39-46.el10_0.ppc64le.rpm
4cb2506acdcc5d3382a1df86a5a3f9dae7543e7f96733305734ba69969949ce6
glibc-langpack-lo-2.39-46.el10_0.ppc64le.rpm
9be43527762db93fa5c3cb8933efde8fe98aa6f00f47dfc916a0d14221a538ea
glibc-langpack-lt-2.39-46.el10_0.ppc64le.rpm
227e52bc3117ed6b40a2b7c1ded900509fbd430fca5bdd0a65bfc9574eacc487
glibc-langpack-lv-2.39-46.el10_0.ppc64le.rpm
72326a4466ef2c190ade81126e148771b1f89405a6595575cb5915927a56ce9c
glibc-langpack-lzh-2.39-46.el10_0.ppc64le.rpm
cef1f40197e8b782503038027803e092120303f6fc42796a314a5f431e6ce74e
glibc-langpack-mag-2.39-46.el10_0.ppc64le.rpm
3e0557894ba740114145f0dbbd5a7b4a819ecda7bd463b3c815909cd4bff6272
glibc-langpack-mai-2.39-46.el10_0.ppc64le.rpm
cd9f3691eeb3c7cddec03257f9aecd8cafcaadbceb6d62884c571199ea568958
glibc-langpack-mfe-2.39-46.el10_0.ppc64le.rpm
2d244470b18ab0772d6cf2f398a64000e9a5747af258b08816ea516817db4e0f
glibc-langpack-mg-2.39-46.el10_0.ppc64le.rpm
198a5a0ada82c89f18b435cd6f6fc0ee0388ebcfada94cda729bea618d12c879
glibc-langpack-mhr-2.39-46.el10_0.ppc64le.rpm
55833f99146a58b695dccd454d41e7cc94dd3c90fbf1413ab9afaf6900ba7220
glibc-langpack-mi-2.39-46.el10_0.ppc64le.rpm
4f0d467de698446634a192e3168ee636b48efacd2f9e5ddaac49567813f3297e
glibc-langpack-miq-2.39-46.el10_0.ppc64le.rpm
4f5e99f01c9239fe71afef0b639b148535ded977e757a646719922e0f381712b
glibc-langpack-mjw-2.39-46.el10_0.ppc64le.rpm
11948f45e53abdb6ad19789cb6debc2df408535aa6be79947edfea78fb975386
glibc-langpack-mk-2.39-46.el10_0.ppc64le.rpm
18411e64de706b4e9e6b8c101dc8e6dc53d92f39cbb1bdc9a436244e373ab176
glibc-langpack-ml-2.39-46.el10_0.ppc64le.rpm
4359daa413bff56ac5b384a1fd1bf1f8bc522647caa4e432fce1b84d360a7ef6
glibc-langpack-mn-2.39-46.el10_0.ppc64le.rpm
422b023525883cb6a2b1dcbb4bed2e14fd6259fbeadecb8219a687f66ef544ce
glibc-langpack-mni-2.39-46.el10_0.ppc64le.rpm
2ff3b401d5554f87d1dc82cb3f2f6610b7e034e5710f6024db9499f1b19d9883
glibc-langpack-mnw-2.39-46.el10_0.ppc64le.rpm
aee9e3d96d62df9cce628f4a0c8c87e44ed9905acf7f62859fc2cecefb26f547
glibc-langpack-mr-2.39-46.el10_0.ppc64le.rpm
101dab577ac657d17ff696c2ceea53d899d4b0ce4ec496be86f5969721ff063c
glibc-langpack-ms-2.39-46.el10_0.ppc64le.rpm
2b27808d2e0dbad3534a9d6ff2e5589e48f7c2176b2abfcbeeef8291a0dd8c7c
glibc-langpack-mt-2.39-46.el10_0.ppc64le.rpm
b463e36690f2f852cf5ba694fb82c1376bc84e9855912831192ccc2a57237911
glibc-langpack-my-2.39-46.el10_0.ppc64le.rpm
4f0db1c809c8331673f5e4957923f4a7804419e3b0444545b052f4516bd916f4
glibc-langpack-nan-2.39-46.el10_0.ppc64le.rpm
0ea0229a4b3f9d72a8c4bf9054c6d7c527d815249cb7450cea4544692dfbe352
glibc-langpack-nb-2.39-46.el10_0.ppc64le.rpm
33d2ea060a13b8b17a5f7c162bccd9bcf547e49c859416c0a9bdbc6b590259be
glibc-langpack-nds-2.39-46.el10_0.ppc64le.rpm
750fcd48c1d569e0a235f1679b23019538dcbbab590d640c36a985309ad17805
glibc-langpack-ne-2.39-46.el10_0.ppc64le.rpm
79186329b22b2938a492e0e3ef301599d77d9f238f9d657d2c41cf5b6e3ab9cb
glibc-langpack-nhn-2.39-46.el10_0.ppc64le.rpm
52bf1bb902661ec6e308968dbaf6b7a3fe9977ef3b58004facf65950cc9ba577
glibc-langpack-niu-2.39-46.el10_0.ppc64le.rpm
5b5723a7f6857600b352c8a8e418c1bc7d00d6d4e94ad13b3c2cc2f9944c8046
glibc-langpack-nl-2.39-46.el10_0.ppc64le.rpm
497c72ded647f40c37497d52008475cf39d7df6b3e710c9d28500e5f3356cc4d
glibc-langpack-nn-2.39-46.el10_0.ppc64le.rpm
f96e3595afefb5915fa2137fe650581e1184afd0cc577075b0e10b1a24c2f5b2
glibc-langpack-nr-2.39-46.el10_0.ppc64le.rpm
357ac89c8f57373e2b20b6a2f8087231b2f8a1fa3ebc9f3a160030c621c0ca34
glibc-langpack-nso-2.39-46.el10_0.ppc64le.rpm
9e974a7fb86d762c73675efc5192507066c33772d1a95b50139e860ecab50523
glibc-langpack-oc-2.39-46.el10_0.ppc64le.rpm
5e9839375e0051bc1808fd7e29c67c6b8ccc6fc22b1db2b5165bc4836d3804a9
glibc-langpack-om-2.39-46.el10_0.ppc64le.rpm
107dd62a9fe60f7c6b850943b21882b141e618faeac42af5b41c25b4ccb7897f
glibc-langpack-or-2.39-46.el10_0.ppc64le.rpm
88bbff8bee8aafb155d625a87dba19af12b958fdc79708975334ee02c358e599
glibc-langpack-os-2.39-46.el10_0.ppc64le.rpm
dd222ed97c589eff55fb6aa362071fa5911fc4947db6bb89a48fa08f20c6a018
glibc-langpack-pa-2.39-46.el10_0.ppc64le.rpm
a7ff4aff73cd923ebda23d72da9ed87f07690c91e136375c12c621e0e5395873
glibc-langpack-pap-2.39-46.el10_0.ppc64le.rpm
e14e9a3612114cf789fed093322da67e237058264a05f0ee55b69cd736e8d1bb
glibc-langpack-pl-2.39-46.el10_0.ppc64le.rpm
6d7c19c0e5d3cdbbb8b3fbaa896fadd5db28496b30071c311a9fc752e37a98c3
glibc-langpack-ps-2.39-46.el10_0.ppc64le.rpm
642616c60d1e4254f767944ec85b6be5de77433c0e03c3f57f950d86638b003b
glibc-langpack-pt-2.39-46.el10_0.ppc64le.rpm
046e994f7720478132e79e8c997bdba8abf36bad55c36f163c8862f09a6a2c18
glibc-langpack-quz-2.39-46.el10_0.ppc64le.rpm
2601c24b010ea559b1bd749694b4518d6d48dbf67656bbfa17dc8e993093d132
glibc-langpack-raj-2.39-46.el10_0.ppc64le.rpm
2f848ac8aa31dbeaad6e3f415eafdc9425f144453877cebcc760245c61ea1c56
glibc-langpack-rif-2.39-46.el10_0.ppc64le.rpm
9a05f542355b26718bdc5b94bae649088401b918b613471904d12e44b2f2a2f1
glibc-langpack-ro-2.39-46.el10_0.ppc64le.rpm
07406d7afe8b5e6307faf00f6905e3fb0d9b56f23fe0af63b418665042d6ed4d
glibc-langpack-ru-2.39-46.el10_0.ppc64le.rpm
de09fee188a810ba38d7013fb74bba26c5375ec7f7729a959cc38d4f9d7f8883
glibc-langpack-rw-2.39-46.el10_0.ppc64le.rpm
590df17d2d8487b06a649762ca15a9c22b975b7f406cadbcc0f6cf6ac6f845d3
glibc-langpack-sa-2.39-46.el10_0.ppc64le.rpm
cfa38c37936c3c703b4c700972f644df62ea96e2c8c2d7877e573485720ada11
glibc-langpack-sah-2.39-46.el10_0.ppc64le.rpm
2750c3014f9570b68b89e0436cc1fb819982e3e2c07cb2739780efe34b61bebc
glibc-langpack-sat-2.39-46.el10_0.ppc64le.rpm
2b6b063912733d76ae44b26bf8320412bb59ab8bfaef4047d853d92448b4fa0a
glibc-langpack-sc-2.39-46.el10_0.ppc64le.rpm
645c8c691402baf8ea0716475a1f153b292a9e9ddda7404ab7bb72894c69d580
glibc-langpack-sd-2.39-46.el10_0.ppc64le.rpm
eed7a8fd2c00a58d04af97b4aab85001088d73d43f219c9cc2eda857bbf26ecc
glibc-langpack-se-2.39-46.el10_0.ppc64le.rpm
3120c4f1d3d27826a4b219ee582030b2f4b349863d3e4e06ba2d5dc743dd9db1
glibc-langpack-sgs-2.39-46.el10_0.ppc64le.rpm
0bf0f49884bb2366ce88a70bb1776363bc08335c5209e99dbacbea6cf8160ac1
glibc-langpack-shn-2.39-46.el10_0.ppc64le.rpm
20cab9f60bbbda1dba07f0e9172a8d4d249dfe079365fc3a19824d6fefb5150f
glibc-langpack-shs-2.39-46.el10_0.ppc64le.rpm
7081941a1e200101dedd1fcb62428dd75f45e4a147475ff217bd70508e40be14
glibc-langpack-si-2.39-46.el10_0.ppc64le.rpm
dbde9c1ee6731c382d84474ed6b3ef0bd3100ac9555bc114523f00f97ae40894
glibc-langpack-sid-2.39-46.el10_0.ppc64le.rpm
0540ad1985a5a201d24f24013bdf3b4e8d721f1593be8b918b510b32a3ac58fc
glibc-langpack-sk-2.39-46.el10_0.ppc64le.rpm
0fbf664065ab64e897a917c56e9d4a7a786c50e46727874ea6ab894356516aae
glibc-langpack-sl-2.39-46.el10_0.ppc64le.rpm
1c886dc80276a9b6567833b847cf6468955bc9886adeee0ddda3bc2c38f617c8
glibc-langpack-sm-2.39-46.el10_0.ppc64le.rpm
a66c375a5c437f3066e65e51386a8279b1496cd106f3536d1a4fa4d4c2752d09
glibc-langpack-so-2.39-46.el10_0.ppc64le.rpm
bb2b914f3d5fce941e31abfc33a4782379985425b86d8dbb62f13aced2ba4aae
glibc-langpack-sq-2.39-46.el10_0.ppc64le.rpm
9a7c04d47cdc9c6895545fe8ebed6fc52c97a9c26fbe1bbb2a6a5ca02b603b9d
glibc-langpack-sr-2.39-46.el10_0.ppc64le.rpm
bf1a1017a7a0536a64b7b6873f696d7cbf5be7a5bd8cfb1dceca0e6770f84ae6
glibc-langpack-ss-2.39-46.el10_0.ppc64le.rpm
9014c7c58fb54178a5407476332d87d757a85411c288c297f574e68297969041
glibc-langpack-ssy-2.39-46.el10_0.ppc64le.rpm
742b66aa083eeff43f19101387aeb95e7186627704bdf89cafa84c70af675d87
glibc-langpack-st-2.39-46.el10_0.ppc64le.rpm
75aef8a80ace2ff5aabda3119975db5ebf305f948251a22e81ab5879a98b317c
glibc-langpack-su-2.39-46.el10_0.ppc64le.rpm
94b6c03dfe040d87a327c424cb535ec42002ba3e0b25389605de6283d68178a6
glibc-langpack-sv-2.39-46.el10_0.ppc64le.rpm
964bf7b8d3155a6be7193a6fd2c4c3d93ce7446c04ed956a459197a544698fe7
glibc-langpack-sw-2.39-46.el10_0.ppc64le.rpm
5e323a508310aaef2400d57895502a79fbe7dafff8dace1d723b19abb153d512
glibc-langpack-syr-2.39-46.el10_0.ppc64le.rpm
efaf7491c6e66b7a754d46aa9919a4917007660550eb2fc930a56fe6a7fcd022
glibc-langpack-szl-2.39-46.el10_0.ppc64le.rpm
2f53d328a3f2819fa4b630fa81446e89832a293b25611764ae756c5d999ffa74
glibc-langpack-ta-2.39-46.el10_0.ppc64le.rpm
923c03a3a2062591221d154ec3ad80275d4ba626f80c2aa155d470c2b369fc9c
glibc-langpack-tcy-2.39-46.el10_0.ppc64le.rpm
1dbc0153fd4d9dc007530f1b54e4f74fcb60660f5d9d791c51c089c37a78ed85
glibc-langpack-te-2.39-46.el10_0.ppc64le.rpm
44faba82493a178afd028bca1f1ba8440bc39227128ea654b7be184a1b1b4eff
glibc-langpack-tg-2.39-46.el10_0.ppc64le.rpm
47d1d72e47ddb521f1aa5a176c09bf402b13502165b1850b021b15b2e7b8721e
glibc-langpack-th-2.39-46.el10_0.ppc64le.rpm
4f668549d6cb23d63c5a5d406361cff2ab12e2f536c3401d543a1158bf10d1b4
glibc-langpack-the-2.39-46.el10_0.ppc64le.rpm
85bbb4c7d780ee58fcdbca226d048ae6ad1bd358ae0c1b0581a737235cfdd155
glibc-langpack-ti-2.39-46.el10_0.ppc64le.rpm
b80514c8ec41c23bb2f58543939031d4e9d9caf2307f85865b135bc94c0d42c8
glibc-langpack-tig-2.39-46.el10_0.ppc64le.rpm
bf3799a2956e57a9f8113ff2fade998fd9b651d028d1a20103bf4d7df2888916
glibc-langpack-tk-2.39-46.el10_0.ppc64le.rpm
ffa584eff0645eafd567ae591917ec7e5d7db9a0e4392c5bd5fb445e0715eb52
glibc-langpack-tl-2.39-46.el10_0.ppc64le.rpm
1e3ca40ce5353b9ce2154683850efefe7573d7f1845a755c5ef24a8e1d946c02
glibc-langpack-tn-2.39-46.el10_0.ppc64le.rpm
f2aa912e33e8c82286e1a10522f30afa865fff74fc4d27e08afeb36503532b21
glibc-langpack-to-2.39-46.el10_0.ppc64le.rpm
8fd4f7693dd65c0f225ec8f7b8b0f384ea6899d9b7814cdc5e52d16a824a584d
glibc-langpack-tok-2.39-46.el10_0.ppc64le.rpm
95aeac5d35d6b75e59391e25297f955034f65beef1f47b17fc92962da861a635
glibc-langpack-tpi-2.39-46.el10_0.ppc64le.rpm
6867c597ee1989c31f0b6f11c8571e2c79f1ce6bfa05727ecbcb4a418c66ed7f
glibc-langpack-tr-2.39-46.el10_0.ppc64le.rpm
b8f9e25795e94c46bf325ae42e14b3de172573876ce936bb3833a6897aff7ba5
glibc-langpack-ts-2.39-46.el10_0.ppc64le.rpm
69f73e1ae3c3f0261fc504c85cf46434d14e4a98fc74d8deac20b2148bbd448e
glibc-langpack-tt-2.39-46.el10_0.ppc64le.rpm
e19ac760707c7f0abe975c2ff09760e98beaa4b4229dea3a33df68f3dba68fa1
glibc-langpack-ug-2.39-46.el10_0.ppc64le.rpm
5d7c997e4c147269431853f33e2bc36ee47b2dbc2af6ca1377d1f725a8636357
glibc-langpack-uk-2.39-46.el10_0.ppc64le.rpm
b8305c10d3f4a53aba521cfd8d90b3eae091df0e299856a0da8e1fc21b62679f
glibc-langpack-unm-2.39-46.el10_0.ppc64le.rpm
7d810fd325249019d54ba3eab548235a99dc5c12d8b611e17bb6a1c37253466d
glibc-langpack-ur-2.39-46.el10_0.ppc64le.rpm
fe70949e353d4baffa6818df0aa9f5d9450bb3c6d400a8f54e4ddaffd5436c01
glibc-langpack-uz-2.39-46.el10_0.ppc64le.rpm
ae75161ddaec5cbb8c46643eda15a9a098d073bbe8cf5885089dceca103a6bc9
glibc-langpack-ve-2.39-46.el10_0.ppc64le.rpm
ec6e893033d327f155c54b7d5215e632333c7fb91303bc31c44f76867fd9b42c
glibc-langpack-vi-2.39-46.el10_0.ppc64le.rpm
65cfef1c0faf41b0d83856002f8988f8061bb4908d1aa14cf54af3c4eccb8f17
glibc-langpack-wa-2.39-46.el10_0.ppc64le.rpm
553e138ad8cf230f63b3d2b2b31755c3c91a5d1423c634a73e881727ebc1acf6
glibc-langpack-wae-2.39-46.el10_0.ppc64le.rpm
8510e949c58478e309161c4bc94461259208e7332ab768f4f2933cda76da429b
glibc-langpack-wal-2.39-46.el10_0.ppc64le.rpm
6135e0c8b8994afbab14e07ff0d57c18d67075b51e55b8f1c555505266291c3c
glibc-langpack-wo-2.39-46.el10_0.ppc64le.rpm
c521e06d19dc22df3eac7797857a33c82546fa02f37fe4bf6ab7893a1c9d0b91
glibc-langpack-xh-2.39-46.el10_0.ppc64le.rpm
44392c1e3a9f5356536f25049d61b43767bf767959394fcd481bbb8fe3c670cf
glibc-langpack-yi-2.39-46.el10_0.ppc64le.rpm
d503fc1a6f2ef2866b59205e0c22b70f59d6922a6b0504098ecd67e43bca62b9
glibc-langpack-yo-2.39-46.el10_0.ppc64le.rpm
8a9fcd4a71163e62e1f98c00c501fce2beb14a9c8b84110d3d5b77ef13e42724
glibc-langpack-yue-2.39-46.el10_0.ppc64le.rpm
3af6f818832653fb0f8d3a1d99bb8c96090c9a6bff31b690a56e3d57c8c633a5
glibc-langpack-yuw-2.39-46.el10_0.ppc64le.rpm
b646cf79d2432871da161e985a348b944023da6c94d47c75f181bdd5acecfd92
glibc-langpack-zgh-2.39-46.el10_0.ppc64le.rpm
7aee2bafdcdf41aaa8a9df1a32b93d499840b1e467145e4a71f44648d5e71409
glibc-langpack-zh-2.39-46.el10_0.ppc64le.rpm
828355c26ad5ffa4b7fbe64b299b3ebf73886e7709c89d6f8415edfff23072e4
glibc-langpack-zu-2.39-46.el10_0.ppc64le.rpm
9608137a1927cc3a65c80bb09ca5bcb3ab85a462a733b8fcb50697fb57f96215
glibc-minimal-langpack-2.39-46.el10_0.ppc64le.rpm
6103af39cdcab5f2015dcec68c2918947c6b970568b01e07b584c0a81b8ef86f
libnsl-2.39-46.el10_0.ppc64le.rpm
f89ab91d6e91e8411557727d14c80f8fc2eb3f1e2944cfe11d506fd23fc1d293
RLSA-2025:13429
Moderate: libxml2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for libxml2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
The libxml2 library is a development toolbox providing the implementation of various XML standards.
The libxml2 library is a development toolbox providing the implementation of various XML standards.
Security Fix(es):
* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)
* libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libxml2-2.12.5-9.el10_0.ppc64le.rpm
826e835d2f4a81368de22d0c38f17325d79eb8a72f25f1973151f8748154a2c6
python3-libxml2-2.12.5-9.el10_0.ppc64le.rpm
1fa869d842cf77b26ce574c1465597649445556e1360a920646dcc30c7e2b9bd
RLSA-2025:13598
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/CPU/AMD: Terminate the erratum_1386_microcode array (CVE-2024-56721)
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: mm/hugetlb: unshare page tables during VMA split, not before (CVE-2025-38084)
* kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085)
* kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159)
* kernel: PCI/pwrctrl: Cancel outstanding rescan work when unregistering (CVE-2025-38137)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.27.1.el10_0.ppc64le.rpm
db299ec87e660bb1f9d37a8de263028c84e522c472c57d194df4cbf14da0c65a
kernel-abi-stablelists-6.12.0-55.27.1.el10_0.noarch.rpm
103e225b90a65633d92ed8bb323d75971c396476448104bb6157c5717feadfaf
kernel-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
d181ea70ac12645e83a73855a9a20e17ae5dde460d244e0cbb0bf96a74d4f0fb
kernel-debug-6.12.0-55.27.1.el10_0.ppc64le.rpm
f8711c811210e0e62e610ac7c1847fe0e804d455608bdc9a5497c1dc470fad52
kernel-debug-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
f321f9215ce5c997b51994ee3c3db054508deb5a13a004b4308e28cc2f007401
kernel-debuginfo-common-ppc64le-6.12.0-55.27.1.el10_0.ppc64le.rpm
5373fb4827cd0ee689f9a9f15323711868f8df13263217801a12317f5de91d9f
kernel-debug-modules-6.12.0-55.27.1.el10_0.ppc64le.rpm
7b2b7fb60832478f5f32c33d61d69a3479d29620458a3f3cf3069afb29f7cb1c
kernel-debug-modules-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
63e729131a8a4f8bda9bbf5be1902a0d1e6e6c32404f8314e173465e8771105c
kernel-debug-modules-extra-6.12.0-55.27.1.el10_0.ppc64le.rpm
76abab33fbb94b731ac440450e8e92d2cb9fcbdcdffc86fcac8900d29cc87f0d
kernel-modules-6.12.0-55.27.1.el10_0.ppc64le.rpm
cfab31559d706cb1520c483b437d991d3896a945cf672f0aa4d92e90722ee189
kernel-modules-core-6.12.0-55.27.1.el10_0.ppc64le.rpm
670da27f7fc35b5d47322038540dd3e5a5ddfb7f960fc538e97095d6e5bc6cd9
kernel-modules-extra-6.12.0-55.27.1.el10_0.ppc64le.rpm
3de931220b8d632e274a4299a0da92770638e52101b214c9df5147459fb5dd31
kernel-tools-6.12.0-55.27.1.el10_0.ppc64le.rpm
628b8ab1131d7366b93f5de6f61a47fc8fa5325d8a972cceb3ce4a79f68fb6cb
kernel-tools-libs-6.12.0-55.27.1.el10_0.ppc64le.rpm
10afeb1d27e748d8c6bd466276b58db1d5ae3a1125970388d0cae7254ac3b2fa
RLSA-2025:14137
Important: libarchive security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libarchive.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers.
Security Fix(es):
* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libarchive-3.7.7-4.el10_0.ppc64le.rpm
64c3b0d6bda1b93856fdd98ec45b010c6ded9e3504dbb797161d6778b070539f
RLSA-2025:14510
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.29.1.el10_0.ppc64le.rpm
5cfa0297b7dd51fbf93d166fe2b50c2b2fac0bc1273875dfbb644fc60c5f7a75
kernel-abi-stablelists-6.12.0-55.29.1.el10_0.noarch.rpm
d43ac768b2748622df3eb359b8e8ec7d9c91b27e8826d4eb77441a6730514393
kernel-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
af2819fbe5d146c39453674fd0a1a134e2c21a51c9b331bab44796fa042fb43d
kernel-debug-6.12.0-55.29.1.el10_0.ppc64le.rpm
c7c1d3ac004d690db7c785384d6f60eb2d089f474ae744a1d4d3d5d528e68af3
kernel-debug-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
cdbd642efa0cecb2a0869c68de9b62bde5d267aa83a11495b8a64aa56a7ef5e8
kernel-debuginfo-common-ppc64le-6.12.0-55.29.1.el10_0.ppc64le.rpm
6c64066b09187d7dd913a48ea8612b9afadbfbde177680d2ea84479443f34d58
kernel-debug-modules-6.12.0-55.29.1.el10_0.ppc64le.rpm
c5830d47fe0a847878e77c7f777fd55fd197126537ad77bd3d54bc1cb7854c92
kernel-debug-modules-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
d70ec83d8ddd01990c264db56defa30a4a7e772dc83d5b06f16766921b9a0fa1
kernel-debug-modules-extra-6.12.0-55.29.1.el10_0.ppc64le.rpm
b4bebacc650467888332863eb3081ffcf740ac91ccc23f8f960bcc849540a1c5
kernel-modules-6.12.0-55.29.1.el10_0.ppc64le.rpm
408633c855f3da2fb7df1be5026a82d634d128930953abc3f500867b1d826b50
kernel-modules-core-6.12.0-55.29.1.el10_0.ppc64le.rpm
e256a7f4c4d9a0799c0ae001e56b9b7a3389a002e306a68ebf38e0947ad2143a
kernel-modules-extra-6.12.0-55.29.1.el10_0.ppc64le.rpm
0e24a11e224fd490fbd6d414ac858fffea9c57a57722074f5518bd89256a3715
kernel-tools-6.12.0-55.29.1.el10_0.ppc64le.rpm
33d350e59532117ea779c6a3629a14d3bb94fb51c4ecbd7895fd72f274338669
kernel-tools-libs-6.12.0-55.29.1.el10_0.ppc64le.rpm
cf189d8ee0fa945d9038832fd62084bd01dc8b1e833353a21e4896f230643d7f
RLSA-2025:14984
Moderate: python3.12 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python3.12.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* cpython: Cpython infinite loop when parsing a tarfile (CVE-2025-8194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
python3-3.12.9-2.el10_0.3.ppc64le.rpm
3073cd2c3071eca5328599ae4591b7d73e37b76ce71fb612c0da74b0ca5f6b2c
python3-libs-3.12.9-2.el10_0.3.ppc64le.rpm
5ca8621ef3d0c805e8a9be860bcd7434950943b950604173e74bb9dd7ad65bf1
RLSA-2025:15005
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: ext4: only dirty folios when data journaling regular files (CVE-2025-38220)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.30.1.el10_0.ppc64le.rpm
f3a037912f41027c554c1d3fee86a9f552a8bc30895a877fd1325a0b7ed652e8
kernel-abi-stablelists-6.12.0-55.30.1.el10_0.noarch.rpm
f742a7fb5997ba7574774e9a007e41b387f5578f5d7e1cf9fd5ccf3d4a21970a
kernel-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
cce68d881fa5bcd5f07c466f5b1b5d58dc2403822b8df613c3e9cee6db590ecf
kernel-debug-6.12.0-55.30.1.el10_0.ppc64le.rpm
a90bdfdeb61394c7b2d5bd5e0ed173e14f31e25d74f7086aef248f0e177903a1
kernel-debug-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
f8224d28095f867203e7d8f4dc87ff700e5e258af2358991e5cb3b63d012fc14
kernel-debuginfo-common-ppc64le-6.12.0-55.30.1.el10_0.ppc64le.rpm
42d06633f0d76bbefe3ce99b2d1c4bc549f4e4d769a4e423a15ee86322359bf4
kernel-debug-modules-6.12.0-55.30.1.el10_0.ppc64le.rpm
ca9468b3d0763aff9ed398ec887cc47698964c72ee93e5dc9118466a5858ba3b
kernel-debug-modules-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
0912021fa846d81f5c4cfe15b544790b203f1dba4ff71629227197c14b7d7ddd
kernel-debug-modules-extra-6.12.0-55.30.1.el10_0.ppc64le.rpm
e91c3ee1443f18308df7796bb1de092929c5e689e9c657c6b52f3a1ca0eae3a5
kernel-modules-6.12.0-55.30.1.el10_0.ppc64le.rpm
ff1f89e9c60a6f75606521819b2de922071ad0dc60052ac9e78710cfb71e5df1
kernel-modules-core-6.12.0-55.30.1.el10_0.ppc64le.rpm
fabb1db6b508c0c3b4a1d90ed77e527ebd25e789ebae5ef0077950b67f9056d7
kernel-modules-extra-6.12.0-55.30.1.el10_0.ppc64le.rpm
42e3b6dbedaff711d713e235ecb16026d5d247a2df4f6ad6ee344831dda6fa00
kernel-tools-6.12.0-55.30.1.el10_0.ppc64le.rpm
7a63b468da1ffe5251c8a0289d275f9a33906439fdd84665632d27d7ea2534c2
kernel-tools-libs-6.12.0-55.30.1.el10_0.ppc64le.rpm
d5fa2f4b2bfab262cb0ed552d16cd251f32cbac092be6fca7b949f8bae1beb60
RLSA-2025:15662
Important: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.32.1.el10_0.ppc64le.rpm
ba144aa5be238478a3a0d7ff3e1ff8ba4129a6272b386add366b4fdea129163c
kernel-abi-stablelists-6.12.0-55.32.1.el10_0.noarch.rpm
a6b4f441a96e9642f6db6defdccfa9ff87ad9b1fc36a54c3753ce2a917e04b2b
kernel-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
f950e42db633bf71e7aa11a146cffa15457e15bd675182acc78449b33b06288d
kernel-debug-6.12.0-55.32.1.el10_0.ppc64le.rpm
159cf0dd6932eea680c199801cb3ca36bd1eed5a280578bf61ff308498150583
kernel-debug-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
bb2717ae98d479559f33574c79739ebbd13d37285d63ed7cdf2ce0dca186b90f
kernel-debuginfo-common-ppc64le-6.12.0-55.32.1.el10_0.ppc64le.rpm
1d69f9ed33da0d37884fff7f80a305afada9f2c75ec11457596db6e4af8da71c
kernel-debug-modules-6.12.0-55.32.1.el10_0.ppc64le.rpm
6eebbe6082312e0caafc9532bcd5bf3ab7c061677cdde459c08afd2872de4efb
kernel-debug-modules-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
c662e9389461ba58fc6412cf8af441a198ae150c7dd07d804d9478d860624919
kernel-debug-modules-extra-6.12.0-55.32.1.el10_0.ppc64le.rpm
f642f265fdc2cdb9e5bf02325d12963a9bf0f96576448fa13cb78ef9bd47071e
kernel-modules-6.12.0-55.32.1.el10_0.ppc64le.rpm
47214c46e30d259e66b36fd65ec9a08813f1a91f493d30ffe179ebbb153e9901
kernel-modules-core-6.12.0-55.32.1.el10_0.ppc64le.rpm
dbcf202b0ba458edfeaeeee350c6fe0efc33c959051753abfbe72968c797264c
kernel-modules-extra-6.12.0-55.32.1.el10_0.ppc64le.rpm
2cf0cd3ef042c5ba8386bc769de66497d8eece07fc6149a8ed5b8acb70e2ba60
kernel-tools-6.12.0-55.32.1.el10_0.ppc64le.rpm
69e3d7bc584f97beff7949446125936eba5ba6fbda23a61ef72688b22eeb9e58
kernel-tools-libs-6.12.0-55.32.1.el10_0.ppc64le.rpm
612c7d5d33fc8f5a912ed1a4811146b85cc1f94d0eb3a53b211415a6c5ce395b
RLSA-2025:15701
Important: cups security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for cups.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The Common UNIX Printing System (CUPS) provides a portable printing layer for
Linux, UNIX, and similar operating systems.
Security Fix(es):
* cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364)
* cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
cups-filesystem-2.4.10-11.el10_0.1.noarch.rpm
a4fe89f7fd2592e1ef37deb6384821fe94250ba52e9407ab8fa954e7a37d6e44
cups-libs-2.4.10-11.el10_0.1.ppc64le.rpm
99df3ac2cc4a991bfda6fb28aba93c9d18923ea2917ab0bde42b6c29f5f5dcb2
RLSA-2025:16115
Moderate: gnutls security, bug fix, and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for gnutls.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
Security Fix(es):
* gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (CVE-2025-32989)
* gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395)
Bug Fix(es) and Enhancement(s):
* gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620)
* gnutls: Vulnerability in GnuTLS SCT extension parsing (BZ#2359621)
* gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622)
* gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
gnutls-3.8.9-9.el10_0.14.ppc64le.rpm
bc9c27d52ffc67f9eff581b20395d4a1dd05e84b08d79359d070cf2ff15a03c1
RLSA-2025:16354
Moderate: kernel security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: usb: dwc3: gadget: check that event count does not exceed event buffer length (CVE-2025-37810)
* kernel: sunrpc: fix handling of server side tls alerts (CVE-2025-38566)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
kernel-6.12.0-55.34.1.el10_0.ppc64le.rpm
8f632382a2b86aa048f9e7338c6dc98a3ecf6f0a1f6f37c80ee8d5a65d688687
kernel-abi-stablelists-6.12.0-55.34.1.el10_0.noarch.rpm
2d0c854b2bb9019a7934a737a138706548de482d4ee94cf08d8fa677a42bd720
kernel-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
e4cc5281c02583e5e54fe2b52e447cf611624c0cd23d3b5d736bf58621e74da9
kernel-debug-6.12.0-55.34.1.el10_0.ppc64le.rpm
e923ceebfc27ca376873f791433197a02c398dbd60af6acf64bf9190f54a9b68
kernel-debug-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
3637e2dd0bb0fb0986104463b1828cf2a5e162518ed15ba6c3aef0b2aa374970
kernel-debuginfo-common-ppc64le-6.12.0-55.34.1.el10_0.ppc64le.rpm
11638875427c68b6125bde0a1e0703848c47e5c32f5b57a3e0a5598e9e4fc35c
kernel-debug-modules-6.12.0-55.34.1.el10_0.ppc64le.rpm
166c29e0d768ad852281f68de9b375f563c0b5c6927ccacd32d4481fc5ca9f49
kernel-debug-modules-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
e4ff104a4980eb06766c6be8ba60243b43e48a411635abff7e565fe51de78ff1
kernel-debug-modules-extra-6.12.0-55.34.1.el10_0.ppc64le.rpm
c8b2204665d91ba3c1c95b1cb1ac76fa38933048411b6237bef2b7b085ac5490
kernel-modules-6.12.0-55.34.1.el10_0.ppc64le.rpm
95f7baf34ba67abeb978729d4271a2ab04fa4dfedc618426e9a4c76f742117ab
kernel-modules-core-6.12.0-55.34.1.el10_0.ppc64le.rpm
f76bd3e69800841056bfd80fe430477b60109d0f40a8106aba2c3107a115168a
kernel-modules-extra-6.12.0-55.34.1.el10_0.ppc64le.rpm
5826df315a9df45ab355d45bc849644cdd55f6ab752623c05271ba96b2c17677
kernel-tools-6.12.0-55.34.1.el10_0.ppc64le.rpm
1f09ba9272f1c6d70e5cff508274c73b7fdd6aa61314c126fe95b76c51d65cf1
kernel-tools-libs-6.12.0-55.34.1.el10_0.ppc64le.rpm
3853c53b5eb9f5853185a5377cabc3bfc9d0d664aea94e22aefa9697f0d551d0
RLSA-2025:16441
Moderate: avahi security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for avahi.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers.
Security Fix(es):
* avahi: Avahi Wide-Area DNS Uses Constant Source Port (CVE-2024-52615)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
avahi-0.9~rc2-1.el10_0.1.ppc64le.rpm
b374b53ee595b33605148f5dc6a1d64eba62611b6465d5db1421128a1e6d6a48
avahi-libs-0.9~rc2-1.el10_0.1.ppc64le.rpm
6ce5824985c88aa0cab833744571b581b430cc6ab10da0cacd3bccba73ca45db
RLBA-2025:6631
Important:libndp bug fix and enhancement update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Important
An update is available for libndp.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 10.0 Release Notes linked from the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
libndp-1.9-2.el10.ppc64le.rpm
ae6b2515de6c740f6b33a3f74f4c1459db2e1864207c12722f6825e29233a613
RLSA-2025:9421
Moderate: iputils security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for iputils.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The iputils packages contain basic utilities for monitoring a network, including ping.
Security Fix(es):
* iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping (CVE-2025-47268)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
iputils-20240905-2.el10_0.1.ppc64le.rpm
089345600cb48ea322fb1c08bd7f1d0bfb4e94043e82c69dceb7f17771421037
RLSA-2025:9940
Moderate: python-setuptools security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-setuptools.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
python3-setuptools-69.0.3-12.el10_0.noarch.rpm
5758dd07716f97ad0407a420fdcba09fcd404e45e6057a86857d0bcb097cd546
RLSA-2025:12882
Moderate: jq security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for jq.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
jq is a lightweight and flexible command-line JSON processor. jq is like sed for JSON data. You can use it to slice, filter, map, or transform structured data with the same ease that sed, awk, grep, or similar applications allow you to manipulate text.
Security Fix(es):
* jq: jq has signed integer overflow in jv.c:jvp_array_write (CVE-2024-23337)
* jq: AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) (CVE-2025-48060)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
jq-1.7.1-8.el10_0.1.ppc64le.rpm
eeda4de411e8f130857080c629bc9b2dd143ca521586a756e7b4b13dc34fe03d
RLSA-2025:13604
Moderate: python-requests security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for python-requests.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
python3-requests-2.32.4-1.el10_0.noarch.rpm
6bc0b230ed59e17f7d3ee0c140576d09279eaacec22faa70d3df9b9dab847de9
RLSA-2025:16154
Moderate: grub2 security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10
1
Moderate
An update is available for grub2.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: grub-core/gettext: Integer overflow leads to Heap OOB Write and Read. (CVE-2024-45776)
* grub2: fs/ufs: OOB write in the heap (CVE-2024-45781)
* grub2: command/gpg: Use-after-free due to hooks not being removed on module unload (CVE-2025-0622)
* grub2: UFS: Integer overflow may lead to heap based out-of-bounds write when handling symlinks (CVE-2025-0677)
* grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled (CVE-2025-1118)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-0-ppc64le-baseos-rpms
grub2-common-2.12-15.el10_0.noarch.rpm
c435812cdc3f0f6def3b10549182d348026c80cd2c20971c6f7adc445642680b
grub2-efi-aa64-modules-2.12-15.el10_0.noarch.rpm
e6036e46b79433146aa7298e8b96cf62b80aff1c2b0dc0e0e76989586cba2765
grub2-efi-x64-modules-2.12-15.el10_0.noarch.rpm
04c6a16622d66d7156d1c5445cb0b0f5ed5984554e05707b2e6282651ba5f0c9
grub2-ppc64le-2.12-15.el10_0.ppc64le.rpm
37d7062daeda420e8accfa3082e804be4f29804ad49f72289736b4d022e69f7e
grub2-ppc64le-modules-2.12-15.el10_0.noarch.rpm
e693c5e17b670742d48f523a4488117f6b1110ab7026313feffa723d9a6da72a
grub2-tools-2.12-15.el10_0.ppc64le.rpm
f3690f5c6763c74cb9fc00cd24e8de187992e8b72febe52eb7bcb6bb97ac89c7
grub2-tools-extra-2.12-15.el10_0.ppc64le.rpm
318b71c4e4f0798815ce166d51343cb70ce3d4ab60b58bd9c8fc25c9a98a08bc
grub2-tools-minimal-2.12-15.el10_0.ppc64le.rpm
e06f328dc9d8b4bff6109057c91b6855d14773c97c3760914de24f24395089a3