RLBA-2019:3337 perl:5.24 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Locale-Codes, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-B-Debug, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2019:3511 libvarlink bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libvarlink. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libvarlink-18-3.el8.aarch64.rpm eefac8affba9f0ffe661e20b095f8a311eb454880c7514edea46b19289ba9e20 libvarlink-18-3.el8.aarch64.rpm eefac8affba9f0ffe661e20b095f8a311eb454880c7514edea46b19289ba9e20 libvarlink-18-3.el8.aarch64.rpm eefac8affba9f0ffe661e20b095f8a311eb454880c7514edea46b19289ba9e20 libvarlink-18-3.el8.aarch64.rpm eefac8affba9f0ffe661e20b095f8a311eb454880c7514edea46b19289ba9e20 libvarlink-util-18-3.el8.aarch64.rpm f3258bbd49606763bacb796b2ca9fcdfb93d1f2af2263eef51f4aa617525c0f9 libvarlink-util-18-3.el8.aarch64.rpm f3258bbd49606763bacb796b2ca9fcdfb93d1f2af2263eef51f4aa617525c0f9 libvarlink-util-18-3.el8.aarch64.rpm f3258bbd49606763bacb796b2ca9fcdfb93d1f2af2263eef51f4aa617525c0f9 libvarlink-util-18-3.el8.aarch64.rpm f3258bbd49606763bacb796b2ca9fcdfb93d1f2af2263eef51f4aa617525c0f9 RLBA-2019:3522 perl-DBD-SQLite bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-SQLite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLBA-2019:3529 perl-Math-BigInt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Math-BigInt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac perl-Math-BigInt-1.9998.11-7.el8.noarch.rpm 82617df25205152bd4ee84d79532fd64d6021fbdb125b21fab5e93938a520dac RLBA-2019:3537 checkpolicy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for checkpolicy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms checkpolicy-2.9-1.el8.aarch64.rpm 85a92ea40d179d5c8d575353016577773b38797ed48d3220b795a0610c9bcb4a checkpolicy-2.9-1.el8.aarch64.rpm 85a92ea40d179d5c8d575353016577773b38797ed48d3220b795a0610c9bcb4a checkpolicy-2.9-1.el8.aarch64.rpm 85a92ea40d179d5c8d575353016577773b38797ed48d3220b795a0610c9bcb4a checkpolicy-2.9-1.el8.aarch64.rpm 85a92ea40d179d5c8d575353016577773b38797ed48d3220b795a0610c9bcb4a RLBA-2019:3546 perl-Socket bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Socket. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms perl-Socket-2.027-3.el8.aarch64.rpm 625e2506fc309b87c95b87aee1e9cc7a4b19e08f9806abc5e330416fa821bb4c perl-Socket-2.027-3.el8.aarch64.rpm 625e2506fc309b87c95b87aee1e9cc7a4b19e08f9806abc5e330416fa821bb4c perl-Socket-2.027-3.el8.aarch64.rpm 625e2506fc309b87c95b87aee1e9cc7a4b19e08f9806abc5e330416fa821bb4c perl-Socket-2.027-3.el8.aarch64.rpm 625e2506fc309b87c95b87aee1e9cc7a4b19e08f9806abc5e330416fa821bb4c RLSA-2019:3553 Low: GNOME security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pidgin, gnome-desktop3, pango, gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * evince: uninitialized memory use in function tiff_document_render() and tiff_document_get_thumbnail() (CVE-2019-11459) * gvfs: improper authorization in daemon/gvfsdaemon.c in gvfsd (CVE-2019-12795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms gdk-pixbuf2-2.36.12-5.el8.aarch64.rpm a826981c0a518d67df3e9c947cfb96bc61b09b19a601272c8206bcde4eb9f849 gdk-pixbuf2-2.36.12-5.el8.aarch64.rpm a826981c0a518d67df3e9c947cfb96bc61b09b19a601272c8206bcde4eb9f849 gdk-pixbuf2-2.36.12-5.el8.aarch64.rpm a826981c0a518d67df3e9c947cfb96bc61b09b19a601272c8206bcde4eb9f849 gdk-pixbuf2-2.36.12-5.el8.aarch64.rpm a826981c0a518d67df3e9c947cfb96bc61b09b19a601272c8206bcde4eb9f849 RLBA-2019:3558 libzfcphbaapi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhbaapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libhbaapi-2.2.9-13.el8.aarch64.rpm 2a982d38686268ce946a35b140323843b41bcf4f86f04e15a2c6f2592172d109 libhbaapi-2.2.9-13.el8.aarch64.rpm 2a982d38686268ce946a35b140323843b41bcf4f86f04e15a2c6f2592172d109 libhbaapi-2.2.9-13.el8.aarch64.rpm 2a982d38686268ce946a35b140323843b41bcf4f86f04e15a2c6f2592172d109 libhbaapi-2.2.9-13.el8.aarch64.rpm 2a982d38686268ce946a35b140323843b41bcf4f86f04e15a2c6f2592172d109 RLBA-2019:3593 ipset bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipset. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms ipset-7.1-1.el8.aarch64.rpm 0a2b56f8aa34fad5ee219a692eccc91d300286b8b63b18937f16c413267c3ec0 ipset-7.1-1.el8.aarch64.rpm 0a2b56f8aa34fad5ee219a692eccc91d300286b8b63b18937f16c413267c3ec0 ipset-7.1-1.el8.aarch64.rpm 0a2b56f8aa34fad5ee219a692eccc91d300286b8b63b18937f16c413267c3ec0 ipset-7.1-1.el8.aarch64.rpm 0a2b56f8aa34fad5ee219a692eccc91d300286b8b63b18937f16c413267c3ec0 ipset-libs-7.1-1.el8.aarch64.rpm 353a637a19c14f9cd5a3bc8bb0d4c2c94b45ddbdebcff2d40c350e076f4bb23b ipset-libs-7.1-1.el8.aarch64.rpm 353a637a19c14f9cd5a3bc8bb0d4c2c94b45ddbdebcff2d40c350e076f4bb23b ipset-libs-7.1-1.el8.aarch64.rpm 353a637a19c14f9cd5a3bc8bb0d4c2c94b45ddbdebcff2d40c350e076f4bb23b ipset-libs-7.1-1.el8.aarch64.rpm 353a637a19c14f9cd5a3bc8bb0d4c2c94b45ddbdebcff2d40c350e076f4bb23b ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 ipset-service-7.1-1.el8.noarch.rpm c27a504f0f765f19fb497beca34aff75a1363875f3c5df788932c1be6561e193 RLEA-2019:3608 libaio bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libaio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libaio-0.3.112-1.el8.aarch64.rpm da76d734ed31d9ec6899557ae3aa2c2e5112c15ba906136d4318953bcb75d1d9 libaio-0.3.112-1.el8.aarch64.rpm da76d734ed31d9ec6899557ae3aa2c2e5112c15ba906136d4318953bcb75d1d9 libaio-0.3.112-1.el8.aarch64.rpm da76d734ed31d9ec6899557ae3aa2c2e5112c15ba906136d4318953bcb75d1d9 libaio-0.3.112-1.el8.aarch64.rpm da76d734ed31d9ec6899557ae3aa2c2e5112c15ba906136d4318953bcb75d1d9 libaio-devel-0.3.112-1.el8.aarch64.rpm 4ba0ee7717a098b88567c1d3d59c881869a3331c54cba51c293f64599e7d2f79 libaio-devel-0.3.112-1.el8.aarch64.rpm 4ba0ee7717a098b88567c1d3d59c881869a3331c54cba51c293f64599e7d2f79 libaio-devel-0.3.112-1.el8.aarch64.rpm 4ba0ee7717a098b88567c1d3d59c881869a3331c54cba51c293f64599e7d2f79 libaio-devel-0.3.112-1.el8.aarch64.rpm 4ba0ee7717a098b88567c1d3d59c881869a3331c54cba51c293f64599e7d2f79 RLBA-2019:3614 dbus-python bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus-python. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms python3-dbus-1.2.4-15.el8.aarch64.rpm 8865a9e80253f34442bfee4070e82cd34f774c26888f95db85703b4a8e374ce5 python3-dbus-1.2.4-15.el8.aarch64.rpm 8865a9e80253f34442bfee4070e82cd34f774c26888f95db85703b4a8e374ce5 python3-dbus-1.2.4-15.el8.aarch64.rpm 8865a9e80253f34442bfee4070e82cd34f774c26888f95db85703b4a8e374ce5 python3-dbus-1.2.4-15.el8.aarch64.rpm 8865a9e80253f34442bfee4070e82cd34f774c26888f95db85703b4a8e374ce5 RLBA-2019:3616 system-storage-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for system-storage-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f system-storage-manager-1.4-1.el8.noarch.rpm 6835176006659b793a75dc19ce08b04961a20f51ee71f01f4b369b3ff666194f RLBA-2019:3621 libidn2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libidn2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libidn2-2.2.0-1.el8.aarch64.rpm aa0cb5360ef9778dcc983ec8bb5e007829fd6345b855506ce807c760cef9b394 libidn2-2.2.0-1.el8.aarch64.rpm aa0cb5360ef9778dcc983ec8bb5e007829fd6345b855506ce807c760cef9b394 libidn2-2.2.0-1.el8.aarch64.rpm aa0cb5360ef9778dcc983ec8bb5e007829fd6345b855506ce807c760cef9b394 libidn2-2.2.0-1.el8.aarch64.rpm aa0cb5360ef9778dcc983ec8bb5e007829fd6345b855506ce807c760cef9b394 RLBA-2019:3627 python-schedutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-schedutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms python3-schedutils-0.6-6.el8.aarch64.rpm ce7de99e86be728beb50ea2d48bc8ae96057a7820c0490bc75d2dcd56af0c1c9 python3-schedutils-0.6-6.el8.aarch64.rpm ce7de99e86be728beb50ea2d48bc8ae96057a7820c0490bc75d2dcd56af0c1c9 python3-schedutils-0.6-6.el8.aarch64.rpm ce7de99e86be728beb50ea2d48bc8ae96057a7820c0490bc75d2dcd56af0c1c9 python3-schedutils-0.6-6.el8.aarch64.rpm ce7de99e86be728beb50ea2d48bc8ae96057a7820c0490bc75d2dcd56af0c1c9 RLBA-2019:3634 blktrace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms blktrace-1.2.0-10.el8.aarch64.rpm 54ae41a6892ff437cd7507501c24fb7e7a12ff43df79b85616cdb647b50269f2 blktrace-1.2.0-10.el8.aarch64.rpm 54ae41a6892ff437cd7507501c24fb7e7a12ff43df79b85616cdb647b50269f2 blktrace-1.2.0-10.el8.aarch64.rpm 54ae41a6892ff437cd7507501c24fb7e7a12ff43df79b85616cdb647b50269f2 blktrace-1.2.0-10.el8.aarch64.rpm 54ae41a6892ff437cd7507501c24fb7e7a12ff43df79b85616cdb647b50269f2 RLSA-2019:3643 Low: gettext security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for gettext. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gettext packages provide a documentation for producing multi-lingual messages in programs, set of conventions about how programs should be written, a runtime library, and a directory and file naming organization for the message catalogs. Security Fix(es): * gettext: double free in default_add_message in read-catalog.c (CVE-2018-18751) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms gettext-0.19.8.1-17.el8.aarch64.rpm 1eff0d87b3a2c04af01d5366fa2b0e0e44d04c1d8d817303034d4957bc92446e gettext-0.19.8.1-17.el8.aarch64.rpm 1eff0d87b3a2c04af01d5366fa2b0e0e44d04c1d8d817303034d4957bc92446e gettext-0.19.8.1-17.el8.aarch64.rpm 1eff0d87b3a2c04af01d5366fa2b0e0e44d04c1d8d817303034d4957bc92446e gettext-0.19.8.1-17.el8.aarch64.rpm 1eff0d87b3a2c04af01d5366fa2b0e0e44d04c1d8d817303034d4957bc92446e gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-common-devel-0.19.8.1-17.el8.noarch.rpm 00aec0a07ca43972cc76a3834fc316c0104406b22bee150439c8b2746b1b4522 gettext-devel-0.19.8.1-17.el8.aarch64.rpm 9228e47301a7d17a84388335781d21930961bf8ecf8bfe7b86a36abcf3e3c46f gettext-devel-0.19.8.1-17.el8.aarch64.rpm 9228e47301a7d17a84388335781d21930961bf8ecf8bfe7b86a36abcf3e3c46f gettext-devel-0.19.8.1-17.el8.aarch64.rpm 9228e47301a7d17a84388335781d21930961bf8ecf8bfe7b86a36abcf3e3c46f gettext-devel-0.19.8.1-17.el8.aarch64.rpm 9228e47301a7d17a84388335781d21930961bf8ecf8bfe7b86a36abcf3e3c46f gettext-libs-0.19.8.1-17.el8.aarch64.rpm a6b06b4f33a3d0de31e4bcfac261ba4606105c437da6ba3cdf2ffd4fca3bef1d gettext-libs-0.19.8.1-17.el8.aarch64.rpm a6b06b4f33a3d0de31e4bcfac261ba4606105c437da6ba3cdf2ffd4fca3bef1d gettext-libs-0.19.8.1-17.el8.aarch64.rpm a6b06b4f33a3d0de31e4bcfac261ba4606105c437da6ba3cdf2ffd4fca3bef1d gettext-libs-0.19.8.1-17.el8.aarch64.rpm a6b06b4f33a3d0de31e4bcfac261ba4606105c437da6ba3cdf2ffd4fca3bef1d RLBA-2019:3645 gmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms gmp-6.1.2-10.el8.aarch64.rpm 71df60a64752e3624879da78d1148e416510992872c4a62eedbe830d0331a238 gmp-6.1.2-10.el8.aarch64.rpm 71df60a64752e3624879da78d1148e416510992872c4a62eedbe830d0331a238 gmp-6.1.2-10.el8.aarch64.rpm 71df60a64752e3624879da78d1148e416510992872c4a62eedbe830d0331a238 gmp-6.1.2-10.el8.aarch64.rpm 71df60a64752e3624879da78d1148e416510992872c4a62eedbe830d0331a238 gmp-c++-6.1.2-10.el8.aarch64.rpm 502a470b708be3f50328810e8f921fe843e7824f4fcb9e26fad5a7bd7b574679 gmp-c++-6.1.2-10.el8.aarch64.rpm 502a470b708be3f50328810e8f921fe843e7824f4fcb9e26fad5a7bd7b574679 gmp-c++-6.1.2-10.el8.aarch64.rpm 502a470b708be3f50328810e8f921fe843e7824f4fcb9e26fad5a7bd7b574679 gmp-c++-6.1.2-10.el8.aarch64.rpm 502a470b708be3f50328810e8f921fe843e7824f4fcb9e26fad5a7bd7b574679 gmp-devel-6.1.2-10.el8.aarch64.rpm e124830c0b3bd4fa020a931300ecbc4b6fd626622fc716a98caf6d13823f7b60 gmp-devel-6.1.2-10.el8.aarch64.rpm e124830c0b3bd4fa020a931300ecbc4b6fd626622fc716a98caf6d13823f7b60 gmp-devel-6.1.2-10.el8.aarch64.rpm e124830c0b3bd4fa020a931300ecbc4b6fd626622fc716a98caf6d13823f7b60 gmp-devel-6.1.2-10.el8.aarch64.rpm e124830c0b3bd4fa020a931300ecbc4b6fd626622fc716a98caf6d13823f7b60 RLBA-2019:3664 nfs4-acl-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs4-acl-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms nfs4-acl-tools-0.3.5-3.el8.aarch64.rpm 9f5ae78a3c9d4be4c32e42cbdd2ab5a0acb6a942fc0b7fb9a75a8cdfa30ad0a6 nfs4-acl-tools-0.3.5-3.el8.aarch64.rpm 9f5ae78a3c9d4be4c32e42cbdd2ab5a0acb6a942fc0b7fb9a75a8cdfa30ad0a6 nfs4-acl-tools-0.3.5-3.el8.aarch64.rpm 9f5ae78a3c9d4be4c32e42cbdd2ab5a0acb6a942fc0b7fb9a75a8cdfa30ad0a6 nfs4-acl-tools-0.3.5-3.el8.aarch64.rpm 9f5ae78a3c9d4be4c32e42cbdd2ab5a0acb6a942fc0b7fb9a75a8cdfa30ad0a6 RLBA-2019:3667 mtr bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtr. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms mtr-0.92-3.el8.aarch64.rpm d64bb179e1f8050d4e9695581256daeb1703f5b903a363a6529d85a824faae2f mtr-0.92-3.el8.aarch64.rpm d64bb179e1f8050d4e9695581256daeb1703f5b903a363a6529d85a824faae2f mtr-0.92-3.el8.aarch64.rpm d64bb179e1f8050d4e9695581256daeb1703f5b903a363a6529d85a824faae2f mtr-0.92-3.el8.aarch64.rpm d64bb179e1f8050d4e9695581256daeb1703f5b903a363a6529d85a824faae2f RLEA-2019:3677 isns-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for isns-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms isns-utils-0.99-1.el8.aarch64.rpm dcadba74a2077c3053b21afaf641ec94fa195aaccfcebcc3b249f19a962bf7d1 isns-utils-0.99-1.el8.aarch64.rpm dcadba74a2077c3053b21afaf641ec94fa195aaccfcebcc3b249f19a962bf7d1 isns-utils-0.99-1.el8.aarch64.rpm dcadba74a2077c3053b21afaf641ec94fa195aaccfcebcc3b249f19a962bf7d1 isns-utils-0.99-1.el8.aarch64.rpm dcadba74a2077c3053b21afaf641ec94fa195aaccfcebcc3b249f19a962bf7d1 isns-utils-devel-0.99-1.el8.aarch64.rpm 3372f3ade84baf469852bda0060204047162e39785eabec0edc7cdec09c908f0 isns-utils-devel-0.99-1.el8.aarch64.rpm 3372f3ade84baf469852bda0060204047162e39785eabec0edc7cdec09c908f0 isns-utils-devel-0.99-1.el8.aarch64.rpm 3372f3ade84baf469852bda0060204047162e39785eabec0edc7cdec09c908f0 isns-utils-devel-0.99-1.el8.aarch64.rpm 3372f3ade84baf469852bda0060204047162e39785eabec0edc7cdec09c908f0 isns-utils-libs-0.99-1.el8.aarch64.rpm 9f55208fcf4b82fcd97186b2aee678e3161d6ab96aec0d72b5670464b375f6df isns-utils-libs-0.99-1.el8.aarch64.rpm 9f55208fcf4b82fcd97186b2aee678e3161d6ab96aec0d72b5670464b375f6df isns-utils-libs-0.99-1.el8.aarch64.rpm 9f55208fcf4b82fcd97186b2aee678e3161d6ab96aec0d72b5670464b375f6df isns-utils-libs-0.99-1.el8.aarch64.rpm 9f55208fcf4b82fcd97186b2aee678e3161d6ab96aec0d72b5670464b375f6df RLBA-2019:3693 python-requests bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-requests package contains a library designed to make HTTP requests easy for developers. Bug fix: * The fix CVE-2018-18074 leads to a regression (BZ#1758261) none-baseos-rpms python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 python3-requests-2.20.0-2.1.el8_1.noarch.rpm 434ac8be98ac8d57adf6abcbe21ffd2227856dbc6f8adfb525f6595697248e40 RLSA-2020:0633 Important: ppp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ppp packages contain the Point-to-Point Protocol (PPP) daemon and documentation for PPP support. The PPP protocol provides a method for transmitting datagrams over serial point-to-point links. PPP is usually used to dial in to an Internet Service Provider (ISP) or other organization over a modem and phone line. Security Fix(es): * ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc RLSA-2020:0902 Important: icu security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for icu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The International Components for Unicode (ICU) library provides robust and full-featured Unicode services. Security Fix(es): * ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms icu-60.3-2.el8_1.aarch64.rpm ffc8c07efaa33ccf0ca1a5742254b5bb1e2e067c443362d031f9cfd0919ad777 icu-60.3-2.el8_1.aarch64.rpm ffc8c07efaa33ccf0ca1a5742254b5bb1e2e067c443362d031f9cfd0919ad777 icu-60.3-2.el8_1.aarch64.rpm ffc8c07efaa33ccf0ca1a5742254b5bb1e2e067c443362d031f9cfd0919ad777 icu-60.3-2.el8_1.aarch64.rpm ffc8c07efaa33ccf0ca1a5742254b5bb1e2e067c443362d031f9cfd0919ad777 libicu-60.3-2.el8_1.aarch64.rpm cf3e51d81ade44c08d4e0656622e72182ac946ef2dc13e69c7219b6c87b451bd libicu-60.3-2.el8_1.aarch64.rpm cf3e51d81ade44c08d4e0656622e72182ac946ef2dc13e69c7219b6c87b451bd libicu-60.3-2.el8_1.aarch64.rpm cf3e51d81ade44c08d4e0656622e72182ac946ef2dc13e69c7219b6c87b451bd libicu-60.3-2.el8_1.aarch64.rpm cf3e51d81ade44c08d4e0656622e72182ac946ef2dc13e69c7219b6c87b451bd libicu-devel-60.3-2.el8_1.aarch64.rpm b1f56820b30ab248d7c27c2eef95a93c33fe13bfc9f903105749b558c71401a6 libicu-devel-60.3-2.el8_1.aarch64.rpm b1f56820b30ab248d7c27c2eef95a93c33fe13bfc9f903105749b558c71401a6 libicu-devel-60.3-2.el8_1.aarch64.rpm b1f56820b30ab248d7c27c2eef95a93c33fe13bfc9f903105749b558c71401a6 libicu-devel-60.3-2.el8_1.aarch64.rpm b1f56820b30ab248d7c27c2eef95a93c33fe13bfc9f903105749b558c71401a6 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 libicu-doc-60.3-2.el8_1.noarch.rpm 908efbbf91c8e9a3d1c251953517668211a0fad7f64e821df091083f1e3fd995 RLBA-2020:1759 newt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for newt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms newt-0.52.20-11.el8.aarch64.rpm fce833e684bdc6bc0f5535938c1c6f51193a72d7e8639b7f5df8671630463c38 newt-0.52.20-11.el8.aarch64.rpm fce833e684bdc6bc0f5535938c1c6f51193a72d7e8639b7f5df8671630463c38 newt-0.52.20-11.el8.aarch64.rpm fce833e684bdc6bc0f5535938c1c6f51193a72d7e8639b7f5df8671630463c38 newt-0.52.20-11.el8.aarch64.rpm fce833e684bdc6bc0f5535938c1c6f51193a72d7e8639b7f5df8671630463c38 RLSA-2020:1766 Moderate: GNOME security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for mozjs52, gnome-tweaks, clutter, gnome-menus, mozjs60, baobab. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. Security Fix(es): * LibRaw: stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp (CVE-2018-20337) * gdm: lock screen bypass when timed login is enabled (CVE-2019-3825) * gvfs: mishandling of file ownership in daemon/gvfsbackendadmin.c (CVE-2019-12447) * gvfs: race condition in daemon/gvfsbackendadmin.c due to admin backend not implementing query_info_on_read/write (CVE-2019-12448) * gvfs: mishandling of file's user and group ownership in daemon/gvfsbackendadmin.c due to unavailability of root privileges (CVE-2019-12449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. none-baseos-rpms mozjs52-52.9.0-2.el8.aarch64.rpm b0c7147dc767378dda468419b1c5a957b2ceb61c1abda4150bf359444db42990 mozjs52-52.9.0-2.el8.aarch64.rpm b0c7147dc767378dda468419b1c5a957b2ceb61c1abda4150bf359444db42990 mozjs52-52.9.0-2.el8.aarch64.rpm b0c7147dc767378dda468419b1c5a957b2ceb61c1abda4150bf359444db42990 mozjs52-52.9.0-2.el8.aarch64.rpm b0c7147dc767378dda468419b1c5a957b2ceb61c1abda4150bf359444db42990 mozjs60-60.9.0-4.el8.aarch64.rpm 50bfb770c46f602468bf975a7f045cba587233f3e98178df93431b1cdca7b5fa mozjs60-60.9.0-4.el8.aarch64.rpm 50bfb770c46f602468bf975a7f045cba587233f3e98178df93431b1cdca7b5fa mozjs60-60.9.0-4.el8.aarch64.rpm 50bfb770c46f602468bf975a7f045cba587233f3e98178df93431b1cdca7b5fa mozjs60-60.9.0-4.el8.aarch64.rpm 50bfb770c46f602468bf975a7f045cba587233f3e98178df93431b1cdca7b5fa RLEA-2020:1767 flatpak bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bubblewrap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. none-baseos-rpms bubblewrap-0.4.0-1.el8.aarch64.rpm 6f6c80914ad5b49b919ab98d41aa1f53788c67f8b11a710a5f9cce378ec9ce9a bubblewrap-0.4.0-1.el8.aarch64.rpm 6f6c80914ad5b49b919ab98d41aa1f53788c67f8b11a710a5f9cce378ec9ce9a bubblewrap-0.4.0-1.el8.aarch64.rpm 6f6c80914ad5b49b919ab98d41aa1f53788c67f8b11a710a5f9cce378ec9ce9a bubblewrap-0.4.0-1.el8.aarch64.rpm 6f6c80914ad5b49b919ab98d41aa1f53788c67f8b11a710a5f9cce378ec9ce9a RLBA-2020:1768 ipcalc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ipcalc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms ipcalc-0.2.4-4.el8.aarch64.rpm ed85625f7d445ec09e6899decca59a937fb2fef7233793d7aa7e2275715912f8 ipcalc-0.2.4-4.el8.aarch64.rpm ed85625f7d445ec09e6899decca59a937fb2fef7233793d7aa7e2275715912f8 ipcalc-0.2.4-4.el8.aarch64.rpm ed85625f7d445ec09e6899decca59a937fb2fef7233793d7aa7e2275715912f8 ipcalc-0.2.4-4.el8.aarch64.rpm ed85625f7d445ec09e6899decca59a937fb2fef7233793d7aa7e2275715912f8 RLBA-2020:1781 ModemManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager, usb_modeswitch-data, mobile-broadband-provider-info, libmbim, libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms libmbim-1.20.2-1.el8.aarch64.rpm a63ce2f7e6398305d3fc9460a397a5bf7ac43f3e6212c93a35844b5d3d8e9357 libmbim-1.20.2-1.el8.aarch64.rpm a63ce2f7e6398305d3fc9460a397a5bf7ac43f3e6212c93a35844b5d3d8e9357 libmbim-utils-1.20.2-1.el8.aarch64.rpm b0b2d30d7813ea337da1414cab3904380bda3a5449ffdcc3b6452425729d40df libmbim-utils-1.20.2-1.el8.aarch64.rpm b0b2d30d7813ea337da1414cab3904380bda3a5449ffdcc3b6452425729d40df libqmi-1.24.0-1.el8.aarch64.rpm 58bd7f69e4f02205347cc2b90df748ac8f1aa0712468d1bf1620c896f9176b69 libqmi-utils-1.24.0-1.el8.aarch64.rpm 671c4ab370d890bb1a4c776989191f4a731065d4d3f589fea259ace9bff614bc mobile-broadband-provider-info-20190618-2.el8.noarch.rpm f9a7bdd4d99946e18049d0f4c904843e8cce9e071f508edcab04e589aa93a88e mobile-broadband-provider-info-20190618-2.el8.noarch.rpm f9a7bdd4d99946e18049d0f4c904843e8cce9e071f508edcab04e589aa93a88e ModemManager-1.10.8-2.el8.aarch64.rpm e2b8fde4700b3024dfcf21f63cca7a3afed472872b7b75f240349d3f3034a7a0 ModemManager-glib-1.10.8-2.el8.aarch64.rpm 535e2cfa5a8a04b8bbf75e08b37d0ec7135373d58bd49938ae095b542573c509 usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd usb_modeswitch-data-20191128-1.el8.noarch.rpm e5f5cde6a81840665cdb44a09ef895edf93168c8439c3abd86d059be9b715ccd RLBA-2020:1791 libnetfilter_cthelper bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_cthelper. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms libnetfilter_cthelper-1.0.0-15.el8.aarch64.rpm 8b5f5cbfd75bb73091e7bc55c5ab363cd3dc5d6e63c9d33dea0a124015190bc5 libnetfilter_cthelper-1.0.0-15.el8.aarch64.rpm 8b5f5cbfd75bb73091e7bc55c5ab363cd3dc5d6e63c9d33dea0a124015190bc5 libnetfilter_cthelper-1.0.0-15.el8.aarch64.rpm 8b5f5cbfd75bb73091e7bc55c5ab363cd3dc5d6e63c9d33dea0a124015190bc5 libnetfilter_cthelper-1.0.0-15.el8.aarch64.rpm 8b5f5cbfd75bb73091e7bc55c5ab363cd3dc5d6e63c9d33dea0a124015190bc5 RLBA-2020:1839 mcstrans bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mcstrans. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms mcstrans-2.9-2.el8.aarch64.rpm 85b6efbfad0178032d180e2dfbbb81660bc547a92f87107ee1a334242c87e0d4 mcstrans-2.9-2.el8.aarch64.rpm 85b6efbfad0178032d180e2dfbbb81660bc547a92f87107ee1a334242c87e0d4 mcstrans-2.9-2.el8.aarch64.rpm 85b6efbfad0178032d180e2dfbbb81660bc547a92f87107ee1a334242c87e0d4 mcstrans-2.9-2.el8.aarch64.rpm 85b6efbfad0178032d180e2dfbbb81660bc547a92f87107ee1a334242c87e0d4 RLBA-2020:1822 pywbem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pywbem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 python3-pywbem-0.11.0-8.el8.noarch.rpm 55598d5d97863126b508365407e4a1d0c4f75635ea033fd0dcc050789b68fca7 RLBA-2020:1846 conntrack-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for conntrack-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms conntrack-tools-1.4.4-10.el8.aarch64.rpm d7f42bcce048a313193c586871f37f1dddef88e03dd81b01ebfea072ef59aad1 conntrack-tools-1.4.4-10.el8.aarch64.rpm d7f42bcce048a313193c586871f37f1dddef88e03dd81b01ebfea072ef59aad1 conntrack-tools-1.4.4-10.el8.aarch64.rpm d7f42bcce048a313193c586871f37f1dddef88e03dd81b01ebfea072ef59aad1 conntrack-tools-1.4.4-10.el8.aarch64.rpm d7f42bcce048a313193c586871f37f1dddef88e03dd81b01ebfea072ef59aad1 RLBA-2020:1850 pigz bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pigz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms pigz-2.4-4.el8.aarch64.rpm 0c5fe94281f32a67bd797950594f7edb8997055d2ad0ec8c35ccf0917cff6f07 pigz-2.4-4.el8.aarch64.rpm 0c5fe94281f32a67bd797950594f7edb8997055d2ad0ec8c35ccf0917cff6f07 pigz-2.4-4.el8.aarch64.rpm 0c5fe94281f32a67bd797950594f7edb8997055d2ad0ec8c35ccf0917cff6f07 pigz-2.4-4.el8.aarch64.rpm 0c5fe94281f32a67bd797950594f7edb8997055d2ad0ec8c35ccf0917cff6f07 RLSA-2020:1852 Moderate: patch security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for patch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file). Security Fix(es): * patch: the following of symlinks in inp.c and util.c is mishandled in cases other than input files (CVE-2019-13636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. none-baseos-rpms patch-2.7.6-11.el8.aarch64.rpm 122ffe9bdd3f7b881a06ebbf0ec5297304e28ccd21600b19383bfb09e2c6629f patch-2.7.6-11.el8.aarch64.rpm 122ffe9bdd3f7b881a06ebbf0ec5297304e28ccd21600b19383bfb09e2c6629f patch-2.7.6-11.el8.aarch64.rpm 122ffe9bdd3f7b881a06ebbf0ec5297304e28ccd21600b19383bfb09e2c6629f patch-2.7.6-11.el8.aarch64.rpm 122ffe9bdd3f7b881a06ebbf0ec5297304e28ccd21600b19383bfb09e2c6629f RLBA-2020:1853 diffutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for diffutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms diffutils-3.6-6.el8.aarch64.rpm fb48a106969405619bd9e14a8b1012d9d6c1e95cc96c4a5af56cfd6a4a498917 diffutils-3.6-6.el8.aarch64.rpm fb48a106969405619bd9e14a8b1012d9d6c1e95cc96c4a5af56cfd6a4a498917 diffutils-3.6-6.el8.aarch64.rpm fb48a106969405619bd9e14a8b1012d9d6c1e95cc96c4a5af56cfd6a4a498917 diffutils-3.6-6.el8.aarch64.rpm fb48a106969405619bd9e14a8b1012d9d6c1e95cc96c4a5af56cfd6a4a498917 RLBA-2020:1871 openssl-pkcs11 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssl-pkcs11. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms openssl-pkcs11-0.4.10-2.el8.aarch64.rpm 3ddcd2baa25dab6f06bf2f6e92ceac9a7b90ebf2bb33e6e2daed5e959d81467f openssl-pkcs11-0.4.10-2.el8.aarch64.rpm 3ddcd2baa25dab6f06bf2f6e92ceac9a7b90ebf2bb33e6e2daed5e959d81467f openssl-pkcs11-0.4.10-2.el8.aarch64.rpm 3ddcd2baa25dab6f06bf2f6e92ceac9a7b90ebf2bb33e6e2daed5e959d81467f openssl-pkcs11-0.4.10-2.el8.aarch64.rpm 3ddcd2baa25dab6f06bf2f6e92ceac9a7b90ebf2bb33e6e2daed5e959d81467f RLBA-2020:1891 arpwatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for arpwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms arpwatch-2.1a15-44.el8.aarch64.rpm c09fe629652967c850802963580eca1f5251279da9f44c4c4aa2c24bce68b659 arpwatch-2.1a15-44.el8.aarch64.rpm c09fe629652967c850802963580eca1f5251279da9f44c4c4aa2c24bce68b659 arpwatch-2.1a15-44.el8.aarch64.rpm c09fe629652967c850802963580eca1f5251279da9f44c4c4aa2c24bce68b659 arpwatch-2.1a15-44.el8.aarch64.rpm c09fe629652967c850802963580eca1f5251279da9f44c4c4aa2c24bce68b659 RLBA-2020:1902 liberation-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liberation-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-2.00.3-7.el8.noarch.rpm 0d8d6669df35252af4573cff943f642b079dc6bea809c91011cc7413842024c1 liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-fonts-common-2.00.3-7.el8.noarch.rpm 125f053c400815d6aac6ae876f1c050a9fb9b3acd2f71bb4281220ae2b45702d liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-mono-fonts-2.00.3-7.el8.noarch.rpm 5455e6eddd7c2d5c109775a8bdd39cc35fb2bf1f4790df9b530358d57926bd56 liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-sans-fonts-2.00.3-7.el8.noarch.rpm 3721a1315298f5fe4c3a635d7c3b7048428f711b6a6f90638dcb44aab624537d liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff liberation-serif-fonts-2.00.3-7.el8.noarch.rpm 41ebbfca4b7fc586cd22ff6ece89461aa61cd346fda9b4f98d2817c83ef630ff RLBA-2020:1910 cifs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cifs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms cifs-utils-6.8-3.el8.aarch64.rpm dc9b7440091788f957db2a1a360218237d984212a0c25283c3658a4c6a4f8411 cifs-utils-6.8-3.el8.aarch64.rpm dc9b7440091788f957db2a1a360218237d984212a0c25283c3658a4c6a4f8411 cifs-utils-6.8-3.el8.aarch64.rpm dc9b7440091788f957db2a1a360218237d984212a0c25283c3658a4c6a4f8411 cifs-utils-6.8-3.el8.aarch64.rpm dc9b7440091788f957db2a1a360218237d984212a0c25283c3658a4c6a4f8411 pam_cifscreds-6.8-3.el8.aarch64.rpm ad108ac76809ca43a523f5be6a1abaebb041f1a854bc6cd89a1ec681466e570b pam_cifscreds-6.8-3.el8.aarch64.rpm ad108ac76809ca43a523f5be6a1abaebb041f1a854bc6cd89a1ec681466e570b pam_cifscreds-6.8-3.el8.aarch64.rpm ad108ac76809ca43a523f5be6a1abaebb041f1a854bc6cd89a1ec681466e570b pam_cifscreds-6.8-3.el8.aarch64.rpm ad108ac76809ca43a523f5be6a1abaebb041f1a854bc6cd89a1ec681466e570b RLBA-2020:1919 ppp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ppp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc ppp-2.4.7-26.el8_1.aarch64.rpm 84da5ae3817c7844fc78e9560ae1214598890677b32b9e27db7ceb27965379bc RLSA-2020:2755 Important: nghttp2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libnghttp2-1.33.0-3.el8_3.1.aarch64.rpm be36021cc5b45a2de10b59592486ebb8850d0da196721e05807caf6340362cd8 libnghttp2-1.33.0-3.el8_3.1.aarch64.rpm be36021cc5b45a2de10b59592486ebb8850d0da196721e05807caf6340362cd8 libnghttp2-1.33.0-3.el8_3.1.aarch64.rpm be36021cc5b45a2de10b59592486ebb8850d0da196721e05807caf6340362cd8 libnghttp2-1.33.0-3.el8_3.1.aarch64.rpm be36021cc5b45a2de10b59592486ebb8850d0da196721e05807caf6340362cd8 RLSA-2020:3654 Moderate: libcroco security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcroco. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libcroco is a standalone Cascading Style Sheet level 2 (CSS2) parsing and manipulation library. Security Fix(es): * libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libcroco-0.6.12-4.el8_2.1.aarch64.rpm 073f402932fa613540e4ebefa3c221df051ded054eaf44be03b590699c3e77e7 libcroco-0.6.12-4.el8_2.1.aarch64.rpm 073f402932fa613540e4ebefa3c221df051ded054eaf44be03b590699c3e77e7 libcroco-0.6.12-4.el8_2.1.aarch64.rpm 073f402932fa613540e4ebefa3c221df051ded054eaf44be03b590699c3e77e7 libcroco-0.6.12-4.el8_2.1.aarch64.rpm 073f402932fa613540e4ebefa3c221df051ded054eaf44be03b590699c3e77e7 RLBA-2020:4434 net-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms net-tools-2.0-0.52.20160912git.el8.aarch64.rpm 0d27b2b67161f9c092266a10c8e68c2f135fb3b9461721be098a9e358e94aa22 net-tools-2.0-0.52.20160912git.el8.aarch64.rpm 0d27b2b67161f9c092266a10c8e68c2f135fb3b9461721be098a9e358e94aa22 net-tools-2.0-0.52.20160912git.el8.aarch64.rpm 0d27b2b67161f9c092266a10c8e68c2f135fb3b9461721be098a9e358e94aa22 net-tools-2.0-0.52.20160912git.el8.aarch64.rpm 0d27b2b67161f9c092266a10c8e68c2f135fb3b9461721be098a9e358e94aa22 RLSA-2020:4436 Low: gnome-software and fwupd security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for appstream-data, libxmlb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnome-software packages contain an application that makes it easy to add, remove, and update software in the GNOME desktop. The appstream-data package provides the distribution specific AppStream metadata required for the GNOME and KDE software centers. The fwupd packages provide a service that allows session software to update device firmware. The following packages have been upgraded to a later upstream version: gnome-software (3.36.1), fwupd (1.4.2). Security Fix(es): * fwupd: Possible bypass in signature verification (CVE-2020-10759) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libxmlb-0.1.15-1.el8.aarch64.rpm 358fb3cf46f764f7e110314ba256e83667a36bfbbc62594ec017277fa3c70614 libxmlb-0.1.15-1.el8.aarch64.rpm 358fb3cf46f764f7e110314ba256e83667a36bfbbc62594ec017277fa3c70614 libxmlb-0.1.15-1.el8.aarch64.rpm 358fb3cf46f764f7e110314ba256e83667a36bfbbc62594ec017277fa3c70614 libxmlb-0.1.15-1.el8.aarch64.rpm 358fb3cf46f764f7e110314ba256e83667a36bfbbc62594ec017277fa3c70614 RLBA-2020:4437 python-setuptools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 platform-python-setuptools-39.2.0-6.el8.noarch.rpm 4de8071c285f31ebef172137aa6d8c933701aa30340a46e8cefb43ed31e25203 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-39.2.0-6.el8.noarch.rpm 5c3d6cbb83e4c2c300a1536fb1ded48cc68350e86481972f9a230a9b4eed3bf5 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 python3-setuptools-wheel-39.2.0-6.el8.noarch.rpm acc77aac84ea79c1aaf4d0d283ee988806a942a5ed71efc8e5ad65f4b40790c1 RLSA-2020:4451 Moderate: GNOME security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xdg-desktop-portal-gtk, tracker, LibRaw, vte291, gnome-remote-desktop, PackageKit, pipewire, pipewire0.2, potrace, gtk3, dleyna-renderer, libsoup, pygobject3, webrtc-audio-processing, frei0r-plugins, gnome-session, gsettings-desktop-schemas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gnome-remote-desktop (0.1.8), pipewire (0.3.6), vte291 (0.52.4), webkit2gtk3 (2.28.4), xdg-desktop-portal (1.6.0), xdg-desktop-portal-gtk (1.6.0). (BZ#1775345, BZ#1779691, BZ#1817143, BZ#1832347, BZ#1837406) Security Fix(es): * webkitgtk: Multiple security issues (CVE-2019-8625, CVE-2019-8710, CVE-2019-8720, CVE-2019-8743, CVE-2019-8764, CVE-2019-8766, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-9802, CVE-2020-9803, CVE-2020-9805, CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850, CVE-2020-9862, CVE-2020-9893, CVE-2020-9894, CVE-2020-9895, CVE-2020-9915, CVE-2020-9925, CVE-2020-10018, CVE-2020-11793) * gnome-settings-daemon: Rocky Enterprise Software Foundation Customer Portal password logged and passed as command line argument when user registers through GNOME control center (CVE-2020-14391) * LibRaw: lack of thumbnail size range check can lead to buffer overflow (CVE-2020-15503) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms gsettings-desktop-schemas-3.32.0-5.el8.aarch64.rpm 0babcb105c3dd7128c5188d3b7dbe79d69bde2d5872690333db179ef60e0cf5c libsoup-2.62.3-2.el8.aarch64.rpm 9908cdbae42df3f5c2715d0b256afbbacb31c65f466cd1375aeeeec76c6336eb libsoup-2.62.3-2.el8.aarch64.rpm 9908cdbae42df3f5c2715d0b256afbbacb31c65f466cd1375aeeeec76c6336eb libsoup-2.62.3-2.el8.aarch64.rpm 9908cdbae42df3f5c2715d0b256afbbacb31c65f466cd1375aeeeec76c6336eb libsoup-2.62.3-2.el8.aarch64.rpm 9908cdbae42df3f5c2715d0b256afbbacb31c65f466cd1375aeeeec76c6336eb python3-gobject-base-3.28.3-2.el8.aarch64.rpm 40a1899ca1bd4dc2eef88d82ec231dccc92f29d4d3832b9428210703c3886bd4 python3-gobject-base-3.28.3-2.el8.aarch64.rpm 40a1899ca1bd4dc2eef88d82ec231dccc92f29d4d3832b9428210703c3886bd4 python3-gobject-base-3.28.3-2.el8.aarch64.rpm 40a1899ca1bd4dc2eef88d82ec231dccc92f29d4d3832b9428210703c3886bd4 python3-gobject-base-3.28.3-2.el8.aarch64.rpm 40a1899ca1bd4dc2eef88d82ec231dccc92f29d4d3832b9428210703c3886bd4 RLEA-2020:4468 lsof bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsof. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms lsof-4.93.2-1.el8.aarch64.rpm 66bb72e26ca364c07e51755e6507fa6d97f0e9bb1294da44efde063899630fb4 lsof-4.93.2-1.el8.aarch64.rpm 66bb72e26ca364c07e51755e6507fa6d97f0e9bb1294da44efde063899630fb4 lsof-4.93.2-1.el8.aarch64.rpm 66bb72e26ca364c07e51755e6507fa6d97f0e9bb1294da44efde063899630fb4 lsof-4.93.2-1.el8.aarch64.rpm 66bb72e26ca364c07e51755e6507fa6d97f0e9bb1294da44efde063899630fb4 RLBA-2020:4452 libhugetlbfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libhugetlbfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libhugetlbfs-2.21-17.el8.aarch64.rpm 11f2050d2d08542d98902124eb5b99c4311a09651c90cc64a5268b04f25f6058 libhugetlbfs-2.21-17.el8.aarch64.rpm 11f2050d2d08542d98902124eb5b99c4311a09651c90cc64a5268b04f25f6058 libhugetlbfs-2.21-17.el8.aarch64.rpm 11f2050d2d08542d98902124eb5b99c4311a09651c90cc64a5268b04f25f6058 libhugetlbfs-2.21-17.el8.aarch64.rpm 11f2050d2d08542d98902124eb5b99c4311a09651c90cc64a5268b04f25f6058 libhugetlbfs-devel-2.21-17.el8.aarch64.rpm da632c6fd4d2d94e6c0ce0d6ab0e1fd507094baf8af2e1d39682ff8d738437a6 libhugetlbfs-devel-2.21-17.el8.aarch64.rpm da632c6fd4d2d94e6c0ce0d6ab0e1fd507094baf8af2e1d39682ff8d738437a6 libhugetlbfs-devel-2.21-17.el8.aarch64.rpm da632c6fd4d2d94e6c0ce0d6ab0e1fd507094baf8af2e1d39682ff8d738437a6 libhugetlbfs-devel-2.21-17.el8.aarch64.rpm da632c6fd4d2d94e6c0ce0d6ab0e1fd507094baf8af2e1d39682ff8d738437a6 libhugetlbfs-utils-2.21-17.el8.aarch64.rpm 155dc4ea3914c69133c4c3533f005b3349cbfa0205e691fe866adc24e3c1afba libhugetlbfs-utils-2.21-17.el8.aarch64.rpm 155dc4ea3914c69133c4c3533f005b3349cbfa0205e691fe866adc24e3c1afba libhugetlbfs-utils-2.21-17.el8.aarch64.rpm 155dc4ea3914c69133c4c3533f005b3349cbfa0205e691fe866adc24e3c1afba libhugetlbfs-utils-2.21-17.el8.aarch64.rpm 155dc4ea3914c69133c4c3533f005b3349cbfa0205e691fe866adc24e3c1afba RLEA-2020:4487 smartmontools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms smartmontools-7.1-1.el8.aarch64.rpm fa7401bd0681ddb28fb820c5c8d17535ca13e1fc1e563d59abcb5440ccc1c723 smartmontools-7.1-1.el8.aarch64.rpm fa7401bd0681ddb28fb820c5c8d17535ca13e1fc1e563d59abcb5440ccc1c723 smartmontools-7.1-1.el8.aarch64.rpm fa7401bd0681ddb28fb820c5c8d17535ca13e1fc1e563d59abcb5440ccc1c723 smartmontools-7.1-1.el8.aarch64.rpm fa7401bd0681ddb28fb820c5c8d17535ca13e1fc1e563d59abcb5440ccc1c723 RLBA-2020:4488 libkcapi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkcapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libkcapi-1.2.0-2.el8.aarch64.rpm 40bb0bf7d09b0511266a088b3880a7882946e499f6dd15f0c594821183790eb6 libkcapi-1.2.0-2.el8.aarch64.rpm 40bb0bf7d09b0511266a088b3880a7882946e499f6dd15f0c594821183790eb6 libkcapi-1.2.0-2.el8.aarch64.rpm 40bb0bf7d09b0511266a088b3880a7882946e499f6dd15f0c594821183790eb6 libkcapi-1.2.0-2.el8.aarch64.rpm 40bb0bf7d09b0511266a088b3880a7882946e499f6dd15f0c594821183790eb6 libkcapi-hmaccalc-1.2.0-2.el8.aarch64.rpm 1a85bda175b9d2bce6e9af14a22536fbad39dae41f53e14f12b19574e78f9e12 libkcapi-hmaccalc-1.2.0-2.el8.aarch64.rpm 1a85bda175b9d2bce6e9af14a22536fbad39dae41f53e14f12b19574e78f9e12 libkcapi-hmaccalc-1.2.0-2.el8.aarch64.rpm 1a85bda175b9d2bce6e9af14a22536fbad39dae41f53e14f12b19574e78f9e12 libkcapi-hmaccalc-1.2.0-2.el8.aarch64.rpm 1a85bda175b9d2bce6e9af14a22536fbad39dae41f53e14f12b19574e78f9e12 RLBA-2020:4501 iprutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iprutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms iprutils-2.4.19-1.el8.aarch64.rpm ce5743a99f1e525a2eebba40baef710e74961ab322e8eadd17f00579f719cdfa iprutils-2.4.19-1.el8.aarch64.rpm ce5743a99f1e525a2eebba40baef710e74961ab322e8eadd17f00579f719cdfa iprutils-2.4.19-1.el8.aarch64.rpm ce5743a99f1e525a2eebba40baef710e74961ab322e8eadd17f00579f719cdfa iprutils-2.4.19-1.el8.aarch64.rpm ce5743a99f1e525a2eebba40baef710e74961ab322e8eadd17f00579f719cdfa RLEA-2020:4506 python-configshell bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-configshell. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff python3-configshell-1.1.28-1.el8.noarch.rpm 7f82033e617d787614f55d7d3c1814d59014fd3922cb8acd6816cb1919549dff RLBA-2020:4512 libteam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libteam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libteam-1.31-2.el8.aarch64.rpm 0443964bf4c1e40b75149c169b2114eebc1ec40c9b980e274cb0de21c8894044 libteam-1.31-2.el8.aarch64.rpm 0443964bf4c1e40b75149c169b2114eebc1ec40c9b980e274cb0de21c8894044 libteam-1.31-2.el8.aarch64.rpm 0443964bf4c1e40b75149c169b2114eebc1ec40c9b980e274cb0de21c8894044 libteam-1.31-2.el8.aarch64.rpm 0443964bf4c1e40b75149c169b2114eebc1ec40c9b980e274cb0de21c8894044 libteam-doc-1.31-2.el8.aarch64.rpm ec10ce62c69236dc0267fc4af6fb69079205180200e409f72459097391669703 libteam-doc-1.31-2.el8.aarch64.rpm ec10ce62c69236dc0267fc4af6fb69079205180200e409f72459097391669703 libteam-doc-1.31-2.el8.aarch64.rpm ec10ce62c69236dc0267fc4af6fb69079205180200e409f72459097391669703 libteam-doc-1.31-2.el8.aarch64.rpm ec10ce62c69236dc0267fc4af6fb69079205180200e409f72459097391669703 network-scripts-team-1.31-2.el8.aarch64.rpm 5f602e449cdd77a2125d5afbc4565474a927b8a227e864850595dafe653c405a network-scripts-team-1.31-2.el8.aarch64.rpm 5f602e449cdd77a2125d5afbc4565474a927b8a227e864850595dafe653c405a network-scripts-team-1.31-2.el8.aarch64.rpm 5f602e449cdd77a2125d5afbc4565474a927b8a227e864850595dafe653c405a network-scripts-team-1.31-2.el8.aarch64.rpm 5f602e449cdd77a2125d5afbc4565474a927b8a227e864850595dafe653c405a teamd-1.31-2.el8.aarch64.rpm 4abfc50b32b2cdc5b74337b8d5b48b756fbfa0c049c2b7081161721c306b103a teamd-1.31-2.el8.aarch64.rpm 4abfc50b32b2cdc5b74337b8d5b48b756fbfa0c049c2b7081161721c306b103a teamd-1.31-2.el8.aarch64.rpm 4abfc50b32b2cdc5b74337b8d5b48b756fbfa0c049c2b7081161721c306b103a teamd-1.31-2.el8.aarch64.rpm 4abfc50b32b2cdc5b74337b8d5b48b756fbfa0c049c2b7081161721c306b103a RLBA-2020:4522 libqb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libqb-1.0.3-12.el8.aarch64.rpm 1b4ae223f3471acfcbd5847999e548773ab3a671d89b9ef494ac7342c627d0c7 libqb-1.0.3-12.el8.aarch64.rpm 1b4ae223f3471acfcbd5847999e548773ab3a671d89b9ef494ac7342c627d0c7 libqb-1.0.3-12.el8.aarch64.rpm 1b4ae223f3471acfcbd5847999e548773ab3a671d89b9ef494ac7342c627d0c7 libqb-1.0.3-12.el8.aarch64.rpm 1b4ae223f3471acfcbd5847999e548773ab3a671d89b9ef494ac7342c627d0c7 libqb-devel-1.0.3-12.el8.aarch64.rpm d566020d31af71c1fadb7bd98177567842ef6d1d85e9e292c3c69dc20ad8eaad libqb-devel-1.0.3-12.el8.aarch64.rpm d566020d31af71c1fadb7bd98177567842ef6d1d85e9e292c3c69dc20ad8eaad libqb-devel-1.0.3-12.el8.aarch64.rpm d566020d31af71c1fadb7bd98177567842ef6d1d85e9e292c3c69dc20ad8eaad libqb-devel-1.0.3-12.el8.aarch64.rpm d566020d31af71c1fadb7bd98177567842ef6d1d85e9e292c3c69dc20ad8eaad RLBA-2020:4538 logrotate bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for logrotate. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms logrotate-3.14.0-4.el8.aarch64.rpm 59f7ee3b84da5742845d9c7b4938c92b7219c3eeda69aa1d9b2f3fb920d7f859 logrotate-3.14.0-4.el8.aarch64.rpm 59f7ee3b84da5742845d9c7b4938c92b7219c3eeda69aa1d9b2f3fb920d7f859 logrotate-3.14.0-4.el8.aarch64.rpm 59f7ee3b84da5742845d9c7b4938c92b7219c3eeda69aa1d9b2f3fb920d7f859 logrotate-3.14.0-4.el8.aarch64.rpm 59f7ee3b84da5742845d9c7b4938c92b7219c3eeda69aa1d9b2f3fb920d7f859 RLEA-2020:4555 libpsl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpsl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libpsl-0.20.2-6.el8.aarch64.rpm 7ea182e4df97af9e073eedec5717ac3ade26bf1a0e8e166f527c2a5eca5493c6 libpsl-0.20.2-6.el8.aarch64.rpm 7ea182e4df97af9e073eedec5717ac3ade26bf1a0e8e166f527c2a5eca5493c6 libpsl-0.20.2-6.el8.aarch64.rpm 7ea182e4df97af9e073eedec5717ac3ade26bf1a0e8e166f527c2a5eca5493c6 libpsl-0.20.2-6.el8.aarch64.rpm 7ea182e4df97af9e073eedec5717ac3ade26bf1a0e8e166f527c2a5eca5493c6 RLEA-2020:4556 libnetfilter_queue bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnetfilter_queue. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libnetfilter_queue-1.0.4-3.el8.aarch64.rpm b027c8d0be850086db4f228064e579f186cb2506ecc9523ae609c61b4ed5ad41 libnetfilter_queue-1.0.4-3.el8.aarch64.rpm b027c8d0be850086db4f228064e579f186cb2506ecc9523ae609c61b4ed5ad41 libnetfilter_queue-1.0.4-3.el8.aarch64.rpm b027c8d0be850086db4f228064e579f186cb2506ecc9523ae609c61b4ed5ad41 libnetfilter_queue-1.0.4-3.el8.aarch64.rpm b027c8d0be850086db4f228064e579f186cb2506ecc9523ae609c61b4ed5ad41 RLBA-2020:4557 zstd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zstd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libzstd-1.4.4-1.el8.aarch64.rpm 44d11e194b4d5ebf9bad5f1dc8adb136061e747c68a20bc14034359c98feda87 libzstd-1.4.4-1.el8.aarch64.rpm 44d11e194b4d5ebf9bad5f1dc8adb136061e747c68a20bc14034359c98feda87 libzstd-1.4.4-1.el8.aarch64.rpm 44d11e194b4d5ebf9bad5f1dc8adb136061e747c68a20bc14034359c98feda87 libzstd-1.4.4-1.el8.aarch64.rpm 44d11e194b4d5ebf9bad5f1dc8adb136061e747c68a20bc14034359c98feda87 libzstd-devel-1.4.4-1.el8.aarch64.rpm b3befd27564abf4dcca29cbc7d236f7d2def40b3a3b6060ea5ba3ec47e978b50 libzstd-devel-1.4.4-1.el8.aarch64.rpm b3befd27564abf4dcca29cbc7d236f7d2def40b3a3b6060ea5ba3ec47e978b50 libzstd-devel-1.4.4-1.el8.aarch64.rpm b3befd27564abf4dcca29cbc7d236f7d2def40b3a3b6060ea5ba3ec47e978b50 libzstd-devel-1.4.4-1.el8.aarch64.rpm b3befd27564abf4dcca29cbc7d236f7d2def40b3a3b6060ea5ba3ec47e978b50 RLBA-2020:4564 kabi-dw bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kabi-dw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms kabi-dw-0-0.10.20200515gitb52ac13.el8.aarch64.rpm 702cbce378eccc1a203e651e691982fcffa69c5dd6cf35030f36153fec56a537 kabi-dw-0-0.10.20200515gitb52ac13.el8.aarch64.rpm 702cbce378eccc1a203e651e691982fcffa69c5dd6cf35030f36153fec56a537 kabi-dw-0-0.10.20200515gitb52ac13.el8.aarch64.rpm 702cbce378eccc1a203e651e691982fcffa69c5dd6cf35030f36153fec56a537 kabi-dw-0-0.10.20200515gitb52ac13.el8.aarch64.rpm 702cbce378eccc1a203e651e691982fcffa69c5dd6cf35030f36153fec56a537 RLBA-2020:4580 kbd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kbd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms kbd-2.0.4-10.el8.aarch64.rpm bab8ec1ce9458548c9c6f841987aa619481186889e5557cec9349b863e261e1a kbd-2.0.4-10.el8.aarch64.rpm bab8ec1ce9458548c9c6f841987aa619481186889e5557cec9349b863e261e1a kbd-2.0.4-10.el8.aarch64.rpm bab8ec1ce9458548c9c6f841987aa619481186889e5557cec9349b863e261e1a kbd-2.0.4-10.el8.aarch64.rpm bab8ec1ce9458548c9c6f841987aa619481186889e5557cec9349b863e261e1a kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-legacy-2.0.4-10.el8.noarch.rpm 8755001b3bfd1da28a12b58de1b11b6ae3d65ed1587af157c3b323483780b5c7 kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c kbd-misc-2.0.4-10.el8.noarch.rpm 86627f600911656471922da1edbb0480e469edc97148a32283974bbcef3be07c RLEA-2020:4587 libusbx bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libusbx. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libusbx-1.0.23-4.el8.aarch64.rpm dcb16d11caf370d59d350957aa9ae26e34b2990a5c1bfafdc7acd6da6ccef185 libusbx-1.0.23-4.el8.aarch64.rpm dcb16d11caf370d59d350957aa9ae26e34b2990a5c1bfafdc7acd6da6ccef185 libusbx-1.0.23-4.el8.aarch64.rpm dcb16d11caf370d59d350957aa9ae26e34b2990a5c1bfafdc7acd6da6ccef185 libusbx-1.0.23-4.el8.aarch64.rpm dcb16d11caf370d59d350957aa9ae26e34b2990a5c1bfafdc7acd6da6ccef185 libusbx-devel-1.0.23-4.el8.aarch64.rpm a2a01cbb30bcd0b6afafdd999647ddf0132b3e096705ea68db273a5d873ec303 libusbx-devel-1.0.23-4.el8.aarch64.rpm a2a01cbb30bcd0b6afafdd999647ddf0132b3e096705ea68db273a5d873ec303 libusbx-devel-1.0.23-4.el8.aarch64.rpm a2a01cbb30bcd0b6afafdd999647ddf0132b3e096705ea68db273a5d873ec303 libusbx-devel-1.0.23-4.el8.aarch64.rpm a2a01cbb30bcd0b6afafdd999647ddf0132b3e096705ea68db273a5d873ec303 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 libusbx-devel-doc-1.0.23-4.el8.noarch.rpm 71eb815742569285f100c0cffe7b64078dcc9f516e3f328e7a9641cd3ce73df6 RLEA-2020:4596 efivar bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efivar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms efivar-37-4.el8.aarch64.rpm b9b312e223b37e0dde17c2f193ea4ca5d3fdb53a5506eefaea1f15d8ed8c17d8 efivar-37-4.el8.aarch64.rpm b9b312e223b37e0dde17c2f193ea4ca5d3fdb53a5506eefaea1f15d8ed8c17d8 efivar-37-4.el8.aarch64.rpm b9b312e223b37e0dde17c2f193ea4ca5d3fdb53a5506eefaea1f15d8ed8c17d8 efivar-37-4.el8.aarch64.rpm b9b312e223b37e0dde17c2f193ea4ca5d3fdb53a5506eefaea1f15d8ed8c17d8 efivar-libs-37-4.el8.aarch64.rpm e6d21a1930022b4df95246a99a9611e6322d00417ad0608c7f40c5f039d6c38f efivar-libs-37-4.el8.aarch64.rpm e6d21a1930022b4df95246a99a9611e6322d00417ad0608c7f40c5f039d6c38f efivar-libs-37-4.el8.aarch64.rpm e6d21a1930022b4df95246a99a9611e6322d00417ad0608c7f40c5f039d6c38f efivar-libs-37-4.el8.aarch64.rpm e6d21a1930022b4df95246a99a9611e6322d00417ad0608c7f40c5f039d6c38f RLBA-2020:4592 psmisc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for psmisc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms psmisc-23.1-5.el8.aarch64.rpm 386de99da2075353af278c277373d7bde3a7302062f9a48a3b6526d74aa8f215 psmisc-23.1-5.el8.aarch64.rpm 386de99da2075353af278c277373d7bde3a7302062f9a48a3b6526d74aa8f215 psmisc-23.1-5.el8.aarch64.rpm 386de99da2075353af278c277373d7bde3a7302062f9a48a3b6526d74aa8f215 psmisc-23.1-5.el8.aarch64.rpm 386de99da2075353af278c277373d7bde3a7302062f9a48a3b6526d74aa8f215 RLBA-2020:4600 snappy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for snappy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms snappy-1.1.8-3.el8.aarch64.rpm d6e0b0098a14cc64a1bd7b19932ffdc1a1ec9f03cebbaa3baf28a155328cd9f4 snappy-1.1.8-3.el8.aarch64.rpm d6e0b0098a14cc64a1bd7b19932ffdc1a1ec9f03cebbaa3baf28a155328cd9f4 snappy-1.1.8-3.el8.aarch64.rpm d6e0b0098a14cc64a1bd7b19932ffdc1a1ec9f03cebbaa3baf28a155328cd9f4 snappy-1.1.8-3.el8.aarch64.rpm d6e0b0098a14cc64a1bd7b19932ffdc1a1ec9f03cebbaa3baf28a155328cd9f4 RLEA-2020:4680 lmdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lmdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms lmdb-libs-0.9.24-1.el8.aarch64.rpm a4c3990f0faed2b2459af07c65bb757490389f1f47aa1c7ece2b72729f435ef5 lmdb-libs-0.9.24-1.el8.aarch64.rpm a4c3990f0faed2b2459af07c65bb757490389f1f47aa1c7ece2b72729f435ef5 lmdb-libs-0.9.24-1.el8.aarch64.rpm a4c3990f0faed2b2459af07c65bb757490389f1f47aa1c7ece2b72729f435ef5 RLEA-2020:4727 new module: perl:5.30 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Params-Util, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-generators, perl-Getopt-Long, perl-File-Temp, perl-Module-CoreList, perl-IPC-Cmd, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-IPC-System-Simple, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-Unicode-Normalize, perl-IO-Socket-IP, perl-Pod-Parser, perl-Time-HiRes, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-Package-Generator, perl-IO-Compress, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.30 module to Rocky Linux 8. (BZ#1713592) For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2020:4802 perl:5.30 metadata for the Rocky Linux 8 module matrix (2/3) Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLBA-2020:4841 liburing bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liburing. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms liburing-1.0.7-3.el8.aarch64.rpm e0878d1379098814dc136eff0b799722e61b3b892851e4d923366b7308bc14f9 liburing-1.0.7-3.el8.aarch64.rpm e0878d1379098814dc136eff0b799722e61b3b892851e4d923366b7308bc14f9 RLBA-2021:0564 dbxtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbxtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dbxtool packages provide a command line utility and a one-shot systemd service for applying UEFI Secure Boot DBX updates. Bug Fix(es) and Enhancement(s): * [Dell Rocky Linux 8.2 BUG] dbxtool: fails to list with 'EFI Signature List is malformed' (BZ#1912474) none-baseos-rpms dbxtool-8-5.el8_3.2.aarch64.rpm 81574994613d7da0398a586a5ffa448637101166726bc38010d8ffec2556c692 dbxtool-8-5.el8_3.2.aarch64.rpm 81574994613d7da0398a586a5ffa448637101166726bc38010d8ffec2556c692 dbxtool-8-5.el8_3.2.aarch64.rpm 81574994613d7da0398a586a5ffa448637101166726bc38010d8ffec2556c692 dbxtool-8-5.el8_3.2.aarch64.rpm 81574994613d7da0398a586a5ffa448637101166726bc38010d8ffec2556c692 RLSA-2021:0618 Important: stunnel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for stunnel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Stunnel is a wrapper for network connections. It can be used to tunnel an unencrypted network connection over an encrypted connection (encrypted using SSL or TLS) or to provide an encrypted means of connecting to services that do not natively support encryption. Security Fix(es): * stunnel: client certificate not correctly verified when redirect and verifyChain options are used (CVE-2021-20230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms stunnel-5.56-5.el8_3.aarch64.rpm 92fa548366ecda345c6a4fbf228e6f521ad0099554d2223d2de8bfd8619f317e stunnel-5.56-5.el8_3.aarch64.rpm 92fa548366ecda345c6a4fbf228e6f521ad0099554d2223d2de8bfd8619f317e stunnel-5.56-5.el8_3.aarch64.rpm 92fa548366ecda345c6a4fbf228e6f521ad0099554d2223d2de8bfd8619f317e stunnel-5.56-5.el8_3.aarch64.rpm 92fa548366ecda345c6a4fbf228e6f521ad0099554d2223d2de8bfd8619f317e RLEA-2020:4767 perl:5.30 metadata for the Rocky Linux 8 module matrix (1/3) Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-FCGI, perl-DBD-MySQL, perl-String-ShellQuote. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLSA-2021:1586 Moderate: GNOME security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for enchant2, cairomm, gnome-photos, webkit2gtk3, chrome-gnome-shell, geoclue2, dleyna-server, woff2, libdazzle, gtk2, gvfs, gjs, gnome-settings-daemon, gtkmm24, accountsservice, gnome-control-center, gnome-shell, gnome-software, soundtouch, gnome-boxes, gnome-terminal, libsass, libsigc++20, nautilus, OpenEXR, gnome-online-accounts, gtkmm30, dleyna-core, vala, libvisual, geocode-glib, pangomm, gtk-doc, atkmm, gdm, gamin, glibmm24, mutter, libepubgen. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304) Security Fix(es): * webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951) * webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543) * webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584) * glib2: insecure permissions for files and directories (CVE-2019-13012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms gamin-0.1.10-32.el8.aarch64.rpm 5b38532025539581fbf6ce1b15d9abf6957bbc802abb71a0f8aadcae8478e256 gamin-0.1.10-32.el8.aarch64.rpm 5b38532025539581fbf6ce1b15d9abf6957bbc802abb71a0f8aadcae8478e256 gamin-0.1.10-32.el8.aarch64.rpm 5b38532025539581fbf6ce1b15d9abf6957bbc802abb71a0f8aadcae8478e256 gamin-0.1.10-32.el8.aarch64.rpm 5b38532025539581fbf6ce1b15d9abf6957bbc802abb71a0f8aadcae8478e256 RLBA-2021:1587 librabbitmq bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librabbitmq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms librabbitmq-0.9.0-3.el8.aarch64.rpm 0fec7ddd4d7a4b6de68b3ad79843b82764c4a5d7f8565fad973c9b2793b5081e librabbitmq-0.9.0-3.el8.aarch64.rpm 0fec7ddd4d7a4b6de68b3ad79843b82764c4a5d7f8565fad973c9b2793b5081e librabbitmq-0.9.0-3.el8.aarch64.rpm 0fec7ddd4d7a4b6de68b3ad79843b82764c4a5d7f8565fad973c9b2793b5081e librabbitmq-0.9.0-3.el8.aarch64.rpm 0fec7ddd4d7a4b6de68b3ad79843b82764c4a5d7f8565fad973c9b2793b5081e RLBA-2021:1591 libxslt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libxslt-1.1.32-6.el8.aarch64.rpm c931a36d09edc1c8d70174979d25881755b03613041ac8915c0dcce812b9baab libxslt-1.1.32-6.el8.aarch64.rpm c931a36d09edc1c8d70174979d25881755b03613041ac8915c0dcce812b9baab libxslt-1.1.32-6.el8.aarch64.rpm c931a36d09edc1c8d70174979d25881755b03613041ac8915c0dcce812b9baab libxslt-1.1.32-6.el8.aarch64.rpm c931a36d09edc1c8d70174979d25881755b03613041ac8915c0dcce812b9baab RLSA-2021:1600 Moderate: opensc security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opensc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures. Security Fix(es): * opensc: heap-based buffer overflow in sc_oberthur_read_file (CVE-2020-26570) * opensc: stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init (CVE-2020-26571) * opensc: stack-based buffer overflow in tcos_decipher (CVE-2020-26572) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms opensc-0.20.0-4.el8.aarch64.rpm 164d3a5d5354414bb3d3d20b7cb1de9fb74d0d9c900811e5aaa93778b7587ce1 opensc-0.20.0-4.el8.aarch64.rpm 164d3a5d5354414bb3d3d20b7cb1de9fb74d0d9c900811e5aaa93778b7587ce1 opensc-0.20.0-4.el8.aarch64.rpm 164d3a5d5354414bb3d3d20b7cb1de9fb74d0d9c900811e5aaa93778b7587ce1 opensc-0.20.0-4.el8.aarch64.rpm 164d3a5d5354414bb3d3d20b7cb1de9fb74d0d9c900811e5aaa93778b7587ce1 RLSA-2021:1609 Moderate: p11-kit security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for p11-kit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files. The following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853) Security Fix(es): * p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361) * p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362) * p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms p11-kit-0.23.22-1.el8.aarch64.rpm 08f2c614565050ddc0b24e6f0cf6f70b15fe5dd932ec90ffddb46598e6ebf25e p11-kit-0.23.22-1.el8.aarch64.rpm 08f2c614565050ddc0b24e6f0cf6f70b15fe5dd932ec90ffddb46598e6ebf25e p11-kit-0.23.22-1.el8.aarch64.rpm 08f2c614565050ddc0b24e6f0cf6f70b15fe5dd932ec90ffddb46598e6ebf25e p11-kit-0.23.22-1.el8.aarch64.rpm 08f2c614565050ddc0b24e6f0cf6f70b15fe5dd932ec90ffddb46598e6ebf25e p11-kit-devel-0.23.22-1.el8.aarch64.rpm 6159beebcc1ad813d690297e11f3119f15d6c944f189e9bc20607f31aacc9013 p11-kit-devel-0.23.22-1.el8.aarch64.rpm 6159beebcc1ad813d690297e11f3119f15d6c944f189e9bc20607f31aacc9013 p11-kit-devel-0.23.22-1.el8.aarch64.rpm 6159beebcc1ad813d690297e11f3119f15d6c944f189e9bc20607f31aacc9013 p11-kit-devel-0.23.22-1.el8.aarch64.rpm 6159beebcc1ad813d690297e11f3119f15d6c944f189e9bc20607f31aacc9013 p11-kit-server-0.23.22-1.el8.aarch64.rpm 4e7583b3d5c634bccda9397c2f3c1380e02189e4b96a3423a46b7e35d696e599 p11-kit-server-0.23.22-1.el8.aarch64.rpm 4e7583b3d5c634bccda9397c2f3c1380e02189e4b96a3423a46b7e35d696e599 p11-kit-server-0.23.22-1.el8.aarch64.rpm 4e7583b3d5c634bccda9397c2f3c1380e02189e4b96a3423a46b7e35d696e599 p11-kit-server-0.23.22-1.el8.aarch64.rpm 4e7583b3d5c634bccda9397c2f3c1380e02189e4b96a3423a46b7e35d696e599 p11-kit-trust-0.23.22-1.el8.aarch64.rpm 3dd1ad4e759faef4efcdb435a85b28d92e6f1dc268680415b7b22de588d2f2da p11-kit-trust-0.23.22-1.el8.aarch64.rpm 3dd1ad4e759faef4efcdb435a85b28d92e6f1dc268680415b7b22de588d2f2da p11-kit-trust-0.23.22-1.el8.aarch64.rpm 3dd1ad4e759faef4efcdb435a85b28d92e6f1dc268680415b7b22de588d2f2da p11-kit-trust-0.23.22-1.el8.aarch64.rpm 3dd1ad4e759faef4efcdb435a85b28d92e6f1dc268680415b7b22de588d2f2da RLBA-2021:1612 avahi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms avahi-0.7-20.el8.aarch64.rpm 5ea165cfb19344e5d3cf9e67d4314594283a93e058159c88d2a919a3c5194d8d avahi-0.7-20.el8.aarch64.rpm 5ea165cfb19344e5d3cf9e67d4314594283a93e058159c88d2a919a3c5194d8d avahi-0.7-20.el8.aarch64.rpm 5ea165cfb19344e5d3cf9e67d4314594283a93e058159c88d2a919a3c5194d8d avahi-0.7-20.el8.aarch64.rpm 5ea165cfb19344e5d3cf9e67d4314594283a93e058159c88d2a919a3c5194d8d avahi-autoipd-0.7-20.el8.aarch64.rpm 0576f5168271971c0e0e52dbb8d0482eb93fa111fa6102af4014eda72791dec9 avahi-autoipd-0.7-20.el8.aarch64.rpm 0576f5168271971c0e0e52dbb8d0482eb93fa111fa6102af4014eda72791dec9 avahi-autoipd-0.7-20.el8.aarch64.rpm 0576f5168271971c0e0e52dbb8d0482eb93fa111fa6102af4014eda72791dec9 avahi-autoipd-0.7-20.el8.aarch64.rpm 0576f5168271971c0e0e52dbb8d0482eb93fa111fa6102af4014eda72791dec9 avahi-glib-0.7-20.el8.aarch64.rpm 4b7f151019e0a7ff73ba538b7049149524c9065416b0aec9818bf059a26d9ec7 avahi-glib-0.7-20.el8.aarch64.rpm 4b7f151019e0a7ff73ba538b7049149524c9065416b0aec9818bf059a26d9ec7 avahi-glib-0.7-20.el8.aarch64.rpm 4b7f151019e0a7ff73ba538b7049149524c9065416b0aec9818bf059a26d9ec7 avahi-glib-0.7-20.el8.aarch64.rpm 4b7f151019e0a7ff73ba538b7049149524c9065416b0aec9818bf059a26d9ec7 avahi-gobject-0.7-20.el8.aarch64.rpm b82928be917bc2c5ce721917673f6c091ae4fee848f9fa20f3bf949ef2ec9fdc avahi-gobject-0.7-20.el8.aarch64.rpm b82928be917bc2c5ce721917673f6c091ae4fee848f9fa20f3bf949ef2ec9fdc avahi-gobject-0.7-20.el8.aarch64.rpm b82928be917bc2c5ce721917673f6c091ae4fee848f9fa20f3bf949ef2ec9fdc avahi-gobject-0.7-20.el8.aarch64.rpm b82928be917bc2c5ce721917673f6c091ae4fee848f9fa20f3bf949ef2ec9fdc avahi-libs-0.7-20.el8.aarch64.rpm df0704d7a1e6e8322c9537cbe558cb0df331ffa2c79433e112d46eeb39e8a715 avahi-libs-0.7-20.el8.aarch64.rpm df0704d7a1e6e8322c9537cbe558cb0df331ffa2c79433e112d46eeb39e8a715 avahi-libs-0.7-20.el8.aarch64.rpm df0704d7a1e6e8322c9537cbe558cb0df331ffa2c79433e112d46eeb39e8a715 avahi-libs-0.7-20.el8.aarch64.rpm df0704d7a1e6e8322c9537cbe558cb0df331ffa2c79433e112d46eeb39e8a715 python3-avahi-0.7-20.el8.aarch64.rpm be5a19239e15bb708477a693de8d0a69dff6e1e5406dca7dfd5c649bede13745 python3-avahi-0.7-20.el8.aarch64.rpm be5a19239e15bb708477a693de8d0a69dff6e1e5406dca7dfd5c649bede13745 python3-avahi-0.7-20.el8.aarch64.rpm be5a19239e15bb708477a693de8d0a69dff6e1e5406dca7dfd5c649bede13745 python3-avahi-0.7-20.el8.aarch64.rpm be5a19239e15bb708477a693de8d0a69dff6e1e5406dca7dfd5c649bede13745 RLBA-2021:1619 efi-rpm-macros bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for efi-rpm-macros. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 efi-filesystem-3-3.el8.noarch.rpm 2965cc62c33345d6d75bf5c89954e507a296b220e4076f71668b211a6acc4e91 RLSA-2021:1627 Moderate: trousers security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list TrouSerS is an implementation of the Trusted Computing Group's Software Stack (TSS) specification. TrouSerS enables the user to write applications that make use of the Trusted Platform Module (TPM) hardware. The following packages have been upgraded to a later upstream version: trousers (0.3.15). (BZ#1725782) Security Fix(es): * trousers: tss user still has read and write access to the /etc/tcsd.conf file if tcsd is started as root (CVE-2020-24331) * trousers: tss user can be used to create or corrupt existing files, this could lead to DoS (CVE-2020-24332) * trousers: fails to drop the root gid privilege when no longer needed (CVE-2020-24330) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms trousers-0.3.15-1.el8.aarch64.rpm e35cc3701b3030b5abf176e380118f1df2f6e4ff4d19438c53976453773ed893 trousers-0.3.15-1.el8.aarch64.rpm e35cc3701b3030b5abf176e380118f1df2f6e4ff4d19438c53976453773ed893 trousers-0.3.15-1.el8.aarch64.rpm e35cc3701b3030b5abf176e380118f1df2f6e4ff4d19438c53976453773ed893 trousers-0.3.15-1.el8.aarch64.rpm e35cc3701b3030b5abf176e380118f1df2f6e4ff4d19438c53976453773ed893 trousers-lib-0.3.15-1.el8.aarch64.rpm b7c7bd8861a9d3ce807f2d3c0b8bd4afda6a8f4587db20e4ac96d2fde4fafacd trousers-lib-0.3.15-1.el8.aarch64.rpm b7c7bd8861a9d3ce807f2d3c0b8bd4afda6a8f4587db20e4ac96d2fde4fafacd trousers-lib-0.3.15-1.el8.aarch64.rpm b7c7bd8861a9d3ce807f2d3c0b8bd4afda6a8f4587db20e4ac96d2fde4fafacd trousers-lib-0.3.15-1.el8.aarch64.rpm b7c7bd8861a9d3ce807f2d3c0b8bd4afda6a8f4587db20e4ac96d2fde4fafacd RLBA-2021:1628 tpm-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tpm-tools-1.3.9.2-1.el8.aarch64.rpm 5aac85af139bc5277ae056757fe3295c575d591ed3f017f12eb1fe0c50af1805 tpm-tools-1.3.9.2-1.el8.aarch64.rpm 5aac85af139bc5277ae056757fe3295c575d591ed3f017f12eb1fe0c50af1805 tpm-tools-1.3.9.2-1.el8.aarch64.rpm 5aac85af139bc5277ae056757fe3295c575d591ed3f017f12eb1fe0c50af1805 tpm-tools-1.3.9.2-1.el8.aarch64.rpm 5aac85af139bc5277ae056757fe3295c575d591ed3f017f12eb1fe0c50af1805 tpm-tools-pkcs11-1.3.9.2-1.el8.aarch64.rpm 371fb273440254bd8398791a97190abf324bff6273e97580a0cd79786586c9a8 tpm-tools-pkcs11-1.3.9.2-1.el8.aarch64.rpm 371fb273440254bd8398791a97190abf324bff6273e97580a0cd79786586c9a8 tpm-tools-pkcs11-1.3.9.2-1.el8.aarch64.rpm 371fb273440254bd8398791a97190abf324bff6273e97580a0cd79786586c9a8 tpm-tools-pkcs11-1.3.9.2-1.el8.aarch64.rpm 371fb273440254bd8398791a97190abf324bff6273e97580a0cd79786586c9a8 RLSA-2021:1631 Moderate: python-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 python3-urllib3-1.24.2-5.el8.noarch.rpm 8fdeed36e708fa14b16c2a3f48484a8867fdf8a4b1df17a046ad5b9a0f880a08 RLEA-2021:1658 pciutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pciutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms pciutils-3.7.0-1.el8.aarch64.rpm d17271f11a438ed284093af131297bf122422c9ecb49fbd309b7281d5bd1a54e pciutils-3.7.0-1.el8.aarch64.rpm d17271f11a438ed284093af131297bf122422c9ecb49fbd309b7281d5bd1a54e pciutils-3.7.0-1.el8.aarch64.rpm d17271f11a438ed284093af131297bf122422c9ecb49fbd309b7281d5bd1a54e pciutils-3.7.0-1.el8.aarch64.rpm d17271f11a438ed284093af131297bf122422c9ecb49fbd309b7281d5bd1a54e pciutils-devel-3.7.0-1.el8.aarch64.rpm 116a768e1328ca72401320aad8ea3b22f37bca143d702e8afb09f5a1594ba8e2 pciutils-devel-3.7.0-1.el8.aarch64.rpm 116a768e1328ca72401320aad8ea3b22f37bca143d702e8afb09f5a1594ba8e2 pciutils-devel-3.7.0-1.el8.aarch64.rpm 116a768e1328ca72401320aad8ea3b22f37bca143d702e8afb09f5a1594ba8e2 pciutils-devel-3.7.0-1.el8.aarch64.rpm 116a768e1328ca72401320aad8ea3b22f37bca143d702e8afb09f5a1594ba8e2 pciutils-libs-3.7.0-1.el8.aarch64.rpm 944e24132bdbe169250f5786bcb4d0db46b84d5891ee903857916927bc511e73 pciutils-libs-3.7.0-1.el8.aarch64.rpm 944e24132bdbe169250f5786bcb4d0db46b84d5891ee903857916927bc511e73 pciutils-libs-3.7.0-1.el8.aarch64.rpm 944e24132bdbe169250f5786bcb4d0db46b84d5891ee903857916927bc511e73 pciutils-libs-3.7.0-1.el8.aarch64.rpm 944e24132bdbe169250f5786bcb4d0db46b84d5891ee903857916927bc511e73 RLBA-2021:1660 tpm2-abrmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd, tpm2-abrmd-selinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tpm2-abrmd-2.3.3-2.el8.aarch64.rpm 385d4641ca463c2e9ca4a0b50512742d541bd86733e40893a26a182857d2925f tpm2-abrmd-2.3.3-2.el8.aarch64.rpm 385d4641ca463c2e9ca4a0b50512742d541bd86733e40893a26a182857d2925f tpm2-abrmd-2.3.3-2.el8.aarch64.rpm 385d4641ca463c2e9ca4a0b50512742d541bd86733e40893a26a182857d2925f tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b tpm2-abrmd-selinux-2.3.1-1.el8.noarch.rpm bd58f2d1bd5e738dc1806370069adaad96f7169c5506849dad5df54b286a4f7b RLEA-2021:1673 crda bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crda. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b crda-3.18_2020.04.29-1.el8.noarch.rpm 64207a7a6df3440ea81773b7c75c14ece0012b75908581c249c31d83324c8b4b RLBA-2021:1681 vhostmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vhostmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms vm-dump-metrics-1.1-5.el8.aarch64.rpm 28f9ee66b9c4b7f68f45ea99fff0da8ec9ed93e75f9d768f9dbc2718569f3529 vm-dump-metrics-1.1-5.el8.aarch64.rpm 28f9ee66b9c4b7f68f45ea99fff0da8ec9ed93e75f9d768f9dbc2718569f3529 vm-dump-metrics-1.1-5.el8.aarch64.rpm 28f9ee66b9c4b7f68f45ea99fff0da8ec9ed93e75f9d768f9dbc2718569f3529 vm-dump-metrics-1.1-5.el8.aarch64.rpm 28f9ee66b9c4b7f68f45ea99fff0da8ec9ed93e75f9d768f9dbc2718569f3529 vm-dump-metrics-devel-1.1-5.el8.aarch64.rpm c527f061d8414de4aea3089676ac5a1576be122b1dcf1107074471b9cb7be3f0 vm-dump-metrics-devel-1.1-5.el8.aarch64.rpm c527f061d8414de4aea3089676ac5a1576be122b1dcf1107074471b9cb7be3f0 vm-dump-metrics-devel-1.1-5.el8.aarch64.rpm c527f061d8414de4aea3089676ac5a1576be122b1dcf1107074471b9cb7be3f0 vm-dump-metrics-devel-1.1-5.el8.aarch64.rpm c527f061d8414de4aea3089676ac5a1576be122b1dcf1107074471b9cb7be3f0 RLBA-2021:1687 dejavu-fonts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dejavu-fonts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-fonts-common-2.35-7.el8.noarch.rpm 6e64def2370390384d4cdd21c778c5dcb505c5f7775fd8de59c7af7e7695aa49 dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-fonts-2.35-7.el8.noarch.rpm e6d02d1a8c0df5e81a27f3ce6990dd15eaf7fc9d28d754d6d59c58db6983245e dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-sans-mono-fonts-2.35-7.el8.noarch.rpm 7cf6c7c26ee37725d37f5cb320861dff6599e0402f02e7e23455235625ac2dd4 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 dejavu-serif-fonts-2.35-7.el8.noarch.rpm 8df26e98b626bcd423f2894b760cee33cc0b1a0b2305ca9424366810a508e800 RLBA-2021:1689 librepo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo, librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms librepo-1.12.0-3.el8.aarch64.rpm 403f944fbae83923cc4646c4e6d4fc2ec856568e4acfa0c173b2ec8e3971af3d librhsm-0.0.3-4.el8.aarch64.rpm 37f7bca8aca864d085b0060a2aada53eccca0c7b22ae9c58cc7b2f9e9646b0a1 librhsm-0.0.3-4.el8.aarch64.rpm 37f7bca8aca864d085b0060a2aada53eccca0c7b22ae9c58cc7b2f9e9646b0a1 librhsm-0.0.3-4.el8.aarch64.rpm 37f7bca8aca864d085b0060a2aada53eccca0c7b22ae9c58cc7b2f9e9646b0a1 librhsm-0.0.3-4.el8.aarch64.rpm 37f7bca8aca864d085b0060a2aada53eccca0c7b22ae9c58cc7b2f9e9646b0a1 python3-librepo-1.12.0-3.el8.aarch64.rpm 481a0a16bbee4705c45d2eeca1f76124f3009ac5fc795292ed71126f8819f09f RLBA-2021:1691 iptraf-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptraf-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms iptraf-ng-1.2.1-2.el8.aarch64.rpm c25d4dc4050caad8d3b6d177a34bdd58874e9c323bd4627c12a8dd82e25dc7d6 iptraf-ng-1.2.1-2.el8.aarch64.rpm c25d4dc4050caad8d3b6d177a34bdd58874e9c323bd4627c12a8dd82e25dc7d6 iptraf-ng-1.2.1-2.el8.aarch64.rpm c25d4dc4050caad8d3b6d177a34bdd58874e9c323bd4627c12a8dd82e25dc7d6 iptraf-ng-1.2.1-2.el8.aarch64.rpm c25d4dc4050caad8d3b6d177a34bdd58874e9c323bd4627c12a8dd82e25dc7d6 RLBA-2021:1698 python-ply bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ply. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 python3-ply-3.9-9.el8.noarch.rpm b24a8c5e63629dd1719963d3dd627269c7154961a53dd893527520558aae1b87 RLBA-2021:1699 crontabs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crontabs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 crontabs-1.11-17.20190603git.el8.noarch.rpm 0806f1c9d5721534d4fb8fe0f931fae088f426846f8b20dd481cbf8631bec8f5 RLSA-2021:1702 Moderate: brotli security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * brotli: buffer overflow when input chunk is larger than 2GiB (CVE-2020-8927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms brotli-1.0.6-3.el8.aarch64.rpm 70943540adca1c0501ce9d356730014e327797413bf1028aacfc7d2cde029ca0 brotli-1.0.6-3.el8.aarch64.rpm 70943540adca1c0501ce9d356730014e327797413bf1028aacfc7d2cde029ca0 brotli-1.0.6-3.el8.aarch64.rpm 70943540adca1c0501ce9d356730014e327797413bf1028aacfc7d2cde029ca0 brotli-1.0.6-3.el8.aarch64.rpm 70943540adca1c0501ce9d356730014e327797413bf1028aacfc7d2cde029ca0 RLEA-2021:1707 bolt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bolt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms bolt-0.9.1-1.el8.aarch64.rpm 44f115e18df5c6a616e896f350a7c75b04bc0cdbea5cc64ac2b04a3252138979 bolt-0.9.1-1.el8.aarch64.rpm 44f115e18df5c6a616e896f350a7c75b04bc0cdbea5cc64ac2b04a3252138979 bolt-0.9.1-1.el8.aarch64.rpm 44f115e18df5c6a616e896f350a7c75b04bc0cdbea5cc64ac2b04a3252138979 bolt-0.9.1-1.el8.aarch64.rpm 44f115e18df5c6a616e896f350a7c75b04bc0cdbea5cc64ac2b04a3252138979 RLBA-2021:1709 popt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for popt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms popt-1.18-1.el8.aarch64.rpm 0b152ba0c29df0d4f7d079a367e9bb81513c4e69955dbe494bf38b772634d0f2 popt-1.18-1.el8.aarch64.rpm 0b152ba0c29df0d4f7d079a367e9bb81513c4e69955dbe494bf38b772634d0f2 popt-1.18-1.el8.aarch64.rpm 0b152ba0c29df0d4f7d079a367e9bb81513c4e69955dbe494bf38b772634d0f2 popt-1.18-1.el8.aarch64.rpm 0b152ba0c29df0d4f7d079a367e9bb81513c4e69955dbe494bf38b772634d0f2 popt-devel-1.18-1.el8.aarch64.rpm 4b346d06e512c4ea8d1d38adc9d7460bf242d1f705ab63cd64b64160299015da popt-devel-1.18-1.el8.aarch64.rpm 4b346d06e512c4ea8d1d38adc9d7460bf242d1f705ab63cd64b64160299015da popt-devel-1.18-1.el8.aarch64.rpm 4b346d06e512c4ea8d1d38adc9d7460bf242d1f705ab63cd64b64160299015da popt-devel-1.18-1.el8.aarch64.rpm 4b346d06e512c4ea8d1d38adc9d7460bf242d1f705ab63cd64b64160299015da RLEA-2021:1712 libpcap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libpcap-1.9.1-5.el8.aarch64.rpm c1bc09b7c980260a8c79b40b9e34a1a3de4307652d369c77bbe17e8eb1785728 libpcap-1.9.1-5.el8.aarch64.rpm c1bc09b7c980260a8c79b40b9e34a1a3de4307652d369c77bbe17e8eb1785728 libpcap-1.9.1-5.el8.aarch64.rpm c1bc09b7c980260a8c79b40b9e34a1a3de4307652d369c77bbe17e8eb1785728 libpcap-1.9.1-5.el8.aarch64.rpm c1bc09b7c980260a8c79b40b9e34a1a3de4307652d369c77bbe17e8eb1785728 RLEA-2021:1720 ima-evm-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ima-evm-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ima-evm-utils0-1.3.2-12.el8.aarch64.rpm e09bc4c91ab0f6318f0eb8085175af591e963a21c51eb00626000cc9898b1e06 ima-evm-utils0-1.3.2-12.el8.aarch64.rpm e09bc4c91ab0f6318f0eb8085175af591e963a21c51eb00626000cc9898b1e06 ima-evm-utils0-1.3.2-12.el8.aarch64.rpm e09bc4c91ab0f6318f0eb8085175af591e963a21c51eb00626000cc9898b1e06 ima-evm-utils0-1.3.2-12.el8.aarch64.rpm e09bc4c91ab0f6318f0eb8085175af591e963a21c51eb00626000cc9898b1e06 ima-evm-utils-1.3.2-12.el8.aarch64.rpm bfeaf876c3ee8d48cc90e8e88e0c55b9a3ca10f02cd9299b8c9b3ca637a68456 ima-evm-utils-1.3.2-12.el8.aarch64.rpm bfeaf876c3ee8d48cc90e8e88e0c55b9a3ca10f02cd9299b8c9b3ca637a68456 ima-evm-utils-1.3.2-12.el8.aarch64.rpm bfeaf876c3ee8d48cc90e8e88e0c55b9a3ca10f02cd9299b8c9b3ca637a68456 ima-evm-utils-1.3.2-12.el8.aarch64.rpm bfeaf876c3ee8d48cc90e8e88e0c55b9a3ca10f02cd9299b8c9b3ca637a68456 RLBA-2021:1731 userspace-rcu bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for userspace-rcu. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms userspace-rcu-0.10.1-4.el8.aarch64.rpm b79de5dd720e0bf496b56663acf6a10878258b971e891258275fa4af16d3a1b1 userspace-rcu-0.10.1-4.el8.aarch64.rpm b79de5dd720e0bf496b56663acf6a10878258b971e891258275fa4af16d3a1b1 userspace-rcu-0.10.1-4.el8.aarch64.rpm b79de5dd720e0bf496b56663acf6a10878258b971e891258275fa4af16d3a1b1 userspace-rcu-0.10.1-4.el8.aarch64.rpm b79de5dd720e0bf496b56663acf6a10878258b971e891258275fa4af16d3a1b1 RLBA-2021:1732 squashfs-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for squashfs-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms squashfs-tools-4.3-20.el8.aarch64.rpm 891b0fa964778bdb794b5b398bff430b70eaae0e8d6899015703e7253fbf7b65 squashfs-tools-4.3-20.el8.aarch64.rpm 891b0fa964778bdb794b5b398bff430b70eaae0e8d6899015703e7253fbf7b65 squashfs-tools-4.3-20.el8.aarch64.rpm 891b0fa964778bdb794b5b398bff430b70eaae0e8d6899015703e7253fbf7b65 squashfs-tools-4.3-20.el8.aarch64.rpm 891b0fa964778bdb794b5b398bff430b70eaae0e8d6899015703e7253fbf7b65 RLSA-2021:2575 Moderate: lz4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for lz4. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems. Security Fix(es): * lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms lz4-1.8.3-3.el8_4.aarch64.rpm 696c7dfc2e3b01a795fedfc0808fc7de5a82e4d1f49654e90b86041417d5c0c6 lz4-1.8.3-3.el8_4.aarch64.rpm 696c7dfc2e3b01a795fedfc0808fc7de5a82e4d1f49654e90b86041417d5c0c6 lz4-1.8.3-3.el8_4.aarch64.rpm 696c7dfc2e3b01a795fedfc0808fc7de5a82e4d1f49654e90b86041417d5c0c6 lz4-1.8.3-3.el8_4.aarch64.rpm 696c7dfc2e3b01a795fedfc0808fc7de5a82e4d1f49654e90b86041417d5c0c6 lz4-devel-1.8.3-3.el8_4.aarch64.rpm 193cc35b57a8d161be73c6372730b21306f35a2accadc6cc29830399e2f0e61b lz4-devel-1.8.3-3.el8_4.aarch64.rpm 193cc35b57a8d161be73c6372730b21306f35a2accadc6cc29830399e2f0e61b lz4-devel-1.8.3-3.el8_4.aarch64.rpm 193cc35b57a8d161be73c6372730b21306f35a2accadc6cc29830399e2f0e61b lz4-devel-1.8.3-3.el8_4.aarch64.rpm 193cc35b57a8d161be73c6372730b21306f35a2accadc6cc29830399e2f0e61b lz4-libs-1.8.3-3.el8_4.aarch64.rpm d76fb7b3e3cefe2a66de064138c1f85d3a7a9a18b34360bbd679bd966b2a0d4d lz4-libs-1.8.3-3.el8_4.aarch64.rpm d76fb7b3e3cefe2a66de064138c1f85d3a7a9a18b34360bbd679bd966b2a0d4d lz4-libs-1.8.3-3.el8_4.aarch64.rpm d76fb7b3e3cefe2a66de064138c1f85d3a7a9a18b34360bbd679bd966b2a0d4d lz4-libs-1.8.3-3.el8_4.aarch64.rpm d76fb7b3e3cefe2a66de064138c1f85d3a7a9a18b34360bbd679bd966b2a0d4d RLBA-2021:3049 pcsc-lite bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite-ccid, pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PC/SC Lite provides a Windows SCard compatible interface for communicating with smart cards, smart card readers, and other security tokens. Bug Fixes: * Increase global reader array size to 48 to address issue with RHCS secure channel creation (BZ#1972569) * Increase global reader array size to 48 to address issue with RHCS secure channel creation (pcsc-lite-ccid) (BZ#1973405) none-baseos-rpms pcsc-lite-1.8.23-4.1.el8_4.aarch64.rpm ed784be5c4a2da44545229677e540020baddd5c56d89e370e6f1759520d54e9a pcsc-lite-1.8.23-4.1.el8_4.aarch64.rpm ed784be5c4a2da44545229677e540020baddd5c56d89e370e6f1759520d54e9a pcsc-lite-ccid-1.4.29-5.1.el8_4.aarch64.rpm 3344f5849a894d9a1b794dff7b6855ee738988deb423237e87ce370a139a9461 pcsc-lite-ccid-1.4.29-5.1.el8_4.aarch64.rpm 3344f5849a894d9a1b794dff7b6855ee738988deb423237e87ce370a139a9461 pcsc-lite-ccid-1.4.29-5.1.el8_4.aarch64.rpm 3344f5849a894d9a1b794dff7b6855ee738988deb423237e87ce370a139a9461 pcsc-lite-ccid-1.4.29-5.1.el8_4.aarch64.rpm 3344f5849a894d9a1b794dff7b6855ee738988deb423237e87ce370a139a9461 pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc pcsc-lite-doc-1.8.23-4.1.el8_4.noarch.rpm b10402549b29b228feff2935a7cb3e4a946479e9e12829b7dd7b6e44730409dc pcsc-lite-libs-1.8.23-4.1.el8_4.aarch64.rpm 745e5662bb5bb2761750dbaf74e20711d8ae8006486b5af0a812476d97b9de0a pcsc-lite-libs-1.8.23-4.1.el8_4.aarch64.rpm 745e5662bb5bb2761750dbaf74e20711d8ae8006486b5af0a812476d97b9de0a RLBA-2021:3594 libdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Bug Fix(es) and Enhancement(s): * [FJ8.4 Bug]: [REG]The rpm command hangs and the CPU usage reaches 100% (BZ#2001972) none-baseos-rpms libdb-5.3.28-42.el8_4.aarch64.rpm f1b46b46efe469ee828526cc8840a0491b454c9f8bd55a89a91313111176d02e libdb-5.3.28-42.el8_4.aarch64.rpm f1b46b46efe469ee828526cc8840a0491b454c9f8bd55a89a91313111176d02e libdb-5.3.28-42.el8_4.aarch64.rpm f1b46b46efe469ee828526cc8840a0491b454c9f8bd55a89a91313111176d02e libdb-5.3.28-42.el8_4.aarch64.rpm f1b46b46efe469ee828526cc8840a0491b454c9f8bd55a89a91313111176d02e libdb-utils-5.3.28-42.el8_4.aarch64.rpm 837085b66d2b6498e6c67b92eb52b4589c557f207cc11769b2774bb2acaf33fd libdb-utils-5.3.28-42.el8_4.aarch64.rpm 837085b66d2b6498e6c67b92eb52b4589c557f207cc11769b2774bb2acaf33fd libdb-utils-5.3.28-42.el8_4.aarch64.rpm 837085b66d2b6498e6c67b92eb52b4589c557f207cc11769b2774bb2acaf33fd libdb-utils-5.3.28-42.el8_4.aarch64.rpm 837085b66d2b6498e6c67b92eb52b4589c557f207cc11769b2774bb2acaf33fd RLBA-2021:4353 lm_sensors bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms lm_sensors-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm ffc729370897eee6b4b7daa3bf878eee28866a005a3f24e2ba47aba133ca701d lm_sensors-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm ffc729370897eee6b4b7daa3bf878eee28866a005a3f24e2ba47aba133ca701d lm_sensors-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm ffc729370897eee6b4b7daa3bf878eee28866a005a3f24e2ba47aba133ca701d lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 0f256d299942ad27e27bbe2fb91b09105478df66c65993054648a554882b8d9a lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 0f256d299942ad27e27bbe2fb91b09105478df66c65993054648a554882b8d9a lm_sensors-devel-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 0f256d299942ad27e27bbe2fb91b09105478df66c65993054648a554882b8d9a lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 3b817b2e17006d5f76598e41fe2d967710d0e1b295f0cd468ff26be0ffeffbc5 lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 3b817b2e17006d5f76598e41fe2d967710d0e1b295f0cd468ff26be0ffeffbc5 lm_sensors-libs-3.4.0-23.20180522git70f7e08.el8.aarch64.rpm 3b817b2e17006d5f76598e41fe2d967710d0e1b295f0cd468ff26be0ffeffbc5 RLBA-2021:4354 libndp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libndp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libndp-1.7-6.el8.aarch64.rpm e0e5752c2929eb2c831052d390e51807e2b5850a6ffe03192f6dfb2122be6306 libndp-1.7-6.el8.aarch64.rpm e0e5752c2929eb2c831052d390e51807e2b5850a6ffe03192f6dfb2122be6306 libndp-1.7-6.el8.aarch64.rpm e0e5752c2929eb2c831052d390e51807e2b5850a6ffe03192f6dfb2122be6306 RLBA-2021:4363 gfs2-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gfs2-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms gfs2-utils-3.2.0-11.el8.aarch64.rpm 677c3378eb14afdb6a0f71cbdae0e8dd388f4efbf1d777c688881db82e731958 gfs2-utils-3.2.0-11.el8.aarch64.rpm 677c3378eb14afdb6a0f71cbdae0e8dd388f4efbf1d777c688881db82e731958 gfs2-utils-3.2.0-11.el8.aarch64.rpm 677c3378eb14afdb6a0f71cbdae0e8dd388f4efbf1d777c688881db82e731958 RLBA-2021:4371 libxcrypt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libxcrypt-4.1.1-6.el8.aarch64.rpm 4297629a9d4951880629af6c9c87f48bc6b785577196fa690b377dbd48a513fd libxcrypt-4.1.1-6.el8.aarch64.rpm 4297629a9d4951880629af6c9c87f48bc6b785577196fa690b377dbd48a513fd libxcrypt-4.1.1-6.el8.aarch64.rpm 4297629a9d4951880629af6c9c87f48bc6b785577196fa690b377dbd48a513fd libxcrypt-devel-4.1.1-6.el8.aarch64.rpm da9307e19104245a81d4174b81135d92376dfd15397383245532001838a2de19 libxcrypt-devel-4.1.1-6.el8.aarch64.rpm da9307e19104245a81d4174b81135d92376dfd15397383245532001838a2de19 libxcrypt-devel-4.1.1-6.el8.aarch64.rpm da9307e19104245a81d4174b81135d92376dfd15397383245532001838a2de19 RLSA-2021:4373 Low: pcre security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for pcre. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list PCRE is a Perl-compatible regular expression library. Security Fix(es): * pcre: Buffer over-read in JIT when UTF is disabled and \X or \R has fixed quantifier greater than 1 (CVE-2019-20838) * pcre: Integer overflow when parsing callout numeric arguments (CVE-2020-14155) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms pcre-8.42-6.el8.aarch64.rpm d2233f6aebbb5ac9f90a6d374650c445794fe5ecf857236228a4cc006206b068 pcre-8.42-6.el8.aarch64.rpm d2233f6aebbb5ac9f90a6d374650c445794fe5ecf857236228a4cc006206b068 pcre-8.42-6.el8.aarch64.rpm d2233f6aebbb5ac9f90a6d374650c445794fe5ecf857236228a4cc006206b068 pcre-cpp-8.42-6.el8.aarch64.rpm 11747984326dd29836ed4544cb6c652041ed0e6ed9e925768a6ce4261db51d6b pcre-cpp-8.42-6.el8.aarch64.rpm 11747984326dd29836ed4544cb6c652041ed0e6ed9e925768a6ce4261db51d6b pcre-cpp-8.42-6.el8.aarch64.rpm 11747984326dd29836ed4544cb6c652041ed0e6ed9e925768a6ce4261db51d6b pcre-devel-8.42-6.el8.aarch64.rpm 287960d8b6336ef28563b412c7a059d5657e55382f515f3b9eb1bd378789da79 pcre-devel-8.42-6.el8.aarch64.rpm 287960d8b6336ef28563b412c7a059d5657e55382f515f3b9eb1bd378789da79 pcre-devel-8.42-6.el8.aarch64.rpm 287960d8b6336ef28563b412c7a059d5657e55382f515f3b9eb1bd378789da79 pcre-utf16-8.42-6.el8.aarch64.rpm 55c0ac0f4c6959e1c9383a62e36a58df4eed153d17f152cad9699aae5e5c4c34 pcre-utf16-8.42-6.el8.aarch64.rpm 55c0ac0f4c6959e1c9383a62e36a58df4eed153d17f152cad9699aae5e5c4c34 pcre-utf16-8.42-6.el8.aarch64.rpm 55c0ac0f4c6959e1c9383a62e36a58df4eed153d17f152cad9699aae5e5c4c34 pcre-utf32-8.42-6.el8.aarch64.rpm bae262449b3463dd12d59aa9cfaed79f208482d80d8ce72e89a5ec6a2cef3dbe pcre-utf32-8.42-6.el8.aarch64.rpm bae262449b3463dd12d59aa9cfaed79f208482d80d8ce72e89a5ec6a2cef3dbe pcre-utf32-8.42-6.el8.aarch64.rpm bae262449b3463dd12d59aa9cfaed79f208482d80d8ce72e89a5ec6a2cef3dbe RLBA-2021:4377 quota bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for quota. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms quota-4.04-14.el8.aarch64.rpm 78583ab44caf019a1adc6cf81d3cc4126e7b384ef404f57d311a50873e35ebf6 quota-4.04-14.el8.aarch64.rpm 78583ab44caf019a1adc6cf81d3cc4126e7b384ef404f57d311a50873e35ebf6 quota-4.04-14.el8.aarch64.rpm 78583ab44caf019a1adc6cf81d3cc4126e7b384ef404f57d311a50873e35ebf6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-doc-4.04-14.el8.noarch.rpm 7e2f86b476ffd378aefce5518715d0e70943fc3046bf407050b997dcc65f48f6 quota-nld-4.04-14.el8.aarch64.rpm 211fdbc263f69c13bcc1dd6d308421c79078dec59b8ab6967511fc1a26d8f2c1 quota-nld-4.04-14.el8.aarch64.rpm 211fdbc263f69c13bcc1dd6d308421c79078dec59b8ab6967511fc1a26d8f2c1 quota-nld-4.04-14.el8.aarch64.rpm 211fdbc263f69c13bcc1dd6d308421c79078dec59b8ab6967511fc1a26d8f2c1 quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-nls-4.04-14.el8.noarch.rpm e55b428a86b3464cdcd4520c9d101159f721a47b83e19a38e414e66d5c61c69a quota-rpc-4.04-14.el8.aarch64.rpm d559be3c53591efe8d795304a71b5ebd5f7e314fb0453bdde5850b99816e4eb8 quota-rpc-4.04-14.el8.aarch64.rpm d559be3c53591efe8d795304a71b5ebd5f7e314fb0453bdde5850b99816e4eb8 quota-rpc-4.04-14.el8.aarch64.rpm d559be3c53591efe8d795304a71b5ebd5f7e314fb0453bdde5850b99816e4eb8 quota-warnquota-4.04-14.el8.aarch64.rpm dacf17ecb1d1af92f7361781a4f55ffa85d799afd60f689c985743c2fe4a941f quota-warnquota-4.04-14.el8.aarch64.rpm dacf17ecb1d1af92f7361781a4f55ffa85d799afd60f689c985743c2fe4a941f quota-warnquota-4.04-14.el8.aarch64.rpm dacf17ecb1d1af92f7361781a4f55ffa85d799afd60f689c985743c2fe4a941f RLBA-2021:4379 watchdog bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for watchdog. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms watchdog-5.15-2.el8.aarch64.rpm 8e6c800a51ea317dccd0db1b4a59d690a110b9428cf12b67ceb6d9302596179b watchdog-5.15-2.el8.aarch64.rpm 8e6c800a51ea317dccd0db1b4a59d690a110b9428cf12b67ceb6d9302596179b watchdog-5.15-2.el8.aarch64.rpm 8e6c800a51ea317dccd0db1b4a59d690a110b9428cf12b67ceb6d9302596179b RLSA-2021:4381 Moderate: GNOME security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnome-shell-extensions, webkit2gtk3, LibRaw, gnome-settings-daemon, gsettings-desktop-schemas, gnome-autoar, mutter, accountsservice, gnome-control-center, gnome-online-accounts, gnome-shell, gtk3, gdm, vino, gnome-software, gnome-session, gnome-calculator. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNOME is the default desktop environment of Rocky Linux. The following packages have been upgraded to a later upstream version: gdm (40.0), webkit2gtk3 (2.32.3). (BZ#1909300) Security Fix(es): * webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558) * LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp (CVE-2020-24870) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788) * webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789) * webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799) * webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801) * webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870) * webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871) * webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775) * webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779) * webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806) * webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663) * webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665) * webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682) * webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689) * webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734) * webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749) * webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758) * webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795) * webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797) * webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799) * webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (CVE-2020-36241) * gnome-autoar: Directory traversal via directory symbolic links pointing outside of the destination directory (incomplete CVE-2020-36241 fix) (CVE-2021-28650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms gsettings-desktop-schemas-3.32.0-6.el8.aarch64.rpm 49caae3bfdce01c6951e199c96d03ac8b355cafc46d1bb33732574b0e5ed7045 gsettings-desktop-schemas-3.32.0-6.el8.aarch64.rpm 49caae3bfdce01c6951e199c96d03ac8b355cafc46d1bb33732574b0e5ed7045 gsettings-desktop-schemas-3.32.0-6.el8.aarch64.rpm 49caae3bfdce01c6951e199c96d03ac8b355cafc46d1bb33732574b0e5ed7045 RLBA-2021:4383 nvmetcli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvmetcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 nvmetcli-0.7-3.el8.noarch.rpm 4e0e87cc84f420e45ab86a0f9af052959589bff38febee80ed2e4ec03e0c4743 RLBA-2021:4397 logwatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for logwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 logwatch-7.4.3-11.el8.noarch.rpm f49bc829d5482dfffaad652458747e97c0b0efffc953e7c3ea1d4c9b37496764 RLEA-2021:4405 libmodulemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libmodulemd1-1.8.16-0.2.13.0.1.aarch64.rpm 78bb230cee09bd30eb92525dec0b229bdc522af52ce5165774c37b3f136f76db libmodulemd1-1.8.16-0.2.13.0.1.aarch64.rpm 78bb230cee09bd30eb92525dec0b229bdc522af52ce5165774c37b3f136f76db libmodulemd1-1.8.16-0.2.13.0.1.aarch64.rpm 78bb230cee09bd30eb92525dec0b229bdc522af52ce5165774c37b3f136f76db libmodulemd-2.13.0-1.el8.aarch64.rpm 2187b3843488bcc57c6d2857b67c739227904e28a751efc9e1b21871105b4e4a libmodulemd-2.13.0-1.el8.aarch64.rpm 2187b3843488bcc57c6d2857b67c739227904e28a751efc9e1b21871105b4e4a libmodulemd-2.13.0-1.el8.aarch64.rpm 2187b3843488bcc57c6d2857b67c739227904e28a751efc9e1b21871105b4e4a RLBA-2021:4406 numactl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms numactl-2.0.12-13.el8.aarch64.rpm d5d198885820fc54e9320e19a62e328e6a2e10e21658686764860d5654feb985 numactl-2.0.12-13.el8.aarch64.rpm d5d198885820fc54e9320e19a62e328e6a2e10e21658686764860d5654feb985 numactl-2.0.12-13.el8.aarch64.rpm d5d198885820fc54e9320e19a62e328e6a2e10e21658686764860d5654feb985 numactl-devel-2.0.12-13.el8.aarch64.rpm ef351ddce4f240b5b7f91908b71330c421584d6e89b48ce3d0f909ac46792af0 numactl-devel-2.0.12-13.el8.aarch64.rpm ef351ddce4f240b5b7f91908b71330c421584d6e89b48ce3d0f909ac46792af0 numactl-devel-2.0.12-13.el8.aarch64.rpm ef351ddce4f240b5b7f91908b71330c421584d6e89b48ce3d0f909ac46792af0 numactl-libs-2.0.12-13.el8.aarch64.rpm b30a38428169b9be57f364e4e64a194fa3700db2faa8c198a78717524e4504e4 numactl-libs-2.0.12-13.el8.aarch64.rpm b30a38428169b9be57f364e4e64a194fa3700db2faa8c198a78717524e4504e4 numactl-libs-2.0.12-13.el8.aarch64.rpm b30a38428169b9be57f364e4e64a194fa3700db2faa8c198a78717524e4504e4 RLBA-2021:4411 tpm2-tss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms tpm2-tss-2.3.2-4.el8.aarch64.rpm 06a3a6cf98cb1c786f9c395c99bf429fded9890aaf583a3ab019d53c92cdeeeb tpm2-tss-2.3.2-4.el8.aarch64.rpm 06a3a6cf98cb1c786f9c395c99bf429fded9890aaf583a3ab019d53c92cdeeeb tpm2-tss-2.3.2-4.el8.aarch64.rpm 06a3a6cf98cb1c786f9c395c99bf429fded9890aaf583a3ab019d53c92cdeeeb tpm2-tss-devel-2.3.2-4.el8.aarch64.rpm aa26a8fefcae86a3d289d0cd248c7db40f0dc604f1688c87f8958cf58b557935 tpm2-tss-devel-2.3.2-4.el8.aarch64.rpm aa26a8fefcae86a3d289d0cd248c7db40f0dc604f1688c87f8958cf58b557935 tpm2-tss-devel-2.3.2-4.el8.aarch64.rpm aa26a8fefcae86a3d289d0cd248c7db40f0dc604f1688c87f8958cf58b557935 RLBA-2021:4412 RDMA stack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, qperf, opensm, rpm-mpi-hooks, rdma-core, mstflint, libvma, openmpi, fabtests, perftest, libfabric, mpich. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ibacm-35.0-1.el8.aarch64.rpm 198499934087075fcef54d5d92da96e67c7140f38a07caf6e775a2558f88b7b4 infiniband-diags-35.0-1.el8.aarch64.rpm 24edec6307945ad0472e793d31ace92cd539e3183534462939695c91e1359acd iwpmd-35.0-1.el8.aarch64.rpm f879b95c0c4223980c7e482621b021461bfa6db45326cec33fa93f8be61f887e libfabric-1.12.1-1.el8.aarch64.rpm aeadd7a40a052dba961a40e20b429f3df5b2711db800ab0fd5d7189799665977 libibumad-35.0-1.el8.aarch64.rpm d59d2252278ad8807d4ce95ae85f19d41c4742e2d00e18d6021a74b463e64df5 libibverbs-35.0-1.el8.aarch64.rpm d30f0ba637099c2e160c08eadee23a4a7751537b1b27f801eb917fae99c39a09 libibverbs-utils-35.0-1.el8.aarch64.rpm ca79323d09ac00281c6da7065d342ad09cecd6be9ba407db1c88f0aaf341c60d librdmacm-35.0-1.el8.aarch64.rpm 2b60db8ce33f49a6fceca578b9acceb8fcbe87e6744b688e838a66be78c930a5 librdmacm-utils-35.0-1.el8.aarch64.rpm 0bc0e1d5a9186a1873cac004222ff1bfaf45ee53685c4589653c131497492d16 opensm-3.3.24-1.el8.aarch64.rpm cdd6b8bd4abc9b43d5f5638f54373eb80b1a98442daed6f39f9ce101befb2f1d opensm-3.3.24-1.el8.aarch64.rpm cdd6b8bd4abc9b43d5f5638f54373eb80b1a98442daed6f39f9ce101befb2f1d opensm-3.3.24-1.el8.aarch64.rpm cdd6b8bd4abc9b43d5f5638f54373eb80b1a98442daed6f39f9ce101befb2f1d opensm-libs-3.3.24-1.el8.aarch64.rpm 72baffdb15d49074e5097cd0edcb5d3f7a2c778bf3d9ff25abe405d72963829d opensm-libs-3.3.24-1.el8.aarch64.rpm 72baffdb15d49074e5097cd0edcb5d3f7a2c778bf3d9ff25abe405d72963829d opensm-libs-3.3.24-1.el8.aarch64.rpm 72baffdb15d49074e5097cd0edcb5d3f7a2c778bf3d9ff25abe405d72963829d perftest-4.5-1.el8.aarch64.rpm 62bc9cebccaf3a1e7e7281bb406bdc06906043ec514061ef4d900cddc86483b6 python3-pyverbs-35.0-1.el8.aarch64.rpm 8c7b70ff57fa6e0818b13589007f08b929cdca2122a36f51cfc13606866c317e rdma-core-35.0-1.el8.aarch64.rpm 2696aebb177d959f92616785200b0c29e8c64eb9f3d7bf7766ed413a01184a5a rdma-core-devel-35.0-1.el8.aarch64.rpm a01678842f6059f649147bbf6024890abdd2bc20e3c37f14f00fbac4977b15cd srp_daemon-35.0-1.el8.aarch64.rpm 8e9207f0c250844b9743873a3413b7ab47c4c294822082e6f69961336566cf75 perftest-4.5-12.el8.aarch64.rpm bdb7dfeb36bf8cde96daf92fabff38b85eca2b7a459a0bcc444ac845e7e35b68 RLSA-2021:4413 Moderate: tpm2-tools security and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tpm2-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tpm2-tools packages add a set of utilities for management and utilization of Trusted Platform Module (TPM) 2.0 devices from user space. Security Fix(es): * tpm2-tools: fixed AES wrapping key in tpm2_import (CVE-2021-3565) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms tpm2-tools-4.1.1-5.el8.aarch64.rpm fbf67a9fffbba81330aceb0591af5c331b8034d2e1b87023aa455bebe97fa6d6 tpm2-tools-4.1.1-5.el8.aarch64.rpm fbf67a9fffbba81330aceb0591af5c331b8034d2e1b87023aa455bebe97fa6d6 tpm2-tools-4.1.1-5.el8.aarch64.rpm fbf67a9fffbba81330aceb0591af5c331b8034d2e1b87023aa455bebe97fa6d6 RLBA-2021:4421 hdparm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hdparm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms hdparm-9.54-4.el8.aarch64.rpm 701b24d173f4461481c56d7660281b0dd30b90823c72ffa05bb0d09c474b0213 hdparm-9.54-4.el8.aarch64.rpm 701b24d173f4461481c56d7660281b0dd30b90823c72ffa05bb0d09c474b0213 hdparm-9.54-4.el8.aarch64.rpm 701b24d173f4461481c56d7660281b0dd30b90823c72ffa05bb0d09c474b0213 RLSA-2021:4426 Moderate: ncurses security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for ncurses. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. Security Fix(es): * ncurses: heap-based buffer overflow in the _nc_find_entry function in tinfo/comp_hash.c (CVE-2019-17594) * ncurses: heap-based buffer overflow in the fmt_entry function in tinfo/comp_hash.c (CVE-2019-17595) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ncurses-6.1-9.20180224.el8.aarch64.rpm 9ea3641642f3e885ced4ce7f30cc569ae668ef0ee37450275dd77af323c17bfe ncurses-6.1-9.20180224.el8.aarch64.rpm 9ea3641642f3e885ced4ce7f30cc569ae668ef0ee37450275dd77af323c17bfe ncurses-6.1-9.20180224.el8.aarch64.rpm 9ea3641642f3e885ced4ce7f30cc569ae668ef0ee37450275dd77af323c17bfe ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-base-6.1-9.20180224.el8.noarch.rpm 0cebff3a1b36bbe42576ae64e5519749c6e88f5f3b11de061a5992e1fd95acb1 ncurses-c++-libs-6.1-9.20180224.el8.aarch64.rpm f4ae3086dd69cefc41cadc9c400b534dbc8b9fc5ad6505e656eb3313f70dc898 ncurses-c++-libs-6.1-9.20180224.el8.aarch64.rpm f4ae3086dd69cefc41cadc9c400b534dbc8b9fc5ad6505e656eb3313f70dc898 ncurses-c++-libs-6.1-9.20180224.el8.aarch64.rpm f4ae3086dd69cefc41cadc9c400b534dbc8b9fc5ad6505e656eb3313f70dc898 ncurses-compat-libs-6.1-9.20180224.el8.aarch64.rpm 78d1a4263b6495345e40e8d0e3ec9ff3d29a5c3c0a5f5734cf4a8531c297e457 ncurses-compat-libs-6.1-9.20180224.el8.aarch64.rpm 78d1a4263b6495345e40e8d0e3ec9ff3d29a5c3c0a5f5734cf4a8531c297e457 ncurses-compat-libs-6.1-9.20180224.el8.aarch64.rpm 78d1a4263b6495345e40e8d0e3ec9ff3d29a5c3c0a5f5734cf4a8531c297e457 ncurses-devel-6.1-9.20180224.el8.aarch64.rpm fa1daaf74f5415199a49db02f2f0e4def0fdbf160715b5e42f2c92dd810b60f0 ncurses-devel-6.1-9.20180224.el8.aarch64.rpm fa1daaf74f5415199a49db02f2f0e4def0fdbf160715b5e42f2c92dd810b60f0 ncurses-devel-6.1-9.20180224.el8.aarch64.rpm fa1daaf74f5415199a49db02f2f0e4def0fdbf160715b5e42f2c92dd810b60f0 ncurses-libs-6.1-9.20180224.el8.aarch64.rpm 4481f8a571f8d3775e1ee733f75c8199edd4de6a72a53b97cf36c4dff50e8173 ncurses-libs-6.1-9.20180224.el8.aarch64.rpm 4481f8a571f8d3775e1ee733f75c8199edd4de6a72a53b97cf36c4dff50e8173 ncurses-libs-6.1-9.20180224.el8.aarch64.rpm 4481f8a571f8d3775e1ee733f75c8199edd4de6a72a53b97cf36c4dff50e8173 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 ncurses-term-6.1-9.20180224.el8.noarch.rpm 165749ae0a8e044dbfe8a08b0ff675de6d4802d998ffca94f7435d8ec2617066 RLEA-2021:4434 libcap-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libcap-ng-0.7.11-1.el8.aarch64.rpm ca0c5cd3a6ff1505113b2b220844603077d282b81f790a205e7d23ab6cf68a61 libcap-ng-0.7.11-1.el8.aarch64.rpm ca0c5cd3a6ff1505113b2b220844603077d282b81f790a205e7d23ab6cf68a61 libcap-ng-0.7.11-1.el8.aarch64.rpm ca0c5cd3a6ff1505113b2b220844603077d282b81f790a205e7d23ab6cf68a61 libcap-ng-devel-0.7.11-1.el8.aarch64.rpm 7936904f9dd845e5490d9f12e85b332a0dae4bcd5d7cd87ebc10e0ce1624e681 libcap-ng-devel-0.7.11-1.el8.aarch64.rpm 7936904f9dd845e5490d9f12e85b332a0dae4bcd5d7cd87ebc10e0ce1624e681 libcap-ng-devel-0.7.11-1.el8.aarch64.rpm 7936904f9dd845e5490d9f12e85b332a0dae4bcd5d7cd87ebc10e0ce1624e681 libcap-ng-python3-0.7.11-1.el8.aarch64.rpm 87a6b0035917dc49cd5348a82ceb0e56d5decf421466afff1791f15a848f91b5 libcap-ng-python3-0.7.11-1.el8.aarch64.rpm 87a6b0035917dc49cd5348a82ceb0e56d5decf421466afff1791f15a848f91b5 libcap-ng-python3-0.7.11-1.el8.aarch64.rpm 87a6b0035917dc49cd5348a82ceb0e56d5decf421466afff1791f15a848f91b5 libcap-ng-utils-0.7.11-1.el8.aarch64.rpm db12ab01654b8c97c6fab2df6842ccb19d32572f8a94a54821f664b5779c2599 libcap-ng-utils-0.7.11-1.el8.aarch64.rpm db12ab01654b8c97c6fab2df6842ccb19d32572f8a94a54821f664b5779c2599 libcap-ng-utils-0.7.11-1.el8.aarch64.rpm db12ab01654b8c97c6fab2df6842ccb19d32572f8a94a54821f664b5779c2599 RLBA-2021:4441 microdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms microdnf-3.8.0-2.el8.aarch64.rpm c5012008ea930d17fc413ba57779640da4e4aaf4cbf998738c498e64a1e3fe41 microdnf-3.8.0-2.el8.aarch64.rpm c5012008ea930d17fc413ba57779640da4e4aaf4cbf998738c498e64a1e3fe41 microdnf-3.8.0-2.el8.aarch64.rpm c5012008ea930d17fc413ba57779640da4e4aaf4cbf998738c498e64a1e3fe41 RLBA-2021:4442 lshw bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms lshw-B.02.19.2-6.el8.aarch64.rpm 2d2687796f9b42f059578b19110ba870bf351eeb5b0b079a3d798343f16efb40 lshw-B.02.19.2-6.el8.aarch64.rpm 2d2687796f9b42f059578b19110ba870bf351eeb5b0b079a3d798343f16efb40 lshw-B.02.19.2-6.el8.aarch64.rpm 2d2687796f9b42f059578b19110ba870bf351eeb5b0b079a3d798343f16efb40 RLBA-2021:4443 python-cryptography bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms python3-cryptography-3.2.1-5.el8.aarch64.rpm 8d3d653d08e3be1edec2f1e36c0b6446834560d4aec26eef28f4b4e480f94285 python3-cryptography-3.2.1-5.el8.aarch64.rpm 8d3d653d08e3be1edec2f1e36c0b6446834560d4aec26eef28f4b4e480f94285 python3-cryptography-3.2.1-5.el8.aarch64.rpm 8d3d653d08e3be1edec2f1e36c0b6446834560d4aec26eef28f4b4e480f94285 RLBA-2021:4445 fcoe-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fcoe-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms fcoe-utils-1.0.33-4.git848bcc6.el8.aarch64.rpm 6b65f627098eb91211f338c02257b2d61813d36c9f4731407e1403566a6d24f4 fcoe-utils-1.0.33-4.git848bcc6.el8.aarch64.rpm 6b65f627098eb91211f338c02257b2d61813d36c9f4731407e1403566a6d24f4 fcoe-utils-1.0.33-4.git848bcc6.el8.aarch64.rpm 6b65f627098eb91211f338c02257b2d61813d36c9f4731407e1403566a6d24f4 RLBA-2021:4446 iscsi-initiator-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm fd19dda7daa6c82f797542c1556e082fd7ac26c8ab963677c0b2af140fba1af6 iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm fd19dda7daa6c82f797542c1556e082fd7ac26c8ab963677c0b2af140fba1af6 iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm fd19dda7daa6c82f797542c1556e082fd7ac26c8ab963677c0b2af140fba1af6 iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.aarch64.rpm fb9c2ff9e5987a18f7aa092064d0b665431963dbac119841b84ca6294a31747c iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.aarch64.rpm fb9c2ff9e5987a18f7aa092064d0b665431963dbac119841b84ca6294a31747c iscsi-initiator-utils-iscsiuio-6.2.1.4-4.git095f59c.el8.aarch64.rpm fb9c2ff9e5987a18f7aa092064d0b665431963dbac119841b84ca6294a31747c python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm 1f82149dfb5d46da386afbbf5d87758ff37552234b424697a25ec94bf0688d47 python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm 1f82149dfb5d46da386afbbf5d87758ff37552234b424697a25ec94bf0688d47 python3-iscsi-initiator-utils-6.2.1.4-4.git095f59c.el8.aarch64.rpm 1f82149dfb5d46da386afbbf5d87758ff37552234b424697a25ec94bf0688d47 RLBA-2021:4449 openldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms openldap-2.4.46-18.el8.aarch64.rpm a7bbbc01764348528bed3b52449e2b8ddd9d97dd85a4ce38bc2a968943cc8098 openldap-2.4.46-18.el8.aarch64.rpm a7bbbc01764348528bed3b52449e2b8ddd9d97dd85a4ce38bc2a968943cc8098 openldap-2.4.46-18.el8.aarch64.rpm a7bbbc01764348528bed3b52449e2b8ddd9d97dd85a4ce38bc2a968943cc8098 openldap-clients-2.4.46-18.el8.aarch64.rpm 091f5ca639a5fac96e66ddb6f9c7a1c0644b93157886f929f7177c6333b9058e openldap-clients-2.4.46-18.el8.aarch64.rpm 091f5ca639a5fac96e66ddb6f9c7a1c0644b93157886f929f7177c6333b9058e openldap-clients-2.4.46-18.el8.aarch64.rpm 091f5ca639a5fac96e66ddb6f9c7a1c0644b93157886f929f7177c6333b9058e openldap-devel-2.4.46-18.el8.aarch64.rpm 73ec92205626d93ee5bf5f466f942cde2adfe4c75b22dad6299d7fc1e6f287c7 openldap-devel-2.4.46-18.el8.aarch64.rpm 73ec92205626d93ee5bf5f466f942cde2adfe4c75b22dad6299d7fc1e6f287c7 openldap-devel-2.4.46-18.el8.aarch64.rpm 73ec92205626d93ee5bf5f466f942cde2adfe4c75b22dad6299d7fc1e6f287c7 RLSA-2021:4451 Moderate: gnutls and nettle security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. The following packages have been upgraded to a later upstream version: gnutls (3.6.16). (BZ#1956783) Security Fix(es): * nettle: Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580) * gnutls: Use after free in client key_share extension (CVE-2021-20231) * gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c (CVE-2021-20232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms gnutls-3.6.16-4.el8.aarch64.rpm ab1a7a1c1848dece1b532459526eaa47ecec52017c534fdf8ba465a90e1abe23 gnutls-3.6.16-4.el8.aarch64.rpm ab1a7a1c1848dece1b532459526eaa47ecec52017c534fdf8ba465a90e1abe23 nettle-3.4.1-7.el8.aarch64.rpm 51eabb0ae5bf19165967d8926043b01302dd36590a0333126ca88b43c480afe8 nettle-3.4.1-7.el8.aarch64.rpm 51eabb0ae5bf19165967d8926043b01302dd36590a0333126ca88b43c480afe8 nettle-3.4.1-7.el8.aarch64.rpm 51eabb0ae5bf19165967d8926043b01302dd36590a0333126ca88b43c480afe8 RLBA-2021:4453 adcli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms adcli-0.8.2-12.el8.aarch64.rpm c08a88685bee70332aafb9a88544bfde4209f39f5725ed6c915a25c82af45df4 adcli-0.8.2-12.el8.aarch64.rpm c08a88685bee70332aafb9a88544bfde4209f39f5725ed6c915a25c82af45df4 adcli-0.8.2-12.el8.aarch64.rpm c08a88685bee70332aafb9a88544bfde4209f39f5725ed6c915a25c82af45df4 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 adcli-doc-0.8.2-12.el8.noarch.rpm 8b3585dbdd01ac8d23369cd4837b6afc499f33459ef7abd1cc0deea7d14ede39 RLBA-2021:4454 keyutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for keyutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms keyutils-1.5.10-9.el8.aarch64.rpm 8187b646e2dba4ea0237c9a13dc38bff71a9a1d62d7b30fe801ca8b409bf5a32 keyutils-1.5.10-9.el8.aarch64.rpm 8187b646e2dba4ea0237c9a13dc38bff71a9a1d62d7b30fe801ca8b409bf5a32 keyutils-1.5.10-9.el8.aarch64.rpm 8187b646e2dba4ea0237c9a13dc38bff71a9a1d62d7b30fe801ca8b409bf5a32 keyutils-libs-1.5.10-9.el8.aarch64.rpm e292a3399c4f77784ec88a2a0429ca018de5dcdb8bede782bed68b81a27d45fa keyutils-libs-1.5.10-9.el8.aarch64.rpm e292a3399c4f77784ec88a2a0429ca018de5dcdb8bede782bed68b81a27d45fa keyutils-libs-1.5.10-9.el8.aarch64.rpm e292a3399c4f77784ec88a2a0429ca018de5dcdb8bede782bed68b81a27d45fa keyutils-libs-devel-1.5.10-9.el8.aarch64.rpm e8203f5aba3186e1b55a5c356441051b4dddf3e1f1e1bbb54a42cb45d5a43587 keyutils-libs-devel-1.5.10-9.el8.aarch64.rpm e8203f5aba3186e1b55a5c356441051b4dddf3e1f1e1bbb54a42cb45d5a43587 keyutils-libs-devel-1.5.10-9.el8.aarch64.rpm e8203f5aba3186e1b55a5c356441051b4dddf3e1f1e1bbb54a42cb45d5a43587 RLBA-2021:4456 boom-boot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boom-boot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-1.3-2.el8.noarch.rpm e79029a4267d9445271c1ed9aea0380379de62bad09d89c1df82bcac8d31af06 boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-conf-1.3-2.el8.noarch.rpm c30fda7c600881c9b0d0094368e21fa28e5b2a0b2eac261c4d63d7997739813b boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 boom-boot-grub2-1.3-2.el8.noarch.rpm 65c6b55a0b60ae440c525b6919b893c3b1d4b8506c092ab064b35b9c904a3461 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 python3-boom-1.3-2.el8.noarch.rpm a4960ef90db5df84e31462268e2d20e717fc725849f63b5b3346926a3fcb0978 RLBA-2021:4461 filesystem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms filesystem-3.8-6.el8.aarch64.rpm 71f0011c4ad7cbc532703435aa8a08e0708211aa1fe3bcf3bc558e728e86a21f filesystem-3.8-6.el8.aarch64.rpm 71f0011c4ad7cbc532703435aa8a08e0708211aa1fe3bcf3bc558e728e86a21f filesystem-3.8-6.el8.aarch64.rpm 71f0011c4ad7cbc532703435aa8a08e0708211aa1fe3bcf3bc558e728e86a21f RLBA-2021:4470 man-db bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-db. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms man-db-2.7.6.1-18.el8.aarch64.rpm 706e5fa9dc865141adfa04c4718a3ec66dcb95fb95425de3cf3d06aaa45df91f man-db-2.7.6.1-18.el8.aarch64.rpm 706e5fa9dc865141adfa04c4718a3ec66dcb95fb95425de3cf3d06aaa45df91f man-db-2.7.6.1-18.el8.aarch64.rpm 706e5fa9dc865141adfa04c4718a3ec66dcb95fb95425de3cf3d06aaa45df91f man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 man-db-cron-2.7.6.1-18.el8.noarch.rpm 4714825bd54acdf13faf651dc756c202bea97989393fe7d906562c7caa7383a6 RLBA-2021:4475 freeipmi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms freeipmi-1.6.8-1.el8.aarch64.rpm 752dae7d1a46252424ff5969f0b0464dae89b96a9b90d4c8330b2a4db34e9b5e freeipmi-1.6.8-1.el8.aarch64.rpm 752dae7d1a46252424ff5969f0b0464dae89b96a9b90d4c8330b2a4db34e9b5e freeipmi-1.6.8-1.el8.aarch64.rpm 752dae7d1a46252424ff5969f0b0464dae89b96a9b90d4c8330b2a4db34e9b5e freeipmi-bmc-watchdog-1.6.8-1.el8.aarch64.rpm f1eaf8f776911d619fa11ad4847bf2bee32ed82e79fc57b1c466111aae39edd9 freeipmi-bmc-watchdog-1.6.8-1.el8.aarch64.rpm f1eaf8f776911d619fa11ad4847bf2bee32ed82e79fc57b1c466111aae39edd9 freeipmi-bmc-watchdog-1.6.8-1.el8.aarch64.rpm f1eaf8f776911d619fa11ad4847bf2bee32ed82e79fc57b1c466111aae39edd9 freeipmi-ipmidetectd-1.6.8-1.el8.aarch64.rpm 783620e8d99668786788127902b21ef3f38ab0d577e35c1155ee6a5a0ee5acc0 freeipmi-ipmidetectd-1.6.8-1.el8.aarch64.rpm 783620e8d99668786788127902b21ef3f38ab0d577e35c1155ee6a5a0ee5acc0 freeipmi-ipmidetectd-1.6.8-1.el8.aarch64.rpm 783620e8d99668786788127902b21ef3f38ab0d577e35c1155ee6a5a0ee5acc0 freeipmi-ipmiseld-1.6.8-1.el8.aarch64.rpm 4a71ba37b2970a5adc870c9674dbf68dff5ef02944ee4f31d83dbf4d36aa5399 freeipmi-ipmiseld-1.6.8-1.el8.aarch64.rpm 4a71ba37b2970a5adc870c9674dbf68dff5ef02944ee4f31d83dbf4d36aa5399 freeipmi-ipmiseld-1.6.8-1.el8.aarch64.rpm 4a71ba37b2970a5adc870c9674dbf68dff5ef02944ee4f31d83dbf4d36aa5399 RLBA-2021:4477 parted bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for parted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms parted-3.2-39.el8.aarch64.rpm bfdbff9ea27a733bd2959f63ea81985ce171c5eb2849c1ba9729e155af08987c parted-3.2-39.el8.aarch64.rpm bfdbff9ea27a733bd2959f63ea81985ce171c5eb2849c1ba9729e155af08987c parted-3.2-39.el8.aarch64.rpm bfdbff9ea27a733bd2959f63ea81985ce171c5eb2849c1ba9729e155af08987c RLBA-2021:4483 OpenIPMI bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for OpenIPMI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms OpenIPMI-2.0.31-3.el8.aarch64.rpm b9ecec7ec2dacba9c388cbfb8d2b6bb3b4fdb9f382fac86807c1c2b50982acf6 OpenIPMI-2.0.31-3.el8.aarch64.rpm b9ecec7ec2dacba9c388cbfb8d2b6bb3b4fdb9f382fac86807c1c2b50982acf6 OpenIPMI-2.0.31-3.el8.aarch64.rpm b9ecec7ec2dacba9c388cbfb8d2b6bb3b4fdb9f382fac86807c1c2b50982acf6 OpenIPMI-lanserv-2.0.31-3.el8.aarch64.rpm 03cf43e936333ebcd20f70165e5d931aa2c0c2c0349fd4f11d55c9be916ef726 OpenIPMI-lanserv-2.0.31-3.el8.aarch64.rpm 03cf43e936333ebcd20f70165e5d931aa2c0c2c0349fd4f11d55c9be916ef726 OpenIPMI-lanserv-2.0.31-3.el8.aarch64.rpm 03cf43e936333ebcd20f70165e5d931aa2c0c2c0349fd4f11d55c9be916ef726 OpenIPMI-libs-2.0.31-3.el8.aarch64.rpm 2f4c2f26274b2933c5a840178aebecb70872e9c378b9875b7a18c1481ef9ecb8 OpenIPMI-libs-2.0.31-3.el8.aarch64.rpm 2f4c2f26274b2933c5a840178aebecb70872e9c378b9875b7a18c1481ef9ecb8 OpenIPMI-libs-2.0.31-3.el8.aarch64.rpm 2f4c2f26274b2933c5a840178aebecb70872e9c378b9875b7a18c1481ef9ecb8 OpenIPMI-perl-2.0.31-3.el8.aarch64.rpm fd6d40baa24c93513a60ba55ea982e9a888f760bd7ca1f19f30494a966a50da8 OpenIPMI-perl-2.0.31-3.el8.aarch64.rpm fd6d40baa24c93513a60ba55ea982e9a888f760bd7ca1f19f30494a966a50da8 OpenIPMI-perl-2.0.31-3.el8.aarch64.rpm fd6d40baa24c93513a60ba55ea982e9a888f760bd7ca1f19f30494a966a50da8 python3-openipmi-2.0.31-3.el8.aarch64.rpm 09c86d590c5028c0eeeef7aaa5122cb0137848ee993b2a8d342cbcbbc3fa7caf python3-openipmi-2.0.31-3.el8.aarch64.rpm 09c86d590c5028c0eeeef7aaa5122cb0137848ee993b2a8d342cbcbbc3fa7caf python3-openipmi-2.0.31-3.el8.aarch64.rpm 09c86d590c5028c0eeeef7aaa5122cb0137848ee993b2a8d342cbcbbc3fa7caf RLEA-2021:4488 hwloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms compat-hwloc1-2.2.0-3.el8.aarch64.rpm 8ffbf52855b756a3fc65d10d801c420c2c4a8e8dd7fea09a1d6c4076defede4f compat-hwloc1-2.2.0-3.el8.aarch64.rpm 8ffbf52855b756a3fc65d10d801c420c2c4a8e8dd7fea09a1d6c4076defede4f compat-hwloc1-2.2.0-3.el8.aarch64.rpm 8ffbf52855b756a3fc65d10d801c420c2c4a8e8dd7fea09a1d6c4076defede4f hwloc-2.2.0-3.el8.aarch64.rpm aac8aa107cc7e3577bcea2ce55183328590bb5bf142ec5cf28118aa032709059 hwloc-2.2.0-3.el8.aarch64.rpm aac8aa107cc7e3577bcea2ce55183328590bb5bf142ec5cf28118aa032709059 hwloc-2.2.0-3.el8.aarch64.rpm aac8aa107cc7e3577bcea2ce55183328590bb5bf142ec5cf28118aa032709059 hwloc-libs-2.2.0-3.el8.aarch64.rpm 464f138c1c39e9a5add64c78e679712a7538321d9d24a64ba95112beae454418 hwloc-libs-2.2.0-3.el8.aarch64.rpm 464f138c1c39e9a5add64c78e679712a7538321d9d24a64ba95112beae454418 hwloc-libs-2.2.0-3.el8.aarch64.rpm 464f138c1c39e9a5add64c78e679712a7538321d9d24a64ba95112beae454418 RLBA-2021:4496 chkconfig bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chkconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms chkconfig-1.19.1-1.el8.aarch64.rpm d2850969a3f8263be656456d0ac703465d4ead7c0470bad62e4abe6e66b71ef4 chkconfig-1.19.1-1.el8.aarch64.rpm d2850969a3f8263be656456d0ac703465d4ead7c0470bad62e4abe6e66b71ef4 chkconfig-1.19.1-1.el8.aarch64.rpm d2850969a3f8263be656456d0ac703465d4ead7c0470bad62e4abe6e66b71ef4 ntsysv-1.19.1-1.el8.aarch64.rpm 09eaf5d3abf9f40ac35e931367fdcab0f3cbb0ce092d02a5f203a54d3b2bcbfb ntsysv-1.19.1-1.el8.aarch64.rpm 09eaf5d3abf9f40ac35e931367fdcab0f3cbb0ce092d02a5f203a54d3b2bcbfb ntsysv-1.19.1-1.el8.aarch64.rpm 09eaf5d3abf9f40ac35e931367fdcab0f3cbb0ce092d02a5f203a54d3b2bcbfb RLBA-2021:4501 emacs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 emacs-filesystem-26.1-7.el8.noarch.rpm 0528c60ec061f0dcbeecc420412f48d018143debee30ce7477233688128aaa97 RLBA-2021:4505 mobile-broadband-provider-info bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mobile-broadband-provider-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 mobile-broadband-provider-info-20210805-1.el8.noarch.rpm b1bf9f63c78ece54d2b6b472e9d5236f8cfabba343994ef3b4d68e17b5b26c87 RLBA-2021:4507 fontconfig bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fontconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms fontconfig-2.13.1-4.el8.aarch64.rpm 5ef0bde77e19628d72c91a9c4eac7c2a220587aa5c260f7cb2da20e818352ed2 fontconfig-2.13.1-4.el8.aarch64.rpm 5ef0bde77e19628d72c91a9c4eac7c2a220587aa5c260f7cb2da20e818352ed2 fontconfig-2.13.1-4.el8.aarch64.rpm 5ef0bde77e19628d72c91a9c4eac7c2a220587aa5c260f7cb2da20e818352ed2 fontconfig-devel-2.13.1-4.el8.aarch64.rpm 29cdf2426574c666841640752a84e50dea4f7d23531e17ae48973c4902ca191f fontconfig-devel-2.13.1-4.el8.aarch64.rpm 29cdf2426574c666841640752a84e50dea4f7d23531e17ae48973c4902ca191f fontconfig-devel-2.13.1-4.el8.aarch64.rpm 29cdf2426574c666841640752a84e50dea4f7d23531e17ae48973c4902ca191f RLBA-2021:4508 lsscsi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsscsi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms lsscsi-0.32-3.el8.aarch64.rpm 585ef55d8d660059ee009a2b2e11a51698d40dfe056ba543631c7199b4abed31 lsscsi-0.32-3.el8.aarch64.rpm 585ef55d8d660059ee009a2b2e11a51698d40dfe056ba543631c7199b4abed31 lsscsi-0.32-3.el8.aarch64.rpm 585ef55d8d660059ee009a2b2e11a51698d40dfe056ba543631c7199b4abed31 RLSA-2021:4510 Low: lua security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: segmentation fault in getlocal and setlocal functions in ldebug.c (CVE-2020-24370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms lua-libs-5.3.4-12.el8.aarch64.rpm c1c84a33cec9d1a40de3b87b2c2607078137cf6491b638f97fb5b89670ec5e3a lua-libs-5.3.4-12.el8.aarch64.rpm c1c84a33cec9d1a40de3b87b2c2607078137cf6491b638f97fb5b89670ec5e3a lua-libs-5.3.4-12.el8.aarch64.rpm c1c84a33cec9d1a40de3b87b2c2607078137cf6491b638f97fb5b89670ec5e3a RLBA-2021:4512 os-prober bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for os-prober. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms os-prober-1.74-9.el8.aarch64.rpm 5559ba9568f586c136e94e5460198cf591066677812de1188a340b269c2bb09f os-prober-1.74-9.el8.aarch64.rpm 5559ba9568f586c136e94e5460198cf591066677812de1188a340b269c2bb09f os-prober-1.74-9.el8.aarch64.rpm 5559ba9568f586c136e94e5460198cf591066677812de1188a340b269c2bb09f RLSA-2021:4513 Moderate: libsepol security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsepol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings). Security Fix(es): * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36084) * libsepol: use-after-free in __cil_verify_classperms() (CVE-2021-36085) * libsepol: use-after-free in cil_reset_classpermission() (CVE-2021-36086) * libsepol: heap-based buffer overflow in ebitmap_match_any() (CVE-2021-36087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libsepol-2.9-3.el8.aarch64.rpm e2c55fc5738b9129c59a4fb29fd81be32ee242380398dc007f88ef19429cb747 libsepol-2.9-3.el8.aarch64.rpm e2c55fc5738b9129c59a4fb29fd81be32ee242380398dc007f88ef19429cb747 libsepol-2.9-3.el8.aarch64.rpm e2c55fc5738b9129c59a4fb29fd81be32ee242380398dc007f88ef19429cb747 libsepol-devel-2.9-3.el8.aarch64.rpm 317705b5f8b8a267fa79aa17d581fd13d8d7b40cf94a538d7b9a9dfef9394933 libsepol-devel-2.9-3.el8.aarch64.rpm 317705b5f8b8a267fa79aa17d581fd13d8d7b40cf94a538d7b9a9dfef9394933 libsepol-devel-2.9-3.el8.aarch64.rpm 317705b5f8b8a267fa79aa17d581fd13d8d7b40cf94a538d7b9a9dfef9394933 RLBA-2021:4516 usermode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for usermode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms usermode-1.113-2.el8.aarch64.rpm f00f3dacf721e61a4a9e4fd3b72ea86300d9e3cc3bad24825c5b181647a91ec0 usermode-1.113-2.el8.aarch64.rpm f00f3dacf721e61a4a9e4fd3b72ea86300d9e3cc3bad24825c5b181647a91ec0 usermode-1.113-2.el8.aarch64.rpm f00f3dacf721e61a4a9e4fd3b72ea86300d9e3cc3bad24825c5b181647a91ec0 RLSA-2022:0658 Important: cyrus-sasl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cyrus-sasl-2.1.27-6.el8_5.aarch64.rpm 332f1daeee3e1dc2740a5047d2c85bcc6a565a21cab1ed04f19760e71690b2c7 cyrus-sasl-2.1.27-6.el8_5.aarch64.rpm 332f1daeee3e1dc2740a5047d2c85bcc6a565a21cab1ed04f19760e71690b2c7 cyrus-sasl-2.1.27-6.el8_5.aarch64.rpm 332f1daeee3e1dc2740a5047d2c85bcc6a565a21cab1ed04f19760e71690b2c7 cyrus-sasl-devel-2.1.27-6.el8_5.aarch64.rpm 91b9d7083ee108037e9e2369278d742d37405fbb2667c1be556cb5d219a96b31 cyrus-sasl-devel-2.1.27-6.el8_5.aarch64.rpm 91b9d7083ee108037e9e2369278d742d37405fbb2667c1be556cb5d219a96b31 cyrus-sasl-devel-2.1.27-6.el8_5.aarch64.rpm 91b9d7083ee108037e9e2369278d742d37405fbb2667c1be556cb5d219a96b31 cyrus-sasl-gs2-2.1.27-6.el8_5.aarch64.rpm ce163751e84cf6f7b33785a51db0e1d413e8979bef6d6b01aef9d5f7d40a7c23 cyrus-sasl-gs2-2.1.27-6.el8_5.aarch64.rpm ce163751e84cf6f7b33785a51db0e1d413e8979bef6d6b01aef9d5f7d40a7c23 cyrus-sasl-gs2-2.1.27-6.el8_5.aarch64.rpm ce163751e84cf6f7b33785a51db0e1d413e8979bef6d6b01aef9d5f7d40a7c23 cyrus-sasl-gssapi-2.1.27-6.el8_5.aarch64.rpm b44d22cfbe12c7e06d2e6abbdbef6679e55b28202d68476845931d63a64b34a3 cyrus-sasl-gssapi-2.1.27-6.el8_5.aarch64.rpm b44d22cfbe12c7e06d2e6abbdbef6679e55b28202d68476845931d63a64b34a3 cyrus-sasl-gssapi-2.1.27-6.el8_5.aarch64.rpm b44d22cfbe12c7e06d2e6abbdbef6679e55b28202d68476845931d63a64b34a3 cyrus-sasl-ldap-2.1.27-6.el8_5.aarch64.rpm a2a7506adee7d315891d07c2d23192ae9794c58b329b120ee5d61ba96512cae0 cyrus-sasl-ldap-2.1.27-6.el8_5.aarch64.rpm a2a7506adee7d315891d07c2d23192ae9794c58b329b120ee5d61ba96512cae0 cyrus-sasl-ldap-2.1.27-6.el8_5.aarch64.rpm a2a7506adee7d315891d07c2d23192ae9794c58b329b120ee5d61ba96512cae0 cyrus-sasl-lib-2.1.27-6.el8_5.aarch64.rpm 41972a29bcab934002e888d22b87226491ac4bc08bc43ef020aa3d8304049e4a cyrus-sasl-lib-2.1.27-6.el8_5.aarch64.rpm 41972a29bcab934002e888d22b87226491ac4bc08bc43ef020aa3d8304049e4a cyrus-sasl-lib-2.1.27-6.el8_5.aarch64.rpm 41972a29bcab934002e888d22b87226491ac4bc08bc43ef020aa3d8304049e4a cyrus-sasl-md5-2.1.27-6.el8_5.aarch64.rpm 5d2832fc70c31bfe2bf998e0642da4c7dd090887e3d2b0fe5b6bb0d0385b8230 cyrus-sasl-md5-2.1.27-6.el8_5.aarch64.rpm 5d2832fc70c31bfe2bf998e0642da4c7dd090887e3d2b0fe5b6bb0d0385b8230 cyrus-sasl-md5-2.1.27-6.el8_5.aarch64.rpm 5d2832fc70c31bfe2bf998e0642da4c7dd090887e3d2b0fe5b6bb0d0385b8230 cyrus-sasl-ntlm-2.1.27-6.el8_5.aarch64.rpm 6e0c8e206f2cd3334b19c2e812384394402a0e23f3eabe5652e1dcab65f86414 cyrus-sasl-ntlm-2.1.27-6.el8_5.aarch64.rpm 6e0c8e206f2cd3334b19c2e812384394402a0e23f3eabe5652e1dcab65f86414 cyrus-sasl-ntlm-2.1.27-6.el8_5.aarch64.rpm 6e0c8e206f2cd3334b19c2e812384394402a0e23f3eabe5652e1dcab65f86414 cyrus-sasl-plain-2.1.27-6.el8_5.aarch64.rpm acc6f87f6980faa27999c52c8157730319724152216918efc0a03dd49b215765 cyrus-sasl-plain-2.1.27-6.el8_5.aarch64.rpm acc6f87f6980faa27999c52c8157730319724152216918efc0a03dd49b215765 cyrus-sasl-plain-2.1.27-6.el8_5.aarch64.rpm acc6f87f6980faa27999c52c8157730319724152216918efc0a03dd49b215765 cyrus-sasl-scram-2.1.27-6.el8_5.aarch64.rpm 12755565608594ac2b71107a5904b754d9718c6b68c343c4d02be84868c95313 cyrus-sasl-scram-2.1.27-6.el8_5.aarch64.rpm 12755565608594ac2b71107a5904b754d9718c6b68c343c4d02be84868c95313 cyrus-sasl-scram-2.1.27-6.el8_5.aarch64.rpm 12755565608594ac2b71107a5904b754d9718c6b68c343c4d02be84868c95313 RLSA-2022:1537 Important: gzip security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gzip packages contain the gzip (GNU zip) data compression utility. gzip is used to compress regular files. It replaces them with files containing the .gz extension, while retaining ownership modes, access, and modification times. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gzip-1.9-13.el8_5.aarch64.rpm f106a7f7904c1caf97eead75f1fa6031aa6d2ca66b77b3b65fa5671976700ac1 gzip-1.9-13.el8_5.aarch64.rpm f106a7f7904c1caf97eead75f1fa6031aa6d2ca66b77b3b65fa5671976700ac1 gzip-1.9-13.el8_5.aarch64.rpm f106a7f7904c1caf97eead75f1fa6031aa6d2ca66b77b3b65fa5671976700ac1 RLSA-2022:1546 Moderate: polkit security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: file descriptor leak allows an unprivileged user to cause a crash (CVE-2021-4115) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms polkit-0.115-13.el8_5.2.aarch64.rpm 9b0d4505b0aacc3810aabad0f3ac0f1dbaef8a1473a9cc6e9007388e164b38f1 polkit-0.115-13.el8_5.2.aarch64.rpm 9b0d4505b0aacc3810aabad0f3ac0f1dbaef8a1473a9cc6e9007388e164b38f1 polkit-0.115-13.el8_5.2.aarch64.rpm 9b0d4505b0aacc3810aabad0f3ac0f1dbaef8a1473a9cc6e9007388e164b38f1 polkit-devel-0.115-13.el8_5.2.aarch64.rpm 06d34be7d7015fcba8c6f2d9e33c958c8ca264cd692892c5e227f3d5d1e9b7f2 polkit-devel-0.115-13.el8_5.2.aarch64.rpm 06d34be7d7015fcba8c6f2d9e33c958c8ca264cd692892c5e227f3d5d1e9b7f2 polkit-devel-0.115-13.el8_5.2.aarch64.rpm 06d34be7d7015fcba8c6f2d9e33c958c8ca264cd692892c5e227f3d5d1e9b7f2 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-docs-0.115-13.el8_5.2.noarch.rpm 07237522bec5d72ecf310d7d59f835609c4cc28a8715c316d2faf1582c443653 polkit-libs-0.115-13.el8_5.2.aarch64.rpm 7f5723107b0b173ba28589bbe4e36451e3b004bfd687c317c74f0ebddda1db4f polkit-libs-0.115-13.el8_5.2.aarch64.rpm 7f5723107b0b173ba28589bbe4e36451e3b004bfd687c317c74f0ebddda1db4f polkit-libs-0.115-13.el8_5.2.aarch64.rpm 7f5723107b0b173ba28589bbe4e36451e3b004bfd687c317c74f0ebddda1db4f RLEA-2022:1954 perl:5.32 metadata for the Rocky Linux 8 module matrix (1/4) Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLEA-2022:2014 RDMA stack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, ucx, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, pmix, perftest, eth-tools, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ibacm-37.2-1.el8.aarch64.rpm 94db9d1ed10bc5d7289c2d6e815a79ed5475c34fb8c7281f1f8ced3ec9809e38 infiniband-diags-37.2-1.el8.aarch64.rpm ea2cf192d4ed5f21b1898dbdc6477e84087254a7a1e10a3eb8507f96c46d0053 iwpmd-37.2-1.el8.aarch64.rpm 954415301e81a8607b028bdce3f9251a14be5e82b655b4eacb24f449d68b324d libfabric-1.14.0-1.el8.aarch64.rpm 106ab5d20711188e867ca30369f4f06e777456a86d8dfabbeec4bc29ae8d066f libibumad-37.2-1.el8.aarch64.rpm f4c6d716defd4e5b9bb38e0c2c148932f0ee5bbb32f56c5718c7234bf3ef2360 libibverbs-37.2-1.el8.aarch64.rpm d74ec4076dbfc6e701b2fe3ae6958bec45a1adcdb6ca1e6f864a331853d9406d libibverbs-utils-37.2-1.el8.aarch64.rpm 65b6fd8fde6d631e5c6c44aaccff66986cfb44d86d5569f6d0afea6de9fbe569 librdmacm-37.2-1.el8.aarch64.rpm dd9976d761043086f17b43f9f035b725096da00c6e86cb011813ecb7dd4726f7 librdmacm-utils-37.2-1.el8.aarch64.rpm 8549e2417a177f507a84a95eed19d2d89481e47f65f2cf8c721b68feea70d447 perftest-4.5-12.el8.aarch64.rpm bdb7dfeb36bf8cde96daf92fabff38b85eca2b7a459a0bcc444ac845e7e35b68 perftest-4.5-12.el8.aarch64.rpm bdb7dfeb36bf8cde96daf92fabff38b85eca2b7a459a0bcc444ac845e7e35b68 python3-pyverbs-37.2-1.el8.aarch64.rpm 866cffe2ef01dbb5e12c7aa4a3568eaf981b8e47c9158a018864c8947597a0a0 rdma-core-37.2-1.el8.aarch64.rpm 2a7aff298d11e354f1efac1aa91b38d98dafe17706d38375aa7f661951d2e706 rdma-core-devel-37.2-1.el8.aarch64.rpm 7d210fc2bfadfdb3f94ebd69a7239b952046e0dc72c6c6ff2b6e5b5f29dc17ae srp_daemon-37.2-1.el8.aarch64.rpm 14565bf6fe8ea1e032d2b300988cfa62e41c04e768bc653c693ab23b0db0cd7f RLEA-2022:1956 perl:5.32 metadata for the Rocky Linux 8 module matrix (3/4) Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-Parse-PMFile, perl-DBI, perl-DBD-SQLite, perl-YAML, perl-CPAN-DistnameInfo, perl-CPAN-Meta-Check, perl-FCGI, perl-DBD-MySQL, perl-App-cpanminus, perl-File-pushd, perl-String-ShellQuote, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLSA-2022:1991 Moderate: cpio security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: integer overflow in ds_fgetstr() in dstring.c can lead to an out-of-bounds write via a crafted pattern file (CVE-2021-38185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms cpio-2.12-11.el8.aarch64.rpm 45c839cc0ecf28ad0d8e8c577b98a9e26d8e714337bc6f3f2692eadc4c2b506a cpio-2.12-11.el8.aarch64.rpm 45c839cc0ecf28ad0d8e8c577b98a9e26d8e714337bc6f3f2692eadc4c2b506a RLBA-2022:2023 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms net-snmp-libs-5.8-25.el8.aarch64.rpm 4f6a4b2cf076272c0542ca782f1ab967c965238dd006333b6244b5980ec6468f net-snmp-libs-5.8-25.el8.aarch64.rpm 4f6a4b2cf076272c0542ca782f1ab967c965238dd006333b6244b5980ec6468f RLBA-2022:2027 json-c bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms json-c-0.13.1-3.el8.aarch64.rpm 2b9864631453555d917c715ed9fe356e644835e6f1f916c2b0236f18d4ea6a3c json-c-0.13.1-3.el8.aarch64.rpm 2b9864631453555d917c715ed9fe356e644835e6f1f916c2b0236f18d4ea6a3c RLEA-2022:2029 libseccomp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libseccomp-2.5.2-1.el8.aarch64.rpm 00163c8639df2c21996a6ad4d725d4df3026f0ac725ff2ec51d2805ad5953bce libseccomp-2.5.2-1.el8.aarch64.rpm 00163c8639df2c21996a6ad4d725d4df3026f0ac725ff2ec51d2805ad5953bce RLBA-2022:2041 openhpi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openhpi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms openhpi-3.8.0-10.el8.aarch64.rpm 30b66fc2fe218a0defb45a822b312253a63f916de8ecc660e9df23020f161aab openhpi-3.8.0-10.el8.aarch64.rpm 30b66fc2fe218a0defb45a822b312253a63f916de8ecc660e9df23020f161aab openhpi-libs-3.8.0-10.el8.aarch64.rpm cda2585238b545931760f6f775a6d54c74e59fcbbe1cb074386e24112b2ab145 openhpi-libs-3.8.0-10.el8.aarch64.rpm cda2585238b545931760f6f775a6d54c74e59fcbbe1cb074386e24112b2ab145 RLBA-2022:2044 crypto-policies bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crypto-policies. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm 83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9 crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm 83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9 crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm 83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9 crypto-policies-20211116-1.gitae470d6.el8.noarch.rpm 83b010907de400618b0d38fb61b16a39e1e80c2dfb0acf681521df9ca87736f9 crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183 crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183 crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183 crypto-policies-scripts-20211116-1.gitae470d6.el8.noarch.rpm aef3e5200d40074980dfcfa2dcaf4a6c904b9c651ef6703e348c7ab348d02183 RLBA-2022:2054 libffi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libffi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libffi-3.1-23.el8.aarch64.rpm f6afab76456adcc3407ba78babdb4c13ea931ee967dbeca7171a7af693f28452 libffi-3.1-23.el8.aarch64.rpm f6afab76456adcc3407ba78babdb4c13ea931ee967dbeca7171a7af693f28452 libffi-devel-3.1-23.el8.aarch64.rpm 2b6e6a0e547e5a8e332182b50c3eea1c65ac27608b486e596e01819c26df47bc libffi-devel-3.1-23.el8.aarch64.rpm 2b6e6a0e547e5a8e332182b50c3eea1c65ac27608b486e596e01819c26df47bc RLBA-2022:2060 kmod bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms kmod-25-19.el8.aarch64.rpm 1ab1a56ffda4f0b37e0913237283fcdaeadc06c2454a404e91cde90eff825eb4 kmod-25-19.el8.aarch64.rpm 1ab1a56ffda4f0b37e0913237283fcdaeadc06c2454a404e91cde90eff825eb4 kmod-libs-25-19.el8.aarch64.rpm 754c6d1db5fbd7daee3cbcea722a71971595c45d09cd3346ccef0494ea2e37d0 kmod-libs-25-19.el8.aarch64.rpm 754c6d1db5fbd7daee3cbcea722a71971595c45d09cd3346ccef0494ea2e37d0 RLBA-2022:2062 wpa_supplicant bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for wpa_supplicant. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms wpa_supplicant-2.10-1.el8.aarch64.rpm af5ab7c5a6c75d6b5e9cafc72d94ba54acb2a4d8dca92a7bb1d6037ad28f8a59 wpa_supplicant-2.10-1.el8.aarch64.rpm af5ab7c5a6c75d6b5e9cafc72d94ba54acb2a4d8dca92a7bb1d6037ad28f8a59 RLBA-2022:2080 sudo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms sudo-1.8.29-8.el8.aarch64.rpm 2a69fa9baf56512e72f8d89af4c0bb8c98acf42dfa97caf5d9454ffaef39ff25 sudo-1.8.29-8.el8.aarch64.rpm 2a69fa9baf56512e72f8d89af4c0bb8c98acf42dfa97caf5d9454ffaef39ff25 RLBA-2022:2098 unzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms unzip-6.0-46.el8.aarch64.rpm ba9b759130b0597e1ad63652e8895b42a045c2e82afe95a426e873f152ae3f06 unzip-6.0-46.el8.aarch64.rpm ba9b759130b0597e1ad63652e8895b42a045c2e82afe95a426e873f152ae3f06 RLBA-2022:2111 ksc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ksc-1.9-2.el8.noarch.rpm 62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96 ksc-1.9-2.el8.noarch.rpm 62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96 ksc-1.9-2.el8.noarch.rpm 62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96 ksc-1.9-2.el8.noarch.rpm 62081f15fa40480629031db743b80e8a4578f8c5f263b9e08e7552c524330a96 RLEA-2022:1869 new module: perl:5.32 Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Pod-Perldoc, perl-DBI, perl-IO-HTML, perl-Pod-Escapes, perl-Devel-PPPort, perl-Pod-Usage, perl-Data-Dump, perl-Sub-Exporter, perl-perlfaq, perl-Object-HashBase, perl-CPAN-Meta-YAML, perl-Digest, perl-podlators, perl-bignum, perl-Text-ParseWords, perl-Text-Template, perl-DBD-MySQL, perl-Text-Glob, perl-Pod-Simple, perl-Compress-Raw-Bzip2, perl-Params-Check, perl-Term-Table, perl-CPAN-DistnameInfo, perl-Perl-OSType, perl-Data-OptList, perl-App-cpanminus, perl-Importer, perl-Exporter, perl-Compress-Raw-Lzma, perl-LWP-Protocol-https, perl-Params-Util, perl-Net-SSLeay, perl-constant, perl-Carp, perl-Pod-Checker, perl-File-Fetch, perl-Thread-Queue, perl-Filter-Simple, perl-TimeDate, perl-Test-Harness, perl-Module-Build, perl-File-HomeDir, perl-LWP-MediaTypes, perl-parent, perl-Unicode-Collate, perl-Sys-Syslog, perl-IO-Compress-Lzma, perl-threads-shared, perl-File-Which, perl-IPC-SysV, perl-IO-Socket-SSL, perl-generators, perl-libwww-perl, perl-Encode-Locale, perl-Getopt-Long, perl-File-Temp, perl-HTTP-Negotiate, perl-IPC-Cmd, perl-Module-CoreList, perl-Scalar-List-Utils, perl-HTTP-Tiny, perl-URI, perl-Data-Section, perl-WWW-RobotRules, perl-IPC-System-Simple, perl-HTTP-Date, perl-Compress-Raw-Zlib, perl-ExtUtils-Manifest, perl-DBD-SQLite, perl-Text-Tabs+Wrap, perl-ExtUtils-CBuilder, perl-Algorithm-Diff, perl-CPAN-Meta-Check, perl-DB_File, perl-Math-BigRat, perl-DBD-Pg, perl-Locale-Maketext, perl-Time-Local, perl-Text-Balanced, perl-Devel-Size, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-Unicode-Normalize, perl-Try-Tiny, perl-IO-Socket-IP, perl-Pod-Parser, perl-Digest-HMAC, perl-Time-HiRes, perl-NTLM, perl, perl-Math-BigInt, perl-JSON-PP, perl-String-ShellQuote, perl-MIME-Base64, perl-Archive-Tar, perl-Filter, perl-ExtUtils-Install, perl-Parse-PMFile, perl-PerlIO-via-QuotedPrint, perl-Data-Dumper, perl-CPAN, perl-PathTools, perl-CPAN-Meta, perl-Module-Load-Conditional, perl-IO-Compress, perl-Package-Generator, perl-autodie, perl-Compress-Bzip2, perl-Text-Diff, perl-Digest-MD5, perl-Encode, perl-Socket, perl-version, perl-File-pushd, perl-Fedora-VSP, perl-Software-License, perl-Env, perl-HTML-Parser, perl-Mozilla-CA, perl-Sub-Install, perl-CPAN-Meta-Requirements, perl-libnet, perl-Config-Perl-V, perl-local-lib, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Module-Metadata, perl-Math-BigInt-FastCalc, perl-inc-latest, perl-experimental, perl-Digest-SHA, perl-Archive-Zip, perl-Term-ANSIColor, perl-Storable, perl-File-Path, perl-threads, perl-Module-Load, perl-YAML, perl-Test-Simple, perl-ExtUtils-MakeMaker, perl-Term-Cap, perl-MRO-Compat, perl-ExtUtils-ParseXS, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list This enhancement update adds the perl:5.32 module to Rocky Linux 8. (BZ#2021471) For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLBA-2022:1994 libqmi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libqmi-utils-1.30.2-1.el8.aarch64.rpm b2e4059ace86f92dd1bbea769bb049c0053dcfcdc7e1de4a1c69b41b8920b60f libqmi-utils-1.30.2-1.el8.aarch64.rpm b2e4059ace86f92dd1bbea769bb049c0053dcfcdc7e1de4a1c69b41b8920b60f libqmi-1.30.2-1.el8.aarch64.rpm 41cbd1100c34b4b260467f6b22b86ba0c681990fe4c9ba234139ea2daabced45 libqmi-1.30.2-1.el8.aarch64.rpm 41cbd1100c34b4b260467f6b22b86ba0c681990fe4c9ba234139ea2daabced45 RLBA-2022:2099 sysfsutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sysfsutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libsysfs-2.1.0-25.el8.aarch64.rpm 275b70e8969c060ea185e483255bc9ff865d67b48bf0e78780a26e009c282ec9 libsysfs-2.1.0-25.el8.aarch64.rpm 275b70e8969c060ea185e483255bc9ff865d67b48bf0e78780a26e009c282ec9 RLBA-2022:2009 ModemManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ModemManager-1.18.2-1.el8.aarch64.rpm 614e1130d623c3d191f6292cf6a28df81b65032c4f2d953f0ab61d18d54f3510 ModemManager-1.18.2-1.el8.aarch64.rpm 614e1130d623c3d191f6292cf6a28df81b65032c4f2d953f0ab61d18d54f3510 ModemManager-glib-1.18.2-1.el8.aarch64.rpm 48cd4a4e180c1db310f937810013f6bfe227b34c36ff8243993df79d2199f5e9 ModemManager-glib-1.18.2-1.el8.aarch64.rpm 48cd4a4e180c1db310f937810013f6bfe227b34c36ff8243993df79d2199f5e9 RLEA-2022:1955 perl:5.32 metadata for the Rocky Linux 8 module matrix (2/4) Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-DBD-Pg, perl-DBI, perl-IO-HTML, perl-LWP-MediaTypes, perl-Data-Dump, perl-FCGI, perl-HTTP-Message, perl-Net-HTTP, perl-File-pushd, perl-Try-Tiny, perl-Digest-HMAC, perl-HTML-Parser, perl-NTLM, perl-Mozilla-CA, perl-IO-Socket-SSL, perl-libwww-perl, perl-Encode-Locale, perl-DBD-MySQL, perl-String-ShellQuote, perl-HTTP-Negotiate, perl-File-Listing, perl-HTML-Tagset, perl-HTTP-Cookies, perl-Parse-PMFile, perl-CPAN-DistnameInfo, perl-WWW-RobotRules, perl-App-cpanminus, perl-HTTP-Date, perl-LWP-Protocol-https, perl-DBD-SQLite, perl-Net-SSLeay, perl-YAML, perl-CPAN-Meta-Check, perl-TimeDate, perl-Module-CPANfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 perl-DBD-SQLite-1.58-2.el8.aarch64.rpm 419c2f99f97d2552ff8a4ef685163e0d470e3d34991b893d535a5d19e390abd2 RLBA-2022:2018 perl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms perl-IO-Zlib-1.10-421.el8.noarch.rpm 087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25 perl-IO-Zlib-1.10-421.el8.noarch.rpm 087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25 perl-Errno-1.28-421.el8.aarch64.rpm 34ecce44680a107dd02ab2562491411e2763126ec2883fb332760071201dc823 perl-Errno-1.28-421.el8.aarch64.rpm 34ecce44680a107dd02ab2562491411e2763126ec2883fb332760071201dc823 perl-interpreter-5.26.3-421.el8.aarch64.rpm 6a52f0faef386d8bfeea1bd34b57c6753e1c067bfa4987cbedbcee1c03ca22bd perl-interpreter-5.26.3-421.el8.aarch64.rpm 6a52f0faef386d8bfeea1bd34b57c6753e1c067bfa4987cbedbcee1c03ca22bd perl-IO-1.38-421.el8.aarch64.rpm 59671e68e2bc45e8b83a00107c09b74a534e8309b20321249facc85141275364 perl-IO-1.38-421.el8.aarch64.rpm 59671e68e2bc45e8b83a00107c09b74a534e8309b20321249facc85141275364 perl-IO-Zlib-1.10-421.el8.noarch.rpm 087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25 perl-IO-Zlib-1.10-421.el8.noarch.rpm 087b9f8a78b4421f2e8f0724496d7372567ee756e722087e32f14292f6f8dd25 perl-libs-5.26.3-421.el8.aarch64.rpm 3d09956cc75238e3e9290b911da7a581744fb0a82470bf81b2bba71ea913d692 perl-libs-5.26.3-421.el8.aarch64.rpm 3d09956cc75238e3e9290b911da7a581744fb0a82470bf81b2bba71ea913d692 perl-macros-5.26.3-421.el8.aarch64.rpm 36bcc6016692a87410b729478eb543e97ca2e386baa84585597b16f7a24a2c4a perl-macros-5.26.3-421.el8.aarch64.rpm 36bcc6016692a87410b729478eb543e97ca2e386baa84585597b16f7a24a2c4a perl-Math-Complex-1.59-421.el8.noarch.rpm 8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a perl-Math-Complex-1.59-421.el8.noarch.rpm 8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a perl-Math-Complex-1.59-421.el8.noarch.rpm 8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a perl-Math-Complex-1.59-421.el8.noarch.rpm 8e0a26f92c6fabe2908d7bec8073cabd25b48e7c25e8b36bfb5d7444c256e75a RLSA-2022:2043 Moderate: c-ares security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Missing input validation of host names may lead to domain hijacking (CVE-2021-3672) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms c-ares-1.13.0-6.el8.aarch64.rpm 8225a0ed737eeda108db25266079fbb6518ee59d078a771cd45a0e3295bd11b3 c-ares-1.13.0-6.el8.aarch64.rpm 8225a0ed737eeda108db25266079fbb6518ee59d078a771cd45a0e3295bd11b3 c-ares-devel-1.13.0-6.el8.aarch64.rpm 4aa2238ad16931ee7a04d41e2e70ad777dac7f56043d3656d1f8b183a4877a02 c-ares-devel-1.13.0-6.el8.aarch64.rpm 4aa2238ad16931ee7a04d41e2e70ad777dac7f56043d3656d1f8b183a4877a02 RLEA-2022:1990 rasdaemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rasdaemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms rasdaemon-0.6.1-12.el8.aarch64.rpm 42a74309880b8546d92e43230b1c76497ace5d0f09797a650256707e129f6992 rasdaemon-0.6.1-12.el8.aarch64.rpm 42a74309880b8546d92e43230b1c76497ace5d0f09797a650256707e129f6992 RLBA-2022:1996 sed bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sed. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms sed-4.5-5.el8.aarch64.rpm ddf5d10a779abd3fe3f75d2a49fbc872896412859c4246e1a6a9dd139ee49690 sed-4.5-5.el8.aarch64.rpm ddf5d10a779abd3fe3f75d2a49fbc872896412859c4246e1a6a9dd139ee49690 RLBA-2022:1997 libmbim bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmbim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libmbim-1.26.0-2.el8.aarch64.rpm d552349ee145265dd81c8311b00058b448e4985ff93faac5af767360a8328a37 libmbim-1.26.0-2.el8.aarch64.rpm d552349ee145265dd81c8311b00058b448e4985ff93faac5af767360a8328a37 libmbim-utils-1.26.0-2.el8.aarch64.rpm e8642872288af0d3e248483399e4d6eb5ac91e878a11d8ac49d186c9c12b6338 libmbim-utils-1.26.0-2.el8.aarch64.rpm e8642872288af0d3e248483399e4d6eb5ac91e878a11d8ac49d186c9c12b6338 RLBA-2022:1999 trace-cmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms trace-cmd-2.7-10.el8.aarch64.rpm 51de7c791b33a726c2f232bc84a79fe6f17674b08a423ea97902d09d489f2b22 trace-cmd-2.7-10.el8.aarch64.rpm 51de7c791b33a726c2f232bc84a79fe6f17674b08a423ea97902d09d489f2b22 RLBA-2022:2015 make bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms make-4.2.1-11.el8.aarch64.rpm 2b734a70ce6b5a957b3c302c77f0c07d7ab57b5c2ebd9c9bcd79df37d744667d make-4.2.1-11.el8.aarch64.rpm 2b734a70ce6b5a957b3c302c77f0c07d7ab57b5c2ebd9c9bcd79df37d744667d make-devel-4.2.1-11.el8.aarch64.rpm f198e239d9f5a6a415232bfb5f7b61bf2e747574e1c45423afe47dc1e70675dc make-devel-4.2.1-11.el8.aarch64.rpm f198e239d9f5a6a415232bfb5f7b61bf2e747574e1c45423afe47dc1e70675dc RLBA-2022:2024 ps_mem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ps_mem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ps_mem-3.6-9.el8.noarch.rpm 056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d ps_mem-3.6-9.el8.noarch.rpm 056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d ps_mem-3.6-9.el8.noarch.rpm 056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d ps_mem-3.6-9.el8.noarch.rpm 056090248d516d544e15228d4a217305aa638f4430117bc3fab1e2b6385e366d RLSA-2022:2031 Low: libssh security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.6). (BZ#1896651) Security Fix(es): * libssh: possible heap-based buffer overflow when rekeying (CVE-2021-3634) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libssh-0.9.6-3.el8.aarch64.rpm befdae1b2d3f4a16811a1e57f8243b194c2e50e6624c851db5bc118020d10b21 libssh-0.9.6-3.el8.aarch64.rpm befdae1b2d3f4a16811a1e57f8243b194c2e50e6624c851db5bc118020d10b21 libssh-config-0.9.6-3.el8.noarch.rpm 24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549 libssh-config-0.9.6-3.el8.noarch.rpm 24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549 libssh-config-0.9.6-3.el8.noarch.rpm 24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549 libssh-config-0.9.6-3.el8.noarch.rpm 24db831b814f4f82a973dfd85d3b8541239ca8f401f579fc9de19d117edad549 RLBA-2022:2034 dmidecode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dmidecode-3.3-4.el8.aarch64.rpm 79a38f27953434301d0ee92b817ce71c2e2b9633440cd5910e7137359413435d dmidecode-3.3-4.el8.aarch64.rpm 79a38f27953434301d0ee92b817ce71c2e2b9633440cd5910e7137359413435d RLBA-2022:2035 libstoragemgmt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libstoragemgmt-1.9.1-3.el8.aarch64.rpm 7c5e4f09bb5a3cd0ec5a2565d218c51be2725972a96a0972df2a76e03cbb7c70 libstoragemgmt-1.9.1-3.el8.aarch64.rpm 7c5e4f09bb5a3cd0ec5a2565d218c51be2725972a96a0972df2a76e03cbb7c70 libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm 4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm 4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm 4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf libstoragemgmt-arcconf-plugin-1.9.1-3.el8.noarch.rpm 4402f87b03850dc44de41a624cffd2fc021c51bf8236d2253b233229c5ab49bf libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm 3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559 libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm 3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559 libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm 3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559 libstoragemgmt-hpsa-plugin-1.9.1-3.el8.noarch.rpm 3835125766e24fcf463dd18c364b3a88a6f484f4652315dd51c97cc643485559 libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23 libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23 libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23 libstoragemgmt-local-plugin-1.9.1-3.el8.noarch.rpm d482d3f501b62afb450a4efa76c74d83a0bc3271d51285b688c0fe9521606d23 libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm 59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2 libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm 59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2 libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm 59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2 libstoragemgmt-megaraid-plugin-1.9.1-3.el8.noarch.rpm 59e4132af9f4d310fca02459966490475ce2d897a531c52c10962a25b01a5cc2 libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm 9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm 9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm 9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb libstoragemgmt-smis-plugin-1.9.1-3.el8.noarch.rpm 9961b55e6eee407737ee1fc0068348abfd7064bda5aa622c97f4d763f31f7cbb libstoragemgmt-udev-1.9.1-3.el8.aarch64.rpm 3bef2c6f20a893cd7468f7ba5a0b30047647b54fdfdbbc8582ee4a506931b6e2 libstoragemgmt-udev-1.9.1-3.el8.aarch64.rpm 3bef2c6f20a893cd7468f7ba5a0b30047647b54fdfdbbc8582ee4a506931b6e2 python3-libstoragemgmt-1.9.1-3.el8.aarch64.rpm 065d96f2a85cf84f3f4292b72c4de31317e2cdf273a553d1e304b169621a1248 python3-libstoragemgmt-1.9.1-3.el8.aarch64.rpm 065d96f2a85cf84f3f4292b72c4de31317e2cdf273a553d1e304b169621a1248 RLBA-2022:2040 libuser bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libuser-0.62-24.el8.aarch64.rpm c661dc2fe0314f936dfc856462560918f8c1a07eb1fafba94bed65debd937278 libuser-0.62-24.el8.aarch64.rpm c661dc2fe0314f936dfc856462560918f8c1a07eb1fafba94bed65debd937278 python3-libuser-0.62-24.el8.aarch64.rpm 09a954d2b3f35ac14a2b9af322bbf27cd2e30ae160cf404d046dea1c2f5892a1 python3-libuser-0.62-24.el8.aarch64.rpm 09a954d2b3f35ac14a2b9af322bbf27cd2e30ae160cf404d046dea1c2f5892a1 RLBA-2022:2046 libcomps bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcomps. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libcomps-0.1.18-1.el8.aarch64.rpm 14501e88c053a8ff81112ebd05f7346a9d62e1691758e5a70574747c83a200ed libcomps-0.1.18-1.el8.aarch64.rpm 14501e88c053a8ff81112ebd05f7346a9d62e1691758e5a70574747c83a200ed python3-libcomps-0.1.18-1.el8.aarch64.rpm b6762a8e5df23f338919efdb6398e87e21bded199267b547062f24f4ed6a9e76 python3-libcomps-0.1.18-1.el8.aarch64.rpm b6762a8e5df23f338919efdb6398e87e21bded199267b547062f24f4ed6a9e76 RLBA-2022:2061 jansson bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for jansson. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms jansson-2.14-1.el8.aarch64.rpm 1ec0a962c3663f00d05c8056ba611a88582680453d226ee23f31e55b0316be32 jansson-2.14-1.el8.aarch64.rpm 1ec0a962c3663f00d05c8056ba611a88582680453d226ee23f31e55b0316be32 RLBA-2022:2064 python-linux-procfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms python3-linux-procfs-0.7.0-1.el8.noarch.rpm 4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4 python3-linux-procfs-0.7.0-1.el8.noarch.rpm 4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4 python3-linux-procfs-0.7.0-1.el8.noarch.rpm 4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4 python3-linux-procfs-0.7.0-1.el8.noarch.rpm 4db3a4649dce57af3763398b98c0229c820ef7f85c6d22c08d9446ba4efa17f4 RLBA-2022:2063 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms firewalld-0.9.3-13.el8.noarch.rpm 94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8 firewalld-0.9.3-13.el8.noarch.rpm 94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8 firewalld-0.9.3-13.el8.noarch.rpm 94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8 firewalld-0.9.3-13.el8.noarch.rpm 94fd9d846bb52098f7bb5fea61307ec8aaa532d57182e33b1c3da5ea4c5407d8 firewalld-filesystem-0.9.3-13.el8.noarch.rpm 9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0 firewalld-filesystem-0.9.3-13.el8.noarch.rpm 9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0 firewalld-filesystem-0.9.3-13.el8.noarch.rpm 9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0 firewalld-filesystem-0.9.3-13.el8.noarch.rpm 9b07ee5263547e0feff1392903618d75d70fe5f0e3866c64ec489edb2a7136f0 python3-firewall-0.9.3-13.el8.noarch.rpm c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5 python3-firewall-0.9.3-13.el8.noarch.rpm c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5 python3-firewall-0.9.3-13.el8.noarch.rpm c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5 python3-firewall-0.9.3-13.el8.noarch.rpm c61806656622922cfb4aa08470890405231bdc5105fb66c5bf86bdc63a2662b5 RLBA-2022:2078 xfsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms xfsprogs-5.0.0-10.el8.aarch64.rpm dab31500b020c6b5caf69b5d6b8fdff9637e4cc84ce5a13464c38a12cadc55c4 xfsprogs-5.0.0-10.el8.aarch64.rpm dab31500b020c6b5caf69b5d6b8fdff9637e4cc84ce5a13464c38a12cadc55c4 xfsprogs-devel-5.0.0-10.el8.aarch64.rpm d2a76cb9bde3a18aad91add45c3411e30954ff49475b0046540d952d81ddcd08 xfsprogs-devel-5.0.0-10.el8.aarch64.rpm d2a76cb9bde3a18aad91add45c3411e30954ff49475b0046540d952d81ddcd08 RLBA-2022:2079 setools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms python3-setools-4.3.0-3.el8.aarch64.rpm 575c6e7dada7547d94f2d67b16a0e971f3d79a924832a36b93b94b2634c99c61 python3-setools-4.3.0-3.el8.aarch64.rpm 575c6e7dada7547d94f2d67b16a0e971f3d79a924832a36b93b94b2634c99c61 setools-console-4.3.0-3.el8.aarch64.rpm 713f6e45f5ae611aa0919db766e024be705c5562ff407244ba23cc9b110d5fc6 setools-console-4.3.0-3.el8.aarch64.rpm 713f6e45f5ae611aa0919db766e024be705c5562ff407244ba23cc9b110d5fc6 RLBA-2022:2088 realmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms realmd-0.16.3-25.el8.aarch64.rpm 67f2c2b4e4b12ed4d23677389b779a5eed53b98b686368333e94ebf923ddea59 realmd-0.16.3-25.el8.aarch64.rpm 67f2c2b4e4b12ed4d23677389b779a5eed53b98b686368333e94ebf923ddea59 RLBA-2022:2089 pcsc-lite bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms pcsc-lite-1.9.5-1.el8.aarch64.rpm 2c7032d00a96a124b49d19542b0208423ee016fb2e7d3616cc91186a2758fc54 pcsc-lite-1.9.5-1.el8.aarch64.rpm 2c7032d00a96a124b49d19542b0208423ee016fb2e7d3616cc91186a2758fc54 pcsc-lite-doc-1.9.5-1.el8.noarch.rpm 45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1 pcsc-lite-doc-1.9.5-1.el8.noarch.rpm 45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1 pcsc-lite-doc-1.9.5-1.el8.noarch.rpm 45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1 pcsc-lite-doc-1.9.5-1.el8.noarch.rpm 45c7bd2884b7f60ddf5c832dcdc034b4fc42a60341a2e332b5d78c189b7197f1 pcsc-lite-libs-1.9.5-1.el8.aarch64.rpm a7d5bc5f6ea803c1c9a38e28c45ec265a992eab394697ac258281f934ea9a134 pcsc-lite-libs-1.9.5-1.el8.aarch64.rpm a7d5bc5f6ea803c1c9a38e28c45ec265a992eab394697ac258281f934ea9a134 RLBA-2022:2091 postfix bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms postfix-3.5.8-4.el8.aarch64.rpm 51e04123a82e3d672c2bb9f55080be884fbc6e194e40e894f8552e5714697cab postfix-3.5.8-4.el8.aarch64.rpm 51e04123a82e3d672c2bb9f55080be884fbc6e194e40e894f8552e5714697cab RLBA-2022:2095 python-ethtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms python3-ethtool-0.14-5.el8.aarch64.rpm 13449b4259462ab6b39946398c5e7c6ece93d678a30bd8f77241453506c9ff12 python3-ethtool-0.14-5.el8.aarch64.rpm 13449b4259462ab6b39946398c5e7c6ece93d678a30bd8f77241453506c9ff12 RLBA-2022:2097 cryptsetup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms cryptsetup-2.3.7-2.el8.aarch64.rpm 9c95eaff255efbcd678f50783012223b1463ab637468a588d3347198628c6e6b cryptsetup-2.3.7-2.el8.aarch64.rpm 9c95eaff255efbcd678f50783012223b1463ab637468a588d3347198628c6e6b cryptsetup-libs-2.3.7-2.el8.aarch64.rpm ff9d0c274ad6f9332981dda14a07e5021ba81ef81294fc2bd63ae732df477cc3 cryptsetup-libs-2.3.7-2.el8.aarch64.rpm ff9d0c274ad6f9332981dda14a07e5021ba81ef81294fc2bd63ae732df477cc3 cryptsetup-reencrypt-2.3.7-2.el8.aarch64.rpm e90306211cd7b047f8c9e7d85631922df7177e1ebfcda24119fce08ec5056261 cryptsetup-reencrypt-2.3.7-2.el8.aarch64.rpm e90306211cd7b047f8c9e7d85631922df7177e1ebfcda24119fce08ec5056261 integritysetup-2.3.7-2.el8.aarch64.rpm ab63dd0d41af2cc8a2f812b143379d0e1784007ab871842276dd225b1516c87f integritysetup-2.3.7-2.el8.aarch64.rpm ab63dd0d41af2cc8a2f812b143379d0e1784007ab871842276dd225b1516c87f veritysetup-2.3.7-2.el8.aarch64.rpm b6aea7ac20bebeb9d9161416fb14b95bf910768c388d3f88ea0f9c29648955c4 veritysetup-2.3.7-2.el8.aarch64.rpm b6aea7ac20bebeb9d9161416fb14b95bf910768c388d3f88ea0f9c29648955c4 RLBA-2022:2101 libnftnl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnftnl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libnftnl-1.1.5-5.el8.aarch64.rpm cd85f0f44d1e72c86ce0ba673ed779a479399d5a6d349cec6228d3c82620538c libnftnl-1.1.5-5.el8.aarch64.rpm cd85f0f44d1e72c86ce0ba673ed779a479399d5a6d349cec6228d3c82620538c RLBA-2022:2108 man-pages bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for man-pages. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms man-pages-4.15-7.el8.aarch64.rpm 5e36a9344a4b892cd82ae9c27d795797c9395c9ce06eb8a61a318e1217a204a9 man-pages-4.15-7.el8.aarch64.rpm 5e36a9344a4b892cd82ae9c27d795797c9395c9ce06eb8a61a318e1217a204a9 RLBA-2022:2114 passwd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for passwd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms passwd-0.80-4.el8.aarch64.rpm 40fa894692aaeecd73edd1dbc1f4ac2defec288d4e2a7a3afdd560b97d9cb124 passwd-0.80-4.el8.aarch64.rpm 40fa894692aaeecd73edd1dbc1f4ac2defec288d4e2a7a3afdd560b97d9cb124 RLBA-2022:2115 xfsdump bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms xfsdump-3.1.8-4.el8.aarch64.rpm 3c5ce452105fc1b6a5e900b9016b8928ab4d4cfb4c1c5b27df59f52ed3a23df3 xfsdump-3.1.8-4.el8.aarch64.rpm 3c5ce452105fc1b6a5e900b9016b8928ab4d4cfb4c1c5b27df59f52ed3a23df3 RLBA-2022:2116 iotop bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iotop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms iotop-0.6-17.el8.noarch.rpm d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c iotop-0.6-17.el8.noarch.rpm d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c iotop-0.6-17.el8.noarch.rpm d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c iotop-0.6-17.el8.noarch.rpm d53c43bca35ae94c9bb6f8926fc569b17acf40ded58abb45b5cd64b98bc6762c RLBA-2022:2117 gpgme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms gpgme-1.13.1-11.el8.aarch64.rpm 4acee00582eef4234d6e22b59f381015e643544abb53d170d4439ae88fbc4996 gpgme-1.13.1-11.el8.aarch64.rpm 4acee00582eef4234d6e22b59f381015e643544abb53d170d4439ae88fbc4996 gpgmepp-1.13.1-11.el8.aarch64.rpm b29d190b61010e024a585abd1816004d52e1395ccbb8ba2f9d87978a5ddeca29 gpgmepp-1.13.1-11.el8.aarch64.rpm b29d190b61010e024a585abd1816004d52e1395ccbb8ba2f9d87978a5ddeca29 python3-gpg-1.13.1-11.el8.aarch64.rpm 34fabfff5b0bab1a62773792c7535ccaebbe49ebb729bedb34f2f10faac46408 python3-gpg-1.13.1-11.el8.aarch64.rpm 34fabfff5b0bab1a62773792c7535ccaebbe49ebb729bedb34f2f10faac46408 RLBA-2022:2118 texinfo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms info-6.5-7.el8.aarch64.rpm f06bb14b1fd53ce2ba9a52520d6cdff9e3029b4e92d284ca8b8dc1d30969954e info-6.5-7.el8.aarch64.rpm f06bb14b1fd53ce2ba9a52520d6cdff9e3029b4e92d284ca8b8dc1d30969954e RLBA-2022:2122 gawk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gawk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms gawk-4.2.1-4.el8.aarch64.rpm e5dee734235635b7181069d5d4ec685baa6dd0ca72b49e55614225400768d8cf gawk-4.2.1-4.el8.aarch64.rpm e5dee734235635b7181069d5d4ec685baa6dd0ca72b49e55614225400768d8cf RLSA-2022:4991 Important: xz security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xz. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XZ Utils is an integrated collection of user-space file compression utilities based on the Lempel-Ziv-Markov chain algorithm (LZMA), which performs lossless data compression. The algorithm provides a high compression ratio while keeping the decompression time short. Security Fix(es): * gzip: arbitrary-file-write vulnerability (CVE-2022-1271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms xz-5.2.4-4.el8_6.aarch64.rpm a6e66abf0ec31dc6531ad1c7bc15ae596264c95ec4f630045c74f57c85f87158 xz-5.2.4-4.el8_6.aarch64.rpm a6e66abf0ec31dc6531ad1c7bc15ae596264c95ec4f630045c74f57c85f87158 xz-devel-5.2.4-4.el8_6.aarch64.rpm 2c915df260a0cf9280625dd99345a5b86f7f050385d1bb881058801fdb625671 xz-devel-5.2.4-4.el8_6.aarch64.rpm 2c915df260a0cf9280625dd99345a5b86f7f050385d1bb881058801fdb625671 xz-libs-5.2.4-4.el8_6.aarch64.rpm 5813ddb231f6b96c4de61e76b8b393b9506d39e490e0b51e54000412b41474f5 xz-libs-5.2.4-4.el8_6.aarch64.rpm 5813ddb231f6b96c4de61e76b8b393b9506d39e490e0b51e54000412b41474f5 RLSA-2022:5095 Important: grub2, mokutil, shim, and shim-unsigned-x64 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for grub2, shim, shim-unsigned-x64, mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments. Security Fix(es): * grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) * grub2: Crafted PNG grayscale images may lead to out-of-bounds write in heap (CVE-2021-3695) * grub2: Crafted PNG image may lead to out-of-bound write during huffman table handling (CVE-2021-3696) * grub2: Crafted JPEG image can lead to buffer underflow write in the heap (CVE-2021-3697) * grub2: Out-of-bound write when handling split HTTP headers (CVE-2022-28734) * grub2: shim_lock verifier allows non-kernel files to be loaded (CVE-2022-28735) * grub2: use-after-free in grub_cmd_chainloader() (CVE-2022-28736) * shim: Buffer overflow when loading crafted EFI images (CVE-2022-28737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms grub2-common-2.02-123.el8_6.8.noarch.rpm 0c03130165f4b81b788581992de733ebd6a27bdda777a81a240e6adbeb748b00 grub2-common-2.02-123.el8_6.8.noarch.rpm 0c03130165f4b81b788581992de733ebd6a27bdda777a81a240e6adbeb748b00 grub2-efi-aa64-2.02-123.el8_6.8.aarch64.rpm 964af945b4e1a3f988041cac5e98d761e903138e3c3d60c53a349ff95d206a98 grub2-efi-aa64-cdboot-2.02-123.el8_6.8.aarch64.rpm c9b5c10e156ed9c063651bb89bf5b8aa23a2eb81def5499f3c7c7101d91b8552 grub2-efi-aa64-modules-2.02-123.el8_6.8.noarch.rpm 97bd050b6df2b3b1376b5f9c393bcb6279fbe75455f1d0afa65e281a229cd820 grub2-efi-aa64-modules-2.02-123.el8_6.8.noarch.rpm 97bd050b6df2b3b1376b5f9c393bcb6279fbe75455f1d0afa65e281a229cd820 grub2-efi-ia32-modules-2.02-123.el8_6.8.noarch.rpm 4b9cc1c9be65a8ed472f2f9832ab93ee16406a5b6e1cb238731b6a8f38aadf61 grub2-efi-ia32-modules-2.02-123.el8_6.8.noarch.rpm 4b9cc1c9be65a8ed472f2f9832ab93ee16406a5b6e1cb238731b6a8f38aadf61 grub2-efi-x64-modules-2.02-123.el8_6.8.noarch.rpm 7a7aac189164563a15cece09511659e5da1e4035a9ddc4422b13b907b4072182 grub2-efi-x64-modules-2.02-123.el8_6.8.noarch.rpm 7a7aac189164563a15cece09511659e5da1e4035a9ddc4422b13b907b4072182 grub2-pc-modules-2.02-123.el8_6.8.noarch.rpm e4c961eed1f4284a500bbda6430787def542af99e84dd64150746316053786e1 grub2-pc-modules-2.02-123.el8_6.8.noarch.rpm e4c961eed1f4284a500bbda6430787def542af99e84dd64150746316053786e1 grub2-tools-2.02-123.el8_6.8.aarch64.rpm d7dda936cc4736480d5ff1ef75b8def1a1f9235300875bb8d6f084fa4f7646ba grub2-tools-extra-2.02-123.el8_6.8.aarch64.rpm f914b9bf48d7c104ffec7c69f1f168495e79d99846603448e77115fb915d17c6 grub2-tools-minimal-2.02-123.el8_6.8.aarch64.rpm 7d7eedd585fbdbf100d862ffda4d3100f7fe6025eff855b66bd8ffa102842bfd mokutil-0.3.0-11.el8_6.1.aarch64.rpm a356f482d886cb87e45b4420231d97e60354bfa8b103e54e05017463048a3c25 shim-aa64-15.6-1.el8.aarch64.rpm 2622c680a378a673713d42c96c305f63b96edee4be16866ec04e722d26e87d75 shim-aa64-15.6-1.el8.aarch64.rpm 2622c680a378a673713d42c96c305f63b96edee4be16866ec04e722d26e87d75 RLSA-2022:5311 Moderate: libgcrypt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: ElGamal implementation allows plaintext recovery (CVE-2021-40528) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libgcrypt-1.8.5-7.el8_6.aarch64.rpm a8c17e9299608dbbae8f31c9a2f20b4eff4fb139a676cdbbd4cfd02c56a3ea8f libgcrypt-1.8.5-7.el8_6.aarch64.rpm a8c17e9299608dbbae8f31c9a2f20b4eff4fb139a676cdbbd4cfd02c56a3ea8f libgcrypt-devel-1.8.5-7.el8_6.aarch64.rpm c3e308322373badd6ea9e6264afdd7abbbf4fbadcfe85a34f8486b0ac2ff79ce libgcrypt-devel-1.8.5-7.el8_6.aarch64.rpm c3e308322373badd6ea9e6264afdd7abbbf4fbadcfe85a34f8486b0ac2ff79ce RLBA-2022:5322 mtools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mtools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mtools is a collection of utilities for files created in the MS-DOS operating system. Mtools allow you to read, write, and move MS-DOS file system files (normally on MS-DOS floppy disks). Mtools supports Windows95 style long file names, IBM extended density format (OS/2 XDF) disks, and disks formatted in the 2M program. Install Mtools if your scenario requires using MS-DOS disks. Bug Fix(es) and Enhancement(s): * mtools missing glibc-gconv-extra dependency (BZ#2080999) none-baseos-rpms mtools-4.0.18-15.el8_6.aarch64.rpm d2eae7cbe81115d5c3a0e3c276d1a6ca2c1ea667d3248d734566db2b5f3ccd03 mtools-4.0.18-15.el8_6.aarch64.rpm d2eae7cbe81115d5c3a0e3c276d1a6ca2c1ea667d3248d734566db2b5f3ccd03 RLSA-2022:5809 Moderate: pcre2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pcre2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre2: Out-of-bounds read in compile_xclass_matchingpath in pcre2_jit_compile.c (CVE-2022-1586) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms pcre2-10.32-3.el8_6.aarch64.rpm 199691f32077d934d813c94a40310e6e54770032ded2dddf0cd7002f4b9434ab pcre2-10.32-3.el8_6.aarch64.rpm 199691f32077d934d813c94a40310e6e54770032ded2dddf0cd7002f4b9434ab pcre2-devel-10.32-3.el8_6.aarch64.rpm 322ba90a7f2dd17d6012d8822b92cfcd0f8bb466fc96bbc192d877bca25a56fc pcre2-devel-10.32-3.el8_6.aarch64.rpm 322ba90a7f2dd17d6012d8822b92cfcd0f8bb466fc96bbc192d877bca25a56fc pcre2-utf16-10.32-3.el8_6.aarch64.rpm 5f4fc003b5e7bf176ef9e073c394292f78d57d0f22b4f6eb48c269fc0bc7da10 pcre2-utf16-10.32-3.el8_6.aarch64.rpm 5f4fc003b5e7bf176ef9e073c394292f78d57d0f22b4f6eb48c269fc0bc7da10 pcre2-utf32-10.32-3.el8_6.aarch64.rpm 1096d125f218c2a1aab00679612e9a0b859b973b0e030578cff89d7c5e63762d pcre2-utf32-10.32-3.el8_6.aarch64.rpm 1096d125f218c2a1aab00679612e9a0b859b973b0e030578cff89d7c5e63762d RLSA-2022:5813 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Out-of-bounds Write (CVE-2022-1785) * vim: out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) * vim: buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms vim-minimal-8.0.1763-19.el8_6.4.aarch64.rpm 99225e903ab6362d7ab2e4b2677fae22d14e4f04ad5d8febc21c08b74a8bcd3e vim-minimal-8.0.1763-19.el8_6.4.aarch64.rpm 99225e903ab6362d7ab2e4b2677fae22d14e4f04ad5d8febc21c08b74a8bcd3e RLBA-2022:5815 bash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * Segfault in 'buffered_getchar()' function in bash (BZ#2097659) none-baseos-rpms bash-4.4.20-4.el8_6.aarch64.rpm 2da0398e2a0bbfac7aeeef962f12c8e48be6cf4797a2fe625cbbe27b0cc33c22 bash-4.4.20-4.el8_6.aarch64.rpm 2da0398e2a0bbfac7aeeef962f12c8e48be6cf4797a2fe625cbbe27b0cc33c22 bash-doc-4.4.20-4.el8_6.aarch64.rpm f0feb2cd8b50de23659d62069e13600a15622bd86185afbe634c59c4600295ad bash-doc-4.4.20-4.el8_6.aarch64.rpm f0feb2cd8b50de23659d62069e13600a15622bd86185afbe634c59c4600295ad RLSA-2022:5818 Moderate: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: c_rehash script allows command injection (CVE-2022-1292) * openssl: the c_rehash script allows command injection (CVE-2022-2068) * openssl: AES OCB fails to encrypt some bytes (CVE-2022-2097) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-1.1.1k-7.el8_6.aarch64.rpm 269acb1e995e9ca1cb690110dac77f6f2261c9316c6f72b75c94461ea2065f89 openssl-1.1.1k-7.el8_6.aarch64.rpm 269acb1e995e9ca1cb690110dac77f6f2261c9316c6f72b75c94461ea2065f89 openssl-devel-1.1.1k-7.el8_6.aarch64.rpm 7d857b7ca18bab2302a7e2f75da0c9ebc6ffd0185f082fd844cf220a439613b5 openssl-devel-1.1.1k-7.el8_6.aarch64.rpm 7d857b7ca18bab2302a7e2f75da0c9ebc6ffd0185f082fd844cf220a439613b5 openssl-libs-1.1.1k-7.el8_6.aarch64.rpm dafeb07a3889c472136a9913fed1689e718e675c4d4eb08dca365118570fbeb9 openssl-libs-1.1.1k-7.el8_6.aarch64.rpm dafeb07a3889c472136a9913fed1689e718e675c4d4eb08dca365118570fbeb9 openssl-perl-1.1.1k-7.el8_6.aarch64.rpm f8fd821099cc8921527e00c0fb1ea81b5d5ae599d26c3159b143bc7dd18b50fb openssl-perl-1.1.1k-7.el8_6.aarch64.rpm f8fd821099cc8921527e00c0fb1ea81b5d5ae599d26c3159b143bc7dd18b50fb RLSA-2022:7089 Important: libksba security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow may lead to remote code execution (CVE-2022-3515) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libksba-1.3.5-8.el8_6.aarch64.rpm 8cdf1933b2245ad3191d3179c38d4ed45bf969621ed7bb505b367f107ce4abea libksba-1.3.5-8.el8_6.aarch64.rpm 8cdf1933b2245ad3191d3179c38d4ed45bf969621ed7bb505b367f107ce4abea RLBA-2022:6459 ca-certificates bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ca-certificates. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Update ca-certificates package in Rocky Linux-8.6.0.Z.MAIN+EUS to CA trust list version (2022) 2.54 from Firefox 102 (bug 2100189) * QuoVadis Root Certification Authority certificate is expired in March. (BZ#2118462) * Expiring O = Digital Signature Trust Co., CN = DST Root CA X3 (BZ#2118463) * ca-certificates need to add support for signing certs for .NET (BZ#2121485) none-baseos-rpms ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1 ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1 ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1 ca-certificates-2022.2.54-80.2.el8_6.noarch.rpm 096cbbcaef1939f1c4bc6a86c9d59dc25b4ea02281db53d5a4975c7ce65ab1a1 RLSA-2022:6463 Moderate: gnupg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * gpg: Signature spoofing via status line injection (CVE-2022-34903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnupg2-2.2.20-3.el8_6.aarch64.rpm 2a9c5b3ce0a5397f0e41321983d58e61a2084487c7b4eb0e2adefda45bb591f7 gnupg2-2.2.20-3.el8_6.aarch64.rpm 2a9c5b3ce0a5397f0e41321983d58e61a2084487c7b4eb0e2adefda45bb591f7 gnupg2-smime-2.2.20-3.el8_6.aarch64.rpm baa39f7719aef967ff00c36d29266de34ca4256c21e0e7f65e92f1f88117a504 gnupg2-smime-2.2.20-3.el8_6.aarch64.rpm baa39f7719aef967ff00c36d29266de34ca4256c21e0e7f65e92f1f88117a504 RLSA-2022:7105 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Double free during gnutls_pkcs7_verify. (CVE-2022-2509) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.16-5.el8_6.aarch64.rpm d9eb93987fc7832053fee67d9086e09fe1a4e765c148a0f9a1e81e594590dc91 gnutls-3.6.16-5.el8_6.aarch64.rpm d9eb93987fc7832053fee67d9086e09fe1a4e765c148a0f9a1e81e594590dc91 RLBA-2022:7107 glib2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es) and Enhancement(s): * Add --interface-info-[body|header] modes to gdbus-codegen. (BZ#2124615) none-baseos-rpms glib2-2.56.4-158.el8_6.1.aarch64.rpm 5183edb75014cfb1b3d341b12c19692d7c331bbff17cf767b6d4cb99d92c0830 glib2-2.56.4-158.el8_6.1.aarch64.rpm 5183edb75014cfb1b3d341b12c19692d7c331bbff17cf767b6d4cb99d92c0830 glib2-devel-2.56.4-158.el8_6.1.aarch64.rpm ea8ece579861a004a9d3ef7edcc83e33b242d1ea666c30f8ee0c481f2f87e8bf glib2-devel-2.56.4-158.el8_6.1.aarch64.rpm ea8ece579861a004a9d3ef7edcc83e33b242d1ea666c30f8ee0c481f2f87e8bf glib2-fam-2.56.4-158.el8_6.1.aarch64.rpm 83f3317938248342e2ef36c029f0d1b9e9f52b86c8c645d5b38b95c4c5fcaf88 glib2-fam-2.56.4-158.el8_6.1.aarch64.rpm 83f3317938248342e2ef36c029f0d1b9e9f52b86c8c645d5b38b95c4c5fcaf88 glib2-tests-2.56.4-158.el8_6.1.aarch64.rpm 0e82c10313b40160ec9d95e8b1ce9f3570de15fb7c8ad7d377947c1c8dd0b9bd glib2-tests-2.56.4-158.el8_6.1.aarch64.rpm 0e82c10313b40160ec9d95e8b1ce9f3570de15fb7c8ad7d377947c1c8dd0b9bd RLSA-2022:7108 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Out of bounds access during table rename (CVE-2020-35527) * sqlite: Null pointer derreference in src/select.c (CVE-2020-35525) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-3.26.0-16.el8_6.aarch64.rpm b34d9a706cd072df44bb711fe69e7d2ceab23c8034210ab1844fe214b26f7e35 sqlite-3.26.0-16.el8_6.aarch64.rpm b34d9a706cd072df44bb711fe69e7d2ceab23c8034210ab1844fe214b26f7e35 sqlite-devel-3.26.0-16.el8_6.aarch64.rpm 875a9eb15e1f86210ce55934b3c4ef79d08ee1cae7b00f0569f32ac82f4e5907 sqlite-devel-3.26.0-16.el8_6.aarch64.rpm 875a9eb15e1f86210ce55934b3c4ef79d08ee1cae7b00f0569f32ac82f4e5907 sqlite-doc-3.26.0-16.el8_6.noarch.rpm c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d sqlite-doc-3.26.0-16.el8_6.noarch.rpm c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d sqlite-doc-3.26.0-16.el8_6.noarch.rpm c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d sqlite-doc-3.26.0-16.el8_6.noarch.rpm c0cce5feb54e0f8950e4c987b3dac5aec859ebd672f0214c313853b02b47487d sqlite-libs-3.26.0-16.el8_6.aarch64.rpm d3fa6ff233fd4eeef3f4ff824726c8142ea4d1ef0b46512d5e62ce2e9f6b3d08 sqlite-libs-3.26.0-16.el8_6.aarch64.rpm d3fa6ff233fd4eeef3f4ff824726c8142ea4d1ef0b46512d5e62ce2e9f6b3d08 RLBA-2022:7115 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es) and Enhancement(s): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state. (BZ#2124523) none-baseos-rpms python3-rpm-4.14.3-24.el8_7.aarch64.rpm c9927c97d69913572bb7ff3a695c329ba023a92dc37eec864cee2b188025f7f9 python3-rpm-4.14.3-24.el8_6.aarch64.rpm 83cd7a7b7cc67758b56cc566715c0ff956e94486a72cf657ab65ff6d2e774755 rpm-4.14.3-24.el8_7.aarch64.rpm 0d0117a179a20abc617a4a47473f757ab55696a4d89413718dc65c0b1c0d6fab rpm-4.14.3-24.el8_6.aarch64.rpm 0c78202a34d51f2e855263b15418f77fbc97d8133edd4bade2e2a71897f825da rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-apidocs-4.14.3-24.el8_6.noarch.rpm 16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787 rpm-apidocs-4.14.3-24.el8_6.noarch.rpm 16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787 rpm-build-libs-4.14.3-24.el8_7.aarch64.rpm b5c2b41fb6f91def661b1684cd142586a634b89fd7a007cd66206e170eecd9fe rpm-build-libs-4.14.3-24.el8_6.aarch64.rpm 596f24eb18d1e66b50d2f16e466e65b155e558a23126317f6b363d9fa5df06a5 rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-cron-4.14.3-24.el8_6.noarch.rpm 4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a rpm-cron-4.14.3-24.el8_6.noarch.rpm 4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a rpm-devel-4.14.3-24.el8_7.aarch64.rpm 6cdd4b81da7a942c9421e6294a831d2ff76679b1fc914be7c1e81fefb22fdd3d rpm-devel-4.14.3-24.el8_6.aarch64.rpm 1c432f62b1754300fa06438a35950678960b408fec1c4404370e065a20802ec6 rpm-libs-4.14.3-24.el8_7.aarch64.rpm 4e6f21d79a5363e24486e75cd7bdaca1b280ac3dfc67ad53eb4e518e49b5c274 rpm-libs-4.14.3-24.el8_6.aarch64.rpm 22f237be682bf8d38de02bb766ea06afd1a957aed730fbbf3e61ea4ce351f615 rpm-plugin-ima-4.14.3-24.el8_7.aarch64.rpm 7cee4cfd57f17ebdcf01ea3575d1cdbd796978154f39a62c399865ea062e63f1 rpm-plugin-ima-4.14.3-24.el8_6.aarch64.rpm f19e69758224332a620cde05f3721ebd242f83d95582d0f349e9d8610e885608 rpm-plugin-prioreset-4.14.3-24.el8_7.aarch64.rpm deb2fd79b798f3de854fe81a6e7229db694a8d58b671a91ba5aefa2cc583d209 rpm-plugin-prioreset-4.14.3-24.el8_6.aarch64.rpm 7c8783027d7f7aa2aaa26e00269b748fc9419a6a92b5dce0dfe1f6e47269c554 rpm-plugin-selinux-4.14.3-24.el8_7.aarch64.rpm 42970eaedf7385ec475ba67126ab37c2579d3e03525c8ed4a42ed37b20623f89 rpm-plugin-selinux-4.14.3-24.el8_6.aarch64.rpm e13a948ae70f7cab6c75ddbbe45ad95b0cef6b8e2c59f7dddde3800b77954cd7 rpm-plugin-syslog-4.14.3-24.el8_7.aarch64.rpm 9e254538db70708897180623b4a6631b03d4b10eabb4097378527215682f1e2d rpm-plugin-syslog-4.14.3-24.el8_6.aarch64.rpm c8853f123596ae2ff2c57bd13b098ff656a6df286717d5c53860f66d48d41d2b rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.aarch64.rpm 22cfd5523cab528991fabb2c5d32179288498d05e600b9e9e7060fb8f232ccd4 rpm-plugin-systemd-inhibit-4.14.3-24.el8_6.aarch64.rpm 8144040835afb56ad759a8a57dc75fc4a88c74d07e60fb479c653d58d4c67d88 rpm-sign-4.14.3-24.el8_7.aarch64.rpm 3395b5e2eeac8bec0930f4ce95fbe163923c768545da2b829e8f868744a806b4 rpm-sign-4.14.3-24.el8_6.aarch64.rpm 57b9f21b166fe1d840dfd9c62347b86554cd1d628727a0d55e72aca02c4f01bb RLBA-2022:7116 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings. Bug Fix(es) and Enhancement(s): * libsemanage's check_ext_changes doesn't pick up boolean changes (BZ#2129139) none-baseos-rpms libsemanage-2.9-9.el8.aarch64.rpm 42c73e3fd94d62928882f6defbb0d78759c80f54971b161c2725ce1b3af61fc9 libsemanage-2.9-9.el8_6.aarch64.rpm d9810bb2b36934a3ed24fd825c75e6827b6d7ea033bc2c0755edaf12093a1cfd python3-libsemanage-2.9-9.el8.aarch64.rpm 5cd9a3d2868464a09b6d4c8c8d546ecaf628192c8207aa72b53e7eacf6b17f2d python3-libsemanage-2.9-9.el8_6.aarch64.rpm 0b8d884de4aba1407b74f09ccc043092a9517b32ce011d1bc33f92e228caba24 RLBA-2022:7404 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). none-baseos-rpms tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el9_0.noarch.rpm da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19 tzdata-2022f-1.el9_0.noarch.rpm da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19 tzdata-2022f-1.el9_0.noarch.rpm da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19 tzdata-2022f-1.el9_0.noarch.rpm da66be8719af463ead916afb64b8c8dd807838e626560a11bc3c18690ff29f19 RLBA-2022:7681 audit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms audispd-plugins-3.0.7-4.el8.aarch64.rpm f8201e2ecad2fc6a9d0615abb90bb306c96e33f3922da3d69fb723ec0ffac9f7 audispd-plugins-zos-3.0.7-4.el8.aarch64.rpm dd516f5c2063f92f129a4efd46b0260fe8b81378a42beaf1e73029bac6b9f649 audit-3.0.7-4.el8.aarch64.rpm ecf2595e8fbfcc6bd677c20e44a3641f79eda4006fba1ba145b49f54ab318e3f audit-libs-3.0.7-4.el8.aarch64.rpm b74f36177468b6d2ab83388e78d498b6e2691ac11bc85e28d573e80a6a2435be audit-libs-devel-3.0.7-4.el8.aarch64.rpm 370595411de87116dbc3569eda1f3a90d49216f1e54a44222a03df6ca9ff46ea python3-audit-3.0.7-4.el8.aarch64.rpm 850fa7448c71e67e4ad7d6b3405dc71ae39c4170aef06abff89eacfcd393adb3 RLBA-2022:7682 babeltrace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for babeltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libbabeltrace-1.5.4-4.el8.aarch64.rpm bf1b471001d16651e9c3fbbde98b9e6f032d6a132535f604c7afd049ece935bf RLSA-2022:7683 Moderate: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * off-path attacker may inject data or terminate victim's TCP session (CVE-2020-36516) * race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558) * use-after-free vulnerability in function sco_sock_sendmsg() (CVE-2021-3640) * memory leak for large arguments in video_usercopy function in drivers/media/v4l2-core/v4l2-ioctl.c (CVE-2021-30002) * smb2_ioctl_query_info NULL Pointer Dereference (CVE-2022-0168) * NULL pointer dereference in udf_expand_file_adinicbdue() during writeback (CVE-2022-0617) * swiotlb information leak with DMA_FROM_DEVICE (CVE-2022-0854) * uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM (CVE-2022-1016) * race condition in snd_pcm_hw_free leading to use-after-free (CVE-2022-1048) * use-after-free in tc_new_tfilter() in net/sched/cls_api.c (CVE-2022-1055) * use-after-free and memory errors in ext4 when mounting and operating on a corrupted image (CVE-2022-1184) * NULL pointer dereference in x86_emulate_insn may lead to DoS (CVE-2022-1852) * buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078) * nf_tables cross-table potential use-after-free may lead to local privilege escalation (CVE-2022-2586) * openvswitch: integer underflow leads to out-of-bounds write in reserve_sfa_size() (CVE-2022-2639) * use-after-free when psi trigger is destroyed while being polled (CVE-2022-2938) * net/packet: slab-out-of-bounds access in packet_recvmsg() (CVE-2022-20368) * possible to use the debugger to write zero into a location of choice (CVE-2022-21499) * Spectre-BHB (CVE-2022-23960) * Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) * memory leak in drivers/hid/hid-elo.c (CVE-2022-27950) * double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c (CVE-2022-28390) * use after free in SUNRPC subsystem (CVE-2022-28893) * use-after-free due to improper update of reference count in net/sched/cls_u32.c (CVE-2022-29581) * DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c (CVE-2022-36946) * nfs_atomic_open() returns uninitialized data instead of ENOTDIR (CVE-2022-24448) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms bpftool-4.18.0-425.3.1.el8.aarch64.rpm 6942240e737414cb101e4ea989b2205bab145d8a8fafd7c929a92463f71746b3 kernel-4.18.0-425.3.1.el8.aarch64.rpm ef94f46e20952c5d5a81697fde82c8a23fa56aa74a7561cfafdfeabf910dc89e kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm 7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9 kernel-abi-stablelists-4.18.0-425.3.1.el8.noarch.rpm 7502d39b6c6a1298db08b7e84273413b6cbe84299fd31cb2266e8d6711947bd9 kernel-core-4.18.0-425.3.1.el8.aarch64.rpm b9e085ca90392f23347ebab787d1567271707756bd1b5e51330233104e646c5c kernel-cross-headers-4.18.0-425.3.1.el8.aarch64.rpm 39fb365895f5ac52254fb7f4a3204e390eb4c03379b4ca27b8c9e40220e6b012 kernel-debug-4.18.0-425.3.1.el8.aarch64.rpm 211333bf226a9f1b5646a4703107d8064e8fde85d352f3690738f2c70c4d1ff1 kernel-debug-core-4.18.0-425.3.1.el8.aarch64.rpm c597569d27490f422e006d501d287db1c3561b67555ccb599a4b4d3618f87352 kernel-debug-devel-4.18.0-425.3.1.el8.aarch64.rpm af7740829b30eb81eaf3647250a3274c59c850911d32248f66f22c1467dbcf44 kernel-debuginfo-common-aarch64-4.18.0-425.3.1.el8.aarch64.rpm 4930df4f7633d3ad976e9156e3951464e553cbec717feb54270606582d05cda5 kernel-debug-modules-4.18.0-425.3.1.el8.aarch64.rpm 7cd377c49c52e658a64c55848da558e169034acb57a922a455781039d10110ab kernel-debug-modules-extra-4.18.0-425.3.1.el8.aarch64.rpm 58087146132aa05199503bb268f578cd1095d1e4968f476ec6125cda9b7509f1 kernel-devel-4.18.0-425.3.1.el8.aarch64.rpm 2a5bba03c87111e68ccdcdfef04cf1a7b891648aa7eec7bcf2e96eccc498fc82 kernel-doc-4.18.0-425.3.1.el8.noarch.rpm dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0 kernel-doc-4.18.0-425.3.1.el8.noarch.rpm dfd007ce8dc51176e8566453017d2319a2430dfea645a11ecddbfbf2d299aea0 kernel-headers-4.18.0-425.3.1.el8.aarch64.rpm 44bab6896932c62b8898bf9f48506cec2df89e158b911b6bd0401356822f5751 kernel-modules-4.18.0-425.3.1.el8.aarch64.rpm 647d9db26d8c453615723d49df4d4f0e966513cdaea82c9ba6704e4e2e42777a kernel-modules-extra-4.18.0-425.3.1.el8.aarch64.rpm 374fcda68c0740221b462e133a7775444cc4339cc7b2b7b92a785d56669eea1c kernel-tools-4.18.0-425.3.1.el8.aarch64.rpm 7adbe65e0e0069e933a454a67892895f9c9aa9e9955fb46dde82475e42e4211b kernel-tools-libs-4.18.0-425.3.1.el8.aarch64.rpm 1e1a635dc340f78e6a7a34bd38ae3d3f7800174ad3b505ddb286da1ebde2e941 perf-4.18.0-425.3.1.el8.aarch64.rpm 3092f8426c5b5eff8509e9a0b74fcf49271dd8a0397ae342c2038d65abe70a47 python3-perf-4.18.0-425.3.1.el8.aarch64.rpm 921d5443b2d96b7443f36040e5c6bca983fb1459f181fbe39eec4b8fbf65a09d RLBA-2022:7684 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms glibc-2.28-211.el8.aarch64.rpm af400a51bae252291073278f1a25244d08c4b14be24e5c7e6086cbc7e56d7469 glibc-all-langpacks-2.28-211.el8.aarch64.rpm 2e21c17e7a748b6f708c4409d1dd96c9014d964fa4d8255f26e5cbb0b0a5cc7e glibc-common-2.28-211.el8.aarch64.rpm 06e12940e38d6167e9107cc920c983bcf743533b6a68bc88eba67b479e2db673 glibc-devel-2.28-211.el8.aarch64.rpm 2c4ca4212a8504c15cbf89b747a3b7ce0daf508a8bf8e7decfd336827622e6fc glibc-doc-2.28-211.el8.noarch.rpm 651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf glibc-doc-2.28-211.el8.noarch.rpm 651c1bcdd3292c68b98e3f102ea239fa39a639f17539d011589a2ca80621ddbf glibc-gconv-extra-2.28-211.el8.aarch64.rpm 9c1965f34c347d2f373a63d1d7758a05064643522c9ceb605aff208a3eeb190c glibc-headers-2.28-211.el8.aarch64.rpm eeda97ad0e8a742b62332b3fcfbb606913a95c483ab4274c054c2bbf5b0818b2 glibc-langpack-aa-2.28-211.el8.aarch64.rpm bac0b278bd0fdacf679241a84312373cd5b2285b3e9fdb516e54beb98e7c4a76 glibc-langpack-af-2.28-211.el8.aarch64.rpm d7ca622ceb122843762c584cf7898f90bda85ca4caa5804f852573d6feca89f3 glibc-langpack-agr-2.28-211.el8.aarch64.rpm 7bd424faa98f3ec6708b566e9eb5ef0bd000793e5916cb86d8e2bfe035214c84 glibc-langpack-ak-2.28-211.el8.aarch64.rpm 4587fb6e40386c08b69a99ea04221b0850820483f25f3085cf27f4d3ad12bf22 glibc-langpack-am-2.28-211.el8.aarch64.rpm 434f26d1d8e296a6f5c23ee9100a9b8ee8c8d7b5dda8227522442c8007e787cd glibc-langpack-an-2.28-211.el8.aarch64.rpm 857ab033ba2fa411449abb753d26446f529ca2700ba1d8d4dfafe3522352b5bc glibc-langpack-anp-2.28-211.el8.aarch64.rpm f9e0897ce282e072a060b02999c143ebe85e53bbf1303385b2632f1521735430 glibc-langpack-ar-2.28-211.el8.aarch64.rpm daf88a10b34a23c0cdc6ce267ee86e2e12d227cc5ee4ac5c9db66611022b14c6 glibc-langpack-as-2.28-211.el8.aarch64.rpm a935bea1f6f0b328581321003882090154c6b790b14df22196b05243de3624c4 glibc-langpack-ast-2.28-211.el8.aarch64.rpm 1929d52e625ca5db7bc436c1c952001c2757e70ba082ad33747ee0f9f379f459 glibc-langpack-ayc-2.28-211.el8.aarch64.rpm 61141aff1e3a260fc8d9d7d56f775efc37301f96537fff4a8dd2bd7c5946d3ae glibc-langpack-az-2.28-211.el8.aarch64.rpm 0e446e6e6a2feb26c019168126f7a23e034b4e0b440889f75658f6ac9fff3ff3 glibc-langpack-be-2.28-211.el8.aarch64.rpm 7da46105101c2bd7e89b870ede28a4534f4f0c8f2786236b3956dc1cdda2f243 glibc-langpack-bem-2.28-211.el8.aarch64.rpm cb3af915934d4dc40b65a4d2c305391d1228e319d2f1acd278934d7f4c431be0 glibc-langpack-ber-2.28-211.el8.aarch64.rpm 488d5d615da4a7f29b0a8d985b7c5bba3d06337ba804c3d96dbe11e3010b9905 glibc-langpack-bg-2.28-211.el8.aarch64.rpm 5ea1ace086088f90bc9c90fffd6b68cd0547ca5c63958dfa53963a20e9d50b50 glibc-langpack-bhb-2.28-211.el8.aarch64.rpm d46e571eb1663e64275c86df436a3dbcf41df5d43dcfb315535b69e4cc3342cc glibc-langpack-bho-2.28-211.el8.aarch64.rpm e50514e45dfe8b668993d680455fa504de14b478b6c50ae4c5d1bea07b1bffe0 glibc-langpack-bi-2.28-211.el8.aarch64.rpm e8f9a595a7f623b5a70872cc562e16ae8cbbb2b3e83ae7801567af4b486d3590 glibc-langpack-bn-2.28-211.el8.aarch64.rpm 22523a73438c5bcad8c9099023ebda8c93e70576750c9467c9bebdc887e3aa46 glibc-langpack-bo-2.28-211.el8.aarch64.rpm 0e7e64b560310b980c8d6337d2c076075fc8da3118ddc76780718a4a55f68fda glibc-langpack-br-2.28-211.el8.aarch64.rpm e5943426fe3cd4f44b1d4cf1d3e82e6dfe77e3e43c615c3a47271c4f6d535974 glibc-langpack-brx-2.28-211.el8.aarch64.rpm 259bd72aabedcaf608a2eba4fada49d6ef30c3a3eca0c03df9a68d160870910f glibc-langpack-bs-2.28-211.el8.aarch64.rpm 7292d8a1b4be8d1334d8a6253dd8d8f8f2fef4ab6b34951c5102f39ec156415c glibc-langpack-byn-2.28-211.el8.aarch64.rpm bec434e0d25a638d986edf9c768809cdf0166d01b0858a5ab853f66d5d367b44 glibc-langpack-ca-2.28-211.el8.aarch64.rpm 14b4364d921b746518935d8275ad4bbd6505b12f631dbd8e29c83dd2367f7c66 glibc-langpack-ce-2.28-211.el8.aarch64.rpm 9666955354a55f483ee58b9caaf0de4a5f22e1cdc0659b67d3964d4aedc832fe glibc-langpack-chr-2.28-211.el8.aarch64.rpm b1effc771a4f08440da172c9ec35d2278b4b1a2c93b2ccbf0a5d22a274ae6d9d glibc-langpack-cmn-2.28-211.el8.aarch64.rpm f33554c9daa2279cfa11fc965230236fb5a3d0c2a8d7d510988fef8fa42ea6b5 glibc-langpack-crh-2.28-211.el8.aarch64.rpm a06616c8b23d563dd70b24a743eb33ce22c410d1ceb693d2ecc1d4aca7a0ece8 glibc-langpack-cs-2.28-211.el8.aarch64.rpm a14ddcffe1389178b197184d5c8105553505b2ead42f35ce1cf9cb5e769b41e9 glibc-langpack-csb-2.28-211.el8.aarch64.rpm fcf6508dcf131ff04eca7f035202d1aefadad194d8f25f047743ce29bd784d17 glibc-langpack-cv-2.28-211.el8.aarch64.rpm 4bdccbf7984935de819415c31c51fc4927e3773310e0864dfa6f7891dd63402d glibc-langpack-cy-2.28-211.el8.aarch64.rpm b2d31442787fb3f7233bb86732346e7adccf57f00152ad1ab08d42e5f4b00a3c glibc-langpack-da-2.28-211.el8.aarch64.rpm cba23baabeec57c2476f2bfdca0a3e69ea105c6490d130a908e1349bfd418f4d glibc-langpack-de-2.28-211.el8.aarch64.rpm d63a9f3aa1476e1345b231e8808274c29c3aa7c5e7cf0c82500004796143d13c glibc-langpack-doi-2.28-211.el8.aarch64.rpm c15da2fcb48ed2a5c02060ad70c5e89a015a2a28de277ca1c2af1e81eb0e1c3c glibc-langpack-dsb-2.28-211.el8.aarch64.rpm aef01e9ae2b15f11a925732dc29819c69441bc99ee3486461d2edebbfe9f94e6 glibc-langpack-dv-2.28-211.el8.aarch64.rpm e6d4f6f0ebf99d7d6f912c8cb77dbc6eb00174b4df428790730561d6a7418ec2 glibc-langpack-dz-2.28-211.el8.aarch64.rpm d3a076c2245075aa7cdf1e541c0d0da4db52cdd4f38afe73624fe7d9ab21557c glibc-langpack-el-2.28-211.el8.aarch64.rpm 6ceb0ab13d0164bc085b834679fdc1457d6f4b89ab0e5eaa6e036ef7b42a08e2 glibc-langpack-en-2.28-211.el8.aarch64.rpm 940ea09bc71c9e1f8868b3c90e6438ebbd501729ea54c32cae1911edb90ffcef glibc-langpack-eo-2.28-211.el8.aarch64.rpm 5bb62573fd759654e77130404e2f27e074b75430d2490cf536af5d3fd33cc057 glibc-langpack-es-2.28-211.el8.aarch64.rpm ee448ac7f19ac1fae1575774c090840ed861cc254a3ff8204d16e8c8631cdc27 glibc-langpack-et-2.28-211.el8.aarch64.rpm b340066e8e0fe63913e4dba943f73912623f49355357779200b8e57dd72ed093 glibc-langpack-eu-2.28-211.el8.aarch64.rpm 79f7070ef415046946898743a2c148c64f947cc8b4e8bf9c1a4787425cbc903b glibc-langpack-fa-2.28-211.el8.aarch64.rpm 2dc1c190b0dbbfe3f05655a64d7d4156b7b8e7fa556d217e4be7da5055768376 glibc-langpack-ff-2.28-211.el8.aarch64.rpm 1e60869e6d1940da4c443d3b97ef6a8c690165a6dee29e4b741b2fe7388171a1 glibc-langpack-fi-2.28-211.el8.aarch64.rpm a76963894dcbb97ed4ea9e035334274a163276d177b009f8e80c787b89d8319e glibc-langpack-fil-2.28-211.el8.aarch64.rpm d470b78f9065e7a5676b57ca2354431227414ea03896b860f239d2680e0daf3e glibc-langpack-fo-2.28-211.el8.aarch64.rpm d4ef27c149d852ad5d2de86ed98159a62204b9cd1a9046fa322f4b5bfd42b876 glibc-langpack-fr-2.28-211.el8.aarch64.rpm 85d7cf9a293cfc00e3b6bb912b372c0ac2a4fa26bea586d0dcad7f6140326572 glibc-langpack-fur-2.28-211.el8.aarch64.rpm 4c1fcd865623b7cc7145d71f08833bcf721b9a76196c529b5fb70df4b1471718 glibc-langpack-fy-2.28-211.el8.aarch64.rpm 0ec6737a8b97b333c83c10c0b151b79b8ec0e1a5e635329e7cec1d3aae8ddd5b glibc-langpack-ga-2.28-211.el8.aarch64.rpm 031d3880aef6248dc904599acf15c5a9c8cf8fe729913f8ec38e165aba8b152c glibc-langpack-gd-2.28-211.el8.aarch64.rpm 15c2f9cad5fed95091bed242b2c4dcf78e0c91423885a7753a2dfe34cf173055 glibc-langpack-gez-2.28-211.el8.aarch64.rpm df2a0d4cc35b50db4496cf44322c9123eb5550730189f77e1d6681f5bb021c9c glibc-langpack-gl-2.28-211.el8.aarch64.rpm 8a379537f10ca00ac6560f37efe0843510c955fbbc0efa32930537717af9584e glibc-langpack-gu-2.28-211.el8.aarch64.rpm 0f3fe7e7f954c2ea8e6feee403250407b8b312cee9e78e3dd126dff7446b1e0a glibc-langpack-gv-2.28-211.el8.aarch64.rpm 893e99745e7225dccabbc4ae16788e0b100da4c01eee0f5b609392f2f819b599 glibc-langpack-ha-2.28-211.el8.aarch64.rpm 437855a05529977f55b6671f272b22160e8ade59564bc9e80bf973c308685a3d glibc-langpack-hak-2.28-211.el8.aarch64.rpm bcde1d39458424d0bef0d07a583347efcd4b0e026b365807f8647f33e1feef1a glibc-langpack-he-2.28-211.el8.aarch64.rpm c6d981e2c0e49923ac8e4224b5e7e2011a0acb4b70f887deadf1ca6dd18e60dc glibc-langpack-hi-2.28-211.el8.aarch64.rpm 5c38dd83a227acffa0f941a05e568ba38b446a2720ef0bbadc01cbf39909f269 glibc-langpack-hif-2.28-211.el8.aarch64.rpm c4d195aaf8bdac693ba2370994ff0d62ecffa0ac1510f103ce55d05e0ae62e5c glibc-langpack-hne-2.28-211.el8.aarch64.rpm fb083a139db4f763416f9abbdeb798888ff3e7cd7438e618b0b9d906f602607b glibc-langpack-hr-2.28-211.el8.aarch64.rpm d34639a2aa4efd40fb11f1f503eb667e140dedfed62999af07960cbe0ebc04fb glibc-langpack-hsb-2.28-211.el8.aarch64.rpm 05e6ac39820be6026e89afef8d10899ca89883367ae6a12610d7a8a2251c3782 glibc-langpack-ht-2.28-211.el8.aarch64.rpm 8b9e873d977ba85279998b222e030c70ed879c4bd0bbc957eb1757500d9f6684 glibc-langpack-hu-2.28-211.el8.aarch64.rpm e3dfcc4a2090ed70929ffdc9b41748ffd0f9cf9c2e1dfe5364b04c05d88f3b00 glibc-langpack-hy-2.28-211.el8.aarch64.rpm be764d49079756a3142d6c083e283e0488d77b24ea369c23711d515b0607d1e7 glibc-langpack-ia-2.28-211.el8.aarch64.rpm 8700362e97cdbc28fb4245d09f6268ec5693dce85682cfb1fafb4c66d2529d9c glibc-langpack-id-2.28-211.el8.aarch64.rpm af2c3262aadd578b4b5ed4b2e1532ccddd16779623ebba6b13efb4abbfd305bd glibc-langpack-ig-2.28-211.el8.aarch64.rpm 00e51e7d3565e12428ba2fa9728e62c43edc35c17999f24e0fd13c32c6f158dd glibc-langpack-ik-2.28-211.el8.aarch64.rpm 500acdca517ca37f45268e1e785af749f99070c5b09081e76ed5ffe265c7d33c glibc-langpack-is-2.28-211.el8.aarch64.rpm 7ce4e2be2c2ee60c3eb5aedc70cdd76572b8cf5ec14f2274d20e84fadacf075d glibc-langpack-it-2.28-211.el8.aarch64.rpm b1e528a83891d0cb14afb20c6a853fed8dbc6a00b3be6d1f4ccd33ee61406502 glibc-langpack-iu-2.28-211.el8.aarch64.rpm 1ded143fb538220ada8d75a88b23719437b54a4d9bde6646e72a3708d5895342 glibc-langpack-ja-2.28-211.el8.aarch64.rpm 002087d4c5bb815a5f12ed8a8c3fdeec975ff3450e1ceb16f3042ac4fa31d7d3 glibc-langpack-ka-2.28-211.el8.aarch64.rpm 94f7d5f8989de04aacb84b3a881650891762a68b1ea5c7c224de85443d6e0bc9 glibc-langpack-kab-2.28-211.el8.aarch64.rpm 22bbe790971a1cd4bc8dce89a75956631457ecbd2bb7b3520c0abc5f80bc8e2e glibc-langpack-kk-2.28-211.el8.aarch64.rpm 3e022a529cd9fb1a5b646935a85c06444dcfa9bab6fc4c3ca00bc4141b0943c4 glibc-langpack-kl-2.28-211.el8.aarch64.rpm d26231ac217b9e6d452ed7bc72ca0a0eb7aac42aa2e9785c5dd47a3e2d44c923 glibc-langpack-km-2.28-211.el8.aarch64.rpm e19d355edb793964b3911065c6e54b10e91618deb8da077fa8ec2e93f147eea0 glibc-langpack-kn-2.28-211.el8.aarch64.rpm fb504b3a4da913d8d562826243c87d15b32d9e601283f2d6a4b6985ebc3c3db3 glibc-langpack-ko-2.28-211.el8.aarch64.rpm 8365137d4a19d246241904eeca1f04ef2cceb13f241c5ea418f3d20cfe77a94c glibc-langpack-kok-2.28-211.el8.aarch64.rpm 71864c34e4bec950efe3266726802f44dbe41a052d62a444b496904ca19cb509 glibc-langpack-ks-2.28-211.el8.aarch64.rpm cea66a7ed46cbddd5129cdf745a522c8fdf274f9450e3bac8f88a1acbc31cac1 glibc-langpack-ku-2.28-211.el8.aarch64.rpm fd46de1426eb5a88c50c56ed72bc88c6fcaba2b127853769a54109093c7651c3 glibc-langpack-kw-2.28-211.el8.aarch64.rpm e4b213af949639a8956477f92070d938961ad82dc099592ca0c9ab97ae5f7f65 glibc-langpack-ky-2.28-211.el8.aarch64.rpm 96aa595109365b37e3748038aabae9794f4f7efb4732a9cf14e78efb06ab89be glibc-langpack-lb-2.28-211.el8.aarch64.rpm 3a3b28108e42a5aa416cc7b1e195eefce725d07ca27bd47238ccc24d098554f9 glibc-langpack-lg-2.28-211.el8.aarch64.rpm 38d39e3189fedf133cbaa69c3e324422221e7677d275d6f47f9e9df48ea48db1 glibc-langpack-li-2.28-211.el8.aarch64.rpm fb50f56f1cc1c681a8c92dd4487f2bbbb157a97f2d728407c2e7cbdebd44dea4 glibc-langpack-lij-2.28-211.el8.aarch64.rpm 86217a179a57a786f361ad2374a7a69eb195028c0475b4823c65b6616bdf1298 glibc-langpack-ln-2.28-211.el8.aarch64.rpm d5dfe59c37e723f09589a0568a1aa67e46e845ab9dbf46140952b063ad2744d1 glibc-langpack-lo-2.28-211.el8.aarch64.rpm 8c59defe4e6457f6fea8b7877eff4d3007ff117450b09de6338c0345bb8dc5ee glibc-langpack-lt-2.28-211.el8.aarch64.rpm a63689fe130c62d9174474fdca5c7611d41ff38ed02e343ea24848e7c7838e4f glibc-langpack-lv-2.28-211.el8.aarch64.rpm 1caf8b7d271a91a954607b45de9a01450c22e39861c489fe3a3cf8f9396a8cc3 glibc-langpack-lzh-2.28-211.el8.aarch64.rpm 3016e9ace9bec727766243cda2977a94c30e2f13d0bb38de41f6abaa79c9e493 glibc-langpack-mag-2.28-211.el8.aarch64.rpm 9cc0a1f7a3ca6853ca875f79d9b0ba0ce95b1fed2e6311874689f9dda3cf398f glibc-langpack-mai-2.28-211.el8.aarch64.rpm 447c44c4e88031d00a259383882465930402f5e1f0f38ced1a649d65a9471eb2 glibc-langpack-mfe-2.28-211.el8.aarch64.rpm 65c49a79545761fd8f287356f0bd372dfa6f400567d38d89de8c74abd859526f glibc-langpack-mg-2.28-211.el8.aarch64.rpm 0d22b9a80a5af7c36b55966b6b935bc4b21e742cc5f9edc14a655b27316ee459 glibc-langpack-mhr-2.28-211.el8.aarch64.rpm 0b5edf7e73560c22a0649121634c3cc8e8359469926e66ad622d91414c959c53 glibc-langpack-mi-2.28-211.el8.aarch64.rpm 245c003ba111a5ce64d62870d11dde439291f95acd9c55a5bd57cf3dc6cb0a08 glibc-langpack-miq-2.28-211.el8.aarch64.rpm c978d6c5a69718e025238c41d48e2b42dc547b482e4cc3cf1cfc8ffa901e2b1b glibc-langpack-mjw-2.28-211.el8.aarch64.rpm 3a945833218c9c1a72fccf630a6ba29d4a82c103546a32cc4d2993eed0b86713 glibc-langpack-mk-2.28-211.el8.aarch64.rpm 39d92561e8db8631e324e1a544531a4c1faa295737c27d4b6e229eb830030caf glibc-langpack-ml-2.28-211.el8.aarch64.rpm 697623fc8e6a6eabe27a213f84b9c73a997d440b02dd77da65d3b70af8c1b472 glibc-langpack-mn-2.28-211.el8.aarch64.rpm fe5c5f73a79ace27fc23e0e499c94e07319b0580565ea785a5f7ca51f426374c glibc-langpack-mni-2.28-211.el8.aarch64.rpm 46a70bd7b215e2face03d672b978afa23a730ff14db3f22f7b4f07ae0e81478b glibc-langpack-mr-2.28-211.el8.aarch64.rpm 4aa743e510bc36deffc0e455e439fd870ca654080e8e5e5f8296bdb9fcc69590 glibc-langpack-ms-2.28-211.el8.aarch64.rpm 53f3b1afd131e85e91e7ab0f6f48503333249d05d0159fe7d25c0f53cf234f1c glibc-langpack-mt-2.28-211.el8.aarch64.rpm c434b0c4632380d007aa03050bdf79937ff42361495c703bda809622dfdf4f9e glibc-langpack-my-2.28-211.el8.aarch64.rpm 3c43d7698bbb312c4ef9a69970357063fe139d1cb988b188da73a7b001156206 glibc-langpack-nan-2.28-211.el8.aarch64.rpm 0af068a9612b79a6db71006cb7b5019bff34c9b629503700468aecc5b09187f8 glibc-langpack-nb-2.28-211.el8.aarch64.rpm 1be29ec5f71cd330bd2008397f9344a963cb8d5700b13787ec9d14c157a5da46 glibc-langpack-nds-2.28-211.el8.aarch64.rpm c22529dbbeff97fe382ecd8bfe4c24101644a9dfcf8cf297017e4ca499006367 glibc-langpack-ne-2.28-211.el8.aarch64.rpm 755872c0005adad08caa402a2eb3a041c4cafb27f3806ebed542fe269afc1b00 glibc-langpack-nhn-2.28-211.el8.aarch64.rpm 26beea1ea27041689a8529ad215b92ba254c4e8ef66f75b146af06d4e11fd06c glibc-langpack-niu-2.28-211.el8.aarch64.rpm 54d8fb934c7b28460ab47fb02afa6a2b45c4f22172ea9287158007ebb6369768 glibc-langpack-nl-2.28-211.el8.aarch64.rpm 4820a957d42df23b8d6c23ef57b451570e3adc8db97a342cd7ed54e2fd2b433f glibc-langpack-nn-2.28-211.el8.aarch64.rpm 8d3294879d3c2d96036dad763b2b3af6362616ac6f806e8790eef5e3d87351bb glibc-langpack-nr-2.28-211.el8.aarch64.rpm 46dbda9420861f969e1d419894d84ba700efa2e1a7eadf89db371dcd56127414 glibc-langpack-nso-2.28-211.el8.aarch64.rpm ca88ebaf2b152858482d4bedc3dfb7d14fdb5e9aa217380da779dc6e463b5c4b glibc-langpack-oc-2.28-211.el8.aarch64.rpm 133386bffa21001b8015128b01a7b27b60b669ccf10fdc5c207b264c268fbeca glibc-langpack-om-2.28-211.el8.aarch64.rpm f5e2445f7c6285d59bb216b41bc6b199dbbcf5753b3c5ce2716ca86015f5b553 glibc-langpack-or-2.28-211.el8.aarch64.rpm 6f7ac50390780012ebc7e8317831879528d2b2122c66d08ce0cc138f63e2cdd0 glibc-langpack-os-2.28-211.el8.aarch64.rpm 1f0e520a461082a7f817b82ddd951b5bca7571ea40f36e67560625587eab9d66 glibc-langpack-pa-2.28-211.el8.aarch64.rpm 09405e2f7aabb39c7bda6bdf9417b04fd9367c64f5cbda0ceb9b5c163c9f0c98 glibc-langpack-pap-2.28-211.el8.aarch64.rpm 5b201907a0e5a39b89b14f2010c120470c61d35a3e938ebaefc0fdeebfc70ddd glibc-langpack-pl-2.28-211.el8.aarch64.rpm 22c79b6a6a110a9c3bd9d74d508ba70394ca99be0b3afd495ef5f41da87dd291 glibc-langpack-ps-2.28-211.el8.aarch64.rpm d3f2226c5a75e66a0333b9dffa749748e082720c5122f7195ad2680de150c9d0 glibc-langpack-pt-2.28-211.el8.aarch64.rpm c617e9d20ceb45d68dd69c35460d472ea695632693c3a7e9b53e3b15af9c7832 glibc-langpack-quz-2.28-211.el8.aarch64.rpm d2d283fc20dce2e295e3d0e4dcdce442e81dc3d3f6ded6ee8dd2947444ae4685 glibc-langpack-raj-2.28-211.el8.aarch64.rpm 069f7828ba871d1b99617e25d89c61d20fc29b7117cc594708ce2d3638f6aa93 glibc-langpack-ro-2.28-211.el8.aarch64.rpm db7f2f97100e6a0765b0b9c5186a5a9bd1af18de2861bb3ebc8115d3f0252d2e glibc-langpack-ru-2.28-211.el8.aarch64.rpm 4dbcf18af09fd2981ebe9c3602b953ea345802f332c115899dcd7c934c3e5a2b glibc-langpack-rw-2.28-211.el8.aarch64.rpm 8e7658083c4d38a0c80a319ecbce006b19ed9a120e52b4391c5a0695c3f4d81b glibc-langpack-sa-2.28-211.el8.aarch64.rpm b51605d4589bb3a123e5494ae1dcca93ceea130c4e0121a15b0482fa1aec62ef glibc-langpack-sah-2.28-211.el8.aarch64.rpm ff1e5bf142f0814c07180cefc99dace86e58a0d07800b4455dd1a55d14e983c9 glibc-langpack-sat-2.28-211.el8.aarch64.rpm cc38f9c4d0a4552ceb863d2a50c83bfaba4ef25c1ebe42a16e605fd74681b385 glibc-langpack-sc-2.28-211.el8.aarch64.rpm 9fa11960a9916ee9e1cae6bde0d76de0bd7e400e92f9cda6740129a23c539892 glibc-langpack-sd-2.28-211.el8.aarch64.rpm 6f5676d6b2d5e028ac3298284726959ba736fe9eba94dfd4ac6124faf1ddc028 glibc-langpack-se-2.28-211.el8.aarch64.rpm d688e69fc79fa49b3d0b1c3d8c4f2471ef245de0bb1a49e886ff12d3765361b6 glibc-langpack-sgs-2.28-211.el8.aarch64.rpm 783395e137e3b01322c2d33d8d066cf7704bbd9c5d32703a1bda35d68564037e glibc-langpack-shn-2.28-211.el8.aarch64.rpm 46f62ce9cf06e09b644bc5bfaf32ef19ae9784514a15e2b50d0570a520010c40 glibc-langpack-shs-2.28-211.el8.aarch64.rpm 56ef08d3616361effffb1e607f45ed4b00c518be8777d5bb108184c17715e2e1 glibc-langpack-si-2.28-211.el8.aarch64.rpm 64d811ee9e20fa53ecbf1775885d03cd59124e33923f4c2b8ccff70052cbeb92 glibc-langpack-sid-2.28-211.el8.aarch64.rpm 54c94743d7520a813cda6d91cb31d493844d45432d260628837e731493d24e02 glibc-langpack-sk-2.28-211.el8.aarch64.rpm 4a6fa32e9ada3392fece068cf9887d9136c0a0d2165111ae5661d85cc16b2ff2 glibc-langpack-sl-2.28-211.el8.aarch64.rpm dc20af3c7f7b67c5b6cce010503178b87d4f2e036c140c64e7d2e85cad44ada4 glibc-langpack-sm-2.28-211.el8.aarch64.rpm dd2702296213ab2aa4633e09ef7189de72fb10c94c630c2841b6456c08a2033c glibc-langpack-so-2.28-211.el8.aarch64.rpm a49583fd86db2bd77469e0899581a144382cff940072d818040dbe871ee180aa glibc-langpack-sq-2.28-211.el8.aarch64.rpm 9ed363792c810b659631c6861de46c6f38884e824c95588c8b15528230c7d030 glibc-langpack-sr-2.28-211.el8.aarch64.rpm 5b91e27fc2472f7117e8212084247216bff71fb860d11c5276188efc451f95c2 glibc-langpack-ss-2.28-211.el8.aarch64.rpm a33599e86fee1e1a47a809b5792ceb823927af3c668255ac1819dd7dae419229 glibc-langpack-st-2.28-211.el8.aarch64.rpm eeaa1ea6a94f40c71b5b80444fbaaf80ed1f5b5dbfd4534d5f1d67a688af61fc glibc-langpack-sv-2.28-211.el8.aarch64.rpm e1c2a61b081036d0401a800346e0081c5fe4829a7ffdc67f12b998bfb77c190b glibc-langpack-sw-2.28-211.el8.aarch64.rpm 7d7080ad8f5003ffd7fa3cdc2c58a2eb9805cfb14d49b9e0d0c127ec80cec3a3 glibc-langpack-szl-2.28-211.el8.aarch64.rpm c1bdcdd7a76a95d1cfef0cda8adda636700dfdaa22e0a780b81e1667f2207028 glibc-langpack-ta-2.28-211.el8.aarch64.rpm 9f5fcd83d10300dde4f043580731299eb3e843a3098d2ff4bfa814da75e4d78c glibc-langpack-tcy-2.28-211.el8.aarch64.rpm f79757be971a2f0acdde597b6b47554978fb8b5a7b02422079c9cd54a6d2199b glibc-langpack-te-2.28-211.el8.aarch64.rpm 3ef99b81ccd351bd9470ec6d72efd653fe6f3c01ebd3baa5c84ca214bf0ab14e glibc-langpack-tg-2.28-211.el8.aarch64.rpm b15bfb692ca8b39e0f3b86c6283ce19bd80e4651bf4abef680d8acc805f7e834 glibc-langpack-th-2.28-211.el8.aarch64.rpm 765759365d719b31dc43065e75c478c341c4c39894c7bf4c516860858d03dded glibc-langpack-the-2.28-211.el8.aarch64.rpm 4048db33557a8ac9c46150b6be7f530f56a74a76bef3b3160dedbb775af272ee glibc-langpack-ti-2.28-211.el8.aarch64.rpm 135680885e738fc1f69cbf9d3f30e740b3361ecb433b81bd1a343e7c2907d79b glibc-langpack-tig-2.28-211.el8.aarch64.rpm f3ac28f86613bf68a2e6fb1dc3467ef0d72b2759bb79f69b61c9a47be5a5cf24 glibc-langpack-tk-2.28-211.el8.aarch64.rpm c3a1aa309c80b924eb31d24edbb5a70020fd4acf66b0203ce57a2481ba064590 glibc-langpack-tl-2.28-211.el8.aarch64.rpm ab7dcc9be5d14bc90ecefca9dbc7792ce4aee7c12e252338fdf6328a9fe25c08 glibc-langpack-tn-2.28-211.el8.aarch64.rpm be6f2849f22b2c1c21bb933dbf50aa82c64cd8164c53fa9e9566327ed7b4ca6b glibc-langpack-to-2.28-211.el8.aarch64.rpm 91b462f7e8fa267ab98d5006327244f1ce3af8481d69ff2f81eee7b2b88532ab glibc-langpack-tpi-2.28-211.el8.aarch64.rpm d478a6dbac895c6f27aa9e04e84000eebd8bd4d58bedd6deea3aa8126ecedfce glibc-langpack-tr-2.28-211.el8.aarch64.rpm 288e1df570bf908a5aad9f750fbb2256a2766057b8fa758e382550acde37961c glibc-langpack-ts-2.28-211.el8.aarch64.rpm bb8f1f687eae71726606e37e43e5bf9adce0cfab7d010362ef05a831dc61a015 glibc-langpack-tt-2.28-211.el8.aarch64.rpm 1e7ff9f2d3d59faed0e18d3ac8f8943ac49efbf679cb3ad93ecd5bf3d6412483 glibc-langpack-ug-2.28-211.el8.aarch64.rpm d34153b73a45ee8fbaf547992d7b8cc9899a3ac202509c9ae67a298f11c270af glibc-langpack-uk-2.28-211.el8.aarch64.rpm d3008b5e2c6ecc8fb4cf5ceb0f62729af77a4976bff2225fe575f05f38f7fc4a glibc-langpack-unm-2.28-211.el8.aarch64.rpm 90db67f420ea17686f462adb9baeaa3fa04f11bd50b84822b0c60f4baa3ba1b0 glibc-langpack-ur-2.28-211.el8.aarch64.rpm 147f9c17b7ad2364bcd17264933cc0ed8e3562b479a65f8e4b7eba85f9321d18 glibc-langpack-uz-2.28-211.el8.aarch64.rpm 730807bf7455a7adb1f4780b91881e7c9994ab8318d8404d34209ba29c15a988 glibc-langpack-ve-2.28-211.el8.aarch64.rpm e3c5c9c5734032818bf890d1f099ba2f91ca015693a6c542d4542656a10a6b22 glibc-langpack-vi-2.28-211.el8.aarch64.rpm 6a2b5b1ef2d07ccc77eadea4a54d602cdfc5c5aa11913215cc9ddb063fc55215 glibc-langpack-wa-2.28-211.el8.aarch64.rpm 4140524bdb6ca60a6d3ef67a555bcba6f1a0df8609fbfd0ca6dbf5624c57b4f5 glibc-langpack-wae-2.28-211.el8.aarch64.rpm cc4f23815a674070750768b8841cef736668fe34b9500cc112e1575c5e1046b1 glibc-langpack-wal-2.28-211.el8.aarch64.rpm 6bc4fbf3b5270cf187bb63fb6365d92cdb7fa2606c9c9c26ce08d8e29e147e44 glibc-langpack-wo-2.28-211.el8.aarch64.rpm 5784bb1cafb394e663ad1a3eabc7e48a866e427e5a987521d7694c4dbb821485 glibc-langpack-xh-2.28-211.el8.aarch64.rpm bfc8547f5081e66ca7bf831390a760b7c90e8e83d836ffcae8174585e1bb644d glibc-langpack-yi-2.28-211.el8.aarch64.rpm 1dd7d83a43f0cbbd01f9cd51d298b08d6638dbad650f07fd1b5825c1608a91f5 glibc-langpack-yo-2.28-211.el8.aarch64.rpm 737610ac52682442cd2812c9802671779200749d9112bf15212e5e99362cdc3e glibc-langpack-yue-2.28-211.el8.aarch64.rpm 5fcbc8b31f06603fcbea5ca2f043178dbc5b7b6f9cb995aaf83bb6300144f105 glibc-langpack-yuw-2.28-211.el8.aarch64.rpm e18e1092c2ea8d051a69cb147aa02f92da3164a9658209f6b27e05eeda9394f2 glibc-langpack-zh-2.28-211.el8.aarch64.rpm 2492c3abdc0dd71403c9f05c8b70ddc47ad5c244e37b6b183ffa7c00108f4b44 glibc-langpack-zu-2.28-211.el8.aarch64.rpm ebab31a9e3931335db4bf7d9f9d97220e42b6621922ba64be2a353d8e868356f glibc-locale-source-2.28-211.el8.aarch64.rpm 3645a65b67f840c5c2a5cd2a2ffdc7901563f7258857bf59876f35b1f8d462d0 glibc-minimal-langpack-2.28-211.el8.aarch64.rpm cf8eb5a34bb051c848d4cbbb64ead25704f852afbead51356e073d6a2e7a9e1b libnsl-2.28-211.el8.aarch64.rpm 5964a087bacd6c3776abb95e61202a654865b6e696ace907ef6d01aec7e48279 nscd-2.28-211.el8.aarch64.rpm 42c9d335cd2f70eca720ef6ec760a737ff0e67dedd51d311b64b409d39e8f4a7 nss_db-2.28-211.el8.aarch64.rpm f687dfd2703126603149e940b3af8ca2a45779a1b1cf762d80b94442700fbf47 RLBA-2022:7686 iputils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iputils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms iputils-20180629-10.el8.aarch64.rpm d381eb6db9e627bfd6d37f7fcabc0c620eaf1dd0c936cd6d4ea98ead750c5dcb iputils-ninfod-20180629-10.el8.aarch64.rpm 07af18224c186fd68ae0bad54f1f65ad64369a57926931b065d878380e36f8a9 RLBA-2022:7687 procps-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms procps-ng-3.3.15-9.el8.aarch64.rpm 200c964de4dc6cd9a526c14729e22a25bcc055012fb660ae67185a0c4244723c procps-ng-i18n-3.3.15-9.el8.noarch.rpm df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f procps-ng-i18n-3.3.15-9.el8.noarch.rpm df5d21d0a9941e6b283de24c4daefe6ec93e8ceab3e7acce43f3aa91546f6c0f RLBA-2022:7688 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libasan-8.5.0-15.el8.aarch64.rpm aff6bc439fc40008fd9488cafb906584f90ff0615b28e41e2d10b3cca12296e1 libatomic-8.5.0-15.el8.aarch64.rpm 1be6a0597d1e5c68c8eb1add30e17fa3d036a10c972786b55e27b00d87dac4ff libatomic-static-8.5.0-15.el8.aarch64.rpm b4cbf072e2a17994df0c1ce01f43e77acd9609a59a4c9974ba53ae1d22e24f42 libgcc-8.5.0-15.el8.aarch64.rpm 6ac40a40fbc847c654b9b696e6d8a12ed7bb3c8b1d1c31372588172fba17cbb9 libgfortran-8.5.0-15.el8.aarch64.rpm f14c84d41c34bd3811460fcfb538f1bbc80ef82bdf8099dce78e149d26ae4140 libgomp-8.5.0-15.el8.aarch64.rpm a305c2fc725fcf9f617d98b9f1923d68ded5faa8508781bc11b101628a0af3b1 libitm-8.5.0-15.el8.aarch64.rpm 8ee341e72d12c03949bc0128c98356bcbe6d92a36af6f8ccab32d6dc6cb91fc1 liblsan-8.5.0-15.el8.aarch64.rpm 342d0f06eedb1706536f121f3f74e02ace6e33ea28f18ce28fa6cbdb8d5044fa libstdc++-8.5.0-15.el8.aarch64.rpm 9bd55215b064014b258afe2662729a77ebddcac87e687a428f6a1a72511ac25a libtsan-8.5.0-15.el8.aarch64.rpm 93b6ae5c8d6b631753155cbbb0cc1535c712640e56a84dfff5278a5ad05fd069 libubsan-8.5.0-15.el8.aarch64.rpm f4006e23f4536eff861c1a4b9456250e6f90479727b7b30dddc92adbd6b69492 RLBA-2022:7691 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms selinux-policy-3.14.3-108.el8.noarch.rpm c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde selinux-policy-3.14.3-108.el8.noarch.rpm c8034fbd86e19f9162ab575001f2ad66d5dbc900e97fa9a95ae3e70aec8e7dde selinux-policy-devel-3.14.3-108.el8.noarch.rpm cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465 selinux-policy-devel-3.14.3-108.el8.noarch.rpm cd4a2d1bdf0dd76ab84f0b5d2e5fc51361e2aaa25817bf04f96d968324a47465 selinux-policy-doc-3.14.3-108.el8.noarch.rpm df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a selinux-policy-doc-3.14.3-108.el8.noarch.rpm df6debc6a1a0e39d5907151d541899d4fbf35a6ae6689f94404767cd67daa65a selinux-policy-minimum-3.14.3-108.el8.noarch.rpm 09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1 selinux-policy-minimum-3.14.3-108.el8.noarch.rpm 09f25bf811f906c626041136acfb157ccad7234b66553a191616bfd087c32eb1 selinux-policy-mls-3.14.3-108.el8.noarch.rpm 5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e selinux-policy-mls-3.14.3-108.el8.noarch.rpm 5f9f7e496c7efeb6bd3507ded0921c4187f3a954d1afc8f649f46d293abafd5e selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55 selinux-policy-sandbox-3.14.3-108.el8.noarch.rpm d3b78e4cd13f6102348a39898910ca247f6963937e114f21d5041ee96e8bac55 selinux-policy-targeted-3.14.3-108.el8.noarch.rpm f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab selinux-policy-targeted-3.14.3-108.el8.noarch.rpm f7d7192718b7ac1997ef75f6d3b4fbc0e4e931ede22df6b538ca0719dcf7e5ab RLSA-2022:7692 Moderate: xmlrpc-c security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms xmlrpc-c-1.51.0-8.el8.aarch64.rpm 341bc55b17daf302817098b8153e3f06ddfdd2a1bcd28419ce42470d583f1b37 xmlrpc-c-client-1.51.0-8.el8.aarch64.rpm c833ece05ba9350a70ecf2fb0e88bcab410b8af9f9e390d4d84fb3aa798a7fa2 RLBA-2022:7693 binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms binutils-2.30-117.el8.aarch64.rpm 52ca3e2c4d5746334a06d58fb1433dc8db28b326697c4bb52d2dfee75da9b239 RLBA-2022:7695 virt-what bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-what. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms virt-what-1.25-1.el8.aarch64.rpm 52f657e37dca6203008e30bec18798a73741481cc11b5be8e4b37b71391b0803 RLBA-2022:7694 tuna bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms tuna-0.18-1.el8.noarch.rpm 58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623 tuna-0.18-1.el8.noarch.rpm 58812fb015dcd75c62973e25433bd7333239d1239cabab22e2d022d60e268623 RLBA-2022:7696 krb5 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms krb5-devel-1.18.2-21.el8.aarch64.rpm f93b2288f852bf6035768f62234daa4d9fdb53b7c7636b1a3220860e00209c58 krb5-libs-1.18.2-21.el8.aarch64.rpm 7784c5b5fe04d4814824d60f0d8704a428bd3a5bcded30900f01586e99d9d40c krb5-pkinit-1.18.2-21.el8.aarch64.rpm 7485af41b8f7ae01c567c2d2ef72e84ef27a373a0cfa43ef0e34ad6d037855b5 krb5-server-1.18.2-21.el8.aarch64.rpm 7801e71174c21c2bbc3764e547b3dd871046288d62ea912ce947cc0d936c2a1f krb5-server-ldap-1.18.2-21.el8.aarch64.rpm bf86dbed3a99885d35906d7c4a46bd558c8b1bdf4edd17af75d2b3e082293e0d krb5-workstation-1.18.2-21.el8.aarch64.rpm 66f908dcece1a942d7b58e9ab75d8a3c454bc922c32dbc98798eeddec4f28e21 libkadm5-1.18.2-21.el8.aarch64.rpm 854efe4e7029c52886ca198de6f90ebbf18ba7c63b0eb23cfc154e31f35c0395 RLBA-2022:7697 python-dns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms python3-dns-1.15.0-11.el8.noarch.rpm edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e python3-dns-1.15.0-11.el8.noarch.rpm edf964bdcc51d9bed6d9652a1e3f86add29616c7d5ae6e5be2667f7bdb82145e RLBA-2022:7698 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms ctdb-4.16.4-2.el8.aarch64.rpm 373c6f7564c54e10cfbc059906be9378eaf4e1aed54a90062d913649053b5262 libsmbclient-4.16.4-2.el8.aarch64.rpm b8cc880c2b00855c9d7409e64f0fc483d6597217a209424c56f2a18a18e843fc libwbclient-4.16.4-2.el8.aarch64.rpm 2d583b34b4dd1c316138aadd710fa89e70e878c18b7dc93ddf380d9c7f06067d python3-samba-4.16.4-2.el8.aarch64.rpm 371d05313653e66148f74cc968f79e2fc21bcfa91299c5aad0dcdfd9703dfe28 python3-samba-test-4.16.4-2.el8.aarch64.rpm 1aa43dae83437562f6a18ed6b1940ebf31f56c231caa3bad14dcc6ca0d6c5f51 samba-4.16.4-2.el8.aarch64.rpm 4211992158e00809236b4f8f36f4211032465568f32eddc6af3839f1f41e601f samba-client-4.16.4-2.el8.aarch64.rpm 95e9b0734e4c53a8dee491063d28cfaca0e83c5ab437a61f39bdcb2085bae03d samba-client-libs-4.16.4-2.el8.aarch64.rpm 893c71be87e9f2857af897a881d6675f8b06d40570a7b95e728a2314d13db0a7 samba-common-4.16.4-2.el8.noarch.rpm 64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f samba-common-4.16.4-2.el8.noarch.rpm 64ca28af1e9830cd10c7b6f5e971fbed4f5b32f49e10a5a6b35c49b39149566f samba-common-libs-4.16.4-2.el8.aarch64.rpm 92351ddfb6a48d3972dc15a11d496f759ce431f178e5de242fc8f8280c0f3933 samba-common-tools-4.16.4-2.el8.aarch64.rpm 9b2a1bc041dd24aa4d3717cf42fb7e4400d19772bbaf3d32bf1881b490cd7ddd samba-krb5-printing-4.16.4-2.el8.aarch64.rpm d5448647be58c0c6ce2ce5b010e8287c3954ccbf13513d870b36671157c97a14 samba-libs-4.16.4-2.el8.aarch64.rpm e4b5ad42bd28b70a0c53a60fd595b09c0e10a974ddcd8e068b06df56dbef89b9 samba-pidl-4.16.4-2.el8.noarch.rpm 4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee samba-pidl-4.16.4-2.el8.noarch.rpm 4cc8b11a0da7253d955db6718ecb3a2e135c35ee7252f097fa2086390514eeee samba-test-4.16.4-2.el8.aarch64.rpm 849723c0d3327ce435df22d0a13a07067b8f29e6258ed8b39735f49b02445540 samba-test-libs-4.16.4-2.el8.aarch64.rpm 1d6ab4f620d703b4d6a858f7dd473b26fdabb017038972a619226ac367378c24 samba-winbind-4.16.4-2.el8.aarch64.rpm c357b10b9ee86dfa841c50b1470f2953d048b714cd40f7edbce33c691ba40222 samba-winbind-clients-4.16.4-2.el8.aarch64.rpm 450ca76b3227a6130b3c97d7750784ea73246326672bf6e94915b640054867ea samba-winbind-krb5-locator-4.16.4-2.el8.aarch64.rpm 3505e4846977d7ae2af17681f4306df3c1a89792bcb48ee4a7aebd076f266867 samba-winbind-modules-4.16.4-2.el8.aarch64.rpm 6b73f84d5c9193f21fd64a591dffefbbfae34946fd1ee9092aa47b6a240879ac RLSA-2022:7700 Moderate: gdisk security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdisk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdisk packages provide the gdisk partitioning utility for GUID Partition Table (GPT) disks. The utility features a command-line interface similar to fdisk, direct manipulation of partition table structures, recovery tools to deal with corrupt partition tables, and the ability to convert Master Boot Record (MBR) disks to the GPT format. Security Fix(es): * gdisk: possible out-of-bounds-write in LoadPartitionTable of gpt.cc (CVE-2020-0256) * gdisk: possible out-of-bounds-write in ReadLogicalParts of basicmbr.cc (CVE-2021-0308) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms gdisk-1.0.3-11.el8.aarch64.rpm 31de6f698b4a43d5dd1895414cacaa2fa4f1b656c6d4c7d70abc074dfcc7fa18 RLBA-2022:7701 at bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for at. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms at-3.1.20-12.el8.aarch64.rpm 4183db36570c37d3471a52d9c5b8042fbd86b9538e7d00894d0c2d11cce991a0 RLBA-2022:7702 mokutil bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms mokutil-0.3.0-12.el8.aarch64.rpm 8013721b4692a704a2bcb678d297ea519108efe028d12d1d6786e2daa7f8bfad RLBA-2022:7703 python-slip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-slip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms python3-slip-0.6.4-13.el8.noarch.rpm 969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c python3-slip-0.6.4-13.el8.noarch.rpm 969e55a97a50fc39da7bfdd3ef25fe8f31c8485db610e2cbf15586f8e956517c python3-slip-dbus-0.6.4-13.el8.noarch.rpm 42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6 python3-slip-dbus-0.6.4-13.el8.noarch.rpm 42102433519b624f384a59b9eb824ac7e37d917ee08dda1c3f4c454be89e06d6 RLBA-2022:7705 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.24-6.el8.aarch64.rpm 6e43ec02a6dbbcbf12563d737eba2ac8b5c74a63cebdba34f9efcd4dd8e276c9 RLBA-2022:7706 which bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for which. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms which-2.21-18.el8.aarch64.rpm 41054bc8f83b774d48e4f53822cb25ff1d96fc2d612d6ea3a83222c8efb3bf10 RLBA-2022:7708 expat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms expat-2.2.5-10.el8.aarch64.rpm 1a4d6629d01b30ab165269869db246fdcf821b787af9d19c8f72b984223d907b expat-devel-2.2.5-10.el8.aarch64.rpm aace88d2b38ac8563b4110c94a650a1ac1c980e4f3c9feaee96fd592dd3e0cfd RLBA-2022:7707 nftables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms nftables-0.9.3-26.el8.aarch64.rpm 02a4f8f9f2cb39a6c5af5717c54489f217c19cc142006f53bf7521df779938fe python3-nftables-0.9.3-26.el8.aarch64.rpm 8e6dd7444905087bcd502df09affcce2b00351d5a14745c86ab6a2bbdcc6cccd RLBA-2022:7710 rng-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms rng-tools-6.15-1.el8.aarch64.rpm 5043f5c2ae5183e085bb85e66dd1ce5b8c08a9b8ff2d37dece03a51884eb79a7 RLBA-2022:7711 libdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libdnf-0.63.0-11.1.el8.aarch64.rpm a3378a0d62d8207115e8d95cd14e8331b4f0b00ee8e523d30538ef3fca857e57 python3-hawkey-0.63.0-11.1.el8.aarch64.rpm 0208293953fe904d5aa56e64c3eab83d7ca1de1b7211f380f43fc9109bcf8a13 python3-libdnf-0.63.0-11.1.el8.aarch64.rpm 8ed15a58f64f07b4128affac69a06c2d2bc02c48a3f075cc601ecbe68d6dba94 RLBA-2022:7712 dnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms dnf-4.7.0-11.el8.noarch.rpm 948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8 dnf-4.7.0-11.el8.noarch.rpm 948fff4b3cea109242e6d308e3256bbdcd26f214a044898075f7b8f77a0b80a8 dnf-automatic-4.7.0-11.el8.noarch.rpm 2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603 dnf-automatic-4.7.0-11.el8.noarch.rpm 2ff731967901546be305af1b8d7452e53e3bb8660c6d00cbf939060977415603 dnf-data-4.7.0-11.el8.noarch.rpm 48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2 dnf-data-4.7.0-11.el8.noarch.rpm 48782a17c1a4f7c89035d7eea46f681fce219210e17e727a0f816c0913fe32c2 python3-dnf-4.7.0-11.el8.noarch.rpm 075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6 python3-dnf-4.7.0-11.el8.noarch.rpm 075e1145f2523acd593dc9133ad5d094efa3bf7d76816756b2966a77ee4203a6 yum-4.7.0-11.el8.noarch.rpm 58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f yum-4.7.0-11.el8.noarch.rpm 58f20b0790242c6216c79ee52c72e4edbe869b66aa14e2d8364c41b22aa2b50f RLBA-2022:7713 libsolv bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libsolv-0.7.20-3.el8.aarch64.rpm f3b25b4127dbb41a459dda58bfcb24fee8f68599dfbf7d77164d709c68976d7a python3-solv-0.7.20-3.el8.aarch64.rpm 2051e9b66bb68249b03a4875d4b99ab944b14ce6e2d7afe8844532cce11eb09f RLBA-2022:7714 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms device-mapper-multipath-0.8.4-28.el8.aarch64.rpm 9d799ca1bef26086197d96e92b67718b96a5a0a3c2c01297cbcac1698be45f7d device-mapper-multipath-libs-0.8.4-28.el8.aarch64.rpm a5911f7f5d16abb547486d90972e5bb8f95af224e8e57d1e32dd1eb45d23c6d6 kpartx-0.8.4-28.el8.aarch64.rpm 0d6cc830d05f15e12a01e03dd012a9a864d7153d241936d35c2e3318fadfd78d libdmmp-0.8.4-28.el8.aarch64.rpm 3e64bd0ecc47d3175673c399752efdc867cfbeafbaddbaf1b64ddac4b7f02ffb RLSA-2022:7715 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Incorrect server side include parsing can lead to XSS (CVE-2016-3709) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libxml2-2.9.7-15.el8.aarch64.rpm 43e683ddabc66c02bbd94f3919959e282cc9cd7c046e018ecba1155f09f66888 python3-libxml2-2.9.7-15.el8.aarch64.rpm c5232872ace6a15cb0affec511f7becda665623e5a94f6aeb836052a5c309dd3 RLBA-2022:7716 cups bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms cups-libs-2.2.6-50.el8.aarch64.rpm c75c73fe017051b6475e875dc68aacf1d7e84a1429d62f37b20dd0a1dd7cd372 RLBA-2022:7717 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms elfutils-0.187-4.el8.aarch64.rpm b197ff9345104888bd020a0eab56549dfab4d69a32a3b934dd4adc7f5fd096bd elfutils-debuginfod-0.187-4.el8.aarch64.rpm b9a8ac1745e2d9ccd4c8fe82bdfd40286509caea69a836861d33d8e5aef34e12 elfutils-debuginfod-client-0.187-4.el8.aarch64.rpm 43663f8d52f375180446bd24d1fef9a2e91be00d707cd86876af5206631d2066 elfutils-debuginfod-client-devel-0.187-4.el8.aarch64.rpm 7b5f77e658bc0ed0ecba9ca45eb071a2be74bd894b99bd3bb229787e80da8a93 elfutils-default-yama-scope-0.187-4.el8.noarch.rpm b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73 elfutils-default-yama-scope-0.187-4.el8.noarch.rpm b01511cf066f23b46d7e0dbf923e653635f3265b7619d30414a5f1ca25ad6e73 elfutils-devel-0.187-4.el8.aarch64.rpm 65e951b75e3c5f0b9d939e8b9557869b23883e80b6ea0915ef11c21168d0f636 elfutils-libelf-0.187-4.el8.aarch64.rpm 3f6c94500494649d6891baffa568e269d3c4768cd43fa536b5ad1952d2df5718 elfutils-libelf-devel-0.187-4.el8.aarch64.rpm fb177dc94282b6d51d0327aee1a6465cf3eea92ee26f8657ffa485561a1596eb elfutils-libs-0.187-4.el8.aarch64.rpm 3a89cf77b460201241ceea83cfbecf8d42af13c7e7950ff3d70b17f8e39273c6 RLBA-2022:7718 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms cockpit-276.1-1.el8.aarch64.rpm 31c45064844599834958ae7fb10560da088406eaea97321e26377faf55af8cf1 cockpit-bridge-276.1-1.el8.aarch64.rpm d74dc791c3d29ea3906126a5629d53fef5c8d79c1325c56e2ea2687b36d00f6b cockpit-doc-276.1-1.el8.noarch.rpm 891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787 cockpit-doc-276.1-1.el8.noarch.rpm 891dcb760e2e7df7ff43831e2874fb96dcb15aaa16d03baafe7a2f18d06c9787 cockpit-system-276.1-1.el8.noarch.rpm e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537 cockpit-system-276.1-1.el8.noarch.rpm e1ecbc2e62b5aca745ed0929da469ae80504d3baecee1fb61a5150cad1ce4537 cockpit-ws-276.1-1.el8.aarch64.rpm 8f7710f75a5c38d5287e4d5d431252b04c3268f650c7a5e52c2df236205dadd1 RLEA-2022:7719 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.32-1.el8.aarch64.rpm efee581fa7518cf70e09a5d2fe8c0f461f459d15622cb58dd3843e6a9d1fe64a python3-cloud-what-1.28.32-1.el8.aarch64.rpm 0155dfb1d4c6ae08aa6fd6b9168b87a5b7716a12ce76a6ebcde703303e7ad1f5 python3-subscription-manager-rhsm-1.28.32-1.el8.aarch64.rpm db1e4daa11011f399d2589ebdde213187b501171906aa65dea9c8d94004b20d4 python3-syspurpose-1.28.32-1.el8.aarch64.rpm cf0f74058abbe15733bafc24b4c37c4fc647745f9d6bb5a8def301440fdbb032 rhsm-icons-1.28.32-1.el8.noarch.rpm f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a rhsm-icons-1.28.32-1.el8.noarch.rpm f644f44033ecb86e842fd031abc77e9749f3fe82ec978af9b936003fa63b8d3a subscription-manager-1.28.32-1.el8.aarch64.rpm b172f7e474009856babf32ab682adb98ea937edb9666d8cd1cc9f35b10bdc148 subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm 0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63 subscription-manager-cockpit-1.28.32-1.el8.noarch.rpm 0d02c1271b223de8b704ff7dd8015a0f69d2be13709a4c3033ac7a6ec1b8ba63 subscription-manager-plugin-ostree-1.28.32-1.el8.aarch64.rpm 2f70504faa9272eb9ae31b456c6fc60da7c6811417656b7053ceecca73c928cf subscription-manager-rhsm-certificates-1.28.32-1.el8.aarch64.rpm 5476d2b0b26b9e824e7c06a1aed6c38037a37b1d117ebdf84495f766f6aba36c RLBA-2022:7721 cronie bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cronie. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms cronie-1.5.2-8.el8.aarch64.rpm 1028a30e4ffc27675dc090a63843beb8d2a4e7c35dcdf92eb5c35c05cede283b cronie-anacron-1.5.2-8.el8.aarch64.rpm 46c894d2c6686d91e7cb865b5996e040aa8b80ac0961ac0ca379a5b70bc216fd cronie-noanacron-1.5.2-8.el8.aarch64.rpm 03d935a9c85b8452bc7576771b2c73dd703c083956d2d1f7f8b831509436c6ed RLSA-2022:7720 Moderate: e2fsprogs security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for e2fsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The e2fsprogs packages provide a number of utilities for creating, checking, modifying, and correcting the ext2, ext3, and ext4 file systems. Security Fix(es): * e2fsprogs: out-of-bounds read/write via crafted filesystem (CVE-2022-1304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms e2fsprogs-1.45.6-5.el8.aarch64.rpm f52e817441ae687a686aacc76de7ae07736cd90bafd63f8b125e519244311ca3 e2fsprogs-devel-1.45.6-5.el8.aarch64.rpm f2570247b5cd3bc7a2b0ca550b457f43bc3fbae6e96ef73f8c9a933e42ac6d25 e2fsprogs-libs-1.45.6-5.el8.aarch64.rpm 322d25761e7dbd03de6b0aa38fa35670956664cddc9da2a3708a525500d24707 libcom_err-1.45.6-5.el8.aarch64.rpm 04345d892920580a6537dbf7fa6b250d6fa99d2fd88c7c968dee035b8357d9fb libcom_err-devel-1.45.6-5.el8.aarch64.rpm ae502367f259788a82ba041fd11dc76323618afd245a27f0d61ae61b549c72a8 libss-1.45.6-5.el8.aarch64.rpm 1685db6916a9f177c293384543cc7b60d3633c9bbb44a709edff0b4de3d74145 RLBA-2022:7722 libcap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libcap-2.48-4.el8.aarch64.rpm e0f4d5d562d39babf5d84be3f45160fc074dc7b03b9c7747d664b1ec5277a196 libcap-devel-2.48-4.el8.aarch64.rpm 8f01cfbddb47ee443fc58a2704513ad220e0b20424cde2c9f4df964c0ac1f9d7 RLBA-2022:7723 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms pam-1.3.1-22.el8.aarch64.rpm c0d4909fe50c180104be117994926fb59ccd8c70a64b64fe1b007ea89d021b8f pam-devel-1.3.1-22.el8.aarch64.rpm bba09141115a9737df62c4cb9821160d135d003aa1eae2b4cedc9a3aee90aefb RLBA-2022:7724 zlib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms zlib-1.2.11-20.el8.aarch64.rpm e125c1fad08781fa7fc040e1226812b5db49d4d75199fe937e1dca26a48a2864 zlib-devel-1.2.11-20.el8.aarch64.rpm 9b7d238d0291e7d6eeae4addc992f789aafd1358d06a19b277e9bef8a50977fd RLBA-2022:7725 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms dracut-049-209.git20220815.el8.aarch64.rpm 7a3c09062109db831898b3fc0ff522384bfab279762a1add054a06043eadca3e dracut-caps-049-209.git20220815.el8.aarch64.rpm 8596dea8ff9ba138189917aa339979012583b6f3f385cafdbd356bd57c1385a2 dracut-config-generic-049-209.git20220815.el8.aarch64.rpm 69d796f04adb3aad56b3cf502658d5d0e948b44717cf7d6aa93830f8e2b434ed dracut-config-rescue-049-209.git20220815.el8.aarch64.rpm 87aaa19d8cd163a5dc230cc6eeb0091db7bbe780bb68c7a59f89a0509fb20e4f dracut-live-049-209.git20220815.el8.aarch64.rpm ade369e031ca7628f14269289327e08d927dc6cb92d1ca4d58e7a4c57421f284 dracut-network-049-209.git20220815.el8.aarch64.rpm de82ead1daab19cfdf70857bf2252b444b9d52429873cb965a21116f795b8db6 dracut-squash-049-209.git20220815.el8.aarch64.rpm 8f29856ae4598ec1de24b6a2a6657471f41842fa0e6bd597c5d065b0a2737626 dracut-tools-049-209.git20220815.el8.aarch64.rpm 0ec31db9ea0b2431cd65e080ff8d69557f464ff963c988db0917eaa2e0f99e6b RLBA-2022:7727 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms systemd-239-68.el8.aarch64.rpm 7d73207ef3dfb42a0bbfb9afd82dacee2b23e4a8b6e5a07b3752b05ad976b887 systemd-container-239-68.el8.aarch64.rpm 3a793e428720878cfdc25b7c4692055b716678bb4b933f849a6f3b5ce6cd102a systemd-devel-239-68.el8.aarch64.rpm 1c49d251b203a36ce92016f1b8f2b958d54ad2ed1ea28c9865455157c57c7eb3 systemd-journal-remote-239-68.el8.aarch64.rpm f9cb9d0e084e5a95a8ff3360d0340134f5f9d96ba673edc9c25847be8a565ab9 systemd-libs-239-68.el8.aarch64.rpm 39e9441543bdd4adcc37355da183ff57c659a553c2dc3f4bb8c227bb20351b31 systemd-pam-239-68.el8.aarch64.rpm 58ee752d2d291e01ac25143379d816dccaec4aa8fe003604bbec215cade2fa79 systemd-tests-239-68.el8.aarch64.rpm d98c97b63e0d66fdd7f6456828750d61abba89e34646eb033883c2dafb54aea8 systemd-udev-239-68.el8.aarch64.rpm c74e59a7135dec2aee660d58cd3ae401ecfa0ea43d69e4ec40f8bffbc103f6e6 RLBA-2022:7728 libtevent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libtevent-0.12.0-0.el8.aarch64.rpm a852c69a39ef394eb3e0c5804212247fc9453f630d493226316a3b9ee94bc9d2 libtevent-devel-0.12.0-0.el8.aarch64.rpm 02cf1186cbf018ffa58d51d451e4cbf14b10c9bcb44b5091caeb1eef1ee31bdf python3-tevent-0.12.0-0.el8.aarch64.rpm 194da3b5f39ed5dbddcd84fbbb1581714b95396af0e3e21abee630ae64b9d668 RLBA-2022:7729 libtdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libtdb-1.4.6-1.el8.aarch64.rpm 28e72fec7a88d6edc2ac0615794bca414e33491ec498c953e3fec2b353f5a1be libtdb-devel-1.4.6-1.el8.aarch64.rpm 7ef9ddffc50e3abdab962317ee7ad7c98d30bab3dc564d1e564baac6b19ab55e python3-tdb-1.4.6-1.el8.aarch64.rpm 11be3430e90656cd1cf21124f18facef26978bc0ad9827a8ee9556175b67eab0 tdb-tools-1.4.6-1.el8.aarch64.rpm 42f896fd8d072a286ded11e731d353e7e799dbbf07aeb8f7f24fcd9c30cec6d5 RLBA-2022:7731 ding-libs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ding-libs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libbasicobjects-0.1.1-40.el8.aarch64.rpm ed623791870778478a01619045ba86d73c01d9f04b4e6cc258f5866cb2048e33 libcollection-0.7.0-40.el8.aarch64.rpm 69d2c132badcdf45e86df1e1ba358237b599284c22e3dbfa7638d902e0652193 libdhash-0.5.0-40.el8.aarch64.rpm aa5d496dfa7f798184cd964156c674fef28436a86e275462a985088d20872e27 libini_config-1.3.1-40.el8.aarch64.rpm eec9c0c59ddf5df518666b260dd7c1515ab187782bd80637eaace5585153f49a libpath_utils-0.2.1-40.el8.aarch64.rpm 7d8e665d7cffada799046073a535da46a84b3ee7a5b02c398c5ba0102ed1f797 libref_array-0.1.5-40.el8.aarch64.rpm ad40da01469046f1eff11e8d00e1aeb569e27c4f4a0ba5150e6eea116e6d7718 RLSA-2022:7730 Moderate: libldb security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. The following packages have been upgraded to a later upstream version: libldb (2.5.2). (BZ#2077484) Security Fix(es): * samba: AD users can induce a use-after-free in the server process with an LDAP add or modify request (CVE-2022-32746) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms ldb-tools-2.5.2-2.el8.aarch64.rpm fd9e9f04511fe6b138f7d74e9ae9fb7d0d57e981e66be613d542bd63d6ff79be libldb-2.5.2-2.el8.aarch64.rpm 11aea5bedcbf8869b0302d309acec8dbe1d49e9d03e76661d813369829f1e7eb libldb-devel-2.5.2-2.el8.aarch64.rpm 7a0a92bab36a2dbe0e3bb2eb56b012b0b9075a9b52cb711f7c506e9590c56f77 python3-ldb-2.5.2-2.el8.aarch64.rpm 268be5d108fda5034461cb05970664445d3a82b22c76317b700cf8fc0f3f0f9b RLBA-2022:7732 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms sos-4.3-5.el8.noarch.rpm ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b sos-4.3-5.el8.noarch.rpm ee738963148db3a0e089207c8d3eae0476334897414147f59928f771b427fd4b sos-audit-4.3-5.el8.noarch.rpm 11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3 sos-audit-4.3-5.el8.noarch.rpm 11f63711cbf952f7e5f0eaf592db922d8f08a7b93d42604859ac6e2f66c4a4d3 RLBA-2022:7734 rpcbind bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpcbind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms rpcbind-1.2.5-10.el8.aarch64.rpm 435709c555c6a03229eec4b5264663b2cb93eab60f8241c8b10fe545fe156f36 RLBA-2022:7735 bluez bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms bluez-5.63-1.el8.aarch64.rpm 334da38938a510a18a6d9968ff52f6bc9199f5e8fd40f6f99fd289b0d78d3ca7 bluez-hid2hci-5.63-1.el8.aarch64.rpm 4bae2a1725fc9b4d88b5f41a11b27427e81c0b5a74c0fc1ec968cf04235f1f54 bluez-libs-5.63-1.el8.aarch64.rpm 9e6beb99633cadca9f282c599134b79f7296d236b0f5681699d6a3932ef46e14 bluez-obexd-5.63-1.el8.aarch64.rpm 3ab18df88a241a8728c28e3268edeebfefc53aa54d670a49fbca8d5294bb78a6 RLBA-2022:7737 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms opencryptoki-3.18.0-3.el8.aarch64.rpm 154aacfb7e4c385afcbbaf1906b1ee10eb91f64a6d8c4cf610eb4dad813c4056 opencryptoki-icsftok-3.18.0-3.el8.aarch64.rpm 71bf2b98fcbfe59705ce707f8f608451e48423e298d1036e2f4ca2d6b6d350dc opencryptoki-libs-3.18.0-3.el8.aarch64.rpm 5448582e28488467b3fd6a44036af5f677dc18016a94dc42ec4de568ae6a3047 opencryptoki-swtok-3.18.0-3.el8.aarch64.rpm 23917ed66c5bdde810c1ed2d1ca1e5f12cedf2c947da28e541531e04f470e013 opencryptoki-tpmtok-3.18.0-3.el8.aarch64.rpm 4de016ee6cc8e4cdf9dfc1608b6fb2495a36982421a9afe6f206fe0abe7ed4fb RLBA-2022:7738 authselect bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms authselect-1.2.5-1.el8.aarch64.rpm 29ea70ecbb39aac065908b764d7be2e047ead57e0c5fd7ec6d5b12f60831a7e1 authselect-libs-1.2.5-1.el8.aarch64.rpm 58dadbd9affe71b64c46273b0b8538c2645875aacc9fd55e607310ad357a8457 RLBA-2022:7741 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms mdadm-4.2-5.el8.aarch64.rpm 4836c8b354d3c11df1972d687f2d325a6da480f5d0d0fe1bea447d52e2b87be2 RLBA-2022:7740 libtirpc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libtirpc-1.1.4-8.el8.aarch64.rpm 57d8beb5dadf3caa8624abcffd7e85f2faeccb86ede420d2e1fe06a5fadefc71 libtirpc-devel-1.1.4-8.el8.aarch64.rpm d725a2718b36630d1330db9e93b8224b48ace5d140f983c0395ed8da49b9e0bf RLBA-2022:7742 linux-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe iwl1000-firmware-39.31.5.1-110.el8.1.noarch.rpm b392e895d3afbd5ed826372f3604d908bab2709f69c6d60d13750e8dc81e3dfe iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm 337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6 iwl100-firmware-39.31.5.1-110.el8.1.noarch.rpm 337a8fea74f082be29c60bee17d47093ef647a922bd506619bbeee0eb55a4da6 iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm 288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a iwl105-firmware-18.168.6.1-110.el8.1.noarch.rpm 288ed43283f51c59b7e50a0dc593df6628870840f58321eae575a5b5380fdb5a iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm 9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2 iwl135-firmware-18.168.6.1-110.el8.1.noarch.rpm 9450cd2506434c5aec720a8e08bc33338266d96585599046ee05f63459de5ca2 iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm 29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1 iwl2000-firmware-18.168.6.1-110.el8.1.noarch.rpm 29f026eb5e715fcb37bbab8ea3c9d27cae17e540ac1c5b573f6aa32625c791f1 iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm 62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004 iwl2030-firmware-18.168.6.1-110.el8.1.noarch.rpm 62e23f22cda37774d7119e98c9b10705e1ecf6e0e32ba7c0967e9fa328dce004 iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b iwl3160-firmware-25.30.13.0-110.el8.1.noarch.rpm de4b78e335e5932ba208394cc12aeffc7feed7acb2f18f394f3fb5cc568aba8b iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm 2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d iwl3945-firmware-15.32.2.9-110.el8.1.noarch.rpm 2d4181863240f991d144bfdb7647f47cd1fda63b8a3e785bc7ec4111a261dd4d iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609 iwl4965-firmware-228.61.2.24-110.el8.1.noarch.rpm f130043513b361d6ec69c1ad373406524f4d4d80edd8b055f5f0549c4753e609 iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d iwl5000-firmware-8.83.5.1_1-110.el8.1.noarch.rpm ceb43de383fa1e590c05ef040b769940f779212ecc27b3c719bd7c1305b43e2d iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724 iwl5150-firmware-8.24.2.2-110.el8.1.noarch.rpm ec9a2076dc4160925ab3972b816ad7a1b6f10297f66f8ad23aaaa5a340550724 iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm 721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743 iwl6000-firmware-9.221.4.1-110.el8.1.noarch.rpm 721c1b80f635aec0e4e243c20f4dd464bf5b1705b369e0a27cee734931d2c743 iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm 726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07 iwl6000g2a-firmware-18.168.6.1-110.el8.1.noarch.rpm 726669bdca669cf5abe6933d294f1248737844f315371c32716e13501842dd07 iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348 iwl6000g2b-firmware-18.168.6.1-110.el8.1.noarch.rpm b9cdf0312038d745cd0591bbe410fffec4d0ced7d58b844090da267e7da15348 iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm 1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0 iwl6050-firmware-41.28.5.1-110.el8.1.noarch.rpm 1174de416e10dfac15f61ea201d8f54c2da2d71725d8bedcc0cd8daca3a41bb0 iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm 2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043 iwl7260-firmware-25.30.13.0-110.el8.1.noarch.rpm 2986a3d51b14030af76e3fbe72208d266a3c6ae6afee4af5b4a94eb448b3b043 libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm 23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752 libertas-sd8686-firmware-20220726-110.git150864a4.el8.noarch.rpm 23ad7de4d4084fecd2719465ac68dd0fc87a09e6a02dd989e63dc8246a127752 libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm 8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c libertas-sd8787-firmware-20220726-110.git150864a4.el8.noarch.rpm 8044c8712188cc19e15f04d2d8ffa9829cd3df1f267c8da9ffb4004ab0132b0c libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm 3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2 libertas-usb8388-firmware-20220726-110.git150864a4.el8.noarch.rpm 3de6570a0cbd700a823a5f1a9a2b495e8a26e451517ddb97f5bdbdeb57f0a6c2 libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm 32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859 libertas-usb8388-olpc-firmware-20220726-110.git150864a4.el8.noarch.rpm 32493d237acfe25379667ad067edc6306413783fee195ead85258ff95beec859 linux-firmware-20220726-110.git150864a4.el8.noarch.rpm a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5 linux-firmware-20220726-110.git150864a4.el8.noarch.rpm a7e4b2efa8026d94832457e29367e854b7aa7e98c4a6adaf1402dd0be61ae2c5 RLBA-2022:7743 autofs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms autofs-5.1.4-83.el8.aarch64.rpm 23b2102b167ffadc17b45aa044a822e55e415c53aecc0f8efdb7bb72a83af1a4 RLSA-2022:7745 Moderate: freetype security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for freetype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * FreeType: Buffer overflow in sfnt_init_face (CVE-2022-27404) * FreeType: Segmentation violation via FNT_Size_Request (CVE-2022-27405) * Freetype: Segmentation violation via FT_Request_Size (CVE-2022-27406) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms freetype-2.9.1-9.el8.aarch64.rpm 6b4b48a1202663dbb1fcf6333273938d1ecb16acd75368efc9b264fa046270f4 freetype-devel-2.9.1-9.el8.aarch64.rpm 19fc86a5b68199fe2294b121bf9e2e8a09c69d5850aef54d64338afc59b02202 RLBA-2022:7746 zsh bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms zsh-5.5.1-10.el8.aarch64.rpm 0748ee41e423147a5761291b63e2396da5ce8b2be070bdac4c9374806f23d523 RLBA-2022:7747 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms tuned-2.19.0-1.el8.noarch.rpm 8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679 tuned-2.19.0-1.el8.noarch.rpm 8e8428e5485fd6f6db1417c72f7dce9ad3115424e79e6df675b4b3f5f9846679 tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5 tuned-profiles-atomic-2.19.0-1.el8.noarch.rpm a88e4f30555962ab6e526a8e9e1910c7fdb07d208f162f40163134c03adb7cc5 tuned-profiles-compat-2.19.0-1.el8.noarch.rpm 2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd tuned-profiles-compat-2.19.0-1.el8.noarch.rpm 2fa950728ee6e10b81ce23f9a11702388d0f78137e31644908e94a84f422b4dd tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm 38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489 tuned-profiles-cpu-partitioning-2.19.0-1.el8.noarch.rpm 38d1470f454154f2fa1258fd042ab28abf7120b3bf2cbd6c9f147395b6add489 tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm 9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8 tuned-profiles-mssql-2.19.0-1.el8.noarch.rpm 9165bb6a4d2368005ec46773703e928dff9c64669370e8cad67214a626a6caf8 tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm 1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0 tuned-profiles-oracle-2.19.0-1.el8.noarch.rpm 1d51c3da8674233ff884f936846f25d795f3d2345a81459853634a5752b2d9e0 RLBA-2022:7753 ledmon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ledmon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms ledmon-0.96-2.el8.aarch64.rpm e30d4d468c4eeb0e18f288748c6e0e07bef8aed1e3b5a29b8d182b585416f557 RLBA-2022:7752 iproute bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms iproute-5.18.0-1.el8.aarch64.rpm 0a83cfd263c2a9e56394e7a8f1cc4864069a19b24400ccf6a3bdd0ce77fbe369 iproute-tc-5.18.0-1.el8.aarch64.rpm 1cc4fe3e18e30bb1065b758519912128d0f54d1962ae373067860289f460c644 RLBA-2022:7754 environment-modules bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for environment-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms environment-modules-4.5.2-2.el8.aarch64.rpm aa8b8106185a9f4bfe3726e7f3a94d3ebb02b32a19bd051f2eb5a3ecfc0440ec RLEA-2022:7756 python-rtslib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rtslib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms python3-rtslib-2.1.75-4.el8.noarch.rpm d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397 python3-rtslib-2.1.75-4.el8.noarch.rpm d60cd075dbaf1d38752921078ed51980f4f8e1514fcd858de9f30d2dccffe397 target-restore-2.1.75-4.el8.noarch.rpm fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85 target-restore-2.1.75-4.el8.noarch.rpm fd3ee14675eb7b215e5ec44ed958fbe2647eaf9615fc348ece11375ebaa99b85 RLBA-2022:7757 sg3_utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sg3_utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms sg3_utils-1.44-6.el8.aarch64.rpm 7acaa63a419d3459c20ae077812d0c90d9a8d65eb6f29ae1dbbab62a5bf3b7d4 sg3_utils-libs-1.44-6.el8.aarch64.rpm 10cb2a71a204b51722f393b571f1e2cb1be5e7fb748a8904a9d0c973fe2273d5 RLBA-2022:7758 coreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms coreutils-8.30-13.el8.aarch64.rpm 46023daf2614bb5c6854b4437d80865d146818c2809ab148723f04f00404bd11 coreutils-common-8.30-13.el8.aarch64.rpm 249f34a8e5818881ab99cc2ba04190e1736069fa8554acab5b835acf0c58bbca coreutils-single-8.30-13.el8.aarch64.rpm f90b171face4602d82296ad88c6b1b0fab26e76503a9125e7e7e4b70aa76b1e2 RLBA-2022:7759 dnf-plugins-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm f289b75df81b2d9ad9933b59b05c546239d3def15d0ee3182b9e9bdfda0ca34f python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm 32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9 python3-dnf-plugin-post-transaction-actions-4.0.21-14.1.el8.noarch.rpm 32c2dfc400c7c6e21792d9409b37aca81ab3577e611873017df164f505d1c8e9 python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm 3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21 python3-dnf-plugins-core-4.0.21-14.1.el8.noarch.rpm 3ea9ee75f9402e4d86a5b21828a0a49e933508de2b60ae2803eb7bfbd7d31b21 python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973 python3-dnf-plugin-versionlock-4.0.21-14.1.el8.noarch.rpm e3b7dd311d9d0cc78f7aa964edf8e0a8cbe482dd58c82279b55486daf009d973 yum-utils-4.0.21-14.1.el8.noarch.rpm 8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169 yum-utils-4.0.21-14.1.el8.noarch.rpm 8250e9f58056269892bcad80f19fa592c670e47a047082892e452f9b5ea91169 RLBA-2022:7760 ndctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms daxctl-71.1-4.el8.aarch64.rpm 7ec9c82419c6d19f63ef48b0e5908a114a9d9d8e1af0d27776418e2035e5258d daxctl-libs-71.1-4.el8.aarch64.rpm 6e29f6d57950ca242ceee01ab0aadce1b8bad7bf6a230ad032030be892768eda ndctl-71.1-4.el8.aarch64.rpm cc988032ab22cee018d018b1f8fe7d8a45fdb9c76e44e4297bf51dd73008484e ndctl-libs-71.1-4.el8.aarch64.rpm 1178f34b89ccb8f820d01df308eba4feb9f9c4143e40e74f690562e0e6b3e2f1 RLBA-2022:7761 fuse bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms fuse-2.9.7-16.el8.aarch64.rpm b1be35d06c89612fab22faf58fb478aa5f9ebd5664122b158c949c40c57d32f8 fuse3-3.3.0-16.el8.aarch64.rpm 8b9f65dd804ee6952bb71f9eb65f3a42e6012db93572d620b078b6a2b861611d fuse3-devel-3.3.0-16.el8.aarch64.rpm a8f488e5d53caaaf1a83cae1c0cce87efd4ce8225c836e6c510f629b2f1d1ced fuse3-libs-3.3.0-16.el8.aarch64.rpm df689a9c829991499c43dd10f2bbd84fd656d957e268b430c15433d2e98bb39f fuse-common-3.3.0-16.el8.aarch64.rpm 25817e5c4d65dce7b310479a1577d0483f61ffa2f961c22186ffdc635f43fef0 fuse-devel-2.9.7-16.el8.aarch64.rpm 7cc3957c7a4d5ef7e0a6cd0dfa6ab7bdeaa8b1cc618a6e2daf7bfec225b718b0 fuse-libs-2.9.7-16.el8.aarch64.rpm 392a9ebe5f882f4c36b91b5786b9a0bc7d747b0f7331c2bd96d209fb23b9c669 RLBA-2022:7762 hwdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 RLBA-2022:7763 openssh bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms openssh-8.0p1-16.el8.aarch64.rpm 9ea64cc540a49ae272ed532ce8922a6a4bbcb5cf817d07f4295e03ebb67d0a07 openssh-cavs-8.0p1-16.el8.aarch64.rpm 538679ddaa17f9ab0df40bd3c473369c215a6a1bbd51f070bb0ff31f29f6f586 openssh-clients-8.0p1-16.el8.aarch64.rpm e7f498c1115f571341ecdd0a78072a61ca3b82456dec9dffac6c1571c387280b openssh-keycat-8.0p1-16.el8.aarch64.rpm 76734e5e6391c34ec2fa2176fc87962bc92d55d26a770522b4d68a5fc025b07f openssh-ldap-8.0p1-16.el8.aarch64.rpm 371a21f8ddd7698cfb7ef40e6dbbdb166a961649bc63a5aa3b2e4d23a2b18598 openssh-server-8.0p1-16.el8.aarch64.rpm b991c98b9f8cc22a7b79fb6ec89fc23b6b9be016fb53f5b53e9d34345d4e5e6f pam_ssh_agent_auth-0.10.3-7.16.el8.aarch64.rpm 1d6fce8d5f0adb8fd8d47247c593d7a09214903ac445894c221c7fa348443d24 RLBA-2022:7764 kpatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kpatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms kpatch-0.9.4-3.el8.noarch.rpm f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b kpatch-0.9.4-3.el8.noarch.rpm f015d9416b817158f4ebec7c421dfa4c3966e1226934aa621291ae5e6ba14f3b kpatch-dnf-0.4-3.el8.noarch.rpm 37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf kpatch-dnf-0.4-3.el8.noarch.rpm 37135ce718031624a4e063a1279bcd8961fe8672f9aa31d735400e1e96f747bf RLBA-2022:7765 ethtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms ethtool-5.13-2.el8.aarch64.rpm 534bb57d24f7aa2da23197a8b38715970be11ea7c5a7f1e284bbf88475a45267 RLBA-2022:7767 libbpf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libbpf-0.5.0-1.el8.aarch64.rpm ad7cb1bbc34647c0680451ed9467790766b0e1433d0de29c830c602d9bd94eb0 RLBA-2022:7768 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libnfsidmap-2.3.3-57.el8.aarch64.rpm bfbd77bc5e93d17ad3bcd4debc9e03c8273df29fca6ffaa123a017e4fc262f01 nfs-utils-2.3.3-57.el8.aarch64.rpm a77e705a6de7417e92def62209d41ff1071fd8bdf3305b5c0f2b3d82e670994a RLBA-2022:7769 dbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms dbus-1.12.8-23.el8.aarch64.rpm 56943f4d010328992a964ea62efe7a3e8e59b349f9acc49fa8f7164fc6977a7b dbus-common-1.12.8-23.el8.noarch.rpm 58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5 dbus-common-1.12.8-23.el8.noarch.rpm 58d1cd7b3c07140cc19a76f6d548bbdd99ff5917de84efd15693bca0561e8cb5 dbus-daemon-1.12.8-23.el8.aarch64.rpm 70575113a295243c480e375f6e14127803ba0570c8289ceafcc4b19251438f7f dbus-libs-1.12.8-23.el8.aarch64.rpm e9173f6df4b19e672d97a0b443706af370df5c81df1a0f78e9226e538c7e9547 dbus-tools-1.12.8-23.el8.aarch64.rpm d0574605c91490fc6027ee40813cdb3a02576cb2d02452fec6fd39593f0f84ee RLBA-2022:7770 tar bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms tar-1.30-6.el8.aarch64.rpm 0a2b06b2d86a366d7e738e58269ee3e2866407ca57f6ef0bf98bbe544d018363 RLBA-2022:7771 device-mapper-persistent-data bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-persistent-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms device-mapper-persistent-data-0.9.0-7.el8.aarch64.rpm a5964a029ab2e25d05b8664209864ba6a7197d5eb3927f89be20d8271fc85ae8 RLBA-2022:7772 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms smc-tools-1.8.1-1.gitbbf7e8c.el8.aarch64.rpm 7cf456c583d8d8dc1ac50300c867fe3e37367b3e1d0e94da4f66db55c328849f RLBA-2022:7773 setup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms setup-2.12.2-7.el8.noarch.rpm e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155 setup-2.12.2-7.el8.noarch.rpm e470141a5e3db486e3c26d6d071677489888b09e703093d3f59e22e30b92e155 RLBA-2022:7774 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms sanlock-lib-3.8.4-4.el8.aarch64.rpm 71fe1aa717fc05ef342377a0dfd5b7e7aca648e7a10412d415688a34281f38e7 RLBA-2022:7775 libnl3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnl3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libnl3-3.7.0-1.el8.aarch64.rpm 0110c7329976d152551a79b498b728d98ec4c79ec7dac05b32ab788ad47c6a6b libnl3-cli-3.7.0-1.el8.aarch64.rpm 1ec8ea11a547686cea0513699d68e110515ee25e54e2336d8bf796d703c1fbe4 libnl3-devel-3.7.0-1.el8.aarch64.rpm 58395d42ada00b14c764ba7ff850b04ca2d253f5b6a1c3b10063d53c31b7aaaf libnl3-doc-3.7.0-1.el8.aarch64.rpm ec52fd6fdfd1a32373536649082396350645ff0f00d802d805639d3a326b3e63 python3-libnl3-3.7.0-1.el8.aarch64.rpm 6e40fab42b4cfe8dbd1b1a7223a4b2beef8594bc9909a3a60763a49537e50b93 RLBA-2022:7776 libverto bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libverto. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libverto-0.3.2-2.el8.aarch64.rpm e4ddc4cd25f70d80627e43a09ac1ad358910f1ea99404e429dcef457951ebebb libverto-devel-0.3.2-2.el8.aarch64.rpm 971b5295750d252cbaf71e7c31a5157d50bb2546a0e2318b3c860bc71a5164d6 libverto-libevent-0.3.2-2.el8.aarch64.rpm a9ac9a7a67ce7dd2d32e77964365a981248d6f72c4aa37a79d385c96ac50a4ef RLBA-2022:7778 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.7.17-87.el8.aarch64.rpm 2a9564faab4bcca5d511660bb9af1819e140a0165de49ac6e39a876dbb7c8686 vdo-6.2.7.17-14.el8.aarch64.rpm 7dcf1ae56f5e6eee746cb4bbfa7811d3d3496cc28c99498940091b8c7e1e4ddf vdo-support-6.2.7.17-14.el8.aarch64.rpm 9f8749bf98a1148a38479985f948d7885a1abeb01306645064c1e1ef10aec100 RLBA-2022:7779 curl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms curl-7.61.1-25.el8.aarch64.rpm b981fef665f0332215e318f26ae24dd098bef5091fdc5ec809028a18325ed21d libcurl-7.61.1-25.el8.aarch64.rpm 63d5e3a1a5d5b238bc2712398ccef5c0727caea70041304a826fb7d8edb78231 libcurl-devel-7.61.1-25.el8.aarch64.rpm f3d4056277d05ad21033f82deef468ec1a7e717ee7ffd4e5853bcf60d05f9145 libcurl-minimal-7.61.1-25.el8.aarch64.rpm 6a4435ed437d24f5ec3257711ca275598cd8265516a405a0e262d40356bdc556 RLBA-2022:7780 librepo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms librepo-1.14.2-3.el8.aarch64.rpm 816c1e1d3f912812a2eed48fcca9712653353ad20f515d83e280f07a2d83eba9 python3-librepo-1.14.2-3.el8.aarch64.rpm 97a6171af3eae2ccae633ae990b527c76595b4b7e91f9c0f971a506f74447dac RLBA-2022:7781 gdbm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdbm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms gdbm-1.18-2.el8.aarch64.rpm 889c94613424f05568f5a8168f6900b0892de4deb1e5f0b7b92d05092343faac gdbm-devel-1.18-2.el8.aarch64.rpm fe9b81519d961d73ce03b29e7f5cf2e1b11cc37228a389c1c370308d8828e56d gdbm-libs-1.18-2.el8.aarch64.rpm 757a7b77239d690b9ec7dc2c9ece601f68937dc3c32d52024437fb8a9ff85b8d RLEA-2022:7782 strace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms strace-5.18-2.el8.aarch64.rpm 4cf10ded21ce208ae40b96c3d5a076a79d3ba7818662e941154d4a80858764c8 RLBA-2022:7783 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libblkid-2.32.1-38.el8.aarch64.rpm 2489ce02f28396bed800e976286b5ef854a9a8ed288003b99202fa0af6b06cd7 libblkid-devel-2.32.1-38.el8.aarch64.rpm 048c10225569da196929f33e2cac1cf16c612356cd5aa8984800b6000ae71c37 libfdisk-2.32.1-38.el8.aarch64.rpm 6742e311f7c77cd63e2b9227c5f658bcaa11d07dc293a99de1c56bdd882a00b4 libfdisk-devel-2.32.1-38.el8.aarch64.rpm 7e637b48786aa587a1504d1775a4afd6b2a171659ad67e65afc14dd7f954945c libmount-2.32.1-38.el8.aarch64.rpm c6881554fe953e87f7b1912ac1fbe52f3c93dc7ce724013f2a3a589e35ed621c libsmartcols-2.32.1-38.el8.aarch64.rpm bfad837820729e47016f1025b1d76e7571e63d804599a26daae09f263929306e libsmartcols-devel-2.32.1-38.el8.aarch64.rpm 28c6f2448776e6e6e9a18b679297747a5b4f8e9439bec2b53b4cab2ff6dbd6e1 libuuid-2.32.1-38.el8.aarch64.rpm 5be535b4fbadfcbc44ea07dda43ddb05ecea440fc9cf4dd539cf2a6fe39074ee libuuid-devel-2.32.1-38.el8.aarch64.rpm 094be6c5eaf6306611ed102f35c8a3909f75f048479448cb1152ad81fd0bd67b util-linux-2.32.1-38.el8.aarch64.rpm 16c074c6d64a4479a0942a45354a80ff24ae5223bcb27dd5f06bd613739f5396 util-linux-user-2.32.1-38.el8.aarch64.rpm 901c19733abbe6718ed84b3f10cb4b233f06d6d5ff90779433039a122641f459 uuidd-2.32.1-38.el8.aarch64.rpm 1354f36641bc85fd1bf256f0431220fca9d7ca979818d8e969601118ec47e64e RLBA-2022:7785 nvme-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms nvme-cli-1.16-5.el8.aarch64.rpm fd583fd32a66673a420f80629ba4dc7de33b2895804658b339909f9adc2731e5 RLBA-2022:7786 libselinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libselinux-2.9-6.el8.aarch64.rpm abc20d7c41df771da4e5b3f813d41585b7feaf840c70e4979ecfd8127f79b234 libselinux-devel-2.9-6.el8.aarch64.rpm 3af85183bd8b03b2367246aa080cde19637d94af82cc8094d6aa0e48b22a69b4 libselinux-utils-2.9-6.el8.aarch64.rpm 341b79e728ede7478f96a51f04cfe1daaeafd063ad6f9ebc592c19e1ffc6ac71 python3-libselinux-2.9-6.el8.aarch64.rpm 4b38a482781e27998320ef7bc889b13aac52774be8d59b88b7032d106ba1c603 RLBA-2022:7787 irqbalance bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for irqbalance. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms irqbalance-1.9.0-3.el8.aarch64.rpm aa50e055b1660c675166197934f15167f8e77811e20bac2e2c211c824ad95d66 RLBA-2022:7788 libarchive bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms bsdtar-3.3.3-4.el8.aarch64.rpm 6829b3a8dfe3a6ae92802ec1b93deb3d01279faf3cf241639212e653b88021e3 libarchive-3.3.3-4.el8.aarch64.rpm 21de63ec3b04e67e1a8536436d16f4ed24bfc052c253da53b3d34dcdd8bf299f RLBA-2022:7789 dhcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms dhcp-client-4.3.6-48.el8.aarch64.rpm f6793a29d011272eedcb62e07e8475412d93edf8ff9882be3b651ec6a36ad58f dhcp-common-4.3.6-48.el8.noarch.rpm e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f dhcp-common-4.3.6-48.el8.noarch.rpm e13712a0dfd2a88079f47a1507913848a61e238fc82e60d20c863c7a1594124f dhcp-libs-4.3.6-48.el8.aarch64.rpm 79b00b8cab75ca7c99d386492d1129c014cdef0515b47b8a6d6b81829e89f190 dhcp-relay-4.3.6-48.el8.aarch64.rpm 43fb3b568c1a3e91e42ae863564c848766029cd1a320aaf5d363283b94c6ce32 dhcp-server-4.3.6-48.el8.aarch64.rpm 15f4f6e846b61c04c02a00bfbbea6f4c8aee0a37868ef25d90cebabb91237b1b RLBA-2022:7792 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.181-6.el8.aarch64.rpm 515cbe27579d14f8a377f831252d8a76db713eda53c218290c9b63700026a553 device-mapper-event-1.02.181-6.el8.aarch64.rpm 039633cca65cd6723eef9e0353d2c3fd802cc8bd0cb34958995ce78c16db2dc1 device-mapper-event-libs-1.02.181-6.el8.aarch64.rpm 891aff3102389366ce85444ca82fed2413d629f636eaf55292d2046de5a0565f device-mapper-libs-1.02.181-6.el8.aarch64.rpm bbe4b5da4c8ab61bf63ad4e39aac6c6c241ba57f1722ada1e9fd8ccbe59327b1 lvm2-2.03.14-6.el8.aarch64.rpm 856c9752842a3f064f59f91aa7dec45c121af084990a0f4e8e26cebaac66903f lvm2-dbusd-2.03.14-6.el8.noarch.rpm 2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5 lvm2-dbusd-2.03.14-6.el8.noarch.rpm 2c066ef7fb9501e667b432d9a0d6dd02d4f161695de7bbd3e66530a654621db5 lvm2-libs-2.03.14-6.el8.aarch64.rpm 6820fd510e4ee4dd30cd6926ba970bf0d63300737bda3f6c2ee49ed604fa1aee lvm2-lockd-2.03.14-6.el8.aarch64.rpm b53869e35c12881cca41e8953b4cc976d3b9b2ea6a2b764e458f0ca7e7b570c1 RLSA-2022:7793 Moderate: rsync security and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms rsync-3.1.3-19.el8.aarch64.rpm 591c18962c35b9d5564181cc09987b1ed99535fb634adc4b8ce28fcf2e83f4da rsync-daemon-3.1.3-19.el8.noarch.rpm 3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb rsync-daemon-3.1.3-19.el8.noarch.rpm 3c1e198412a68878c3ce5e1c516ba4b700a0eda6ee00e63eaace2e467b5b0edb RLBA-2022:7794 shadow-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms shadow-utils-4.6-17.el8.aarch64.rpm 187aaa6bae4b09ee63b160fa85ab9b531b0b0dc43c882c61c9dfe9f764b4982e shadow-utils-subid-4.6-17.el8.aarch64.rpm 317c754af1dab336c0e45c69e3ba472522d9715c86795e9de85766b41c597eb0 RLBA-2022:7795 gssproxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gssproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms gssproxy-0.8.0-21.el8.aarch64.rpm b39ab6ed779c99afc8dba0bc4c1772a3acbea2cb6318c60fa1b709ae98afbaaa RLBA-2022:7796 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms iptables-1.8.4-23.el8.aarch64.rpm ea4636ee30470cb685f02f9c2165d41562c628c9d0887094903e727317cb29a6 iptables-arptables-1.8.4-23.el8.aarch64.rpm 980b29a6e0045becc7a960bbf071f60a017218ccb6d45bcfa517920ab0ab25d3 iptables-devel-1.8.4-23.el8.aarch64.rpm 92481bd559ba60fedbbf752efb9ebe15cf71e594ea3377bc99ad1ef9eb99fcba iptables-ebtables-1.8.4-23.el8.aarch64.rpm d4299317548f9659f529d91cf5d418691f818fb058ed7cbdda25047b95baf50a iptables-libs-1.8.4-23.el8.aarch64.rpm 0a515e48c4015665e1a868ca90594a3b7fa3437867b95cd7edb25ff6caefdd86 iptables-services-1.8.4-23.el8.aarch64.rpm 4dbff8f4b10a001201e773651f3d5d7750edbad3729cf128a9b8907168ac9049 iptables-utils-1.8.4-23.el8.aarch64.rpm 06206477593450e0b3270b6708d22f54f2e97660c954c55d3a0ccc8750633c17 RLEA-2022:7797 RDMA stack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ucx, rdma-core, mstflint, libvma, fabtests, eth-tools, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms ibacm-41.0-1.el8.aarch64.rpm 8bad7001d372091b664334b96669c4f9d051b3439a84fdc8e2e0eddff7652d56 infiniband-diags-41.0-1.el8.aarch64.rpm 6825b589b848f389000fd87b9c0c3d965d2b89316efab1ec40c99c3b34a68124 iwpmd-41.0-1.el8.aarch64.rpm 7dee8b2c5412f833adb8dd6115f41a80c1afde3af353859ee47189d689c6e309 libfabric-1.15.1-1.el8.aarch64.rpm c7c5ed9507fbaaa921a292471284d6c7ca1d9edb1873944a44cd9213da8ccfde libibumad-41.0-1.el8.aarch64.rpm ceaa9fa02db3af0eaa46fd33101ad480542d483119eb9b29e1956613cbcbaab0 libibverbs-41.0-1.el8.aarch64.rpm 600252f17726e48d5b93ba9548ef639f6a5629de602eb2c2fbf835bd5d138e3b libibverbs-utils-41.0-1.el8.aarch64.rpm e908cb170dbb423bfdc1c347806485158350379492ebaac93fb3c77dd2d4e04a librdmacm-41.0-1.el8.aarch64.rpm ec9d80f841424b7cd6cf28c98d28cdac779e9297d42485f5f208524e5716b75e librdmacm-utils-41.0-1.el8.aarch64.rpm 31a6c495a58913bc01acf604668e071b69b1cd1bcc3e19410989cab9b23dce7d python3-pyverbs-41.0-1.el8.aarch64.rpm 00d5c9ad9227845f597350d61330638f9f57ef4e2a9ce7725d6ddce93bd497c4 rdma-core-41.0-1.el8.aarch64.rpm 73fe93d3bb9762f48ab2a2295f81cb1734deca41a949011d6492c592842920f7 rdma-core-devel-41.0-1.el8.aarch64.rpm 83d6593fcb1ce9a8fa06cfc606eedc680b00c15386f5112de8b8f85b86c288b5 srp_daemon-41.0-1.el8.aarch64.rpm ef722e8554180bc7d2d7ebf6edbe176515a120aaeb58cb1b0b4810fcefb0db7c RLBA-2022:7798 initscripts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initscripts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms initscripts-10.00.18-1.el8.aarch64.rpm 83b6e124ea1c18f5f5a865f31d695ef5d387ae6d54fe644b909ed9874aebde94 netconsole-service-10.00.18-1.el8.noarch.rpm 01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d netconsole-service-10.00.18-1.el8.noarch.rpm 01a0b14c2c9286a8dddb8b86d432c0319feccbfbfd26c9e5a11aac1513d7aa6d network-scripts-10.00.18-1.el8.aarch64.rpm 9997e7585dad04a4e59cee16b2d7cb5717d94092da2d1b42bf6a6a949f889183 readonly-root-10.00.18-1.el8.noarch.rpm cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22 readonly-root-10.00.18-1.el8.noarch.rpm cdc79cf85b3769685f257187953ec57a5aa8bbd06dde1e28b832acbb5a5a2f22 RLBA-2022:7799 grubby bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms grubby-8.40-47.el8.aarch64.rpm 9856a74869e8e425d8ca10d7bb59958d8db6e92f13178f6af36cf026afc82b6f RLBA-2022:7800 tpm2-abrmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-abrmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms tpm2-abrmd-2.3.3-3.el8.aarch64.rpm 94a8b87f04c645e09ac27faa23b328cc76346ed77388edc4bf42a63453e692c5 RLBA-2022:7801 memstrack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memstrack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms memstrack-0.2.4-2.el8.aarch64.rpm c090b2fe7d1c23cf103d742b62308e3c002e209b88a9f8d4133fada6ffb8269a RLBA-2022:7802 liblockfile bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for liblockfile. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms liblockfile-1.14-2.el8.aarch64.rpm 835821b7de4c2f2603673eef08fb6f548be9c25ad24e8d856aeebff7cceb837a RLBA-2022:7803 libtalloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libtalloc-2.3.3-2.el8.aarch64.rpm ea31361d31c2329490ae00cee863a1879914c07259004f273a0b78d855f2f20f libtalloc-devel-2.3.3-2.el8.aarch64.rpm 60f064adf01c4ae1a72c84116f61b312ef8581a4b78cdb6edae54e0313c2e474 python3-talloc-2.3.3-2.el8.aarch64.rpm 4f7170d927e91ef492f5588716e33af1733b5b02691947ec3e6537c9d1866cc9 RLBA-2022:7804 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libsemanage-2.9-9.el8.aarch64.rpm 42c73e3fd94d62928882f6defbb0d78759c80f54971b161c2725ce1b3af61fc9 libsemanage-2.9-9.el8_6.aarch64.rpm d9810bb2b36934a3ed24fd825c75e6827b6d7ea033bc2c0755edaf12093a1cfd python3-libsemanage-2.9-9.el8.aarch64.rpm 5cd9a3d2868464a09b6d4c8c8d546ecaf628192c8207aa72b53e7eacf6b17f2d python3-libsemanage-2.9-9.el8_6.aarch64.rpm 0b8d884de4aba1407b74f09ccc043092a9517b32ce011d1bc33f92e228caba24 RLBA-2022:7805 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms policycoreutils-2.9-20.el8.aarch64.rpm a07a3a903174b35c7a9b0dae691a9d4a312133704cbede54e0fbfa3f80d0886d policycoreutils-dbus-2.9-20.el8.noarch.rpm 7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98 policycoreutils-dbus-2.9-20.el8.noarch.rpm 7469bfbae4fe7597b05e5bf0af996be891c0603a2d20b2efa793b47bd850ca98 policycoreutils-devel-2.9-20.el8.aarch64.rpm 7b112f4172a4f47fa331104b75069cccc990d2dd2a8b712d6791aef7b579a508 policycoreutils-newrole-2.9-20.el8.aarch64.rpm b219134008e8ea15a8ce065d00f6dc8cf191033cf77649d72ffe1d44751498ce policycoreutils-python-utils-2.9-20.el8.noarch.rpm 4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423 policycoreutils-python-utils-2.9-20.el8.noarch.rpm 4f48c6d787965dec6db81f43a20279aa0aa246002c02afa4ec719155890a0423 policycoreutils-restorecond-2.9-20.el8.aarch64.rpm d75520cd2c6a0ae242902fa8b1ffdf613472031fd31a67716b28875eb90f4823 python3-policycoreutils-2.9-20.el8.noarch.rpm 601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b python3-policycoreutils-2.9-20.el8.noarch.rpm 601dd458e26f2a412f2c7d0a9feffbc5f0bdbb2835186ba5880a6640d731868b RLBA-2022:7806 syslinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for syslinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms syslinux-extlinux-nonlinux-6.04-6.el8.noarch.rpm 65380c1d03fbd9affa8c311635d895d8663e0d059f71c171363dcaa6a70a62af syslinux-nonlinux-6.04-6.el8.noarch.rpm aaaa5a716fc708737112a9e1946d0d09c6202ad407c93f56f769f97d13ed16c8 syslinux-tftpboot-6.04-6.el8.noarch.rpm 25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6 syslinux-tftpboot-6.04-6.el8.noarch.rpm 25ec61fb83f952c8d40fc9309126a9f37ad7acfe4f49ea4cce93757dd1288cc6 RLBA-2022:7807 lldpad bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lldpad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms lldpad-1.0.1-19.git036e314.el8.aarch64.rpm 0506cb59eb2a04c36f84949d4585cfb41f5b711ba43b99fdee7f57b41b39da59 RLBA-2022:7808 file bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms file-5.33-21.el8.aarch64.rpm ec2d75e6920a192aaa15470df68d22a74c2419a1cf3e169ebd1c4bb8ac009598 file-libs-5.33-21.el8.aarch64.rpm 61821e076c7a20df3e4c68cd37d22605c94552d6031ce2fb04d3bdf739d315bd python3-magic-5.33-21.el8.noarch.rpm f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a python3-magic-5.33-21.el8.noarch.rpm f2d3628e48e4c8a3e869939665ad34a0174deddd88e2544f1a203f19e0132d6a RLBA-2022:7809 libpwquality bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpwquality. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libpwquality-1.4.4-5.el8.aarch64.rpm 27f75248d473950ed6354f814ffc5538c678d82b611ffd32b4ce12066ca1f564 python3-pwquality-1.4.4-5.el8.aarch64.rpm 918b6c99f9f88e9307988b72ac9687d35d6adaef266152359e09b919ddb4ceed RLBA-2022:7819 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * rpm-plugin-fapolicyd breaks system upgrade, leaving yum in hung state (BZ#2124522) none-baseos-rpms python3-rpm-4.14.3-24.el8_7.aarch64.rpm c9927c97d69913572bb7ff3a695c329ba023a92dc37eec864cee2b188025f7f9 python3-rpm-4.14.3-24.el8_6.aarch64.rpm 83cd7a7b7cc67758b56cc566715c0ff956e94486a72cf657ab65ff6d2e774755 rpm-4.14.3-24.el8_7.aarch64.rpm 0d0117a179a20abc617a4a47473f757ab55696a4d89413718dc65c0b1c0d6fab rpm-4.14.3-24.el8_6.aarch64.rpm 0c78202a34d51f2e855263b15418f77fbc97d8133edd4bade2e2a71897f825da rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-apidocs-4.14.3-24.el8_7.noarch.rpm a0e39853526b0df4a6d1fb0095bbdadbd735bdb5f833c743b8ae922c06e17f5b rpm-apidocs-4.14.3-24.el8_6.noarch.rpm 16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787 rpm-apidocs-4.14.3-24.el8_6.noarch.rpm 16f3a10967ffede3d3a1fc01be6011bb7937e0d054d94d9b2f97b63077b43787 rpm-build-libs-4.14.3-24.el8_7.aarch64.rpm b5c2b41fb6f91def661b1684cd142586a634b89fd7a007cd66206e170eecd9fe rpm-build-libs-4.14.3-24.el8_6.aarch64.rpm 596f24eb18d1e66b50d2f16e466e65b155e558a23126317f6b363d9fa5df06a5 rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-cron-4.14.3-24.el8_7.noarch.rpm b39e7978de7ee720402ebf493c79062389a0e34d1b3f0f5123eaf93c8247404f rpm-cron-4.14.3-24.el8_6.noarch.rpm 4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a rpm-cron-4.14.3-24.el8_6.noarch.rpm 4b41d55e13beec8d3fe23a23192684e5ebc06194a57ced180b0cf5b0e051fe8a rpm-devel-4.14.3-24.el8_7.aarch64.rpm 6cdd4b81da7a942c9421e6294a831d2ff76679b1fc914be7c1e81fefb22fdd3d rpm-devel-4.14.3-24.el8_6.aarch64.rpm 1c432f62b1754300fa06438a35950678960b408fec1c4404370e065a20802ec6 rpm-libs-4.14.3-24.el8_7.aarch64.rpm 4e6f21d79a5363e24486e75cd7bdaca1b280ac3dfc67ad53eb4e518e49b5c274 rpm-libs-4.14.3-24.el8_6.aarch64.rpm 22f237be682bf8d38de02bb766ea06afd1a957aed730fbbf3e61ea4ce351f615 rpm-plugin-ima-4.14.3-24.el8_7.aarch64.rpm 7cee4cfd57f17ebdcf01ea3575d1cdbd796978154f39a62c399865ea062e63f1 rpm-plugin-ima-4.14.3-24.el8_6.aarch64.rpm f19e69758224332a620cde05f3721ebd242f83d95582d0f349e9d8610e885608 rpm-plugin-prioreset-4.14.3-24.el8_7.aarch64.rpm deb2fd79b798f3de854fe81a6e7229db694a8d58b671a91ba5aefa2cc583d209 rpm-plugin-prioreset-4.14.3-24.el8_6.aarch64.rpm 7c8783027d7f7aa2aaa26e00269b748fc9419a6a92b5dce0dfe1f6e47269c554 rpm-plugin-selinux-4.14.3-24.el8_7.aarch64.rpm 42970eaedf7385ec475ba67126ab37c2579d3e03525c8ed4a42ed37b20623f89 rpm-plugin-selinux-4.14.3-24.el8_6.aarch64.rpm e13a948ae70f7cab6c75ddbbe45ad95b0cef6b8e2c59f7dddde3800b77954cd7 rpm-plugin-syslog-4.14.3-24.el8_7.aarch64.rpm 9e254538db70708897180623b4a6631b03d4b10eabb4097378527215682f1e2d rpm-plugin-syslog-4.14.3-24.el8_6.aarch64.rpm c8853f123596ae2ff2c57bd13b098ff656a6df286717d5c53860f66d48d41d2b rpm-plugin-systemd-inhibit-4.14.3-24.el8_7.aarch64.rpm 22cfd5523cab528991fabb2c5d32179288498d05e600b9e9e7060fb8f232ccd4 rpm-plugin-systemd-inhibit-4.14.3-24.el8_6.aarch64.rpm 8144040835afb56ad759a8a57dc75fc4a88c74d07e60fb479c653d58d4c67d88 rpm-sign-4.14.3-24.el8_7.aarch64.rpm 3395b5e2eeac8bec0930f4ce95fbe163923c768545da2b829e8f868744a806b4 rpm-sign-4.14.3-24.el8_6.aarch64.rpm 57b9f21b166fe1d840dfd9c62347b86554cd1d628727a0d55e72aca02c4f01bb RLBA-2022:7825 bind bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Bug Fix(es) and Enhancement(s): * named-pkcs11 crashing into dns-pkcs11 library red-black tree [bind Rocky Linux-8.7.0.z] (BZ#2130272) none-baseos-rpms bind-export-devel-9.11.36-5.el8_7.2.aarch64.rpm cac036e9f739d175ccfe317187447784e04bfd1382f0172b148e0db682b30865 bind-export-libs-9.11.36-5.el8_7.2.aarch64.rpm 744eb1121a493e66cdb806b7d92c94b75a261740adf56933a3080487e906abf1 RLBA-2022:7828 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Host ip changed when start vm (BZ#2132285) none-baseos-rpms NetworkManager-1.40.0-2.el8_7.aarch64.rpm 49a6fb399dcb2ba9420c7944744a928e8ebfe51a3afbbb5733c96cc5cb41dadd NetworkManager-adsl-1.40.0-2.el8_7.aarch64.rpm ac0afddca496fb033aea5e6d11d6a6cb235910d33947e0fea905cc0a3c413f81 NetworkManager-bluetooth-1.40.0-2.el8_7.aarch64.rpm 8ac05b97b0ebad7754151062a785c082a0c0c0502a968a690f04098dec2424eb NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a NetworkManager-config-connectivity-redhat-1.40.0-2.el8_7.noarch.rpm be319eb37936b7a8d6e4d5b5bd42e0fe336b107ce90c36bdd4d42cfaea003e7a NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm 6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0 NetworkManager-config-server-1.40.0-2.el8_7.noarch.rpm 6e046436cc56ab9f86369ac70d9450227b31eecb9c9f8bd913b64b8987dcf1f0 NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm 195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd NetworkManager-dispatcher-routing-rules-1.40.0-2.el8_7.noarch.rpm 195a4a4a8ddcd55676d48c91959b6341c437d274cc3aaf0a0555add408df8dcd NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7 NetworkManager-initscripts-updown-1.40.0-2.el8_7.noarch.rpm cda38500bd87db0d35acbce54b4272d1510cd0bfa02c646c83fcdcb48f0fa2e7 NetworkManager-libnm-1.40.0-2.el8_7.aarch64.rpm 5595236eb31ef1028858cd825a5fbbfbdaa36e1256d43d7ff4a1d49a5a0a705d NetworkManager-ovs-1.40.0-2.el8_7.aarch64.rpm fb8b07d819cfcdd4df0e3aad6f1b9482271b30bbba88d6aa15c778be292557d8 NetworkManager-ppp-1.40.0-2.el8_7.aarch64.rpm 64d0f3182e92ce09197115c5afc46ffaedab279b283d136d3b6a5195b14522e1 NetworkManager-team-1.40.0-2.el8_7.aarch64.rpm cb5f174003ab5ad3428f8b57cb38465906b518f5b7e99c0e24d6f95fb942cc52 NetworkManager-tui-1.40.0-2.el8_7.aarch64.rpm 43a677ff990358b1f3b430ceac9668ce96cdbd9049de0c1c20471bc7abbe1bde NetworkManager-wifi-1.40.0-2.el8_7.aarch64.rpm 1d101e117eb02f6c138ab24b7126532e49258f0aed599d7357750e65b12890eb NetworkManager-wwan-1.40.0-2.el8_7.aarch64.rpm 1ac43fd29c0cae8fcc91421d369ec0f6eda1a8cb34969855cf3efb097abb9939 RLBA-2022:7829 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Cannot SSH with AD user to ipa-client (`krb5_validate` and `pac_check` settings conflict) (BZ#2128544) none-baseos-rpms libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm f6ca2b24f0094be6e8d8f1bb1400989c7bb09ceada8343d4e81294bc404a8278 libsss_autofs-2.7.3-4.el8_7.1.aarch64.rpm 8988f55f5f17c81049b97f280d8745f88491bf9a82e83465028c90ca89125d15 libsss_certmap-2.7.3-4.el8_7.1.aarch64.rpm a9454aaa161abdac527c120ddc2e4c08a80407004f4eb7697afff9b7f1b3b452 libsss_idmap-2.7.3-4.el8_7.1.aarch64.rpm a1ee51f3874cf52d1c9d5bc4d6b17afd98bfc779220d856a483876f543cdd41f libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm f5f688cdbc09bfb23fb13b086113df23d3977676ad1c6af2828c03040cbab3d5 libsss_simpleifp-2.7.3-4.el8_7.1.aarch64.rpm ee7a2cf5e9f157944b7c6f710f4b3555ddba1b164aa2cba35a49a0be992a0a0c libsss_sudo-2.7.3-4.el8_7.1.aarch64.rpm 38b1770a78bbfcc1e3dceb89b0c84c1e60d339f235189881bd46214749c03a6d python3-libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm 0256a0d370205f1342febe2316bc8374f106d55336a34ee22a71f9b91d91486a python3-libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm 6d5ca0b568fee971d5ba0e228e00f710bd4f02480b71503c7989856707e9b40d python3-sss-2.7.3-4.el8_7.1.aarch64.rpm b2075424a1ae98c819326d6ca212bafa6d4de2fb0071d8f6aade9a52917fe04d python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sss-murmur-2.7.3-4.el8_7.1.aarch64.rpm e4589d466fe5b91f31af1133764d188b9ac7dec579e896efbeedc81f4f160055 sssd-2.7.3-4.el8_7.1.aarch64.rpm 53b9778e7f74b30592a792ee307223c152ae8b54a781983e43df0396b755a24d sssd-ad-2.7.3-4.el8_7.1.aarch64.rpm e1f9df087cb16869a4802174b5bcc8e4a1d078e1f1705c119fd3e96bbbba0d09 sssd-client-2.7.3-4.el8_7.1.aarch64.rpm 41549ade31322026fa9727f97616ce6d6d97060e22d7aa6313a2f0ccfb574de5 sssd-common-2.7.3-4.el8_7.1.aarch64.rpm 901e447910ccd0a2de3b87b6c214f0d59e90af84a9f509c05d2d2c1e2846d50d sssd-common-pac-2.7.3-4.el8_7.1.aarch64.rpm 3ae9235f551fa5b3a60f3402bc45adbfd0cf25f3446b4b8b1a773c2414fb20db sssd-dbus-2.7.3-4.el8_7.1.aarch64.rpm 6fdf3e565cc091c308b5e9c93ead29304999c2daa293eafbe3191e770b30568c sssd-ipa-2.7.3-4.el8_7.1.aarch64.rpm 97c0610f3d7b7ba7ecfa9f9f235abac8c1dcf207ba14d42b242083c2deb0c3c7 sssd-kcm-2.7.3-4.el8_7.1.aarch64.rpm f14e314cdf3c8219686dcb63fecb701fb908243c3f11f39b17233a55cb2b8877 sssd-krb5-2.7.3-4.el8_7.1.aarch64.rpm 183067a7111c75c935f6f1a3169ad498b3f56cad2b34f8fde63e06c67d5c0743 sssd-krb5-common-2.7.3-4.el8_7.1.aarch64.rpm a0b2344f398c259b58a689c41a05090e0f6fd0c441228eaca08bc03ba967f6c0 sssd-ldap-2.7.3-4.el8_7.1.aarch64.rpm 71d6b994645253eaba4e6566a2fb3938dd072d2a3d3b250c58b27b56ce5cf368 sssd-nfs-idmap-2.7.3-4.el8_7.1.aarch64.rpm 3122023820615f39f71aa8cab46fb0d366877c9a8b2674c54847b0ccf024a710 sssd-polkit-rules-2.7.3-4.el8_7.1.aarch64.rpm 4e39328478a67acc3d3df1ed01729c8ad3f643866057cd43e72657dc6cc157f5 sssd-proxy-2.7.3-4.el8_7.1.aarch64.rpm 97a736d8a1b73b1b5d25d357256e787a227177a91aafdf28eaed2a02a1b1ae0a sssd-tools-2.7.3-4.el8_7.1.aarch64.rpm 08edbdecee4de860ae28e94fd11903411d226c5512849ec5dfebdb523fb68fea sssd-winbind-idmap-2.7.3-4.el8_7.1.aarch64.rpm e555c731c11ad6807d8c413a4323d7fa8dde9b7d85f9241aaffeb9083887f91d RLBA-2022:7884 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably: * Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST). none-baseos-rpms tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 tzdata-2022f-1.el8.noarch.rpm b20056db1d142973b6991fe5621d9d75b36c6af06351c50000143abf156d0c06 RLSA-2022:7928 Important: device-mapper-multipath security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Regression of CVE-2022-41974 fix in Rocky Linux (CVE-2022-3787) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms device-mapper-multipath-0.8.4-28.el8_7.1.aarch64.rpm 477bf33d56141e0517a23bbe4d9662e82744726ba2793f5089c95f33c9d283bc device-mapper-multipath-libs-0.8.4-28.el8_7.1.aarch64.rpm 8d5b36bc9f026200b5cb9373e7dceef4d7444c5f0781b121be0321b66009c01c kpartx-0.8.4-28.el8_7.1.aarch64.rpm 32a9a90c06230f4ad7f5e7658328f13f6cf05e36bdd2cc950a64940011f09c18 libdmmp-0.8.4-28.el8_7.1.aarch64.rpm c0c755af7e4910eb12963fe0d7a02b747fe955e516de57e615708bdc869ac016 RLSA-2022:8638 Important: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-22.el8_7.aarch64.rpm 8aa75ec82a78ea65708116e3d1028eda74d74aa61513398a2c4b73dfefde5316 krb5-libs-1.18.2-22.el8_7.aarch64.rpm a8f2a13bc353e9989d1ad3ae184def628941e5b1446267a407df86a06a0a60d3 krb5-pkinit-1.18.2-22.el8_7.aarch64.rpm a505df104fbfc55047b1688cac3f5166aa9202b9cb2596ab786b120a70602a8e krb5-server-1.18.2-22.el8_7.aarch64.rpm a1d7bd77da87c20b01a0d0f1aa26e7cb01364ca0b9cf6f66f10baa06d13d76c3 krb5-server-ldap-1.18.2-22.el8_7.aarch64.rpm 956f90647a936a6e7effef18207ede991b82b934d301fc58c5514170fbbff859 krb5-workstation-1.18.2-22.el8_7.aarch64.rpm f4599c52ccce9bd4bb17868d7cfa05798760c982c407442b162d0b7d65641bd2 libkadm5-1.18.2-22.el8_7.aarch64.rpm c1913ebb43e8659e42914ac67b0d2c41adc924c27188635d093d2d4772e0b3e8 RLBA-2022:8785 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably: * On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added. none-baseos-rpms tzdata-2022g-1.el8.noarch.rpm 808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a tzdata-2022g-1.el8.noarch.rpm 808522f695bbe1b624724328f2ab6ff9a615a4220bb9611549fe67ccddcb383a tzdata-2022g-1.el9_1.noarch.rpm 9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68 tzdata-2022g-1.el9_1.noarch.rpm 9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68 tzdata-2022g-1.el9_1.noarch.rpm 9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68 tzdata-2022g-1.el9_1.noarch.rpm 9745a3812425b1e823c379a76a51bcc74f8b4a7cd51b54f141cc514dda54cf68 RLBA-2022:9028 libsolv bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Bug Fix(es) and Enhancement(s): * Transaction picks old build to satisfy dependencies (BZ#2151895) none-baseos-rpms libsolv-0.7.20-4.el8_7.aarch64.rpm 484e387a8c85503ed55dd25dcfb5f1581c670da6b71d28707c58eb114156b791 python3-solv-0.7.20-4.el8_7.aarch64.rpm b396061f35d4cb6b34e7569a120201d3f5431055bc41a8cf1a53084a2e4fd6ed RLBA-2023:0085 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es) and Enhancement(s): * backport two memory leak fixes in snmplib - missed for Rocky Linux 8 (BZ#2134764) none-baseos-rpms net-snmp-libs-5.8-25.el8_7.1.aarch64.rpm 998cfd09379b26f9d5b81f641010104cf38d1f4000cc3d1b958c84c5531f333f RLBA-2023:0086 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.7 - opencryptoki C_GenerateKeyPair() fails after generating > 500 RSA keys with CEX7 crypto cards (BZ#2129059) none-baseos-rpms opencryptoki-3.18.0-5.el8_7.aarch64.rpm 21a76c83ca635c90f9df2b83e7d43db792df1f2d65f95ccf28ca7b846b4a215d opencryptoki-icsftok-3.18.0-5.el8_7.aarch64.rpm 870c730cb00bee134a0dc84d3140b631274f4a14e9f4695bf3fe02e8e45ace03 opencryptoki-libs-3.18.0-5.el8_7.aarch64.rpm 0d02f076621490c0e4315e00c4abcf2a6a9ecea8eb63e14a84efeed811485e7d opencryptoki-swtok-3.18.0-5.el8_7.aarch64.rpm a5318b00892785330215eec56943cbb444f1e2e215b521257841fdec194092fd opencryptoki-tpmtok-3.18.0-5.el8_7.aarch64.rpm 080cf84289a0a71921b12b4eeeb587c6cdc41c30ca462b684abe6468ba816340 RLBA-2023:0090 zlib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - zlib: inflate() does not update strm.adler if DFLTCC is used (BZ#2137336) none-baseos-rpms zlib-1.2.11-21.el8_7.aarch64.rpm 20a747975777d59fff85c98796b15151068fd11da077aca7863cc5afda3f90a6 zlib-devel-1.2.11-21.el8_7.aarch64.rpm 941647e609730ddaebf3d1eccb5ab972ddb882d30b8c81605f7ea877eae55a2a RLBA-2023:0094 rsync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Bug Fix(es) and Enhancement(s): * rsync-daemon fail on 3.1.3 (BZ#2139118) none-baseos-rpms rsync-3.1.3-19.el8_7.1.aarch64.rpm 8026b069c506b8a1f73a6767f26d22c216222c3d69aa0d29dfa1dd2607a54af6 rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe rsync-daemon-3.1.3-19.el8_7.1.noarch.rpm fb059776c3978eaa94acb4e4b0f7944756f454824eab3a3178764226c1d50fbe RLSA-2023:0096 Moderate: dbus security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon crashes when receiving message with incorrectly nested parentheses and curly brackets (CVE-2022-42010) * dbus: dbus-daemon can be crashed by messages with array length inconsistent with element type (CVE-2022-42011) * dbus: `_dbus_marshal_byteswap` doesn't process fds in messages with "foreign" endianness correctly (CVE-2022-42012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms dbus-1.12.8-23.el8_7.1.aarch64.rpm 5681430586fbfe8a5a7aad2c7fc69f21c38b9f4269a1c9dd884fbfa37badd221 dbus-common-1.12.8-23.el8_7.1.noarch.rpm d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32 dbus-common-1.12.8-23.el8_7.1.noarch.rpm d0e4859f6054c5ea4e81571f6569cad02b9700981fb122d7e2f104bce4214d32 dbus-daemon-1.12.8-23.el8_7.1.aarch64.rpm 6dcf33aa4cbab4b7c980d3a6cf48ec2e932845342efdca0b2636d5c80a4a9c96 dbus-libs-1.12.8-23.el8_7.1.aarch64.rpm 006e19115a1b61dd6e5347bfc110260639da961435f60ece029aea5359575bcf dbus-tools-1.12.8-23.el8_7.1.aarch64.rpm 36b5e150a2b4c66d3400ae16a8cf0bbec6194a9a03061334d46f42c7eb000580 RLBA-2023:0097 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * 2136762 - [Rocky Linux8/Insights/Bug] SELinux violations insights client with Satellite 6.11 (BZ#2136762) none-baseos-rpms selinux-policy-3.14.3-108.el8_7.1.noarch.rpm 321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452 selinux-policy-3.14.3-108.el8_7.1.noarch.rpm 321ec9f773d2082212881711c4346ccd77ef92167a46cae8418da5d93cfe1452 selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm 6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204 selinux-policy-devel-3.14.3-108.el8_7.1.noarch.rpm 6f11096869a4305c31ef274c3bd2dfc1e89be4c3ce21ae09aaae8081480a6204 selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3 selinux-policy-doc-3.14.3-108.el8_7.1.noarch.rpm d9d0cf27ff71a508cb6dda32bb99f2f51772b4f681002b327e5710d7d2c53ef3 selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm 2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd selinux-policy-minimum-3.14.3-108.el8_7.1.noarch.rpm 2dde92278499e82d3ed0bf620410e6f398bfd921838cc53716abfaa292102ebd selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm 550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b selinux-policy-mls-3.14.3-108.el8_7.1.noarch.rpm 550c511de341ff9c24ea63e8ae9e8ac53b91b0e517ff3f417dbe6d7113794d7b selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm 1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8 selinux-policy-sandbox-3.14.3-108.el8_7.1.noarch.rpm 1119c34c00aaeafcf37bea9cd8d2013bf26286ab651a6b069d53f2ff7410eeb8 selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm 72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b selinux-policy-targeted-3.14.3-108.el8_7.1.noarch.rpm 72864ab192aedd31c706b240d261b637f2b9fdae98c0e7ac638579ea7402c42b RLBA-2023:0098 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * crio occasionally fails to start during deployment (BZ#2132281) * DNS servers are not sorted according to priority in resolv.conf (BZ#2135733) * Hostname is not configured during IPI installation of OpenShift 4.10.3 on baremetal when using NMState and static IP config for a bond network interface. (BZ#2152891) * NMCLI OVS connections intermittently get stuck in "activating" state after power cycle or crash (BZ#2153429) none-baseos-rpms NetworkManager-1.40.0-5.el8_7.aarch64.rpm 950b80d29270489c26fac177eab0e544928934b49bc1f3af8bd91de2dfdf748e NetworkManager-adsl-1.40.0-5.el8_7.aarch64.rpm 974aacdc9079b199aebbd9a85ac5014d756bd92c76d9f1af9fef1f875a97ad38 NetworkManager-bluetooth-1.40.0-5.el8_7.aarch64.rpm ceee8b34e1cca11d6bbe5b4c655ed149b1d9fee29dfc0d9a1ca2c7c87190d94a NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3 NetworkManager-config-connectivity-redhat-1.40.0-5.el8_7.noarch.rpm cd5378c72e78016a45d76be43a70202b6ede6826006fe1efe7762a3c00eb48f3 NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm 4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043 NetworkManager-config-server-1.40.0-5.el8_7.noarch.rpm 4d7c618d1898b37ae728a3fd4cf989463ca9fdf77041e567b60cbbac70cac043 NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm 9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d NetworkManager-dispatcher-routing-rules-1.40.0-5.el8_7.noarch.rpm 9c4b87f46150a5d9751a10dbcb06a581d3acfacbe1075648ffbd2075f71ebc4d NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847 NetworkManager-initscripts-updown-1.40.0-5.el8_7.noarch.rpm c5c0347bd11f92b5a5cb4c618e04e1e631e69363c2ed4ff23cf4bd87c08d8847 NetworkManager-libnm-1.40.0-5.el8_7.aarch64.rpm f3ab320705577f3b1131c2127ff85c2edd3ac14c83ee6a44e7e8cd6252ba5ba7 NetworkManager-ovs-1.40.0-5.el8_7.aarch64.rpm 754619bc03085d79131afeb5608d523fb6dedaf2220ba9fe0b648839d69f9fdf NetworkManager-ppp-1.40.0-5.el8_7.aarch64.rpm 21883084c430f71ffe750ed1a5e1d26cbf06cdb573560512de8c868d7621e121 NetworkManager-team-1.40.0-5.el8_7.aarch64.rpm 37a9241378af8c20da95bb6c557c3955acbdd71b8ddeb339fbd3540efd29c4a2 NetworkManager-tui-1.40.0-5.el8_7.aarch64.rpm ef9286fa1342eaf573938c960de50e31329dc11b6541ce16cfe0e37d970237ee NetworkManager-wifi-1.40.0-5.el8_7.aarch64.rpm e89c99d5ead4ac4c25489a06c796e4a33686e557e3ff8c5e823f86ca31cdd70b NetworkManager-wwan-1.40.0-5.el8_7.aarch64.rpm 040e4053dd4d385b4ac69897f7fe2ac9a6e33137313dbe9f751b023e3c0b7622 RLSA-2023:0101 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 - zfcp: fix missing auto port scan and thus missing target ports (BZ#2127849) * vfio zero page mappings fail after 2M instances (BZ#2128515) * ice: Driver Update up to 5.19 (BZ#2130992) * atlantic: missing hybernate/resume fixes (BZ#2131935) * Bluefield 2 DPU would crash and reboot due to a kernel panic (BZ#2134084) * Fix issue that enables STABLE_WRITES by default and causes performance regressions (BZ#2135813) * ice: Intel E810 PTP clock glitching (BZ#2136036) * ice: configure link-down-on-close on and change interface mtu to 9000,the interface can't up (BZ#2136216) * ice: dump additional CSRs for Tx hang debugging (BZ#2136513) * ice,iavf: system panic during sriov sriov_test_cntvf_reboot testing (BZ#2137270) * After upgrading to ocp4.11.1, our dpdk application using vlan strip offload is not working (BZ#2138157) * i40e: orphaned-leaky memory when interacting with driver memory parameters (BZ#2138205) * WARNING: CPU: 0 PID: 9637 at kernel/time/hrtimer.c:1309 hrtimer_start_range_ns+0x35d/0x400 (BZ#2138953) * DELL EMC 8.6-RT: System is not booting into RT Kernel with perc12. (BZ#2139216) * Lenovo 8.7: The VGA display shows no signal when install Rocky Linux8.7 (BZ#2140152) * Host Pod -> NodePort Service traffic (Host Backend - Same Node) Flow Iperf Cannot Pass Traffic (BZ#2141878) * mlx5_core: mlx5_cmd_check messages scrolling with hardware offload enabled (BZ#2141957) * net/ice: VIRTCHNL_OP_CONFIG_VSI_QUEUES command handling failure with in-tree driver (BZ#2142017) * Rocky Linux:8.6+ IBM Partner issue - Loopback driver with ABORT_TASKS causing hangs in scsi eh, this bug was cloned for Rocky Linux8.6 and need this patch in 8.6+ (BZ#2144583) * AMdCLIENT 8.8: The kernel command line parameter "nomodeset" not working properly (BZ#2145218) * Path loss during Volume Ownership Change on Rocky Linux 8.7 SAS (BZ#2147374) * net/ice: OP_SET_RSS_HENA command not supported with in-tree driver (BZ#2148130) * iavf panic: iavf 0000:ca:01.0: Failed to init adminq: -53 (BZ#2149081) * Intel 8.8 iavf: Driver Update (bugfixes) (BZ#2149742) * Azure Rocky Linux-8 PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150912) * Rocky Linux-8.7: System fails to boot with soft lockup while loading/unloading an unsigned (E) kernel module. (BZ#2152206) none-baseos-rpms bpftool-4.18.0-425.10.1.el8_7.aarch64.rpm 655376e7923a5cd6e7e1e4215ca9de11b826c5c8276334a4ed30b81c33e60bf8 kernel-4.18.0-425.10.1.el8_7.aarch64.rpm 253aa8da58777911c48c9f2f5394d6723b692279ac4b9611d7e5bd0bccfe5987 kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm 5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669 kernel-abi-stablelists-4.18.0-425.10.1.el8_7.noarch.rpm 5f88073317993ccc745d08d87c5ac76fe6cef8acc5d26a3b7349dd6b0d8f0669 kernel-core-4.18.0-425.10.1.el8_7.aarch64.rpm f38ef2865d5b9c03a90ad21744530a03e66086d505d7f6d00cf48717e235fc30 kernel-cross-headers-4.18.0-425.10.1.el8_7.aarch64.rpm f2b296167528c4fc42e9ce9f390ab498e53eb4736a2bd3259296fcc201372442 kernel-debug-4.18.0-425.10.1.el8_7.aarch64.rpm 2096a3b99788524bbac746b73330c736130d1ee8a90f30e9c23c47ae9a09a8c9 kernel-debug-core-4.18.0-425.10.1.el8_7.aarch64.rpm 6d11abc288081b2383f43544d27db2fa97e90e3a48dbe6404e6557f0bb7dbd5b kernel-debug-devel-4.18.0-425.10.1.el8_7.aarch64.rpm 8523f2825ac2a90d666b6176c5ebea3eb2567d8641a1d9ebf303424e66aa753a kernel-debuginfo-common-aarch64-4.18.0-425.10.1.el8_7.aarch64.rpm 20f0f57b81350f149c0391ad2876f47aa0aa5ddda77846d25bcfedd771e81fa5 kernel-debug-modules-4.18.0-425.10.1.el8_7.aarch64.rpm 4bbcfb29ab3dbe3c8778d3fac356f6bf81d792718631c87cc03ab197fc8dc959 kernel-debug-modules-extra-4.18.0-425.10.1.el8_7.aarch64.rpm a3976cb267775772d9afbe1a0c9944d4935f34d1d7997a230d4aedd0e2e6e13e kernel-devel-4.18.0-425.10.1.el8_7.aarch64.rpm e71a1eaf35aaa9e721382c2f199b371bb43e4821f12446fde6856db2e04f26a2 kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e kernel-doc-4.18.0-425.10.1.el8_7.noarch.rpm a5841e7bb9d35f714ceaf835b19d2d07b9171354addf2353c43a3600bd0f1b3e kernel-headers-4.18.0-425.10.1.el8_7.aarch64.rpm e57c1ff64193ffa75ac37c647ff26c016cd457b6717840fd7334ef8cb79e260c kernel-modules-4.18.0-425.10.1.el8_7.aarch64.rpm 5446e8128119feb9d10c37fbd3aca39cdcd4c7cfceb403673a2dc9ae0951b646 kernel-modules-extra-4.18.0-425.10.1.el8_7.aarch64.rpm 41cc3e9c91be3c9e5b077ddaef6a1517529ae87623ba20b3055d2fc9508c61bc kernel-tools-4.18.0-425.10.1.el8_7.aarch64.rpm 978e39ca44e9e8e55a4cd14fe3f23479b5761632abaa39fc069303f38fe6fff1 kernel-tools-libs-4.18.0-425.10.1.el8_7.aarch64.rpm 9794b6f8526915bed89be61897ce19ad82eeed48d0ded3b7d0d27ece246d1b3b perf-4.18.0-425.10.1.el8_7.aarch64.rpm 93991ef9fe041674624a898f8c763fbf4d0986e7adfa2bb488bd1f62470c65e4 python3-perf-4.18.0-425.10.1.el8_7.aarch64.rpm fbc0af1bb4aa27cd537a9a6fed27f388f51d1707937364cf8f1893f223beba85 RLBA-2023:0104 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. Bug Fix(es) and Enhancement(s): * booting over iscsi can enter a loop forever in dracut-initqueue if one netroot path is lost. (BZ#2132045) none-baseos-rpms dracut-049-218.git20221019.el8_7.aarch64.rpm de520e82a2fa3487ac44311137e2cc3ed56ea920dcc4fb0945c22f796961eab7 dracut-caps-049-218.git20221019.el8_7.aarch64.rpm 12dfa34259d427129fcd1c76e52b2b6f8a059efe35c57c35ba94af4fcd6b1e7b dracut-config-generic-049-218.git20221019.el8_7.aarch64.rpm 1ee3ebbf175c5ca5e16c66c59ae979fac5fd35e155b2ef6e605ed9d9dd437134 dracut-config-rescue-049-218.git20221019.el8_7.aarch64.rpm 900229471ea2657f16d5a85e26de497a7234b773737d96535a9afb27fc63c820 dracut-live-049-218.git20221019.el8_7.aarch64.rpm b3a9e789b0d3723e13d06a6ccb943f103d010d59a240337f546ffa99c3de0660 dracut-network-049-218.git20221019.el8_7.aarch64.rpm 666eb7155d1cf915dea2b77688bb2a93f36ba258a9eca62e7e9896f85dea455d dracut-squash-049-218.git20221019.el8_7.aarch64.rpm 2e43997fec1e908266bae7c0caadf4495210ec5f4db69770f868649eba313c59 dracut-tools-049-218.git20221019.el8_7.aarch64.rpm 501abfa427c24beccd4b47a070e5f256b46124392df3c68fdefb7b906c887326 RLSA-2023:0103 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (CVE-2022-43680) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-10.el8_7.1.aarch64.rpm f24c6d74b9e1c422442b39248f049f82a874a2c0827806a992ceb30a8285cccd expat-devel-2.2.5-10.el8_7.1.aarch64.rpm 04efac0a114bff05c81e111b72aa5b334c57c2e843a53050cd68c3db9cdedc8c RLBA-2023:0105 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Add --cont-clock feature for libuuid and uuidd [Rocky Linux-8] (BZ#2143252) none-baseos-rpms libblkid-2.32.1-39.el8_7.aarch64.rpm c64e2852190d2108d9aecf05528f719ca0d4573e89ca72b85e2c3899d1378088 libblkid-devel-2.32.1-39.el8_7.aarch64.rpm 68af95be57789e6928fc76420fbed2b1472a0a71f33f886f68d5174fb184a015 libfdisk-2.32.1-39.el8_7.aarch64.rpm 938bfb791a72a438c0453f5527e53474e918039da98679da9dfdb74d7277f8cc util-linux-2.32.1-39.el8_7.aarch64.rpm e2da688eaa8a0ac797811140e403914c2e0c2dbeed33fa902d3c64e496e23c8d libfdisk-devel-2.32.1-39.el8_7.aarch64.rpm 31699548d7ef164c9e620930d6acc014406839533d644588b5350bdbe82e4c41 libmount-2.32.1-39.el8_7.aarch64.rpm c4862acb1732d75f563f0776a8c2dcfeee0bc6b1bef3838423e3ebe663908040 libsmartcols-2.32.1-39.el8_7.aarch64.rpm 9e447bfe23b9499ff6156341f3c0d70602772ea2113c48016a3c9274b7a99c5a libsmartcols-devel-2.32.1-39.el8_7.aarch64.rpm 0174b45145386a284aaebfe738bcfd333c7993d34f91c4edbd205505375a3815 libuuid-2.32.1-39.el8_7.aarch64.rpm 8298c67523f164645b1262225f3db5aef46e368c4e19cf06676140092288fc02 libuuid-devel-2.32.1-39.el8_7.aarch64.rpm 48c70d4149b9c846a8342c613a9b694f6c41430deb90e4857c5f2d4aa23e234d util-linux-user-2.32.1-39.el8_7.aarch64.rpm 91a67144d1202403ac6e64e360735807e4e6cf665e533b3ece721c0051135ee0 uuidd-2.32.1-39.el8_7.aarch64.rpm fbcebec4fcb17436b3d6eedd1afb547c7296dc1c53a8f99c93c7da70dd1109f7 RLBA-2023:0106 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * The ">>" operator of std::normal_distribution does not work properly. (BZ#2144075) none-baseos-rpms libasan-8.5.0-16.el8_7.aarch64.rpm 7bb117589dac16b12139c0908c1a6a453900e6a0059b2a6a5168b5ec2495d1cb libatomic-8.5.0-16.el8_7.aarch64.rpm cf094e446587955b88df77091ef516eb87ec3f873de6b4da09a617d26e4bc172 libatomic-static-8.5.0-16.el8_7.aarch64.rpm 81f150ddb7d43b42f47509844dce047bbb76708fb1e1052b29598b09a4814189 libgcc-8.5.0-16.el8_7.aarch64.rpm 69810345e10c44f8b02ae8ad793b49d61b7d0455487169cd5007406fc5f39645 libgfortran-8.5.0-16.el8_7.aarch64.rpm e1688bb37ecff5284693155697118f3eebc2baff31f34afad7e5e0fc16f88cf5 libgomp-8.5.0-16.el8_7.aarch64.rpm d5d3b463dc4f688779d1ca7ea2d15a23365a83a4983eb72adada32f7b5b097a5 libitm-8.5.0-16.el8_7.aarch64.rpm 6430f8a4f425f076dec54b2484afc8fc7d9e43cb5cf3a113ae48f5129340dc73 liblsan-8.5.0-16.el8_7.aarch64.rpm 12314a1be0ddb73c65fb13bf32943cbe6f65907f83f37e3dca9669d7c6e71619 libstdc++-8.5.0-16.el8_7.aarch64.rpm 8a2f84baee858119a090eb9496d915098502c4e1ee79f4544c14bac61233e49d libtsan-8.5.0-16.el8_7.aarch64.rpm d313d0fcc505e605bc0515ff4a9b8bab110b674e3be4169b4cb9965d0e5ed0dc libubsan-8.5.0-16.el8_7.aarch64.rpm 4fb73c9ceab30894956a5615d32de56f4e69ec40dc640a3eeb42fc51de3cc29f RLBA-2023:0107 dhcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Bug Fix(es) and Enhancement(s): * dhcp: does not send dhcp6.vendor-opts back to clients (BZ#2142025) none-baseos-rpms dhcp-client-4.3.6-48.el8_7.1.aarch64.rpm 7c52e0dfd3b13c1f59c33237c7265c88f60df66e7fba9c7e2b0eba20a82abb17 dhcp-common-4.3.6-48.el8_7.1.noarch.rpm f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8 dhcp-common-4.3.6-48.el8_7.1.noarch.rpm f934465c675e5be123b5d7f7aae7c0e894b5cd6c6cd2e73c752655f8d295bfd8 dhcp-libs-4.3.6-48.el8_7.1.aarch64.rpm 22ca669b116874e70847c6f7b11c5049c5d1b249c88862c52f310a9a6a8ddea1 dhcp-relay-4.3.6-48.el8_7.1.aarch64.rpm ccd6e17a6c2e4159fe820226914071833b4981c5fa993814c859fe3f843e7ae3 dhcp-server-4.3.6-48.el8_7.1.aarch64.rpm 7e6cc971755904017d0a3c3462dd0b85310f5bf86f81d6139c3107e8242c1644 RLBA-2023:0109 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Ordering cycles at shutdown time causing delay in the shutdown (BZ#2143100) none-baseos-rpms systemd-239-68.el8_7.2.aarch64.rpm fff9a78110a069c83a7c58735fd08d76eef04309fb22c1ef84b44e94fa72bfd2 systemd-container-239-68.el8_7.2.aarch64.rpm 93de7faa67575b08038f58572b218768c6f49ef08518b785deccae37d51385bf systemd-devel-239-68.el8_7.2.aarch64.rpm 6f12910303707a2791f5fb77e442453e48da263591743572ff6d676bb7a5e609 systemd-journal-remote-239-68.el8_7.2.aarch64.rpm f1faeb3ca1643720ea243300a896d2587fd4b64a32589bdf1ed86f96e5c6d16b systemd-libs-239-68.el8_7.2.aarch64.rpm b15bb17d57100447bc389f4bfe9c4f798dcdcf77f704f677e8cec4c93b56e3be systemd-pam-239-68.el8_7.2.aarch64.rpm 8eee3c99a4fd7acfccb3a970403977eeee8d2c41b70e641d6fb0340b48eb59b6 systemd-tests-239-68.el8_7.2.aarch64.rpm cffd4cde3fe68ef993eeef6d34c75d507a53d28208303239435abe351fa9d934 systemd-udev-239-68.el8_7.2.aarch64.rpm a6ebe69e8341e09091e97d321e37e304b160fe7bc2a41f0f02fadffa3154b185 RLSA-2023:0110 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: an array-bounds overflow if billions of bytes are used in a string argument to a C API (CVE-2022-35737) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-3.26.0-17.el8_7.aarch64.rpm 3887f489a80e4aa991adcef79d2716e24bb0d1d8d704097f8b0d623669c4f12b sqlite-devel-3.26.0-17.el8_7.aarch64.rpm 5305ecce03b91a9f6749d98b0aec32a41d28d43a4866499cc173eadb641be932 sqlite-doc-3.26.0-17.el8_7.noarch.rpm 62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a sqlite-doc-3.26.0-17.el8_7.noarch.rpm 62de890713f95e66cecfbf4c9411060f95a3d58ba10b473b277294f7877ba70a sqlite-libs-3.26.0-17.el8_7.aarch64.rpm 06c57b9b8b9d0bcedb122776cf14fc36750733c5c2068f7c75adb925d04758fa RLBA-2023:0111 curl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * Fall back automatically to HTTP1.1 from HTTP2.0 when performing auth method. (BZ#2144493) none-baseos-rpms curl-7.61.1-25.el8_7.1.aarch64.rpm 3b36c930e925f55247ee2f8f8cbbf29eb4e77db6540cd395be2a9fc6954acf32 libcurl-7.61.1-25.el8_7.1.aarch64.rpm b2bf4ebe6aafbfc813d5a20ecf1acfe70e9d706f3604e43c0adb9730ed0de985 libcurl-devel-7.61.1-25.el8_7.1.aarch64.rpm 141137fa2a6a818e48428dd45d29ce9f74ec5d15314c7c5c0e30d01f2db1c28a libcurl-minimal-7.61.1-25.el8_7.1.aarch64.rpm 50acd07115bdb8a9ffb58e10df534c0caea8b655c206623247a4c87ada9b8507 RLSA-2023:0116 Moderate: libtasn1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Out-of-bound access in ETYPE_OK (CVE-2021-46848) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libtasn1-4.13-4.el8_7.aarch64.rpm 5b648be244c23d9ff819e0878ddce6e1b08a0b90563d8db614bfa8902a5dadd5 RLBA-2023:0120 authselect bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The authselect package configures authentication and identity sources from supported profiles. Bug Fix(es) and Enhancements: * Change the default password encryption algorithm back to sha512. (BZ#2151229) none-baseos-rpms authselect-1.2.5-2.el8_7.aarch64.rpm b87be0458659a4c0639fc7b61e0b7d2df899ff4ad4b4d25ffcaed4918ebb1a80 authselect-libs-1.2.5-2.el8_7.aarch64.rpm 5e9b87ca44da9e4292f7251a6309a5798de786e10ee64887adf38abef8c4c0c8 RLBA-2023:0121 libqb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libqb packages provide a library with the primary purpose of providing high performance client/server reusable features, such as high performance logging, tracing, inter-process communication, and polling. Bug Fix(es) and Enhancement(s): * pacemaker command "crm_attribute" intermittently fails with error code 102 (BZ#2151300) none-baseos-rpms libqb-1.0.3-13.el8_7.aarch64.rpm c2aaead054e587dbc69dd24ae166c004f20f5d4b8b8a177bcf8517e662bc537d libqb-devel-1.0.3-13.el8_7.aarch64.rpm f46d441721960fd16039bcf3e2442e8301a8f319225c2caafb506eec6b57ef9e RLBA-2023:0124 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Analyzer: Optimize and remove duplicate messages in verbose list (BZ#2139871) * SSSD: `sssctl analyze` command shouldn't require 'root' privileged (BZ#2142961) * UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around (BZ#2148989) * authenticating against external IdP services okta (native app) with OAuth client secret failed (BZ#2152883) none-baseos-rpms libipa_hbac-2.7.3-4.el8_7.3.aarch64.rpm 7dabc262cc08afb60171c9b92ea30096f551db55a39b9a65cb5cfc6076c60877 libsss_autofs-2.7.3-4.el8_7.3.aarch64.rpm 16ce414b8e864d62505d47b2dbbc3d15040e2034fa66d855276f1bf5f288e0d8 libsss_certmap-2.7.3-4.el8_7.3.aarch64.rpm f1da81d814f7c67a4e7bff0783b9906ac88b37eab357a0a888df3cd0ed8e145f libsss_idmap-2.7.3-4.el8_7.3.aarch64.rpm a32e2ad1cc5487a8f324279ecdffe2cf52c018f8677a3fff8efcd8f5240c4546 libsss_nss_idmap-2.7.3-4.el8_7.3.aarch64.rpm a13c5c4e365d3ee4e7e0e69978dd16374b5274602f90c829401b5cff4384a436 libsss_simpleifp-2.7.3-4.el8_7.3.aarch64.rpm 858a71ca604a28237f6ec31d94d26175cdebe69d90e5a1a21aba85431dc70446 libsss_sudo-2.7.3-4.el8_7.3.aarch64.rpm bf7df035b7a78f7383eeae21c6b6fa8f75d477bfc362465097a2ccd3a553c2b3 python3-libipa_hbac-2.7.3-4.el8_7.3.aarch64.rpm 4e4cebe951fcf35222ed7835d33b9dd2117fa1d7c0b19c7a59cd86e1c8354d93 python3-libsss_nss_idmap-2.7.3-4.el8_7.3.aarch64.rpm 0d5d758524854df329cca7dac78b1ad617fb808e5e485988cda2c6b2c29ca00b python3-sss-2.7.3-4.el8_7.3.aarch64.rpm 4033a1c11e8e7c53d9b396008e2136c2981353cfb0d836bee9a61b90b6acf7b9 python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm 3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b python3-sssdconfig-2.7.3-4.el8_7.3.noarch.rpm 3f970ce3ad4b982366c148cf5018cc84fe95ef2806a4ace624ac1aeeaf83841b python3-sss-murmur-2.7.3-4.el8_7.3.aarch64.rpm 7a6dac950aab9af103943d12ace1e541d2d0d7012933d6856e586ef0245c753b sssd-2.7.3-4.el8_7.3.aarch64.rpm bc66608ce5c266858eaff4948e6140c7c464b6b50e097d645383227861dea318 sssd-ad-2.7.3-4.el8_7.3.aarch64.rpm f6c1a5786e2f173c176b61ea1270173a6cd7fb1c80930b33597ae2c75891efad sssd-client-2.7.3-4.el8_7.3.aarch64.rpm 6307f60b1d2dc2cf01c1ea747c4eb5508f3e7d8e102a75e92f6a4a9baded8307 sssd-common-2.7.3-4.el8_7.3.aarch64.rpm 159bf4fb7bca589ecf093898345c3837690143d4e8edad5e25915bb49cac9b68 sssd-common-pac-2.7.3-4.el8_7.3.aarch64.rpm 16a46dd7194e3f285bfa5b57ef3fc88a4f11c8a1a844694ee6b1faea4326f3f2 sssd-dbus-2.7.3-4.el8_7.3.aarch64.rpm 13e27f35733a71a97283e9d24b8acf01ea8ff19efeb16c58bb2934f22bbc1902 sssd-ipa-2.7.3-4.el8_7.3.aarch64.rpm d2966b63f55efe752c625b4ca0cc344be30b1b83bfc37a69996e85f9f16b6dca sssd-kcm-2.7.3-4.el8_7.3.aarch64.rpm 5f68298e608d8fe536bd76ef738d78f4691a6f73da4a399e9f2c7354cf139cf0 sssd-krb5-2.7.3-4.el8_7.3.aarch64.rpm c366c7d78729154a05b2c01a67bd7dbe7b5d1cdb012e46eef012bf30de9fc028 sssd-krb5-common-2.7.3-4.el8_7.3.aarch64.rpm a7a152f20adfd3520151e27aaf409d8a083ee3e2caf677647da66afcc3604934 sssd-ldap-2.7.3-4.el8_7.3.aarch64.rpm 01434bae2c68af104962ff129ba83557492526a7690738127c9203ee61219e4b sssd-nfs-idmap-2.7.3-4.el8_7.3.aarch64.rpm 9d4b207c51c5bf6c44874837f7ff2121abfff1f24bfe8ceafa839fc3fa96d3e1 sssd-polkit-rules-2.7.3-4.el8_7.3.aarch64.rpm ba8d53e20c0ba9cdb668df0b522197ce95f71dd7a62ae56238f573e126e9ddba sssd-proxy-2.7.3-4.el8_7.3.aarch64.rpm 4a4ed6066660bdce3a04493788167b70de06064612d8cbc8a6b0b80e6f415cce sssd-tools-2.7.3-4.el8_7.3.aarch64.rpm 411ef474850a6250fa3f1d6333c9967f71077fd959cb64872acdce2a1b56ea5c sssd-winbind-idmap-2.7.3-4.el8_7.3.aarch64.rpm eda0f7ae463df47c5831aa6f1805504eba7a302d578d3ce565c3f769b10ae1bb RLSA-2023:0173 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows with XML_PARSE_HUGE (CVE-2022-40303) * libxml2: dict corruption caused by entity reference cycles (CVE-2022-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-15.el8_7.1.aarch64.rpm 8082aca701eace0d912c01aac15728280e0f2876aa1038d93e235bfd34545d99 python3-libxml2-2.9.7-15.el8_7.1.aarch64.rpm a74dc2f40eec968c29cb4cdfa2886138c881a46a1e441c03183d1a4dcfb2f31d RLSA-2023:0284 Important: sudo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sudo-1.8.29-8.el8_7.1.aarch64.rpm 2e036b6b7181b3837fae5ed883f13df10df2ebf32170fc3fbc85d68e0a994677 RLBA-2020:1789 python-dns bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms python3-dns-1.15.0-10.el8.noarch.rpm ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94 python3-dns-1.15.0-10.el8.noarch.rpm ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94 python3-dns-1.15.0-10.el8.noarch.rpm ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94 python3-dns-1.15.0-10.el8.noarch.rpm ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94 python3-dns-1.15.0-10.el8.noarch.rpm ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94 python3-dns-1.15.0-10.el8.noarch.rpm ceebdf592ff9e994e11c1c1941f3e3700b3ff3c606078b01ee9af62ce3d51e94 RLBA-2021:4402 opencsd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencsd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms opencsd-1.0.0-4.el8.aarch64.rpm 0eab55e32ce2f92bf7d376f9097e89a2ab12d70d60b3fd3111d85a6ff4f37143 opencsd-1.0.0-4.el8.aarch64.rpm 0eab55e32ce2f92bf7d376f9097e89a2ab12d70d60b3fd3111d85a6ff4f37143 opencsd-1.0.0-4.el8.aarch64.rpm 0eab55e32ce2f92bf7d376f9097e89a2ab12d70d60b3fd3111d85a6ff4f37143 RLSA-2025:16919 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: nfsd: don't ignore the return code of svc_proc_register() (CVE-2025-22026) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (CVE-2022-50087) * kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.77.1.el8_10.aarch64.rpm daaee0f83325c5cf5317f177b3d77302fad585d620a8133e713cd0069adfda58 kernel-4.18.0-553.77.1.el8_10.aarch64.rpm bcd35620dc56f8b7d0f1fc9a9b5c0c3b7e316385c7fb17843acfe1e7cffe5e88 kernel-abi-stablelists-4.18.0-553.77.1.el8_10.noarch.rpm 078767be542af308823766dbac2ef9306787c7b49eac5e3d2a92918b069a913e kernel-abi-stablelists-4.18.0-553.77.1.el8_10.noarch.rpm 078767be542af308823766dbac2ef9306787c7b49eac5e3d2a92918b069a913e kernel-core-4.18.0-553.77.1.el8_10.aarch64.rpm ee03b4469785d34285c6af93776ea3d4666fce98891f6c279db80594f4fdd93f kernel-debug-4.18.0-553.77.1.el8_10.aarch64.rpm 749f6b79a1b98fb77b089db4cbb038cbc718bacd5c03b698e51b08558722da39 kernel-debug-core-4.18.0-553.77.1.el8_10.aarch64.rpm 8e3e2cec21c70fa05ec63180cfb451f656ccbac634fe6420e3a2754fe1b82241 kernel-debug-devel-4.18.0-553.77.1.el8_10.aarch64.rpm a7c568dd61bb0dba4c797795bd4fef85111da9eb3e49b4456d234b214796347a kernel-debuginfo-common-aarch64-4.18.0-553.77.1.el8_10.aarch64.rpm 123c5ccfebd8717b4675a1fcdffe24ed4c718cd87a510e36119a74ac10b1e2af kernel-debug-modules-4.18.0-553.77.1.el8_10.aarch64.rpm fcbc156413f77b7c40e6e685f889c758313311d3e94988435ec8a782ed291a24 kernel-debug-modules-extra-4.18.0-553.77.1.el8_10.aarch64.rpm d333c6647066b732fe0f080ad47e1890274235adf774f731a197ffd2d4cc25ae kernel-devel-4.18.0-553.77.1.el8_10.aarch64.rpm c328a7598c48423b06ef8b5fae88f7ad36222a0f398bfe2fe41d53fd01163296 kernel-doc-4.18.0-553.77.1.el8_10.noarch.rpm bc2e315e1c24da8e83ccd5d84711eee1a5914e3126d2cfc7485bd353e3aa54eb kernel-doc-4.18.0-553.77.1.el8_10.noarch.rpm bc2e315e1c24da8e83ccd5d84711eee1a5914e3126d2cfc7485bd353e3aa54eb kernel-modules-4.18.0-553.77.1.el8_10.aarch64.rpm 0d90f3ab1591980451332d979b21096580a80739bbb94ce4144e17a9839781a1 kernel-modules-extra-4.18.0-553.77.1.el8_10.aarch64.rpm 25d28d56c15d94e431bcc80568751e5fed8f9d6f9f5a950a97ef5dfa120c834e kernel-tools-4.18.0-553.77.1.el8_10.aarch64.rpm 770457a91751b75d3bdebd61a83640fe0f0aa21e647ea8b89cd04971a095cff5 kernel-tools-libs-4.18.0-553.77.1.el8_10.aarch64.rpm 16e9779a79dc84949aa59de8614e046fb013a08efcc35010390bba36572ab579 perf-4.18.0-553.77.1.el8_10.aarch64.rpm e3c2cdb440bd7ab2f2f4fcfbac6b2fd7b0495f2b03f46d14e8d45620c58b45ef python3-perf-4.18.0-553.77.1.el8_10.aarch64.rpm c19fdddcb982412c1f4a9bf304c099e8143bb6616f43f4d4c8ebf34e76fd9b23 RLBA-2022:1032 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022a, which addresses recent time zone changes. Notably: * In Palestine the daylight saving time (DST) starts on March 27, 2022, not on March 26. * The zdump -v command now outputs better failure information. * This update provides fixes for a code that read corrupted TZif data. none-baseos-rpms tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 RLSA-2022:1065 Important: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-1.1.1k-6.el8_5.aarch64.rpm e38c87e6fac04baeb6ce58c4f9e0f60da5788f6f4ed6816a6523a7263633a0b4 openssl-1.1.1k-6.el8_5.aarch64.rpm e38c87e6fac04baeb6ce58c4f9e0f60da5788f6f4ed6816a6523a7263633a0b4 openssl-devel-1.1.1k-6.el8_5.aarch64.rpm 9accd806730f3678ffb259a8ff148ffe5311e5153319f0a1b42a3a03e7b3602e openssl-devel-1.1.1k-6.el8_5.aarch64.rpm 9accd806730f3678ffb259a8ff148ffe5311e5153319f0a1b42a3a03e7b3602e openssl-libs-1.1.1k-6.el8_5.aarch64.rpm 22c6088e067771688b5a073445d7a42afa4d7969ebd175eaa08770425034e5f4 openssl-libs-1.1.1k-6.el8_5.aarch64.rpm 22c6088e067771688b5a073445d7a42afa4d7969ebd175eaa08770425034e5f4 openssl-perl-1.1.1k-6.el8_5.aarch64.rpm 51bd03d822c5038388a518e9ee079fbd0d19d7dcda5ae9fc352d174d0f931f4f openssl-perl-1.1.1k-6.el8_5.aarch64.rpm 51bd03d822c5038388a518e9ee079fbd0d19d7dcda5ae9fc352d174d0f931f4f RLSA-2025:17415 Moderate: gnutls security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: Vulnerability in GnuTLS certtool template parsing (CVE-2025-32990) * gnutls: Vulnerability in GnuTLS otherName SAN export (CVE-2025-32988) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (CVE-2025-6395) Bug Fix(es) and Enhancement(s): * gnutls: Vulnerability in GnuTLS certtool template parsing (BZ#2359620) * gnutls: Vulnerability in GnuTLS otherName SAN export (BZ#2359622) * gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite() (BZ#2376755) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.16-8.el8_10.4.aarch64.rpm 7f3a8da2285f51cd5d91c56a42b3505cd49723e0800c9653064ad7671f3f7094 RLSA-2025:17715 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Vim path traversal (CVE-2025-53906) * vim: Vim path traversial (CVE-2025-53905) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms vim-minimal-8.0.1763-21.el8_10.aarch64.rpm 005ee4d6d813228a74727218e24dd765770b9f7db2d4df354029ddfae58c9b72 RLSA-2026:1142 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth: hci_event: call disconnect callback before deleting conn (CVE-2023-53673) * kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (CVE-2025-40154) * kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248) * kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (CVE-2025-40277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.97.1.el8_10.aarch64.rpm 2321d153f66ae79d7fa00e1288bcdb61dd3cf3e802e2e6d71a0b2f95074858a7 kernel-4.18.0-553.97.1.el8_10.aarch64.rpm 64481e2a4f8adda8831c60530cf31aefcad2b670d2d5eafeb125aeabd1491ed8 kernel-abi-stablelists-4.18.0-553.97.1.el8_10.noarch.rpm 65a5cd428cf1947e9dd544c8b9dd8e12c423b0aa14fd203f01713c601ae85424 kernel-abi-stablelists-4.18.0-553.97.1.el8_10.noarch.rpm 65a5cd428cf1947e9dd544c8b9dd8e12c423b0aa14fd203f01713c601ae85424 kernel-core-4.18.0-553.97.1.el8_10.aarch64.rpm cccb49fa0f99bb1fbb71fbd0cfb029213bfc7c6315f4b637955f53dbacd241d1 kernel-debug-4.18.0-553.97.1.el8_10.aarch64.rpm d63c700b4b15de6e1e7f312673f7bd577e5712775184ca52774f5c299928938a kernel-debug-core-4.18.0-553.97.1.el8_10.aarch64.rpm 9378022d54f127a304c77f2f00e5ffd66bc98c8e30aedda683172ffc7dd74764 kernel-debug-devel-4.18.0-553.97.1.el8_10.aarch64.rpm 1ba6ac021a7873466a2b0c0a76b4f98e2581e0a4ebf10f06f2e347cc50b98773 kernel-debuginfo-common-aarch64-4.18.0-553.97.1.el8_10.aarch64.rpm e9aa735d88c941070cdd2c739de1514fd40c6cd0ecf7f7e4afd1ee9d52f32aab kernel-debug-modules-4.18.0-553.97.1.el8_10.aarch64.rpm 0944d58544be5724434a4d1d6ec6905231b224d0e9eb6c0661d7ef27a928c94d kernel-debug-modules-extra-4.18.0-553.97.1.el8_10.aarch64.rpm 7bb436a63d2fb83d6e1d23a57fc562cb30e66b1495dfea240c46ed336afb0776 kernel-devel-4.18.0-553.97.1.el8_10.aarch64.rpm 1f85cfffba40ed0d60b296478d7c7ae0a03ad364152a10d35f9338b55ac1bd5a kernel-doc-4.18.0-553.97.1.el8_10.noarch.rpm f191c4d25213893245eab9419ac3f58138bb8346f99dd575dcd4786882012474 kernel-doc-4.18.0-553.97.1.el8_10.noarch.rpm f191c4d25213893245eab9419ac3f58138bb8346f99dd575dcd4786882012474 kernel-modules-4.18.0-553.97.1.el8_10.aarch64.rpm 35deb2cad8ecc07cd586afc83ec1057d3104888bbe1553d1fcdc4d4ce59759c6 kernel-modules-extra-4.18.0-553.97.1.el8_10.aarch64.rpm 96abbebdf2f942c7232236ae82adbcd3c2de1b081d4a5cca2b58cad8cabe1e35 kernel-tools-4.18.0-553.97.1.el8_10.aarch64.rpm 0f41057eff848a96b8c7330f4733aabaf8bbb9f177cf21930eac1ee1b7fb81a0 kernel-tools-libs-4.18.0-553.97.1.el8_10.aarch64.rpm 31839028108619fa536404636b876ce63198ab58cc8da00c947f32b596a35d8f perf-4.18.0-553.97.1.el8_10.aarch64.rpm 146dfaee613c77fe74bc7ca08b9efbed663f935c33de52aff3bd0c741191c107 python3-perf-4.18.0-553.97.1.el8_10.aarch64.rpm 4242b28970a3036c251b82b490a8a99a3803a273a9b93edde31d3416807ff1c6 RLBA-2019:3595 cronie bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cronie. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms cronie-1.5.2-4.el8.aarch64.rpm b30155c3837c1a7730ab33d5718cc38ea5dac24017cda108a49e8a7d15f86e98 cronie-1.5.2-4.el8.aarch64.rpm b30155c3837c1a7730ab33d5718cc38ea5dac24017cda108a49e8a7d15f86e98 cronie-anacron-1.5.2-4.el8.aarch64.rpm 05e6e47a384fc57cd9ed22402c845034a74701ab77ebc59f2aee0afedf7fe603 cronie-anacron-1.5.2-4.el8.aarch64.rpm 05e6e47a384fc57cd9ed22402c845034a74701ab77ebc59f2aee0afedf7fe603 cronie-noanacron-1.5.2-4.el8.aarch64.rpm b6181970ac8c14f6bab5fbd07631165404b4af6475b4cb877c752b22bf22db48 cronie-noanacron-1.5.2-4.el8.aarch64.rpm b6181970ac8c14f6bab5fbd07631165404b4af6475b4cb877c752b22bf22db48 RLBA-2019:3653 libuser bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libuser-0.62-23.el8.aarch64.rpm 0b9fbb64dd4905adc612fdd5b64498692da285d84811c6969778e81caac06bb7 libuser-0.62-23.el8.aarch64.rpm 0b9fbb64dd4905adc612fdd5b64498692da285d84811c6969778e81caac06bb7 python3-libuser-0.62-23.el8.aarch64.rpm b89461ffc46ac641f8867a41abc80599a7c2075a013bfcb42260c73ec60ca979 python3-libuser-0.62-23.el8.aarch64.rpm b89461ffc46ac641f8867a41abc80599a7c2075a013bfcb42260c73ec60ca979 RLBA-2019:3666 libtirpc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libtirpc-1.1.4-4.el8.aarch64.rpm 23c26b178170fd75d731eb763993d66c81b8cc8183f4b9be1010180afff4f591 libtirpc-devel-1.1.4-4.el8.aarch64.rpm fb13645792e48ec4b61c28a515a69eecbfc1f6b48f12145b2400bbd817746cbb RLSA-2019:3673 Low: lldpad security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for lldpad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lldpad packages provide the Linux user space daemon and configuration tool for Intel's Link Layer Discovery Protocol (LLDP) Agent with Enhanced Ethernet support. Security Fix(es): * lldptool: improper sanitization of shell-escape codes (CVE-2018-10932) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms lldpad-1.0.1-13.git036e314.el8.aarch64.rpm 053230d8df702b238126562e99547f83150405f745441b6e1193e86f6adf07f8 RLBA-2019:3679 parted bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for parted. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms parted-3.2-38.el8.aarch64.rpm 563bd0562ef7452ea37378d92c2564d3be38866bdd8d732a4229f0aef80fc926 RLSA-2019:3706 Moderate: lua security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for lua. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Security Fix(es): * lua: use-after-free in lua_upvaluejoin in lapi.c resulting in denial of service (CVE-2019-6706) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms lua-libs-5.3.4-11.el8.aarch64.rpm c905522a3371a6cb8a839296af7648e4132b25d603dc98b6e4cdc0b2384a08e6 RLSA-2020:0903 Important: zsh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more. Security Fix(es): * zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms zsh-5.5.1-6.el8_1.2.aarch64.rpm 1e7fc0c16d64fdfc916f3f987982d44e1f0b7d455a7497956db2c6b3610f2730 zsh-5.5.1-6.el8_1.2.aarch64.rpm 1e7fc0c16d64fdfc916f3f987982d44e1f0b7d455a7497956db2c6b3610f2730 RLBA-2020:1762 rng-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms rng-tools-6.8-3.el8.aarch64.rpm 2b7ebfef95abbd5a4dab3236b2d0ef9744a3b3f49453a91d3530f8c1f7f10cf1 RLEA-2020:1763 libnftnl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnftnl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms libnftnl-1.1.5-4.el8.aarch64.rpm bc9ad606fcd39f981a45d8c1a3ddfdb5e0283d02d79b46fecc4165d94328b1ef libnftnl-1.1.5-4.el8.aarch64.rpm bc9ad606fcd39f981a45d8c1a3ddfdb5e0283d02d79b46fecc4165d94328b1ef RLBA-2020:1813 libcap-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms libcap-ng-0.7.9-5.el8.aarch64.rpm ae7e473681b9084dd18b14561bcd5e03615b5601bf485af4bc6471af7ba69dfe libcap-ng-devel-0.7.9-5.el8.aarch64.rpm 11126934c136235be6385fc9bd5de0a186e7c68879d754567e50281c7b4a33c0 libcap-ng-utils-0.7.9-5.el8.aarch64.rpm af8ca6645485cfee348b86860bd1ccce91cb712b1d3f79189c17aa720a2bf176 RLBA-2020:1847 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libnl3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section. none-baseos-rpms libnl3-3.5.0-1.el8.aarch64.rpm 9bc0781de71722a94e1813fadc3b63f86f50911fbd7a1718782615dbb894beb3 libnl3-3.5.0-1.el8.aarch64.rpm 9bc0781de71722a94e1813fadc3b63f86f50911fbd7a1718782615dbb894beb3 libnl3-3.5.0-1.el8.aarch64.rpm 9bc0781de71722a94e1813fadc3b63f86f50911fbd7a1718782615dbb894beb3 libnl3-cli-3.5.0-1.el8.aarch64.rpm b1afdb21091b1edaaa8de7f8f33096744ad6514a052152f51f835638ccbb4178 libnl3-cli-3.5.0-1.el8.aarch64.rpm b1afdb21091b1edaaa8de7f8f33096744ad6514a052152f51f835638ccbb4178 libnl3-cli-3.5.0-1.el8.aarch64.rpm b1afdb21091b1edaaa8de7f8f33096744ad6514a052152f51f835638ccbb4178 libnl3-devel-3.5.0-1.el8.aarch64.rpm b2dd59aeb920e39d52839dd588598b2d4a2b716579e23e714da465f03d263638 libnl3-devel-3.5.0-1.el8.aarch64.rpm b2dd59aeb920e39d52839dd588598b2d4a2b716579e23e714da465f03d263638 libnl3-devel-3.5.0-1.el8.aarch64.rpm b2dd59aeb920e39d52839dd588598b2d4a2b716579e23e714da465f03d263638 libnl3-doc-3.5.0-1.el8.aarch64.rpm 2140d16501d2bc7f9de193f20f4a6fb22509a352e834620105ce7af6dd3a1d23 libnl3-doc-3.5.0-1.el8.aarch64.rpm 2140d16501d2bc7f9de193f20f4a6fb22509a352e834620105ce7af6dd3a1d23 libnl3-doc-3.5.0-1.el8.aarch64.rpm 2140d16501d2bc7f9de193f20f4a6fb22509a352e834620105ce7af6dd3a1d23 python3-libnl3-3.5.0-1.el8.aarch64.rpm aac0e35ba1e887e2418ca6d4d0375e258c03f1d943baa9abfe92fad98293a8fd python3-libnl3-3.5.0-1.el8.aarch64.rpm aac0e35ba1e887e2418ca6d4d0375e258c03f1d943baa9abfe92fad98293a8fd python3-libnl3-3.5.0-1.el8.aarch64.rpm aac0e35ba1e887e2418ca6d4d0375e258c03f1d943baa9abfe92fad98293a8fd RLBA-2020:1851 which bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for which. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms which-2.21-12.el8.aarch64.rpm 230eaa220e73f0aad515770872f8d08ea7660ef2c054abe093188b9d7acd1fae RLBA-2020:1898 sg3_utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sg3_utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms sg3_utils-1.44-5.el8.aarch64.rpm a3325f9312aa59ce40eaecdf5c0f5e6b75ef2832c2f803af09e814bef5c221fb sg3_utils-1.44-5.el8.aarch64.rpm a3325f9312aa59ce40eaecdf5c0f5e6b75ef2832c2f803af09e814bef5c221fb sg3_utils-1.44-5.el8.aarch64.rpm a3325f9312aa59ce40eaecdf5c0f5e6b75ef2832c2f803af09e814bef5c221fb sg3_utils-libs-1.44-5.el8.aarch64.rpm 64970df8c90d4da0bbb1df35507b82e257435c4b1f71a83be310dbc34016535d sg3_utils-libs-1.44-5.el8.aarch64.rpm 64970df8c90d4da0bbb1df35507b82e257435c4b1f71a83be310dbc34016535d sg3_utils-libs-1.44-5.el8.aarch64.rpm 64970df8c90d4da0bbb1df35507b82e257435c4b1f71a83be310dbc34016535d RLBA-2020:1904 texinfo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for texinfo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms info-6.5-6.el8.aarch64.rpm 4f667f7130cdba2ede2d4fea5f2719a817b08467e77d1b5cc6aa9523d949b1a6 info-6.5-6.el8.aarch64.rpm 4f667f7130cdba2ede2d4fea5f2719a817b08467e77d1b5cc6aa9523d949b1a6 RLBA-2020:1906 passwd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for passwd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms passwd-0.80-3.el8.aarch64.rpm a35df44cfd5002d192e78a229b674fe0fcbe0793763fb696ce7d2930fe6bf6dd passwd-0.80-3.el8.aarch64.rpm a35df44cfd5002d192e78a229b674fe0fcbe0793763fb696ce7d2930fe6bf6dd RLBA-2020:1911 make bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for make. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.2 Release Notes linked from the References section. none-baseos-rpms make-4.2.1-10.el8.aarch64.rpm 16636fa2be420066e8c27b090438357b251514e7e252b4fb24209223a0a7d803 make-4.2.1-10.el8.aarch64.rpm 16636fa2be420066e8c27b090438357b251514e7e252b4fb24209223a0a7d803 make-devel-4.2.1-10.el8.aarch64.rpm 6da088155250b171a41cd859419bbea005cb1a156087675f65559350704ed073 make-devel-4.2.1-10.el8.aarch64.rpm 6da088155250b171a41cd859419bbea005cb1a156087675f65559350704ed073 RLBA-2020:3380 ca-certificates bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ca-certificates. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Annual Rocky Linux 8 ca-certificates update 2020 to nss 3.53 for Firefox 78 (BZ#1849732) * circular dependency, ca-certificates req coreutils req openssl-libs req ca-certificates, missing ln (BZ#1849824) none-baseos-rpms ca-certificates-2020.2.41-80.0.el8_2.noarch.rpm 1ddbafc0de6a5143e97eb9540a7a325637e95d006df9007f79fd2068bfe942bd ca-certificates-2020.2.41-80.0.el8_2.noarch.rpm 1ddbafc0de6a5143e97eb9540a7a325637e95d006df9007f79fd2068bfe942bd RLBA-2020:4447 lz4 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lz4. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms lz4-1.8.3-2.el8.aarch64.rpm 157908ceb128f912f75f595fcd9a844ce2fba8d93f374caf4cfa6169f4c06842 lz4-devel-1.8.3-2.el8.aarch64.rpm f9c9d0b0a2c7aabb0aa07867fad070996232bd3d6e8242b9e7bef2ae4b50b0e9 lz4-libs-1.8.3-2.el8.aarch64.rpm a190a5a7d60093b0097f98eb51050557e09f6035b979924264804f254e59a596 RLBA-2020:4450 rasdaemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rasdaemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms rasdaemon-0.6.1-5.el8.aarch64.rpm b5053317e1115475d0db53782b09e563b0f64bf0ae80669ff539c87d4648135c RLSA-2020:4453 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode (CVE-2019-20807) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms vim-minimal-8.0.1763-15.el8.aarch64.rpm c238d13428ac5ad5dc40748abc168898385c26e939eb62847150dd35c31c4bc1 RLBA-2020:4454 coreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms coreutils-8.30-8.el8.aarch64.rpm 8a32a480b073fb866d935ffb674ad62db540087433ae852e5819e9cf3c369ae7 coreutils-common-8.30-8.el8.aarch64.rpm 3cdcbcef74f5f2e3615747192bb95cd1fb07533f4b4e211960acbf8320a90231 coreutils-single-8.30-8.el8.aarch64.rpm 4e0aa8a53e0d4464b98fd2356596bddb3baf189eaf8afc758d886894969ec53e RLBA-2020:4455 chkconfig bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chkconfig. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms chkconfig-1.13-2.el8.aarch64.rpm 04afbe26a049f2c43c9d948ea9ff370671f2b1a5ed89ec32529f1ffa5626da87 ntsysv-1.13-2.el8.aarch64.rpm bb449e37b8a71305be2dd17590fe06cd70f28d3e0fc4a79f126e23dbeacff517 RLBA-2020:4458 setup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms setup-2.12.2-6.el8.noarch.rpm c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71 setup-2.12.2-6.el8.noarch.rpm c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71 setup-2.12.2-6.el8.noarch.rpm c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71 setup-2.12.2-6.el8.noarch.rpm c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71 setup-2.12.2-6.el8.noarch.rpm c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71 setup-2.12.2-6.el8.noarch.rpm c8120de8165ef1fa3665d09a0f41aecd9fcb25a857af5d62a1c008ba32814d71 RLSA-2020:4469 Low: cups security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c (CVE-2020-3898) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms cups-libs-2.2.6-38.el8.aarch64.rpm 0cfa810d0377951469bca6875798316def51675e079308af605121c41b7b775b RLBA-2020:4477 filesystem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for filesystem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms filesystem-3.8-3.el8.aarch64.rpm 08f5edb9ceadbf22254a5c9859aa6d21c19da5b1ef076bed7460a4774b57a743 RLSA-2020:4482 Moderate: libgcrypt security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. The following packages have been upgraded to a later upstream version: libgcrypt (1.8.5). (BZ#1764918) Security Fix(es): * libgcrypt: ECDSA timing attack allowing private key leak (CVE-2019-13627) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libgcrypt-1.8.5-4.el8.aarch64.rpm 63d4851c4d15a4591173f73b779326c0181876a0934dc1a2381d35385297052e libgcrypt-devel-1.8.5-4.el8.aarch64.rpm 51cb59f4cf19eba8605539be5454513c02158338f0f7762421f10d49d3840ba9 RLSA-2020:4484 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843) * expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms expat-2.2.5-4.el8.aarch64.rpm f012c36676c6f8e75d80c8dc25195a017931d6af492bbfdf4be93bc698597262 expat-2.2.5-4.el8.aarch64.rpm f012c36676c6f8e75d80c8dc25195a017931d6af492bbfdf4be93bc698597262 expat-devel-2.2.5-4.el8.aarch64.rpm c489a91effd59ff55d7c236c8bd1e08244a9cc3b3125297e326b3229c8d2096b expat-devel-2.2.5-4.el8.aarch64.rpm c489a91effd59ff55d7c236c8bd1e08244a9cc3b3125297e326b3229c8d2096b RLSA-2020:4490 Moderate: gnupg2 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnupg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. The following packages have been upgraded to a later upstream version: gnupg2 (2.2.20). (BZ#1663944) Security Fix(es): * GnuPG: interaction between the sks-keyserver code and GnuPG allows for a Certificate Spamming Attack which leads to persistent DoS (CVE-2019-13050) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms gnupg2-2.2.20-2.el8.aarch64.rpm 41f54b19fe771cbe6661a9626da61fd4942b8de9c9d24fb7fe5710cecee36ab1 gnupg2-2.2.20-2.el8.aarch64.rpm 41f54b19fe771cbe6661a9626da61fd4942b8de9c9d24fb7fe5710cecee36ab1 gnupg2-2.2.20-2.el8.aarch64.rpm 41f54b19fe771cbe6661a9626da61fd4942b8de9c9d24fb7fe5710cecee36ab1 gnupg2-smime-2.2.20-2.el8.aarch64.rpm 9980bb8f10cce7123a831ca53e3fa6dd017da7eec057801b27eb7fb6451a204a gnupg2-smime-2.2.20-2.el8.aarch64.rpm 9980bb8f10cce7123a831ca53e3fa6dd017da7eec057801b27eb7fb6451a204a gnupg2-smime-2.2.20-2.el8.aarch64.rpm 9980bb8f10cce7123a831ca53e3fa6dd017da7eec057801b27eb7fb6451a204a RLSA-2020:4497 Moderate: cyrus-sasl security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cyrus-sasl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cyrus-sasl packages contain the Cyrus implementation of Simple Authentication and Security Layer (SASL). SASL is a method for adding authentication support to connection-based protocols. Security Fix(es): * cyrus-sasl: denial of service in _sasl_add_string function (CVE-2019-19906) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms cyrus-sasl-2.1.27-5.el8.aarch64.rpm be719f524321dac98bddbfa706508a058be4c1486f6e337c064e6c25d6d81260 cyrus-sasl-2.1.27-5.el8.aarch64.rpm be719f524321dac98bddbfa706508a058be4c1486f6e337c064e6c25d6d81260 cyrus-sasl-devel-2.1.27-5.el8.aarch64.rpm 5915184637f030681a3cafc108e8217485ccf520a81a194302bdd141b64ff72d cyrus-sasl-devel-2.1.27-5.el8.aarch64.rpm 5915184637f030681a3cafc108e8217485ccf520a81a194302bdd141b64ff72d cyrus-sasl-gs2-2.1.27-5.el8.aarch64.rpm fc0c66f94eb03ff9bd03924b7e355d111dce680c21ff4e02a11e077f085f8ec9 cyrus-sasl-gs2-2.1.27-5.el8.aarch64.rpm fc0c66f94eb03ff9bd03924b7e355d111dce680c21ff4e02a11e077f085f8ec9 cyrus-sasl-gssapi-2.1.27-5.el8.aarch64.rpm 927896e65c446ac2293837afcdc19152986ecbb617c85bec9c655aee86deef96 cyrus-sasl-gssapi-2.1.27-5.el8.aarch64.rpm 927896e65c446ac2293837afcdc19152986ecbb617c85bec9c655aee86deef96 cyrus-sasl-ldap-2.1.27-5.el8.aarch64.rpm 3385815674c85091d5c09e4d74e544fe437441fd1ab525f33856dd0ba8cc6f19 cyrus-sasl-ldap-2.1.27-5.el8.aarch64.rpm 3385815674c85091d5c09e4d74e544fe437441fd1ab525f33856dd0ba8cc6f19 cyrus-sasl-lib-2.1.27-5.el8.aarch64.rpm cc19f74575de0e3c36b770e829a2bbdfe306f887419cc2b58aa9b1ee4e89b67b cyrus-sasl-lib-2.1.27-5.el8.aarch64.rpm cc19f74575de0e3c36b770e829a2bbdfe306f887419cc2b58aa9b1ee4e89b67b cyrus-sasl-md5-2.1.27-5.el8.aarch64.rpm 6bad3e60e70913d4143f5b518137e812428293df3bbeccb804c9204da0b56ea4 cyrus-sasl-md5-2.1.27-5.el8.aarch64.rpm 6bad3e60e70913d4143f5b518137e812428293df3bbeccb804c9204da0b56ea4 cyrus-sasl-ntlm-2.1.27-5.el8.aarch64.rpm 5ffc8f3a341e03d40865d40c0eb06275b8d68af12a3098416b6b64562019bc93 cyrus-sasl-ntlm-2.1.27-5.el8.aarch64.rpm 5ffc8f3a341e03d40865d40c0eb06275b8d68af12a3098416b6b64562019bc93 cyrus-sasl-plain-2.1.27-5.el8.aarch64.rpm 92a85248430223fcfba02d6e36658aa05c5cc49b76f8a5d9139675e08fd95777 cyrus-sasl-plain-2.1.27-5.el8.aarch64.rpm 92a85248430223fcfba02d6e36658aa05c5cc49b76f8a5d9139675e08fd95777 cyrus-sasl-scram-2.1.27-5.el8.aarch64.rpm e3b639e61875ece5af8d84ad2ac51c8f4873c71e47054d0e86641c5c7afbeb23 cyrus-sasl-scram-2.1.27-5.el8.aarch64.rpm e3b639e61875ece5af8d84ad2ac51c8f4873c71e47054d0e86641c5c7afbeb23 RLBA-2020:4498 numactl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms numactl-2.0.12-11.el8.aarch64.rpm e77c94d1a9df7142a00bf1cdf84da1481848ebb118a08faf3eb7e7d061f39a16 numactl-devel-2.0.12-11.el8.aarch64.rpm f7d4d29f168f2aaff8fbf616bcb39d645b3d5bb8a16dde5226d9509a19eb6a0d numactl-libs-2.0.12-11.el8.aarch64.rpm d41f625a63521dc587f7fcdc7e927e23244d27646e6150b11e52cff9381b9c05 RLBA-2020:4502 grubby bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms grubby-8.40-41.el8.aarch64.rpm 147fa2e469aa886caa9bb66236022c82e0da6b6a9d27fa3ccf0920f03eb0d379 RLBA-2020:4515 libffi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libffi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libffi-3.1-22.el8.aarch64.rpm 4feaa4fd7c195eebc94dd704cffb0ebd1da888e66d1408d1f156500e12e659b0 libffi-3.1-22.el8.aarch64.rpm 4feaa4fd7c195eebc94dd704cffb0ebd1da888e66d1408d1f156500e12e659b0 libffi-devel-3.1-22.el8.aarch64.rpm 093d2eb49dac570c25f94dacb519905b7c68af074302eae9319aa08f23a0e91c libffi-devel-3.1-22.el8.aarch64.rpm 093d2eb49dac570c25f94dacb519905b7c68af074302eae9319aa08f23a0e91c RLEA-2020:4516 memstrack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for memstrack. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms memstrack-0.1.11-1.el8.aarch64.rpm 99f43cf65fefeedd568dff3bb5175f456eb2f677c661544f41e4fdcf78e6734c memstrack-0.1.11-1.el8.aarch64.rpm 99f43cf65fefeedd568dff3bb5175f456eb2f677c661544f41e4fdcf78e6734c memstrack-0.1.11-1.el8.aarch64.rpm 99f43cf65fefeedd568dff3bb5175f456eb2f677c661544f41e4fdcf78e6734c RLBA-2020:4517 sed bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sed. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms sed-4.5-2.el8.aarch64.rpm a29c8f0a4d282a450df250df20e2028411309453236fa4b6dcd173483519fa41 sed-4.5-2.el8.aarch64.rpm a29c8f0a4d282a450df250df20e2028411309453236fa4b6dcd173483519fa41 RLEA-2020:4521 libmodulemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libmodulemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libmodulemd1-1.8.16-0.2.9.4.2.aarch64.rpm b224515abd40c2a99367e6ca1f7760dd3b97fccac82f82ff04eac10887934fc4 libmodulemd-2.9.4-2.el8.aarch64.rpm 488bfaa1496f767f71895c43b48c882212d10c846cf7ba0807c586606071d0eb RLEA-2020:4525 libcap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libcap-2.26-4.el8.aarch64.rpm 2c0f0d97197954c69dd05263d5dce0126dc2a7d881ee0511e396aba708a6d349 libcap-devel-2.26-4.el8.aarch64.rpm de257b3f03f03ac58f19faafcb436325e807fb75dd6d4453b5e61b1672a420af RLSA-2020:4539 Moderate: pcre2 security and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pcre2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The pcre2 package contains a new generation of the Perl Compatible Regular Expression libraries for implementing regular expression pattern matching using the same syntax and semantics as Perl. Security Fix(es): * pcre: Out of bounds read in JIT mode when \X is used in non-UTF mode (CVE-2019-20454) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms pcre2-10.32-2.el8.aarch64.rpm de55ad5f7e530dc05f2f3ed23e371f600033e58b72124530162658fc392b7f60 pcre2-10.32-2.el8.aarch64.rpm de55ad5f7e530dc05f2f3ed23e371f600033e58b72124530162658fc392b7f60 pcre2-10.32-2.el8.aarch64.rpm de55ad5f7e530dc05f2f3ed23e371f600033e58b72124530162658fc392b7f60 pcre2-devel-10.32-2.el8.aarch64.rpm a2d1ae52241c18f748d86330d0fcaed25d9e7226e1df815bccb9eeeffcf08d2d pcre2-devel-10.32-2.el8.aarch64.rpm a2d1ae52241c18f748d86330d0fcaed25d9e7226e1df815bccb9eeeffcf08d2d pcre2-devel-10.32-2.el8.aarch64.rpm a2d1ae52241c18f748d86330d0fcaed25d9e7226e1df815bccb9eeeffcf08d2d pcre2-utf16-10.32-2.el8.aarch64.rpm 63e95aac727fd3749c332eb096f5b23a4258d2c62531f76776fffd27879d5d64 pcre2-utf16-10.32-2.el8.aarch64.rpm 63e95aac727fd3749c332eb096f5b23a4258d2c62531f76776fffd27879d5d64 pcre2-utf16-10.32-2.el8.aarch64.rpm 63e95aac727fd3749c332eb096f5b23a4258d2c62531f76776fffd27879d5d64 pcre2-utf32-10.32-2.el8.aarch64.rpm 6da37ae2a8f0ba9e963737b7abaaac7f1f4c426e074aa286552b8f0b2d4ec71d pcre2-utf32-10.32-2.el8.aarch64.rpm 6da37ae2a8f0ba9e963737b7abaaac7f1f4c426e074aa286552b8f0b2d4ec71d pcre2-utf32-10.32-2.el8.aarch64.rpm 6da37ae2a8f0ba9e963737b7abaaac7f1f4c426e074aa286552b8f0b2d4ec71d RLBA-2020:4544 setools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for setools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms python3-setools-4.3.0-2.el8.aarch64.rpm ff58132862e3f9982a47bcb23b87f375a074ab06ad394bcf8c683f46abbe1838 python3-setools-4.3.0-2.el8.aarch64.rpm ff58132862e3f9982a47bcb23b87f375a074ab06ad394bcf8c683f46abbe1838 setools-console-4.3.0-2.el8.aarch64.rpm e2455acdc7d77ca2f1b1688bf1538ec61ad8b87e91aed1cf8fc15d961efae72d setools-console-4.3.0-2.el8.aarch64.rpm e2455acdc7d77ca2f1b1688bf1538ec61ad8b87e91aed1cf8fc15d961efae72d RLSA-2020:4545 Moderate: libssh security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. The following packages have been upgraded to a later upstream version: libssh (0.9.4). (BZ#1804797) Security Fix(es): * libssh: denial of service when handling AES-CTR (or DES) ciphers (CVE-2020-1730) * libssh: unsanitized location in scp could lead to unwanted command execution (CVE-2019-14889) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libssh-0.9.4-2.el8.aarch64.rpm e1754a3af9cbd97f6387de61b81ac97fb5aac5dd791af2adce9a75801b7dac29 libssh-config-0.9.4-2.el8.noarch.rpm ea990d25ee8b5e301f6671b83a897737feb2ce889553964ba252e274d41a90e2 libssh-config-0.9.4-2.el8.noarch.rpm ea990d25ee8b5e301f6671b83a897737feb2ce889553964ba252e274d41a90e2 RLBA-2020:4565 libtalloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libtalloc-2.3.1-2.el8.aarch64.rpm b872922b417cae9c915bf1532b7b424ff763c25d3a418100a824a27241fd5f1e libtalloc-devel-2.3.1-2.el8.aarch64.rpm 2f6511cf083edf5a16ad1d84dab6a944676050a47153db5001381e97dc482fde python3-talloc-2.3.1-2.el8.aarch64.rpm 0833968143f65680480aa4912611b7016aa0ad919cb056b40f1c71d4453c358e RLBA-2020:4566 libtdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libtdb-1.4.3-1.el8.aarch64.rpm 1066c3f9b6f1be4b2c9e96ca59f3bda30d73cdc3ca5cd8b06505530774cc395c libtdb-1.4.3-1.el8.aarch64.rpm 1066c3f9b6f1be4b2c9e96ca59f3bda30d73cdc3ca5cd8b06505530774cc395c libtdb-devel-1.4.3-1.el8.aarch64.rpm 1fb26a68dd75211e22d03a146315a85b1325d8f58ad842e1e4a05406c4adcf80 libtdb-devel-1.4.3-1.el8.aarch64.rpm 1fb26a68dd75211e22d03a146315a85b1325d8f58ad842e1e4a05406c4adcf80 python3-tdb-1.4.3-1.el8.aarch64.rpm f4e2e3a1a89871b6c390013536abdd6ab81102cff3c2fed8d4d7e2a506deb7e2 python3-tdb-1.4.3-1.el8.aarch64.rpm f4e2e3a1a89871b6c390013536abdd6ab81102cff3c2fed8d4d7e2a506deb7e2 tdb-tools-1.4.3-1.el8.aarch64.rpm 6c37fa94ff177235291c7153aa9a265101b188187336522b46b7f275510d6af2 tdb-tools-1.4.3-1.el8.aarch64.rpm 6c37fa94ff177235291c7153aa9a265101b188187336522b46b7f275510d6af2 RLBA-2020:4582 tar bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms tar-1.30-5.el8.aarch64.rpm fc2018e790acc86d7982ff9b64cc23e5867cc5c82d8ad7a788e11361046c7404 tar-1.30-5.el8.aarch64.rpm fc2018e790acc86d7982ff9b64cc23e5867cc5c82d8ad7a788e11361046c7404 tar-1.30-5.el8.aarch64.rpm fc2018e790acc86d7982ff9b64cc23e5867cc5c82d8ad7a788e11361046c7404 RLBA-2020:4567 libtevent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libtevent-0.10.2-2.el8.aarch64.rpm a36fc6926dbffa7d84a1025dbdd9385e200fb63ef700729fd7e8828257c8ac84 libtevent-devel-0.10.2-2.el8.aarch64.rpm 07f330d4a375f4473957d598fff4d18e119452938700b181efad59ce6d4c01bb python3-tevent-0.10.2-2.el8.aarch64.rpm c1ed6f58422a103c98b698a8d7f29c34b2f9232d9667867057564b392a87671a RLEA-2020:4572 pcsc-lite-ccid bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pcsc-lite-ccid. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms pcsc-lite-ccid-1.4.29-4.el8.aarch64.rpm 81f611769a1b1b7dc975446102398ce912e60ea856ce3edf73e53b6b19fb73d7 RLBA-2020:4590 ps_mem bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ps_mem. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms ps_mem-3.6-7.el8.noarch.rpm 8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e ps_mem-3.6-7.el8.noarch.rpm 8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e ps_mem-3.6-7.el8.noarch.rpm 8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e ps_mem-3.6-7.el8.noarch.rpm 8eb652e615b944505be551add79944cc69157aa7190ce7c05fc91c2f59369e9e RLBA-2020:4593 environment-modules bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for environment-modules. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms environment-modules-4.5.2-1.el8.aarch64.rpm 48f2f792d17ee14db7aa9a4e36173feb1bd5092b3ce74f26d11800b962db703c environment-modules-4.5.2-1.el8.aarch64.rpm 48f2f792d17ee14db7aa9a4e36173feb1bd5092b3ce74f26d11800b962db703c environment-modules-4.5.2-1.el8.aarch64.rpm 48f2f792d17ee14db7aa9a4e36173feb1bd5092b3ce74f26d11800b962db703c RLBA-2020:4597 babeltrace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for babeltrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libbabeltrace-1.5.4-3.el8.aarch64.rpm fe671c4b56da717515a39aed7ae1ff719d7a5650d3277fa5f1b3c776d7b152ee libbabeltrace-1.5.4-3.el8.aarch64.rpm fe671c4b56da717515a39aed7ae1ff719d7a5650d3277fa5f1b3c776d7b152ee libbabeltrace-1.5.4-3.el8.aarch64.rpm fe671c4b56da717515a39aed7ae1ff719d7a5650d3277fa5f1b3c776d7b152ee RLSA-2021:1206 Important: gnutls and nettle security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for nettle, gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space. Security Fix(es): * nettle: Out of bounds memory access in signature verification (CVE-2021-20305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.14-8.el8_3.aarch64.rpm 164cc6826540168e8e8f7bf955ca6a0a76254777c912d710b72853465a4a60b0 nettle-3.4.1-4.el8_4.aarch64.rpm cffaa15be919528822712b8982242fe5eb6e4c1c880262a03bb9cb7eb8df7570 RLBA-2020:4603 device-mapper-persistent-data bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-persistent-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms device-mapper-persistent-data-0.8.5-4.el8.aarch64.rpm cb2c7565e1d1e15e55c29e1ae6b30554a471dddaece8f526a53245aeba7ca5f2 RLBA-2021:1571 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms liblsan-8.4.1-1.el8.aarch64.rpm a3fdc7871e6c5a3e903ace7c31003622d88730f472eb7d52622a009f270a37af libasan-8.4.1-1.el8.aarch64.rpm 4a0a718241cf18b25f668ce83262d1b64d5248e8344fa3634ebae8e6fbb61e53 libatomic-8.4.1-1.el8.aarch64.rpm 3fa91da0f1422a49dc922912f51c4249afe0465aa5495bcef9eee2e79286b60b libatomic-static-8.4.1-1.el8.aarch64.rpm 17e79a7ffc8d347318bc04472f0aa86974e01b4d7ceb6b6e9b0da29307120eee libgcc-8.4.1-1.el8.aarch64.rpm ee0da3f22bf0349c97a4858df94215702f786fb054bc501043067eff57c58b45 libgfortran-8.4.1-1.el8.aarch64.rpm c88951de0e4ec6ddc5f59d658bba7c4a6905cd01b354582872c9a591d2896f68 libgomp-8.4.1-1.el8.aarch64.rpm 71a6b8d3ddccf9a50b2d9dcf57a90a56025a3405aca10ae9c3008e8bde9923a5 libitm-8.4.1-1.el8.aarch64.rpm 2a5cb11a931ecace0888748cb389c594eb4ef082cac4ebf3fc794a3c90f7b769 libstdc++-8.4.1-1.el8.aarch64.rpm 778454c5455a22c31c74f3254cf1d8d2351c19fa0d7dc4e255341c93c0e14edc libtsan-8.4.1-1.el8.aarch64.rpm 1d637aa9212a9cc4daeb35a231f163397bb4b0ff0d8470f3345845b1170c5ceb libubsan-8.4.1-1.el8.aarch64.rpm fd2722da6e778476885c54587f078d8972a28e310f918084e9b5bb3f663df59a RLSA-2020:4952 Important: freetype security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for freetype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms freetype-2.9.1-4.el8_3.1.aarch64.rpm f04c547cbbe9749b29f02b2d9efbf706b1f4b0f18b13b2529e7beaf8faa55894 freetype-2.9.1-4.el8_3.1.aarch64.rpm f04c547cbbe9749b29f02b2d9efbf706b1f4b0f18b13b2529e7beaf8faa55894 freetype-2.9.1-4.el8_3.1.aarch64.rpm f04c547cbbe9749b29f02b2d9efbf706b1f4b0f18b13b2529e7beaf8faa55894 freetype-devel-2.9.1-4.el8_3.1.aarch64.rpm ac27bc394cad5813f8c7078093453f8267784a8c300bd003f903f489fc7e3519 freetype-devel-2.9.1-4.el8_3.1.aarch64.rpm ac27bc394cad5813f8c7078093453f8267784a8c300bd003f903f489fc7e3519 freetype-devel-2.9.1-4.el8_3.1.aarch64.rpm ac27bc394cad5813f8c7078093453f8267784a8c300bd003f903f489fc7e3519 RLBA-2021:0276 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021a, which addresses recent time zone changes. Notably: * South Sudan will change from UTC+03 to UTC+02 on February 1, 2021. (BZ#1919721, BZ#1919720, BZ#1920186) none-baseos-rpms tzdata-2021a-1.el8.noarch.rpm 07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d tzdata-2021a-1.el8.noarch.rpm 07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d RLSA-2021:1024 Important: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449) * openssl: CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-1.1.1g-15.el8_3.aarch64.rpm 7f5826140f2f67fe11bac656b7c0d28b3454028cd8dd00bd1a25c4acbd094461 openssl-devel-1.1.1g-15.el8_3.aarch64.rpm 367a77b7e1004da141946d554fb9b0a2238d661f0b6c15d758e1230587084792 openssl-libs-1.1.1g-15.el8_3.aarch64.rpm 688e5479beded8e45b6890a0540405f22390c045e7178eb480a963bc02e0cac4 openssl-perl-1.1.1g-15.el8_3.aarch64.rpm b727d71452ab7f1126666f545fbed733f5e8fe3c644d5d4cd0cad5d07baa234c RLBA-2021:1091 file bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats. Bug Fix(es) and Enhancement(s): * ftype detection is not working (BZ#1905906) none-baseos-rpms file-5.33-16.el8_3.1.aarch64.rpm 36bb631a8ec7d3186ee6b04e3eeaacd57285b444dda54c26a1004b26907c4634 file-libs-5.33-16.el8_3.1.aarch64.rpm b3a83168f83f2b87f42420a5b22d857492ad9d4905599af314e707fbf715140d python3-magic-5.33-16.el8_3.1.noarch.rpm 916fde6a9fa08d51b78cbc179422c694ee80bc58adf738d84e8af6fee3459660 python3-magic-5.33-16.el8_3.1.noarch.rpm 916fde6a9fa08d51b78cbc179422c694ee80bc58adf738d84e8af6fee3459660 RLBA-2021:1094 crypto-policies bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crypto-policies. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Crypto policies is a system component that configures the core cryptographic subsystems, covering the TLS, IPSec, SSH, DNSSec, and Kerberos protocols. It provides a small set of policies, which the administrator can select. Bug Fix(es) and Enhancement(s): * FIPS:OSPP needs to have the same settings as used on 8.1 Common Criteria (BZ#1927024) none-baseos-rpms crypto-policies-20210209-1.gitbfb6bed.el8_3.noarch.rpm f2d00ed407302c5ce89d83523eb0ddb9e4f0e79a178601c918a24e7cbf55b84e crypto-policies-20210209-1.gitbfb6bed.el8_3.noarch.rpm f2d00ed407302c5ce89d83523eb0ddb9e4f0e79a178601c918a24e7cbf55b84e crypto-policies-scripts-20210209-1.gitbfb6bed.el8_3.noarch.rpm 9310789503f69fbefee3f925ad35f472ad2f986c78d1df318426387c2398614f crypto-policies-scripts-20210209-1.gitbfb6bed.el8_3.noarch.rpm 9310789503f69fbefee3f925ad35f472ad2f986c78d1df318426387c2398614f RLBA-2021:1570 openldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms openldap-2.4.46-16.el8.aarch64.rpm 91ca6a9a5fa84e9859af844ed39350a29bc27de6a5fdde0e8946781f558f25b2 openldap-clients-2.4.46-16.el8.aarch64.rpm cf4fe7d59bdd52515662e945882360a31a6707ee998ef94cc2c189426035c63d openldap-devel-2.4.46-16.el8.aarch64.rpm 54a647ff426b1920e258e261f073f410188973596e0932819afeabdd37a48ab8 RLBA-2021:1572 binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms binutils-2.30-93.el8.aarch64.rpm a13ac5d4201708057b1c1b088417665aeb35cc7c4275e125eab648c55ad241aa RLEA-2021:1573 strace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms strace-5.7-2.el8.aarch64.rpm a29c350e5acaf6e5c6950bd8b092b3014989f6aeaf9cbe289b022d368d92e6de RLSA-2021:1574 Moderate: NetworkManager and libnma security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libnma, NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. The following packages have been upgraded to a later upstream version: NetworkManager (1.30.0). (BZ#1878783) Security Fix(es): * NetworkManager: Profile with match.path setting triggers crash (CVE-2021-20297) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms NetworkManager-1.30.0-7.el8.aarch64.rpm 3efade91d885c0d8876be9b7886c0131fb0f9ffe0b54d362e2ae19c0c0824930 NetworkManager-adsl-1.30.0-7.el8.aarch64.rpm 049da5cdc38072ae2c59bc07c1603143e8007d6d138d7be5c7e9a21dacc7ad6b NetworkManager-bluetooth-1.30.0-7.el8.aarch64.rpm 5c8c1609778ee81d4ebb39c0f43c3e8b2be4be18d52823e068b08d5a758aa1f2 NetworkManager-config-connectivity-redhat-1.30.0-7.el8.noarch.rpm fc733b155486218029d19dc8d26993ea9213a794176df6c5a398907f6fc448ac NetworkManager-config-connectivity-redhat-1.30.0-7.el8.noarch.rpm fc733b155486218029d19dc8d26993ea9213a794176df6c5a398907f6fc448ac NetworkManager-config-server-1.30.0-7.el8.noarch.rpm af019b1775f248edd7513a180eb2406b7ef8c861dcf9d3aaff6e616ea7570e21 NetworkManager-config-server-1.30.0-7.el8.noarch.rpm af019b1775f248edd7513a180eb2406b7ef8c861dcf9d3aaff6e616ea7570e21 NetworkManager-dispatcher-routing-rules-1.30.0-7.el8.noarch.rpm 66310a696338e528e316101030737cd9faed1335026b468c6314d0204aa3ccd8 NetworkManager-dispatcher-routing-rules-1.30.0-7.el8.noarch.rpm 66310a696338e528e316101030737cd9faed1335026b468c6314d0204aa3ccd8 NetworkManager-libnm-1.30.0-7.el8.aarch64.rpm bb9a8f180c1a55f8b7da0d0c60da1a29de3a292e9423dc4391545aa3124e52e3 NetworkManager-ovs-1.30.0-7.el8.aarch64.rpm 423893ac082f1fe3cc03e07deeb9f0f969c8150340b1191d6c101251b8fdb147 NetworkManager-ppp-1.30.0-7.el8.aarch64.rpm 603133997df3bbb9c618932fcd82970011acc7c888a83dd8d9595f9340544237 NetworkManager-team-1.30.0-7.el8.aarch64.rpm 964d3fd3ad9b9561f59cf5f986798509588ccb46c44dfdcb4fbab8295472f07f NetworkManager-tui-1.30.0-7.el8.aarch64.rpm 1a33dd067ff51ee193401051be2fa630a5a890d88bb0616726418a5637da401a NetworkManager-wifi-1.30.0-7.el8.aarch64.rpm c0fc89b8ea910bc78174e3132f4063d667796debcf3697a4f016bf4782c86973 NetworkManager-wwan-1.30.0-7.el8.aarch64.rpm d809a7a152ea8200f9ec5c3a3509370e80aeb967db2f913690861953485276b8 RLBA-2021:1575 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.13-2.el8.aarch64.rpm 9526f999d43f1ea6c69a58db0f7b95f3ca6ee386c6f2f431c609929dc64c81b8 python3-subscription-manager-rhsm-1.28.13-2.el8.aarch64.rpm fd10c65267b79759114187e758efc5de277a9caf621ed39504d66a75e0005ebb python3-syspurpose-1.28.13-2.el8.aarch64.rpm b8a6308f87e63857c4f8636fa36961bc233e6bf06e1e1ae7b148d6293f36f370 rhsm-icons-1.28.13-2.el8.noarch.rpm 1caf0f3310cd1df80c1c4c837fc135dd35e619bfe0ee1444bef2636858405fdc rhsm-icons-1.28.13-2.el8.noarch.rpm 1caf0f3310cd1df80c1c4c837fc135dd35e619bfe0ee1444bef2636858405fdc subscription-manager-1.28.13-2.el8.aarch64.rpm f449a8e4102b8c84a4af6ac4cef36c0a96fcfa4fe02f14e79489a77788dbede9 subscription-manager-cockpit-1.28.13-2.el8.noarch.rpm 49208c823c2eb0bde3a1e8d90670131f973d76cfbf9d7d57ac179c47bd84c2d6 subscription-manager-cockpit-1.28.13-2.el8.noarch.rpm 49208c823c2eb0bde3a1e8d90670131f973d76cfbf9d7d57ac179c47bd84c2d6 subscription-manager-plugin-ostree-1.28.13-2.el8.aarch64.rpm 90993fa15642af803f8e9e0d5f6a10c72a182cae1162488047c42afeb3f96bef subscription-manager-rhsm-certificates-1.28.13-2.el8.aarch64.rpm 91e1669774e590388ef46cf4b756541ab834de99744db39da0675938af592732 RLEA-2021:1576 ethtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ethtool-5.8-5.el8.aarch64.rpm 3dba01e8b3af96df11cc6e946a9ffb4c505183468360f12cbb0dd0be8b5e1813 RLBA-2021:1579 gpgme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms gpgme-1.13.1-7.el8.aarch64.rpm 1f74eef27561708626a6a6560673cdcf7b1b498477cd65810cbc08f40a4769d2 gpgmepp-1.13.1-7.el8.aarch64.rpm fc67639975597f37d62f83554c7cbddef4fe63610975fbd4827ae362506f1b5e python3-gpg-1.13.1-7.el8.aarch64.rpm 9d16434f99244df155a96a702afb3b694a6b18a9907b106d3de9dc411ac63601 RLEA-2021:1580 libarchive bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms bsdtar-3.3.3-1.el8.aarch64.rpm 9cd65bc2f140cdb4fad7932ccdb4d7bd3b01426b1fa29dc8a0b59a0893f54ec4 bsdtar-3.3.3-1.el8.aarch64.rpm 9cd65bc2f140cdb4fad7932ccdb4d7bd3b01426b1fa29dc8a0b59a0893f54ec4 libarchive-3.3.3-1.el8.aarch64.rpm 5a44f59eab92d324c30b59a3e929a18c493135e17e75c8d7a804a5f3c39fba59 libarchive-3.3.3-1.el8.aarch64.rpm 5a44f59eab92d324c30b59a3e929a18c493135e17e75c8d7a804a5f3c39fba59 RLSA-2021:1581 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: integer overflow in sqlite3_str_vappendf function in printf.c (CVE-2020-13434) * sqlite: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener optimization in select.c (CVE-2020-15358) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms sqlite-3.26.0-13.el8.aarch64.rpm b404c82d27be8ab4728b0266066e3e28496c19cc249fb174a605f08d233ccecd sqlite-devel-3.26.0-13.el8.aarch64.rpm f1a3f10f4602c1afda0f501fa784ed1bb7a51d3d416748836b3de000ec1e0b72 sqlite-doc-3.26.0-13.el8.noarch.rpm 44cc5e200a8a6dd3370f74c0414492cf0b9257cfc41fa7b39870f1a0c17b4e80 sqlite-doc-3.26.0-13.el8.noarch.rpm 44cc5e200a8a6dd3370f74c0414492cf0b9257cfc41fa7b39870f1a0c17b4e80 sqlite-libs-3.26.0-13.el8.aarch64.rpm 47aa1cb7a0c720f2ae47b04331b77224c55c3840226d023cbfa1d94e76b5e1ad RLSA-2021:1582 Moderate: cpio security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cpio packages provide the GNU cpio utility for creating and extracting archives, or copying files from one place to another. Security Fix(es): * cpio: improper input validation when writing tar header fields leads to unexpected tar generation (CVE-2019-14866) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms cpio-2.12-10.el8.aarch64.rpm eded7aadc56ad4c68e7525ccd7323f39b1d40d81776e2eb3ed9005fe63d0032c cpio-2.12-10.el8.aarch64.rpm eded7aadc56ad4c68e7525ccd7323f39b1d40d81776e2eb3ed9005fe63d0032c RLSA-2021:1585 Moderate: glibc security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) * glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read (CVE-2019-9169) * glibc: assertion failure in ISO-2022-JP-3 gconv module related to combining characters (CVE-2021-3326) * glibc: iconv program can hang when invoked with the -c option (CVE-2016-10228) * glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop (CVE-2020-27618) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms glibc-2.28-151.el8.aarch64.rpm 404d9d8976ec41ac6e98608d0a6b48787d20008c28ba87bbb66e141e5c66c1d3 glibc-all-langpacks-2.28-151.el8.aarch64.rpm 527568b214b973f3a6fb952d85137df40c49bda599c49418f27ff0ce52956f91 glibc-common-2.28-151.el8.aarch64.rpm 223ac143d5f72adca8df87706d0e4df8436a685d6fc17a765ce1ca6eef07e557 glibc-devel-2.28-151.el8.aarch64.rpm 4b59ba5ea42fcf9bcb8c983084932c2caaf31c7e90ad8ba325571034b2fc708d glibc-headers-2.28-151.el8.aarch64.rpm 8d63b38d0e55516034099b882896f71443c3677eda3a50f7ff0929db6539945d glibc-langpack-aa-2.28-151.el8.aarch64.rpm eefe6d119c74570979becf1cb9c28df5ba5474412202086b2b21a05475fdf868 glibc-langpack-af-2.28-151.el8.aarch64.rpm 25df99237e64d314a49aea0457fb8ce7eec3e8cd5a027a49a7dd86d139f9cfb3 glibc-langpack-agr-2.28-151.el8.aarch64.rpm 64c149d0749bdcc0571a868d48f6f2feb6254cf097981caeaac2779472cecf7e glibc-langpack-ak-2.28-151.el8.aarch64.rpm fdbc31609404781ccf9353dcb5ec1fcd77477f8c8c87472c1eeac0a7311a89ee glibc-langpack-am-2.28-151.el8.aarch64.rpm c9ac5f2b77b5b133de8367bd81a893dedeb14601913a7a7c55a0ca37bacb881a glibc-langpack-an-2.28-151.el8.aarch64.rpm ea0d116cfe5ddc7ff47e69d18e382a0a528260e9ece097ace4cbff17c100fa78 glibc-langpack-anp-2.28-151.el8.aarch64.rpm a12636f30ae324563f1a8253a412a7f948fc00d720ab6837165079a5cc017c29 glibc-langpack-ar-2.28-151.el8.aarch64.rpm f0d99c2d607c33d781f5b27850e4c1bdeb0dd9b28cb9747f3595d34d6bd947cc glibc-langpack-as-2.28-151.el8.aarch64.rpm 6787767fc29ba7d7d2ed908e23dabd6dc0306d3d76fca1ada456ec8a1e60e522 glibc-langpack-ast-2.28-151.el8.aarch64.rpm 3a8a604432813c695e5421fab373fed597a158c12e339bb7a274d1606252eb8d glibc-langpack-ayc-2.28-151.el8.aarch64.rpm 47379dff874293d7c8833a96b3eb31f233fdd3f86ff71d8dba680ea909089625 glibc-langpack-az-2.28-151.el8.aarch64.rpm e25e9882b4a7bb70b41d5ea8894316ffd2b8e31d27c0bd8b7b65a3862d43d312 glibc-langpack-be-2.28-151.el8.aarch64.rpm 122ecb6a0e9a73efacdd8d6b091f613bf9bde397aa86d4243d6d04a304588cf5 glibc-langpack-bem-2.28-151.el8.aarch64.rpm d31acd224096345931ee7813cca63ec1fb970b51b5989011e4fe0c51cb55844a glibc-langpack-ber-2.28-151.el8.aarch64.rpm 959fc497b5bd839e67fd6cfbe7e3748903ccf0962053bbdb43356522e5b49c45 glibc-langpack-bg-2.28-151.el8.aarch64.rpm c0fa21b12878b8d43ed0f3cf7e3701db3ac76b6bb9639a84a067b082d1a5dca5 glibc-langpack-bhb-2.28-151.el8.aarch64.rpm 9f51da501e95bad39d1843ac06b6394f9ab2811c2d56a45314e4dd699a8e0ed9 glibc-langpack-bho-2.28-151.el8.aarch64.rpm 92f96f3b4771e604d7b108f72901dbc71b711198cea1b3120716c4af1c637155 glibc-langpack-bi-2.28-151.el8.aarch64.rpm a9bb9ba7a177ec996535a3ef6662954de6d372f3cff315e8eaadd3ae96179a42 glibc-langpack-bn-2.28-151.el8.aarch64.rpm 3eb4c7cf750f835b4fc9e608c846e31882732ae5a9d60d463f500293f679b76b glibc-langpack-bo-2.28-151.el8.aarch64.rpm b33f1145e3557c66c3c8f1dbb84b7189462e00c705ae2cc163085ed9f1f16989 glibc-langpack-br-2.28-151.el8.aarch64.rpm 64eac7c0f12e184e0aec0068b5e13ff6b96de7b3e8c94c5d31afd287c4ee8c55 glibc-langpack-brx-2.28-151.el8.aarch64.rpm 665fa3acdd89e6a536b1be8a97e82e60671a77b8e08b2849831f3d9a92afc68b glibc-langpack-bs-2.28-151.el8.aarch64.rpm 765f66fb6964821c8aeba818cf6f12284bc1e8ec54bf7a1d8fd73416f29e59d9 glibc-langpack-byn-2.28-151.el8.aarch64.rpm 170945a1a110ecb2558d2218c54af604a47d23a3d1eba135481cd2db09804047 glibc-langpack-ca-2.28-151.el8.aarch64.rpm e25b4bed32aa37679687f714fe6c042d1ce19ddf4f557823826a26d956d10248 glibc-langpack-ce-2.28-151.el8.aarch64.rpm db1a1bca113c933b46ed8459dc1d5b6b82f4fd7a0f271c415b8d255f91e6bab5 glibc-langpack-chr-2.28-151.el8.aarch64.rpm f2fb1b28d4c345d65e635e279098b93ba40910f59e3f3cae3964cdf198070ad1 glibc-langpack-cmn-2.28-151.el8.aarch64.rpm b969d242ab46406952e19dc6ed87aca01981268334752f4a5b6eaca1854b1fee glibc-langpack-crh-2.28-151.el8.aarch64.rpm b8cfe0db1cb6e266115f31c03b29b4630995869605abf48af8585a4298536979 glibc-langpack-cs-2.28-151.el8.aarch64.rpm 2bea1740e594cf7c115999a48407130b9321cc0b8fafd7c09e42d4f6f65ba468 glibc-langpack-csb-2.28-151.el8.aarch64.rpm a93519e05c9a210dd6f0ba0aedd3ac5e9716492d00b7335d99ed42ab26bd53c1 glibc-langpack-cv-2.28-151.el8.aarch64.rpm 06ab03df14612be2aed40dc639cfa9cad8d540185eff7bcc30a6e61fc2f6315a glibc-langpack-cy-2.28-151.el8.aarch64.rpm 19064e72dbbfd54fa086ebd108800951d80674ae91b1478997c4d56271f6438b glibc-langpack-da-2.28-151.el8.aarch64.rpm 061940dabf5f4ea7d0fca321425b204f52a83c666dd4fa72510f9c32636e305d glibc-langpack-de-2.28-151.el8.aarch64.rpm 994d01265279e7cae8e95ec0f81f1f84b274298e89de480a3b1db1fd7e0a65ec glibc-langpack-doi-2.28-151.el8.aarch64.rpm 4c0edb1b769e50a98dc28e4ab245912ac61093cfdb99f305a7227a7f4261b2d1 glibc-langpack-dsb-2.28-151.el8.aarch64.rpm f5685b8baec8ca27bfc0fa6fd869c93b960761e60e97e1094cd46134bad722a2 glibc-langpack-dv-2.28-151.el8.aarch64.rpm a94c117bc45a428fc45ab742958b07c5a6ad7d05562874a311df5e7b20e6e28d glibc-langpack-dz-2.28-151.el8.aarch64.rpm cc084cb76ee8aacf8dedb36ec1e88910dff443b64184e7464caffe327fb39b7c glibc-langpack-el-2.28-151.el8.aarch64.rpm 58fed73c2ce3536d9c9c45b3b82d285b78aef16b854500d05652f290f337d9fa glibc-langpack-en-2.28-151.el8.aarch64.rpm ffdb166269103d5d4e78bfb48d14cf9bffa1da5a885c65a1c31fc1abcc3d419b glibc-langpack-eo-2.28-151.el8.aarch64.rpm d634359910c5912fa01962f117a0aa0f58d12ddc552a04d5b7ee5ae667e4b836 glibc-langpack-es-2.28-151.el8.aarch64.rpm e5620e288c4c1478f5e0a2471351b607c77586b4c6d1f0d3d4f46662a411ec9a glibc-langpack-et-2.28-151.el8.aarch64.rpm 03d2dcdbaba9a247d3208d7d4312e52be27909122b855024c4900044b1ff01d7 glibc-langpack-eu-2.28-151.el8.aarch64.rpm e1eb517e9eb204cf53f0544ef071e5206c298b318f4ca561315c07de36198c11 glibc-langpack-fa-2.28-151.el8.aarch64.rpm a476698f77a7da0a65f48819ff1a821b121164fe5ad1cd2924ffce30fee3b0d8 glibc-langpack-ff-2.28-151.el8.aarch64.rpm a6bd65e0c0a8cd8120c9917704a7b257cb80bfd4edd729740c657fd68d9d5239 glibc-langpack-fi-2.28-151.el8.aarch64.rpm cd97628acf2fca1faf05b91fe848ae17aedf1bc9283b5e7fc64ffad097a5419e glibc-langpack-fil-2.28-151.el8.aarch64.rpm 3d02daf5889827d003d277ff849b5d42a9f31cab59adf111694bb1ccfa7e4043 glibc-langpack-fo-2.28-151.el8.aarch64.rpm 599cd5cf33ecaad792b463629bd5e465e3e52821bd1dcfc8b3d817cb7fdb669d glibc-langpack-fr-2.28-151.el8.aarch64.rpm a050337350ae4330a14fc3d1101bfb71dd0074d26b7515ac3584cfff67539671 glibc-langpack-fur-2.28-151.el8.aarch64.rpm c75a31d1209d30fd516c02033ae7df0d5305e5a434dbf747b3079e747ed931cd glibc-langpack-fy-2.28-151.el8.aarch64.rpm 200ef034a0326df6da93a7dbda49ae060cf01d12e1ab3aa92e02dc3b4b2e31ef glibc-langpack-ga-2.28-151.el8.aarch64.rpm af3ccf0112ef1461e25cbf3da18021621c8f1908dd1470d2e3e227746cc09a6f glibc-langpack-gd-2.28-151.el8.aarch64.rpm ba05bfe3603307de33fb70677ae6cdf1cfe4e2c7b54bb602550d6299cc3cdfca glibc-langpack-gez-2.28-151.el8.aarch64.rpm a615706bd29a960433d965cdf8bc144b7493acd1d4e895de6dbd8da80cd893f3 glibc-langpack-gl-2.28-151.el8.aarch64.rpm 617d9320da23d1ee493cfb01c224cc203a8f88239e4d2624db76ad477e52c6d9 glibc-langpack-gu-2.28-151.el8.aarch64.rpm a51e358ce75755a56e4d5f1966b5bcc7323f7f54501e4fd7cfcc1be9c5abe9a6 glibc-langpack-gv-2.28-151.el8.aarch64.rpm 8210e6dab0bae7d2e5cc2f577e626bc2b812d648977ffd036c777bf6ec526697 glibc-langpack-ha-2.28-151.el8.aarch64.rpm 6f3661dde0e703a3bb80c3862740228b54c5bc7038995b643a0f24ffc012bd3c glibc-langpack-hak-2.28-151.el8.aarch64.rpm 4ade371aef37dd65f0663f5ffcd98760c26b2bd9575072fc53e466e5ebd85d5f glibc-langpack-he-2.28-151.el8.aarch64.rpm 5f05c81b10d63a190afa01e06fd170d9e6ccedcde3f944b38251f2a62b772b3b glibc-langpack-hi-2.28-151.el8.aarch64.rpm 904c3698a00da6ceed3327333123343935cff1e438f08a4a134c4a898d538e56 glibc-langpack-hif-2.28-151.el8.aarch64.rpm 9af61ad5d05882c96b0df4f8f00e6668937bf214228407b140748fe8072eaeba glibc-langpack-hne-2.28-151.el8.aarch64.rpm 8f8c2ed3e7054bfd47beac3bb207026be98bd6ec71a1c13c91f4781afe369f4e glibc-langpack-hr-2.28-151.el8.aarch64.rpm 40da20379e40de8c0bf8fc229e85bcf0a7cab1db44cee86e352257c2e1ed4202 glibc-langpack-hsb-2.28-151.el8.aarch64.rpm 53482b4465f1499bee5a92a8df4e352ec46f2473afe9c73f3f0fae14aaaf6950 glibc-langpack-ht-2.28-151.el8.aarch64.rpm 0ab81d8f53e43f29921f67daa6aae433943f02fb1a5682e60e050a9851b3cbda glibc-langpack-hu-2.28-151.el8.aarch64.rpm 719d6f46746073360efdbbc20b3f3057b17050f3e6b090a13c479d39b986fa4f glibc-langpack-hy-2.28-151.el8.aarch64.rpm 6dd30fe91cbf1dc727e0594a9da55d9d31e5b0270e00224a47a57d4a1fc75dc7 glibc-langpack-ia-2.28-151.el8.aarch64.rpm 6a13b45ed2405333230438b6c75f44c52600d3238ebccd163d09dbedd274f48a glibc-langpack-id-2.28-151.el8.aarch64.rpm fa836487e9d5fb8ddaf65414f98b347078282b35d6e6474e903e2a3b00ef2050 glibc-langpack-ig-2.28-151.el8.aarch64.rpm 4f38b830f0e27c953276bb3af6d7475f2c81cc17545d436c7025f196542cdf96 glibc-langpack-ik-2.28-151.el8.aarch64.rpm e2563a0a90b984cc78188e2b3a111b3e78953b5662f8c51314b75a9cbff4fb92 glibc-langpack-is-2.28-151.el8.aarch64.rpm e3c68f6d4bff70f8c59b08382ef5c80bc059991280a66d8c01ca7fafe8a29a7d glibc-langpack-it-2.28-151.el8.aarch64.rpm 324d6fb9fafb9777c65b42777b7e6af31ef25b1ebb5e14367710c2e0a36a2427 glibc-langpack-iu-2.28-151.el8.aarch64.rpm 355fa52455b558e7b841ea877ec5e2b76907deb4d84c9755dc0b72a7780aa778 glibc-langpack-ja-2.28-151.el8.aarch64.rpm 6afd1a339b486daedf26a18499644cfc01959a4ade03fa6f025ef6ea4591e083 glibc-langpack-ka-2.28-151.el8.aarch64.rpm a24da0d78e32e35d6b21d236ccecd87222a836fb66ffb1107456c38c3909e113 glibc-langpack-kab-2.28-151.el8.aarch64.rpm 1c233562e11bad9608f5c74241a699e206705f282f3e6f22e93a613ac93d3ddf glibc-langpack-kk-2.28-151.el8.aarch64.rpm 410e396921f386cf009043074c21aeecab99ae8b3c48b9bafb4fad03ac805dfd glibc-langpack-kl-2.28-151.el8.aarch64.rpm 36ca8c28ab7106137c4597174fa313d54af879bbec29d9b11fc6fd6152fb2c52 glibc-langpack-km-2.28-151.el8.aarch64.rpm e8b058de568d4f989b7a2bb4921ecdffc2d50b36b9ae391fbdc1adf56ff8512f glibc-langpack-kn-2.28-151.el8.aarch64.rpm 6ed05131d2351f44bc2988105d7a6aad7bf0a76a9e9c193dc7d7880b985b3cf6 glibc-langpack-ko-2.28-151.el8.aarch64.rpm fd8eaed4f8232eb471e68c347738837f9f95a3476726e3cbddf22d12c7f899d9 glibc-langpack-kok-2.28-151.el8.aarch64.rpm 6479563c4b4c89b5ee0e9b6a8fc8ab54d6d58e83545dbf050285ad85a887fd30 glibc-langpack-ks-2.28-151.el8.aarch64.rpm 9809ee1714a691d00ff7ebe2fd0a68fc7252c51da9f3800c2eb1142d3d273992 glibc-langpack-ku-2.28-151.el8.aarch64.rpm 856387eb7d1b97ef7aa5be588f71f0bd9860a5a86312c432eff3088aa211bf16 glibc-langpack-kw-2.28-151.el8.aarch64.rpm 66fa50a57270f1502610b2d421c6fc66d3a9b0e380c0988b9f618482de25d44b glibc-langpack-ky-2.28-151.el8.aarch64.rpm ffdb651558ef184c4e64bc33687b662ab6a43715c53d87f2d852649890681651 glibc-langpack-lb-2.28-151.el8.aarch64.rpm 7f706079e5ba0a739c2e1758158b1c72ec4071b02dab9e4674241d41bf429459 glibc-langpack-lg-2.28-151.el8.aarch64.rpm c78821ed9084c086a2297d8dd4259b6cb580a4b7cc5bcf52f39597f7ceda5dfc glibc-langpack-li-2.28-151.el8.aarch64.rpm c2ae14e919895b66fc4796d7cdd266eda49080ddcbe81c817ff155de1cff936d glibc-langpack-lij-2.28-151.el8.aarch64.rpm 25e636a49f24ebdb5f182b761b3a1bc4046fda5c978b6f5a4fed1cbc499fc7f6 glibc-langpack-ln-2.28-151.el8.aarch64.rpm 1b95e962e8860db8d6367069570539aea930df9e8ce0069871c0b0cff3d1d715 glibc-langpack-lo-2.28-151.el8.aarch64.rpm 93abbd51bfc3fb29d9dcecfbe9bd1f45760f968c553e521f2906c98341c6f725 glibc-langpack-lt-2.28-151.el8.aarch64.rpm ea85ab07ef1460324f23248cf45cb517dbf93eeb5347dde2ee222f149af4cac4 glibc-langpack-lv-2.28-151.el8.aarch64.rpm 849d6468fa0f46ad39d30b0df224178314789bd52ca99c1558caa4a04663ae63 glibc-langpack-lzh-2.28-151.el8.aarch64.rpm 81a8b6233472746d99df4e2b04a945541a5f7df12f5b02ab4fb6a2f4b527a804 glibc-langpack-mag-2.28-151.el8.aarch64.rpm e9cb213fde171197d520d4f2b74af7ce80b4d6bca337414dbf15e7fe6f108a8b glibc-langpack-mai-2.28-151.el8.aarch64.rpm 17035b41945f3c8186852752170bcc70abc67393f71b0463b04642ac31a5fd8a glibc-langpack-mfe-2.28-151.el8.aarch64.rpm b0ea6eefcd5843237376e0bc60e3cfdb4c6429bfbb30835bd0145d8846444841 glibc-langpack-mg-2.28-151.el8.aarch64.rpm 0e532185f720ba3121537c78f3229c5c7e12a56f9e3317f605fd3926429c8dfe glibc-langpack-mhr-2.28-151.el8.aarch64.rpm d028f99fe3514cc083e593f15960ec6be944ae861116ad65c424dae6bc06a6ec glibc-langpack-mi-2.28-151.el8.aarch64.rpm f6bfe2a1fe3cd9a2cb588eec371c4385619e04b2e744379721f6c441db7c6e9d glibc-langpack-miq-2.28-151.el8.aarch64.rpm 9e27592bd31f5e3b26dc8d4867dcad92815f4577357bf4ae5b9295a0af788034 glibc-langpack-mjw-2.28-151.el8.aarch64.rpm f62ad40b14ebd6cf76acca21aeab7caad36c4d1bfb16e1a8a03bd9c320e069d7 glibc-langpack-mk-2.28-151.el8.aarch64.rpm 20cc8860258721d12a46176c9569063fc8088eaef6796c017d72a3895a664f24 glibc-langpack-ml-2.28-151.el8.aarch64.rpm 123b767269533fdfe087f2c895ec43250ee104a6207e6aa9e9195c905006520e glibc-langpack-mn-2.28-151.el8.aarch64.rpm 92c1b705177eeba8dbf4d007010a28971782151957e97cb6091a8cb9d9af41ca glibc-langpack-mni-2.28-151.el8.aarch64.rpm 52f09ac7023104f4194cb7c2b26dcc3652b993dacd6318d8d4ec0d00ec29337e glibc-langpack-mr-2.28-151.el8.aarch64.rpm 2e9b305aa40af64c77a8d62ab8284369a98f629c45150e7bfa486c2403798341 glibc-langpack-ms-2.28-151.el8.aarch64.rpm 4bb7fcf3da4a2246754a8bcf90afbbdedc5944c76d654bdaaaf4da9ba8519803 glibc-langpack-mt-2.28-151.el8.aarch64.rpm 7483213312fb5377ac18f450c81d4e2c6cba5407da36474d2e3363eeb919e3fc glibc-langpack-my-2.28-151.el8.aarch64.rpm 63b279a8294e30bbd838345d5d348ff50ffb3628d8b4c20a1f0bf73f5aa5fd90 glibc-langpack-nan-2.28-151.el8.aarch64.rpm 431336f8eff6626a3f0cbe44c70e2466d26835c7b6336f8ee88bdb5f76b287db glibc-langpack-nb-2.28-151.el8.aarch64.rpm 8bd6a9d07ee0c178fc0614cb49f75fea0d46520a11c7f6d61fe1c0ed294cf7a9 glibc-langpack-nds-2.28-151.el8.aarch64.rpm 0793e31ed2e23d16779636c2ef7cf4637795278ba87ce9e4a3c93d8665b015a4 glibc-langpack-ne-2.28-151.el8.aarch64.rpm 3aff3bb406a24957392e69ec799936e7eac86ae0cf0b52d8f787253fa5866da1 glibc-langpack-nhn-2.28-151.el8.aarch64.rpm cc76992bd5efad3a1d6181bddd41d3f1030d92ab7a43c463773a85c6324a13e9 glibc-langpack-niu-2.28-151.el8.aarch64.rpm d8249594d45e5d6308495fa2ec1f2aaa59c62519c011b451871b04d3c3b162ad glibc-langpack-nl-2.28-151.el8.aarch64.rpm 5e8628d3ec4ef10c28a12645639088947741c2b4b6ab7df4ae7b2784a21b807f glibc-langpack-nn-2.28-151.el8.aarch64.rpm 3dc17632df66705a45253642fd9551e33474625dfb6a6b9f4a1a7af11ae75be7 glibc-langpack-nr-2.28-151.el8.aarch64.rpm 4f296efbfe1f872b082fc1daffd7f076e499e7b37f2a3c0da691c6368b0d369f glibc-langpack-nso-2.28-151.el8.aarch64.rpm 5c93bb3fb088494172a585f14db6a4275b45be6855398b9bf71acfd257fb5a16 glibc-langpack-oc-2.28-151.el8.aarch64.rpm 1727f48ba4001a621e6bebc83d26766a98fb6a52f088d45aab7a7f2abaee6416 glibc-langpack-om-2.28-151.el8.aarch64.rpm 3b3cc744d64227f6c315047de9bfb5c2d9aafa42832ab0dad2e446c198bfbb19 glibc-langpack-or-2.28-151.el8.aarch64.rpm a401d66bb5ae44d9d018e89100a6e7d90303be2a7765d7345eb0fa1a9f126d14 glibc-langpack-os-2.28-151.el8.aarch64.rpm b0ebb7b9dcfe6888ba162c14ef030ca0bad99af29cba93fd043c60155202be93 glibc-langpack-pa-2.28-151.el8.aarch64.rpm 14920912193c9501e0534366d53fb5983e80df701327e0d2dec4e820dc75d7d3 glibc-langpack-pap-2.28-151.el8.aarch64.rpm c5cf7e54ac8f1bffae49a187d181ab1447cab00e9d659d901f31e42f850f3cc7 glibc-langpack-pl-2.28-151.el8.aarch64.rpm 7fb7efba339bec271b1d785fcf7aa7029391e5c3d4c1ad2f16198d5db9433767 glibc-langpack-ps-2.28-151.el8.aarch64.rpm 5a2cd8504c2d1c877404c2877c935c371a637af687c4d9e2aee54893aff15d8e glibc-langpack-pt-2.28-151.el8.aarch64.rpm cf3a5606fb6d9f9610e1e9cd74d90ff2da62101f34e98dd0fcad6fbc77da1b57 glibc-langpack-quz-2.28-151.el8.aarch64.rpm 2bbd2b99fcb7ab8dffc27babfb7ad27eaa5512b900fb4eb03c94195d7123f8eb glibc-langpack-raj-2.28-151.el8.aarch64.rpm 86defc745eb2cf79dd95f4583c823ddd8a56322e014e4ce043043d94f882e0df glibc-langpack-ro-2.28-151.el8.aarch64.rpm 604e15c6e54344fdce89f850567a3cf4aab3e2357a2204911ddef6ba366e9edf glibc-langpack-ru-2.28-151.el8.aarch64.rpm 050657e696f961c04f55bffb3d26b944770fe1264ae7a7e842021048e2413b92 glibc-langpack-rw-2.28-151.el8.aarch64.rpm ac0045cc0a58febfd010d833c86e3871ab584cc6c53acc177e2fa7d7ae0784e4 glibc-langpack-sa-2.28-151.el8.aarch64.rpm 5f666bde7f7df25b9ff58c996541d3cacafc42ec3a69a1bfe7281801c5ed81ea glibc-langpack-sah-2.28-151.el8.aarch64.rpm b5b90dcd1d8001deb29f50cb4fb422e2f812a242ac49b3e6d742c2683a5d99ce glibc-langpack-sat-2.28-151.el8.aarch64.rpm 107e29d478f77031649129af04167a12ff96cadbbfbb5933c4ae7c052d7769d3 glibc-langpack-sc-2.28-151.el8.aarch64.rpm e3ce82bda1ff225e9a637416d569de3691a69ea9ffa0ae0ae182c33c59061f05 glibc-langpack-sd-2.28-151.el8.aarch64.rpm ba59a8ab7871f730bf8802eb8a2df781cd35323eb0c36192e2a6a83d523b0983 glibc-langpack-se-2.28-151.el8.aarch64.rpm d69d7dedf70fbc0826d94f61e630ecb7c563f0a71a7773cff3ad95926d929d9f glibc-langpack-sgs-2.28-151.el8.aarch64.rpm ee43298502421068636f9ffadb800570b79ae391811471f006bef4914101562b glibc-langpack-shn-2.28-151.el8.aarch64.rpm 6eb9c6e204f9559cef63b0051f61385687265e59bc002ef786c710b1aae2a421 glibc-langpack-shs-2.28-151.el8.aarch64.rpm 856702e21e5c66ce0c291ca028392cf1711380e47865200f622421d2660fa9d7 glibc-langpack-si-2.28-151.el8.aarch64.rpm a7e00e6d1924054a481dc9cb71d8ce63ac5d0c797be24b9ac9e8e6f71733e6ad glibc-langpack-sid-2.28-151.el8.aarch64.rpm e05824510be50f28a188c9497233d6755efc83d721ea22838a3884e133f24063 glibc-langpack-sk-2.28-151.el8.aarch64.rpm 20b44bae7508ac79e150df0a3be7cbea6e7d3311239503f76b9be00a58aca921 glibc-langpack-sl-2.28-151.el8.aarch64.rpm 774c3d92912e1343431a69378c80e66b4910edaaa103e2e6f1f50b1e08dcd2fe glibc-langpack-sm-2.28-151.el8.aarch64.rpm 0706c2656bed383d3ccbd54e0a0ae494b0b62e53dd33395e384071a3826cdd05 glibc-langpack-so-2.28-151.el8.aarch64.rpm 3e1b6300c56523cd58bb81da378e292bc416a0b8f2ce4b6a7f3fcf4c606d6aa9 glibc-langpack-sq-2.28-151.el8.aarch64.rpm 815df9ba16d05f53b52bdf78642c4fe4af4108e48fb46e1678f0f41bc8b6998e glibc-langpack-sr-2.28-151.el8.aarch64.rpm 308754d79979e5bd509f66e34892b352d0f6907a456408f53a6a45b531ddd3cf glibc-langpack-ss-2.28-151.el8.aarch64.rpm 8924d4df1eabc4372a6a27e3c8e380d3b2f407eb2ca04a805528563df63cd32b glibc-langpack-st-2.28-151.el8.aarch64.rpm 67edfbbd93d8654c2f1015a23760b19a7f858ea7fbfa603807cbd090d8c5bb43 glibc-langpack-sv-2.28-151.el8.aarch64.rpm 359ea6accd73b7deacf02d1653f13a93915a031a9e6f5b28908b0965214aa51c glibc-langpack-sw-2.28-151.el8.aarch64.rpm 2e377219725d7d36519fbc0c1208c83f3009d548ef07d16ccbfde336c9e09750 glibc-langpack-szl-2.28-151.el8.aarch64.rpm a0e4cfc228748021e34a7228ef0c7d7a780a86875d48f1bd9d7a5fd4fe9ddf26 glibc-langpack-ta-2.28-151.el8.aarch64.rpm 1b0eb180848a28dcb11a15e0dc4dbaa2e3c7e16da1912d09fbcc3259cce10d8d glibc-langpack-tcy-2.28-151.el8.aarch64.rpm 174ea1858033cc938d6f96dc3a0ff735a62d5bd38d1b78b74c4452347c190fab glibc-langpack-te-2.28-151.el8.aarch64.rpm 3a73bcd50b8591814157506a5380ee90e375419afaf8f3a444e907d5314d3c4c glibc-langpack-tg-2.28-151.el8.aarch64.rpm 1f540720e5b30bef3a2b597b172b8a190726df454fe748221c9c93dea2789679 glibc-langpack-th-2.28-151.el8.aarch64.rpm 49cdcf5ef53e4e6cd45000b6d3cefba082eb2c8540d9f16498b05ac58caf389b glibc-langpack-the-2.28-151.el8.aarch64.rpm 0ae110245915866d9765d38f83efbd7d4146f83bd483aa9ad0dc13708f4a7ef7 glibc-langpack-ti-2.28-151.el8.aarch64.rpm 7d3028356826ae184ca31754fe5a3cb2e93b3bdfa886ab9a8039d2b7ff6f293d glibc-langpack-tig-2.28-151.el8.aarch64.rpm 79a9f01215536cc17ae8c93bb8e8fb40c39e8fae7116395a2918e62603da360e glibc-langpack-tk-2.28-151.el8.aarch64.rpm a940c7643f028c140513622e88ab410625adc420c6a9ea5939abea687d3760f4 glibc-langpack-tl-2.28-151.el8.aarch64.rpm 64c3fd170ca71e6b1c6b4003995bbc415c5f8469337aa844b285600730ffb60d glibc-langpack-tn-2.28-151.el8.aarch64.rpm 4e1e693fa6d92f6f4e3e81087a403fb182c979af28dc36c3166214b73c67028b glibc-langpack-to-2.28-151.el8.aarch64.rpm d9329175a58b67a1fc1f1f07bf8619d3c3d6d449da2185a30cbc8e5d9f96e35e glibc-langpack-tpi-2.28-151.el8.aarch64.rpm 02137e39325314228ba684a496f9b3becc280081eccf8144a125e31554b18a04 glibc-langpack-tr-2.28-151.el8.aarch64.rpm dc9e130b20ecab81dcdeb022f8a16f4b148e44d21b9739005d40925741cec345 glibc-langpack-ts-2.28-151.el8.aarch64.rpm d75a42cfcdddbd5a3caa6de9314df675f2a4e49d884734f14373c5015785dbc8 glibc-langpack-tt-2.28-151.el8.aarch64.rpm 31d2df0fd4b90e674b33583a3dacac69d218036fd18b1a98a9bfcf1f141682aa glibc-langpack-ug-2.28-151.el8.aarch64.rpm 8aff1eb1ef009b8491483993efc5896f016bbd68997270a8a067563133f13339 glibc-langpack-uk-2.28-151.el8.aarch64.rpm c9c6f4823538eabe19fe841c43230cd76a17a95f092fba547160f226ad3ce636 glibc-langpack-unm-2.28-151.el8.aarch64.rpm 0de5b2a28e54c18fe23bddd37860205556b5f783e1d81f91a9a895555cf0d121 glibc-langpack-ur-2.28-151.el8.aarch64.rpm 71b5cfa44e37980c21f6e34b5da710d431be9d924bf050ca3840a078d1016b5a glibc-langpack-uz-2.28-151.el8.aarch64.rpm 75b6d66b2c2419318e18e7b29b3a84c21050b5ca95c4217c4741a9fb470fac5f glibc-langpack-ve-2.28-151.el8.aarch64.rpm 69dc1f009faf1b533ae2e2118e150a75787f885d9cac1d8c0ccb77d183b33dfa glibc-langpack-vi-2.28-151.el8.aarch64.rpm ffa54d34833d2330e99e175eace609abbfca39d39356b4a5be66b8e574ee330b glibc-langpack-wa-2.28-151.el8.aarch64.rpm 30f5cd54d146709992f200ec8213c456349a1fbb4aa2c1e9a564a3ac1fc5cd94 glibc-langpack-wae-2.28-151.el8.aarch64.rpm 27c727d60897aa590da2eda2941d2b3d465eb2773cb266650700a392d120b03b glibc-langpack-wal-2.28-151.el8.aarch64.rpm 843d089bca7f75efeb05a9200e2814f72157a18347c8958c1be2afebd3886cb2 glibc-langpack-wo-2.28-151.el8.aarch64.rpm 875c0812429568a43d2f1eab88bfdfceb96bb4884fbc1c75d6aaa88f6d8f06fc glibc-langpack-xh-2.28-151.el8.aarch64.rpm d4e2b235f73718ce412695ef67b11753efd431c1905ebc6c5bf7b2c12b4a403f glibc-langpack-yi-2.28-151.el8.aarch64.rpm 94427aa8c5e3fa42f1b793dcd092c39b76a0a14b810f3438cea521d6f3de2103 glibc-langpack-yo-2.28-151.el8.aarch64.rpm e3a91580c3ce45434a58363b6c9b18da438ecd3c6b72ba6f87e289076544396a glibc-langpack-yue-2.28-151.el8.aarch64.rpm ca0d70172683fa0874d3383c1abcaa4901c2e5c0c4ad7bf02c5d1a702ad7af46 glibc-langpack-yuw-2.28-151.el8.aarch64.rpm f58cf66a099d2abe5f0a2af9fcb939ce511766263e0ce699ced7206ff2f90537 glibc-langpack-zh-2.28-151.el8.aarch64.rpm a21eedc00471ba8205a246fbd3c9a532fb0eb5ba02a3a70d924795065670eeb9 glibc-langpack-zu-2.28-151.el8.aarch64.rpm 1bae90e609b0521ca4eab00bde3a61d631342b4e2a6c5730c85e28dbd85f93b9 glibc-locale-source-2.28-151.el8.aarch64.rpm 9d7849a57f49b8bfc5e12a62be1d11f57be5dd22b1de6356e35338d2b866519c glibc-minimal-langpack-2.28-151.el8.aarch64.rpm 5856c74e6054c2281c8b2fbe81c88d2b0f1a7efe7d83491b48f039afd4166971 libnsl-2.28-151.el8.aarch64.rpm 20a65c49afd45d64e6a790beeb8425f0db26e0fa4b08df4b369ecb7fc827adf1 nscd-2.28-151.el8.aarch64.rpm a605df2ecd0d564c5647b65c74d8fd8ff72b5962baa422088f61e8e6f7f9b6aa nss_db-2.28-151.el8.aarch64.rpm 813bb8217f1ed9983c81c5abc487e7caa919efcaed7c77205b514e2fd56a8804 RLBA-2021:1588 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.4.26-77.el8.aarch64.rpm 55ccf1fdf43b36fe6bd78e7efb78fbb7637bfe39537a0ff5572e86bdb3a63508 vdo-6.2.4.14-14.el8.aarch64.rpm db969fa6f705236b54b6ea233b9c93402c76093443058acdc1f85b26ec37f1a2 vdo-support-6.2.4.14-14.el8.aarch64.rpm d357b0176caa8330bcd63230301f5f374d34336fe4f546a240be1f797990ea9a RLBA-2021:1589 hwloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms hwloc-2.2.0-1.el8.aarch64.rpm 687f4ab43fbe9b8abe5d6447c18eb1600f782eb6f9f710ec03bfb331d0580043 hwloc-libs-2.2.0-1.el8.aarch64.rpm 1a4503ee70509218abc2f70182fcffcdd536db27c5f4c31e8e70afae3674d412 RLBA-2021:1590 quota bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for quota. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms quota-4.04-12.el8.aarch64.rpm 172cc0fea5df0c97007c237548598087a56db7589c752f80bcbc313adb879f9a quota-doc-4.04-12.el8.noarch.rpm 8daf6c52073fe73951367564fe787b805fadc01662c8cca3268c37905e2252af quota-doc-4.04-12.el8.noarch.rpm 8daf6c52073fe73951367564fe787b805fadc01662c8cca3268c37905e2252af quota-nld-4.04-12.el8.aarch64.rpm b7c8a8bd1c3ad439365a886217d57bda054918775d5cf1c38177fe13a04369a3 quota-nls-4.04-12.el8.noarch.rpm 62b388274490634701b862791915d337e03878b2f9a56aa227ae7d68d11879de quota-nls-4.04-12.el8.noarch.rpm 62b388274490634701b862791915d337e03878b2f9a56aa227ae7d68d11879de quota-rpc-4.04-12.el8.aarch64.rpm cbbd16240d4db059976f190f539e19c99232201c1e2422c56cf1d15b21a9a1a7 quota-warnquota-4.04-12.el8.aarch64.rpm e31b840ab3d36fcdf24321d89d1c585023ecfb8284153279130e0766e18f3f49 RLBA-2021:1592 gssproxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gssproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms gssproxy-0.8.0-19.el8.aarch64.rpm fbd82ffb262d4a1100450130e3a7584738fd0f92d779d3ac1fd2336c65764dd1 gssproxy-0.8.0-19.el8.aarch64.rpm fbd82ffb262d4a1100450130e3a7584738fd0f92d779d3ac1fd2336c65764dd1 RLSA-2021:1593 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: unbounded recursion via an ASN.1-encoded Kerberos message in lib/krb5/asn.1/asn1_encode.c may lead to DoS (CVE-2020-28196) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms krb5-devel-1.18.2-8.el8.aarch64.rpm dde91aa5b2cfa1c270b0412f0d48b21163b734fbe1801752dd06985045d145c8 krb5-libs-1.18.2-8.el8.aarch64.rpm ce6023db3a8de7cdb23096053922dc6b63ddb94aa0a83f992ea76c0bc2bf068f krb5-pkinit-1.18.2-8.el8.aarch64.rpm a75e315d7302174019bf8e688bc6fe3f05bcfae73d374d93058be4aacf787d79 krb5-server-1.18.2-8.el8.aarch64.rpm e1bcde4f1440e5e13ab287de950a22d1857b352e01b661f5d238fd9c645b5ea1 krb5-server-ldap-1.18.2-8.el8.aarch64.rpm f6f1608432029fef638e1da727f8efe056225cff83a70e4d89e5041f2362b1e1 krb5-workstation-1.18.2-8.el8.aarch64.rpm 81f16054eab5a32bd31ab9e05da9919fa207b72ffcf2c10259012f783b78941f libkadm5-1.18.2-8.el8.aarch64.rpm a07a2202d75f392641589cebce433bf10f7a01f0b748230e3d920c6b7eb2a234 RLBA-2021:1594 RDMA stack bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mpitests, mvapich2, ucx, opensm, rdma-core, mstflint, libvma, libpsm2, fabtests, openmpi, perftest, mpich, libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ibacm-32.0-4.el8.aarch64.rpm d22a01efbc07cfbb80992182e30ce270563494199ad9d329b35d19b64f8fd996 infiniband-diags-32.0-4.el8.aarch64.rpm f6402b6406b30dea6979d4b5466991084ae8d81c29334d8533d9ef455e254c9c iwpmd-32.0-4.el8.aarch64.rpm d116abb61d5a60abaa730939a52ac83b0debe21e55f3642ecb209062468a1a4b libfabric-1.11.2-1.el8.aarch64.rpm 2ad649cb2e0f83c11d4e3ae0cf251ca7ed0b39ebfdf71aab51eaa344feac08ff libibumad-32.0-4.el8.aarch64.rpm d7612a1590586b87e1d5f8a2a72feb4be51c7368be5a73e49501212628240b5e libibverbs-32.0-4.el8.aarch64.rpm b1183edfbd2c8cc2f062a6da4e9f9b7603f72a6bba9d75b8d155d46cea776c66 libibverbs-utils-32.0-4.el8.aarch64.rpm abf0357b839b712d6cf50b96718bacb709c89f6133a60c0e89fb44c2308beb6e librdmacm-32.0-4.el8.aarch64.rpm 630f35e0d81ed9e98ead90255f202842becedb6935399270617d775d3fa7f2d0 librdmacm-utils-32.0-4.el8.aarch64.rpm c86ded390a91ef20cc3b57be8e7ff76a10111f61de5217d6fc7fc8500789a93f opensm-3.3.23-4.el8.aarch64.rpm 539d1817873819695a166ba10a60061294ddcf30df95fe2ac00dc7ee0dd2232d opensm-libs-3.3.23-4.el8.aarch64.rpm 1e1c726340c62bcc33fc6d66dc36dae09360bc643ae5421637ea746b05793b91 perftest-4.4-8.el8.aarch64.rpm 504664a3ae857153f743c0083b12fcba8ceaf7ea130ba3923062a4e0572b6beb python3-pyverbs-32.0-4.el8.aarch64.rpm 930163998317b22f6740808f7da3922a89d4eacb06cb07ac57118f095c9069e6 rdma-core-32.0-4.el8.aarch64.rpm 7eb582fe24e5d4bfd55265c02716fcf4a3ab02fddd8a315b951fa044efacf6cf rdma-core-devel-32.0-4.el8.aarch64.rpm dd152e25f8bd0cb32424ad5c7b5cff55d438d2218b395a0e253feca75886a646 srp_daemon-32.0-4.el8.aarch64.rpm b184d5a4e6c65d0c8bacda6f7efbba072e7eafaa6ebaca62fbd2a8f15b76896d RLBA-2021:1595 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms opencryptoki-3.15.1-5.el8.aarch64.rpm 3e488fa8696e9e76c0b4733a10766f049c9f22612fac3dcf4338a7f394b7fc57 opencryptoki-icsftok-3.15.1-5.el8.aarch64.rpm 6337b0c7f0fe8ba2ce379e363796d5977cd723a033df951b0137c7c0dbeda22c opencryptoki-libs-3.15.1-5.el8.aarch64.rpm cc1e8acb15b295b82e0109b765792adaffe04ca2564bd2b90a2385cf3aad3c15 opencryptoki-swtok-3.15.1-5.el8.aarch64.rpm 0aec1e2c865ed10fdd529bc8347b980e20050283e4598a8280394fbdc1126031 opencryptoki-tpmtok-3.15.1-5.el8.aarch64.rpm caa173f81536cae5aca85458d3cef2869a7278a8b8c9b59e3b49d5da351b6a91 RLBA-2021:1596 libselinux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libselinux-2.9-5.el8.aarch64.rpm 5fba9e23c760157a7d4e04db0c4f403247b9ffcaad382dc8ee836efd04f43137 libselinux-2.9-5.el8.aarch64.rpm 5fba9e23c760157a7d4e04db0c4f403247b9ffcaad382dc8ee836efd04f43137 libselinux-2.9-5.el8.aarch64.rpm 5fba9e23c760157a7d4e04db0c4f403247b9ffcaad382dc8ee836efd04f43137 libselinux-devel-2.9-5.el8.aarch64.rpm 2bee0cb06f718afa2192c12757cb723d22869ddb42c8189aa41d1ecf87dc76d7 libselinux-devel-2.9-5.el8.aarch64.rpm 2bee0cb06f718afa2192c12757cb723d22869ddb42c8189aa41d1ecf87dc76d7 libselinux-devel-2.9-5.el8.aarch64.rpm 2bee0cb06f718afa2192c12757cb723d22869ddb42c8189aa41d1ecf87dc76d7 libselinux-utils-2.9-5.el8.aarch64.rpm 2729117e060ef0430b19d09b8cf0d42ba238dd59e45d30620ad39352b033d1ae libselinux-utils-2.9-5.el8.aarch64.rpm 2729117e060ef0430b19d09b8cf0d42ba238dd59e45d30620ad39352b033d1ae libselinux-utils-2.9-5.el8.aarch64.rpm 2729117e060ef0430b19d09b8cf0d42ba238dd59e45d30620ad39352b033d1ae python3-libselinux-2.9-5.el8.aarch64.rpm fbe3de70d936817abba7b6b1d53455476504f6fdb57fa845a2a2a39e8d620038 python3-libselinux-2.9-5.el8.aarch64.rpm fbe3de70d936817abba7b6b1d53455476504f6fdb57fa845a2a2a39e8d620038 python3-libselinux-2.9-5.el8.aarch64.rpm fbe3de70d936817abba7b6b1d53455476504f6fdb57fa845a2a2a39e8d620038 RLSA-2021:1597 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Buffer overflow vulnerability in xmlEncodeEntitiesInternal() in entities.c (CVE-2020-24977) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libxml2-2.9.7-9.el8.aarch64.rpm 8e68f8bb0805e8597e65c130aafd1c479c4e9bd0f75a6e18d5236ea50b5de730 python3-libxml2-2.9.7-9.el8.aarch64.rpm 22bae796518ad2ae44d08f3b1a17163dab416b7b83e8586d1825f3006a022531 RLSA-2021:1598 Moderate: bluez security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Security Fix(es): * bluez: double free in gatttool client disconnect callback handler in src/shared/att.c could lead to DoS or RCE (CVE-2020-27153) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms bluez-5.52-4.el8.aarch64.rpm 91ae47d3594950c9a21ece2b915a85f9a24d8ac460acbfaa21a06046287b9ded bluez-hid2hci-5.52-4.el8.aarch64.rpm 31c8c315e8a917000bed496d1796bf66c33adf3329b5367d73d060589423e805 bluez-libs-5.52-4.el8.aarch64.rpm c871218678e4ec2c346100012b67a090a25d1114e13eb3fdd49a543ce6cc06be bluez-obexd-5.52-4.el8.aarch64.rpm ab89ab933e6eea7f32ab098b4033938c264e6e5bea48f2bf5fb3395d1654ad7a RLBA-2021:1601 json-c bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms json-c-0.13.1-0.4.el8.aarch64.rpm 8f9fb8f1e26a0d5e5db171710f1655679b36a12ada6e0588f341aaccb8a93c2c RLEA-2021:1602 python-rtslib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-rtslib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms python3-rtslib-2.1.74-1.el8.noarch.rpm 0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3 python3-rtslib-2.1.74-1.el8.noarch.rpm 0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3 python3-rtslib-2.1.74-1.el8.noarch.rpm 0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3 python3-rtslib-2.1.74-1.el8.noarch.rpm 0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3 python3-rtslib-2.1.74-1.el8.noarch.rpm 0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3 python3-rtslib-2.1.74-1.el8.noarch.rpm 0ff663a04d62938fdbf39c35d9f2eff451f2fb391119ff05e9e41af283706dc3 target-restore-2.1.74-1.el8.noarch.rpm e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935 target-restore-2.1.74-1.el8.noarch.rpm e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935 target-restore-2.1.74-1.el8.noarch.rpm e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935 target-restore-2.1.74-1.el8.noarch.rpm e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935 target-restore-2.1.74-1.el8.noarch.rpm e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935 target-restore-2.1.74-1.el8.noarch.rpm e53b00f1d3a4b8c9597e985795ffd04afa18b2a8953a9cedcb03a0e44b978935 RLBA-2021:1603 zlib bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms zlib-1.2.11-17.el8.aarch64.rpm 0a569685d382ef68a3e9559a7e9baa3993bed2ae50f6ca1a9ba3e8dd53b80cbf zlib-1.2.11-17.el8.aarch64.rpm 0a569685d382ef68a3e9559a7e9baa3993bed2ae50f6ca1a9ba3e8dd53b80cbf zlib-devel-1.2.11-17.el8.aarch64.rpm 49c7d6a144f00d8a6bdd0cc42b53b212f802c765c36165e1890dd7b28989abbd zlib-devel-1.2.11-17.el8.aarch64.rpm 49c7d6a144f00d8a6bdd0cc42b53b212f802c765c36165e1890dd7b28989abbd RLEA-2021:1604 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms sos-4.0-11.el8.noarch.rpm 50b81cb4828abe89a90d67230db56a2f4c76f6d9477f8d28d235a0e5ad136869 sos-4.0-11.el8.noarch.rpm 50b81cb4828abe89a90d67230db56a2f4c76f6d9477f8d28d235a0e5ad136869 sos-audit-4.0-11.el8.noarch.rpm b97221e0859852ec9f5f6208f3cbf3b86c5f654fa9556a41cc78801b42e82d28 sos-audit-4.0-11.el8.noarch.rpm b97221e0859852ec9f5f6208f3cbf3b86c5f654fa9556a41cc78801b42e82d28 RLBA-2021:1605 libpwquality bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libpwquality. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libpwquality-1.4.4-3.el8.aarch64.rpm b1f92fd94d64c184c50b43c6c47d201517bdc78ca331ff4ba9e33a043faeacd4 libpwquality-1.4.4-3.el8.aarch64.rpm b1f92fd94d64c184c50b43c6c47d201517bdc78ca331ff4ba9e33a043faeacd4 libpwquality-1.4.4-3.el8.aarch64.rpm b1f92fd94d64c184c50b43c6c47d201517bdc78ca331ff4ba9e33a043faeacd4 python3-pwquality-1.4.4-3.el8.aarch64.rpm febd5b2a5ee1929a95bedc226de063be19e8ac1e62c664b7961b7c992ec9ff05 python3-pwquality-1.4.4-3.el8.aarch64.rpm febd5b2a5ee1929a95bedc226de063be19e8ac1e62c664b7961b7c992ec9ff05 python3-pwquality-1.4.4-3.el8.aarch64.rpm febd5b2a5ee1929a95bedc226de063be19e8ac1e62c664b7961b7c992ec9ff05 RLBA-2021:1606 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms python3-rpm-4.14.3-13.el8.aarch64.rpm 6ad463289e3ca3c96225296c591c06baa8e7e7e2d3d4e5cee522b5571e8d7d3f rpm-4.14.3-13.el8.aarch64.rpm be3ecbabc71b09a112c37045d98c3e5f6b1cc8f135d88c0cb8e169a3f8a7bc16 rpm-apidocs-4.14.3-13.el8.noarch.rpm 64c105f5034af1c57246c11b2cc3c8041e4f4a0b9094f327def414a6aa47c4a6 rpm-apidocs-4.14.3-13.el8.noarch.rpm 64c105f5034af1c57246c11b2cc3c8041e4f4a0b9094f327def414a6aa47c4a6 rpm-build-libs-4.14.3-13.el8.aarch64.rpm bebc7eec7b9894775fc8f89ddb1aa85af53f2de0ffdda43714ff0418873f06cc rpm-cron-4.14.3-13.el8.noarch.rpm fb8f2a0189a3c8aea8bd39af62c9bd2f753b939314a19fd934327d02dc0a8f63 rpm-cron-4.14.3-13.el8.noarch.rpm fb8f2a0189a3c8aea8bd39af62c9bd2f753b939314a19fd934327d02dc0a8f63 rpm-devel-4.14.3-13.el8.aarch64.rpm 2c3a13f0728ebf51a1d9e375d78f7ad85fe17fe71a2229e8054a3193d785004e rpm-libs-4.14.3-13.el8.aarch64.rpm ab04cc9b9c83cd9973b4ed1bafadd23876666ea903e5b5589fc07783013e005e rpm-plugin-ima-4.14.3-13.el8.aarch64.rpm 9e33aacc55b5ea17318414ed5d0d59055b0173da055e9b5e8c16d452f6316cf9 rpm-plugin-prioreset-4.14.3-13.el8.aarch64.rpm 08011cde54c1d9713d9b9e7131068b903159b42e217119ef5165eb427a5502a0 rpm-plugin-selinux-4.14.3-13.el8.aarch64.rpm 1810c7e9a02ecfbdb30152d0a081fbccf2d6e570cbdbb9b93463c4e95c1849d3 rpm-plugin-syslog-4.14.3-13.el8.aarch64.rpm c7d218c9f79007768a56b0eaceb3f17ca7891b6ed493ecf4415402db567f7b60 rpm-plugin-systemd-inhibit-4.14.3-13.el8.aarch64.rpm 1274f6e2b6c91003c88975fe2ed7f79c61a143c2c3984a4a967284143416c2ee rpm-sign-4.14.3-13.el8.aarch64.rpm 9fec001c69e74ab778664b8791c8dc7b280e2281ad27edd6af06ba7adce14382 RLBA-2021:1607 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.20-46.el8.aarch64.rpm 488a426986ad256a75bc3841b2caa88d95d05acab448c024e49bade0c11bb1a5 RLSA-2021:1608 Moderate: python-cryptography security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. The following packages have been upgraded to a later upstream version: python-cryptography (3.2.1). (BZ#1873581, BZ#1891947) Security Fix(es): * python-cryptography: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25659) * python-cryptography: certain sequences of update() calls when symmetrically encrypting very large payloads could result in an integer overflow and lead to buffer overflows (CVE-2020-36242) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms python3-cryptography-3.2.1-4.el8.aarch64.rpm de2575db405dd68f2d663e62e753407de0632ddaa23900a552c7c683c8e7d9c8 RLSA-2021:1610 Moderate: curl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: FTP PASV command response can cause curl to connect to arbitrary host (CVE-2020-8284) * curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used (CVE-2020-8285) * curl: Inferior OCSP verification (CVE-2020-8286) * curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set (CVE-2020-8231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms curl-7.61.1-18.el8.aarch64.rpm 478ba5b42f05bbdbd0dffab38937d5b4f0ab30ca6c3668fdb278a02bde019146 libcurl-7.61.1-18.el8.aarch64.rpm 5d2f4a00da62c6ffeef8740bed85e57d43cca58df1b8314221e20acd27c8cf94 libcurl-devel-7.61.1-18.el8.aarch64.rpm b3e581e863fc4f54b287f19cac319a70e944ba273e18b701054a9e3a11977245 libcurl-minimal-7.61.1-18.el8.aarch64.rpm 724c8c6b2f4342b21e1ca129eabbeeb5377ad61da9cb844a92421dbb4571fa02 RLSA-2021:1611 Moderate: systemd security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" (CVE-2019-3842) * systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms systemd-239-45.el8.aarch64.rpm cb743f07a14cdf3647237aeee7e0c1b0355305b707df2cab3dc80d5d788925db systemd-container-239-45.el8.aarch64.rpm 7bc2bb7b87fb21e5cb10ef0c3da0cc29fcae3761c4481a91b190c44a3e531945 systemd-devel-239-45.el8.aarch64.rpm f9d248aad304c0a054ed320624270642e782171b4313bbb5ab58e907656c6e5e systemd-journal-remote-239-45.el8.aarch64.rpm f17c55ef2bd75447d9546121f0101b8881539b07f722ce7b809357460d45855a systemd-libs-239-45.el8.aarch64.rpm b4891ad2870fca32b7877b3f9dcdda69b9fb5994983200e88fde10d9ae87cbd3 systemd-pam-239-45.el8.aarch64.rpm 77d258c6ab7930c12f18f4171f8e5842211b5f8014c09d2b09c9f65fddcf4cb6 systemd-tests-239-45.el8.aarch64.rpm 2a6c377a4376641e7a3c349b036f4a5a3851740862e2646218d21d3c8c6df55a systemd-udev-239-45.el8.aarch64.rpm 0cfa0d56754c0f49242400016dac602640e6cb33945f603e47a42bc9e75c5151 RLEA-2021:1614 fcoe-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fcoe-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms fcoe-utils-1.0.33-3.git848bcc6.el8.aarch64.rpm bbffaf61b4ebd05d68bb2dea9253862212778021845c0698718a08ef2c290fa1 RLBA-2021:1616 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms elfutils-0.182-3.el8.aarch64.rpm 6e0369d90bd8e330b60c941a95c6b350e951890f809a3d110a7fe0518d76dc77 elfutils-debuginfod-0.182-3.el8.aarch64.rpm 5744738b82b3de21423057ee68c7b1ebd7790620e4ffadc123f7057b08e839a4 elfutils-debuginfod-client-0.182-3.el8.aarch64.rpm 38210c8beb1dd353d8e6e71abe19ce23460d4d74443f4f694a72845e742f07f3 elfutils-debuginfod-client-devel-0.182-3.el8.aarch64.rpm 07e2396303d54d90fefe407f9774dbda7dabcf92cf6029457abd920980838f94 elfutils-default-yama-scope-0.182-3.el8.noarch.rpm 0e0af0afb8b48ba11ff99c84b0d9d0f275aade4aa5804e3acee86214efe83bb8 elfutils-default-yama-scope-0.182-3.el8.noarch.rpm 0e0af0afb8b48ba11ff99c84b0d9d0f275aade4aa5804e3acee86214efe83bb8 elfutils-devel-0.182-3.el8.aarch64.rpm 40eba1d0b1c49beb9274b40e004f5de4c88b97d8ad87631497f6230d953af317 elfutils-libelf-0.182-3.el8.aarch64.rpm 775a276f646c276a2b4938459c82fdccd7e05ff94aafb6ea6997eb6b871aa8be elfutils-libelf-devel-0.182-3.el8.aarch64.rpm a54df04ad1d06f132fcfb0491ce5998ee3f1ee227ae45d1fb1ffe98f924693bf elfutils-libs-0.182-3.el8.aarch64.rpm 7b643c9d33fe90300c98e8c805f7277a99acfe60d81d5421541c9846d206e91b RLEA-2021:1618 iscsi-initiator-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms iscsi-initiator-utils-6.2.1.2-1.gita8fcb37.el8.aarch64.rpm 49661e09839d8cbdea0d3784477bbebf059f95f08966f80f32ef361960058c46 iscsi-initiator-utils-iscsiuio-6.2.1.2-1.gita8fcb37.el8.aarch64.rpm d1564401399b1dda0398968da973315a5e080c2b675beec2174b044f86e3d843 python3-iscsi-initiator-utils-6.2.1.2-1.gita8fcb37.el8.aarch64.rpm 64a38832fa5e8e5cf217269fba5d4d5661db8b49043966a6d24f2ba58c58d0f2 RLSA-2021:1620 Important: linux-firmware security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-102.el8.1.noarch.rpm a687384046a8ec8acb5b1dcbb5dd743f5cf74a58d438525a3f3eb4e85a4de4ff iwl1000-firmware-39.31.5.1-102.el8.1.noarch.rpm a687384046a8ec8acb5b1dcbb5dd743f5cf74a58d438525a3f3eb4e85a4de4ff iwl100-firmware-39.31.5.1-102.el8.1.noarch.rpm 16ff9a63f70fadb2b3fa287b4fc1dc479b2f8cc3e60a1a58ed84903b3bbae4ad iwl100-firmware-39.31.5.1-102.el8.1.noarch.rpm 16ff9a63f70fadb2b3fa287b4fc1dc479b2f8cc3e60a1a58ed84903b3bbae4ad iwl105-firmware-18.168.6.1-102.el8.1.noarch.rpm 1d40ec5332d8d121a473ca8785813a34a613ff953c70d1da22ad14d5cece8a7e iwl105-firmware-18.168.6.1-102.el8.1.noarch.rpm 1d40ec5332d8d121a473ca8785813a34a613ff953c70d1da22ad14d5cece8a7e iwl135-firmware-18.168.6.1-102.el8.1.noarch.rpm 4ead9d7c935e53f7279d76cb973b2107dc06485b7ebe6c545c95c4636655b5ce iwl135-firmware-18.168.6.1-102.el8.1.noarch.rpm 4ead9d7c935e53f7279d76cb973b2107dc06485b7ebe6c545c95c4636655b5ce iwl2000-firmware-18.168.6.1-102.el8.1.noarch.rpm 6f07648ccf3baaa296261add371ff663df9b29a847e905b1addc06b9d10bd81a iwl2000-firmware-18.168.6.1-102.el8.1.noarch.rpm 6f07648ccf3baaa296261add371ff663df9b29a847e905b1addc06b9d10bd81a iwl2030-firmware-18.168.6.1-102.el8.1.noarch.rpm 1dd7bbef2189d6201accc58618103e217bc9417dad0cb8d6858f484bae951d56 iwl2030-firmware-18.168.6.1-102.el8.1.noarch.rpm 1dd7bbef2189d6201accc58618103e217bc9417dad0cb8d6858f484bae951d56 iwl3160-firmware-25.30.13.0-102.el8.1.noarch.rpm 4b61a97e6ac1b5f9cef070b4252f1419d02ab5529026736fdd6f9f59d47f4415 iwl3160-firmware-25.30.13.0-102.el8.1.noarch.rpm 4b61a97e6ac1b5f9cef070b4252f1419d02ab5529026736fdd6f9f59d47f4415 iwl3945-firmware-15.32.2.9-102.el8.1.noarch.rpm 1b157a5308f55c0959f7a4bbcb3fb0444b435f6c8275d9ab32eb521b92ef3cf0 iwl3945-firmware-15.32.2.9-102.el8.1.noarch.rpm 1b157a5308f55c0959f7a4bbcb3fb0444b435f6c8275d9ab32eb521b92ef3cf0 iwl4965-firmware-228.61.2.24-102.el8.1.noarch.rpm 4f269b72ea6b08d88d78d447c48288c7ecca28367e66244025da09469a57bd86 iwl4965-firmware-228.61.2.24-102.el8.1.noarch.rpm 4f269b72ea6b08d88d78d447c48288c7ecca28367e66244025da09469a57bd86 iwl5000-firmware-8.83.5.1_1-102.el8.1.noarch.rpm b9c992cde879737babbcd6cc741f4401e54bd4108027bebdaf2c10401dbc096d iwl5000-firmware-8.83.5.1_1-102.el8.1.noarch.rpm b9c992cde879737babbcd6cc741f4401e54bd4108027bebdaf2c10401dbc096d iwl5150-firmware-8.24.2.2-102.el8.1.noarch.rpm 1d695dcca2c0332d60860d63f36d0352dae41cc0eb83ca8e175b76e1aacc0095 iwl5150-firmware-8.24.2.2-102.el8.1.noarch.rpm 1d695dcca2c0332d60860d63f36d0352dae41cc0eb83ca8e175b76e1aacc0095 iwl6000-firmware-9.221.4.1-102.el8.1.noarch.rpm a249728056ca58a9c4a4eb4bf9bcbe733d0c24b195c3614e7604707d675d5664 iwl6000-firmware-9.221.4.1-102.el8.1.noarch.rpm a249728056ca58a9c4a4eb4bf9bcbe733d0c24b195c3614e7604707d675d5664 iwl6000g2a-firmware-18.168.6.1-102.el8.1.noarch.rpm ca5cdfe8311c935aaf8ce3d654481135a026be89883f2d8d3be0a90e5a98ce74 iwl6000g2a-firmware-18.168.6.1-102.el8.1.noarch.rpm ca5cdfe8311c935aaf8ce3d654481135a026be89883f2d8d3be0a90e5a98ce74 iwl6000g2b-firmware-18.168.6.1-102.el8.1.noarch.rpm d2488a5fb95764b7c25425fb058367aa8752c883bd26a873bd2f7c8da475f997 iwl6000g2b-firmware-18.168.6.1-102.el8.1.noarch.rpm d2488a5fb95764b7c25425fb058367aa8752c883bd26a873bd2f7c8da475f997 iwl6050-firmware-41.28.5.1-102.el8.1.noarch.rpm 953a958fbf61a1a6bff2102cedef05b5a0d11afd6671d020d6c4994ee12af846 iwl6050-firmware-41.28.5.1-102.el8.1.noarch.rpm 953a958fbf61a1a6bff2102cedef05b5a0d11afd6671d020d6c4994ee12af846 iwl7260-firmware-25.30.13.0-102.el8.1.noarch.rpm 40a72af5eb90efaeb78bbaf3048681ca2627fb9d170d17dc068705b689360302 iwl7260-firmware-25.30.13.0-102.el8.1.noarch.rpm 40a72af5eb90efaeb78bbaf3048681ca2627fb9d170d17dc068705b689360302 libertas-sd8686-firmware-20201218-102.git05789708.el8.noarch.rpm 5f2473e02993326bb1468d5cac746a0763750865e567b8d76d169a75e56fe05f libertas-sd8686-firmware-20201218-102.git05789708.el8.noarch.rpm 5f2473e02993326bb1468d5cac746a0763750865e567b8d76d169a75e56fe05f libertas-sd8787-firmware-20201218-102.git05789708.el8.noarch.rpm 8e5d42d37dd3b9f4a384e9a4fefd6b75a2f4a5712ae120ce6cc03b9feee75a8f libertas-sd8787-firmware-20201218-102.git05789708.el8.noarch.rpm 8e5d42d37dd3b9f4a384e9a4fefd6b75a2f4a5712ae120ce6cc03b9feee75a8f libertas-usb8388-firmware-20201218-102.git05789708.el8.noarch.rpm 54c5f9af5f51ed65460623e6122038509bf33a97d3e3811a1af931dbbed7e87c libertas-usb8388-firmware-20201218-102.git05789708.el8.noarch.rpm 54c5f9af5f51ed65460623e6122038509bf33a97d3e3811a1af931dbbed7e87c libertas-usb8388-olpc-firmware-20201218-102.git05789708.el8.noarch.rpm 1074e2c3e9dc36bd554614fa48cf052f1036be58eab68c4e01f4f43f4a1a29a0 libertas-usb8388-olpc-firmware-20201218-102.git05789708.el8.noarch.rpm 1074e2c3e9dc36bd554614fa48cf052f1036be58eab68c4e01f4f43f4a1a29a0 linux-firmware-20201218-102.git05789708.el8.noarch.rpm e46da9352cd969c9222e30c690fd37ee3138354ef5ce7bf6f483c156d786d8dc linux-firmware-20201218-102.git05789708.el8.noarch.rpm e46da9352cd969c9222e30c690fd37ee3138354ef5ce7bf6f483c156d786d8dc RLBA-2021:1621 autofs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms autofs-5.1.4-48.el8.aarch64.rpm 9523bfc35f6d8fc64a3625c6f00d6b457b5b47edbe2ccc5f8cee3825e01776c7 RLBA-2021:1622 rsync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms rsync-3.1.3-12.el8.aarch64.rpm 04fdf235ba49d0108211d566b4f2def081ba2e42c1bc81426169668e6e208688 rsync-3.1.3-12.el8.aarch64.rpm 04fdf235ba49d0108211d566b4f2def081ba2e42c1bc81426169668e6e208688 rsync-daemon-3.1.3-12.el8.noarch.rpm 72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a rsync-daemon-3.1.3-12.el8.noarch.rpm 72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a rsync-daemon-3.1.3-12.el8.noarch.rpm 72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a rsync-daemon-3.1.3-12.el8.noarch.rpm 72fa6893461b748c1f2254e2aa36efa54f5b2875817149ab7145a6854d347e8a RLBA-2021:1624 initscripts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initscripts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms initscripts-10.00.15-1.el8.aarch64.rpm 67a5e83e77b11e127b688b9d212c0fad4bb9e0243da8d282e5eec179693e0ca6 initscripts-10.00.15-1.el8.aarch64.rpm 67a5e83e77b11e127b688b9d212c0fad4bb9e0243da8d282e5eec179693e0ca6 netconsole-service-10.00.15-1.el8.noarch.rpm 489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8 netconsole-service-10.00.15-1.el8.noarch.rpm 489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8 netconsole-service-10.00.15-1.el8.noarch.rpm 489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8 netconsole-service-10.00.15-1.el8.noarch.rpm 489cffbda2392eb077943af2e2365af795a787dd6bffae38f5ad5116d0f81fa8 network-scripts-10.00.15-1.el8.aarch64.rpm 48d59a9f236084fd88bbe966bb5e805d63df114738bf06da5dc6b459b702d2ad network-scripts-10.00.15-1.el8.aarch64.rpm 48d59a9f236084fd88bbe966bb5e805d63df114738bf06da5dc6b459b702d2ad readonly-root-10.00.15-1.el8.noarch.rpm 4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd readonly-root-10.00.15-1.el8.noarch.rpm 4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd readonly-root-10.00.15-1.el8.noarch.rpm 4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd readonly-root-10.00.15-1.el8.noarch.rpm 4ceb96fe80aa878cb6c1cc4d5551aa6659a94c30337656339af059555150e7bd RLBA-2021:1625 hdparm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hdparm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms hdparm-9.54-3.el8.aarch64.rpm ae6fd3c22dad2a78cc2458333288afcedf1627bd0bf2b352c2e56d7e7a2f1064 RLBA-2021:1626 procps-ng bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms procps-ng-3.3.15-6.el8.aarch64.rpm 0d75c705f7f73c6a55995c54323c4f3ad7f50232c433fc69e3bb42c4e1fc421c procps-ng-3.3.15-6.el8.aarch64.rpm 0d75c705f7f73c6a55995c54323c4f3ad7f50232c433fc69e3bb42c4e1fc421c procps-ng-3.3.15-6.el8.aarch64.rpm 0d75c705f7f73c6a55995c54323c4f3ad7f50232c433fc69e3bb42c4e1fc421c procps-ng-i18n-3.3.15-6.el8.noarch.rpm 7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df procps-ng-i18n-3.3.15-6.el8.noarch.rpm 7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df procps-ng-i18n-3.3.15-6.el8.noarch.rpm 7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df procps-ng-i18n-3.3.15-6.el8.noarch.rpm 7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df procps-ng-i18n-3.3.15-6.el8.noarch.rpm 7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df procps-ng-i18n-3.3.15-6.el8.noarch.rpm 7e924ddb6a83e5d967636c0b6e0770588e12381ddea2097d87efb382d78e61df RLBA-2021:1629 libstoragemgmt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libstoragemgmt-1.8.7-1.el8.aarch64.rpm cff708c4e04def60ec281961d0b8912823aa5c76d75fff39d3107583419eb50e libstoragemgmt-arcconf-plugin-1.8.7-1.el8.noarch.rpm a87e9d205088b7533bcab8c498152558253d9c51582850480d4db9c977dc3d42 libstoragemgmt-arcconf-plugin-1.8.7-1.el8.noarch.rpm a87e9d205088b7533bcab8c498152558253d9c51582850480d4db9c977dc3d42 libstoragemgmt-hpsa-plugin-1.8.7-1.el8.noarch.rpm b24397f5b32d5284b06e4591ff53373629130cfd230e1443cb9c03ca504f25a6 libstoragemgmt-hpsa-plugin-1.8.7-1.el8.noarch.rpm b24397f5b32d5284b06e4591ff53373629130cfd230e1443cb9c03ca504f25a6 libstoragemgmt-local-plugin-1.8.7-1.el8.noarch.rpm 08f860086211e7cca983f11602ee63595424a5063b9e8d7cb6aeae76c685cdaf libstoragemgmt-local-plugin-1.8.7-1.el8.noarch.rpm 08f860086211e7cca983f11602ee63595424a5063b9e8d7cb6aeae76c685cdaf libstoragemgmt-megaraid-plugin-1.8.7-1.el8.noarch.rpm 86841dbd69babaf9debc5fe88a0163cefc1e7405329112015b34065bac5b1e6c libstoragemgmt-megaraid-plugin-1.8.7-1.el8.noarch.rpm 86841dbd69babaf9debc5fe88a0163cefc1e7405329112015b34065bac5b1e6c libstoragemgmt-nfs-plugin-1.8.7-1.el8.noarch.rpm 5f8ee65b50ca7fd1d1ec88a4f786821b7fe17787e6e17775e50c5ffac0cf0e63 libstoragemgmt-nfs-plugin-1.8.7-1.el8.noarch.rpm 5f8ee65b50ca7fd1d1ec88a4f786821b7fe17787e6e17775e50c5ffac0cf0e63 libstoragemgmt-nfs-plugin-clibs-1.8.7-1.el8.aarch64.rpm 16433121a3fb5ff17631fcd647e07d076c18b2065936fe93cc3533cf745cc672 libstoragemgmt-nstor-plugin-1.8.7-1.el8.noarch.rpm 289e91787020726e8892f4dcb5ce134f60234c7c2af2f14792bf790f4427dc6b libstoragemgmt-nstor-plugin-1.8.7-1.el8.noarch.rpm 289e91787020726e8892f4dcb5ce134f60234c7c2af2f14792bf790f4427dc6b libstoragemgmt-smis-plugin-1.8.7-1.el8.noarch.rpm e4f48caee83624c9172e53c7e78e589558d6405598b3711f61aa7f05c6f68758 libstoragemgmt-smis-plugin-1.8.7-1.el8.noarch.rpm e4f48caee83624c9172e53c7e78e589558d6405598b3711f61aa7f05c6f68758 libstoragemgmt-udev-1.8.7-1.el8.aarch64.rpm d74c363d8eaaf12c287608648d0eda0c1189ba38b015c464b38536448ac8f71a python3-libstoragemgmt-1.8.7-1.el8.noarch.rpm 73eba5a917d5542971b9ea9dd9236e4f5b21f54447d81cafe1f96569a66c79ae python3-libstoragemgmt-1.8.7-1.el8.noarch.rpm 73eba5a917d5542971b9ea9dd9236e4f5b21f54447d81cafe1f96569a66c79ae python3-libstoragemgmt-clibs-1.8.7-1.el8.aarch64.rpm f887fde09cc3e6834f495f01611ffc870c6adfa7e72f45a5a664dd61251e18b6 RLEA-2021:1632 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tzdata-2021a-1.el8.noarch.rpm 07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d tzdata-2021a-1.el8.noarch.rpm 07c126ccfa4d384599054daa90c94d59d63fe455d4c0379f1219dfbeb151d09d RLBA-2021:1634 lsscsi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lsscsi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms lsscsi-0.32-2.el8.aarch64.rpm b14f8bc92a972b0b417beafaafdc895cc2e832006da36f4f5a8c07f12e972eea RLBA-2021:1635 realmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms realmd-0.16.3-22.el8.aarch64.rpm 4c04666f6aa96195fc6bcc707c8dd6e24b026cee4c09c4f91a2a4908acf895f8 RLBA-2021:1637 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms net-snmp-libs-5.8-20.el8.aarch64.rpm 1e44892f7158c7738278bc926f3a1e3b0057268f72e38ed331694772ae44d89d RLBA-2021:1638 adcli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms adcli-0.8.2-9.el8.aarch64.rpm 1be039a2bbe5108c7d04a6978695967c337cd48a42cd2a9cec34fdf97d565a37 adcli-doc-0.8.2-9.el8.noarch.rpm 47546286f27072d7ac55177f60207bbae63d0cd40332bb8897a91cd150b6378a adcli-doc-0.8.2-9.el8.noarch.rpm 47546286f27072d7ac55177f60207bbae63d0cd40332bb8897a91cd150b6378a RLBA-2021:1639 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms selinux-policy-3.14.3-67.el8.noarch.rpm 3664c14d3374eb006166d79bf5ca69ee915949541836b2e17af21db853fe397d selinux-policy-3.14.3-67.el8.noarch.rpm 3664c14d3374eb006166d79bf5ca69ee915949541836b2e17af21db853fe397d selinux-policy-devel-3.14.3-67.el8.noarch.rpm efc6cd4bf08c1b055d987eda24d82d707d1a6655716c68514c51990a6f3d0f83 selinux-policy-devel-3.14.3-67.el8.noarch.rpm efc6cd4bf08c1b055d987eda24d82d707d1a6655716c68514c51990a6f3d0f83 selinux-policy-doc-3.14.3-67.el8.noarch.rpm a9c2a84572385eb95715bb1ff0682574456b1c80352acc510bd0dd00531445cb selinux-policy-doc-3.14.3-67.el8.noarch.rpm a9c2a84572385eb95715bb1ff0682574456b1c80352acc510bd0dd00531445cb selinux-policy-minimum-3.14.3-67.el8.noarch.rpm d5759abbcea0806ccca7e66e60f3696e547f8ea3b33a000455d364a3ff2d5114 selinux-policy-minimum-3.14.3-67.el8.noarch.rpm d5759abbcea0806ccca7e66e60f3696e547f8ea3b33a000455d364a3ff2d5114 selinux-policy-mls-3.14.3-67.el8.noarch.rpm 352e622d1c449cae75530122218104e46dfc555b20a8332bea67e09b1a44e6f0 selinux-policy-mls-3.14.3-67.el8.noarch.rpm 352e622d1c449cae75530122218104e46dfc555b20a8332bea67e09b1a44e6f0 selinux-policy-sandbox-3.14.3-67.el8.noarch.rpm 8168c284e060e15d22f5861a0685e94ee0ff3ac046d9c6933e99e45923989907 selinux-policy-sandbox-3.14.3-67.el8.noarch.rpm 8168c284e060e15d22f5861a0685e94ee0ff3ac046d9c6933e99e45923989907 selinux-policy-targeted-3.14.3-67.el8.noarch.rpm 0b1a5419af7294468174ddc006b2aa9a704c3a076b3b199cee956355c01b53d4 selinux-policy-targeted-3.14.3-67.el8.noarch.rpm 0b1a5419af7294468174ddc006b2aa9a704c3a076b3b199cee956355c01b53d4 RLBA-2021:1641 gfs2-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gfs2-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms gfs2-utils-3.2.0-10.el8.aarch64.rpm 38263257152058fb55fa990c6264932b5ceaf2d2a50eda368c57d766e815f4e0 RLBA-2021:1642 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms iptables-1.8.4-17.el8.aarch64.rpm 480133e197e5a6ab0d547cd0dc8881690d1bff97c6840c2560aa6d732b601239 iptables-arptables-1.8.4-17.el8.aarch64.rpm ef4a932614b7c6c715c1be97e8a95023e26e879ceaa8b9bec9b0ebae0e423a3f iptables-devel-1.8.4-17.el8.aarch64.rpm 94297ae6287a753f31d622129df373f5710672acaf612383b651f06358d18dfd iptables-ebtables-1.8.4-17.el8.aarch64.rpm 23f9984e1ba9f7182fda49c26bea918b24ffe49efdf7c04182b68066b824e544 iptables-libs-1.8.4-17.el8.aarch64.rpm 1d3a03ceb5fc6393f7a2291688cf350b7e4d546d1452414e26a55c0027d62501 iptables-services-1.8.4-17.el8.aarch64.rpm 1d10b11eb7ea8f593f822168fa38e7ed3ebcb15cdaa31349f1d2e360968f12d8 iptables-utils-1.8.4-17.el8.aarch64.rpm 7af5ccaa233d10649a60a352047de9cbaf1bf5de38c73f304e2f711e97c561ec RLBA-2021:1643 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms firewalld-0.8.2-6.el8.noarch.rpm 9b08ed61af2453f1f329b78664d2644d96225ed215b0654e1badb5bf7a7e8180 firewalld-0.8.2-6.el8.noarch.rpm 9b08ed61af2453f1f329b78664d2644d96225ed215b0654e1badb5bf7a7e8180 firewalld-filesystem-0.8.2-6.el8.noarch.rpm 1f8fa731840ad5d427e3c7e6904f9ca69880127868ecff9f422e3d8010bd803a firewalld-filesystem-0.8.2-6.el8.noarch.rpm 1f8fa731840ad5d427e3c7e6904f9ca69880127868ecff9f422e3d8010bd803a python3-firewall-0.8.2-6.el8.noarch.rpm 027ddb435d359e7f21424e87fdb49c62b4fb0f4582982f12fde4e185fbf3c3f7 python3-firewall-0.8.2-6.el8.noarch.rpm 027ddb435d359e7f21424e87fdb49c62b4fb0f4582982f12fde4e185fbf3c3f7 RLSA-2021:1647 Moderate: samba security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for samba, openchange. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. The following packages have been upgraded to a later upstream version: samba (4.13.3). (BZ#1878109) Security Fix(es): * samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472) * samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318) * samba: Unprivileged user can crash winbind (CVE-2020-14323) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ctdb-4.13.3-3.el8.aarch64.rpm 2d09153ce9d5b8a21eea4bc36c992d3ff12cc172de7182ddcad73dad21614211 ctdb-tests-4.13.3-3.el8.aarch64.rpm f50a307effce2e5b68f0686f13d87bfcdf92c7821413861a7acf59e121e9201b libsmbclient-4.13.3-3.el8.aarch64.rpm 5650aea86ceb941b5ae05326754feae6905d3b618ccf4c62242cb91953c760f1 libwbclient-4.13.3-3.el8.aarch64.rpm 8d154fa6fec0a85923c257cb34b5949b6bccd92c3e8bbff2cce6ab45637622e2 python3-samba-4.13.3-3.el8.aarch64.rpm 46763d25a9e2e9a3abb608828df2689824a2a7391ccc98a1aaaea2baa80b1e28 python3-samba-test-4.13.3-3.el8.aarch64.rpm 13c4f4e66d2bd3ee87fc0026357f22bb64746038bb19c8bcf73468cdc511eaeb samba-4.13.3-3.el8.aarch64.rpm aa9fda22025b488fe2be77b6f8a511c2ce0ba8cd19cb07097d55eec1d4939585 samba-client-4.13.3-3.el8.aarch64.rpm 1aa0798509d3a8597aaa60f1e31e4f8017168876b08448dea29127543e0ddf1f samba-client-libs-4.13.3-3.el8.aarch64.rpm 129393fc6dc85a398a84ba0b0452cc905ab060707368d4d59db16b814c2ace94 samba-common-4.13.3-3.el8.noarch.rpm 3ee6d5946eced744d97a17cdafb21cb3c914a7730f659d64cbb955657074ca56 samba-common-4.13.3-3.el8.noarch.rpm 3ee6d5946eced744d97a17cdafb21cb3c914a7730f659d64cbb955657074ca56 samba-common-libs-4.13.3-3.el8.aarch64.rpm e7deba2ebe59e7576f1d35a8b7f17ad16cfde44819fce5b97cfdffcc6f4af1e8 samba-common-tools-4.13.3-3.el8.aarch64.rpm f70c8237b1de5e8686d1fb1fe2489e10f1203979cf28b6d8c3f98acf50f17d29 samba-krb5-printing-4.13.3-3.el8.aarch64.rpm 4442f4bc339fa96d7f7d09bd01509807bf5535436d0700ae2ddb7d3fbc5b4f76 samba-libs-4.13.3-3.el8.aarch64.rpm ff44ac7309fafc43afd8466cdba640dc48b363a704db1b1e8509abaa4e6eae87 samba-pidl-4.13.3-3.el8.noarch.rpm 5967521389690e3d7cc3f250c21bce683bd3f078737ebf35123a3b103b589191 samba-pidl-4.13.3-3.el8.noarch.rpm 5967521389690e3d7cc3f250c21bce683bd3f078737ebf35123a3b103b589191 samba-test-4.13.3-3.el8.aarch64.rpm a1fa0df8a5e2894875028f49d8db0604b2ef2830b32dedce88c0b8d682d50228 samba-test-libs-4.13.3-3.el8.aarch64.rpm d834fe1343188df9eae6f3ee1609c116fb7978b0b45eabe1f6df4f6366fbf819 samba-winbind-4.13.3-3.el8.aarch64.rpm 70fc100bbce81debcf72fe913f354d5d362521ed0171ae59fa4e179ddb3ddcb0 samba-winbind-clients-4.13.3-3.el8.aarch64.rpm 2cd585d64eaf175a990b84b67cf59f885d09dee782b1936e565af453e9d01da7 samba-winbind-krb5-locator-4.13.3-3.el8.aarch64.rpm eb7404f9cd37e2500b25a15b8d8c4e748980d7089e4a610aa79289e5a0951134 samba-winbind-modules-4.13.3-3.el8.aarch64.rpm 2afe717c8d89a9a8b00e0dff4902e68eb56441be47c88ce0bd0e1e335435633e RLBA-2021:1648 grub2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms grub2-common-2.02-99.el8.noarch.rpm ed9f808337d02208d03ecc87f553cb7826ffd12a7f00b5edab6af4d338e0f85e grub2-common-2.02-99.el8.noarch.rpm ed9f808337d02208d03ecc87f553cb7826ffd12a7f00b5edab6af4d338e0f85e grub2-efi-aa64-2.02-99.el8.aarch64.rpm 7eb892437878ca77f71cc17fec5c268575c96ebbd50f18e6cef5a075a9b89c66 grub2-efi-aa64-cdboot-2.02-99.el8.aarch64.rpm 478f1cc74e050d7d36fdc1a63a805c48589db47c3c03321ed97036c0029143f1 grub2-efi-aa64-modules-2.02-99.el8.noarch.rpm 8354cc1cdb4d6ce29404a3e35146f4985d662da81add10144d0d208b40cfe8b7 grub2-efi-aa64-modules-2.02-99.el8.noarch.rpm 8354cc1cdb4d6ce29404a3e35146f4985d662da81add10144d0d208b40cfe8b7 grub2-efi-ia32-modules-2.02-99.el8.noarch.rpm c9a600c9c7bb16f26bdebab4264fccddfd64599d8b648647bc6ff71891aeffea grub2-efi-ia32-modules-2.02-99.el8.noarch.rpm c9a600c9c7bb16f26bdebab4264fccddfd64599d8b648647bc6ff71891aeffea grub2-efi-x64-modules-2.02-99.el8.noarch.rpm 25752a34062c78ebf26c6c2da62009051948ca669f7b8ba9fc6cc225daa41e65 grub2-efi-x64-modules-2.02-99.el8.noarch.rpm 25752a34062c78ebf26c6c2da62009051948ca669f7b8ba9fc6cc225daa41e65 grub2-pc-modules-2.02-99.el8.noarch.rpm e1ee5658bc77e5b3978593ef8c20633067238c3204f731c8479e6452af363bf6 grub2-pc-modules-2.02-99.el8.noarch.rpm e1ee5658bc77e5b3978593ef8c20633067238c3204f731c8479e6452af363bf6 grub2-tools-2.02-99.el8.aarch64.rpm fe8d160cbe67ca29a273ba60a7cc3b9ce07472f1c0483fa9a059425356b958e5 grub2-tools-extra-2.02-99.el8.aarch64.rpm e2e18837d1de94e98bc856b3625a608e3c2777f826b9f060c69ef494613bfcf0 grub2-tools-minimal-2.02-99.el8.aarch64.rpm 60b305d189600d65caeb9a4672ab6a84d76f5cbc777e9a368d0b1d21c3c20ca9 RLBA-2021:1649 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms pam-1.3.1-14.el8.aarch64.rpm ea3540b0ad783b4ba08e0078ccabd1c6d5195d721f8d3bb1247150f8db23d38d pam-devel-1.3.1-14.el8.aarch64.rpm 7400c6f7a8e6f537bb143185fb556e6fd331d0f4e1deab3afdecd7707e116438 RLBA-2021:1650 shadow-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms shadow-utils-4.6-12.el8.aarch64.rpm 5ba82540ab000c334f94425f28e783c2404ddff39639f6ddcb3b08c1e4b811fd RLBA-2021:1652 libldb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ldb-tools-2.2.0-2.el8.aarch64.rpm 75aad5ebc470035c1d53eebca1b7f96afc8998b60f635784f8fd567fbfac200d libldb-2.2.0-2.el8.aarch64.rpm e39f6acda3ab5c33a62021c76a5647b514609a508f741fbd09a3fc334f17df6e libldb-devel-2.2.0-2.el8.aarch64.rpm 681765fe45f18cae2288577e5b138eca615f68fbd94f66daebaf0fbdaf21da31 python3-ldb-2.2.0-2.el8.aarch64.rpm f436d4097737c270278b5506ab1a7668ff744dbe04d89836224bd2297107157e RLBA-2021:1653 iproute bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms iproute-5.9.0-4.el8.aarch64.rpm e62b2b96d2fe63e124a9beb740f66183045d5d41952511cd7387a2012f7df677 iproute-tc-5.9.0-4.el8.aarch64.rpm ceec705034d31ff46e97c43c5cfaf75013c2741486968658250569a5fb253695 RLEA-2021:1654 freeipmi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms freeipmi-1.6.6-1.el8.aarch64.rpm b13f07fa24f090ac7c8e7f8763160a0795af29bf68ccabee3500c54515a77583 freeipmi-bmc-watchdog-1.6.6-1.el8.aarch64.rpm 18bb4fdd54bfae988a1e5691a3fb046e5e7ba5a4b8f9d960fc1d9fc77ab4face freeipmi-ipmidetectd-1.6.6-1.el8.aarch64.rpm 388c3164dfd73a901ed3eb3c166c282c571fa09efdd43ea8a0ed280dc46c5833 freeipmi-ipmiseld-1.6.6-1.el8.aarch64.rpm dad7f89a5aa6bdba360b3a9ba5dc741654ce0f3fa331ecf27676a5ac1ebb77d2 RLBA-2021:1655 libsolv bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libsolv-0.7.16-2.el8.aarch64.rpm d04aed9ef3ad119a8df9436b46d45b2542045adb3cf162826e9120ba5cf06978 python3-solv-0.7.16-2.el8.aarch64.rpm f9bd44cd021f26321a57919d35abcf69dc10a37f84250c9d7ddb281e6a8e8fc0 RLEA-2021:1656 OpenIPMI bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for OpenIPMI. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms OpenIPMI-2.0.29-1.el8.aarch64.rpm fbfdb98b7dcb5a2c901ce34bfe705833f82c5151254fbce5e7598f4e344e0bc5 OpenIPMI-lanserv-2.0.29-1.el8.aarch64.rpm a4b144e31cfe5584ba155e5c024f729c94a4318d200e43da1c886735fd6b8e0a OpenIPMI-libs-2.0.29-1.el8.aarch64.rpm c1d657fbf6b794840240e51f144179e134b01cd7450cdeefdde8988937e2a199 OpenIPMI-perl-2.0.29-1.el8.aarch64.rpm 3aa8fb7af41f4b97a9c4629b672eec8578502952ab601c0ebcb2c8b90f4fe803 python3-openipmi-2.0.29-1.el8.aarch64.rpm d98bc5562c3ee5b3011b220c7ff1e54c87dda8990dcc49b0aa739122c13b5237 RLBA-2021:1657 dnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcomps, dnf-plugins-core, dnf, libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms dnf-4.4.2-11.el8.noarch.rpm 6b1829384be5635b78b9e28eac8159297abc2d4257dfd19b571661e309f5b973 dnf-4.4.2-11.el8.noarch.rpm 6b1829384be5635b78b9e28eac8159297abc2d4257dfd19b571661e309f5b973 dnf-automatic-4.4.2-11.el8.noarch.rpm f31f87d75a623a5621966576cc19fdc68ad649b25f3cb907bb3372f5d7608d90 dnf-automatic-4.4.2-11.el8.noarch.rpm f31f87d75a623a5621966576cc19fdc68ad649b25f3cb907bb3372f5d7608d90 dnf-data-4.4.2-11.el8.noarch.rpm 59a4445816057e5d15194ebaf2d9a4e40faa79717e530d839789899b3aeaa8e4 dnf-data-4.4.2-11.el8.noarch.rpm 59a4445816057e5d15194ebaf2d9a4e40faa79717e530d839789899b3aeaa8e4 dnf-plugins-core-4.0.18-4.el8.noarch.rpm 87b176ef090d9692a12be9f646914f54913f78ccc9c48b5a73b9a2db0d404813 dnf-plugins-core-4.0.18-4.el8.noarch.rpm 87b176ef090d9692a12be9f646914f54913f78ccc9c48b5a73b9a2db0d404813 libcomps-0.1.11-5.el8.aarch64.rpm 780b37200a8063b27e439c2baf0235a97a2b607a2d5e56bcce3172d9a36218e2 libcomps-devel-0.1.11-5.el8.aarch64.rpm 6da50ddd7c9027c96392304922266d2062d82c409f577a804ab1c962a96dd9ac libdnf-0.55.0-7.el8.aarch64.rpm 07ee8a17e1ab112bb9accc3fb1d3d85c2c9f46b1a7c1e6b8ef1a9a3e60a5a463 python3-dnf-4.4.2-11.el8.noarch.rpm c6837f96dcbf6c52415e1c54a20a6d2b3f4ac2c06611aefad4da08d7b09aed51 python3-dnf-4.4.2-11.el8.noarch.rpm c6837f96dcbf6c52415e1c54a20a6d2b3f4ac2c06611aefad4da08d7b09aed51 python3-dnf-plugin-post-transaction-actions-4.0.18-4.el8.noarch.rpm 70a17f806fc58339d56e9d7939ae4a25538a2d79b2551eec6de8be041f87594c python3-dnf-plugin-post-transaction-actions-4.0.18-4.el8.noarch.rpm 70a17f806fc58339d56e9d7939ae4a25538a2d79b2551eec6de8be041f87594c python3-dnf-plugins-core-4.0.18-4.el8.noarch.rpm bbf9cf8ddb7ee718fe38d4a554b20b2577210fa5c707de76612a7f5a8178013f python3-dnf-plugins-core-4.0.18-4.el8.noarch.rpm bbf9cf8ddb7ee718fe38d4a554b20b2577210fa5c707de76612a7f5a8178013f python3-dnf-plugin-versionlock-4.0.18-4.el8.noarch.rpm f2d30a4ad495b3cf080d7408061cce57f0f84b43fe449fd263e2cea9c1a99ec3 python3-dnf-plugin-versionlock-4.0.18-4.el8.noarch.rpm f2d30a4ad495b3cf080d7408061cce57f0f84b43fe449fd263e2cea9c1a99ec3 python3-hawkey-0.55.0-7.el8.aarch64.rpm a9bd55f3983bc44ccbaa9f07d86908ba9c44d0d63a08118e60509edb49a0564b python3-libcomps-0.1.11-5.el8.aarch64.rpm 2aead6106573a824245ff6a54549a5f32ce5b9a467b03d84adf1acbe00873bd7 python3-libdnf-0.55.0-7.el8.aarch64.rpm f03d18b38b37a808f571c7662d940f5a18544c49426c713f201c3a8b29d4b98d yum-4.4.2-11.el8.noarch.rpm 87e18f3a843843fe046b374ea1af245aa9aca7507b690585629b2a55eb2b2f89 yum-4.4.2-11.el8.noarch.rpm 87e18f3a843843fe046b374ea1af245aa9aca7507b690585629b2a55eb2b2f89 yum-utils-4.0.18-4.el8.noarch.rpm cb4ecfd323d1431993948e7769a2a12ee7c2c47a604a457a978a90c2b9ac9a42 yum-utils-4.0.18-4.el8.noarch.rpm cb4ecfd323d1431993948e7769a2a12ee7c2c47a604a457a978a90c2b9ac9a42 RLBA-2021:1659 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.175-5.el8.aarch64.rpm 9be61ca757cb4a1de50787cbae123ca83ee1dd143b63f9ef4a5aa5fd3fa00f23 device-mapper-event-1.02.175-5.el8.aarch64.rpm 43ff58ade72aa7582616f7555d388524ea697fd66f15d86a768d4daaf530ee5f device-mapper-event-libs-1.02.175-5.el8.aarch64.rpm 605336586a7e9a7062e0462d5a38632e0ebefce73047c3adb3fb8dbcdc106a6b device-mapper-libs-1.02.175-5.el8.aarch64.rpm 5a1c62824c0c74554cd655d0f0b2d549a5c13f773beb6b5d95016575120640d3 lvm2-2.03.11-5.el8.aarch64.rpm d55d539f4a9fbe86875f59dfdcebcaf2c7ed087a4345129a673dbb16ca31f560 lvm2-dbusd-2.03.11-5.el8.noarch.rpm 4017999e9abf87f5c18d4d60cd43a5411361f8db60196ce173618e82e6082ad7 lvm2-dbusd-2.03.11-5.el8.noarch.rpm 4017999e9abf87f5c18d4d60cd43a5411361f8db60196ce173618e82e6082ad7 lvm2-libs-2.03.11-5.el8.aarch64.rpm a89981f8088b10c4fc4bfab6ebfeab4b3e764c40df95e52ea1896cd01e8989f8 lvm2-lockd-2.03.11-5.el8.aarch64.rpm d01c1669a727f68c7acbb6b46ddb314189f2331c1411018ee4a3b2064eb314f5 RLBA-2021:1661 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms dracut-049-135.git20210121.el8.aarch64.rpm c3288795537e088bf97097170db12613f706572b693ddad3a2045d4092793953 dracut-caps-049-135.git20210121.el8.aarch64.rpm b95f1de1a95280f5ba30abbae29ec6b54b9531be8fd3a6e0f127b45c43536e08 dracut-config-generic-049-135.git20210121.el8.aarch64.rpm b9138173b3acdefad0c67f38e70f6b4fd5a51753015ccf9e67d5344c45a3dc09 dracut-config-rescue-049-135.git20210121.el8.aarch64.rpm 5361e54bb7fc9cc2a4fa7dd9b35982653c0a5dbec58ebd930cac2106ef8c41a8 dracut-live-049-135.git20210121.el8.aarch64.rpm 2149eb3ae2abaf4d587ff21213a06eb46faf87120bb2f9c8e98bfdd74fabd699 dracut-network-049-135.git20210121.el8.aarch64.rpm 8066aed1d8d2b4683810a373c5dd4008cd529b63c0b0e224dd83790cb8403c97 dracut-squash-049-135.git20210121.el8.aarch64.rpm 86702d59057a033dba78187c4019c1c37927e060cc7176340ee3eac6eb4ecd67 dracut-tools-049-135.git20210121.el8.aarch64.rpm c3e43120042459af90fb4cb570b62372e1a59322d461c87e438afb1b967f7897 RLBA-2021:1665 rpcbind bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpcbind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms rpcbind-1.2.5-8.el8.aarch64.rpm 3f39671a87eeeaef9016fd0dd75dbd84be8e7f6fb3bf7f2a29a73ce44eabf285 rpcbind-1.2.5-8.el8.aarch64.rpm 3f39671a87eeeaef9016fd0dd75dbd84be8e7f6fb3bf7f2a29a73ce44eabf285 rpcbind-1.2.5-8.el8.aarch64.rpm 3f39671a87eeeaef9016fd0dd75dbd84be8e7f6fb3bf7f2a29a73ce44eabf285 RLBA-2021:1662 tpm2-tss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tpm2-tss-2.3.2-3.el8.aarch64.rpm 98eab35231d4f70dadccd0241cc6c3bff8427e0f104f81ce07f22fa36aed0542 tpm2-tss-devel-2.3.2-3.el8.aarch64.rpm 9356d05faca2854dde823a30d04dcc55c4337136c2026fe077a2011ee8136527 RLBA-2021:1663 tpm2-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tpm2-tools-4.1.1-2.el8.aarch64.rpm dc14164c20c77473ceaff3cb3b699cd5536750f2719ae6bef5bae1f1acf9b432 RLBA-2021:1664 postfix bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms postfix-3.5.8-1.el8.aarch64.rpm 4affebcff76030c66aa65a9865a9ffb5625b604dbfacc394b18d6d6c4ef0e58a RLBA-2021:1666 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libipa_hbac-2.4.0-9.el8.aarch64.rpm a615d4c8defb2b9d1eab8bd96ee1e632eba46df4e59e0b6b0efee44c5bfa3f59 libsss_autofs-2.4.0-9.el8.aarch64.rpm 10680f6ec76f57bf5ecae66d69e2342b27e0335dda84f7f6ece93708c52566fa libsss_certmap-2.4.0-9.el8.aarch64.rpm d5675dffd0f9a2588155d948743b0ccd05e74510ecfc2e87339afb449d1c7a5e libsss_idmap-2.4.0-9.el8.aarch64.rpm 9e3acfdacacb08f8c1f6d936bc78fa693ae5b07e724671b1aa81555b7be17a3a libsss_nss_idmap-2.4.0-9.el8.aarch64.rpm 22ec4d171d43b69b56606c4743a8b46e2009a21279c0a607f84b89f77101cf65 libsss_simpleifp-2.4.0-9.el8.aarch64.rpm 5445929fef4d69afaca06eed80ae468eb7b6607ec393cf45a621e6fc53f6f5c2 libsss_sudo-2.4.0-9.el8.aarch64.rpm edc8809613460c2cab8079adf19d1c1df26e4e4a1bbde46ca7339e2444f58cdf python3-libipa_hbac-2.4.0-9.el8.aarch64.rpm 73c3f5363a313d70d660f01bca5a963a2a560a5a108f7fc10329337568449d27 python3-libsss_nss_idmap-2.4.0-9.el8.aarch64.rpm d42d8ecdb3caaaf2be6625b32c14c125b432c6c8f6f936d53e7500dff4d97b6b python3-sss-2.4.0-9.el8.aarch64.rpm d391356f3942b5aa9a1ef5c43483bbbc867dbb6ebde584398ed7d6afc8730213 python3-sssdconfig-2.4.0-9.el8.noarch.rpm 10ec8956b9663ef274bd2d1bb09984d2d2e0ab0d231dc0d284b5c06c43cef6a0 python3-sssdconfig-2.4.0-9.el8.noarch.rpm 10ec8956b9663ef274bd2d1bb09984d2d2e0ab0d231dc0d284b5c06c43cef6a0 python3-sss-murmur-2.4.0-9.el8.aarch64.rpm 3b9574ab176d7ed85925d9f8a946d677b233b6bd91e23f965b6dcd7beaf22fac sssd-2.4.0-9.el8.aarch64.rpm c01872c980dbec37fe1a97b1c4df9d252608fd5c3378a7a15b506f1520931d0b sssd-ad-2.4.0-9.el8.aarch64.rpm 2b72c018b9751198ef99f4fffbb08147c2bb13a7fd114b7e8909a8ac0bc8a672 sssd-client-2.4.0-9.el8.aarch64.rpm 3fbdff383028db82e91a7b6fc073f169772c23f0a3f92a18d7cafedca644407e sssd-common-2.4.0-9.el8.aarch64.rpm 97d8e18ea2ab23dfe2619015c01fe535d1cef659e06e3455442c3e4117382dbd sssd-common-pac-2.4.0-9.el8.aarch64.rpm ef141fa07b08767abe1682fea4427c73d7fbf4de5b1a051974fce8bab800fb28 sssd-dbus-2.4.0-9.el8.aarch64.rpm f16ba6f969a42e3feb325ca15a7ef0cd5611542f8dfae812fd37f0f27bcb4764 sssd-ipa-2.4.0-9.el8.aarch64.rpm 1c555d6ab548ffbc978881ace72c7278c49cae85a2b8260115e745d9f7ac4cca sssd-kcm-2.4.0-9.el8.aarch64.rpm 220260faa5b700c1535334e1ee59af4dd75350a312e00480dc0ac49f9474c5aa sssd-krb5-2.4.0-9.el8.aarch64.rpm b4a73d7bde1823aba1a488c1375b560fab70030ebc92f2f0a990f8b45c7f35d4 sssd-krb5-common-2.4.0-9.el8.aarch64.rpm 4702932b9d7f17dc984432e376c8975e16748a55909f361d7001a1b127b30c58 sssd-ldap-2.4.0-9.el8.aarch64.rpm 49991607cb99f5c2faf5808c5c7dbe2fed07ad5ca7cc4d29e8cea1c184722ee0 sssd-libwbclient-2.4.0-9.el8.aarch64.rpm 8acf24d7e8636d315ebde6f6518a84e35e8e6e871597ecf5e63359ca714d8ff1 sssd-nfs-idmap-2.4.0-9.el8.aarch64.rpm 873c41a56c4396c503c0c8833499921cd9c663e61bfd64192b1aea30312fe457 sssd-polkit-rules-2.4.0-9.el8.aarch64.rpm 8fc10e2d7ac7eccd5812e94df4430f83aecd4c9053cf442671664ea16b838e82 sssd-proxy-2.4.0-9.el8.aarch64.rpm 91c17ca0e38b61a7e4858de551973e79c320ddf34a11b13a8bef8d8e4871b72a sssd-tools-2.4.0-9.el8.aarch64.rpm f16660fb93999ef859cbfdecf5ebfd779c3b2b118e30f952bb61703b4f6a9b43 sssd-winbind-idmap-2.4.0-9.el8.aarch64.rpm 86d046dcd76905fde935d1aeab347c8acca948c698ae6297558c182cd0dbca2e RLBA-2021:1667 lm_sensors bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lm_sensors. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms lm_sensors-3.4.0-22.20180522git70f7e08.el8.aarch64.rpm f1b855ca28b28711e39f792c115feef41d009df13112e56a59777858cc177b5a lm_sensors-devel-3.4.0-22.20180522git70f7e08.el8.aarch64.rpm f20dea111c09460dace6ef41150132d78e8ae5be95553b37be5719a42b0e7408 lm_sensors-libs-3.4.0-22.20180522git70f7e08.el8.aarch64.rpm 7d51eaacac8f499bc7920fc75ec00982f6f59378b9b2870f35a71eecb1d27b15 RLBA-2021:1668 authselect bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms authselect-1.2.2-2.el8.aarch64.rpm b20d44a5a35e44935e1aec60ea133468b747c28b8f47519a1f4a06b2179eef2f authselect-libs-1.2.2-2.el8.aarch64.rpm 970aa8bc410d9d7799a5c4ea78003feb50ce6049d4d661c58603cec7e906687c RLBA-2021:1669 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libnfsidmap-2.3.3-41.el8.aarch64.rpm 70756dfa51f4d36e173903bec85d7fd26f628ea6d9c7be21edb77659f83cc720 nfs-utils-2.3.3-41.el8.aarch64.rpm 30edfd80203318562ab20dec74c5d7d4ed9af4c0ac11977d90660e2287f7fe05 RLBA-2021:1671 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tuned-2.15.0-2.el8.noarch.rpm b8343e8fe2a7aea7d0035653d11f880698333ac8c9c862d128ea5ae50b7786a7 tuned-2.15.0-2.el8.noarch.rpm b8343e8fe2a7aea7d0035653d11f880698333ac8c9c862d128ea5ae50b7786a7 tuned-profiles-atomic-2.15.0-2.el8.noarch.rpm 82a745ab45e8802c5cb350501318e3838f2b3fbf6433ebf74b401ee72c5ac6f3 tuned-profiles-atomic-2.15.0-2.el8.noarch.rpm 82a745ab45e8802c5cb350501318e3838f2b3fbf6433ebf74b401ee72c5ac6f3 tuned-profiles-compat-2.15.0-2.el8.noarch.rpm 7a175e6499e89355bbede39504f615c50de4b7af679c6cd5a49afcfd1336c69f tuned-profiles-compat-2.15.0-2.el8.noarch.rpm 7a175e6499e89355bbede39504f615c50de4b7af679c6cd5a49afcfd1336c69f tuned-profiles-cpu-partitioning-2.15.0-2.el8.noarch.rpm fb1cda32ab33672ba54c6e363e8ae3138e4572d0f50c5a6bb0f6ede729ce5d0a tuned-profiles-cpu-partitioning-2.15.0-2.el8.noarch.rpm fb1cda32ab33672ba54c6e363e8ae3138e4572d0f50c5a6bb0f6ede729ce5d0a tuned-profiles-mssql-2.15.0-2.el8.noarch.rpm 407c9a1390baa78693f9a7e54e4c48d90ceb23314de8dea5635b6c6ad882dd6a tuned-profiles-mssql-2.15.0-2.el8.noarch.rpm 407c9a1390baa78693f9a7e54e4c48d90ceb23314de8dea5635b6c6ad882dd6a tuned-profiles-oracle-2.15.0-2.el8.noarch.rpm 454b67b7b338b08a08327a48ab2662fafb77691ea409ade618caa0b2e4c79ead tuned-profiles-oracle-2.15.0-2.el8.noarch.rpm 454b67b7b338b08a08327a48ab2662fafb77691ea409ade618caa0b2e4c79ead RLBA-2021:1672 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libsemanage-2.9-6.el8.aarch64.rpm 9d33289f64ed05359bf900176cf2e4293a5f853ff15cf61ceb1778c74bbcc894 libsemanage-2.9-6.el8.aarch64.rpm 9d33289f64ed05359bf900176cf2e4293a5f853ff15cf61ceb1778c74bbcc894 python3-libsemanage-2.9-6.el8.aarch64.rpm d325a73145c1558ab49ba58375ee845086c443a4470b410467fc1006c8d80075 python3-libsemanage-2.9-6.el8.aarch64.rpm d325a73145c1558ab49ba58375ee845086c443a4470b410467fc1006c8d80075 RLBA-2021:1674 lshw bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lshw. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms lshw-B.02.19.2-5.el8.aarch64.rpm d25894fdd5c2d39ba6ce14e02d79f290bad4264cbb6865acdc4a8f81923043b3 RLSA-2021:1675 Low: libdb security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libdb packages provide the Berkeley Database, an embedded database supporting both traditional and client/server applications. Security Fix(es): * libdb: Denial of service in the Data Store component (CVE-2019-2708) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libdb-5.3.28-40.el8.aarch64.rpm a3b012884c1007e3c7e7e7650f1487bfbc7dc35f6abbc80b39668df23ed8d166 libdb-utils-5.3.28-40.el8.aarch64.rpm acfc60d16e9b9b22967641bb77cbf9a2bb762bbcaeeb1d5c3b218a4353da29cc RLBA-2021:1676 gawk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gawk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms gawk-4.2.1-2.el8.aarch64.rpm 7dcbc56b178ab69114de153d930d38c0b6fed5df8239425ac4e9fd603005c6c7 gawk-4.2.1-2.el8.aarch64.rpm 7dcbc56b178ab69114de153d930d38c0b6fed5df8239425ac4e9fd603005c6c7 RLBA-2021:1677 unzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms unzip-6.0-44.el8.aarch64.rpm f7475235491c978b721555a1d45490641ea79d541fc3255f6abf48b4040d6cda RLSA-2021:1678 Moderate: perl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543) * perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms perl-Errno-1.28-419.el8.aarch64.rpm b41a8ef6c0bec290655bad0520acaa0c189dc236aa78f80d27e9f0c0fe51e0dd perl-interpreter-5.26.3-419.el8.aarch64.rpm 62e184f23bbf1ca36d7dc090fe1253796c00b15abe85e6151b5fca1755bc07b5 perl-IO-1.38-419.el8.aarch64.rpm d4d51b0aa356db319e5f883bcc4fc85be3f851880cf9aa369004c9e6f19f08a8 perl-IO-Zlib-1.10-419.el8.noarch.rpm 106785b6a99be71129756c9f7839113fceb4b555151eb8d6dbbe8589d666ade8 perl-IO-Zlib-1.10-419.el8.noarch.rpm 106785b6a99be71129756c9f7839113fceb4b555151eb8d6dbbe8589d666ade8 perl-libs-5.26.3-419.el8.aarch64.rpm 42c2c07f9fd79527779908321fdd44eb039f2711e590a76ba2fb0aca3d5c871d perl-macros-5.26.3-419.el8.aarch64.rpm 9e93d1bdfabbed1f36498291869316210157957aa28947c099beee022745986f perl-Math-Complex-1.59-419.el8.noarch.rpm 938cde781d174943027ce93cee586542eae11fab43c17309ef5def903ba4efb2 perl-Math-Complex-1.59-419.el8.noarch.rpm 938cde781d174943027ce93cee586542eae11fab43c17309ef5def903ba4efb2 RLBA-2021:1680 gzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms gzip-1.9-12.el8.aarch64.rpm 4fa3b81b8cda8e738d3dbe9b13957df4ac5dde9ce402e12a051833eb442d86e1 gzip-1.9-12.el8.aarch64.rpm 4fa3b81b8cda8e738d3dbe9b13957df4ac5dde9ce402e12a051833eb442d86e1 RLBA-2021:1682 dmidecode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms dmidecode-3.2-8.el8.aarch64.rpm 699dea6185c35ec867b12f4ad33cd6be34ba6e3de004267bdf4e9f415b8e4be7 RLBA-2021:1683 iputils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iputils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms iputils-20180629-7.el8.aarch64.rpm 1bf1e757fdf365b8243253a7dd25bc5846ed1ae4a9eb74a45a3e861ea2d13036 iputils-20180629-7.el8.aarch64.rpm 1bf1e757fdf365b8243253a7dd25bc5846ed1ae4a9eb74a45a3e861ea2d13036 iputils-ninfod-20180629-7.el8.aarch64.rpm aa42504ec17c4468b1080ccc88804c7bd2a4ecc5cb077372004562d1acb17182 iputils-ninfod-20180629-7.el8.aarch64.rpm aa42504ec17c4468b1080ccc88804c7bd2a4ecc5cb077372004562d1acb17182 RLBA-2021:1684 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms cockpit-238.2-1.el8.aarch64.rpm 5d2df50bf653395c86504a98fffae059db0c62b48f59a072a4c3b3127a5abf00 cockpit-bridge-238.2-1.el8.aarch64.rpm 51fc896d4e6f8961afa3e66221d4695c3172687b9da54e245c4869ff776bff89 cockpit-doc-238.2-1.el8.noarch.rpm e54497bf15c61ab16806a1569d96c57526d557443ea5b184f0c6d121f738d53c cockpit-doc-238.2-1.el8.noarch.rpm e54497bf15c61ab16806a1569d96c57526d557443ea5b184f0c6d121f738d53c cockpit-system-238.2-1.el8.noarch.rpm 339faa4cf420a2caf0d6aabad7b761261bc4ac6eaf16a42c5f3188e2e9aea8fa cockpit-system-238.2-1.el8.noarch.rpm 339faa4cf420a2caf0d6aabad7b761261bc4ac6eaf16a42c5f3188e2e9aea8fa cockpit-ws-238.2-1.el8.aarch64.rpm 3e1690b5536c35c59d25f41c9c43b266a2d7a5ff37b979b3dbf3db3369cac351 RLEA-2021:1685 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms device-mapper-multipath-0.8.4-10.el8.aarch64.rpm deeb003f12fb99cab259e461da04c94eefd06b8f9d11f46993e095e08ef6e4c9 device-mapper-multipath-libs-0.8.4-10.el8.aarch64.rpm 0a713f8c8b36f0596cb7b20290b89efc8e857cb23e10ce5998855f3c64cfbc2b kpartx-0.8.4-10.el8.aarch64.rpm b9b3ea9b6d086f4329bd43eeecef7722a79d99b0ed0ade011cbde62751025177 libdmmp-0.8.4-10.el8.aarch64.rpm 807fd2c7e0f87bb00ccb10aa767ee3e95a59d8af1352477749a0e19728b0ed0c RLSA-2021:1686 Moderate: wpa_supplicant security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for wpa_supplicant. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. Security Fix(es): * wpa_supplicant: P2P group information processing vulnerability (CVE-2021-0326) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms wpa_supplicant-2.9-5.el8.aarch64.rpm 1d94dfdcc86c5b5036867b409b54db41734833195c1533687ee90b7def3ff483 wpa_supplicant-2.9-5.el8.aarch64.rpm 1d94dfdcc86c5b5036867b409b54db41734833195c1533687ee90b7def3ff483 RLBA-2021:1688 kpatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kpatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kpatch management tool provides a kernel patching infrastructure which allows you to patch a running kernel without rebooting or restarting any processes. The kpatch tool works at the function level for replacing old functions with new functions using hot patch modules. This update fixes the following bugs and adds enhancements: * [RFE] kpatch-patch dnf plugin (BZ#1798711) * rebase kpatch user utility code (BZ#1877857) * Kpatch unload issue under stress (BZ#1883238) * kpatch.spec use %config for dnf plugin's kpatch.conf (BZ#1898191) * kpatch-dnf: man page file permissions (BZ#1899341) * kpatch-dnf is in BaseOS but has AppStream dependency (BZ#1912224) Users of kpatch are advised to upgrade to these updated packages, which fix these bugs and add enhancements. none-baseos-rpms kpatch-0.9.2-3.el8.noarch.rpm 71671701db4da06c069ac1f4497ed9c6fd53b54a3dcf28eed8af74a46219d3c7 kpatch-0.9.2-3.el8.noarch.rpm 71671701db4da06c069ac1f4497ed9c6fd53b54a3dcf28eed8af74a46219d3c7 kpatch-dnf-0.2-3.el8.noarch.rpm 3f2f45e91d60d2bb73dcae2d9e3dc27db895fca5da69aac39ba65300d2271220 kpatch-dnf-0.2-3.el8.noarch.rpm 3f2f45e91d60d2bb73dcae2d9e3dc27db895fca5da69aac39ba65300d2271220 RLBA-2021:1690 xfsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms xfsprogs-5.0.0-8.el8.aarch64.rpm a3fafff669e72e598af766c81d28a1dbdc87093770fb56d220e9a4ca744f27c4 xfsprogs-devel-5.0.0-8.el8.aarch64.rpm 41c36b85daea5ff8ae05f15b73b0c07ea8f88e5d7686834ae5be20b7d50b8221 RLBA-2021:1692 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms smc-tools-1.4.0-3.git71c863a.el8.aarch64.rpm 4354703a41d933c0638441378ad1d02790fdeaa9526d395adcaad9dbd7eb875c RLBA-2021:1693 augeas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for augeas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms augeas-1.12.0-6.el8.aarch64.rpm 1cf3f15a88e073e930110f66ce578dcb36c650fad98ad66faa4477320de026ab augeas-1.12.0-6.el8.aarch64.rpm 1cf3f15a88e073e930110f66ce578dcb36c650fad98ad66faa4477320de026ab augeas-libs-1.12.0-6.el8.aarch64.rpm db169f41ef0a302b519c9ef5854e31edc7e8ab88ef328da0dbdb50408a9c79d3 augeas-libs-1.12.0-6.el8.aarch64.rpm db169f41ef0a302b519c9ef5854e31edc7e8ab88ef328da0dbdb50408a9c79d3 RLBA-2021:1694 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libblkid-2.32.1-27.el8.aarch64.rpm 277fa445ab6740105cbbe0ce65abbc04897e03e4aeadc6edef404eea20bdb0a4 libblkid-devel-2.32.1-27.el8.aarch64.rpm d81459adb3cd57acb1276d3f809960e07770e1caa5d78e68dcc305de704083fa libfdisk-2.32.1-27.el8.aarch64.rpm 24fe946949706b1eee735ec118638aa3ae8cd04c377b5cbd2238283636eb9cfc libfdisk-devel-2.32.1-27.el8.aarch64.rpm 5251d288cae8ffe5ad7db23366ca9bd7567f0f4f2a7723c507429c43019e6e2b libmount-2.32.1-27.el8.aarch64.rpm 5013010c51b3af6382d54cf0fab40824a135ef6632abf6ea5833ad1d285629ae libsmartcols-2.32.1-27.el8.aarch64.rpm 3e443822574fc523a727eac3c4f3513d10780c7c7b9f733ccc8555f35bffcd19 libsmartcols-devel-2.32.1-27.el8.aarch64.rpm d60e4117cfdad8ce6d8a27f5ffa8a4a319bf84b10fff157eb68501c3cf9a7d4f libuuid-2.32.1-27.el8.aarch64.rpm 4bd55a7fd443313fb3fdfb6899f366c395d7b4ff33a060e36f324d2507302699 libuuid-devel-2.32.1-27.el8.aarch64.rpm ccdc7cacedacd97d18fb45ce94989442f8ac16eef1bf7f6b67065f2a60afe8d9 util-linux-2.32.1-27.el8.aarch64.rpm 54298c9968b8a591429cc1d1ccfc34bb20ab6061dc8ecd7de5e9949d16d0da95 util-linux-user-2.32.1-27.el8.aarch64.rpm 2fd85fddc3c70fdb9e5632290ab181dc76c1d0db1b154379a2e8010506137b22 uuidd-2.32.1-27.el8.aarch64.rpm 44efe3db10f9c951821004b71b5986d623a3fde175c480f81d4babcbdd1416fe RLBA-2021:1695 ksc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ksc-1.7-1.el8.noarch.rpm eef773bab0a9e78048fabbac9a5b9788ad4dce6a05fef87e6824d90319668e52 ksc-1.7-1.el8.noarch.rpm eef773bab0a9e78048fabbac9a5b9788ad4dce6a05fef87e6824d90319668e52 RLBA-2021:1697 hwdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms hwdata-0.314-8.8.el8.noarch.rpm e647b500db38db11d1dc682abe6a12de9dd8c507b72dfde49514cf9979aff7c6 hwdata-0.314-8.8.el8.noarch.rpm e647b500db38db11d1dc682abe6a12de9dd8c507b72dfde49514cf9979aff7c6 RLBA-2021:1700 fwupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms fwupd-1.5.5-3.el8.aarch64.rpm affac07e359a2c21d5bdb5707e3058b0112a47aa67856e0139cdf35d9fa2d6e2 RLBA-2021:1701 mokutil bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mokutil. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms mokutil-0.3.0-11.el8.aarch64.rpm f5cbb2dd04cdbf3c9ed768c7b739eca2f1e0702245dfb89fa5b6f86f1dcc3362 mokutil-0.3.0-11.el8.aarch64.rpm f5cbb2dd04cdbf3c9ed768c7b739eca2f1e0702245dfb89fa5b6f86f1dcc3362 mokutil-0.3.0-11.el8.aarch64.rpm f5cbb2dd04cdbf3c9ed768c7b739eca2f1e0702245dfb89fa5b6f86f1dcc3362 RLBA-2021:1703 libsepol bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsepol. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libsepol-2.9-2.el8.aarch64.rpm ecbd4f0f9ecde73dcc58e75236329d039c473d671fcb456e0293ec5b200726ec libsepol-devel-2.9-2.el8.aarch64.rpm a8631e2b4e13a764e9bfcb0f747d36a634409f2569385fafa08eea40d5b14838 RLBA-2021:1704 python-linux-procfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms python3-linux-procfs-0.6.3-1.el8.noarch.rpm 625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67 python3-linux-procfs-0.6.3-1.el8.noarch.rpm 625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67 python3-linux-procfs-0.6.3-1.el8.noarch.rpm 625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67 python3-linux-procfs-0.6.3-1.el8.noarch.rpm 625dff8b1f5fe99bb2dc222775d011d1b34156280951686cfc5fd4a2d68fdb67 RLBA-2021:1706 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms mdadm-4.1-15.el8.aarch64.rpm 9d2b5706c02a143fd290d1990c7ae83f0f000f82b3f6580e6e1595442a101599 RLBA-2021:1708 kmod bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms kmod-25-17.el8.aarch64.rpm 4cb2ea96dc2bb881e69088c0f2bb9c4669199c69ac21810c91686fc7061bed76 kmod-libs-25-17.el8.aarch64.rpm 867fa7f8f756559d2df50d96eaa85676c1653b0ad38c424b19c3c4f254ec1a69 RLBA-2021:1711 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms sanlock-lib-3.8.3-1.el8.aarch64.rpm df4b3f5b36031b4a8acdd6d9c6157fd0f2ba9f76d5245c9746d712a0fcf571e0 RLBA-2021:1713 tuna bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms tuna-0.15-2.el8.noarch.rpm dd43a4ce8a5907ae2f75096360caaffe15fd51d25ccd6869e8c005f301d79a25 tuna-0.15-2.el8.noarch.rpm dd43a4ce8a5907ae2f75096360caaffe15fd51d25ccd6869e8c005f301d79a25 RLBA-2021:1715 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms policycoreutils-2.9-14.el8.aarch64.rpm 2756bf8a856f1a9437ce7b24c8ad6bcccc06afc47996306e9b26b28febd2ffd8 policycoreutils-dbus-2.9-14.el8.noarch.rpm 1633ebf2c4632e9ee248f959a3498f51ce7230dd3bdf543f3656e5ac1037de3f policycoreutils-dbus-2.9-14.el8.noarch.rpm 1633ebf2c4632e9ee248f959a3498f51ce7230dd3bdf543f3656e5ac1037de3f policycoreutils-devel-2.9-14.el8.aarch64.rpm 02fa28c131b23a32608719d63e375a4d1e1500a37f795c5df35d88cfcbf8b11b policycoreutils-newrole-2.9-14.el8.aarch64.rpm d6fc0f4f6c20dd4d15084bb44a80f8fb07d752dd69b2e43ae9b1d6d020565037 policycoreutils-python-utils-2.9-14.el8.noarch.rpm 5b3c047801374d5f436570de4276b450c5c4c98a901928c455845fc77cb3b438 policycoreutils-python-utils-2.9-14.el8.noarch.rpm 5b3c047801374d5f436570de4276b450c5c4c98a901928c455845fc77cb3b438 policycoreutils-restorecond-2.9-14.el8.aarch64.rpm 731be0c7284273b5f846db9d2b8a2fd2121d9da095ec427aa9d0335e1b21d243 python3-policycoreutils-2.9-14.el8.noarch.rpm 14a0bb1786130cf335d6c17682f01e0c6a260d6603c194481223b9033c6c98d0 python3-policycoreutils-2.9-14.el8.noarch.rpm 14a0bb1786130cf335d6c17682f01e0c6a260d6603c194481223b9033c6c98d0 RLBA-2021:1717 libbpf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libbpf-0.2.0-1.el8.aarch64.rpm 09cdc2d13b960f5fec53c29b9bdeb8857b1dee47e87506a0c199b37be2647c24 RLBA-2021:1718 irqbalance bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for irqbalance. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms irqbalance-1.4.0-6.el8.aarch64.rpm 3fe3340fac65de8b9869a017e3191690b3fa39bf9b6c21eca930ebc6b9eab595 irqbalance-1.4.0-6.el8.aarch64.rpm 3fe3340fac65de8b9869a017e3191690b3fa39bf9b6c21eca930ebc6b9eab595 irqbalance-1.4.0-6.el8.aarch64.rpm 3fe3340fac65de8b9869a017e3191690b3fa39bf9b6c21eca930ebc6b9eab595 RLBA-2021:1719 ledmon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ledmon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms ledmon-0.95-1.el8.aarch64.rpm a289ac9f9b5e7045de181a0422c7b74185a270a15348c7ecf8049209a57ab57f ledmon-0.95-1.el8.aarch64.rpm a289ac9f9b5e7045de181a0422c7b74185a270a15348c7ecf8049209a57ab57f ledmon-0.95-1.el8.aarch64.rpm a289ac9f9b5e7045de181a0422c7b74185a270a15348c7ecf8049209a57ab57f RLBA-2021:1721 microdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for microdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms microdnf-3.4.0-4.el8.aarch64.rpm 85822ae231a8fe700b1cb5493f677f448c5e86bf352853c9e0072ce5f7df010b RLEA-2021:1722 nftables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms nftables-0.9.3-18.el8.aarch64.rpm a20898951cefcc9f7f115bd0074ba608897eae4464e63a2563e556a0409b9887 python3-nftables-0.9.3-18.el8.aarch64.rpm 716b921b3b18dfa6c9d64ca261f2ddaad3ba362878ff9c63d513747309a277e1 RLSA-2021:1723 Low: sudo security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: symbolic link attack in SELinux-enabled sudoedit (CVE-2021-23240) * sudo: possible directory existence test due to race condition in sudoedit (CVE-2021-23239) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.4 Release Notes linked from the References section. none-baseos-rpms sudo-1.8.29-7.el8.aarch64.rpm ad1ea1d3340e96c200abb2c16acaa5c3b11390d668b7141fd660a1163a17e31a RLBA-2021:1724 boom-boot bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for boom-boot. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms boom-boot-1.3-1.el8.noarch.rpm b5cdea9a34648cf65a8d38c95dee7b31e41c28a277d8d323e354df4409fa70a4 boom-boot-1.3-1.el8.noarch.rpm b5cdea9a34648cf65a8d38c95dee7b31e41c28a277d8d323e354df4409fa70a4 boom-boot-conf-1.3-1.el8.noarch.rpm b8f89040ce2e1e6430e24818ee9ea99444ba8a91f5587f54fa593e77f649120a boom-boot-conf-1.3-1.el8.noarch.rpm b8f89040ce2e1e6430e24818ee9ea99444ba8a91f5587f54fa593e77f649120a boom-boot-grub2-1.3-1.el8.noarch.rpm 0c2761ea373502bda0b27a110e619e58fe32030d2e922d777e4699afe2eb93e5 boom-boot-grub2-1.3-1.el8.noarch.rpm 0c2761ea373502bda0b27a110e619e58fe32030d2e922d777e4699afe2eb93e5 python3-boom-1.3-1.el8.noarch.rpm 4ad0d82b5696ac1f2b9634f0eba55e2902fa91da85dc84dec57d563f0c4dd323 python3-boom-1.3-1.el8.noarch.rpm 4ad0d82b5696ac1f2b9634f0eba55e2902fa91da85dc84dec57d563f0c4dd323 RLBA-2021:1725 trace-cmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trace-cmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms trace-cmd-2.7-9.el8.aarch64.rpm 48dc0b9b51e9ffe5b59bb626a485beb1f6648529fa920338a5f6d20c04137e6b trace-cmd-2.7-9.el8.aarch64.rpm 48dc0b9b51e9ffe5b59bb626a485beb1f6648529fa920338a5f6d20c04137e6b RLBA-2021:1726 glusterfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glusterfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms glusterfs-6.0-49.1.el8.aarch64.rpm 6eb06a8fee2c577db19b23e989fa6fa1a83fd40019e42f3ddf8257bb84528784 glusterfs-client-xlators-6.0-49.1.el8.aarch64.rpm 86fe23621ae1b1b27494a44e7063aa8b777c6005d1377464b5bcd7653f9ee079 glusterfs-fuse-6.0-49.1.el8.aarch64.rpm 2d513bbe8822db441d3ad9a2ef5cf9ed688a91babda19d5eb214e926d7f45a18 glusterfs-libs-6.0-49.1.el8.aarch64.rpm 61abc44463fd2e79c1cf77bb6a522d75d9a21041a63e4e572d3448ac7a5e8309 glusterfs-rdma-6.0-49.1.el8.aarch64.rpm 71d5fc701e43b5ad6a1177ad35f9c5283a4e49760f18a9f4c7a0956535ac4c58 RLEA-2021:1727 ndctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms daxctl-71.1-2.el8.aarch64.rpm 93e3815741e1b299d3f981ce9f69dfbc97dad83778f91359dcc272c07093e1d8 daxctl-71.1-2.el8.aarch64.rpm 93e3815741e1b299d3f981ce9f69dfbc97dad83778f91359dcc272c07093e1d8 daxctl-libs-71.1-2.el8.aarch64.rpm f0a1b4f54f926afdba9cb4e855a0fd97cc50a19c1e32e3739007001e6cde6b15 daxctl-libs-71.1-2.el8.aarch64.rpm f0a1b4f54f926afdba9cb4e855a0fd97cc50a19c1e32e3739007001e6cde6b15 ndctl-71.1-2.el8.aarch64.rpm 9241bb2924ca75b7ca99cfb3d463450bbd9f99c69ca46168c9338cb0eb7b9642 ndctl-71.1-2.el8.aarch64.rpm 9241bb2924ca75b7ca99cfb3d463450bbd9f99c69ca46168c9338cb0eb7b9642 ndctl-libs-71.1-2.el8.aarch64.rpm cea08064c3a23247372aa001d4a2a0baec881ebb8853615299f0df0b007e8be0 ndctl-libs-71.1-2.el8.aarch64.rpm cea08064c3a23247372aa001d4a2a0baec881ebb8853615299f0df0b007e8be0 RLBA-2021:1728 cryptsetup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms cryptsetup-2.3.3-4.el8.aarch64.rpm 3ffe9fd57e3bd673e85e655f75ce81ff0605e608d91daf1a8a23eef411d7c7a9 cryptsetup-2.3.3-4.el8.aarch64.rpm 3ffe9fd57e3bd673e85e655f75ce81ff0605e608d91daf1a8a23eef411d7c7a9 cryptsetup-libs-2.3.3-4.el8.aarch64.rpm 7da6f859303a4b4b796361ed6f328e253e87e6492872ea9ecf5986ce0974ea39 cryptsetup-libs-2.3.3-4.el8.aarch64.rpm 7da6f859303a4b4b796361ed6f328e253e87e6492872ea9ecf5986ce0974ea39 cryptsetup-reencrypt-2.3.3-4.el8.aarch64.rpm 87ed31ec4669c1d28c9c878534107e695bfb999bee24b0a572fa1371a9f5d425 cryptsetup-reencrypt-2.3.3-4.el8.aarch64.rpm 87ed31ec4669c1d28c9c878534107e695bfb999bee24b0a572fa1371a9f5d425 integritysetup-2.3.3-4.el8.aarch64.rpm 777167a1c3c661caa5582fb18a771145f0d10cb5de40d0b4ab4acde4f4f262c1 integritysetup-2.3.3-4.el8.aarch64.rpm 777167a1c3c661caa5582fb18a771145f0d10cb5de40d0b4ab4acde4f4f262c1 veritysetup-2.3.3-4.el8.aarch64.rpm 1908138a2d8d095c3c6d2202f2cadd267deeefe8d6049765ff8cef6532587e23 veritysetup-2.3.3-4.el8.aarch64.rpm 1908138a2d8d095c3c6d2202f2cadd267deeefe8d6049765ff8cef6532587e23 RLEA-2021:1729 libseccomp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libseccomp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libseccomp-2.5.1-1.el8.aarch64.rpm cf74cd01d92d8c47438f8cb2e5f69cace660a896dc879e3fd77a37b10fae5821 libseccomp-2.5.1-1.el8.aarch64.rpm cf74cd01d92d8c47438f8cb2e5f69cace660a896dc879e3fd77a37b10fae5821 RLBA-2021:1730 chrony bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms chrony-3.5-2.el8.aarch64.rpm e26d58a7a92bc308445f8efbbf5eb9dfbca6b69fc03937641750c54003da629b RLBA-2021:1733 libndp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libndp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms libndp-1.7-5.el8.aarch64.rpm e29192f36d55d005e998f2f92aab2f7eeb94c18d4158519b58a044073aaf47f5 RLBA-2021:1735 nvme-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.4 Release Notes linked from the References section. none-baseos-rpms nvme-cli-1.12-3.el8.aarch64.rpm 0afb4488bdf897987c4ef644ad0627604c468d8f3eccabd52d58e70eeb0ba850 RLBA-2021:1980 openssh bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * openssh - client window fix (BZ#1942364) none-baseos-rpms openssh-8.0p1-6.el8_4.2.aarch64.rpm 046a155cc91177fe3a2d1259e15c554e26b6c2edc07886aa1967230e64866037 openssh-cavs-8.0p1-6.el8_4.2.aarch64.rpm 28df1ef09106f9cfebca83fe929e344366e12a1965e538b7113e35da96c798be openssh-clients-8.0p1-6.el8_4.2.aarch64.rpm 9930d8ee48fc28961b62ec4a3e3691437eac409f0b5b8ac8bdbe4da584766446 openssh-keycat-8.0p1-6.el8_4.2.aarch64.rpm ff4532deb0d79e93191c2b27cbd1c40b10075ded0d9c27aeafdf640967bb6600 openssh-ldap-8.0p1-6.el8_4.2.aarch64.rpm ae7c7fdbff9eefa8f5f656a33b5a142120fe4025664e905a7a2bfbe33c711627 openssh-server-8.0p1-6.el8_4.2.aarch64.rpm 3a4b905efbfd2e5e54a550ae58089fba659183fd6157712e34361cadbae799ec pam_ssh_agent_auth-0.10.3-7.6.el8_4.1.aarch64.rpm bca5cd7936948fbd70d7b676e7aefb261b22bc17951036884acc88eea5518522 RLBA-2021:1981 dbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Bug Fix(es) and Enhancement(s): * "Failed to reset fd limit before activating service: org.freedesktop.DBus.Error.AccessDenied: Failed to restore old fd limit: Operation not permitted" messages (BZ#1942052) none-baseos-rpms dbus-1.12.8-12.el8_4.2.aarch64.rpm 4b1482346881c2cf1b968926c2ab1f7a52e67d5047ca382a3ed50ee3098dd287 dbus-common-1.12.8-12.el8_4.2.noarch.rpm 3bebc6b4e4458675968dc503961e1750f4555d2498a1ae7ae223e9b80888dec4 dbus-common-1.12.8-12.el8_4.2.noarch.rpm 3bebc6b4e4458675968dc503961e1750f4555d2498a1ae7ae223e9b80888dec4 dbus-daemon-1.12.8-12.el8_4.2.aarch64.rpm 8bde6e1a41feb3c75a4c9712654abcba9c609eab69f56b2148e9a80ba28deea9 dbus-libs-1.12.8-12.el8_4.2.aarch64.rpm c449cae4cee4515f6bb0771aac4a925722db5e14d27b7211fba35e09a9e0e41e dbus-tools-1.12.8-12.el8_4.2.aarch64.rpm 9978e6cee79cb767ef68a75d8b662e0bd9364207d306c01b3cc2b7ce6726d787 RLBA-2021:1988 bash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bash packages provide Bash (Bourne-again shell), which is the default shell for Rocky Linux. Bug Fix(es) and Enhancement(s): * bash loops forever trying to reap children, spins on the CPU (BZ#1947522) none-baseos-rpms bash-4.4.20-1.el8_4.aarch64.rpm ba0e8633dbe27ddfb0456e2360852fb706ab2fb1c19bedc3f36a31ba9288cc5e bash-doc-4.4.20-1.el8_4.aarch64.rpm 269e0f91c7032067279ce1d347b77c29edc0154b466a595716e478eee1d2be70 RLSA-2021:1989 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.26-4.el8_4.aarch64.rpm 6b4443e865afe1a4b69e7cb9b77d0883baced36f56d6355555583ae812703202 bind-export-libs-9.11.26-4.el8_4.aarch64.rpm 4a5fc7ee04dafaad6d285785fb186259252399cc78925cf549b46221b9a34eea RLSA-2021:2168 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: userspace applications can misuse the KVM API to cause a write of 16 bytes at an offset up to 32 GB from vcpu->run (CVE-2021-3501) * kernel: nitro_enclaves stale file descriptors on failed usercopy (CVE-2021-3543) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * OVS mistakenly using local IP as tun_dst for VXLAN packets (?) (BZ#1944667) * Selinux: The task calling security_set_bools() deadlocks with itself when it later calls selinux_audit_rule_match(). (BZ#1945123) * [mlx5] tc flower mpls match options does not work (BZ#1952061) * mlx5: missing patches for ct.rel (BZ#1952062) * CT HWOL: with OVN/OVS, intermittently, load balancer hairpin TCP packets get dropped for seconds in a row (BZ#1952065) * [Lenovo 8.3 bug] Blackscreen after clicking on "Settings" icon from top-right corner. (BZ#1952900) * Rocky Linux 8.x missing uio upstream fix. (BZ#1952952) * Turbostat doesn't show any measured data on AMD Milan (BZ#1952987) * P620 no sound from front headset jack (BZ#1954545) * Rocky Linux kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1955188) * [net/sched] connection failed with DNAT + SNAT by tc action ct (BZ#1956458) none-baseos-rpms bpftool-4.18.0-305.3.1.el8_4.aarch64.rpm f99f2b4ef6e87934f1fd4a30f46b9a23670a3028cdc4283ff49752dbedbb7656 kernel-4.18.0-305.3.1.el8_4.aarch64.rpm fdfa485c012d9fb8998d4b64eee498a4d477bc8158facca1101a1027d32ad848 kernel-abi-stablelists-4.18.0-305.3.1.el8_4.noarch.rpm b517b95fbd88d945442ce178b58171f7d1c44de90c26fc570734511fc29c8bf9 kernel-abi-stablelists-4.18.0-305.3.1.el8_4.noarch.rpm b517b95fbd88d945442ce178b58171f7d1c44de90c26fc570734511fc29c8bf9 kernel-core-4.18.0-305.3.1.el8_4.aarch64.rpm e39355b3ed27ec244c223b9c9d2cbab43733d496fc56b2b59294cfc223cf8e0a kernel-cross-headers-4.18.0-305.3.1.el8_4.aarch64.rpm 708541750858fbec83f97ccd490b03291b8a85680a630c10b69fd83f37d7ddc5 kernel-debug-4.18.0-305.3.1.el8_4.aarch64.rpm 9ee57d3fb556ed78754bdb0e65026f715057a21a022ec05ed3748bb2290e5e17 kernel-debug-core-4.18.0-305.3.1.el8_4.aarch64.rpm 9938257374703039bd1ff26268529056a871e997aaa6a0466efe209ae08fa9c3 kernel-debug-devel-4.18.0-305.3.1.el8_4.aarch64.rpm 9c3233ed2e897caf13b3833eb8138e21ae3962220845fd3d16ff26e6c16933a6 kernel-debuginfo-common-aarch64-4.18.0-305.3.1.el8_4.aarch64.rpm 997c2f2e6d056f5e3ae7ca6a72e6edf8e335c3f89f8f6ecfff9aa3292371b583 kernel-debug-modules-4.18.0-305.3.1.el8_4.aarch64.rpm 74eea20705d8cf1c80323193d945ee6396bb7b011f4a8083ca578e95fbec4240 kernel-debug-modules-extra-4.18.0-305.3.1.el8_4.aarch64.rpm c3397737ad66797ad51cfd1f025bb467fe1b1fb5e58a26f05da582846204954d kernel-devel-4.18.0-305.3.1.el8_4.aarch64.rpm 866a7985977a441183f3efe9d397aed24d0f1b8d5a0e2cd749b5ae916946840d kernel-doc-4.18.0-305.3.1.el8_4.noarch.rpm 40afba5d2cb0428ae6b3f81711b55c31e059cefb45c6b49530ad027e8f1908a2 kernel-doc-4.18.0-305.3.1.el8_4.noarch.rpm 40afba5d2cb0428ae6b3f81711b55c31e059cefb45c6b49530ad027e8f1908a2 kernel-headers-4.18.0-305.3.1.el8_4.aarch64.rpm 03701affb1d7596cf37fafe3911860dea2efa97fa89de05bed04f1bd49917df1 kernel-modules-4.18.0-305.3.1.el8_4.aarch64.rpm a67fafaff524db224d2210232b7a2061cc603c9ba562e74b64862360e126b92c kernel-modules-extra-4.18.0-305.3.1.el8_4.aarch64.rpm e472c2a70719929866db960d939e763377ea3fd151716b158446fb2160a11602 kernel-tools-4.18.0-305.3.1.el8_4.aarch64.rpm 8876ddca392c9eb485271c88f7b89b64b4e653fb81abb96105973ecbac6ca4fb kernel-tools-libs-4.18.0-305.3.1.el8_4.aarch64.rpm 1aa898eff4c49c7a61fc62bf78e2bdb59d50c4c1c34999bd1b3b0c4d7e0305c4 perf-4.18.0-305.3.1.el8_4.aarch64.rpm 43aac7e0fb3541012b986415e0c685a96ccd2f74d414cfb0df0914c7683d8c4b python3-perf-4.18.0-305.3.1.el8_4.aarch64.rpm 10d41492e98ae5ed20bd8229cfc38aa7680c33dcc5512ec3f187cb82ed0b7354 RLSA-2021:2170 Important: glib2 security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: integer overflow in g_bytes_new function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits (CVE-2021-27219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Refcounting issue causes crashes and slow workarounds (BZ#1953553) none-baseos-rpms glib2-2.56.4-10.el8_4.aarch64.rpm 2463e14f71fc1aecdecf467e0cb45017f834699caefc2d732f72affed3562b99 glib2-devel-2.56.4-10.el8_4.aarch64.rpm 5461eb9e586a404a412bc166710e5ec12c2807f8c2b7ae69c4dcd75584bb5c0a glib2-fam-2.56.4-10.el8_4.aarch64.rpm 2713afbee93bd71a388f55eb0654075a7eda3853e804d1f00c84dd6220b601b7 glib2-tests-2.56.4-10.el8_4.aarch64.rpm eea941ef8338ae25195c5b663e195d107fa65ccae1b2cb5a823f7a7e3a9dfbb3 RLSA-2021:2238 Important: polkit security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync() (CVE-2021-3560) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms polkit-0.115-11.el8_4.1.aarch64.rpm 5643ac00be60aafc52489388914affcc29314d1f466c40cb269154cb730b84db polkit-devel-0.115-11.el8_4.1.aarch64.rpm a88e4e6c61f13db6ce1a82530cc802719cd1f4cfda97e8617beb9ed85f866ad6 polkit-docs-0.115-11.el8_4.1.noarch.rpm 2291b90fe90153c989742fd4c03f9d709d97f0ecfa2be79b8f47abf43cba4370 polkit-docs-0.115-11.el8_4.1.noarch.rpm 2291b90fe90153c989742fd4c03f9d709d97f0ecfa2be79b8f47abf43cba4370 polkit-libs-0.115-11.el8_4.1.aarch64.rpm e7525ef4e604c5e33d722fe8135724f20182a913b70bc7fc9c0836747681123e RLSA-2021:2359 Important: dhcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms dhcp-client-4.3.6-44.el8_4.1.aarch64.rpm 8f65103b994e9a8fec8ace34bde49259ce5f16b7be63834f1b87716a47e7c1c9 dhcp-common-4.3.6-44.el8_4.1.noarch.rpm 07528bf3c775ff4e4b77a91611efaf6bb28c01f31e9ffb9949fff8d587e54a31 dhcp-common-4.3.6-44.el8_4.1.noarch.rpm 07528bf3c775ff4e4b77a91611efaf6bb28c01f31e9ffb9949fff8d587e54a31 dhcp-libs-4.3.6-44.el8_4.1.aarch64.rpm 07e071bcd2b9804294f23dd02ab07e665c137acf02b6455790b65df17c1b827e dhcp-relay-4.3.6-44.el8_4.1.aarch64.rpm 42dbc27b8e96f15754c025a8f57f32fea7ada1a2fe535344c152b9fb408fe632 dhcp-server-4.3.6-44.el8_4.1.aarch64.rpm 8d605a0f82c5e2f82934894d08b68971d6d77f854cba987bf12b36199b2a0d28 RLBA-2021:2565 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es) and Enhancement(s): * Updates to the mssql tuned profile (BZ#1945617) none-baseos-rpms tuned-2.15.0-2.el8_4.1.noarch.rpm 8d56d391dcadedc679b094d0569b59bb18f9f0e3c99bb456b0e8887cb1961a15 tuned-2.15.0-2.el8_4.1.noarch.rpm 8d56d391dcadedc679b094d0569b59bb18f9f0e3c99bb456b0e8887cb1961a15 tuned-profiles-atomic-2.15.0-2.el8_4.1.noarch.rpm e0a8e4ac0595e2e28f3d844382a34e8f90637184131efe0288206aa09fc51da8 tuned-profiles-atomic-2.15.0-2.el8_4.1.noarch.rpm e0a8e4ac0595e2e28f3d844382a34e8f90637184131efe0288206aa09fc51da8 tuned-profiles-compat-2.15.0-2.el8_4.1.noarch.rpm b9428975589fdab986830306470328db6f077f67b5ef85c3d735c239195fb3b2 tuned-profiles-compat-2.15.0-2.el8_4.1.noarch.rpm b9428975589fdab986830306470328db6f077f67b5ef85c3d735c239195fb3b2 tuned-profiles-cpu-partitioning-2.15.0-2.el8_4.1.noarch.rpm f6074d990a303cc915def05e81b8d71a905ea7ccc6e1d563490feddc86952a9d tuned-profiles-cpu-partitioning-2.15.0-2.el8_4.1.noarch.rpm f6074d990a303cc915def05e81b8d71a905ea7ccc6e1d563490feddc86952a9d tuned-profiles-mssql-2.15.0-2.el8_4.1.noarch.rpm 148b57ccb210fe71b86631e035b34f1a626b2d36d278059593b80277740064f4 tuned-profiles-mssql-2.15.0-2.el8_4.1.noarch.rpm 148b57ccb210fe71b86631e035b34f1a626b2d36d278059593b80277740064f4 tuned-profiles-oracle-2.15.0-2.el8_4.1.noarch.rpm 3c9175fb1420df35e93a93f4ae1d83ddf500c8ebacba2bf133a1cb78bacdb363 tuned-profiles-oracle-2.15.0-2.el8_4.1.noarch.rpm 3c9175fb1420df35e93a93f4ae1d83ddf500c8ebacba2bf133a1cb78bacdb363 RLSA-2021:2566 Moderate: fwupd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) * grub2: Use-after-free in rmmod command (CVE-2020-25632) * grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) * grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) * grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) * grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) * grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms fwupd-1.5.9-1.el8_4.aarch64.rpm f4a24609e813306a855489a712ac5ef78a12b71727a67ac6e55e289cc37aa206 RLBA-2021:2568 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es) and Enhancement(s): * [Rocky Linux8] SSH/NFS kdump failed if static ip: /usr/lib/dracut/modules.d/99kdumpbase/module-setup.sh: line 145: ipcalc: command not found (BZ#1959655) none-baseos-rpms kexec-tools-2.0.20-46.el8_4.1.aarch64.rpm fdb87fda3a3bfe11baa2bdde175fd66b650d5c0f1bceb55e8c07c9b26b623cf5 RLSA-2021:2569 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516) * libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517) * libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518) * libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537) * libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-9.el8_4.2.aarch64.rpm 5072f95200c2315a684f70ddf77d4e765a81b4bce160a693d78b2d0c884996a0 python3-libxml2-2.9.7-9.el8_4.2.aarch64.rpm 56707b3cd4265bf9d854b8e9d8e9b81c168a44bde88a9abee65e1cdc6e293490 RLSA-2021:2570 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) * kernel: security bypass in certs/blacklist.c and certs/system_keyring.c (CVE-2020-26541) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [ESXi][Rocky Linux-8] VMXNET3 v4 causes invalid checksums of inner packets of VXLAN tunnel (BZ#1960702) * fnic crash from invalid request pointer (BZ#1961705) * GFS2: Failed FS thaw call makes the entire snapshot failed. (BZ#1961849) * dm writecache: fix performance degradation in ssd mode (BZ#1962241) * Kernel BUG with act_ct and IP fragments (BZ#1963940) * core: backports from upstream (BZ#1963952) * Hibernate resume on Rocky Linux fails in Amazon EC2 C5.18xlarge instance (BZ#1964930) * [SanityOnly] panic caused by i40e_msix_clean_rings (BZ#1964962) * tc reclassification limit is too low for OVN (BZ#1965148) * tc action ct nat src addr does not work while used with ct nat dst addr together (BZ#1965150) * CNB: Rebase/update TC subsystem for Rocky Linux 8.5 (BZ#1965457) * sctp: crash due to use after free of sctp_transport structure (BZ#1965632) none-baseos-rpms bpftool-4.18.0-305.7.1.el8_4.aarch64.rpm 53fb000487373eb5643edfbd2054edc56cc03e2662c3544c4847e9e9770a4fa4 kernel-4.18.0-305.7.1.el8_4.aarch64.rpm 5d27c78c1c9c1821ccd548577d6016dfe924c821de0640d24793580f0f4fd53a kernel-abi-stablelists-4.18.0-305.7.1.el8_4.noarch.rpm ec2397fe0271ac6473c3e4a61664ebf3055ec4d6d277afb60bf598b9ec308711 kernel-abi-stablelists-4.18.0-305.7.1.el8_4.noarch.rpm ec2397fe0271ac6473c3e4a61664ebf3055ec4d6d277afb60bf598b9ec308711 kernel-core-4.18.0-305.7.1.el8_4.aarch64.rpm c7438fe11c163fc7a39c66e2978c086ade79b184441be70a8776ec51e185e69e kernel-cross-headers-4.18.0-305.7.1.el8_4.aarch64.rpm 52053d8dc63dc5e3efbefb181828e17ef98e8485c803501fa2f6c42cd76d559a kernel-debug-4.18.0-305.7.1.el8_4.aarch64.rpm ba3b49a985fbba8918b775c525b01f55a6732a792d21384c4a4de315c92c9cb0 kernel-debug-core-4.18.0-305.7.1.el8_4.aarch64.rpm 0a6388e38e4d275407d8fc2a4582b4965050da3141dd9f47d96a6abad80deb46 kernel-debug-devel-4.18.0-305.7.1.el8_4.aarch64.rpm a52c9939e135f73bd9269e3fc5be4c3caa9cd8e8a792874ed0f63b60b7a023a5 kernel-debuginfo-common-aarch64-4.18.0-305.7.1.el8_4.aarch64.rpm 508707354c6cb388acdbcb984f1ed66f0dc570d796549b6758d986db4a476f35 kernel-debug-modules-4.18.0-305.7.1.el8_4.aarch64.rpm 9262be7c44e6d8aea4e76348f246240959aaa5ae37d769177d135f9f642048fd kernel-debug-modules-extra-4.18.0-305.7.1.el8_4.aarch64.rpm accfd9f843f55f409e4a2f6324b721b1b5f936f3e622a1e7c7f507c9b9bbcb6d kernel-devel-4.18.0-305.7.1.el8_4.aarch64.rpm 97431d04f8738fa63e7d00aaf281572dd19c61fb1630b21f5a5b6f5f164de69b kernel-doc-4.18.0-305.7.1.el8_4.noarch.rpm 238df13cf74ccc9baa28a03989d9f8a3e804d703c89594395a9b4dc657a233b3 kernel-doc-4.18.0-305.7.1.el8_4.noarch.rpm 238df13cf74ccc9baa28a03989d9f8a3e804d703c89594395a9b4dc657a233b3 kernel-headers-4.18.0-305.7.1.el8_4.aarch64.rpm 7b478f66fcfb3f5d2bcb3f5c634b0376f6aa62d8591b4620cd71b13666506a00 kernel-modules-4.18.0-305.7.1.el8_4.aarch64.rpm e248a37ca7df6fda52546532a901b2037ee7332b7ad1fc528c5ca60406efe3f0 kernel-modules-extra-4.18.0-305.7.1.el8_4.aarch64.rpm 3bee40381000e9a4c65353ece282962724de72873490b55299a3b03a19970d04 kernel-tools-4.18.0-305.7.1.el8_4.aarch64.rpm f9ea0ed47e6500c011806290e9ffc5e88c12f871d789425ef880e8fe9d9e5092 kernel-tools-libs-4.18.0-305.7.1.el8_4.aarch64.rpm 89f9a842e86d132ca4511961a5a221e0e9834466e1764caf40eb4c19ed322571 perf-4.18.0-305.7.1.el8_4.aarch64.rpm a8a1dac6a140cdd67e6005314fe1e15900b8f56b67a7875086cab4b724a4548f python3-perf-4.18.0-305.7.1.el8_4.aarch64.rpm 4356b0e20a516c28ad642224473004ed352f238cfcabadd998c93ed417d36a4e RLBA-2021:2571 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Wrong default debug level of sssd tools (BZ#1942438) * IPA missing secondary IPA Posix groups in latest sssd 1.16.5-10.el7_9.7 (BZ#1945654) * SSSD not detecting subdomain from AD forest (Rocky Linux 8.3) (BZ#1945655) * No gpo found and ad_gpo_implicit_deny set to True still permits user login (BZ#1945656) * pam_sss_gss.so doesn't work with large kerberos tickets (BZ#1949170) none-baseos-rpms libipa_hbac-2.4.0-9.el8_4.1.aarch64.rpm eade15cf3f325348e4b3e7ad838c336ed7ddb28eca64e6f957aec372412130ea libsss_autofs-2.4.0-9.el8_4.1.aarch64.rpm 81fa8f9364963f2d92958170407dddaeb34cd0b427a86a45b992e183ca7a11e4 libsss_certmap-2.4.0-9.el8_4.1.aarch64.rpm 3685b9a84555c1d19528db969a4e914804febb5382f34759c350e229718a4369 libsss_idmap-2.4.0-9.el8_4.1.aarch64.rpm e5a6f2307e1aad1e3a813af3c099adf187a373db3508ea09f3c5c96a51820496 libsss_nss_idmap-2.4.0-9.el8_4.1.aarch64.rpm c1d32ecc6dc2f0dc2a7a165b6e217871e84f34250e4c0432ddb51cdbabbd2f5d libsss_simpleifp-2.4.0-9.el8_4.1.aarch64.rpm 80bbbe44ff57902e2729c8221f64f515497de388837438ebdaf77bb21635b2aa libsss_sudo-2.4.0-9.el8_4.1.aarch64.rpm 0d96d8226b79eb5c12ad1a4cdda770a4d4c255d84594a4438ccc56c433ce230c python3-libipa_hbac-2.4.0-9.el8_4.1.aarch64.rpm c2fd9940f95c97d5252c20e3ec8ab60623b391e9020560dd7d65c731a66fa85e python3-libsss_nss_idmap-2.4.0-9.el8_4.1.aarch64.rpm 8e7e5b85a2840c2ce452a53096ebc322b1dd78895786361e4581cb6d902a19b2 python3-sss-2.4.0-9.el8_4.1.aarch64.rpm ee404ca33e0538be4109397e249ab56baf5a4c78b8fa95834b6390a3d223f53e python3-sssdconfig-2.4.0-9.el8_4.1.noarch.rpm 1c11c61e8d0f8dd603b06d9f04f5826ce7917c00db8e2a63b613e5f3f3d369ef python3-sssdconfig-2.4.0-9.el8_4.1.noarch.rpm 1c11c61e8d0f8dd603b06d9f04f5826ce7917c00db8e2a63b613e5f3f3d369ef python3-sss-murmur-2.4.0-9.el8_4.1.aarch64.rpm 516d010ce6585bdf314f8f62aedbc891f806dc5e627596c15bfb8051afffd77d sssd-2.4.0-9.el8_4.1.aarch64.rpm 131ac64a162df6585a3b20919efd6456c6a372b996b2106df13163041f536923 sssd-ad-2.4.0-9.el8_4.1.aarch64.rpm f66230af59d78c2da631c9a0e471d21afbf6a4487ab278729b17945febc84f29 sssd-client-2.4.0-9.el8_4.1.aarch64.rpm 9726aeecaf3bb68419957f05413aa855fd0b234b6e72559cc33c770eee98d3cf sssd-common-2.4.0-9.el8_4.1.aarch64.rpm ce73f30aceda569ebdd1b0d7f4e8e7517cad526f3555d0ac5119b57e941a01d8 sssd-common-pac-2.4.0-9.el8_4.1.aarch64.rpm 28c6e60ac8ee676dbb943666f88b7bfa989397cf75531e98598da3dec83fee1f sssd-dbus-2.4.0-9.el8_4.1.aarch64.rpm a08f23fa43836de72c4b44a054243797f1f4b5f71bea7225cd5c9f6fa93260fe sssd-ipa-2.4.0-9.el8_4.1.aarch64.rpm 0c41bd0f99784ff42d6627208ced3f8cf56897e3f326bff9c2aab72384db390e sssd-kcm-2.4.0-9.el8_4.1.aarch64.rpm 03cf1a2f6f6b9b5904beb7d8ab52c5d3f84659748438be79a5ad0f839704d8a9 sssd-krb5-2.4.0-9.el8_4.1.aarch64.rpm 33512f036ecc35b0eb6d651c7c4fd1946c85e494d1ec63007551ab746e480207 sssd-krb5-common-2.4.0-9.el8_4.1.aarch64.rpm 5296850a7586128ad50cb90a7c7def45a7dd69aa62e98c3989aac7dc1c80399d sssd-ldap-2.4.0-9.el8_4.1.aarch64.rpm 939b5ca2c876fe57b8892f7fc34a60dda81d1d573a4459b01395d9650344ec4c sssd-libwbclient-2.4.0-9.el8_4.1.aarch64.rpm bbada9f30f1d3a1efac86fc81b6d0f6a2f386a45c7054b9c813d0fa7c2cf98bb sssd-nfs-idmap-2.4.0-9.el8_4.1.aarch64.rpm a3ea9c876a69566046698871e427a6971080ad17ef14566690cc1a9fd9af4539 sssd-polkit-rules-2.4.0-9.el8_4.1.aarch64.rpm f13dec29d8147dae8c48c5f7fb184768b34cf62f3702fbff6d824b3d8a720357 sssd-proxy-2.4.0-9.el8_4.1.aarch64.rpm d0662e954b031990749a5d732384cdf14bed62271041844d23a66c2953af7d42 sssd-tools-2.4.0-9.el8_4.1.aarch64.rpm 7cb66d0de8d41b36668a45de4409e059af6c993eb3c7cdf4e3682d5e456bbe11 sssd-winbind-idmap-2.4.0-9.el8_4.1.aarch64.rpm 28bc26946af1f95afb2cccb59d62ccabe146fbf965b0b1e768179514ecf26d16 RLBA-2021:2572 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 takes long time to boot up FC server with LUNs attached (BZ#1963980) none-baseos-rpms systemd-239-45.el8_4.1.aarch64.rpm 796165c5071b2c9b5e663bea4e4afc19e3831934e550e5fb551c74fcc011fe89 systemd-container-239-45.el8_4.1.aarch64.rpm 7307dedbc3d582a108683edef7cbc8356f9378ea5b3b742b0f4a8dc049fb82af systemd-devel-239-45.el8_4.1.aarch64.rpm 1efec55452d49e399ff7a6aa192986f3c6eb4eed16e91ceb977b125a84411c54 systemd-journal-remote-239-45.el8_4.1.aarch64.rpm bf3ea2fc9a3e2fb135c92a2f6f9d1685034747595309e389d49f1b17415a4b26 systemd-libs-239-45.el8_4.1.aarch64.rpm 1efab7fef60ae2f080f598cb907287f576b021fd8c71ea37d034b1a4a2f8c06f systemd-pam-239-45.el8_4.1.aarch64.rpm 3b2b2048ffeccd3d505adcd4f6710cca300f2ff27f58ca4aedc94b9330394706 systemd-tests-239-45.el8_4.1.aarch64.rpm d32a0dfc4c3aee05b77127c2713b7256633f4060abea5ae9bbac84df051fa087 systemd-udev-239-45.el8_4.1.aarch64.rpm 074ed5573fe691d9dbb057927ae26af9772946bf574d53d7d190ce8063b9a310 RLBA-2021:2573 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sanlock packages provide a shared storage lock manager. Hosts with shared access to a block device or a file can use sanlock to synchronize their activities. VDSM and libvirt use sanlock to synchronize access to shared devices or files. Bug Fix(es) and Enhancement(s): * bad client message causes closed connection and released leases (BZ#1965481) * Expose sanlock_inquire() in python bindings (BZ#1965483) none-baseos-rpms sanlock-lib-3.8.3-3.el8_4.aarch64.rpm e90971bfc03cb5440ea13cdbbaddb5d1a523d0389f9c011a5897d551d236f67e RLSA-2021:2574 Moderate: rpm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-rpm-4.14.3-14.el8_4.aarch64.rpm ae1f3992bd7135114e661b2241f26fda9cf59a27fa062ed4005e820872e2b1bf rpm-4.14.3-14.el8_4.aarch64.rpm 02ecad9d59d6b53724308a58e18f9a6b4fc98c7b5a36b560981a611187130dcc rpm-apidocs-4.14.3-14.el8_4.noarch.rpm 955f914d3e4a9a9b8e575c99028d935ad636de199b877fdfd9fd26fdefac4014 rpm-apidocs-4.14.3-14.el8_4.noarch.rpm 955f914d3e4a9a9b8e575c99028d935ad636de199b877fdfd9fd26fdefac4014 rpm-build-libs-4.14.3-14.el8_4.aarch64.rpm 58fe83dc239319379ba965a976c301f5ec6dd578e89d7ef40db9b06af799f252 rpm-cron-4.14.3-14.el8_4.noarch.rpm 5d3f615fabad399d40bcd5046bf57cf8fd007363b1acfdc4e77d9036c94f6300 rpm-cron-4.14.3-14.el8_4.noarch.rpm 5d3f615fabad399d40bcd5046bf57cf8fd007363b1acfdc4e77d9036c94f6300 rpm-devel-4.14.3-14.el8_4.aarch64.rpm 7f874f18e722a1158b45a14f24b3f921a6374f8d4f37aa816bc16ad2319af4c2 rpm-libs-4.14.3-14.el8_4.aarch64.rpm 46634b25b6da3cc852d8b02e332f08e3c4d07c644a5a2ea5d3ed3e899554dbab rpm-plugin-ima-4.14.3-14.el8_4.aarch64.rpm 44327fa6dcf21e92267e99c46f0e715306cec0e53130db5ca61685dd188b5979 rpm-plugin-prioreset-4.14.3-14.el8_4.aarch64.rpm 06a702454b138a1ff53569a6fccc4575e5d20f4994bc08719b0752bf0d7b267c rpm-plugin-selinux-4.14.3-14.el8_4.aarch64.rpm b996c2788d5dc815b70a1066b36a2b895feb3507d92f1a014ac276ff24c9f92c rpm-plugin-syslog-4.14.3-14.el8_4.aarch64.rpm 2b44fab8709f3ab3d63a9f4900250dc62ad00c408ec65cfa375854e4a67395b7 rpm-plugin-systemd-inhibit-4.14.3-14.el8_4.aarch64.rpm fe4ee71c2dbade298b17cee3b010080db3a09ab7c64c67566a1b9798ad6c9667 rpm-sign-4.14.3-14.el8_4.aarch64.rpm 3e5da22064db2cd5c9371b93f797f95af34adf69ee05158fdafe9a417c6f91c3 RLBA-2021:2576 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * [NMCI] Automatic connection not removed when veth device gets removed (BZ#1965336) * [SNO][assisted-operator][nmstate] Bond Interface is down when booting from the discovery ISO (BZ#1965337) * NetworkManager doesn't honour tlb_dynamic_lb=0 when creating a bonding device with mode=balance-alb (BZ#1965948) * Provide a way to ignore existing TC qdiscs and filters (BZ#1972566) none-baseos-rpms NetworkManager-1.30.0-9.el8_4.aarch64.rpm 7dee2f2beb295aca615b02235c01ff3bae1482fb169480929d90e83a7acf67ff NetworkManager-adsl-1.30.0-9.el8_4.aarch64.rpm b12f06a68acb07fca84ca79c1f28a13ff72d21289efd87a5caffd40435b9eca5 NetworkManager-bluetooth-1.30.0-9.el8_4.aarch64.rpm 19f7de3bac9409d8ceffac1f4ed1aa458770304baea720c8a29bcdf6b952e1bb NetworkManager-config-connectivity-redhat-1.30.0-9.el8_4.noarch.rpm f3ba429069a37287930ef1dd357bacd4a5bd7592053c9b91f02e1708a5f1a777 NetworkManager-config-connectivity-redhat-1.30.0-9.el8_4.noarch.rpm f3ba429069a37287930ef1dd357bacd4a5bd7592053c9b91f02e1708a5f1a777 NetworkManager-config-server-1.30.0-9.el8_4.noarch.rpm 6aa36a5643f70de98b581f1c6ec94e8e8423d732d870562286d9d646ea8ab3b4 NetworkManager-config-server-1.30.0-9.el8_4.noarch.rpm 6aa36a5643f70de98b581f1c6ec94e8e8423d732d870562286d9d646ea8ab3b4 NetworkManager-dispatcher-routing-rules-1.30.0-9.el8_4.noarch.rpm c9ebb18523db0e5b57d5a87ea809c36a1ea396cf7118e120808122cbb391543a NetworkManager-dispatcher-routing-rules-1.30.0-9.el8_4.noarch.rpm c9ebb18523db0e5b57d5a87ea809c36a1ea396cf7118e120808122cbb391543a NetworkManager-libnm-1.30.0-9.el8_4.aarch64.rpm faa30ebc0960e37623c7b7a6bdd2f34fed96065df85915b6f204e498e5be91a8 NetworkManager-ovs-1.30.0-9.el8_4.aarch64.rpm b652c5957e0ac4f8d6bda46dd199aa41964742d1fd763488408284152e46ed2b NetworkManager-ppp-1.30.0-9.el8_4.aarch64.rpm aa94d89ca318117f5b490f51b275e92324cd760befb87195fb3ccc6f897407e5 NetworkManager-team-1.30.0-9.el8_4.aarch64.rpm 8e33e9345509ebbce3c05a9d7fd4acb625eac3fbb81fe36d0a6c0c398ebd41fe NetworkManager-tui-1.30.0-9.el8_4.aarch64.rpm 2a632409f07e50768b6b51f9aa6b2fb91c1188de0f51d743802fb6ce9a16bf66 NetworkManager-wifi-1.30.0-9.el8_4.aarch64.rpm 6f0c9d6d30bc8ba879ac54c6eb44b4611f6313f768de7bc97f69fd969c20d1a8 NetworkManager-wwan-1.30.0-9.el8_4.aarch64.rpm 66f689982eed7a298508cdab9993cc8fbb28f6c72c800929a1134c54dedacdc6 RLBA-2021:2577 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Bug Fix(es) and Enhancement(s): * dnf uploadprofile does not read variables set by files in /etc/yum/vars/ (BZ#1951053) none-baseos-rpms dnf-plugin-subscription-manager-1.28.13-3.el8_4.aarch64.rpm 3e42811772eaa8da44f6f369ee62cec39348ca3342457f887e17a2c79a1348b2 python3-subscription-manager-rhsm-1.28.13-3.el8_4.aarch64.rpm bd3a961a29bbd473acc2c7c495fa17939605fde64b5592f4fddc0a6e15f1a05e python3-syspurpose-1.28.13-3.el8_4.aarch64.rpm f1c126cbf04f592bd1738e10495644ac6241d638c8ef7f4a802b06aecc532839 rhsm-icons-1.28.13-3.el8_4.noarch.rpm 4bc6232c7c1ceb710cd4c5220ab874683e2109881688e348e791e0b1ece79965 rhsm-icons-1.28.13-3.el8_4.noarch.rpm 4bc6232c7c1ceb710cd4c5220ab874683e2109881688e348e791e0b1ece79965 subscription-manager-1.28.13-3.el8_4.aarch64.rpm f13b47587c8eb1e1ceddf0384212302977d8beaf7209cc72a19209c6fbb12db5 subscription-manager-cockpit-1.28.13-3.el8_4.noarch.rpm c2c12a33785a8c81ef1150a52c8943f6e9a5982edf8c2461b445156fb503d3d5 subscription-manager-cockpit-1.28.13-3.el8_4.noarch.rpm c2c12a33785a8c81ef1150a52c8943f6e9a5982edf8c2461b445156fb503d3d5 subscription-manager-plugin-ostree-1.28.13-3.el8_4.aarch64.rpm 701a6994aad2dc3afbbb7cfbaef3cb67ba2f521d25e97f566baba342dccd791e subscription-manager-rhsm-certificates-1.28.13-3.el8_4.aarch64.rpm 194bceab0f86c35703737ab7fd50e8483c1abe5f534143ae3404b5dcfaa864c8 RLBA-2021:2578 unzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unzip utility is used to list, test, and extract files from zip archives. Bug Fix(es) and Enhancement(s): * Sync the various fixes for the zip-bomb detection (cloned for Rocky Linux 8.4.z) (BZ#1970326) none-baseos-rpms unzip-6.0-45.el8_4.aarch64.rpm 67a7d0ee2aee35d4fbbed25ecad74782cb240e7c52f7f8fc96c6d2929bd2c627 unzip-6.0-45.el8.aarch64.rpm 4c081ec717163907ed8c605c10881dfc2368ededaa8b9eaa6b185557edb1c5fa RLBA-2021:2579 nvme-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nvme-cli packages provide the Non-volatile Memory Express (NVMe) command-line interface to manage and configure NVMe controllers. Bug Fix(es) and Enhancement(s): * [Lenovo 8.5 FEAT] nvme-cli update (BZ#1970382) none-baseos-rpms nvme-cli-1.12-4.el8_4.aarch64.rpm 9973f56c051dea0520f76b2e185bb37c56e05a0cef989433a2885386e2557aeb RLBA-2021:2580 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. Bug Fix(es) and Enhancement(s): * allow firewalld to set 16+ char long device names interfaces (like ovs interfaces can be) (BZ#1955594) none-baseos-rpms firewalld-0.8.2-7.el8_4.noarch.rpm df084b00f05c91c50e048ee20ce31705f8bc9b87b80fa2e352d53784acb672ff firewalld-0.8.2-7.el8_4.noarch.rpm df084b00f05c91c50e048ee20ce31705f8bc9b87b80fa2e352d53784acb672ff firewalld-filesystem-0.8.2-7.el8_4.noarch.rpm a35c21fbb221611e6c309d319210f00b5f4978a7eb64fd3a8f563ad79b23abfb firewalld-filesystem-0.8.2-7.el8_4.noarch.rpm a35c21fbb221611e6c309d319210f00b5f4978a7eb64fd3a8f563ad79b23abfb python3-firewall-0.8.2-7.el8_4.noarch.rpm 313f800ac556b3a2d52ef5ef94a0b63c42f463805bfb8547d084d563a5e39bd6 python3-firewall-0.8.2-7.el8_4.noarch.rpm 313f800ac556b3a2d52ef5ef94a0b63c42f463805bfb8547d084d563a5e39bd6 RLBA-2021:2581 openldap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap packages contain configuration files, libraries, and documentation for OpenLDAP. Bug Fix(es) and Enhancement(s): * got undefined symbol: EVP_md2, version OPENSSL_1_1_0 after upgrading from openldap-2.4.46-11 to openldap-2.4.46-15 (BZ#1972742) none-baseos-rpms openldap-2.4.46-17.el8_4.aarch64.rpm d336eab7f091a5bd24421d8194fa2a0b6748cde5f83f5fcdb09be8ddaa841991 openldap-clients-2.4.46-17.el8_4.aarch64.rpm e5f8b999f6e2866708ce1b7b135838393f5ebd3a7db66baad9d9eb0c13b27532 openldap-devel-2.4.46-17.el8_4.aarch64.rpm ebf1ba4f98e2a6599ed22a3cbdd167b3407c899c00c94eec4efdefc43c28cdb4 RLSA-2021:2714 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: race condition for removal of the HCI controller (CVE-2021-32399) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * pinctrl_emmitsburg: improper configuration (BZ#1963984) * [Ampere] locking/qrwlock: Fix ordering in queued_write_lock_slowpath (BZ#1964419) * Rocky Linux8.4 - [P10] [NPIV Multi queue Test kernel- 4.18.0-283.el8.ibmvfc_11022021.ppc64le] DLPAR operation fails for ibmvfc on Denali (ibmvfc/dlpar/Rocky Linux8.4) (BZ#1964697) * Every server is displaying the same power levels for all of our i40e 25G interfaces. 10G interfaces seem to be correct. Ethtool version is 5.0 (BZ#1967099) * backport fixes for Connection Tracking offload (BZ#1968679) * fm10k: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969910) * ixgbevf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969911) * ena: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969913) * b44, bnx2, bnx2x, bnxt, tg3: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969914) * e1000, e1000e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969915) * ice: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969917) * igb: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969919) * igbvf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969920) * igc: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969921) * ixgbe: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969922) * i40e: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969923) * iavf: removal of MODULE_VERSION deemed improper for y-stream release (BZ#1969925) * Backport netlink extack tracepoint (BZ#1972938) * [Rocky Linux8.4] kernel panic when create NPIV port on qedf driver (BZ#1974968) none-baseos-rpms bpftool-4.18.0-305.10.2.el8_4.aarch64.rpm 64011bce8c011575a4e3134e60dcf1227c5eda7e86f216f10a7387cdc69f2aba kernel-4.18.0-305.10.2.el8_4.aarch64.rpm 9bc1050ee9d1b2b206f067fcda8c325141daa5401a8a079233502e6051a99afc kernel-abi-stablelists-4.18.0-305.10.2.el8_4.noarch.rpm f0f66afb3a7d687515317fde4572f13b00bec2ca5a9899b94b6ddfee4b40ca6d kernel-abi-stablelists-4.18.0-305.10.2.el8_4.noarch.rpm f0f66afb3a7d687515317fde4572f13b00bec2ca5a9899b94b6ddfee4b40ca6d kernel-core-4.18.0-305.10.2.el8_4.aarch64.rpm 12e51b2aeeb8dd8c8a9f3ca071642120fce9c738cff2ad95d02bafb8122d79ff kernel-cross-headers-4.18.0-305.10.2.el8_4.aarch64.rpm 305d13b3084264e1d736a4590b3f7bf7151d2386585aaa6ac7a6fa51d78fe847 kernel-debug-4.18.0-305.10.2.el8_4.aarch64.rpm 4175937d5ecef17ef8ed7f97c4eed7039ac00f184154a82057777a8496f51532 kernel-debug-core-4.18.0-305.10.2.el8_4.aarch64.rpm a2773ef6eb5fc88a4a2c8ebcc4a3f5664d050a3729b2ae0bb03216a28c0ecbc8 kernel-debug-devel-4.18.0-305.10.2.el8_4.aarch64.rpm a03b91f42ac1c98e059abdc6f0be7b2b61e0bd21948ea58d26af443b8eee844d kernel-debuginfo-common-aarch64-4.18.0-305.10.2.el8_4.aarch64.rpm 9b33950d0465296726bd4fc69c10573cede1fda678384d3317606c9ba133b4ea kernel-debug-modules-4.18.0-305.10.2.el8_4.aarch64.rpm 7005af7907c716121241f35b7f1a70743afbe0961440297a0b11a04955137620 kernel-debug-modules-extra-4.18.0-305.10.2.el8_4.aarch64.rpm 362d7b07b1459ba924131e73a352cfd142e752d8a20c542feee8fd5083afc8ce kernel-devel-4.18.0-305.10.2.el8_4.aarch64.rpm 17cb8f02230ae0bd40196ac1e740a404b6ff0fd84243b2b0eb601e68d81bdc8e kernel-doc-4.18.0-305.10.2.el8_4.noarch.rpm 52a57b581f0e5c8433998ee37fd74b750594f40f380e7553ce5f76f379043278 kernel-doc-4.18.0-305.10.2.el8_4.noarch.rpm 52a57b581f0e5c8433998ee37fd74b750594f40f380e7553ce5f76f379043278 kernel-headers-4.18.0-305.10.2.el8_4.aarch64.rpm f7fc1e4b95f4afa5f76314f143548586030a1f892138976775bceffcc6a41ded kernel-modules-4.18.0-305.10.2.el8_4.aarch64.rpm 9c15a93a4c90e8c9fd913df86179d1418f38062a97d324875054e457b2a8a909 kernel-modules-extra-4.18.0-305.10.2.el8_4.aarch64.rpm c35a10a792bb07cb08ec66a8b7ffc102c6ce93a69d33c83452fdc9c8b0481f64 kernel-tools-4.18.0-305.10.2.el8_4.aarch64.rpm 55b24b7fccd8b11864bb58134272702faa47e7dc0d760c0b9590e3fbf14346ef kernel-tools-libs-4.18.0-305.10.2.el8_4.aarch64.rpm 09cb65cf627a0639cf627caa4f0e04ad635520dbd5b958a23da276e06258661b perf-4.18.0-305.10.2.el8_4.aarch64.rpm 2eaeb9d735c47468f210f124a7db094966e287658977da1a32223769a3a6f32c python3-perf-4.18.0-305.10.2.el8_4.aarch64.rpm ea65f2172bcc44f33228676c940229a6ce95ebfe96a7cb708d4cbc7bad30592e RLSA-2021:2717 Important: systemd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms systemd-239-45.el8_4.2.aarch64.rpm 46857c5ddfecc2ce703334ea5bd465887322967f18d75fb6ff94c34d52ff343a systemd-container-239-45.el8_4.2.aarch64.rpm 5c99fe10fb53766479015688e43ac06e15b6a8406dc00910d56820182edd1c99 systemd-devel-239-45.el8_4.2.aarch64.rpm c1e6f72f92dea275397f7f92ddacabb2f8e39727e916f1002a84db73b036cc13 systemd-journal-remote-239-45.el8_4.2.aarch64.rpm 8253b641fa650f5472f9670574fc415ccea9adda4c937d72d62e38417b8ff891 systemd-libs-239-45.el8_4.2.aarch64.rpm 759350ea3bb03fb348391eb3673f0d93740e2f9a6cb39e6f5009d4983fd79ecc systemd-pam-239-45.el8_4.2.aarch64.rpm 0a76764342b981c7a7351872d1ebab3f74be5fba95b25a1e3bf00e6e673aabd8 systemd-tests-239-45.el8_4.2.aarch64.rpm f37b025093bffc83e260c1e3d72c165bd76ec498007d2aa5e5390bee8ada0c65 systemd-udev-239-45.el8_4.2.aarch64.rpm 284de35891a27f7863652efa1b23d328e8c19eb5a4a5813fd9579e021c2e46fb RLBA-2021:3046 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices. Bug Fix(es) and Enhancement(s): * [FJ8.2 Bug]: RAID volume status is not updated when multiple drives fail. (BZ#1965414) none-baseos-rpms mdadm-4.1-16.el8_4.aarch64.rpm d1122256b8c85e798896da5c0b9ab01293b2ee4bbe3e251b2488340556f4155b RLBA-2021:3047 perl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Bug Fix(es) and Enhancement(s): * [perl-net-ping] wrong return value on failing DNS name lookup (BZ#1973176) none-baseos-rpms perl-Errno-1.28-419.el8_4.1.aarch64.rpm 60e9819cef61d0b6034b1e8cf90dcf76492a76c43bfa47d803e388741c566e7d perl-interpreter-5.26.3-419.el8_4.1.aarch64.rpm 464a9d3e81dfa7d06e8bcf53448c38d1b61c2ee9ce677f4ad98a7dae1aabe245 perl-IO-1.38-419.el8_4.1.aarch64.rpm af21af33a51e6a64db0788e5821f789f4bd8c85760a4b3272edc616b2c2bcfa6 perl-IO-Zlib-1.10-419.el8_4.1.noarch.rpm 58fcc2a1e2621cec83dd6e09435bd91fd3745b6fda82e6dea3800bd194574d1a perl-IO-Zlib-1.10-419.el8_4.1.noarch.rpm 58fcc2a1e2621cec83dd6e09435bd91fd3745b6fda82e6dea3800bd194574d1a perl-libs-5.26.3-419.el8_4.1.aarch64.rpm 2027542b8dcb5607136b56b7c35692c3ea30151d2a495e5307e565709b965566 perl-macros-5.26.3-419.el8_4.1.aarch64.rpm 094657a55b580ccbbc63921bad6e4f6f5657869613b3f69fda22dbaccab53bc2 perl-Math-Complex-1.59-419.el8_4.1.noarch.rpm 0d2c1daa26feac434d3923e0d1e32c8ee0f3e760d2f3a43639947efa3b737978 perl-Math-Complex-1.59-419.el8_4.1.noarch.rpm 0d2c1daa26feac434d3923e0d1e32c8ee0f3e760d2f3a43639947efa3b737978 RLBA-2021:3050 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * /sbin/ldconfig: /lib64/libsmbldap.so.2 is not a symbolic link (BZ#1964314) * smbd tries to delete files with wrong permissions (uses guest instead of user from force user) (BZ#1964398) * Memory leak in RPC server could allocate a lot of memory for print servers (BZ#1969831) none-baseos-rpms ctdb-4.13.3-4.el8_4.aarch64.rpm 95c361d4ba9b3579dc339ce138bc5e12889d9e60b40b116d1f9a4a28218f7d1b ctdb-tests-4.13.3-4.el8_4.aarch64.rpm 9142d39cf99476f7802c540350d56c614883d5c2eac8dd88290c9aec201b0ab4 libsmbclient-4.13.3-4.el8_4.aarch64.rpm 637009421e3f1a0e9471d344f4a229c10a8a9993a730aef78a610914208bb225 libwbclient-4.13.3-4.el8_4.aarch64.rpm ff7184b2d18089b978adb911ea1b2d82877d11ecac982fd228c7ae39451e618d python3-samba-4.13.3-4.el8_4.aarch64.rpm 6609b06abd410bb7d9d15839b76485009f29d63cd874462a3183b68099413584 python3-samba-test-4.13.3-4.el8_4.aarch64.rpm 06134fc9c03c442de552baf32aebabde11a0db43e629e8b87abc7731f7696000 samba-4.13.3-4.el8_4.aarch64.rpm 3943df981ac8a59b20ad63383799daf7da60e3f24965ec7f14a43dd9d86f2d58 samba-client-4.13.3-4.el8_4.aarch64.rpm c1ee27f3e773b7b3d8c421034bef5bf447ae58c3b687ecf17a11a78666ea179e samba-client-libs-4.13.3-4.el8_4.aarch64.rpm 09997e5822b99e2446d4836a53046d58565be3072e3d2b4eba4f2aeafc441543 samba-common-4.13.3-4.el8_4.noarch.rpm 6f89322879f8d8e0d596d9f31b21454555eadd6af2529c9db9b20cc3c1ef39cf samba-common-4.13.3-4.el8_4.noarch.rpm 6f89322879f8d8e0d596d9f31b21454555eadd6af2529c9db9b20cc3c1ef39cf samba-common-libs-4.13.3-4.el8_4.aarch64.rpm dc63c91effa15c98aed46d865237b62b8da8040e8e514f48611e80a951122a59 samba-common-tools-4.13.3-4.el8_4.aarch64.rpm a91bed8920f62e8af01cc2d75a0bd5f3809879ac398145ab7e18be68d248468c samba-krb5-printing-4.13.3-4.el8_4.aarch64.rpm 5e3a45c9ecfc8e8b55344e36658fa7c99f4ad20e76ac161907ea3094f7d40af3 samba-libs-4.13.3-4.el8_4.aarch64.rpm 1d0c8866c55f12ee9ab2c7105fb9ed8666f2a5ca47378a4c983e47c24a55ece9 samba-pidl-4.13.3-4.el8_4.noarch.rpm c6fc9c3aad802c25ee34eb68f96f0fc67eff8e16e58596f18566fcf36a7a76e8 samba-pidl-4.13.3-4.el8_4.noarch.rpm c6fc9c3aad802c25ee34eb68f96f0fc67eff8e16e58596f18566fcf36a7a76e8 samba-test-4.13.3-4.el8_4.aarch64.rpm 0c35b7ffc410c9ea440386601aad2764d908166049f645e971ee411cf544204c samba-test-libs-4.13.3-4.el8_4.aarch64.rpm 13ae02063a758f036b5f93c9a06927ff8a1ca793fb4437805e7a2a3cf7904b30 samba-winbind-4.13.3-4.el8_4.aarch64.rpm 58b973080a18fd8a7f890a71a721385be33b0037b103a91eb5b6ea68cc632bed samba-winbind-clients-4.13.3-4.el8_4.aarch64.rpm 4457e1f174b7d6906da7a4229876a2edba1be5a370bfae6675da51420b10a911 samba-winbind-krb5-locator-4.13.3-4.el8_4.aarch64.rpm 35bf237c9591492cbc570bfadd7bfe48696f13253547b324772f63cee9a4e524 samba-winbind-modules-4.13.3-4.el8_4.aarch64.rpm dc1e57acc0f8d86b0d84f1ede9e42985b7120925e67284e885de4073df071c94 RLBA-2021:3048 autofs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es) and Enhancement(s): * autofs: already mounted as other than autofs or failed to unlink entry in tree (BZ#1973888) none-baseos-rpms autofs-5.1.4-48.el8_4.1.aarch64.rpm 0ad06b13e72f890525e99928d8cc1f7819469b3c4709322b31ba89a0ebcd309e RLBA-2021:3051 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * SELinux is preventing kexec from read access on the file /var/lib/kdump/initramfs-*kdump.img (BZ#1976260) none-baseos-rpms selinux-policy-3.14.3-67.el8_4.1.noarch.rpm 10edfddc28c1b471e9bb4a98e372a294d468b10c0c95d45eec243afeff287c63 selinux-policy-3.14.3-67.el8_4.1.noarch.rpm 10edfddc28c1b471e9bb4a98e372a294d468b10c0c95d45eec243afeff287c63 selinux-policy-devel-3.14.3-67.el8_4.1.noarch.rpm e772098f937c6277f7a980675c58a048fa000bf199c4a680cb9bfdbfd479ac5c selinux-policy-devel-3.14.3-67.el8_4.1.noarch.rpm e772098f937c6277f7a980675c58a048fa000bf199c4a680cb9bfdbfd479ac5c selinux-policy-doc-3.14.3-67.el8_4.1.noarch.rpm 41b6950927dd5b3b1e7c36d0aadcb1dd9f44352a8d0f6e1c06a23b4d6b67fa36 selinux-policy-doc-3.14.3-67.el8_4.1.noarch.rpm 41b6950927dd5b3b1e7c36d0aadcb1dd9f44352a8d0f6e1c06a23b4d6b67fa36 selinux-policy-minimum-3.14.3-67.el8_4.1.noarch.rpm 37fd29a4d912ae2f264a1f6be0938c9025207c0710f926942dc62cd012cf656b selinux-policy-minimum-3.14.3-67.el8_4.1.noarch.rpm 37fd29a4d912ae2f264a1f6be0938c9025207c0710f926942dc62cd012cf656b selinux-policy-mls-3.14.3-67.el8_4.1.noarch.rpm 259e04a73729606985e75f63434324d605975500fad107506924c96758f1d2e4 selinux-policy-mls-3.14.3-67.el8_4.1.noarch.rpm 259e04a73729606985e75f63434324d605975500fad107506924c96758f1d2e4 selinux-policy-sandbox-3.14.3-67.el8_4.1.noarch.rpm 90cc9e17aa25725dabbc8da642b639c7623f3b3a7125a7707973a461773b9120 selinux-policy-sandbox-3.14.3-67.el8_4.1.noarch.rpm 90cc9e17aa25725dabbc8da642b639c7623f3b3a7125a7707973a461773b9120 selinux-policy-targeted-3.14.3-67.el8_4.1.noarch.rpm b8d8eac510976bf6cf74654c33ecaedb97a2a14d8fb334aee61315e4ce9ba35c selinux-policy-targeted-3.14.3-67.el8_4.1.noarch.rpm b8d8eac510976bf6cf74654c33ecaedb97a2a14d8fb334aee61315e4ce9ba35c RLBA-2021:3052 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es) and Enhancement(s): * kdump initrd generation fails if /boot not writable (BZ#1976252) none-baseos-rpms kexec-tools-2.0.20-46.el8_4.2.aarch64.rpm aaaa8a505d4839f7a44c142d3f98e2bb903302281b5c965c3a9ebb2de0bc4902 RLBA-2021:3053 virt-what bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-what. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The virt-what utility is used to detect whether the operating system is running inside a virtual machine. Bug Fix(es) and Enhancement(s): * Nutanix AHV is detected as hyperv (BZ#1979952) none-baseos-rpms virt-what-1.18-9.el8_4.aarch64.rpm d11915f5cfb5cea9fbd12de978b0a281c98382d46c608503686edabe3bb2abee RLBA-2021:3054 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.5 - openCryptoki: Soft token does not check if an EC key is valid (BZ#1979173) none-baseos-rpms opencryptoki-3.15.1-6.el8_4.aarch64.rpm 504578a595e5fe7ba5501eca1c4f597409ddb86c90bcf9d2ace4ec308fe9d1aa opencryptoki-icsftok-3.15.1-6.el8_4.aarch64.rpm be06509156e3da22952e9d8ea2c91042c85065dd3ab5e85029fb40b7d5566b47 opencryptoki-libs-3.15.1-6.el8_4.aarch64.rpm 98bb8e914c32bcd1b09149b2fd4569a6e4c70ab606dcdc113f383a03ddb27821 opencryptoki-swtok-3.15.1-6.el8_4.aarch64.rpm 9d7d2530415ecad1395caf3c05ae2610df9da26cf1ef116856e052268c00795d opencryptoki-tpmtok-3.15.1-6.el8_4.aarch64.rpm 4db02a4ea93827fce23fcec6e25c572b5f7a329f4f42872a5f1c24db06c182b6 RLBA-2021:3055 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Incorrect set hostname to localhost using DNS reverse lookup of ipv6 address (BZ#1970398) none-baseos-rpms NetworkManager-1.30.0-10.el8_4.aarch64.rpm 769faf75818a63c16de016b2ce84b223fd92c8c2542ddbda57e7fc78715002c9 NetworkManager-adsl-1.30.0-10.el8_4.aarch64.rpm 6a5bbf84482911db468f08baecf598a09e0fbcb9565b473173bc603a82a52a55 NetworkManager-bluetooth-1.30.0-10.el8_4.aarch64.rpm 041f05d3b8dfd096f7888c427092d5aef96b376bee4591aa77a07bc1114af887 NetworkManager-config-connectivity-redhat-1.30.0-10.el8_4.noarch.rpm fbb893f7530008788dfc0d64c851c66984f20ffd6912e011cb07c693f002ac96 NetworkManager-config-connectivity-redhat-1.30.0-10.el8_4.noarch.rpm fbb893f7530008788dfc0d64c851c66984f20ffd6912e011cb07c693f002ac96 NetworkManager-config-server-1.30.0-10.el8_4.noarch.rpm f74ad2360c999a364a281400ac7f5ac8b23fc42ed031ca7ad1eba38fa1dcfb1f NetworkManager-config-server-1.30.0-10.el8_4.noarch.rpm f74ad2360c999a364a281400ac7f5ac8b23fc42ed031ca7ad1eba38fa1dcfb1f NetworkManager-dispatcher-routing-rules-1.30.0-10.el8_4.noarch.rpm cf58b404bcf37cd97bfa2988916dfe557242fafc800f75b8ca72ac37efd6af2a NetworkManager-dispatcher-routing-rules-1.30.0-10.el8_4.noarch.rpm cf58b404bcf37cd97bfa2988916dfe557242fafc800f75b8ca72ac37efd6af2a NetworkManager-libnm-1.30.0-10.el8_4.aarch64.rpm 705c8c5d5d18c30158bf64da3b9dfb0bcd587a8318de8dca41e5a9c2b7097f12 NetworkManager-ovs-1.30.0-10.el8_4.aarch64.rpm afc1975a67df63b6e826d0a35ad0e5f686c9a16c698c64dfa5b73405b3ed620b NetworkManager-ppp-1.30.0-10.el8_4.aarch64.rpm 5f41f5f1d3be1d766d332f94cbe67a98fb2a600de7a9bd2fdbc14127ec81c722 NetworkManager-team-1.30.0-10.el8_4.aarch64.rpm 5852115dfee7605857942bd97652f7c8e9ba897689b553a5b6c64e54322f52e2 NetworkManager-tui-1.30.0-10.el8_4.aarch64.rpm 6fba27a1c046ffd061db0b46bf6225c17a0707088fbde7bbb44d4d8be4c940b6 NetworkManager-wifi-1.30.0-10.el8_4.aarch64.rpm 7778684b15bc1a8825fcf9bdac874cd2a2e911d08180b202b40bbdb1b25dde6f NetworkManager-wwan-1.30.0-10.el8_4.aarch64.rpm c46543fcbe7106dcf03718212a648057408833c6ae1849064ea17f70b64e7572 RLBA-2021:3056 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Rocky Linux 8.4 fails to obey sloppy mount option. (BZ#1982340) none-baseos-rpms libnfsidmap-2.3.3-41.el8_4.2.aarch64.rpm 12739510c3b2c7ab2d97a4d5edbee99de6efdce128e0b63d5949e93ea5c70d3a nfs-utils-2.3.3-41.el8_4.2.aarch64.rpm 59350f4deca4c71d446a5bb7e797b4e7ecd3160f9e7a7899f8630dbaced4214e RLSA-2021:3057 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: race condition in net/can/bcm.c leads to local privilege escalation (CVE-2021-3609) * kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) * kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Urgent: Missing dptf_power.ko module in Rocky Linux8 (BZ#1968381) * [mlx5] kdump over NFS fails: mlx5 driver gives error "Stop room 95 is bigger than the SQ size 64" (BZ#1969909) * BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564) * Update CIFS to kernel 5.10 (BZ#1973637) * Backport "tick/nohz: Conditionally restart tick on idle exit" to Rocky Linux 8.5 (BZ#1978710) * Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314) * Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613) * [Rocky Linux8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250) * act_ct: subject to DNAT tuple collision (BZ#1982494) Enhancement(s): * [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415) none-baseos-rpms bpftool-4.18.0-305.12.1.el8_4.aarch64.rpm 5d9df2fdf7714372308b9779f74da310be62a85d1fc1f4f84a1a3994e88b104f kernel-4.18.0-305.12.1.el8_4.aarch64.rpm 6e0522711b8413dbfbc4bbebef160fab5703dfe4f3f311ce2ac6a11191a7e087 kernel-abi-stablelists-4.18.0-305.12.1.el8_4.noarch.rpm 6d89489545e3fce41e85ba1bc652842e24c844230022570180a10795c189b8b7 kernel-abi-stablelists-4.18.0-305.12.1.el8_4.noarch.rpm 6d89489545e3fce41e85ba1bc652842e24c844230022570180a10795c189b8b7 kernel-core-4.18.0-305.12.1.el8_4.aarch64.rpm a5fd1250b0ad6eb59f0356734bdc38f258b588669090bc01e9ff1348e23ae164 kernel-cross-headers-4.18.0-305.12.1.el8_4.aarch64.rpm a7faa451a900ead788789259b2ce0dea483959dc0f87459ccf720005db32510d kernel-debug-4.18.0-305.12.1.el8_4.aarch64.rpm 3d1e4dda9ef43fb3977445d3151da5909a81f1e610635ca8f392f1f7ee6a04c7 kernel-debug-core-4.18.0-305.12.1.el8_4.aarch64.rpm f7a8fdbf364b24a7b2e06b1b7ad68e29dc76c15c1e6e02c6549710c561011292 kernel-debug-devel-4.18.0-305.12.1.el8_4.aarch64.rpm 830bb5b3ae8e8f7ad12d336bbfac125e30c4dd0baae1b852f7e522af295cbad7 kernel-debuginfo-common-aarch64-4.18.0-305.12.1.el8_4.aarch64.rpm 619217d05b3864ac9a57513446040239d3c3e6485f73babcfd9691ad7d722ff0 kernel-debug-modules-4.18.0-305.12.1.el8_4.aarch64.rpm 1c448c1ea452d77e5ccd4baa57a49c42ca95b2bcdb5e2db0ca3a60674197ad72 kernel-debug-modules-extra-4.18.0-305.12.1.el8_4.aarch64.rpm 6152cb5abf735170ee8e3a1d6ab7860a3ee76f4cb1dd30877f199d7c8b567779 kernel-devel-4.18.0-305.12.1.el8_4.aarch64.rpm 85c020c264b03be9062d08161e52b11a4d4b6159aa285a6ba3f8343cdd2a0899 kernel-doc-4.18.0-305.12.1.el8_4.noarch.rpm e5a88969b329d2977549e45ce459ca9ac28e98e3aa2015ad3010f03694891a7f kernel-doc-4.18.0-305.12.1.el8_4.noarch.rpm e5a88969b329d2977549e45ce459ca9ac28e98e3aa2015ad3010f03694891a7f kernel-headers-4.18.0-305.12.1.el8_4.aarch64.rpm cb7886cde0219b420e3f94b01406b37513bd55571493e138947c26a664da0eaf kernel-modules-4.18.0-305.12.1.el8_4.aarch64.rpm f5cf0190e7cb081b78271103c5718f0f77511f2d3b64671431679c2aa337adce kernel-modules-extra-4.18.0-305.12.1.el8_4.aarch64.rpm 8e660ec68556c7591c4928a0fa02e620db3bfb0b39a21dc8b68e207ff90ddada kernel-tools-4.18.0-305.12.1.el8_4.aarch64.rpm ebfd30493810bf232c64d9f7a3594c988394a0ec866e768fa4d4c4b72d953a1b kernel-tools-libs-4.18.0-305.12.1.el8_4.aarch64.rpm 885811b0e50cf159e76fa7fabff95caade92fd951850305598d7b7b4b898045d perf-4.18.0-305.12.1.el8_4.aarch64.rpm e5d92cb1bd1017bf7a52f3d3ae63f704654cf00cf61c33c6e5e53338c160b844 python3-perf-4.18.0-305.12.1.el8_4.aarch64.rpm 10b4b7c31ceb0de8c0e61c05451487a79363c689eaffd5e48c62c7090be49439 RLSA-2021:3058 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: integer overflow in g_byte_array_new_take function when called with a buffer of 4GB or more on a 64-bit platform (CVE-2021-27218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glib2-2.56.4-10.el8_4.1.aarch64.rpm d5ce096ce24cea1690db43cdf62ce6fb065a3521d3053b3726a5f446b3bf0268 glib2-devel-2.56.4-10.el8_4.1.aarch64.rpm cf9c1541103e7e064ff5558ac8102f5de3afcb3a16f06bc19b1cecef7e1093da glib2-fam-2.56.4-10.el8_4.1.aarch64.rpm 51a435c15d6c523ff1c5dafa390d359035189a627494d3fa70a8e34fd69fc35e glib2-tests-2.56.4-10.el8_4.1.aarch64.rpm 4511020736e60586499bafe1ab2625fb97b25c8643f2fdfe2739a154dde0f79e RLBA-2021:3059 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * fix rate-limiting of mount events (BZ#1984406) none-baseos-rpms systemd-239-45.el8_4.3.aarch64.rpm 121df52f9e01e6678ba5fec471acdad2c8382b4cdbdc2b0af3158f91be070fe9 systemd-container-239-45.el8_4.3.aarch64.rpm 00657951700413f4b2527738137cb9358d6d3a0ca191eb2b2558a9d5876c4060 systemd-devel-239-45.el8_4.3.aarch64.rpm c3b428b25732896a8c69ee6957ce6c38d3ead51872d45eb033d03f6a9a760ec8 systemd-journal-remote-239-45.el8_4.3.aarch64.rpm 31cdcf10611c413b70e53e4ef727782a3dd0fd1b6943b72a9d24e5e5259ad541 systemd-libs-239-45.el8_4.3.aarch64.rpm bca80fdbef8d53263578d6409dc451597f8926a89613be298c426317d56c1b93 systemd-pam-239-45.el8_4.3.aarch64.rpm f7bb2c5f9e7657db79f09810d8702065ab1cabfeb4def451f9552b3cf3d519a4 systemd-tests-239-45.el8_4.3.aarch64.rpm 31ffb97a914bca9cd032cddede9f2bdd86ab32073e1b0f7a80ca83f9293f383d systemd-udev-239-45.el8_4.3.aarch64.rpm 88806beb883d1149ddc4480847e6a4f13a03a3cf9b843ec197db84addfa1db4a RLSA-2021:3151 Important: sssd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: shell command injection in sssctl (CVE-2021-3621) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libipa_hbac-2.4.0-9.el8_4.2.aarch64.rpm edda6bf74d1d5126baccabe72c18749e3d5a4e48e4091fee95163c46ac1671f3 libsss_autofs-2.4.0-9.el8_4.2.aarch64.rpm 5ec5a47730fa5a59f1bfcd604f89a1e841045e511e226a5ba8b0fd1acc2eb9f8 libsss_certmap-2.4.0-9.el8_4.2.aarch64.rpm b053a2c28591c3d50f17ac52070b01593a2930a0cacd7bf7d78109ae1c191681 libsss_idmap-2.4.0-9.el8_4.2.aarch64.rpm f37fad07db35a980b4290baed39ac0eae47937a88f185048bd57755b5847197d libsss_nss_idmap-2.4.0-9.el8_4.2.aarch64.rpm 6f0256dc361df2c147e7c5e7776f2f35cf7da5bfbba8fabddaf6b0cd5e8e9753 libsss_simpleifp-2.4.0-9.el8_4.2.aarch64.rpm a75d80752430dae5c474cf75472aed77e9f7df5e4eacb3da042bac46254c530d libsss_sudo-2.4.0-9.el8_4.2.aarch64.rpm 8a674b8dedb6dffc39bb4c5f2d6698a032d3560b3a7ff28349f63ce196898141 python3-libipa_hbac-2.4.0-9.el8_4.2.aarch64.rpm 889be390021998cf58f7890dcaa5655817774f24aa596ef81b1ca226cc53ce41 python3-libsss_nss_idmap-2.4.0-9.el8_4.2.aarch64.rpm ce6e061aa08e630c5e0c44ad4ca4747ac81839ab480b354e01435dfde9b69296 python3-sss-2.4.0-9.el8_4.2.aarch64.rpm e7fee78dbe94ebd42bed69b23000be4c5f96b57856861a56653b3b717c036503 python3-sssdconfig-2.4.0-9.el8_4.2.noarch.rpm 82d4d8853104901fb5d2b9a36f380bb13db23e376d13d4830a7b9e965727492b python3-sssdconfig-2.4.0-9.el8_4.2.noarch.rpm 82d4d8853104901fb5d2b9a36f380bb13db23e376d13d4830a7b9e965727492b python3-sss-murmur-2.4.0-9.el8_4.2.aarch64.rpm 4f3e85f2118434283686ff9434bd7d8174c81576aa0fcf3220048416f865dd7e sssd-2.4.0-9.el8_4.2.aarch64.rpm c98607f399f2de5bb554fae65b05f2433a22261ceff20610f88a8fa39b9a5c11 sssd-ad-2.4.0-9.el8_4.2.aarch64.rpm 7e65a803a02684eab93edf6cf1fef0adb9b3176af1eb743fd8596055f2b76433 sssd-client-2.4.0-9.el8_4.2.aarch64.rpm 915ce068e49ccf355308427cec977635b9e6b3c242d0372cc898b21fd0d0de7e sssd-common-2.4.0-9.el8_4.2.aarch64.rpm 0156411b94f553034e7e6cd3721b91f7af320fb1a13ec55f8aaf0d0906feecf2 sssd-common-pac-2.4.0-9.el8_4.2.aarch64.rpm 8621193affce62b749327e380781710eafa7d4a20bb13f68f2d340ce49cefda7 sssd-dbus-2.4.0-9.el8_4.2.aarch64.rpm 884f07fc71cf9f78892f9df97e87ff232298f0a501d55ddd1294cb9734de9096 sssd-ipa-2.4.0-9.el8_4.2.aarch64.rpm 59ccf2967a2f3f2606bcf13c52e1770608fd5b71ec18fae6bb7793f3af3359ab sssd-kcm-2.4.0-9.el8_4.2.aarch64.rpm 820bd184745da0e8da8e25afacce2341c3aec2a069f8083ffa1321f67936a20c sssd-krb5-2.4.0-9.el8_4.2.aarch64.rpm 1f8807613aad8de92377d621d3cda9da3921c34d74d35bc0a5eebf0fe051c83d sssd-krb5-common-2.4.0-9.el8_4.2.aarch64.rpm 728d13d4b2e6dd82ce7d1ca5c81575e0734dedc2d617829eb4980669c7dd8519 sssd-ldap-2.4.0-9.el8_4.2.aarch64.rpm e05f52ced768e4fa67119f8af63655288d801b9455e328b77548f968812c6833 sssd-libwbclient-2.4.0-9.el8_4.2.aarch64.rpm 45a583f1b25f383ff7bcc2608c1915e1eaab6750f80f247e3607b1bf41ccb856 sssd-nfs-idmap-2.4.0-9.el8_4.2.aarch64.rpm 6f27dc0d84f221eafb0eeef94113dbe371c3b1f6dae3e051a9d32e34f2a56e54 sssd-polkit-rules-2.4.0-9.el8_4.2.aarch64.rpm 58f204281a2acc4db674a544737856b6db91b9d62f92b55ee37d422581cfdecd sssd-proxy-2.4.0-9.el8_4.2.aarch64.rpm 923cd09596660f4ecb30f42b8a5ca54eef55fbc8d8c5107be60b3063386b9fd0 sssd-tools-2.4.0-9.el8_4.2.aarch64.rpm 9fbd4faa663c5cdaba09e13bb420ccebb347ef60f896032e7aa28b4cc13baf0e sssd-winbind-idmap-2.4.0-9.el8_4.2.aarch64.rpm b4207b857a44fff6ebc183aeff5ccabbe97c8c4a5cecd58d0a2eb28335856ced RLSA-2021:3447 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576) * kernel: slab-out-of-bounds access in xdr_set_page_base() in net/sunrpc/xdr.c (CVE-2021-38201) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Update Broadcom Emulex lpfc driver for Rocky Linux8.5 with bug fixes (BZ#1948608) * cyclictest shows >50us latency when guest enters idle (RT guest with 18 RT vCPUs) (BZ#1981336) * xfrm: backports from upstream (BZ#1981840) * A task is stuck waiting for the completion of the vmci_resouce releasing upon the balloon reset. (BZ#1982042) * [mlx5] backport driver bits of net: zero-initialize tc skb extension on allocation (BZ#1982220) * Kernel cannot kill a process doing compaction for hugepage allocation (BZ#1984085) * Rocky Linux8.4 Nightly[0108] - [P10] [Regression] Kdump failed on Rocky Linux8.4 on SAN disk via flavafish adapter (qla2xxx/HPT/Radix) (BZ#1986156) * [Rocky Linux8.5] scheduler updates and fixes (BZ#1987296) * Rocky Linux 8.3 using FCOE via a FastLinQ QL45000 card will not manually scan in LUN from Target_id's over 8 (BZ#1989097) * fixes for oopses in security mitigation runtime code patching (BZ#1989174) * act mirred doesn't scrub packets when sending them to ingress (BZ#1992226) * HPE: Cannot install 8.4 using the DVD presented to the iLO (BZ#1993894) * NFS client hangs on share listing when server side readdir verifiers are implemented (BZ#1993895) * SNO: The load is extremely high (~870) when pao is added and a profile is applied. (BZ#1994879) * timeout value of conntrack entry with TCP ESTABLISHED status is too short (BZ#1995554) * Increase the default value for flowtable offload timeouts (BZ#1995555) * ice/iavf driver stop responding (BZ#1997534) * [FJ8.4 Bug]: [REG] Some files in /proc/sys/user show wrong data (BZ#1998002) none-baseos-rpms bpftool-4.18.0-305.17.1.el8_4.aarch64.rpm 36fdcdef6cca6da0b02a7df5106d29c2ade171d06cc984c837ab1c17f645afaa kernel-4.18.0-305.17.1.el8_4.aarch64.rpm c8f1f050150c537907cb1f84de3d327a0d5b1b739fa85fc4e8100ca7995a2ab5 kernel-abi-stablelists-4.18.0-305.17.1.el8_4.noarch.rpm ad028efb119d12cd8ed4cda841f5cac640f774fa8aeb273e3debcdea2e3b20f0 kernel-abi-stablelists-4.18.0-305.17.1.el8_4.noarch.rpm ad028efb119d12cd8ed4cda841f5cac640f774fa8aeb273e3debcdea2e3b20f0 kernel-core-4.18.0-305.17.1.el8_4.aarch64.rpm 6f98b4456ca757c150547f591c7406ec5028d46e8743690a64c71aff42792190 kernel-cross-headers-4.18.0-305.17.1.el8_4.aarch64.rpm bc6c13edae21a786123074713edc8651f4480da47cf5cc8fb9d1b2a2ea56a4bd kernel-debug-4.18.0-305.17.1.el8_4.aarch64.rpm ba5f3d3502ffb3b015bece02a6439f693fdc47657b7237cfe5a74db8b2ce35f0 kernel-debug-core-4.18.0-305.17.1.el8_4.aarch64.rpm 6a4bdf55af559a249d05fcfc80df7c9ed7bf48b6d04cbfc004b9132769564161 kernel-debug-devel-4.18.0-305.17.1.el8_4.aarch64.rpm 120bb6b5a704c7da68d68bc1373667933caa9b07bd913c177fa0aca52182fa63 kernel-debuginfo-common-aarch64-4.18.0-305.17.1.el8_4.aarch64.rpm 71a2b0831b169e565f5419010d1a80e671113cf498a23344a21dbca5063632f0 kernel-debug-modules-4.18.0-305.17.1.el8_4.aarch64.rpm 27721e181bd2cc735faa6e67d9fca0829bd3028f825fa71fd6f0b3bd0f301a2f kernel-debug-modules-extra-4.18.0-305.17.1.el8_4.aarch64.rpm 22fe1346bafe8540c3d9cc13d5251ff88de126716decca6d7d37c9895dac92ea kernel-devel-4.18.0-305.17.1.el8_4.aarch64.rpm 7cd3340ca97fe9edd4e6d8760dec357e7faa9a20f85e37786da9b17e4b606535 kernel-doc-4.18.0-305.17.1.el8_4.noarch.rpm 4b3a0650899df54b569c5f7043f7b41ddefb74254386f57047db6bc0c9d43e70 kernel-doc-4.18.0-305.17.1.el8_4.noarch.rpm 4b3a0650899df54b569c5f7043f7b41ddefb74254386f57047db6bc0c9d43e70 kernel-headers-4.18.0-305.17.1.el8_4.aarch64.rpm 4b37fb6d3c83abc50ebe1ee10aa79c2fd89249a6aebeed8b5595c56396d13486 kernel-modules-4.18.0-305.17.1.el8_4.aarch64.rpm c8350470189f5983e7460059b68cb3cd5e4f3877531dea222bc2c3ea36deda90 kernel-modules-extra-4.18.0-305.17.1.el8_4.aarch64.rpm ec3927ecee72d2ae26a02ae11ea5f75df153c9d87bdfe445ad659f7c9d1fde8c kernel-tools-4.18.0-305.17.1.el8_4.aarch64.rpm dfebd64e5e2c50fbc7f9c9a9010feda02997e06c6e47dae6003d1d52e49f8ef5 kernel-tools-libs-4.18.0-305.17.1.el8_4.aarch64.rpm abaad626b74d6d94a6731ffb5f22d2d0f80cbe125e340c76ff1a9575e01bf746 perf-4.18.0-305.17.1.el8_4.aarch64.rpm 9e9db80bd047790a9ce64263796b83ab0641839ca7991b16d125f6ebde6302d9 python3-perf-4.18.0-305.17.1.el8_4.aarch64.rpm fb0fbe6e914409ccd080f904b098557c5dcf96bc31a1b9be11f5724c78b1541c RLSA-2021:3548 Moderate: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux8.4 Nightly[0308] - HST:STC950:Fleetwood: LPAR crashed during LPM: BUG at lib/locks.c:34! (using ibmvfc) (BZ#1969792) * Rocky Linux8.2 - s390/vtime: fix increased steal time accounting (BZ#1988386) * [FJ8.4 Bug]: Installation of Rocky Linux8.4 hang up on a Tatlow platform while loading intel_lpss_pci module. (BZ#1989560) * kernel panic in drm_fb_helper_dirty_work() caused by a race condition qxl driver (BZ#1992839) * [Rocky Linux8.4] TIOCGSERIAL ioctl fails on serial device (BZ#1993872) * Rocky Linux8.4 Nightly[0208] - kernel panic when executing test case for persistent device configuration (using DASD) (BZ#1995206) * Killing ceph daemon leaving an unhealthy ocs/ocp cluster (worker node/s NotReady) (BZ#1995862) * ceph: potential data corruption in cephfs write_begin codepath (BZ#1996680) * libceph: allow addrvecs with a single NONE/blank address (BZ#1996682) * [iavf] traffic stops after host sets vf trust on (BZ#1997536) * [ice][iavf] hit some call trace and system panic when create-remove-vfs in loop (BZ#1997538) * Missing backport of IMA boot aggregate calculation in Rocky Linux 8.4 kernel (BZ#1997766) * XArray tests broken for single processor (BZ#1997997) * [Rocky Linux-8.4] mlock() end up returning -EINVAL instead of -ENOMEM in rewriting the upper address bits. (BZ#1997998) * Kernel panic at n_tty_set_termios+0x30 (BZ#1997999) * [ice]BUG: scheduling while atomic: ifenslave/270215/0x00000200 (BZ#2000129) * [ice]port lost connectivity after removing from bonding (BZ#2000130) Enhancement(s): * [Mellanox 8.5 FEAT] mlx5: drivers update upto Linux v5.12 (BZ#1983681) none-baseos-rpms bpftool-4.18.0-305.19.1.el8_4.aarch64.rpm d4b1a60bba5f27759a53d764d645fc412727ead1768e7969c5662b2994d58155 kernel-4.18.0-305.19.1.el8_4.aarch64.rpm 17c81bc91ac8ff5c4c437a86b5e896cb8212c59cd865493e62d9e0c2a3d23df8 kernel-abi-stablelists-4.18.0-305.19.1.el8_4.noarch.rpm b57b5493554c754133d2a22045617edf72f4e325515cdaa296cc132acebeb32b kernel-abi-stablelists-4.18.0-305.19.1.el8_4.noarch.rpm b57b5493554c754133d2a22045617edf72f4e325515cdaa296cc132acebeb32b kernel-core-4.18.0-305.19.1.el8_4.aarch64.rpm 6fbd3a6a7b2f95371d4d038da082d6eaa471767b0980d7c017f7a26c1ce8938f kernel-cross-headers-4.18.0-305.19.1.el8_4.aarch64.rpm 880f32a160d1311a3e0c2a0ac71323a777bc73c8c313f79ee43d91f349de6ed9 kernel-debug-4.18.0-305.19.1.el8_4.aarch64.rpm bff269f088225b4fec30059a55daafb32ae475778dd95221ebaed522f56e3874 kernel-debug-core-4.18.0-305.19.1.el8_4.aarch64.rpm dd5732575a445ee16ac242aadc8429216f5ba61b14a125367a0f192a44976f02 kernel-debug-devel-4.18.0-305.19.1.el8_4.aarch64.rpm 8bd3ee9ee31881939e5c021bec910e7144961be77e3a7e50a53169ecde265e2e kernel-debuginfo-common-aarch64-4.18.0-305.19.1.el8_4.aarch64.rpm 51b14a1c07ba0b36306aa4d3ca9b908a8a54366e1e3731c34f82c42d3d1606d0 kernel-debug-modules-4.18.0-305.19.1.el8_4.aarch64.rpm 9f1b8f28ce942570e3cc1b4d4b0aa2997b6b8c97c0e0adfef493d8493ddefb8e kernel-debug-modules-extra-4.18.0-305.19.1.el8_4.aarch64.rpm 52e7b1e62f518fedd8a58d66ce31336c8230817034c801eb4f7491ec86ea1a3d kernel-devel-4.18.0-305.19.1.el8_4.aarch64.rpm 095484e2f027a5d5ba7086af9fcf5fca87db1f40d112873dde2359a0f2041d20 kernel-doc-4.18.0-305.19.1.el8_4.noarch.rpm d34833c85149b74c78ad422584a501ca4f1bc18c8fb6b6e8f2115f78fab5e1cc kernel-doc-4.18.0-305.19.1.el8_4.noarch.rpm d34833c85149b74c78ad422584a501ca4f1bc18c8fb6b6e8f2115f78fab5e1cc kernel-headers-4.18.0-305.19.1.el8_4.aarch64.rpm 9e5bf6edb208ad45689ac52282c5404ab45f7c531b4c410430376724409fb8e7 kernel-modules-4.18.0-305.19.1.el8_4.aarch64.rpm 680c7f6c7ec8b1ca2450e38b7f47f0765e1590fc71df81bcfa279c75f4731cc7 kernel-modules-extra-4.18.0-305.19.1.el8_4.aarch64.rpm 7b03d74e0d839dd678ed7578277ca838c8c36481799aa43d3489e12e1d410669 kernel-tools-4.18.0-305.19.1.el8_4.aarch64.rpm 7b152bd371a7bf11ad634639b614bfc83db53c3ad90e83a851232fbbaf9f7af2 kernel-tools-libs-4.18.0-305.19.1.el8_4.aarch64.rpm 4c5b36088a37063495706423abc2c6703b0b868b81a14f13d0414a7dc5a8302e perf-4.18.0-305.19.1.el8_4.aarch64.rpm b1876173534fa13658be5b72943fd8a054cc584d1eaaa5fe77bd61ddf27b3ec9 python3-perf-4.18.0-305.19.1.el8_4.aarch64.rpm ec571b44866ff1979eed8b26f24276ff00bd2f7728b3eac3e977954cfdeb83a5 RLBA-2021:3573 ca-certificates bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ca-certificates. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Annual 2021 ca-certificates update 2.48 from nss 3.66 for Firefox 91 (BZ#1971200) none-baseos-rpms ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm 2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136 ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm 2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136 ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm 2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136 ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm 2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136 ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm 2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136 ca-certificates-2021.2.50-80.0.el8_4.noarch.rpm 2d8952e51019dd669b572c6d97da0abdbb30d20b292406e51465c436eb14d136 RLSA-2021:3582 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Content not matching hash in Metalink is not being discarded (CVE-2021-22922) * curl: Metalink download sends credentials (CVE-2021-22923) * curl: Bad connection reuse due to flawed path name checks (CVE-2021-22924) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-18.el8_4.1.aarch64.rpm c284c1e8457959e7867cfe916b2e31170f12ce3a73921aa60caf153efe4c3a56 libcurl-7.61.1-18.el8_4.1.aarch64.rpm 86444d29945d43f1183501747a65e08f0c5564b7f84310e9f0ca60702da11153 libcurl-devel-7.61.1-18.el8_4.1.aarch64.rpm 7a79cd51c11c70f5b26616ec50a5cd80f6713b61ec7ba94d04a8426842adaa31 libcurl-minimal-7.61.1-18.el8_4.1.aarch64.rpm ae33cf66cf5b926c35cd5c53df361dc1f31146046cc2571bc418d931a60fcc5d RLBA-2021:3574 rng-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rng-tools packages contain random number generator user-space utilities, such as the rngd daemon. Bug Fix(es) and Enhancement(s): * rngd uses 100% CPU while in a yield() loop (BZ#1966437) none-baseos-rpms rng-tools-6.8-4.el8_4.aarch64.rpm de6da4dacfbe8a084c30cd28203bbbd6dbe0e66a58b14c50045ad5d505d2a9b6 RLSA-2021:3576 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Sending a request containing PA-ENCRYPTED-CHALLENGE padata element without using FAST could result in NULL dereference in KDC which leads to DoS (CVE-2021-36222) * krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (CVE-2021-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-8.3.el8_4.aarch64.rpm 171826650419e3e1378d5a051bc5ffb9d4fed085e21d1fd846e7b5a6a1c7c730 krb5-libs-1.18.2-8.3.el8_4.aarch64.rpm 4fc1efd79652f4a525b78344a752a4a95d335e18b448609bc59078b29771d013 krb5-pkinit-1.18.2-8.3.el8_4.aarch64.rpm e01bb443cb5af3f0753a80658e0971eb125a1efae2ded94722473e044e6d7173 krb5-server-1.18.2-8.3.el8_4.aarch64.rpm 5d8393bb5ff078a7b06bd193d35a1d86e771cb516ccb3f1b92afa246e71fddf1 krb5-server-ldap-1.18.2-8.3.el8_4.aarch64.rpm 6faecbc904f5f9d032d0846dfa2ee8f75961a00c84c81435cdcecd3648b2bc7d krb5-workstation-1.18.2-8.3.el8_4.aarch64.rpm 13f10028560ff89183a0ee29f6dc7e8169a08465bb66398bcdc6723167deb600 libkadm5-1.18.2-8.3.el8_4.aarch64.rpm f2cdf42a6087402681ef2c536d3ab8a3da3c06c64b9b5eb738950cb90b97dae7 RLBA-2021:3583 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8.4.0.z] sosreport needs to collect data about conversions and upgrades (BZ#1992957) none-baseos-rpms sos-4.0-12.el8_4.noarch.rpm 39a81dafcd5c3450e1e4ffbca9685cdf55dee803e4ba634a9963f8cd38ba330a sos-4.0-12.el8_4.noarch.rpm 39a81dafcd5c3450e1e4ffbca9685cdf55dee803e4ba634a9963f8cd38ba330a sos-audit-4.0-12.el8_4.noarch.rpm e54e8d0f093bce5875ecca5766cc4bd4bd905728036cbeee2e1f35f66208d0f2 sos-audit-4.0-12.el8_4.noarch.rpm e54e8d0f093bce5875ecca5766cc4bd4bd905728036cbeee2e1f35f66208d0f2 RLBA-2021:3586 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Bug Fix(es) and Enhancement(s): * [RFE] subscription-manager should return a module stream's "activity" in the modular profile (BZ#1993897) none-baseos-rpms dnf-plugin-subscription-manager-1.28.13-4.el8_4.aarch64.rpm afb7d241b08a4ebfe9c6a1880fc5f86d0cf11e44e8bb470b7c2753ec1c338340 python3-subscription-manager-rhsm-1.28.13-4.el8_4.aarch64.rpm d65a2e854e5756cbf2c2b94902313cd81e54ef21b1b072c1f8d833859c0e0e97 python3-syspurpose-1.28.13-4.el8_4.aarch64.rpm 3778ecebdc646567912636363b1031d5a14f916d0abb6e1ab4a4ee0604fb7fd7 rhsm-icons-1.28.13-4.el8_4.noarch.rpm d6630f9d8a1cdb74e1d1956584f0d043e3792f2ff464376347e0db0b2d8c9c6d rhsm-icons-1.28.13-4.el8_4.noarch.rpm d6630f9d8a1cdb74e1d1956584f0d043e3792f2ff464376347e0db0b2d8c9c6d subscription-manager-1.28.13-4.el8_4.aarch64.rpm e1c2784e07a98df19e3c77cd72ae255322c20c31232501a599010d1342f061af subscription-manager-cockpit-1.28.13-4.el8_4.noarch.rpm 3d00ba1a08adee6bea6f83cf8f6caee2caf2d7d618ba51edb6b9a342df7689b1 subscription-manager-cockpit-1.28.13-4.el8_4.noarch.rpm 3d00ba1a08adee6bea6f83cf8f6caee2caf2d7d618ba51edb6b9a342df7689b1 subscription-manager-plugin-ostree-1.28.13-4.el8_4.aarch64.rpm d8883023736ec4d5c7c2315e55b5720695633ea615b441bcfa375f1c5052a8a0 subscription-manager-rhsm-certificates-1.28.13-4.el8_4.aarch64.rpm 893fbad4cfbede1ffad1cfd33c48da3e0c3d0d36d8b4af969025b590dd453baf RLBA-2021:3587 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * Rocky Linux8.4 - pkcstok_migrate leaves options with multiple strings in opencryptoki.conf file options without double-quotes (openCryptoki) (BZ#1995919) none-baseos-rpms opencryptoki-3.15.1-7.el8_4.aarch64.rpm d54a50c901875ed9d97c610a2e1667faf2d37f81d698a2ba5a848bfbfd1c6041 opencryptoki-icsftok-3.15.1-7.el8_4.aarch64.rpm da7ad2faa05aa5da73092a8f02ca7cda3bd85f88ab04cf4a7bbe1cbf2a1cf564 opencryptoki-libs-3.15.1-7.el8_4.aarch64.rpm a339bf574fcf552b8e0dbba5cfbb4afc072c98b9b8dbf77d8684003b1157a4d6 opencryptoki-swtok-3.15.1-7.el8_4.aarch64.rpm 2c29d0851fdf59a74a98895c66e1a4d94cbb5fae6c9b138afd12af8a43165429 opencryptoki-tpmtok-3.15.1-7.el8_4.aarch64.rpm fd076eec3376f03367f5d50f5b14f381c20216eadf38e574d865f13066564cec RLEA-2021:3591 strace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The strace utility intercepts and records the system calls that are made and received by a running process and prints a record of each system call, its arguments, and its return value to standard error output or a file. It is often used for problem diagnoses, debugging, and for instructional purposes. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8.4.0.z] RFE: backport commit e921913eecd5025dae688fdf9c365023fe3b8a0c (SELinux support) (BZ#2000565) none-baseos-rpms strace-5.7-2.1.el8_4.aarch64.rpm 4bacf9fa2f9eef4c55a95e9408756963fc8a842c6a69e9e54535982230906c1a RLBA-2021:3592 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * RFE: Grant rpc.gssd access to $HOME/.k5identity in selinux-policy (BZ#1995594) none-baseos-rpms selinux-policy-3.14.3-67.el8_4.2.noarch.rpm c7f80ad4b665c937e450847e961ae3f4d99ffd99a970cc745a928764bbd4b205 selinux-policy-3.14.3-67.el8_4.2.noarch.rpm c7f80ad4b665c937e450847e961ae3f4d99ffd99a970cc745a928764bbd4b205 selinux-policy-devel-3.14.3-67.el8_4.2.noarch.rpm fab208cefc87ef9be1e5992d7fb87cde645bf32ea7008426749bd8fe9e2475ec selinux-policy-devel-3.14.3-67.el8_4.2.noarch.rpm fab208cefc87ef9be1e5992d7fb87cde645bf32ea7008426749bd8fe9e2475ec selinux-policy-doc-3.14.3-67.el8_4.2.noarch.rpm e6d0bf65da218a5074c56e4bba737e4786c616136a13ec08f3e0d180ce99c649 selinux-policy-doc-3.14.3-67.el8_4.2.noarch.rpm e6d0bf65da218a5074c56e4bba737e4786c616136a13ec08f3e0d180ce99c649 selinux-policy-minimum-3.14.3-67.el8_4.2.noarch.rpm 954f28d491adcf5ad2338c8048eb3adec3f682ed4ae2b22b58261d92cfc46c42 selinux-policy-minimum-3.14.3-67.el8_4.2.noarch.rpm 954f28d491adcf5ad2338c8048eb3adec3f682ed4ae2b22b58261d92cfc46c42 selinux-policy-mls-3.14.3-67.el8_4.2.noarch.rpm 4b4197a5c6b9a816aa8a20de91f30545f6f5a822136c331dee8237f8fb039bfa selinux-policy-mls-3.14.3-67.el8_4.2.noarch.rpm 4b4197a5c6b9a816aa8a20de91f30545f6f5a822136c331dee8237f8fb039bfa selinux-policy-sandbox-3.14.3-67.el8_4.2.noarch.rpm ae07e6023ad48e49fd4030687f0c83615827272cae6e8fdf11af8250429e9210 selinux-policy-sandbox-3.14.3-67.el8_4.2.noarch.rpm ae07e6023ad48e49fd4030687f0c83615827272cae6e8fdf11af8250429e9210 selinux-policy-targeted-3.14.3-67.el8_4.2.noarch.rpm 26566367e728cb4013d8209b7998b49cd0ae695d6e9100db20d728833b146a83 selinux-policy-targeted-3.14.3-67.el8_4.2.noarch.rpm 26566367e728cb4013d8209b7998b49cd0ae695d6e9100db20d728833b146a83 RLBA-2021:3790 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021c, which addresses recent time zone changes. Notably: * Samoa does not switch to the daylight saving time (DST) in 2021. (BZ#2007732, BZ#2007785, BZ#2008251, BZ#2010126, BZ#2010127, BZ#2010312) none-baseos-rpms tzdata-2021c-1.el8.noarch.rpm 6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926 tzdata-2021c-1.el8.noarch.rpm 6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926 RLBA-2021:4003 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2021e, which addresses recent time zone changes. Notably: * The Pacific/Fiji timezone has suspended daylight saving time (DST) for the 2021/2022 season. * The 'zic -r' command now marks unspecified timestamps with "-00". * Palestine will end daylight saving time (DST) on October 29, 2021 at 01:00, rather than the predicted October 30, 2021. (BZ#2015242, BZ#2015246, BZ#2016369) none-baseos-rpms tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a RLBA-2021:4052 bluez bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Bug Fix(es) and Enhancement(s): * [Dell 8.4 BUG] Bluetooth keyboard paired and connected but does not work on firt pair. (BZ#1972918) none-baseos-rpms bluez-5.52-5.el8_4.aarch64.rpm af12f65838e71258bd242b52726da1413f7503ed2fd4c060426754817af2f0b9 bluez-hid2hci-5.52-5.el8_4.aarch64.rpm 608792013a23cec12540394166f6d8f36b636d4fe696b03198ea8047d1595ac2 bluez-libs-5.52-5.el8_4.aarch64.rpm 98dd722e221d6bebf47e6fdf3e13d4a30856179d59bb786ba36887afc8fadc6d bluez-obexd-5.52-5.el8_4.aarch64.rpm efa270432fea43c53173f38a0a0a97204cfbe59dd1c86c1f95c7205bafeaed13 RLEA-2021:4053 rasdaemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rasdaemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rasdaemon packages provide a RAS (Reliability, Availability and Serviceability) logging tool, which records memory errors, using the EDAC tracing events. Bug Fix(es) and Enhancement(s): * [RFE] latest rasdaemon (hardware check for ROME and MILAN) (BZ#1975506) none-baseos-rpms rasdaemon-0.6.1-5.1.el8_4.aarch64.rpm ea65fa4bb2ad0f84a875311fce73f538d4926e7696cf1e2e47d5526f8344566c RLBA-2021:4054 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * iptables-nft returns incorrect result for -C when concurrently running (BZ#1990016) none-baseos-rpms iptables-1.8.4-17.el8_4.1.aarch64.rpm 731430d7208bb581c8a3f2fd0a4d6cbfb691bdd742896c3c077f38e5d0d95469 iptables-arptables-1.8.4-17.el8_4.1.aarch64.rpm c5b5789664d1b5163e6290bc47a1879ce95aa107198c72d74093973fc4cf1c05 iptables-devel-1.8.4-17.el8_4.1.aarch64.rpm 1ca3280acdb64ab5ccaa3664a3a5dc72d5336f01fda4367f31411b0716bb4f46 iptables-ebtables-1.8.4-17.el8_4.1.aarch64.rpm 09242eddd2a9e4f33f5e6950f709e9c0d65c8f17b23c2848aed041f086ffeaa1 iptables-libs-1.8.4-17.el8_4.1.aarch64.rpm 3754438c211a9a0e8a58b037581f1a5be8ad7949e8ea53be16e07e159506bfb9 iptables-services-1.8.4-17.el8_4.1.aarch64.rpm 7f5a5a89fdd80df83d9c988b85638cf5ac61e356febaae4a6da97d814e122e46 iptables-utils-1.8.4-17.el8_4.1.aarch64.rpm d4be7df999fedf16db476d498d81a6d5acc91a21c6910be55dfb2731a1970397 RLBA-2021:4055 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * RFE: Prevent $HOME modification for rpc.gssd with conditional flag (BZ#1995593) none-baseos-rpms libnfsidmap-2.3.3-41.el8_4.3.aarch64.rpm 6994952578229a1d7d1237fc85e0b1c888c4d35a4992b437bf9567b2d34fe0f7 nfs-utils-2.3.3-41.el8_4.3.aarch64.rpm 885a5ab4a675b4155f9c687ecfc6b80f3ec07ccd5cb8f6c4413396c49f58bcec RLSA-2021:4056 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in drivers/infiniband/core/ucma.c ctx use-after-free (CVE-2020-36385) * kernel: out-of-bounds write due to a heap buffer overflow in __hidinput_change_resolution_multipliers() of hid-input.c (CVE-2021-0512) * kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [HPE 8.3 bug] No EDAC MC0 message with one-DIMM two-processor configuration under Rocky Linux8.3 (BZ#1982182) * mlx: devlink port function shows all zero hw_addr (BZ#1986837) * net/sched: act_mirred: allow saving the last chain processed on xmit path (BZ#1992230) * Rocky Linux8.3 - System hang and / or r/o fs during SVC/v5k/v7k maintenance with ibmvfc (BZ#1993892) * Rocky Linux8.1 Snapshot3 - PVT:940:virt:4TB:LPM operation failed by returning HSCLA2CF, HSCL365C SRC's - Linux partition suspend timeout (-> documentation/Linux Alert through LTC bug 182549) (BZ#1993952) * Rocky Linux8.4 - benchTableRepDMLAsyncBarrier regresses by 34% on Rocky Linux8.4 on POWER9 compared to Rocky Linux8.2 (performance) (BZ#1997431) * [panic] call trace: ice_probe+0x238/0x10f0 [ice] (BZ#1997539) * [ice, PTP] ice: fix GPIO 1PPS signal (BZ#1997572) * Fix locality handling in the tpm_tis driver (BZ#1998219) * [ice, PTP]: fix Tx queue iteration for Tx timestamp enablement (BZ#2000128) * PCI passthrough with NVidia GPU "Invalid device 0003:01:00.0 iommu_group file /sys/bus/pci/devices/0003:01:00.0/iommu_group is not a symlink" (BZ#2000602) * [DELL 8.4 BUG] - System Hangs at Dell Logo When Boot to OS(e1000e with wrong GbE checksum) (BZ#2002335) * Rocky Linux8.4 - kernel: Fix hanging ioctl caused by wrong msg counter (BZ#2002635) * kernel: get_timespec64 does not ignore padding in compat syscalls (BZ#2003569) * [mlx5] eth0: hw csum failure (BZ#2005980) * xlog_grant_head_wait() does not return and system hangs (BZ#2007413) * panic while breaking a lease/delegation after user mode helper invocation (BZ#2010331) * Lockd invalid cast to nlm_lockowner (BZ#2010820) * [xfstests generic/388] XFS: Assertion failed: 0, file: fs/xfs/xfs_mount.c, line: 1218 (BZ#2011919) Enhancement(s): * [Intel 8.5 FEAT] ice: Enable PTP Support (BZ#1998220) * [Intel 8.5 FEAT] ice: Enable GPIO/SDP Support (BZ#1998221) none-baseos-rpms bpftool-4.18.0-305.25.1.el8_4.aarch64.rpm af6830d2c14e805a5c2fe50c76f81d0f3773a38cfb729aa462523f6a80b3ed70 kernel-4.18.0-305.25.1.el8_4.aarch64.rpm 8682b6ca20d19710745d2dfa35b107f46aefbf814ff20bdb36956e503e4eafb7 kernel-abi-stablelists-4.18.0-305.25.1.el8_4.noarch.rpm fb0f8fba117a6ee3ed953404d203fc1343b7801a1a81afa917be53df4004e8e8 kernel-abi-stablelists-4.18.0-305.25.1.el8_4.noarch.rpm fb0f8fba117a6ee3ed953404d203fc1343b7801a1a81afa917be53df4004e8e8 kernel-core-4.18.0-305.25.1.el8_4.aarch64.rpm abbb37f4d244629defe1c03ed8ff7acf0dd831e007cc4ebfadfdda1e55ed04fd kernel-cross-headers-4.18.0-305.25.1.el8_4.aarch64.rpm 66e8c9897ec7ee4912cdef27f048d821058f1665979a27946b6cd9abe4efc40a kernel-debug-4.18.0-305.25.1.el8_4.aarch64.rpm c1b7f699906d387c01c80d7da7d84241c747720cf2c205a9603c414e9d30e124 kernel-debug-core-4.18.0-305.25.1.el8_4.aarch64.rpm cdfedd4226c2165fcf38475fc44e94693da9b811c865377f1ee5344da0d72f5b kernel-debug-devel-4.18.0-305.25.1.el8_4.aarch64.rpm d318caba40133f665f8f9ebdcad708754ac43447d73851c6e02e1d49266e08c8 kernel-debuginfo-common-aarch64-4.18.0-305.25.1.el8_4.aarch64.rpm 444fcc9c9ac7c2314fff6410b6a1f70d090336c26fa7de461ca6af119d86d29d kernel-debug-modules-4.18.0-305.25.1.el8_4.aarch64.rpm a8757116ecae62431e78fde90517bf770643c8b6629ee4f583ae902e750f4bf9 kernel-debug-modules-extra-4.18.0-305.25.1.el8_4.aarch64.rpm 366e514981ac64a9e6b5238516c8a29953ec3048736f1d751ff27622528a6e65 kernel-devel-4.18.0-305.25.1.el8_4.aarch64.rpm 22728644f416e774b07835b9db6335385a2ba8baae3c9563e225a0b52c96a63b kernel-doc-4.18.0-305.25.1.el8_4.noarch.rpm e9e54640c6153d51645a46aa2f9c05fb8c2a98a2b0bb2cba0af99392050eb2f5 kernel-doc-4.18.0-305.25.1.el8_4.noarch.rpm e9e54640c6153d51645a46aa2f9c05fb8c2a98a2b0bb2cba0af99392050eb2f5 kernel-headers-4.18.0-305.25.1.el8_4.aarch64.rpm e95464f8c429f7aefd654534c02d04aeaa1b8183f59639a796f6703b5234827d kernel-modules-4.18.0-305.25.1.el8_4.aarch64.rpm 621e15ebce0330f53905b9c08a086ddcf35bdecd4b2f72415bd17d6200e7d462 kernel-modules-extra-4.18.0-305.25.1.el8_4.aarch64.rpm f5105d1c6cfa1cfdcf545a4f5a790d768e056fa188c96dd813620cf0b1232da2 kernel-tools-4.18.0-305.25.1.el8_4.aarch64.rpm ee05659a6f018ae9d682447cfa7490baed2ce143886ab431109fc80ba9426471 kernel-tools-libs-4.18.0-305.25.1.el8_4.aarch64.rpm 6c020a116d8aa26362780f8822b3ca1fe28564a336c186d1e9b395929ff3d233 perf-4.18.0-305.25.1.el8_4.aarch64.rpm 6b47884c48714dfc7835a3d6d3507acdc9ebf564f82527c4f971c3be7e2dd33f python3-perf-4.18.0-305.25.1.el8_4.aarch64.rpm d18c1bea65a801e84b7d9dc9a10c40436dd28d8e152b1d5be10aa808126e56bf RLSA-2021:4058 Moderate: samba security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms ctdb-4.13.3-5.el8_4.aarch64.rpm 8f0ee534b0c6c89de8b8f4694517f6a49e5f5894661d15e55e966e49faf58dc4 ctdb-tests-4.13.3-5.el8_4.aarch64.rpm ff1ec0a8a386f122eaf43f24ada143556533e20c7cc41532b0381c4c076781c3 libsmbclient-4.13.3-5.el8_4.aarch64.rpm 38ca5c3bf615e35eadf5bfe08a63779479cf6894a40811db4abba4182ae48806 libwbclient-4.13.3-5.el8_4.aarch64.rpm f83662945f975930328b6e8d907b9f2d54c8a5c275d4f9be3d2ca19410c1bfee python3-samba-4.13.3-5.el8_4.aarch64.rpm c550c49718500b787a439dcc53ef8f9727f0e18ec97d80fb638dd283dae6a8ca python3-samba-test-4.13.3-5.el8_4.aarch64.rpm 0ed532f99577ec42591ab4116937ac981aebe23499961376e8bde38c4e5b92f1 samba-4.13.3-5.el8_4.aarch64.rpm bbae2f73ee1c3c4cdc5c60d965e0d2daa356786baf4c4a1f5420d73daf5c8cbc samba-client-4.13.3-5.el8_4.aarch64.rpm af1f023f55e3595e05c0747a51a57c0528a4d620be6bbd7e8b36d6a796edf0ee samba-client-libs-4.13.3-5.el8_4.aarch64.rpm 87eec274fd1d2b27a163034f6dc13f88797085c97c63dc389e8a305415194362 samba-common-4.13.3-5.el8_4.noarch.rpm 60d09667d50a65040065329b0c3511e1310a7e7dbe140a14af66309066368e17 samba-common-4.13.3-5.el8_4.noarch.rpm 60d09667d50a65040065329b0c3511e1310a7e7dbe140a14af66309066368e17 samba-common-libs-4.13.3-5.el8_4.aarch64.rpm 00631cb6d8ee49b4f088fc84dfe687597654d4f74b0e8415a0aab9b9d5ab81da samba-common-tools-4.13.3-5.el8_4.aarch64.rpm 980ed1120e011bef3d7e1436a94752e7174f82e84b65736ae881aaac7d67fa21 samba-krb5-printing-4.13.3-5.el8_4.aarch64.rpm ea9322644ecb0a3b2adcc446ac4e71878aada98573f85f363ad34ae666bbc046 samba-libs-4.13.3-5.el8_4.aarch64.rpm ca95c03061076cb0ee68abe308d643b98e604726d02c1039836651229103415c samba-pidl-4.13.3-5.el8_4.noarch.rpm 1f51ecc581b1b46d2534076750b77413070e35690bd01fd0b75e6c59fc483a55 samba-pidl-4.13.3-5.el8_4.noarch.rpm 1f51ecc581b1b46d2534076750b77413070e35690bd01fd0b75e6c59fc483a55 samba-test-4.13.3-5.el8_4.aarch64.rpm 23e462f19e81786cdd45e53b73291021d02c7678ef89c3ab5bd0b1d0d75cd853 samba-test-libs-4.13.3-5.el8_4.aarch64.rpm ceaa7cbc06b8c1089e8a3dc9a1a1c69554b67af63f2921453c0cf2b59ed5e420 samba-winbind-4.13.3-5.el8_4.aarch64.rpm cd7b9ec379827df853bc52a03d1d13fe13c100d044161f574804519b4a57944d samba-winbind-clients-4.13.3-5.el8_4.aarch64.rpm 8500de213e54850f12cceacb69e78e23464162907461b923ef20ea3aa1027490 samba-winbind-krb5-locator-4.13.3-5.el8_4.aarch64.rpm 1b9e6abb547c390df0315b0302ad5c03d0a56b2968b15c14f769f265efa320da samba-winbind-modules-4.13.3-5.el8_4.aarch64.rpm 96b22dd5f6902a3e3d16d0e7529ddad2c4a60ceb6f9df7aec77252cdc253647a RLBA-2021:4543 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2021d and tzdata-2021e - changes for Pacific/Fiji and Asia/Gaza (BZ#2016370) none-baseos-rpms tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a tzdata-2021e-1.el8.noarch.rpm 75d86a41da2d2c46d35ac56c42da392b242d8bf608cc31e1b19828953548f94a RLSA-2021:4059 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Requirement to use TLS not properly enforced for IMAP, POP3, and FTP protocols (CVE-2021-22946) * curl: Server responses received before STARTTLS processed after TLS handshake (CVE-2021-22947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-18.el8_4.2.aarch64.rpm 35ccc8dae7f38776d91de48fb5759384b296716bd384558c05390d1f427d4e51 libcurl-7.61.1-18.el8_4.2.aarch64.rpm afeec6eaf6aa10e9483d2f27a3e78babfa6de431e43e8f18480254ce47826c64 libcurl-devel-7.61.1-18.el8_4.2.aarch64.rpm c09db15fd92ffe0c6b3a7d9247375bd9ac23e22f43094d6bc1a26edd0ab35c00 libcurl-minimal-7.61.1-18.el8_4.2.aarch64.rpm ffe3542209156cbddfd153be15eb5ed9226d14c46e1440c3d07626b43266ecd2 RLSA-2021:4060 Moderate: libsolv security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Security Fix(es): * libsolv: heap-based buffer overflow in pool_installable() in src/repo.h (CVE-2021-33928) * libsolv: heap-based buffer overflow in pool_disabled_solvable() in src/repo.h (CVE-2021-33929) * libsolv: heap-based buffer overflow in pool_installable_whatprovides() in src/repo.h (CVE-2021-33930) * libsolv: heap-based buffer overflow in prune_to_recommended() in src/policy.c (CVE-2021-33938) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsolv-0.7.16-3.el8_4.aarch64.rpm 77d60b35f28135aeee58c5d32722153e3195f7c3f7d0242fd1cbe42556fd919b python3-solv-0.7.16-3.el8_4.aarch64.rpm 7f72931cab1730da3ebcfe268528b3023926e7b47317a96420c094ce11bc7f5c RLBA-2021:4061 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * IPv6 Default gateway deleted from routing table (BZ#2007264) * [nm-cloud-setup] [AWS] default route inter-feres with other subnets on the VM (making containers unreachable) (BZ#2007341) * [Azure][Rocky Linux-8.5] nm-cloud-setup.service makes network connectivity loss (BZ#2014510) none-baseos-rpms NetworkManager-1.30.0-13.el8_4.aarch64.rpm a11cee370da47b10cd2c05147631839a33161f78ac889e7be6123ba682b9f156 NetworkManager-adsl-1.30.0-13.el8_4.aarch64.rpm 0b70be30273a470db4265a7a7be72061271173337fb23d16efdb2bc083ab0013 NetworkManager-bluetooth-1.30.0-13.el8_4.aarch64.rpm 150a54002113dc848c00d7bbc06ae2a8c9abceab67cb0ea74b523f6bfb2623db NetworkManager-config-connectivity-redhat-1.30.0-13.el8_4.noarch.rpm 71cc8abaf436a2fd888b2fc11f3dfbaf900badad653d5f9b5fc18b79edbe510c NetworkManager-config-connectivity-redhat-1.30.0-13.el8_4.noarch.rpm 71cc8abaf436a2fd888b2fc11f3dfbaf900badad653d5f9b5fc18b79edbe510c NetworkManager-config-server-1.30.0-13.el8_4.noarch.rpm 1db01085ee11b9d8435869b92952b6b76ef79cc85e5d47e18871044a2f806c74 NetworkManager-config-server-1.30.0-13.el8_4.noarch.rpm 1db01085ee11b9d8435869b92952b6b76ef79cc85e5d47e18871044a2f806c74 NetworkManager-dispatcher-routing-rules-1.30.0-13.el8_4.noarch.rpm c3d11f3135eb2096c0c0a83b5686fe6e64bbe353b7f618a82020c7a760db1f88 NetworkManager-dispatcher-routing-rules-1.30.0-13.el8_4.noarch.rpm c3d11f3135eb2096c0c0a83b5686fe6e64bbe353b7f618a82020c7a760db1f88 NetworkManager-libnm-1.30.0-13.el8_4.aarch64.rpm 76cb919e3574e7a8097cd3ea1a1faa5bfb174c56340d8535dcdb638797e28a9a NetworkManager-ovs-1.30.0-13.el8_4.aarch64.rpm 966fc02aa3d3935085adf1b3aa39efa3bc21a403483c8973b7cf34662ccee4e5 NetworkManager-ppp-1.30.0-13.el8_4.aarch64.rpm a720ef09e847b7b67a973d8e9d7a789ef458077cd29486ed3794667fd85e68b8 NetworkManager-team-1.30.0-13.el8_4.aarch64.rpm f2c86417a9cd29dac0c11568c872b79d483b7a5cc271c4bb8dbda36254c6caa5 NetworkManager-tui-1.30.0-13.el8_4.aarch64.rpm 06e160d37a44637990f68a605ab221471d7cf91d7c4e5c4e7d9d2e2c894d4d46 NetworkManager-wifi-1.30.0-13.el8_4.aarch64.rpm 97505a142c742211872a20c643ab26ef7423b16ec99150f67bd9ec881606ddf9 NetworkManager-wwan-1.30.0-13.el8_4.aarch64.rpm d289f3b2de2bd9f58aaf3252a405045ae6189282dcc9834ec40c9c7a9a6d46bf RLBA-2021:4062 sudo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Bug Fix(es) and Enhancement(s): * Request to backport https://www.sudo.ws/repos/sudo/rev/b4c91a0f72e7 to Rocky Linux 8 (BZ#2015136) none-baseos-rpms sudo-1.8.29-7.el8_4.1.aarch64.rpm 624d98dc2462067f638919006b756c9b88350ca1f52ba505b40366fc566ecae2 sudo-1.8.29-7.el8_4.1.aarch64.rpm 624d98dc2462067f638919006b756c9b88350ca1f52ba505b40366fc566ecae2 RLBA-2021:4392 fwupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms fwupd-1.5.9-1.el8_4.aarch64.rpm f4a24609e813306a855489a712ac5ef78a12b71727a67ac6e55e289cc37aa206 RLBA-2021:4410 unzip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms unzip-6.0-45.el8_4.aarch64.rpm 67a7d0ee2aee35d4fbbed25ecad74782cb240e7c52f7f8fc96c6d2929bd2c627 unzip-6.0-45.el8.aarch64.rpm 4c081ec717163907ed8c605c10881dfc2368ededaa8b9eaa6b185557edb1c5fa RLBA-2021:4423 bluez bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms bluez-5.52-5.el8_4.aarch64.rpm af12f65838e71258bd242b52726da1413f7503ed2fd4c060426754817af2f0b9 bluez-hid2hci-5.52-5.el8_4.aarch64.rpm 608792013a23cec12540394166f6d8f36b636d4fe696b03198ea8047d1595ac2 bluez-libs-5.52-5.el8_4.aarch64.rpm 98dd722e221d6bebf47e6fdf3e13d4a30856179d59bb786ba36887afc8fadc6d bluez-obexd-5.52-5.el8_4.aarch64.rpm efa270432fea43c53173f38a0a0a97204cfbe59dd1c86c1f95c7205bafeaed13 RLEA-2021:4518 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms tzdata-2021c-1.el8.noarch.rpm 6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926 tzdata-2021c-1.el8.noarch.rpm 6a8c045717ffa65b5c94f9dad9a8e0736a99bed960a1b7270a01149561b36926 RLBA-2021:4357 kpatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kpatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms kpatch-dnf-0.2-5.el8.noarch.rpm e12e42569f0327bba9b2bc6757b422b4b8ce35a8b93acc63c6b1b7a6e309913c kpatch-0.9.2-5.el8.noarch.rpm f83c6fb7b382f466439ba29419b0fde58616a4bc6b389af96571967d74dc2037 kpatch-0.9.2-5.el8.noarch.rpm f83c6fb7b382f466439ba29419b0fde58616a4bc6b389af96571967d74dc2037 kpatch-dnf-0.2-5.el8.noarch.rpm e12e42569f0327bba9b2bc6757b422b4b8ce35a8b93acc63c6b1b7a6e309913c RLBA-2021:4365 dbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms dbus-1.12.8-14.el8.aarch64.rpm 0343df64cc4ba0bc5f947b374a02a68b529a2d773be8aa238cfa0945cfb5e313 dbus-common-1.12.8-14.el8.noarch.rpm 8c500d8036be9d35fe1439cce7a69571271e03fa2ea13d9a1d3307867a915d41 dbus-common-1.12.8-14.el8.noarch.rpm 8c500d8036be9d35fe1439cce7a69571271e03fa2ea13d9a1d3307867a915d41 dbus-daemon-1.12.8-14.el8.aarch64.rpm 871270047982e562fbabe3f5efab954801595c37c42ce76021882a389b6c3749 dbus-libs-1.12.8-14.el8.aarch64.rpm 17f3241e7794e69960a586923fa7ce5f3ce069480da297580f97b5ee13329fdb dbus-tools-1.12.8-14.el8.aarch64.rpm 0e8723c6d25f5ab03f6c8ae80277bb7586811eb58db4b656afad266bbf3d1f80 RLBA-2021:4355 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms firewalld-0.9.3-7.el8.noarch.rpm a5b5f089bd7b3a2ea0a3c966c54264547b2944108d90cf0c2e0a57a3b3816d78 firewalld-0.9.3-7.el8.noarch.rpm a5b5f089bd7b3a2ea0a3c966c54264547b2944108d90cf0c2e0a57a3b3816d78 firewalld-filesystem-0.9.3-7.el8.noarch.rpm c309357255b6f4020b0b9d3f4bd7beea6501bbbea0f2d9ccf7906efa659f19c6 firewalld-filesystem-0.9.3-7.el8.noarch.rpm c309357255b6f4020b0b9d3f4bd7beea6501bbbea0f2d9ccf7906efa659f19c6 python3-firewall-0.9.3-7.el8.noarch.rpm 3d9ec216977b38e39daa356a88c164bff4dbd4080855d3cc9bc20adfc8f2b159 python3-firewall-0.9.3-7.el8.noarch.rpm 3d9ec216977b38e39daa356a88c164bff4dbd4080855d3cc9bc20adfc8f2b159 RLSA-2021:4358 Moderate: glibc security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Arbitrary read in wordexp() (CVE-2021-35942) * glibc: Use-after-free in addgetnetgrentX function in netgroupcache.c (CVE-2021-27645) * glibc: mq_notify does not handle separately allocated thread attributes (CVE-2021-33574) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms glibc-2.28-164.el8.aarch64.rpm 1e1517d1e465bf591351717f0c4edce0685390005bbbb9a039d1950581cec54a glibc-all-langpacks-2.28-164.el8.aarch64.rpm 9d8a7c1e185f01edd490f1cb36ac38806e22341d025596ac055887d679d72c53 glibc-common-2.28-164.el8.aarch64.rpm 836e181436d8c434fef413221cf9706c24b48c7a0625c7c1fb8b18fa524ef53c glibc-devel-2.28-164.el8.aarch64.rpm b39b9fb40f8fdea04b2808ec752b4bb2671b5ead8c759247fbf5ff33274fe84b glibc-headers-2.28-164.el8.aarch64.rpm 1c3f773b79fc6dfa3eb358627ca664a17aeea774058a0c1867867ac80075be74 glibc-langpack-aa-2.28-164.el8.aarch64.rpm 2d334036c620fe9a2fa223578dd0661c548af658d1f3da8829480c1bc6c63d96 glibc-langpack-af-2.28-164.el8.aarch64.rpm 3e2ed853afcf4db5107c9a6f314e74722ca2a3f764bc9b81b23ba10dae2a2c00 glibc-langpack-agr-2.28-164.el8.aarch64.rpm c5dd684b26adc07c418c12c1c3a5a9f39349cd1a9029741f458e6f9088506156 glibc-langpack-ak-2.28-164.el8.aarch64.rpm 3404c7c2d8b7375115257b18bcae7e2fe999fa93ff0ffd153a37217bdfa6cced glibc-langpack-am-2.28-164.el8.aarch64.rpm 3dc01b2fb8544f44d642237f016b83290f1f11d0f790e19ef0dea57ea292b673 glibc-langpack-an-2.28-164.el8.aarch64.rpm 9ba56d20d4c547d6667505b8ef63d90c8a85d28a55916b6cdb0a0d5033a4baf3 glibc-langpack-anp-2.28-164.el8.aarch64.rpm 1285aa24b9556bb1cf6404f67a924ee83726d44f495a7c7709ebaea980881153 glibc-langpack-ar-2.28-164.el8.aarch64.rpm 550ba6ed5b370ea4590cb43877b96d2d897abb3a3109927472c6e8252040a2ee glibc-langpack-as-2.28-164.el8.aarch64.rpm 151ca1c5e003467e3cfc54d6beea5b0b9b6147d3fc453111f83c94559fc0957b glibc-langpack-ast-2.28-164.el8.aarch64.rpm 3aad2dad9d462cde57b14d8bf69330c516bfa061d1cf4422f902f3e991e771a4 glibc-langpack-ayc-2.28-164.el8.aarch64.rpm d9c42052820b349a1afb2f6960b3621f23ac501cdf6655f87f64db7068ed1571 glibc-langpack-az-2.28-164.el8.aarch64.rpm 5e29366e8129c6911f55ee991b0235d3873f57807c079a9efbc8e96598c354fa glibc-langpack-be-2.28-164.el8.aarch64.rpm b7418871714fe3775884d1e32fd294f9f1e6295df8d5bdee93cfafd2628311d5 glibc-langpack-bem-2.28-164.el8.aarch64.rpm 275b82f12def41abd13ae9b29bdf3626374a79e4c883d137702d631b96d966df glibc-langpack-ber-2.28-164.el8.aarch64.rpm 76eded4370a0b4bd15dd2436a168b786561bad2801acadb8d3f5a705b785c1e0 glibc-langpack-bg-2.28-164.el8.aarch64.rpm b536e27a2392a4542140a8d2eba78dd757a23a1565f8e9315bd5259b813515da glibc-langpack-bhb-2.28-164.el8.aarch64.rpm 933d169365a45ca9628515b92825c80855c7ec63aeb0a6970ec81fba7f027a75 glibc-langpack-bho-2.28-164.el8.aarch64.rpm b49dbe07a28c5208f49775c90021480694b7390ef3f90fb253a8df8dce894992 glibc-langpack-bi-2.28-164.el8.aarch64.rpm 5d3a665aa33a2c434a42f03556e180351d7b9fe515bbc5dc9b86dd647d8b3dfb glibc-langpack-bn-2.28-164.el8.aarch64.rpm 5060ac6847889559df8f669c137b891348e7a5d6c82f72c9a4a4e38b704dcd64 glibc-langpack-bo-2.28-164.el8.aarch64.rpm a92cd8603e8552a4329e75e4c3aec659f758c5b15d729008d8187214705c2c2e glibc-langpack-br-2.28-164.el8.aarch64.rpm 5d2d598ee6ddabded04903a0e2cc3795742a5437d09597c0b4f541695f4a6936 glibc-langpack-brx-2.28-164.el8.aarch64.rpm fbcfc477147f5a20efe79d551ff0b900a9d96ba68fb83517097e2a168985fe77 glibc-langpack-bs-2.28-164.el8.aarch64.rpm 8bfd6bb206de97d73fd2e002b89dbcf5d53025bed63fdb7b9d17e85ed324a135 glibc-langpack-byn-2.28-164.el8.aarch64.rpm b24010632001a74c49e7575760edce7d461801c74ab447e1d863b45bb062f0f6 glibc-langpack-ca-2.28-164.el8.aarch64.rpm 47ca79994f6b13381bd4f6c9cea97857b82c4afc91cf54e201bb874ebb70eda0 glibc-langpack-ce-2.28-164.el8.aarch64.rpm 0eeb787f1752365834f73eb764bddacfe43c047d568a7f26cc70c3ed7a1ca4aa glibc-langpack-chr-2.28-164.el8.aarch64.rpm 261220a3cb7b589caa9f820f605b7e9f705e6f40d084485d17dd58aaefa9159e glibc-langpack-cmn-2.28-164.el8.aarch64.rpm 61e10052137cca24d35f8add421101589ac0b195cdacfa6e20c8266406a31fc3 glibc-langpack-crh-2.28-164.el8.aarch64.rpm 1fc16d1c7e684c2c297e49c5a3fd6d8acf94ea2f09d27dce9910af0d0a02e4d8 glibc-langpack-cs-2.28-164.el8.aarch64.rpm 70b0c1263d90c1d9e778b50abe6b547067e4a2c071a32efd7cec31f2aa31f6cf glibc-langpack-csb-2.28-164.el8.aarch64.rpm 12b96f4aa6ae34fe3d2d7ef754e337f8362bb53e370771cf27ccf83c12983bc4 glibc-langpack-cv-2.28-164.el8.aarch64.rpm 94342f6df20c9c065f39b85aed7f9dc6ef54f9d29ec9b7ae45dec2819841bb47 glibc-langpack-cy-2.28-164.el8.aarch64.rpm af2edb9ed3d542405b5525fb24ee95e2d8c5c7cab0003c6cfc08afb393492172 glibc-langpack-da-2.28-164.el8.aarch64.rpm bd8f6b0d34c84d177f1bc5995d1ec459f1a9d4f3a793ee3b21a98ee902d8ef6c glibc-langpack-de-2.28-164.el8.aarch64.rpm 70d700173a1b561a7c6a02f4957c74b377e01a3e8ce0407ef107c20b7a92aa00 glibc-langpack-doi-2.28-164.el8.aarch64.rpm 4680e81eab1f09ec767d00569983aa0837ed986f7d83471f7c6a43377141842b glibc-langpack-dsb-2.28-164.el8.aarch64.rpm 0c2a84070b4f889955577120f14bc7027a0a05f650f3d27097b3d700975646d5 glibc-langpack-dv-2.28-164.el8.aarch64.rpm 21c46c34ea40ad731e01a727b5c12a8c830f2577ab199ef2a4ae93fed002c16a glibc-langpack-dz-2.28-164.el8.aarch64.rpm 33f01a5ddcd1ebafaef63567ead8f42fa16c9400d99635ea2039df8c45fa4565 glibc-langpack-el-2.28-164.el8.aarch64.rpm 3dff8237a3d1ff18c7fb83ab3906bc10803b6f3ac7b3c809bae0bd24904d43dc glibc-langpack-en-2.28-164.el8.aarch64.rpm 0cb198c9e249fbd25bf22c47b090430a9dc5cfe85e63928cd38dd28f3c5b8fa9 glibc-langpack-eo-2.28-164.el8.aarch64.rpm 35555bbe63a634ab2dd58aeae811ee9f025f44889d4503c78930e0802c4235f2 glibc-langpack-es-2.28-164.el8.aarch64.rpm c2c38c323f21743008aea7f6169d1b5eba61167c1a9397b8990f5d9298d3123c glibc-langpack-et-2.28-164.el8.aarch64.rpm 0634a9def6862df963332540e633375ac6179ed83ea5181cecc87ea38e9d4069 glibc-langpack-eu-2.28-164.el8.aarch64.rpm 57a645dabdf3768768bf882d0539d5c114f79d2f81d659718eb1bd2212d69fd4 glibc-langpack-fa-2.28-164.el8.aarch64.rpm 0bedbf99898749531f021584443d85a93516f176ba63f10b7171efd609e041cd glibc-langpack-ff-2.28-164.el8.aarch64.rpm 9694b4fb3f6a844226deb5900675123b12598244486418c1407cf25e480e1b3f glibc-langpack-fi-2.28-164.el8.aarch64.rpm 15209e9b3fda192deb910aa1ff3928104c6b432041e6be8c403f062b5cd67a71 glibc-langpack-fil-2.28-164.el8.aarch64.rpm 0c278145442994bf00a830776be0a78b7cb6fe8766033c146c0c681f208c0e59 glibc-langpack-fo-2.28-164.el8.aarch64.rpm 1348f0890603e3c13f3251bd217b6bb4f171801863fac6cb38c9bf81011b99b7 glibc-langpack-fr-2.28-164.el8.aarch64.rpm ed504f7477dbdaa8f6c2c85ee305105bb0153b16427fae24ccd03c4635fa9290 glibc-langpack-fur-2.28-164.el8.aarch64.rpm fe6373a481965a0f7b850d788c3ce5c4f4a285ac1ca344a111384e26eac05119 glibc-langpack-fy-2.28-164.el8.aarch64.rpm a4236c6c21bdd83f9e8a2ef09f06fc584d1e5a830175c8ef953708cf43e8a015 glibc-langpack-ga-2.28-164.el8.aarch64.rpm 6cbff0191b2130d614c1f5ccb9c0b15ffc76da863884aefea34daa3581728b83 glibc-langpack-gd-2.28-164.el8.aarch64.rpm b6765608f7e79409c2d20c8219ef9b72a80568475a8bacf1bc0edbbf2427a14e glibc-langpack-gez-2.28-164.el8.aarch64.rpm 0af54d3c79d0041c1ca6f3f8f82cb39fe8f632504ba2398407eace7143721456 glibc-langpack-gl-2.28-164.el8.aarch64.rpm ca7fa45d30bcd70bac2cf201b4d1de1880a5462c78ad27950c603f48fd52795f glibc-langpack-gu-2.28-164.el8.aarch64.rpm a18098a775efbbedad7342ac2a6bb285c6ade43d135c791b8e7779d1568fef60 glibc-langpack-gv-2.28-164.el8.aarch64.rpm 532e1c08e1cb401f83822bb085d3f1172cd89d53f059078eebe7d25a4ef9a119 glibc-langpack-ha-2.28-164.el8.aarch64.rpm 5ace9b840eb0837907ff79e2a65fbf82670aee47c8cab0dda4c5e7260902c960 glibc-langpack-hak-2.28-164.el8.aarch64.rpm 7db9746b971c74174949e6e6c6c404c866592f7ecce9ee67b82b84072deef416 glibc-langpack-he-2.28-164.el8.aarch64.rpm 40e8f8c42a9126bd8f8b407811de3f7ccf01767d4363cee81c38fd21004f3f53 glibc-langpack-hi-2.28-164.el8.aarch64.rpm d5ca1f712bb4710ea76ff2c11f1b2abc195d2665374a20a6dd0c03ba798525d1 glibc-langpack-hif-2.28-164.el8.aarch64.rpm c52744b69aa2d8d9da2ec172861b31a1df167be1f4a24a69750f00f89fe00bd2 glibc-langpack-hne-2.28-164.el8.aarch64.rpm 24ef30ea57e95f826230884ee0934518cae5bec3961117fee295c1ead4fbf22a glibc-langpack-hr-2.28-164.el8.aarch64.rpm aaba694dc63973034a9da48166ae06104c7037e4266eca6d02c4ce5591348fb5 glibc-langpack-hsb-2.28-164.el8.aarch64.rpm 69188d677d90b557800f200e77be087ba1187794333c98b0c641179e9842a236 glibc-langpack-ht-2.28-164.el8.aarch64.rpm c583fe98536195ef57190c45eb3b04495ea047dc6ae9ef2eca6ba42e5a0103bc glibc-langpack-hu-2.28-164.el8.aarch64.rpm e080a3cfa1d584ea1a277f810953897fc6d50adcfe23d051927573cbfeb56ab7 glibc-langpack-hy-2.28-164.el8.aarch64.rpm ab07f483195af4467fc1b3e1960eaf4370ddee3f10728419b0aab09a4ae9d4d3 glibc-langpack-ia-2.28-164.el8.aarch64.rpm 8bf70d00a990c79180092a43fd19f624f7c7706fc4bdc88c5a179078d86550ed glibc-langpack-id-2.28-164.el8.aarch64.rpm ccc1a6074f177a846214b06f2de8901fc0a1fd5793e95f428698b4124d2c6ae9 glibc-langpack-ig-2.28-164.el8.aarch64.rpm 230d7f98b489c3e245f5229d86ce3a8e3a11eb04e0fb62f69bf0707d618c0ca9 glibc-langpack-ik-2.28-164.el8.aarch64.rpm 4b907234de9fa67363530a04e60b139b09f0023d7f419600f7eb2a576162cfe4 glibc-langpack-is-2.28-164.el8.aarch64.rpm bee9191706b6bab20b49faa42dd23dcc984bbed65ea92531ce6464c6edb1b09d glibc-langpack-it-2.28-164.el8.aarch64.rpm 3f347f8c1e848b68ceb87273db1408c8f1068b1795de5b8da0c4818bc17a7745 glibc-langpack-iu-2.28-164.el8.aarch64.rpm b29440ce4b42b508f0d189ca972b375da9e2f011cc4a11aef3057a382052a283 glibc-langpack-ja-2.28-164.el8.aarch64.rpm dac61526edebf1532a7e01d1082b58b11d0f1ff184be89f0af4e165ab8439659 glibc-langpack-ka-2.28-164.el8.aarch64.rpm 7720c047081f35d7a13285c26dc6c5ffc3fa0d2d84c1f4bf48f3cec33786abcb glibc-langpack-kab-2.28-164.el8.aarch64.rpm 1a6693830cddb8f8c81268def8c00b5225908ef0ecf8309e050a10d07647fafe glibc-langpack-kk-2.28-164.el8.aarch64.rpm fa9071e31ef7a62d0b8fb9eeaaa57bd6ed337260d9b5bf624391022cec5d8615 glibc-langpack-kl-2.28-164.el8.aarch64.rpm f992f663c83124f23ca812487a2b90a32aba40894bb0fba57b17c7b3a577e19b glibc-langpack-km-2.28-164.el8.aarch64.rpm 8857a8ac4931f6c8c4b64c51546a8738cf684b34a93348dbbd52b8a13fedea39 glibc-langpack-kn-2.28-164.el8.aarch64.rpm 39ec0fd9623d521b620b08b610374ec66530a0b1f46fe7bc4345cf1098603ee2 glibc-langpack-ko-2.28-164.el8.aarch64.rpm 22305b1c03fd02f556094e6f7162ec64c276359633b17ddf97e55489dcb258e5 glibc-langpack-kok-2.28-164.el8.aarch64.rpm dad6c3400969a061129a4e3886a3f4b007bca4830329d0f6bf0cc7cb7f8c7db2 glibc-langpack-ks-2.28-164.el8.aarch64.rpm 05e33a129bca580fa2c5301ae4e0b89ccdde3ac726e2a697862de6dfec686fdf glibc-langpack-ku-2.28-164.el8.aarch64.rpm 85cc106656a999cf3f8df222a485f4ec00b92bb5fb2d8ba0f76451e27ebd0616 glibc-langpack-kw-2.28-164.el8.aarch64.rpm cf05510f3729ef6aa35416f8baa0450f59f0114cba96d0fa9914f651188b347f glibc-langpack-ky-2.28-164.el8.aarch64.rpm 88ff23b9ba51093a40a3c87e7fe044a884ceca9507cfed81580f7d5d6ed1ad59 glibc-langpack-lb-2.28-164.el8.aarch64.rpm 2c64caa0705033c3e8f403e60c00396d6ae298e23a7060560a302fa15ae4b350 glibc-langpack-lg-2.28-164.el8.aarch64.rpm 54f4767ab1228755ab50ca9727551643a49b85a637504c4dfea436a7208925c4 glibc-langpack-li-2.28-164.el8.aarch64.rpm db30c8f2d5c36151880b8dd7fc4ee2297a30e6a59db5e7bf0542645cd7e16720 glibc-langpack-lij-2.28-164.el8.aarch64.rpm 53dc7bfeae0b085f8d822efd7269ea86146568b29d703fda97b40532ccdf7104 glibc-langpack-ln-2.28-164.el8.aarch64.rpm f91df9494c14235c407f7b50422460df1fda154d3bc2b84d1a452bdf97b6159a glibc-langpack-lo-2.28-164.el8.aarch64.rpm b1f8ea35c3f4a2d428bd4b2649c9cfa5de122cf8809840796c3ff967bb21e0f9 glibc-langpack-lt-2.28-164.el8.aarch64.rpm be983fc210f5183fa294d5ae77abfac2d33065eaa5bbb678acd325d371af85b9 glibc-langpack-lv-2.28-164.el8.aarch64.rpm 6ee76a3e04448e47e4aa9343ad265c1ffa46c272f403e3218998e66fbced5079 glibc-langpack-lzh-2.28-164.el8.aarch64.rpm 0ac6a4026c0e1e68dcf706994d4ac57b8ab51bda6ea87640a642ad85062d0c50 glibc-langpack-mag-2.28-164.el8.aarch64.rpm 1e465ed5a4aecbccd3c1d648dd9293b35cc1666237e57b8199543f3990472c1a glibc-langpack-mai-2.28-164.el8.aarch64.rpm d1fec6cb83b1c4200337107df372fb696386ea462bb880f2619cc778e41abd3f glibc-langpack-mfe-2.28-164.el8.aarch64.rpm 8b8cf53cd9c34a78f6a2a978f3a424751810add541d01beed8b33858879d4846 glibc-langpack-mg-2.28-164.el8.aarch64.rpm 5dd21411ef3e18d27091436d515bf994235cb5203a38523426bc709d39831f69 glibc-langpack-mhr-2.28-164.el8.aarch64.rpm 6dd255eaaccde8ea62cad527b380bf683829ce19355dbb349a8e3cadbec5e0d2 glibc-langpack-mi-2.28-164.el8.aarch64.rpm b567483e2e6cb9fa6092b6d953e3e1be16732279602bd4bf7cc9cd103eba5a01 glibc-langpack-miq-2.28-164.el8.aarch64.rpm 65e36459bc1b8b95da50571c903a4fc10e63871ab5506961a64a1ac7068c7dab glibc-langpack-mjw-2.28-164.el8.aarch64.rpm 48329e4ab4acd6ac9f40122f854ab52e88ff86feb13cc072daff07a956fa519d glibc-langpack-mk-2.28-164.el8.aarch64.rpm fc6d4da5e6aae9ac434d2cc9e0bf0dc2ee717d4b8c0c262d433378cb31a09c98 glibc-langpack-ml-2.28-164.el8.aarch64.rpm 02938a26917ceaa65e09a6ca8551179f003cdc5a1de978e45d213d3b5a2f62eb glibc-langpack-mn-2.28-164.el8.aarch64.rpm 906353161e6378ae071cf08171f24eb48c18c3bec4f3496afed7680b11b85317 glibc-langpack-mni-2.28-164.el8.aarch64.rpm 5149d45d75dde3fd9dc06842eb8befe79558d2d314a6f0f122f6501a5a723b06 glibc-langpack-mr-2.28-164.el8.aarch64.rpm ec3981b054ed7c6ff5fe8131dd6a056d3f4b41bbbcf052105e62ec4b7d1da7c3 glibc-langpack-ms-2.28-164.el8.aarch64.rpm a8e4d2d1a7e572108091df3296bc4ccbc28f2d567511af5fa59ec7a25763d73e glibc-langpack-mt-2.28-164.el8.aarch64.rpm 57fd455abc9082807b7531cf71df6a5ef74c466fc0884c3d4b11d52c24d7baa4 glibc-langpack-my-2.28-164.el8.aarch64.rpm 3e4703dbf05cefd083b06324a862b10cebce79c954137188e276d0efd4fe86e9 glibc-langpack-nan-2.28-164.el8.aarch64.rpm 2f24b1f16e395fc1f76a51984bd641dbd7ab21a9babdceb412c2e76d9bce74fc glibc-langpack-nb-2.28-164.el8.aarch64.rpm 3ed87c98b69e2c0761b0798664174ccf8aacaadc9d1ab116ff11660b7fd52234 glibc-langpack-nds-2.28-164.el8.aarch64.rpm 586c5a703635a5674e28ec523fe48a7eedbf5e98af286ae2a21c6c82816355ad glibc-langpack-ne-2.28-164.el8.aarch64.rpm ac4a0db552c4a50a341f73a51238e94169c59509c34169d9a83593855c12a36c glibc-langpack-nhn-2.28-164.el8.aarch64.rpm f0b7e1668216cc7e3a700142a60bb45f223e8cc8e0da1bd963e468a34161ab09 glibc-langpack-niu-2.28-164.el8.aarch64.rpm 26ff6466b7ba3c08fe36c1f5ac19d3bbc3e050733c0f7ce18bbdb3ba979470f2 glibc-langpack-nl-2.28-164.el8.aarch64.rpm fcbd37ca93cf0f713d3dea1a4eb20e91c23e6b99bcfab50936a1df03e3bddbc6 glibc-langpack-nn-2.28-164.el8.aarch64.rpm 87fa32f8410269a9e0f1ba0389a57aa368e59f59e0fd64a5d1f00f4fd925c0b0 glibc-langpack-nr-2.28-164.el8.aarch64.rpm d232796f6d050e2309261efbc510e05c78452fc3f569753527b2e5233c117c75 glibc-langpack-nso-2.28-164.el8.aarch64.rpm 91922d1f06414bd1e3c19aa16417c083187701b163d7ab344698240640616ae1 glibc-langpack-oc-2.28-164.el8.aarch64.rpm 7ae8fc5a44df6ee0769fa82e2d59685711ccd4e33aa4bb420e7ad8e0a4cdbfb1 glibc-langpack-om-2.28-164.el8.aarch64.rpm 2da09e8f7e7c2f8424f0d9fdb45fc9bc3b899f00e76c3bea59048805f424fb4a glibc-langpack-or-2.28-164.el8.aarch64.rpm 1e18a1513b32ddffaefa85003f1d8cc65bce1c61191cbb7e272c9f0c8a2f9fcd glibc-langpack-os-2.28-164.el8.aarch64.rpm e70d05ae33dc414633bc0585c52451f679b05050d243877c5f513d027ced9d5d glibc-langpack-pa-2.28-164.el8.aarch64.rpm a73c5f4be5c80e0346dcbc2887613346de1ee50b3adc76c99c4d00ddd142e5b5 glibc-langpack-pap-2.28-164.el8.aarch64.rpm 1421ba3eb50f4afc772699d6065d9f4146a161dbabb888bfece576f080139442 glibc-langpack-pl-2.28-164.el8.aarch64.rpm ff5e70f8eb4ce48c63876841fe189d9c4235fe545769c60df38a834dc9c1efdc glibc-langpack-ps-2.28-164.el8.aarch64.rpm da7dd80bd178c54693f89b55f3ff4d790dffbb4479df019cb01e15404ef5a0a0 glibc-langpack-pt-2.28-164.el8.aarch64.rpm bc2d5fa3eb91c261e6fee3a04d539c6c0ed99d5f633d5494a4397a49138c5e56 glibc-langpack-quz-2.28-164.el8.aarch64.rpm 54d943aa5bdf9979b7367970bb3e9e2e263daf75cbcceb998a98514db7acd658 glibc-langpack-raj-2.28-164.el8.aarch64.rpm 2022f1de73f064c4debf48c578c2ff329e482e8163f0971611be4988fb61e596 glibc-langpack-ro-2.28-164.el8.aarch64.rpm 0a1ca6d40ee5b73079c8d1c4ec6cbe7a64d95d19bad54bff9f6bacec8e2241de glibc-langpack-ru-2.28-164.el8.aarch64.rpm 73b6402aae61ed4d22202cfd57d4af85457ba72f611af0ec85fa6a0b7fe8a966 glibc-langpack-rw-2.28-164.el8.aarch64.rpm eb3b7ea8785f41afbfe8bf2b58859b7a2e0a03d20d3ad2a7a19360c4a41ff9f9 glibc-langpack-sa-2.28-164.el8.aarch64.rpm 404e71de36efb0fca8927c45f24c3e2d8e166326b362d09b921dde9114c8538e glibc-langpack-sah-2.28-164.el8.aarch64.rpm b72e5f4d2d473333144d8bee084d989f5b89cbaec8fbb23bfd400fccf9dd00fa glibc-langpack-sat-2.28-164.el8.aarch64.rpm 5943187c69794d2d1a8d421469d3da2891af8d0cc871daadc5c3f0699706a904 glibc-langpack-sc-2.28-164.el8.aarch64.rpm 2958123b3f708ddbf91f55679f72a7837afc5f3f858f35f309ae90aa5fd8c849 glibc-langpack-sd-2.28-164.el8.aarch64.rpm 01910101f0c4cb266b5ec8499527c41a4a23b5b9ef78ca5715f8d87677fa1471 glibc-langpack-se-2.28-164.el8.aarch64.rpm 1302cb1115fbd84a188fbb5863259c18ada0eb8f6a67b1535d695a198eb92ee9 glibc-langpack-sgs-2.28-164.el8.aarch64.rpm ebee8a0e3feaa9645fc7ec9145bf0737f0b215fb4034d6734d727aef49db7b4d glibc-langpack-shn-2.28-164.el8.aarch64.rpm 733a49dc37e791d7755298166b44aae4757e7ec7400d121fccc02df5a145f79d glibc-langpack-shs-2.28-164.el8.aarch64.rpm 8bbdbeba5a8387ad670fedff2129a942a7d887082cf1fe68c3ff664d22055c93 glibc-langpack-si-2.28-164.el8.aarch64.rpm f258eb10ace88672e1b5f0d7bcb5faef0103157a9083d16319d40b4e1abfae88 glibc-langpack-sid-2.28-164.el8.aarch64.rpm d0df83ccd156586aad69080d59dc38f71f1ca43da12b0c4cbb6fa09b9d738b71 glibc-langpack-sk-2.28-164.el8.aarch64.rpm 5b5d9265a07852d2d0a4b1d88248d4b861979cc5009ca721e88337d1512ff61e glibc-langpack-sl-2.28-164.el8.aarch64.rpm 3b33f72e016d78626e6648dff673de8b044b9a5d6318ddf3c70c92126c49cb23 glibc-langpack-sm-2.28-164.el8.aarch64.rpm f5b38bdb2eea0bdf46399a87e6815d8d2c320fa0cc0b8a9e87f163eb30fcb99e glibc-langpack-so-2.28-164.el8.aarch64.rpm 1b262327f2eb56190f3e2edef7a7eae3256cbd72daf7afb8b4723d3fd29693b5 glibc-langpack-sq-2.28-164.el8.aarch64.rpm 420a619dea358a7b1a3c481662809273183c65158389882efa51684785583c2c glibc-langpack-sr-2.28-164.el8.aarch64.rpm 5de8bc1aea90a70aebca0944c6b479f867d0ff348e12ea1dbb689dce063f13ac glibc-langpack-ss-2.28-164.el8.aarch64.rpm a487074e1e6dd4a38d1253c9167ee6ed060b6fc59815260f71fdfa24cc8ca361 glibc-langpack-st-2.28-164.el8.aarch64.rpm cbd6535a9295f848a3986dd755fd7052acfdf78cc83c7e7a29de3eaa287598c8 glibc-langpack-sv-2.28-164.el8.aarch64.rpm a81441859e2d82dbd0c2313d305e18c1931ff5f0dcfd75bb59a30b6abd17c46c glibc-langpack-sw-2.28-164.el8.aarch64.rpm 8e1a5142d65b18b135ab60cda44558be3d1cc0b4555be0c4bbfdc294331b4b85 glibc-langpack-szl-2.28-164.el8.aarch64.rpm dcd083942113bdfd0353867022b3ff6e902f13e542123bd02b35d764504827f2 glibc-langpack-ta-2.28-164.el8.aarch64.rpm 4347c1113b896b03609b095e67ec71f27bfd9f5e8807ba32d11c33e071ee31ea glibc-langpack-tcy-2.28-164.el8.aarch64.rpm 53cdf8e16b3820a70c92c3625178ad306af916780d8f432312c0e63981d169ce glibc-langpack-te-2.28-164.el8.aarch64.rpm ac651bb6dc467f84b8a032c3114f0e1a42d2c72d3d405df8119e19dcf588c9e8 glibc-langpack-tg-2.28-164.el8.aarch64.rpm 9a41b33392b2d18ea886970a422321727645c04ad457f9b87ffe823887a3bccf glibc-langpack-th-2.28-164.el8.aarch64.rpm 4087dce30db66f99a3d78040238d62e265d96c7039bf0870c1e865fd247a2746 glibc-langpack-the-2.28-164.el8.aarch64.rpm 091e1924e2539bdb17583ea9c889a8445f47b3ede8d0fdf44396977fa08f6a76 glibc-langpack-ti-2.28-164.el8.aarch64.rpm dc1a0a92dbf5e4d07a22a61fc02c9498d1214166fc88efe798f385eb2c4877ea glibc-langpack-tig-2.28-164.el8.aarch64.rpm b82986263241c7a0669bfb2fcd6ccae3ec363743ff4146b95c87ec3a54dfcd48 glibc-langpack-tk-2.28-164.el8.aarch64.rpm 13f8b16391f14dad8d3c3a2ac0dd587cef4d48c9debacfee2b4e9c82ec3e793e glibc-langpack-tl-2.28-164.el8.aarch64.rpm a9810041d7f4a9a94f924932bdd61872c32d5d8136eee54c1a7d42bf6d0da306 glibc-langpack-tn-2.28-164.el8.aarch64.rpm e41521d502876b6f48bba9b26caf5a9c6b33caff8aef0ecf5f373ca8d9875993 glibc-langpack-to-2.28-164.el8.aarch64.rpm 62df1506de4dc83e1bf71d689dfc66f74e71a7c77474caf1e1488c57599865a1 glibc-langpack-tpi-2.28-164.el8.aarch64.rpm 3985cd70a178a8d9f1110a0729ce870bb95029c16827e2907068d1c83c177f9f glibc-langpack-tr-2.28-164.el8.aarch64.rpm b93db8fe773a044146677335f0713b76e04df5621602a8ff1e4caa951ddd7372 glibc-langpack-ts-2.28-164.el8.aarch64.rpm 2d5bdfb27ec9a525572d5e31a1c90b5e2571a139066c452f2780946898483a0d glibc-langpack-tt-2.28-164.el8.aarch64.rpm 1ca0f1ec12487d24f22b10b066df74375e7e0ba0315ae29aa9841a2ff0a24965 glibc-langpack-ug-2.28-164.el8.aarch64.rpm 4f6c8e0e0f6e62618bf5724ffc3a448a1faaf3e31247fdcd86639790a8ca9b64 glibc-langpack-uk-2.28-164.el8.aarch64.rpm 3dee964c0840e7f4d624a8194d1d88599a9cf93cb527589a7224a1457329fdeb glibc-langpack-unm-2.28-164.el8.aarch64.rpm c90a4ae6a31d331830028633c3a1503ea7792008619555031f0f90a0704efcb9 glibc-langpack-ur-2.28-164.el8.aarch64.rpm 1bd0597f7be83b7e6f75523f292ec1f7aec8d8f71f7987f4bb439029058e3fb4 glibc-langpack-uz-2.28-164.el8.aarch64.rpm 018e5c048bd724f2d21166a382bd3dd007ad8a59e514f9f4f4fc23795e939f58 glibc-langpack-ve-2.28-164.el8.aarch64.rpm 91da8d123086db1311d0e3a0a45ccf1217bd3974b97824a5d200f080da2dafb3 glibc-langpack-vi-2.28-164.el8.aarch64.rpm cdb51c886469ac8c50620f82c3d56c1e41fcd1d0ccb9c5009f4efc01f9fb2e2c glibc-langpack-wa-2.28-164.el8.aarch64.rpm c06e4f18d73da25b5a811c5d981468e7a771a1b2c419e1da914d1189b30c17cf glibc-langpack-wae-2.28-164.el8.aarch64.rpm d4933c3199ec048e99349bbdb35057b82ef766bd1da90d0fdc2c00c1650a4b10 glibc-langpack-wal-2.28-164.el8.aarch64.rpm 29d433f6bb8f61ddeeae6972dbc8f14a3fbb00761eb9c2f9fb8b998155760de5 glibc-langpack-wo-2.28-164.el8.aarch64.rpm 2327f2f0a0b0a17cf502d84271e8dae9219573f0ecd9dbec5a57612a8b4534f9 glibc-langpack-xh-2.28-164.el8.aarch64.rpm 358805e6dcc38117b880f53f4e0427d5b19d717e4c1d63ba28f00e44bf7de569 glibc-langpack-yi-2.28-164.el8.aarch64.rpm 4811a121ea1235f66f27528944598d91764552c851a31f11cba6ceda35ee1293 glibc-langpack-yo-2.28-164.el8.aarch64.rpm 0ad4ed84b3fe87cab24338eb06113561c3c49652ff038b5bc5f8802cf31bfce1 glibc-langpack-yue-2.28-164.el8.aarch64.rpm 4a120283ebcc81b7800207039bee573032122a1da9c5d7e5f1aca206d3173d20 glibc-langpack-yuw-2.28-164.el8.aarch64.rpm fdc274ef64675ea7db859405abbc1549051362df0b2881c458fbc15445335367 glibc-langpack-zh-2.28-164.el8.aarch64.rpm 0ce35b26aab40f06f6ce5f0b3423e6d412aac084862888b2eb07a9e123e72dd7 glibc-langpack-zu-2.28-164.el8.aarch64.rpm 866dd38d72550db8ddae685c9c1234f513c88650a0761de186e8aec4e0d6c20f glibc-locale-source-2.28-164.el8.aarch64.rpm d5c75b83633dbdcdde11c1bd8af93e70d1ff1c085cbe2dbd83434fdaa9250d6b glibc-minimal-langpack-2.28-164.el8.aarch64.rpm ab6c1795e433c99214939bfd4f54a759199df1e1aab7029d029d0208dd016893 libnsl-2.28-164.el8.aarch64.rpm bb0d03254ed0dbb71b550859cc6a1c96c7ecd9b55f0a016d7677a88c7fa86866 nscd-2.28-164.el8.aarch64.rpm 762d5447b9fe3c42d24881b1586a84bb788efd69cfc186e155f2ec54830cda31 nss_db-2.28-164.el8.aarch64.rpm c599de9a7721bab2f377929943d05a0a300bf9f90c1872fa0be4050c3b52d700 RLBA-2021:4359 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.5.72-81.el8.aarch64.rpm a23b72ac694fdcb86ade7caabb195dc4040f65f39a77e2d436b09b746a2875e6 vdo-6.2.5.74-14.el8.aarch64.rpm 37dfd427d87d9f38f4b8087999cee26209bdc18de1aa0893f671fec2126e1f71 vdo-support-6.2.5.74-14.el8.aarch64.rpm 31cde20241528926e01c773f3dd68c10fd455ccdc90127e273c5e66e90deeac9 RLSA-2021:4374 Moderate: file security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format (ELF) binary files, system libraries, RPM packages, and different graphics formats. Security Fix(es): * file: heap-based buffer overflow in cdf_read_property_info in cdf.c (CVE-2019-18218) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms file-5.33-20.el8.aarch64.rpm 4bd1b2c2d177806b50d518e29a93aba80e6495e13ad56d75e9c732dd915e5fbb file-5.33-20.el8.aarch64.rpm 4bd1b2c2d177806b50d518e29a93aba80e6495e13ad56d75e9c732dd915e5fbb file-libs-5.33-20.el8.aarch64.rpm 0410bd49551475ac136277aabba3e0aa6336767018a280478ba513a91754b139 file-libs-5.33-20.el8.aarch64.rpm 0410bd49551475ac136277aabba3e0aa6336767018a280478ba513a91754b139 python3-magic-5.33-20.el8.noarch.rpm 57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333 python3-magic-5.33-20.el8.noarch.rpm 57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333 python3-magic-5.33-20.el8.noarch.rpm 57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333 python3-magic-5.33-20.el8.noarch.rpm 57ff09854617dbb0bc6f6f40cd5eee425e95f98240f9efb09c68545d8f16b333 RLBA-2021:4360 which bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for which. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms which-2.21-16.el8.aarch64.rpm 2c499c111f72016c70a1fdac6f57f12de0324dabaf0ac32ca7ebddb178cc8468 RLSA-2021:4361 Moderate: NetworkManager security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. The following packages have been upgraded to a later upstream version: NetworkManager (1.32.10). (BZ#1934465) Security Fix(es): * systemd: DHCP FORCERENEW authentication not implemented can cause a system running the DHCP client to have its network reconfigured (CVE-2020-13529) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms NetworkManager-1.32.10-4.el8.aarch64.rpm 4dbd46ad7dc155904091b70a0fc0ae39745d0e4dcd8fc8507d0b26ab16da98a7 NetworkManager-adsl-1.32.10-4.el8.aarch64.rpm adf7070aabf11b683a4b9f289784ae5a065bac82cc66fe752d4b5e16a2e311f6 NetworkManager-bluetooth-1.32.10-4.el8.aarch64.rpm befab81d176dfa46516c11a30cdd8f3c51d2eebb1b8806e32acc02ba1d65ddba NetworkManager-config-connectivity-redhat-1.32.10-4.el8.noarch.rpm 3235d0950e9226e93a54869448e0d206540246e6c13c547b1ed6aa45d305ee45 NetworkManager-config-connectivity-redhat-1.32.10-4.el8.noarch.rpm 3235d0950e9226e93a54869448e0d206540246e6c13c547b1ed6aa45d305ee45 NetworkManager-config-server-1.32.10-4.el8.noarch.rpm 03eea92d4979e1c791b84942aac2023cf7daba184fb6c9d5c6fcc2f590f7f8d0 NetworkManager-config-server-1.32.10-4.el8.noarch.rpm 03eea92d4979e1c791b84942aac2023cf7daba184fb6c9d5c6fcc2f590f7f8d0 NetworkManager-dispatcher-routing-rules-1.32.10-4.el8.noarch.rpm 5bb6c9aa7b7aa4b1d7fff9fd72c679038a56364a46713b14de797dd38da020a7 NetworkManager-dispatcher-routing-rules-1.32.10-4.el8.noarch.rpm 5bb6c9aa7b7aa4b1d7fff9fd72c679038a56364a46713b14de797dd38da020a7 NetworkManager-libnm-1.32.10-4.el8.aarch64.rpm 27e8b00bc5f9d73bb1447092fba79b6197d6f0b312270d671e4029f553ba36f7 NetworkManager-ovs-1.32.10-4.el8.aarch64.rpm 831be831e6a9d8eabf9194d3743335ccdef8a96541ecee9bc3edf49152ebbc2c NetworkManager-ppp-1.32.10-4.el8.aarch64.rpm 929173136e5e2f85d9feb86c36f7ea2dd07fe8b938124f5941d2090086a8e9a8 NetworkManager-team-1.32.10-4.el8.aarch64.rpm 0d4217ebde1e3d5fb0e59d990d157f7f1e3f7d62d1ff99da3d73d5c4e4466539 NetworkManager-tui-1.32.10-4.el8.aarch64.rpm 83a90aef70a3aea542e84824be67def3a5ade6b2b65174cecb1cc05d9cf9a60d NetworkManager-wifi-1.32.10-4.el8.aarch64.rpm 1d0b625494c6cfc72e374a34c4606343f3b18af98ef84748f27a581f251e0159 NetworkManager-wwan-1.32.10-4.el8.aarch64.rpm 7455c96a3b4b8331ebde8c9999b60cf9c8a5025c7db926838182afab1acf02e9 RLBA-2021:4362 ModemManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ModemManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ModemManager-1.10.8-4.el8.aarch64.rpm 41300684e4cec5badfb3a2d17af38ef219ba07ea483611a65491962e2c2260f0 ModemManager-glib-1.10.8-4.el8.aarch64.rpm 7c74136cc67cbee540d05c372379de035aeec967251eb7e6273ca621aa210805 RLSA-2021:4364 Moderate: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: Excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() (CVE-2021-3487) * binutils: Race window allows users to own arbitrary files (CVE-2021-20197) * binutils: Heap-based buffer overflow in bfd_getl_signed_32() in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section() in elf.c (CVE-2020-35448) * binutils: Heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (CVE-2021-20284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms binutils-2.30-108.el8.aarch64.rpm afb4273bb709c103a49de7839979e291eb70e274cdc2996ff260203149e24eb9 RLEA-2021:4366 libstoragemgmt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libstoragemgmt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libstoragemgmt-1.9.1-1.el8.aarch64.rpm 1aa0e7331c183f5a56e19e687243850ee958b9dc3c20995ea614588d5658af54 libstoragemgmt-arcconf-plugin-1.9.1-1.el8.noarch.rpm e3271a406cacdc48575b89c382884728cf6b6fb4868551653e291bc803412c26 libstoragemgmt-arcconf-plugin-1.9.1-1.el8.noarch.rpm e3271a406cacdc48575b89c382884728cf6b6fb4868551653e291bc803412c26 libstoragemgmt-hpsa-plugin-1.9.1-1.el8.noarch.rpm 10e5299c6eb6681dcabb332b6404df22dfec7a8c0fb012c1ef66979277047c3e libstoragemgmt-hpsa-plugin-1.9.1-1.el8.noarch.rpm 10e5299c6eb6681dcabb332b6404df22dfec7a8c0fb012c1ef66979277047c3e libstoragemgmt-local-plugin-1.9.1-1.el8.noarch.rpm f2b1fc6fffea6a5c4d1ec526edd29556c78578e260ed817968331c3ba3ed86fd libstoragemgmt-local-plugin-1.9.1-1.el8.noarch.rpm f2b1fc6fffea6a5c4d1ec526edd29556c78578e260ed817968331c3ba3ed86fd libstoragemgmt-megaraid-plugin-1.9.1-1.el8.noarch.rpm a93efef8d28c07c59cfea9af732b1075a7679ab9f0ddb7a682d555e53f70999b libstoragemgmt-megaraid-plugin-1.9.1-1.el8.noarch.rpm a93efef8d28c07c59cfea9af732b1075a7679ab9f0ddb7a682d555e53f70999b libstoragemgmt-smis-plugin-1.9.1-1.el8.noarch.rpm 17b037b18590c16c28da02491ad6183ddb38d9b7e5615e3c9b4452885692c8f5 libstoragemgmt-smis-plugin-1.9.1-1.el8.noarch.rpm 17b037b18590c16c28da02491ad6183ddb38d9b7e5615e3c9b4452885692c8f5 libstoragemgmt-udev-1.9.1-1.el8.aarch64.rpm ddf00eb6eb08af5e49ca977c0b7603872583120b258e0f99fe7f4b3de08adcd6 python3-libstoragemgmt-1.9.1-1.el8.aarch64.rpm de2b798b9044070d33756fb4f3cd67c9dbad521cbe63a021c9c6953ac5042ba3 RLBA-2021:4367 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms device-mapper-multipath-0.8.4-17.el8.aarch64.rpm 1379a2f44419e850a7375b47315e316b6d986e7f03a2cb1beed87dc46d4317f3 device-mapper-multipath-libs-0.8.4-17.el8.aarch64.rpm 89e592042a9515a849fbdd037022ef3b1acda2add3c1378569407b4587ddb63c kpartx-0.8.4-17.el8.aarch64.rpm 9a3575aee20b3da77f480576ad95e008dc9a139b2911b345b4cbe5b73e8a4f83 libdmmp-0.8.4-17.el8.aarch64.rpm 2aa669dcdb682bb3ccc013a7c353507783cf1914a91659c4aa86e3bc0d10eae2 RLSA-2021:4368 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Observable discrepancy leading to an information leak in the algorithm negotiation (CVE-2020-14145) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms openssh-8.0p1-10.el8.aarch64.rpm 432a364b979412170a060aa70efb4887e0bac192bf3fd5e2ee5ef01df4891843 openssh-cavs-8.0p1-10.el8.aarch64.rpm bbeef6e46cb5b9cb35cd75afa7d22e67ec70e0f17075afa2b0892b1cb6b4cb23 openssh-clients-8.0p1-10.el8.aarch64.rpm 6318f36e004c9eb3fdbe291a9f1248a146ffcd9b91f8937e9242da513c22f562 openssh-keycat-8.0p1-10.el8.aarch64.rpm 3f437aee238342332f071cd074fd45519106a78a699ce1b4f8a821b2cdbf3a8c openssh-ldap-8.0p1-10.el8.aarch64.rpm b4f369006814bfb9308b63fe1dd6d1cd3c374f002833879800d656bd8341551f openssh-server-8.0p1-10.el8.aarch64.rpm ec9059a4aa80ad550321921ae936af2d318d57b6b0126101430b59b26510ceea pam_ssh_agent_auth-0.10.3-7.10.el8.aarch64.rpm bf6263299d14f0349585a40e4c71919db4cd04d1b2b3c78c037ae0530e655308 RLBA-2021:4370 virt-what bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-what. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms virt-what-1.18-12.el8.aarch64.rpm 97339171bd2ca083360fac1384963d1bba87cafa420fcb80f938d20131b268b1 RLBA-2021:4372 autofs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms autofs-5.1.4-74.el8.aarch64.rpm 9fc0d1b9589f243834d08818d2e9ef0c0506855b8536d52a43a1a93d48b65704 RLBA-2021:4375 libtirpc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libtirpc-1.1.4-5.el8.aarch64.rpm e0a72fed83ca60990425702414dba23d113dabca3deb4286f2036ce6da9e7b5d libtirpc-devel-1.1.4-5.el8.aarch64.rpm 7593a2a4d5f2beb69bca61617a9601b909dbe7aeea724ad133859d1f02c8df11 RLBA-2021:4376 dmidecode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms dmidecode-3.2-10.el8.aarch64.rpm 8c021d998561d946e6b950b06ff8f0f136564da6573c9a65666e0bac0a100418 RLBA-2021:4378 krb5 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms krb5-devel-1.18.2-14.el8.aarch64.rpm 672d6382af281382c0dec856597ada85bea4ebf902045c0365a35fe3b04b2722 krb5-devel-1.18.2-14.el8.aarch64.rpm 672d6382af281382c0dec856597ada85bea4ebf902045c0365a35fe3b04b2722 krb5-libs-1.18.2-14.el8.aarch64.rpm 6fe056fdc89c779ebf3469960fc11bc5f75865e7a430eb1367e876bf7f1bfdf1 krb5-libs-1.18.2-14.el8.aarch64.rpm 6fe056fdc89c779ebf3469960fc11bc5f75865e7a430eb1367e876bf7f1bfdf1 krb5-pkinit-1.18.2-14.el8.aarch64.rpm 77c9719c8096f71e8b4f14f21bfcf81a829d9566aede20c4122647ffdedaebec krb5-pkinit-1.18.2-14.el8.aarch64.rpm 77c9719c8096f71e8b4f14f21bfcf81a829d9566aede20c4122647ffdedaebec krb5-server-1.18.2-14.el8.aarch64.rpm 32e82b465e996dc977e9381da1dbe5deb097b3d81ddba20903bcd66c76524e76 krb5-server-1.18.2-14.el8.aarch64.rpm 32e82b465e996dc977e9381da1dbe5deb097b3d81ddba20903bcd66c76524e76 krb5-server-ldap-1.18.2-14.el8.aarch64.rpm bf9a24bd0ebfadeaad05b4ab7d3502d92f7a83086d60326ddd0f8ea26ea8a6c8 krb5-server-ldap-1.18.2-14.el8.aarch64.rpm bf9a24bd0ebfadeaad05b4ab7d3502d92f7a83086d60326ddd0f8ea26ea8a6c8 krb5-workstation-1.18.2-14.el8.aarch64.rpm e58ea666642ba3adcce679ce77354f8c86d64c320e55ee1cab275706edf9574a krb5-workstation-1.18.2-14.el8.aarch64.rpm e58ea666642ba3adcce679ce77354f8c86d64c320e55ee1cab275706edf9574a libkadm5-1.18.2-14.el8.aarch64.rpm 81a20ee2186d834ad3d833d69be6182260cf7f8e14132626ee81583ef1c0b52b libkadm5-1.18.2-14.el8.aarch64.rpm 81a20ee2186d834ad3d833d69be6182260cf7f8e14132626ee81583ef1c0b52b RLBA-2021:4380 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms cockpit-251.1-1.el8.aarch64.rpm 66c000e90ae2bbe69191be6883394284129ae3afe40c824fa900084ace66ab6b cockpit-bridge-251.1-1.el8.aarch64.rpm ad5fa474f3dbcf39a3daf8a093b1f6413d529dce3386bff963d4f36be7534ed0 cockpit-doc-251.1-1.el8.noarch.rpm d93fd922e67b4d2d59742e032d24e30456f05fc49d4c7fae63e25f86c76c8018 cockpit-doc-251.1-1.el8.noarch.rpm d93fd922e67b4d2d59742e032d24e30456f05fc49d4c7fae63e25f86c76c8018 cockpit-system-251.1-1.el8.noarch.rpm 72727001f09b6123e89a69567256f5b38c6d3c0b39d896de4854196c0fbcad7f cockpit-system-251.1-1.el8.noarch.rpm 72727001f09b6123e89a69567256f5b38c6d3c0b39d896de4854196c0fbcad7f cockpit-ws-251.1-1.el8.aarch64.rpm 05b2408252a97af75bd438e09c6464f3cdb85e70340624f29c6b9f89886ab591 RLSA-2021:4384 Moderate: bind security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms bind-export-devel-9.11.26-6.el8.aarch64.rpm ba7e635dad9e7fc18f86984660070bdba2ea6028150e16b200c728574d05756b bind-export-libs-9.11.26-6.el8.aarch64.rpm f5e6d7992d2aae2fd53b6fd5d73aaa479541aa98d59a373435084c56ac5cafa2 RLSA-2021:4385 Moderate: glib2 security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib2: Possible privilege escalation thourgh pkexec and aliases (CVE-2021-3800) * glib: g_file_replace() with G_FILE_CREATE_REPLACE_DESTINATION creates empty target for dangling symlink (CVE-2021-28153) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms glib2-2.56.4-156.el8.aarch64.rpm 67c2024cfc15b7c475f6c16903d0e764910746926cb011908d072f85738e6b40 glib2-devel-2.56.4-156.el8.aarch64.rpm 1f80ef05c1d8befeae1adba7ad49b868ef8e2d8066f825d0d8c0f5129ac184bb glib2-fam-2.56.4-156.el8.aarch64.rpm 3dde9560df17ae49268ae0055c82f20e745d50b9bf34a5c3620ad62563d4c7f3 glib2-tests-2.56.4-156.el8.aarch64.rpm 23607c8d6452cedcb8cd162a8a6199033b6eb9d166d9d8194d79bb486c62626d RLSA-2021:4386 Low: gcc security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * libiberty: Integer overflow in demangle_template() function (CVE-2018-20673) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libasan-8.5.0-3.el8.aarch64.rpm 176401a2fbaae10f4ca1fffdedd95c28e65f1119b3b1568dab0b88adaedc7d22 libatomic-8.5.0-3.el8.aarch64.rpm d34bffa054c6be4d0d0affbaafafd0bb4129a4c476fef3534c3d4be5a985ad37 libatomic-static-8.5.0-3.el8.aarch64.rpm ea7c870ba4b15759f6cccea719b33216e0cd6ea19db3ba667e536c5d87f70eec libgcc-8.5.0-3.el8.aarch64.rpm c5f2c3fe1c707b48cd02014a4efd711b56f114243972123dce4ebc8d7b29b51b libgfortran-8.5.0-3.el8.aarch64.rpm 3301926f3693e0064465be8bd12f0366f6207f27902611a29671707bdc87b8d5 libgomp-8.5.0-3.el8.aarch64.rpm a2c8b122d9477fce1860fb0bcde9abbc7cae63cd4ce2fbdb32d487e8dd80048b libitm-8.5.0-3.el8.aarch64.rpm 0485af00a602cca206558a74732d36641f2c9892157bebe9cae179af3a69fe65 liblsan-8.5.0-3.el8.aarch64.rpm a5cbb1bd97307d133cb9ffd0ce1f8ff2f976067fb3dc475fedc419f393355705 libstdc++-8.5.0-3.el8.aarch64.rpm 625aad54b787f54276b7c6b78627307d06f35143df823591d4df6b7020a8a485 libtsan-8.5.0-3.el8.aarch64.rpm 9c011998482ca4c77bfad27bfa799e0c1891c52e4551d3d10446a972cc9ade94 libubsan-8.5.0-3.el8.aarch64.rpm 6290b0b622a1178e24196ee0025e44f399935e33814d04787285f0236b02ea88 RLSA-2021:4387 Low: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference in sftpserver.c if ssh_buffer_new returns NULL (CVE-2020-16135) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libssh-0.9.4-3.el8.aarch64.rpm dd44040efeda877b4d2f3365219cd275df527f0ec2005841d61564540559d7c7 libssh-config-0.9.4-3.el8.noarch.rpm cd9235af7f4e353b4a946975b1fa6c30c1e3952d6ba2744cda79a65f0b4c3572 libssh-config-0.9.4-3.el8.noarch.rpm cd9235af7f4e353b4a946975b1fa6c30c1e3952d6ba2744cda79a65f0b4c3572 RLEA-2021:4388 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms sos-4.1-5.el8.noarch.rpm 75b87368bf8358ad9533925ba5e3c02c3537cb33e82d898126fb964d755e27fe sos-4.1-5.el8.noarch.rpm 75b87368bf8358ad9533925ba5e3c02c3537cb33e82d898126fb964d755e27fe sos-audit-4.1-5.el8.noarch.rpm 3fed5a9c176bd2803cf61635834e05a8aebda183018f02d982a1f6bfa0c4642f sos-audit-4.1-5.el8.noarch.rpm 3fed5a9c176bd2803cf61635834e05a8aebda183018f02d982a1f6bfa0c4642f RLBA-2021:4390 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.21-3.el8.aarch64.rpm 840747af5563615048f0cf39709bd2d950d2371c6598e871d6cd61390f789ea6 python3-cloud-what-1.28.21-3.el8.aarch64.rpm 8cb4b6b96f3bd8e69ad7625b24ce23a0fdb50c05197c43670a3623851022a563 python3-subscription-manager-rhsm-1.28.21-3.el8.aarch64.rpm a3f49740eba4020d410ba3cab84267108edacdb4be87e8d7716c62fc10fb0bf3 python3-syspurpose-1.28.21-3.el8.aarch64.rpm 69eb51449e4149c5187c06793dcef6835ebc181e55bda3816a83a2c71d8c56f8 rhsm-icons-1.28.21-3.el8.noarch.rpm 0120420e10f5aad6b27f3c729b5602db159869bc3b343f8e491fc45343502ed3 rhsm-icons-1.28.21-3.el8.noarch.rpm 0120420e10f5aad6b27f3c729b5602db159869bc3b343f8e491fc45343502ed3 subscription-manager-1.28.21-3.el8.aarch64.rpm da510eb1deb1b1ba2b13a29614dedefafca7e3dd647d359d6b51555f7581c793 subscription-manager-cockpit-1.28.21-3.el8.noarch.rpm b9a0654b9848cc3190b9d81aacbc69d23f811324839829ce30ba58bea4c5fe8e subscription-manager-cockpit-1.28.21-3.el8.noarch.rpm b9a0654b9848cc3190b9d81aacbc69d23f811324839829ce30ba58bea4c5fe8e subscription-manager-plugin-ostree-1.28.21-3.el8.aarch64.rpm 1362e479e250c6c64951aadc39b72d21c5737b963b2aa89e247884c8a722a6ae subscription-manager-rhsm-certificates-1.28.21-3.el8.aarch64.rpm 1459372d96cb45bc84111cad2c583fd6895545e6268ba74b2c81ab59816feff2 RLBA-2021:4391 kmod bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms kmod-25-18.el8.aarch64.rpm 417aac9f3e8aca6cdff60df03a41d2e6d85f9d460d90df595b33dd1f1ebde791 kmod-libs-25-18.el8.aarch64.rpm 6893448030db2696c7f9e3972bccf59a55eab46506862c31d4d014763d8f249e RLSA-2021:4393 Moderate: cups security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: access to uninitialized buffer in ipp.c (CVE-2020-10001) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms cups-libs-2.2.6-40.el8.aarch64.rpm 299172f5cb0d5a61ab8b50a968567eaa48f58a513ae8381bf0bd3c63be0fa00a RLBA-2021:4394 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms dracut-049-191.git20210920.el8.aarch64.rpm 885156a8014bcdf7127cc7d0a7ab92b1ae7d05c4b44880995b730cae18bae91d dracut-caps-049-191.git20210920.el8.aarch64.rpm c4960c96d0554fec72defe465654a527e11054447c267714311775bcd21b9348 dracut-config-generic-049-191.git20210920.el8.aarch64.rpm 2e6233b10cd59d20de04c4d0da4d55d4f9429dc47b11e22411f511481ca295ad dracut-config-rescue-049-191.git20210920.el8.aarch64.rpm e6e40c15cac828fb9d06ddc7797f68caafd4cbeaf745e68fc63f02a5c4c83916 dracut-live-049-191.git20210920.el8.aarch64.rpm 1f01a624386d8977cf1736939ac943213f7b51b33ef99d8297d362ea6581bb29 dracut-network-049-191.git20210920.el8.aarch64.rpm e37505d7ccf710a8d783f69fe5e9d2f8dc6bbf556ca347082cd8e4484ae08547 dracut-squash-049-191.git20210920.el8.aarch64.rpm 829bccf0c0a632f9b9c13cbe001905678596a016b42894ad8348b05199763945 dracut-tools-049-191.git20210920.el8.aarch64.rpm 9c3d458991e67531d18ddf33c9d04a05ecaf4147a819850ce1353485bbb43630 RLBA-2021:4395 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms pam-1.3.1-15.el8.aarch64.rpm d0fc12668f57e02e01fddd1c5a1e4cb5b01fc5a45adc70b62ad469ea2a0b7ad7 pam-devel-1.3.1-15.el8.aarch64.rpm c32096f35189aa43ef093c62775e120be1eb0d4bce2d3d3b6bba8def9ae6779e RLSA-2021:4396 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: out-of-bounds access due to the use of 32-bit memory allocator interfaces (CVE-2019-5827) * sqlite: dropping of shadow tables not restricted in defensive mode (CVE-2019-13750) * sqlite: fts3: improve detection of corrupted records (CVE-2019-13751) * sqlite: mishandling of certain SELECT statements with non-existent VIEW can lead to DoS (CVE-2019-19603) * sqlite: NULL pointer dereference in sqlite3ExprCodeTarget() (CVE-2020-13435) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms sqlite-3.26.0-15.el8.aarch64.rpm 0519829e1492c656e02d6cb412797eebab39a9f1b0efa0d9fcf39a5776b5568e sqlite-3.26.0-15.el8.aarch64.rpm 0519829e1492c656e02d6cb412797eebab39a9f1b0efa0d9fcf39a5776b5568e sqlite-devel-3.26.0-15.el8.aarch64.rpm efe7c06556a115fd14e963100fef86d2ac797fe568bdaec7bffee8fb72e7a365 sqlite-devel-3.26.0-15.el8.aarch64.rpm efe7c06556a115fd14e963100fef86d2ac797fe568bdaec7bffee8fb72e7a365 sqlite-doc-3.26.0-15.el8.noarch.rpm 45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367 sqlite-doc-3.26.0-15.el8.noarch.rpm 45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367 sqlite-doc-3.26.0-15.el8.noarch.rpm 45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367 sqlite-doc-3.26.0-15.el8.noarch.rpm 45a518871657f95edb057e2acf0b38992a5bbfb2f8c9c7393d60fb2c7d157367 sqlite-libs-3.26.0-15.el8.aarch64.rpm adcf21b37d5c6dcc259db02cad844c20991db31b5391c7b89f5e0e6b661831eb sqlite-libs-3.26.0-15.el8.aarch64.rpm adcf21b37d5c6dcc259db02cad844c20991db31b5391c7b89f5e0e6b661831eb RLBA-2021:4400 nvme-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms nvme-cli-1.14-3.el8.aarch64.rpm 1f53cf279dd08cc890b725d06791603fcb58f7006af5232e722469fb7f866f69 RLBA-2021:4403 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libnfsidmap-2.3.3-46.el8.aarch64.rpm 127ffaf840de9ebcc6b4eea826cd39cdee8bc1f2eeaf6fa55767cf177df1f78e nfs-utils-2.3.3-46.el8.aarch64.rpm b199bc2442ca2e9b305c093685261e48007a46504a97728e3084a40bb90b3f90 RLSA-2021:4404 Low: kexec-tools security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Security Fix(es): * kexec-tools: incorrect permissions on kdump dmesg file (CVE-2021-20269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.20-57.el8.aarch64.rpm 14a04fe080d3830750964a628165237a9e83b965e953e5ad0a2419a976a87b5a RLBA-2021:4407 libcomps bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcomps. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libcomps-0.1.16-2.el8.aarch64.rpm a3bb2052a56701c3e15b53b7cafaf5cfdced9f8a7d38b94137cc89643850bbb1 python3-libcomps-0.1.16-2.el8.aarch64.rpm a859dbf4522520959f00d928067681323a6a03237009ef25a35bad572f8a831b RLSA-2021:4408 Low: libsolv security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsolv packages provide a library for resolving package dependencies using a satisfiability algorithm. Security Fix(es): * libsolv: heap-based buffer overflow in testcase_read() in src/testcase.c (CVE-2021-3200) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libsolv-0.7.19-1.el8.aarch64.rpm 538f0e3b5cf93f5e76159d2c4a5239c81e7098ccb0e0541ce3ce6c5b4795f1f5 python3-solv-0.7.19-1.el8.aarch64.rpm b695f2ec4008281fd07c61f8fe7ea30b1ff1f072a6f31ccd55c8fc667a73c17e RLSA-2021:4409 Moderate: libgcrypt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libgcrypt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libgcrypt library provides general-purpose implementations of various cryptographic algorithms. Security Fix(es): * libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm (CVE-2021-33560) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libgcrypt-1.8.5-6.el8.aarch64.rpm eabcc52d4ab43f5b381743b59bfa2d464f8ac23faaab8314402430e83a4dd519 libgcrypt-1.8.5-6.el8.aarch64.rpm eabcc52d4ab43f5b381743b59bfa2d464f8ac23faaab8314402430e83a4dd519 libgcrypt-devel-1.8.5-6.el8.aarch64.rpm bf1f2e2e6846c09d941272e02a0e20b4554a10158c0e86d797675876646ae20e libgcrypt-devel-1.8.5-6.el8.aarch64.rpm bf1f2e2e6846c09d941272e02a0e20b4554a10158c0e86d797675876646ae20e RLBA-2021:4417 shadow-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms shadow-utils-4.6-14.el8.aarch64.rpm bd917d7ff93c70c2993bc82cf8fdf19dd547e9c0211dd2e068e343f892a2007b RLBA-2021:4418 coreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for coreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms coreutils-8.30-12.el8.aarch64.rpm faf0b92f5966f30683ffba3718df7a91633230ba0917bada6231b9a301879416 coreutils-8.30-12.el8.aarch64.rpm faf0b92f5966f30683ffba3718df7a91633230ba0917bada6231b9a301879416 coreutils-common-8.30-12.el8.aarch64.rpm 0bfa092ff9672e99a8cab67063019c48484a3511d023157cf16402698f4db0c6 coreutils-common-8.30-12.el8.aarch64.rpm 0bfa092ff9672e99a8cab67063019c48484a3511d023157cf16402698f4db0c6 coreutils-single-8.30-12.el8.aarch64.rpm a32069cab771338ca1c9b252a6a504724de786e690bea90f81aa679a68be94b3 coreutils-single-8.30-12.el8.aarch64.rpm a32069cab771338ca1c9b252a6a504724de786e690bea90f81aa679a68be94b3 RLBA-2021:4419 ksc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ksc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ksc-1.8-3.el8.noarch.rpm f108de2bb73856b1afd45aaea2a8cd6ae6bf546d402850b32926cc31aa6d9693 ksc-1.8-3.el8.noarch.rpm f108de2bb73856b1afd45aaea2a8cd6ae6bf546d402850b32926cc31aa6d9693 RLBA-2021:4420 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms selinux-policy-3.14.3-80.el8.noarch.rpm 547ec26d89be9c6a702d6e4b914fa28b39553f8ee601add3762c49ce9e996f0b selinux-policy-3.14.3-80.el8.noarch.rpm 547ec26d89be9c6a702d6e4b914fa28b39553f8ee601add3762c49ce9e996f0b selinux-policy-devel-3.14.3-80.el8.noarch.rpm 638fc43e33f395c9b25eaf88df4bffbc8d21fa1c461ad19ff49cc16a51e5c0ff selinux-policy-devel-3.14.3-80.el8.noarch.rpm 638fc43e33f395c9b25eaf88df4bffbc8d21fa1c461ad19ff49cc16a51e5c0ff selinux-policy-doc-3.14.3-80.el8.noarch.rpm 6415e3c9d89436beccd9574068630d5d21674b0ccf337f44e0786b74d230546f selinux-policy-doc-3.14.3-80.el8.noarch.rpm 6415e3c9d89436beccd9574068630d5d21674b0ccf337f44e0786b74d230546f selinux-policy-minimum-3.14.3-80.el8.noarch.rpm 1bde56aabf07fae8f744af576d886237826f388770dc2dceee1e674c727355f7 selinux-policy-minimum-3.14.3-80.el8.noarch.rpm 1bde56aabf07fae8f744af576d886237826f388770dc2dceee1e674c727355f7 selinux-policy-mls-3.14.3-80.el8.noarch.rpm 08da9f120351b57ea120627f298e2be4077528e573e5cdf530fab88223d08d4b selinux-policy-mls-3.14.3-80.el8.noarch.rpm 08da9f120351b57ea120627f298e2be4077528e573e5cdf530fab88223d08d4b selinux-policy-sandbox-3.14.3-80.el8.noarch.rpm 5211832eebaf13bfa469c734290b03237ef5d6f68730ea9824a60133476257d1 selinux-policy-sandbox-3.14.3-80.el8.noarch.rpm 5211832eebaf13bfa469c734290b03237ef5d6f68730ea9824a60133476257d1 selinux-policy-targeted-3.14.3-80.el8.noarch.rpm 163854ab6f21525bedfdbca215df754c18f74d1076c9613e0e5f73f5aedafe56 selinux-policy-targeted-3.14.3-80.el8.noarch.rpm 163854ab6f21525bedfdbca215df754c18f74d1076c9613e0e5f73f5aedafe56 RLBA-2021:4422 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms sanlock-lib-3.8.4-1.el8.aarch64.rpm ad496120aec4a25185d69dca8922d1bc6ce4744230a7f798466e7521402a9ca5 RLSA-2021:4424 Moderate: openssl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: integer overflow in CipherUpdate (CVE-2021-23840) * openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms openssl-1.1.1k-4.el8.aarch64.rpm 2d77c302a5725ebae5beabdd0bb1df3e07acbee80b11037f93dfa094b7d4bb92 openssl-devel-1.1.1k-4.el8.aarch64.rpm 339453f011a2c7c2eab982f5439ab40a2ff3fab39a296e5ad13992aaa405c773 openssl-libs-1.1.1k-4.el8.aarch64.rpm b550a4052b15ce23e9cb5749dbdedd406f925d1a5ba9ce2476a358e110da8c36 openssl-perl-1.1.1k-4.el8.aarch64.rpm d85874f743884dd4aaa046b59250f5079d00a4408f767397d3e1aed235db76a2 RLEA-2021:4425 ethtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ethtool-5.8-7.el8.aarch64.rpm 54ee12c46af69fa8522e31e20c7b5d459a838c48fffd1d836f4ae8668bf587e5 RLBA-2021:4427 rng-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms rng-tools-6.13-1.git.d207e0b6.el8.aarch64.rpm 37c302bbdb82dd28971f8eaa5f3e8de1e4a1ce8b2086fd86bcbdab65459d768c RLBA-2021:4428 polkit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms polkit-0.115-12.el8.aarch64.rpm 50f07512b8ee4f549bee1098a7231eecc662d971a1d35b059557d517d5d446de polkit-devel-0.115-12.el8.aarch64.rpm 37fba856e87779a2677250997ac14a612619620b9abb8b144a1492168c8d9cb9 polkit-docs-0.115-12.el8.noarch.rpm 2736648f4527ee836671b191a22c56e10cfbd2415a16f28dc93f42ab84038d33 polkit-docs-0.115-12.el8.noarch.rpm 2736648f4527ee836671b191a22c56e10cfbd2415a16f28dc93f42ab84038d33 polkit-libs-0.115-12.el8.aarch64.rpm afa6064dc6681e7d5f94e16815e088ce4d1a4006c5db2c40ab5b41aa6f21cdb3 RLBA-2021:4429 librepo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms librepo-1.14.0-2.el8.aarch64.rpm 02e861220338775a19c2f9f72ebc5b9106160391b23a91554fd37e63602e17c7 python3-librepo-1.14.0-2.el8.aarch64.rpm 0c4dbf413f280b4a5eae3ad28da16992698cbbf5ed89fef6c0bb155648fd2fb0 RLBA-2021:4430 realmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms realmd-0.16.3-23.el8.aarch64.rpm 27bcad5650b2271089d31a4678c1eb356496fb9a8d85d3b6b1aed6801baaca2b RLBA-2021:4431 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.177-10.el8.aarch64.rpm f9fabdb837f76fd50f3e698ab7a18b5fa19966d9f71ff9b2bc08a0b0caf6efbc device-mapper-event-1.02.177-10.el8.aarch64.rpm 9ce0139c6a5747a15b09f515c230f32943876780f24098786dbe963767630417 device-mapper-event-libs-1.02.177-10.el8.aarch64.rpm d1a20733660eba4141b1997038ccb68b3c9c306565457af5af6e076c2bbdc182 device-mapper-libs-1.02.177-10.el8.aarch64.rpm 4ec8da2807e356a1f07b0a519d4a2c2cdbe8d695297d6eeb3f670bc00b1d3a95 lvm2-2.03.12-10.el8.aarch64.rpm 85dd4a5a425a5318556423bba3ed4346350f5cf2b52fe3c2b33f2c3e7f8ecf86 lvm2-dbusd-2.03.12-10.el8.noarch.rpm 77f693f0fe3b9c8edd44451145d43acae524422283cb60978584f79d74387f9f lvm2-dbusd-2.03.12-10.el8.noarch.rpm 77f693f0fe3b9c8edd44451145d43acae524422283cb60978584f79d74387f9f lvm2-libs-2.03.12-10.el8.aarch64.rpm 4de604a88bc9585e7000d04a4ea276e6c880af1d8215e7f024e5e7cc146f0cfc lvm2-lockd-2.03.12-10.el8.aarch64.rpm 2a33deb1ebf4746585294bef899b09969de3a96e96a150110e685301a0e76033 RLBA-2021:4433 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms elfutils-0.185-1.el8.aarch64.rpm c56a3baec7add2a92fc32957b9dc139f85c37e4f3d1f3df222139b2f8949b16a elfutils-debuginfod-0.185-1.el8.aarch64.rpm 4e87a80ac1116d505af8191503b70f4b7d4365591fb541a22392b7e3b00f15f5 elfutils-debuginfod-client-0.185-1.el8.aarch64.rpm 2c071cde1ff1c8213215eb50343827efdd6aad26e567f794d97c0a77cfba7dcb elfutils-debuginfod-client-devel-0.185-1.el8.aarch64.rpm 4e515eb148a34bedfe84f3ebeebbe5c2a0210f0d908ce00c0c60cf32d65fe2ef elfutils-default-yama-scope-0.185-1.el8.noarch.rpm 494cb9c9a0cbb041e9e61a4d87ef568ceec24b3e8daae391015ebb976922fd91 elfutils-default-yama-scope-0.185-1.el8.noarch.rpm 494cb9c9a0cbb041e9e61a4d87ef568ceec24b3e8daae391015ebb976922fd91 elfutils-devel-0.185-1.el8.aarch64.rpm 5d792bc0386bb769d1253ea64eab5c5e6bd381abdb73568891df2ee1382c4f88 elfutils-libelf-0.185-1.el8.aarch64.rpm b7d80bf5c6abcf7661b1dc4087eb8273fe582d901a116cc8930b7e93a60877c9 elfutils-libelf-devel-0.185-1.el8.aarch64.rpm 2c60825eb8e3819aad43c298416043eb4d6c5a1dbf1ecfd8ffd65f146afaccc5 elfutils-libs-0.185-1.el8.aarch64.rpm a738ea66bcd033902d7835053dfc4aab0f26b169469c6b335fffb0fa17afde6d RLBA-2021:4435 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libipa_hbac-2.5.2-2.el8.aarch64.rpm 3e19749a618b87a46445c8c2b808b07f0f1681fd1d9d9d104344ac00d98d4ce7 libsss_autofs-2.5.2-2.el8.aarch64.rpm efeea8fb56b1db5d3ebfef5db64d45275ac43ffccb79651e2252a9841dd326d2 libsss_certmap-2.5.2-2.el8.aarch64.rpm 184f6f7cfb231f619464c6a57ff7b476e9f66645e7c0b63cc0bc827634f3390d libsss_idmap-2.5.2-2.el8.aarch64.rpm 1c6126f10849d2d34eda52b3870553effe069fd21fe2d701370edb8a44944ca1 libsss_nss_idmap-2.5.2-2.el8.aarch64.rpm a6ca27677768a3e59c250a759fea5e11b241534281b217b94c7f4b30d71ad260 libsss_simpleifp-2.5.2-2.el8.aarch64.rpm ecfa3f725a5916bf3c379a3640c7894e36cd698913a6cd70a0797967c4bfdde3 libsss_sudo-2.5.2-2.el8.aarch64.rpm 4a3a7ae27bdbd616702979dff4d9dc234ddc1a81a9a89b3a98d6354cb35fdcdc python3-libipa_hbac-2.5.2-2.el8.aarch64.rpm 64027759d569bd519e46909537e5b1fcadf369d21c7487fbaa5e5f974aaa3c10 python3-libsss_nss_idmap-2.5.2-2.el8.aarch64.rpm 11bdbfe5ab0c3f4e74cb2220755f6ea9c9f5ffc873e504c3fa64ce270dc79c14 python3-sss-2.5.2-2.el8.aarch64.rpm 078f164c6bb5b7cff3da996e6145580142d40f53ce40dc945b6d6e0e58e68a3c python3-sssdconfig-2.5.2-2.el8.noarch.rpm d07e9424a9a569e1fe3e915f90cb78db8fba6086699df75e396efb87b7346fbc python3-sssdconfig-2.5.2-2.el8.noarch.rpm d07e9424a9a569e1fe3e915f90cb78db8fba6086699df75e396efb87b7346fbc python3-sss-murmur-2.5.2-2.el8.aarch64.rpm 9f0ee21404ded2e63122192c51088498d6efbb53d892aa3a541748d252afa4ad sssd-2.5.2-2.el8.aarch64.rpm c95503a175d345d4b51148fcce79b936d28c1de74b17e5278505a813b5e93785 sssd-ad-2.5.2-2.el8.aarch64.rpm 60f48132d678a4be01540cf8a6675193e9f75bac506baa7ba21806cc71fc44b7 sssd-client-2.5.2-2.el8.aarch64.rpm f88362d9f8efeae0f958135548bef2076f2efa44f30907c3688e320638108519 sssd-common-2.5.2-2.el8.aarch64.rpm be444b7d18e89e8e95ca0ff31be5eeba35b5e8c11b3c4fda0eefef591f1c5c5c sssd-common-pac-2.5.2-2.el8.aarch64.rpm ae772f8233381e0f244a006405efe854d36dfd6aedc16142f32ec7899ec2b18d sssd-dbus-2.5.2-2.el8.aarch64.rpm 00255309819278e99606ddc6e1c4fe6c65b41c70f45d98d06dc5da2f2b162bdd sssd-ipa-2.5.2-2.el8.aarch64.rpm 72a4c74ce706c2032931bf216936be0d228eef9d77ce36b182fb44937a171381 sssd-kcm-2.5.2-2.el8.aarch64.rpm 934140c908a7bc65f3da6f8998114fe9fcfae8e1ac6815caeba5eef335b4acb7 sssd-krb5-2.5.2-2.el8.aarch64.rpm a440cd1f522c6825e7eb9113ebcaa07577f16a7009f058fa5a2bea2bcae8ea94 sssd-krb5-common-2.5.2-2.el8.aarch64.rpm 43a356bf918ace621a3b21b51ea4c3d0f71b7ac00a87f7965ca9656b4a337877 sssd-ldap-2.5.2-2.el8.aarch64.rpm 770f45e375db9d89dd58db0c8be240c59aa12cfb6263e03f5617c00291e85eea sssd-nfs-idmap-2.5.2-2.el8.aarch64.rpm 43532425c66835f7c08396aa9a8bd7d68be74f9a1772aeb8c21b32c3e6d89ff1 sssd-polkit-rules-2.5.2-2.el8.aarch64.rpm 4c6252f762195ec78f8a028616e203a05b2af38df91e819e05517cec9d11710c sssd-proxy-2.5.2-2.el8.aarch64.rpm 9d9c2abffc694440ee0f8e9bcf8a093f86074d9e8e6accb82677127c18aa7d3e sssd-tools-2.5.2-2.el8.aarch64.rpm e88055d1c0a059ae5d0d95bb0a119825ba4bb811981365f90ddc2c9e44899c4c sssd-winbind-idmap-2.5.2-2.el8.aarch64.rpm caddf73e1e6f0b5e14179280f618dd99cff01e4118b6d5186bd8ca5b830da827 RLBA-2021:4436 libtalloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libtalloc-2.3.2-1.el8.aarch64.rpm 007b036476e1c4aecce8666e276ac6e422b9a05b400c5fa55f5554a6f9dc85ff libtalloc-devel-2.3.2-1.el8.aarch64.rpm e141a539fe308420be17afa513793b053c5563a498c3377101813775b360298d python3-talloc-2.3.2-1.el8.aarch64.rpm 280f3add967afb638c6f474f8b7803bb3b4c012b8e8525d8a71a3b8324b35d5a RLBA-2021:4438 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ctdb-4.14.5-2.el8.aarch64.rpm 39e3efb76c1834cc21352699ae6147825b40c3967842a1c0e87dcdfb4ff7e85b libsmbclient-4.14.5-2.el8.aarch64.rpm bf0173e684fddafad639fc5563e5fbd64cb7a21684fb197bde15ed2e2d494094 libwbclient-4.14.5-2.el8.aarch64.rpm cfbc8b8307721996804b9e5aef863369ae32edf3e770620ae4f64e0d448bb15b python3-samba-4.14.5-2.el8.aarch64.rpm e0d0bc1f0ded08f260ca5ed7e7cd969abb006dbda78dace71443bbe24495c439 python3-samba-test-4.14.5-2.el8.aarch64.rpm 362f37596cd1fa981ec423e261de0d4a810a89c6c7a0ac8740384f4670f1c8dc samba-4.14.5-2.el8.aarch64.rpm 5e716ad7133507cde42954ec75787aa0cf8ca89ddd5152196c35f8b7cc67f575 samba-client-4.14.5-2.el8.aarch64.rpm 5bafafbcca35f40a2cd39959c181e31cb2f90ff4426e856898fda3147666e73a samba-client-libs-4.14.5-2.el8.aarch64.rpm ae765bf16427bee31ecc66523198ef08739271909cdf49057151fb0c646f21b7 samba-common-4.14.5-2.el8.noarch.rpm 75e68cc74b07e844d673118fa212f8fd376ba9fc1d254f1ffd8d4a1de4278098 samba-common-4.14.5-2.el8.noarch.rpm 75e68cc74b07e844d673118fa212f8fd376ba9fc1d254f1ffd8d4a1de4278098 samba-common-libs-4.14.5-2.el8.aarch64.rpm 3723894e3ed8a21e9c2e522788aa0104a163b6592e7245afce0d67829504b507 samba-common-tools-4.14.5-2.el8.aarch64.rpm 6371fd31218a9f0066c744f2f34f886b6eb7b00682003cad0fec8c00f85d5155 samba-krb5-printing-4.14.5-2.el8.aarch64.rpm ee770f1a9f7a26a65a9dec0e7c61a37e3277d79374c101e2511b1a923b31f02d samba-libs-4.14.5-2.el8.aarch64.rpm 5ff302999266caabbb2bc12c2b7df0dd4858dfd3121c65a7a1bb38bf64105e75 samba-pidl-4.14.5-2.el8.noarch.rpm 4ac686ac5db8d61363ce5d9b3bf1f525b0ab8605ed1c24b4839a31bd582a6044 samba-pidl-4.14.5-2.el8.noarch.rpm 4ac686ac5db8d61363ce5d9b3bf1f525b0ab8605ed1c24b4839a31bd582a6044 samba-test-4.14.5-2.el8.aarch64.rpm 7d4a65f28114844e4ad9e81201c9e36b10bc161d9ee0e78cab27823b24952dad samba-test-libs-4.14.5-2.el8.aarch64.rpm ede4f991f0b2de6e957d47c3594a3121d3db1facaaca7ea679150d08a49a61b2 samba-winbind-4.14.5-2.el8.aarch64.rpm 13f2d624c288e4669e657c33b52d829c2b9d74d46f557b1bf03e6bee0eb55858 samba-winbind-clients-4.14.5-2.el8.aarch64.rpm 4a124418b6c78410198eeb8a59589fe4c118e08537ce97bc699bea84679dddce samba-winbind-krb5-locator-4.14.5-2.el8.aarch64.rpm 0c8543d9e652fc364e60c0d31eff9c1ca35ab31798b63df380af7424aaa61316 samba-winbind-modules-4.14.5-2.el8.aarch64.rpm dc17f3a4321d2d0a2811946d6ac6fa610c516ac9d6a70b080588ff12ea3eaeb6 RLEA-2021:4439 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms net-snmp-libs-5.8-22.el8.aarch64.rpm d22b5ffb8a676415fdc7ab2e8be4150af9c3373bf9c8e92e584ace65331c8c35 RLBA-2021:4440 bluez bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms bluez-5.56-2.el8.aarch64.rpm 58843ea2c53d053ce5736a26c2237470b324fb92f9a8ed8313eb7dc5963e28a4 bluez-hid2hci-5.56-2.el8.aarch64.rpm fcbbb46e52f5854a42d65d77a8b886ef61fd2e6ae8827ef4e6f858707b37ef4d bluez-libs-5.56-2.el8.aarch64.rpm 40306fd4ebafab0842d3cc94a87afe3a623726a68ec62127b38c973318ec3ed2 bluez-obexd-5.56-2.el8.aarch64.rpm 25900532f1b480d2fa9ec9585ea8cab7899528cbaac572463690e139245ac826 RLBA-2021:4447 lldpad bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lldpad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms lldpad-1.0.1-16.git036e314.el8.aarch64.rpm b65f9bc952b7cccb47f2837697c265ed69dda39bf817e6d70db96b90b1957e55 lldpad-1.0.1-16.git036e314.el8.aarch64.rpm b65f9bc952b7cccb47f2837697c265ed69dda39bf817e6d70db96b90b1957e55 RLBA-2021:4448 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms opencryptoki-3.16.0-5.el8.aarch64.rpm 17a51635dcb4383d015c0dada6f883b4a4e5bdd386c9a474cfca01748c58e0f7 opencryptoki-icsftok-3.16.0-5.el8.aarch64.rpm e4705f7f8280e4e1c50108821e752867c4bbc9969b2c38a871c6cd13b31c8642 opencryptoki-libs-3.16.0-5.el8.aarch64.rpm 18af495664b9f6e0f56b217b8005dfc999a1210c98a1ab3e7add0e673fa7a7cf opencryptoki-swtok-3.16.0-5.el8.aarch64.rpm 11d16f1a7eeed38a70a0829ca6b3217e01df2c5de0e56e9976de611873ac20c8 opencryptoki-tpmtok-3.16.0-5.el8.aarch64.rpm 64c07007454bb70ecc24ee99caecfa7d43bb42c183cc66468ecc88ac95997f67 RLEA-2021:4452 rasdaemon bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rasdaemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms rasdaemon-0.6.1-6.el8.aarch64.rpm 7231ca59891a0406e92f74cd7d0098b406e88ee41609c8495ffe1565bb30943f RLBA-2021:4457 device-mapper-persistent-data bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-persistent-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms device-mapper-persistent-data-0.9.0-4.el8.aarch64.rpm 88923d626e7e9fc8c206aa6effd40a34282152d4a404320950c40ac4904da938 RLBA-2021:4458 gpgme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms gpgme-1.13.1-9.el8.aarch64.rpm 77befbfd6fd4e104fb83f380c9cc17eb4b1ed5f3a306d93e3a5097b22f141e54 gpgmepp-1.13.1-9.el8.aarch64.rpm 7a66daf3a4cf805180dc299f80abc2165381cbf5330a899490ebe38d531866b8 python3-gpg-1.13.1-9.el8.aarch64.rpm 769784d681b7d488201aa12e2ace239974260dfa3053fa1da65d26535ee019c1 RLBA-2021:4459 perl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms perl-Errno-1.28-420.el8.aarch64.rpm e14ed72895caafda6b9ae2c7a640ae9e0ee3a167c883ade38a82bbb19c5092b7 perl-interpreter-5.26.3-420.el8.aarch64.rpm 351969328ecc2cfc94e4625aa14bc1660ad079a3f3b522f2aad9de2ee9ae97b8 perl-IO-1.38-420.el8.aarch64.rpm af14fb76225ea3cddef569705e84cc684552e28e6e396dcf90d74109da3b8e7c perl-IO-Zlib-1.10-420.el8.noarch.rpm 043d79a20a572726629777b96208c83afb03f61e9940933404198950be66f748 perl-IO-Zlib-1.10-420.el8.noarch.rpm 043d79a20a572726629777b96208c83afb03f61e9940933404198950be66f748 perl-libs-5.26.3-420.el8.aarch64.rpm c00118865ccb1b5e8a518e4cc54c99e22acae002856fcb8b6cf9492260dc53cc perl-macros-5.26.3-420.el8.aarch64.rpm 145ea62183400339f5fe10bbe7b8f315610beba8c18f8535062bc8f848c1c4cd perl-Math-Complex-1.59-420.el8.noarch.rpm ad044d76a9f04aa8125ae77b0a39c670f47c303efb3da8ec9e0b2863d59a7ae8 perl-Math-Complex-1.59-420.el8.noarch.rpm ad044d76a9f04aa8125ae77b0a39c670f47c303efb3da8ec9e0b2863d59a7ae8 RLBA-2021:4460 crypto-policies bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for crypto-policies. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms crypto-policies-20210617-1.gitc776d3e.el8.noarch.rpm e3b2363ac79f5c551a5bdb0da1a6bf9763fdcc3525fa62b3fd057d094e56d46c crypto-policies-20210617-1.gitc776d3e.el8.noarch.rpm e3b2363ac79f5c551a5bdb0da1a6bf9763fdcc3525fa62b3fd057d094e56d46c crypto-policies-scripts-20210617-1.gitc776d3e.el8.noarch.rpm 0ed00c7869530fc5ddb0113a1a66a1e8dcf62a021f8a3308c31e67a51ff979e2 crypto-policies-scripts-20210617-1.gitc776d3e.el8.noarch.rpm 0ed00c7869530fc5ddb0113a1a66a1e8dcf62a021f8a3308c31e67a51ff979e2 RLBA-2021:4462 chrony bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms chrony-4.1-1.el8.aarch64.rpm 82cad416cb5c5119ee39310fd456eb79b965b2b744c4e1506c1e388e352891a6 chrony-4.1-1.el8.aarch64.rpm 82cad416cb5c5119ee39310fd456eb79b965b2b744c4e1506c1e388e352891a6 RLBA-2021:4463 hwdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms hwdata-0.314-8.10.el8.noarch.rpm afbed11aab18f79384efc937fed93b3fe687572f4b816edfe03bf254ef776fee hwdata-0.314-8.10.el8.noarch.rpm afbed11aab18f79384efc937fed93b3fe687572f4b816edfe03bf254ef776fee RLSA-2021:4464 Moderate: dnf security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dnf-plugins-core, dnf, libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list dnf is a package manager that allows users to manage packages on their systems. It supports RPMs, modules and comps groups & environments. Security Fix(es): * libdnf: Signature verification bypass via signature placed in the main RPM header (CVE-2021-3445) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms dnf-4.7.0-4.el8.noarch.rpm 29da544e469a878be0ab8f46248bda588361fd613243e7c07146bf72ee21cee1 dnf-4.7.0-4.el8.noarch.rpm 29da544e469a878be0ab8f46248bda588361fd613243e7c07146bf72ee21cee1 dnf-automatic-4.7.0-4.el8.noarch.rpm facd9358e798557d84a121f72d55fd4922a71b9e44a5b36e680ec2693641c002 dnf-automatic-4.7.0-4.el8.noarch.rpm facd9358e798557d84a121f72d55fd4922a71b9e44a5b36e680ec2693641c002 dnf-data-4.7.0-4.el8.noarch.rpm 4aebe0c7cc4ae4919f1b9b3576c81cdea236393f7a1edbc8bf52f34b0c1d523c dnf-data-4.7.0-4.el8.noarch.rpm 4aebe0c7cc4ae4919f1b9b3576c81cdea236393f7a1edbc8bf52f34b0c1d523c dnf-plugins-core-4.0.21-3.el8.noarch.rpm a85df958cc79012e667af47e00a6e7ffaae0bce0431e9dd003a578ebba6f6736 dnf-plugins-core-4.0.21-3.el8.noarch.rpm a85df958cc79012e667af47e00a6e7ffaae0bce0431e9dd003a578ebba6f6736 libdnf-0.63.0-3.el8.aarch64.rpm 47923797f7dee9a70f2c3a385bd87510d24f3d70b89c05684f46157865e756a8 python3-dnf-4.7.0-4.el8.noarch.rpm bca91559aca686fc637fbf2fc503e92b6fbbbb1348b8c8432b2794704e0b007a python3-dnf-4.7.0-4.el8.noarch.rpm bca91559aca686fc637fbf2fc503e92b6fbbbb1348b8c8432b2794704e0b007a python3-dnf-plugin-post-transaction-actions-4.0.21-3.el8.noarch.rpm 59ab38e104e11870c1c881a7c2c2fa68ad856ad089cb7542359f1da98acced0e python3-dnf-plugin-post-transaction-actions-4.0.21-3.el8.noarch.rpm 59ab38e104e11870c1c881a7c2c2fa68ad856ad089cb7542359f1da98acced0e python3-dnf-plugins-core-4.0.21-3.el8.noarch.rpm 5fbb4c974a56106ec5650c2b2b88183c219e2b4667dd3e400f95090afbe2cd38 python3-dnf-plugins-core-4.0.21-3.el8.noarch.rpm 5fbb4c974a56106ec5650c2b2b88183c219e2b4667dd3e400f95090afbe2cd38 python3-dnf-plugin-versionlock-4.0.21-3.el8.noarch.rpm f22793709cc854b9346faec79c88ad0a823dd10ebcec840bbc2751186b289705 python3-dnf-plugin-versionlock-4.0.21-3.el8.noarch.rpm f22793709cc854b9346faec79c88ad0a823dd10ebcec840bbc2751186b289705 python3-hawkey-0.63.0-3.el8.aarch64.rpm 48498a2d68b0bfd1b66c715d3988a41113422d1e929c395c9a819e74a23686b2 python3-libdnf-0.63.0-3.el8.aarch64.rpm 138287404ebf87ffc4180995748b9bbfd1e1fa2739a80b1d9f1fc090746ccd6c yum-4.7.0-4.el8.noarch.rpm 96b67759c2f7143a44dac036d15effd30d257e9abe24e5b389bc9c1231127bf3 yum-4.7.0-4.el8.noarch.rpm 96b67759c2f7143a44dac036d15effd30d257e9abe24e5b389bc9c1231127bf3 yum-utils-4.0.21-3.el8.noarch.rpm f2198961baff86067bbdd94e01be158c0e4146d7baebfcae085447016fdc1489 yum-utils-4.0.21-3.el8.noarch.rpm f2198961baff86067bbdd94e01be158c0e4146d7baebfcae085447016fdc1489 RLBA-2021:4465 nftables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms nftables-0.9.3-21.el8.aarch64.rpm e7f64ede88a76fc27f49b3da706a1cb9b98e5424c7addfd4a1102d074bc1a1f1 python3-nftables-0.9.3-21.el8.aarch64.rpm a18ad4e73c67140f321e8a77490b00d56b6b6e32b3fd8935c73e526d6a83a42d RLBA-2021:4467 e2fsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for e2fsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms e2fsprogs-1.45.6-2.el8.aarch64.rpm e6e519013833f9144e6b6b456b97170612e07e46828336376313f7b6c9091dfe e2fsprogs-devel-1.45.6-2.el8.aarch64.rpm 97d5c572aaec3fa2a4bd626328a057e844964583c21b987078935a3d75dffdeb e2fsprogs-libs-1.45.6-2.el8.aarch64.rpm cb5ea43bd8fba04ae66c290d5f1de20470c4fa5d3e393790f35b5e95862ab91e libcom_err-1.45.6-2.el8.aarch64.rpm 8f561b3edb14ebc30400dd2bfd69bced372984ebbf434524b9a17b73aa5f3344 libcom_err-devel-1.45.6-2.el8.aarch64.rpm 631eac1bb56e463cd6600e2194d22d9b220d2cd56fcdababecc7bf2120e838c1 libss-1.45.6-2.el8.aarch64.rpm 59de4cd5d6f9de498c5491765671f966cdc1d57c27c8ce176862eda5caa99cb2 RLBA-2021:4468 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms iptables-1.8.4-20.el8.aarch64.rpm 019f15ab1d110dd487c440df3392c901fad18e11a1590ce04b6626833607e611 iptables-arptables-1.8.4-20.el8.aarch64.rpm 3fe68046aa6b41aff2c192e461b1c489821bd4ab908cbc32b76d74c2ba99788f iptables-devel-1.8.4-20.el8.aarch64.rpm 7fabbd30c04122aeee8f5410d66552e3d64bec8c371e2a83ab95327a05abe356 iptables-ebtables-1.8.4-20.el8.aarch64.rpm 8a042233e7dbc560bd495621b19120e9b95e6b76bf83ee948969b2cf92d809c7 iptables-libs-1.8.4-20.el8.aarch64.rpm 6c2753b07900e4c0e7feb29fa4dcdb50c45347d77d5541e5443239f1e3c91a78 iptables-services-1.8.4-20.el8.aarch64.rpm f7386f26daba6f0b2b3b64c274eb7d214d46e92a68f9b025e89479b8403f7281 iptables-utils-1.8.4-20.el8.aarch64.rpm b83f56cd807644ef6ce361ba05fdcc0ea0883aa8bf688ef0475d352f1a7a9d7f RLBA-2021:4469 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms systemd-239-51.el8.aarch64.rpm 5a9c57107f6643e0b91e4e555d3ab101bd42d0ae89546329310269e6512e571b systemd-container-239-51.el8.aarch64.rpm 98e42b9e1fea379083cafbcfc3b60acc070b6bfb55655f7fbc179f68ca440b55 systemd-devel-239-51.el8.aarch64.rpm a1efe9515f37d6a1a107abc8ccfdb9f092cf8bccf371cf86129e5882503f03f5 systemd-journal-remote-239-51.el8.aarch64.rpm e62dc5176e7dceb7037e33017e58c99735108217974e183337a45d5808c31365 systemd-libs-239-51.el8.aarch64.rpm fdc3cc1dfb1ae5106694e3824ac77a5f9fd23386f5b9f42f425864240f6a4e99 systemd-pam-239-51.el8.aarch64.rpm 0d07a035f787df54745dbd148ff4c44f94f43dbe02a3a9bccc61b5175da736ab systemd-tests-239-51.el8.aarch64.rpm 6724caaf27c6f854cb35e06192c4b304c5a41d1f1aa3f93c5141322b37190969 systemd-udev-239-51.el8.aarch64.rpm 08a14d659e3e82211c513a68d4213367e7eebd4475a38700053be79aa61359ea RLBA-2021:4472 tuna bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms tuna-0.16-1.el8.noarch.rpm 2d8cd7455caca597ec2f412bb2195f815dd971bcc0c46d4550fb53d341c6d902 tuna-0.16-1.el8.noarch.rpm 2d8cd7455caca597ec2f412bb2195f815dd971bcc0c46d4550fb53d341c6d902 RLBA-2021:4474 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms smc-tools-1.6.0-3.git393dd23.el8.aarch64.rpm 2668d1fdda58cd9850aa446f6e083aaee95a4eb23d7ce4b9b0fd7391388965df RLBA-2021:4476 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms tuned-2.16.0-1.el8.noarch.rpm 53f70e5ef39b833e2ff9a564576ebfc65438fa81d9d3c2202e219485fe842973 tuned-2.16.0-1.el8.noarch.rpm 53f70e5ef39b833e2ff9a564576ebfc65438fa81d9d3c2202e219485fe842973 tuned-profiles-atomic-2.16.0-1.el8.noarch.rpm af40583263e711231e071304f1bf878b6c3a31931210a158d715030519964aae tuned-profiles-atomic-2.16.0-1.el8.noarch.rpm af40583263e711231e071304f1bf878b6c3a31931210a158d715030519964aae tuned-profiles-compat-2.16.0-1.el8.noarch.rpm f80d452322ea578352ac95a7fdde3a8183278bf5fe840154b309b5c1b88cdce0 tuned-profiles-compat-2.16.0-1.el8.noarch.rpm f80d452322ea578352ac95a7fdde3a8183278bf5fe840154b309b5c1b88cdce0 tuned-profiles-cpu-partitioning-2.16.0-1.el8.noarch.rpm b6abf23e3fafe26ab39c0de8413a5eeb54a128a945b9a3592d015211a5558290 tuned-profiles-cpu-partitioning-2.16.0-1.el8.noarch.rpm b6abf23e3fafe26ab39c0de8413a5eeb54a128a945b9a3592d015211a5558290 tuned-profiles-mssql-2.16.0-1.el8.noarch.rpm c8a23413d9d388e438ee9ce6d66f4aa896cf6171641f8f261ca934c3549aded9 tuned-profiles-mssql-2.16.0-1.el8.noarch.rpm c8a23413d9d388e438ee9ce6d66f4aa896cf6171641f8f261ca934c3549aded9 tuned-profiles-oracle-2.16.0-1.el8.noarch.rpm efa84ef7111ddac14d41f7ad498f4fe7641c5583a3b4184b3acf91c9ee82a6dd tuned-profiles-oracle-2.16.0-1.el8.noarch.rpm efa84ef7111ddac14d41f7ad498f4fe7641c5583a3b4184b3acf91c9ee82a6dd RLBA-2021:4486 libtevent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libtevent-0.11.0-0.el8.aarch64.rpm 5a06944198366846e845dd0e6e41b327bfc7fdfbdc720783ff57bc2fee09867b libtevent-0.11.0-0.el8.aarch64.rpm 5a06944198366846e845dd0e6e41b327bfc7fdfbdc720783ff57bc2fee09867b libtevent-devel-0.11.0-0.el8.aarch64.rpm 1058dd0e5d255e9d53985fa0bf1fcbd1e61a91a10d53026a87537ed0d593197d libtevent-devel-0.11.0-0.el8.aarch64.rpm 1058dd0e5d255e9d53985fa0bf1fcbd1e61a91a10d53026a87537ed0d593197d python3-tevent-0.11.0-0.el8.aarch64.rpm 45573039dcb5622421c820ca1fc4e9a5892b188ac15d18bb1d43f515e40178db python3-tevent-0.11.0-0.el8.aarch64.rpm 45573039dcb5622421c820ca1fc4e9a5892b188ac15d18bb1d43f515e40178db RLBA-2021:4487 xfsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms xfsprogs-5.0.0-9.el8.aarch64.rpm fc05d167cb10930d26bef3d18106b0352d43b5e88bd5f0665e47e1896e59caa9 xfsprogs-devel-5.0.0-9.el8.aarch64.rpm c41d20a5ab8b26b6656a19b8ff8c8c69e437a8f6ba511afc0eed56a00eb7bb28 RLSA-2021:4489 Low: rpm security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: missing length checks in hdrblobInit() (CVE-2021-20266) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms python3-rpm-4.14.3-19.el8.aarch64.rpm 762ded4913e6cccb7ff532f81b266c549a56489cfe45fc1799f63108395c1e6c rpm-4.14.3-19.el8.aarch64.rpm 9a6ef0c81ecd5cb5de2c061b09705bd0b386c83940d6e16a37e493b3ff6439ea rpm-apidocs-4.14.3-19.el8.noarch.rpm 819191c8bb1646d3b7cedcb6dd376d10a885bfcdd46c5784bae653c53f7549cd rpm-apidocs-4.14.3-19.el8.noarch.rpm 819191c8bb1646d3b7cedcb6dd376d10a885bfcdd46c5784bae653c53f7549cd rpm-build-libs-4.14.3-19.el8.aarch64.rpm 24a87d9dd2f9fa0a7c1fa6bfe54c4486b2f9e7a7509e6dd377b82607d3dafd84 rpm-cron-4.14.3-19.el8.noarch.rpm b5497f7333c7c841f09fb29b3db3e3832f760153a49fc8961e8784fe880e58ca rpm-cron-4.14.3-19.el8.noarch.rpm b5497f7333c7c841f09fb29b3db3e3832f760153a49fc8961e8784fe880e58ca rpm-devel-4.14.3-19.el8.aarch64.rpm d6e714bf734d1511e827033d5addfe96f896bf56375c3827750785c0bbfa251e rpm-libs-4.14.3-19.el8.aarch64.rpm 7efe6805b8c7fc4bea3d3f380aeca6b9e44efdd3951b61e5f3868156ef3316df rpm-plugin-ima-4.14.3-19.el8.aarch64.rpm 97c2931ffc554d322ba1f70781bb08038b1b4a59f42c10b11688f4d4e1b5afb2 rpm-plugin-prioreset-4.14.3-19.el8.aarch64.rpm 6af9effb2dfdaec2bee868213649027d394be2766a0d02f4e7d53894031992f4 rpm-plugin-selinux-4.14.3-19.el8.aarch64.rpm d64d872cb8d5d84db2746914d7c8e6d60d68b2f4f9c4dc4d119dbaf6a78466ae rpm-plugin-syslog-4.14.3-19.el8.aarch64.rpm 5e8d0facdd517d1096e91041539ac4c97cbfaa3b31ddf902e9ef1e9a765ef555 rpm-plugin-systemd-inhibit-4.14.3-19.el8.aarch64.rpm defed7ab54337e4f25b8484cce86a86e369cc4a01265338fff85728ec7224ec9 rpm-sign-4.14.3-19.el8.aarch64.rpm 9c3bb3e1b9ebf515f02d34f7019365674c9212939182fe26e8eab66516e9b874 RLBA-2021:4490 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libblkid-2.32.1-28.el8.aarch64.rpm 77210ded7cc6265c79e82e50f7e117105b091e94df5241028f3d16852beab8a7 libblkid-devel-2.32.1-28.el8.aarch64.rpm af215764960e155f261532b2e839b471b73b767217f6ebd3e6245232d4bcb122 libfdisk-2.32.1-28.el8.aarch64.rpm 759bea77dbd3aa87869feac39872ef76be8adab5d9b73d44e0d985e66c07b375 libfdisk-devel-2.32.1-28.el8.aarch64.rpm 3bbf439a14e6a57eabfd780f12f6ce74ab3397705be96f0769a544f9db0dd236 libmount-2.32.1-28.el8.aarch64.rpm 7ed6850791a79ccd1ed4959be359d5ff8c0fba6ed5c26bb1eff434d85ac60cc1 libsmartcols-2.32.1-28.el8.aarch64.rpm b3c22f5e28366a220f52ed2865885cbfbeba93c8c7de7b792987a07fb65e6895 libsmartcols-devel-2.32.1-28.el8.aarch64.rpm ab0a17da58c7ab45613cff58b5da325a29e72c55121fc3bbe8fa2e8b93d353a7 libuuid-2.32.1-28.el8.aarch64.rpm 189480b8b00106e7f46d64b621207d0ec83f90751a436df07dcc8aa4fcea0c2d libuuid-devel-2.32.1-28.el8.aarch64.rpm a54d92759a7f32f2893e972fe23d555126f7125c8119ba21ca1f16dd98b69ebc util-linux-2.32.1-28.el8.aarch64.rpm 07c0d8447d3165048874ecd4c2eb3c52f97bb927d9d4b81b864079f55d30e549 util-linux-user-2.32.1-28.el8.aarch64.rpm b707095f8015f038133fe8796a38018f0c4bdefd27651ba32c5012b51e13290a uuidd-2.32.1-28.el8.aarch64.rpm 392aa973e3781f4b43d964469f765115fcaed928027859984f2a5ee6a20e4772 RLEA-2021:4491 libbpf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libbpf-0.4.0-1.el8.aarch64.rpm 0e48a18fd3228cc2e04e00ba0e3e0b5190b1df8edb59f12de5ccc5c98f184f67 RLBA-2021:4492 dhcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms dhcp-client-4.3.6-45.el8.aarch64.rpm e1288d54c99efaf257c868027a02aaa62174bfbfe2dd7b316a483fd3c5ada866 dhcp-common-4.3.6-45.el8.noarch.rpm 425ca05cd9b464637cc1f4467de8be11029df891d3c20205bc9884f3f5f17b64 dhcp-common-4.3.6-45.el8.noarch.rpm 425ca05cd9b464637cc1f4467de8be11029df891d3c20205bc9884f3f5f17b64 dhcp-libs-4.3.6-45.el8.aarch64.rpm 3b431beb3ab2274371ad8914d21646fd0bbccc902944cd1575693262090c08cd dhcp-relay-4.3.6-45.el8.aarch64.rpm dc3815b600e9b3995d5e10e2536529fcd7ec11be87556718412d954758c822ae dhcp-server-4.3.6-45.el8.aarch64.rpm 1ecf8fb3265f9df90ce2ae91a524db305a8a964199cffad0bd10f7bb7145ca14 RLBA-2021:4493 libqmi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libqmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libqmi-1.24.0-3.el8.aarch64.rpm 16efa23ad4c177c8f6929f0bbd22ce5ec7609ec6b62a913808e9961ef7373c68 libqmi-utils-1.24.0-3.el8.aarch64.rpm 7640678e114070747c878ec0d239c84d6e4febcc6776a7cf438fce1813b79dd4 RLBA-2021:4494 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms mdadm-4.2-rc2.el8.aarch64.rpm 06d72794a8cdfa7d2b40b8ae7b660a6edd85aa85cc77d8cfa6d51fedbf68f5cf RLBA-2021:4495 bash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms bash-4.4.20-2.el8.aarch64.rpm 738a1bab42fd4240aa1fd618d70db0cf74b0351c21af9e2ed2701ee7852aebd0 bash-doc-4.4.20-2.el8.aarch64.rpm 65e0b5dcad52799ebc5b3fb8f5e6d8c21f0cd489114a12d5aefef2d8b52d4b0a RLBA-2021:4497 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms policycoreutils-2.9-16.el8.aarch64.rpm c75772b95e5255b6efe7881a6b341e344c0c7d6120630f5c3ef67dd6e5cf068f policycoreutils-dbus-2.9-16.el8.noarch.rpm 0d69473ffbf8c94d4dffb2e396eb828f55095791bc7e641dca222775f0ac5bc1 policycoreutils-dbus-2.9-16.el8.noarch.rpm 0d69473ffbf8c94d4dffb2e396eb828f55095791bc7e641dca222775f0ac5bc1 policycoreutils-devel-2.9-16.el8.aarch64.rpm 14fa4cb831f9d18574f1fcda3c028691b5615067fc44a21947f04b343506bbed policycoreutils-newrole-2.9-16.el8.aarch64.rpm bece3b58e0e6a175a240618bca00b91000ed98107e22963e8014388aa772817e policycoreutils-python-utils-2.9-16.el8.noarch.rpm 18a44d5feef63ca0a1ba5f455ae1e2af1dc4a54ba1550becdd4a7862fbcc8942 policycoreutils-python-utils-2.9-16.el8.noarch.rpm 18a44d5feef63ca0a1ba5f455ae1e2af1dc4a54ba1550becdd4a7862fbcc8942 policycoreutils-restorecond-2.9-16.el8.aarch64.rpm 11da4fbcdd264e6f3712669714fe6b01bac62d8688cea0d900da17260ab7d4e5 python3-policycoreutils-2.9-16.el8.noarch.rpm 90f6439142b1e214d1e2e38b26c9f016f1213d7e1b536941242b8a07bf142b22 python3-policycoreutils-2.9-16.el8.noarch.rpm 90f6439142b1e214d1e2e38b26c9f016f1213d7e1b536941242b8a07bf142b22 RLBA-2021:4499 linux-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-103.el8.1.noarch.rpm 77da1fa4b50d8608d1f71fc30a22286328260cd4ae4906c9684459b38a827563 iwl1000-firmware-39.31.5.1-103.el8.1.noarch.rpm 77da1fa4b50d8608d1f71fc30a22286328260cd4ae4906c9684459b38a827563 iwl100-firmware-39.31.5.1-103.el8.1.noarch.rpm f434d904f1147a5499c7a6947857c97efad7bcb3a14e742aa59e4e50cf4af56c iwl100-firmware-39.31.5.1-103.el8.1.noarch.rpm f434d904f1147a5499c7a6947857c97efad7bcb3a14e742aa59e4e50cf4af56c iwl105-firmware-18.168.6.1-103.el8.1.noarch.rpm b3aca817d99ed30bbc4d0991e1acc5964be536cb7535ceb9e4c83f6447d9e647 iwl105-firmware-18.168.6.1-103.el8.1.noarch.rpm b3aca817d99ed30bbc4d0991e1acc5964be536cb7535ceb9e4c83f6447d9e647 iwl135-firmware-18.168.6.1-103.el8.1.noarch.rpm e043ce21871e171540a78251c3436d9598a96da9073061631dbdfd77e1d32438 iwl135-firmware-18.168.6.1-103.el8.1.noarch.rpm e043ce21871e171540a78251c3436d9598a96da9073061631dbdfd77e1d32438 iwl2000-firmware-18.168.6.1-103.el8.1.noarch.rpm de2109081b1b071d9f64457dd9e3d3d6d2c90ac5366a26e98556d7d520c9e744 iwl2000-firmware-18.168.6.1-103.el8.1.noarch.rpm de2109081b1b071d9f64457dd9e3d3d6d2c90ac5366a26e98556d7d520c9e744 iwl2030-firmware-18.168.6.1-103.el8.1.noarch.rpm 852a67a7189b71305a73cf962dccfcd8c3978c5525bf4d53135732d218a04fa5 iwl2030-firmware-18.168.6.1-103.el8.1.noarch.rpm 852a67a7189b71305a73cf962dccfcd8c3978c5525bf4d53135732d218a04fa5 iwl3160-firmware-25.30.13.0-103.el8.1.noarch.rpm 3d0dda3c3b4bf6d5a34c634956fd2af9d10f3ef421fc64952ef563e90c79cbde iwl3160-firmware-25.30.13.0-103.el8.1.noarch.rpm 3d0dda3c3b4bf6d5a34c634956fd2af9d10f3ef421fc64952ef563e90c79cbde iwl3945-firmware-15.32.2.9-103.el8.1.noarch.rpm 56692457bd15bbdc61cf60562a905e937eb3dab8c40d31962bfdc349db96b61f iwl3945-firmware-15.32.2.9-103.el8.1.noarch.rpm 56692457bd15bbdc61cf60562a905e937eb3dab8c40d31962bfdc349db96b61f iwl4965-firmware-228.61.2.24-103.el8.1.noarch.rpm 3f8e38f46a15a62f02bdbd28db1bfdc0501b4dba969009171a8d76f638baa786 iwl4965-firmware-228.61.2.24-103.el8.1.noarch.rpm 3f8e38f46a15a62f02bdbd28db1bfdc0501b4dba969009171a8d76f638baa786 iwl5000-firmware-8.83.5.1_1-103.el8.1.noarch.rpm 5099057b8d5acb1609d7d3675f2b1c943695b6f9ab749b5ac38493c4a2953408 iwl5000-firmware-8.83.5.1_1-103.el8.1.noarch.rpm 5099057b8d5acb1609d7d3675f2b1c943695b6f9ab749b5ac38493c4a2953408 iwl5150-firmware-8.24.2.2-103.el8.1.noarch.rpm 2e3f1e3c203f031a15930f57ab6fa0c7f7afa1745f07c4059035524ede109faa iwl5150-firmware-8.24.2.2-103.el8.1.noarch.rpm 2e3f1e3c203f031a15930f57ab6fa0c7f7afa1745f07c4059035524ede109faa iwl6000-firmware-9.221.4.1-103.el8.1.noarch.rpm 4fa790b8492667c5ce84935717e3421242377bd8068c66ab5a5b549e6a63e315 iwl6000-firmware-9.221.4.1-103.el8.1.noarch.rpm 4fa790b8492667c5ce84935717e3421242377bd8068c66ab5a5b549e6a63e315 iwl6000g2a-firmware-18.168.6.1-103.el8.1.noarch.rpm 48e19d471670f373d54c6127aa158f47d92d8ef39f7aba00341379dcad0372fd iwl6000g2a-firmware-18.168.6.1-103.el8.1.noarch.rpm 48e19d471670f373d54c6127aa158f47d92d8ef39f7aba00341379dcad0372fd iwl6000g2b-firmware-18.168.6.1-103.el8.1.noarch.rpm dd5f33a20c3c81ab3892c7cd7020df6a3f67b66f78cf0921c3a53e28d5b2d144 iwl6000g2b-firmware-18.168.6.1-103.el8.1.noarch.rpm dd5f33a20c3c81ab3892c7cd7020df6a3f67b66f78cf0921c3a53e28d5b2d144 iwl6050-firmware-41.28.5.1-103.el8.1.noarch.rpm d10340b4922d496d5abdcf379613d01cfe2a88978d45a55a9b0a29e0fdbbf4de iwl6050-firmware-41.28.5.1-103.el8.1.noarch.rpm d10340b4922d496d5abdcf379613d01cfe2a88978d45a55a9b0a29e0fdbbf4de iwl7260-firmware-25.30.13.0-103.el8.1.noarch.rpm cb2a9a86d772cb83e1b6ef8eadba077c3f54e83f41781283b59d9606bafc9234 iwl7260-firmware-25.30.13.0-103.el8.1.noarch.rpm cb2a9a86d772cb83e1b6ef8eadba077c3f54e83f41781283b59d9606bafc9234 libertas-sd8686-firmware-20210702-103.gitd79c2677.el8.noarch.rpm 7865dc4ebe6381bb7562815c8a2d80fab7012a98c58cd0f92331490c8036df46 libertas-sd8686-firmware-20210702-103.gitd79c2677.el8.noarch.rpm 7865dc4ebe6381bb7562815c8a2d80fab7012a98c58cd0f92331490c8036df46 libertas-sd8787-firmware-20210702-103.gitd79c2677.el8.noarch.rpm 7e8cc79d36db9631a7f413b9c931e5e20b55023fb78945983d774f7385c4175b libertas-sd8787-firmware-20210702-103.gitd79c2677.el8.noarch.rpm 7e8cc79d36db9631a7f413b9c931e5e20b55023fb78945983d774f7385c4175b libertas-usb8388-firmware-20210702-103.gitd79c2677.el8.noarch.rpm e619f0f5ad5e6f9e53b75f2f970b8a666cfd79e42cf3c09defab7df86ff00c27 libertas-usb8388-firmware-20210702-103.gitd79c2677.el8.noarch.rpm e619f0f5ad5e6f9e53b75f2f970b8a666cfd79e42cf3c09defab7df86ff00c27 libertas-usb8388-olpc-firmware-20210702-103.gitd79c2677.el8.noarch.rpm 5675dce198847c66c797b93074d3762b5c383e8258196ea0da73e10003c598cc libertas-usb8388-olpc-firmware-20210702-103.gitd79c2677.el8.noarch.rpm 5675dce198847c66c797b93074d3762b5c383e8258196ea0da73e10003c598cc linux-firmware-20210702-103.gitd79c2677.el8.noarch.rpm a2e7aaec39acef0367cca57d8c42d9930fe226f8e1fdbe296c6b2db4b8c54255 linux-firmware-20210702-103.gitd79c2677.el8.noarch.rpm a2e7aaec39acef0367cca57d8c42d9930fe226f8e1fdbe296c6b2db4b8c54255 RLBA-2021:4502 glusterfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glusterfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms glusterfs-6.0-56.4.el8.aarch64.rpm 9484cf90c40948fae7d6f75b6445d7830a04c1302d7f6f7a60f96b93f907b4ad glusterfs-client-xlators-6.0-56.4.el8.aarch64.rpm 3aa852846b83132e3b3213d2a4ea0936b1930df84cc0428f55db129c60d8f62a glusterfs-fuse-6.0-56.4.el8.aarch64.rpm 840c535854698b5e1c6cc2af736225d515deaa1e6d901246189af36028703065 glusterfs-libs-6.0-56.4.el8.aarch64.rpm a37ae4791e0124510cf15079b3aeeab907c40dcf0700cd28e232ded69cf215e1 glusterfs-rdma-6.0-56.4.el8.aarch64.rpm 00cebb6b7bec8580366e2a769b19cbaae46ad1645afef39c4884414e6d8a7403 RLBA-2021:4504 postfix bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for postfix. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms postfix-3.5.8-2.el8.aarch64.rpm 4351cb50a3bc8bbabffc484eee6fa3c293f564bef66d79019006b3b7c2122f66 RLSA-2021:4517 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap-based buffer overflow in utf_ptr2char() in mbyte.c (CVE-2021-3778) * vim: use-after-free in nv_replace() in normal.c (CVE-2021-3796) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms vim-minimal-8.0.1763-16.el8.aarch64.rpm 339d7182dc3cd393fbd7ba7788e695cf179fa2932b2c55a870952d9ed51d19d1 RLBA-2021:4509 grubby bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms grubby-8.40-42.el8.aarch64.rpm f3a725394f8f7637b989f9a712e4f872c50882b820e7e603cb8f566b6b812864 grubby-8.40-42.el8.aarch64.rpm f3a725394f8f7637b989f9a712e4f872c50882b820e7e603cb8f566b6b812864 RLSA-2021:4511 Moderate: curl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: Leak of authentication credentials in URL via automatic Referer (CVE-2021-22876) * curl: TELNET stack contents disclosure (CVE-2021-22898) * curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure (CVE-2021-22925) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms curl-7.61.1-22.el8.aarch64.rpm 2b7c4a3e22420332927cb6edf502cb329728047454a5f87d7bdaf56da66b82a0 curl-7.61.1-22.el8.aarch64.rpm 2b7c4a3e22420332927cb6edf502cb329728047454a5f87d7bdaf56da66b82a0 libcurl-7.61.1-22.el8.aarch64.rpm 0a50fb9130cca5a4175492440403d3864c00120c7af66ea9f541275ba730703b libcurl-7.61.1-22.el8.aarch64.rpm 0a50fb9130cca5a4175492440403d3864c00120c7af66ea9f541275ba730703b libcurl-devel-7.61.1-22.el8.aarch64.rpm 3700979edfeb3f4fb0ba1b3a9f05995d50c5a8f5d43612aaf88906ee685eadc8 libcurl-devel-7.61.1-22.el8.aarch64.rpm 3700979edfeb3f4fb0ba1b3a9f05995d50c5a8f5d43612aaf88906ee685eadc8 libcurl-minimal-7.61.1-22.el8.aarch64.rpm a693482942b60e79902c7aa4d20484037363f34cfb699042c3809e2587b71cf0 libcurl-minimal-7.61.1-22.el8.aarch64.rpm a693482942b60e79902c7aa4d20484037363f34cfb699042c3809e2587b71cf0 RLEA-2021:4514 strace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms strace-5.7-3.el8.aarch64.rpm fb68c91c97b17dfcfd45a6162d0698f84a73b8f59e7863113623412bf82f610b RLBA-2021:4515 libcap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms libcap-2.26-5.el8.aarch64.rpm a5c433965ad766df324ec9659a6423aff47d1715ef4500ef436dd6ff1de84201 libcap-devel-2.26-5.el8.aarch64.rpm e3c8bbb2d3d543a678e0cd9bb8457e8fe56d37698e09ae443ef310b084369cab RLSA-2021:4382 Moderate: json-c security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for json-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list JSON-C implements a reference counting object model that allows users to easily construct JavaScript Object Notation (JSON) objects in C, output them as JSON formatted strings, and parse JSON formatted strings back into the C representation of JSON objects. Security Fix(es): * json-c: integer overflow and out-of-bounds write via a large JSON file (CVE-2020-12762) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.5 Release Notes linked from the References section. none-baseos-rpms json-c-0.13.1-2.el8.aarch64.rpm 1b454b4c3df2056e8ae2995698644902160a54fd8fe7c10908855cc2897f9ca0 RLBA-2021:4389 iproute bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms iproute-5.12.0-4.el8.aarch64.rpm e62745de2dbf1ce0a79671112a037cb8fbac6bcc648b01590b3f1e133e8b694f iproute-tc-5.12.0-4.el8.aarch64.rpm eb3555f8b2c5902717aedc36d67bf494a9d4dfd00b3f1eda91f98384d3e0b831 RLBA-2021:4437 libldb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms ldb-tools-2.3.0-2.el8.aarch64.rpm 287ba02b1438d94af3f442675d82f9201f47a20a082effac0ad1fc7d515f27f8 libldb-2.3.0-2.el8.aarch64.rpm 776ad7ec499aefdd351cc28d8fe3c1afa2d6ebdd702d684b509af0ba3b9d1a9b libldb-devel-2.3.0-2.el8.aarch64.rpm 0ac143defc5eb9ac32ed088b2a9684355166ff1c6b63ac60a3491fb5e694082e python3-ldb-2.3.0-2.el8.aarch64.rpm 7f3e8c256daf07648e30a79135a7798228445d554a3089fb85102bec008a0972 RLBA-2021:4482 authselect bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for authselect. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.5 Release Notes linked from the References section. none-baseos-rpms authselect-1.2.2-3.el8.aarch64.rpm 1997775cdd10dd2f04781375f9106e70181eea1e727ce8a1546a49eed365c4de authselect-1.2.2-3.el8.aarch64.rpm 1997775cdd10dd2f04781375f9106e70181eea1e727ce8a1546a49eed365c4de authselect-libs-1.2.2-3.el8.aarch64.rpm b3d32d5638d900b77ebc1be1d833ee3cebb159b7cc2c27bc099985336c6931b9 authselect-libs-1.2.2-3.el8.aarch64.rpm b3d32d5638d900b77ebc1be1d833ee3cebb159b7cc2c27bc099985336c6931b9 RLBA-2021:4541 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * tps tests fail with cross dependency on sssd debuginfo package: removal of 'sssd-libwbclient-debuginfo' is missing (BZ#2014460) none-baseos-rpms libipa_hbac-2.5.2-2.el8_5.1.aarch64.rpm a17cf74f20fd72b30cf09ae08630ec959df9622d4f59c8fe1294cfa91e8896dc libsss_autofs-2.5.2-2.el8_5.1.aarch64.rpm 002a412e947a61b972f54c20ca820cba7d58b8921367e5af34cdff4d3812b1e2 libsss_certmap-2.5.2-2.el8_5.1.aarch64.rpm f8135d17bbaea85e8f50cb7884cb1c34e645e833a2a68af2c69d365dda7f1883 libsss_idmap-2.5.2-2.el8_5.1.aarch64.rpm db2126f0646675285afbd8109a413376863325df5601ff37ae8b6e5371eb7a2c libsss_nss_idmap-2.5.2-2.el8_5.1.aarch64.rpm 1b2bb1c37c1750e17736fc80b3356e7e0c3d625043b639cb5c57dbc6faa6a9a5 libsss_simpleifp-2.5.2-2.el8_5.1.aarch64.rpm 0187fa7fe67811cc43497200d194e6eefb9f18d0c8b00640739a07d823d84d3d libsss_sudo-2.5.2-2.el8_5.1.aarch64.rpm 13be64e8e28ac6c861c6f1fd3162087c1087ca10807dc3ef32e2eea1b5d18b99 python3-libipa_hbac-2.5.2-2.el8_5.1.aarch64.rpm 83b6ca30cbec110b1dfe3b12724c06c87e4a1936be4e7c65e0a0dd9e6768ac48 python3-libsss_nss_idmap-2.5.2-2.el8_5.1.aarch64.rpm dcec537b569e81e82691949a90404b825c3405938b90cf0373b002c95923a6bf python3-sss-2.5.2-2.el8_5.1.aarch64.rpm 84714b8b5bee74c89a2d14d2762ae1c09f8dffe33e743a8735eda59453f4362e python3-sssdconfig-2.5.2-2.el8_5.1.noarch.rpm 65751ac056f68bab4a657276f41e9f37b0eb4310c8c62423df5d2ee51fb60a11 python3-sssdconfig-2.5.2-2.el8_5.1.noarch.rpm 65751ac056f68bab4a657276f41e9f37b0eb4310c8c62423df5d2ee51fb60a11 python3-sss-murmur-2.5.2-2.el8_5.1.aarch64.rpm 7452e93c46f627208361c2325046b9a9811d97fea79fd624f477d1e027957ec4 sssd-2.5.2-2.el8_5.1.aarch64.rpm f45c7f06d339c5709e3ecda5d782a59d68a55ea1b72227b8dac8ef5289cc613c sssd-ad-2.5.2-2.el8_5.1.aarch64.rpm ecb67fdd69c65e4b3665b59e8699d80c7061d30634e90a0b8faa7e80c935de7b sssd-client-2.5.2-2.el8_5.1.aarch64.rpm 945b1788e6faac605927bc7aa414aeb7abe182803bebf103554e4ac473f32112 sssd-common-2.5.2-2.el8_5.1.aarch64.rpm aa56bb00bc3d5f1f04dc428a5ad5b1aec3901484691ccf12882700d18ae20a50 sssd-common-pac-2.5.2-2.el8_5.1.aarch64.rpm f89e815615d4bd8f8179bb6f32c00b3292dc552bf5de1968f0b62eca17b8ccd4 sssd-dbus-2.5.2-2.el8_5.1.aarch64.rpm fc6496c166ba9d0ddfeb66f2054ff65fd55013aec2641a2daca24eeabaa1d4f3 sssd-ipa-2.5.2-2.el8_5.1.aarch64.rpm cd6b6dddb37ba6776d26817ff9c6eef502470af44158a423051084829390491d sssd-kcm-2.5.2-2.el8_5.1.aarch64.rpm e91181c01c1e769d7ebbdcafa173cbf385a86bc55d47c69d3c83fffae6d7a124 sssd-krb5-2.5.2-2.el8_5.1.aarch64.rpm eddbffae0aa8c4ba49cff9918abe4ebe4b69e71d1066728f78710f9789e979ea sssd-krb5-common-2.5.2-2.el8_5.1.aarch64.rpm 9f83717f9c4e15b22aa96bb9c20a7cbe9f6c4354216819a7dab9cffa362d5add sssd-ldap-2.5.2-2.el8_5.1.aarch64.rpm 688f05d40255da80cd46124c08ec8ef52dbeac53f9d1722bbcf894ea16e7de9c sssd-nfs-idmap-2.5.2-2.el8_5.1.aarch64.rpm b8e17d3701f75a6f4618cf5087ec95593430010eb554abbfd713529d902bc11c sssd-polkit-rules-2.5.2-2.el8_5.1.aarch64.rpm ceddba63b1be4720415c7e54fbf98ce0c81fd6991debe48cd1918560d139d712 sssd-proxy-2.5.2-2.el8_5.1.aarch64.rpm 645e4eb2849a14227a1a07e75be0287f5701a7445af0175238c89331875f40f8 sssd-tools-2.5.2-2.el8_5.1.aarch64.rpm 39fc004429e98fa9faff37e9d331cadab98d56cb2009368ccf396d37f441b926 sssd-winbind-idmap-2.5.2-2.el8_5.1.aarch64.rpm 25ade22dbeca86032f5b0950725687ef2deae76ce42199ce1da75b25f8441662 RLSA-2021:4587 Moderate: gcc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in gcc in order to facilitate detection of BiDi Unicode characters: This update implements a new warning option -Wbidirectional to warn about possibly dangerous bidirectional characters. There are three levels of warning supported by gcc: "-Wbidirectional=unpaired", which warns about improperly terminated BiDi contexts. (This is the default.) "-Wbidirectional=none", which turns the warning off. "-Wbidirectional=any", which warns about any use of bidirectional characters. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libasan-8.5.0-4.el8_5.aarch64.rpm 110990942f1fa32b1eb63a75f558daa93d96901c23fd2c8f1bbe798544b6a2f7 libatomic-8.5.0-4.el8_5.aarch64.rpm 66f6750b7ad1475772d20fabaf7467bab1229ee68216c4949835fc3ac81e2365 libatomic-static-8.5.0-4.el8_5.aarch64.rpm 31f18912e01f9fd4267f19ca1810e36c1ace8a5a1d26eab6c93e1532d4d2b3b5 libgcc-8.5.0-4.el8_5.aarch64.rpm 3991c16568cc967f1b1e0a645909eaa82e47776c237c6fecaa4b5e807bb8fe25 libgfortran-8.5.0-4.el8_5.aarch64.rpm fd1aba7d200bb5d08220b8d3b582926f4cf4a524b338f82c4fee2fa7cdb65207 libgomp-8.5.0-4.el8_5.aarch64.rpm d97143fd8636d1669ff4fe2e49cd5b776623dd7f82a1992434ff52ca36836e55 libitm-8.5.0-4.el8_5.aarch64.rpm 503fa8fe788820e05077a0c324d379a14f47b830c77c78bb6c050cddd0de13fe liblsan-8.5.0-4.el8_5.aarch64.rpm 12530cd69afee82f5e0e72ec94d50da37aa431f392950076109e065cbc16bf4a libstdc++-8.5.0-4.el8_5.aarch64.rpm 22e08f7c4b6e75d2d036403fe7c0dad680c9c9c893f7e09e4e9a4f75103f6dc6 libtsan-8.5.0-4.el8_5.aarch64.rpm 4a3132c39f8c57a9a19fc6417d40b823925ddd3fdb41bccbe702b0ceb6926011 libubsan-8.5.0-4.el8_5.aarch64.rpm b8d42ff99a1c991a5ae005237cf78dd29623aac7f7617402d6ebdd322cdd1da6 RLSA-2021:4647 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type (CVE-2021-43267) * kernel: timer tree corruption leads to missing wakeup and system freeze (CVE-2021-20317) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-348.2.1.el8_5.aarch64.rpm 4d9218625940e283616b1e37613e0cdb76c5a8982cafb2f8a58cc76800022165 kernel-4.18.0-348.2.1.el8_5.aarch64.rpm bd03fb8b590fcc873b81d74ef3b8c75c1048a81236ca48864188b6b00aabe000 kernel-abi-stablelists-4.18.0-348.2.1.el8_5.noarch.rpm 16e5d30eed91f617439f3528b6ffa0109c833f5af2f722a5d5c79ce4ed6fbd34 kernel-abi-stablelists-4.18.0-348.2.1.el8_5.noarch.rpm 16e5d30eed91f617439f3528b6ffa0109c833f5af2f722a5d5c79ce4ed6fbd34 kernel-core-4.18.0-348.2.1.el8_5.aarch64.rpm 7f097787b80ffb8062afa89404b7f8ae70a46cadc5d9a56290ff32a0d04cd990 kernel-cross-headers-4.18.0-348.2.1.el8_5.aarch64.rpm ab49e90b9d66d94ffdb51e481d508f772133d34d57e52acaca747067f4087ae9 kernel-debug-4.18.0-348.2.1.el8_5.aarch64.rpm 5d33c1e63dd37d587bf02fa70176547c9d4cd8e7096b90a386a9dbadbe3ca208 kernel-debug-core-4.18.0-348.2.1.el8_5.aarch64.rpm d61e5bc6104512dd636ce0b433db60b34689dd560107ed730322a38cc80dfddf kernel-debug-devel-4.18.0-348.2.1.el8_5.aarch64.rpm be8cf18a97067738013a50a31356630f1d4b8e0e6bf331966da30a26134c693e kernel-debuginfo-common-aarch64-4.18.0-348.2.1.el8_5.aarch64.rpm af5f568f31f48d41ee7c58b8dba5c465b610d05de61b471bc92a2a1fbd99638a kernel-debug-modules-4.18.0-348.2.1.el8_5.aarch64.rpm 49bba045c6d9f698f35635698075754012d992a8fb6f9944246afc7517259d96 kernel-debug-modules-extra-4.18.0-348.2.1.el8_5.aarch64.rpm 18fb0d3c495ffc01088d95ad73767de664d42cea51e873b84f4561f2f92f132b kernel-devel-4.18.0-348.2.1.el8_5.aarch64.rpm 93088b79f7167a553ebcdb9dd6970e72f02df49fa520a90ef112f1c58ffc2541 kernel-doc-4.18.0-348.2.1.el8_5.noarch.rpm 0d7df8d65059ce7456629b6dfa003f2a43e204e9121b85f6d146bd2fc7386f0a kernel-doc-4.18.0-348.2.1.el8_5.noarch.rpm 0d7df8d65059ce7456629b6dfa003f2a43e204e9121b85f6d146bd2fc7386f0a kernel-headers-4.18.0-348.2.1.el8_5.aarch64.rpm d9c6f63e8d6a8fd9c7b67e4d63f2a12d1fc5c082a040bef3e4be7fb6aa54c7e8 kernel-modules-4.18.0-348.2.1.el8_5.aarch64.rpm 0a693fa0806a9501ea20abc4c67139a340b90d5987f008dee2b1f19e61576ec4 kernel-modules-extra-4.18.0-348.2.1.el8_5.aarch64.rpm 00b82699ddafeb03690b130507c29224d18130db759c0129c7cc430e9e74e175 kernel-tools-4.18.0-348.2.1.el8_5.aarch64.rpm 3e64ed1fec7c33e36c0c365ae1def26bf39e4b50118b52a7237850832c57340e kernel-tools-libs-4.18.0-348.2.1.el8_5.aarch64.rpm ba7db60e6ad673d8457f926b96ff4394709426d3a528fccc5601421e15948516 perf-4.18.0-348.2.1.el8_5.aarch64.rpm 4b0e4a64ab9adeda7cddf4d88aae33180d602c7247780614686e3d6982799913 python3-perf-4.18.0-348.2.1.el8_5.aarch64.rpm 7196ae8dc80d194175b62d2f8955e87bfa0f1073aabf578a18cc9fb9383159fb RLSA-2021:4595 Moderate: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * Developer environment: Unicode's bidirectional (BiDi) override characters can cause trojan source attacks (CVE-2021-42574) The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters: Tools which display names or strings (readelf, strings, nm, objdump) have a new command line option --unicode / -U which controls how Unicode characters are handled. Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used. Using "--unicode=locale" will display them according to the current locale. Using "--unicode=hex" will display them as hex byte values. Using "--unicode=escape" will display them as Unicode escape sequences. Using "--unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms binutils-2.30-108.el8_5.1.aarch64.rpm da1887ca40f9462554663c6eb739e14381a6d0eed48b5322fe151fa732c59e15 RLSA-2021:5082 Important: samba security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) * samba: Subsequent DCE/RPC fragment injection vulnerability (CVE-2021-23192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms ctdb-4.14.5-7.el8_5.aarch64.rpm 58722d19d695bec3f971d82cafb1946929a8585dc7b7c8a97833248b6bd6468b libsmbclient-4.14.5-7.el8_5.aarch64.rpm f97eed0e7e675d4e21336d30617438ea12c0308f9031ff0ad7d80f233c047cb5 libwbclient-4.14.5-7.el8_5.aarch64.rpm ad4e6b4904d69b312491dd3e583ee8abf48452f83003e0bb9df6a6e14eb40824 python3-samba-4.14.5-7.el8_5.aarch64.rpm 137486bfdd314c11bd0a0314536b86bd9b7b1666c72a7f247c6f6853d4eea6a9 python3-samba-test-4.14.5-7.el8_5.aarch64.rpm 837323e9dd5094a159a4d311355a3421b8cd6f4d365cddbe7582dead5fa3c3e4 samba-4.14.5-7.el8_5.aarch64.rpm 80672cd595b195a603cc669504c3a9a447c71833fbee97ae14ce8bb8525d9704 samba-client-4.14.5-7.el8_5.aarch64.rpm 17ccccc54629becbe80f257a2732d4375fd4ca7072e8be154f489f9016dbeb7a samba-client-libs-4.14.5-7.el8_5.aarch64.rpm 2aaa9cfecdba44f6a7efb5e8120c12c4bbe2d05c6f7d7f07b750ac610cdb62c0 samba-common-4.14.5-7.el8_5.noarch.rpm 574b74f2163c819e23f51f66c528505cc6a0cf4e6525e44c50a70157f0c5e9a6 samba-common-4.14.5-7.el8_5.noarch.rpm 574b74f2163c819e23f51f66c528505cc6a0cf4e6525e44c50a70157f0c5e9a6 samba-common-libs-4.14.5-7.el8_5.aarch64.rpm 5754e74dc6a867437e1c4eaaf2e2ffd3448e21e62d87fe20abaf9ba835d424a1 samba-common-tools-4.14.5-7.el8_5.aarch64.rpm 99762d901ba96eec5f3925f6a71e366e8b03d34051fc1a88ca37d29d8d36b216 samba-krb5-printing-4.14.5-7.el8_5.aarch64.rpm 2b38eed451e45dfe47635b8027c19645596a4c0f7d51ea63853d8ff0f875f73b samba-libs-4.14.5-7.el8_5.aarch64.rpm 743588b4b32e268a791b14e547b147655590cfc5c54ec7181944389941ee1fd5 samba-pidl-4.14.5-7.el8_5.noarch.rpm c11aef50e52bc8686a081c75b19a5283025a6bcc8e14c97b9f3ae23615db2b24 samba-pidl-4.14.5-7.el8_5.noarch.rpm c11aef50e52bc8686a081c75b19a5283025a6bcc8e14c97b9f3ae23615db2b24 samba-test-4.14.5-7.el8_5.aarch64.rpm 288fe788fe867b77e2d43601efaa3cfccf432540a7c9926cb195ab4947dde5f8 samba-test-libs-4.14.5-7.el8_5.aarch64.rpm c73f67916ecea99f2cb751dbd9955bccf27bab544622728d4a0194c1c722f6ca samba-winbind-4.14.5-7.el8_5.aarch64.rpm cb856dbc793962c163a91e85561657d05dcb70c7b0d56cb3a33591fa211061ed samba-winbind-clients-4.14.5-7.el8_5.aarch64.rpm 2c276ffadf02352f9feef52bce5f2ee807b581bd9841fc4d0bacc0513e85d291 samba-winbind-krb5-locator-4.14.5-7.el8_5.aarch64.rpm 7930bd8bc798015eb08be42aa7c31669d7ed9caa541b16ce5a1a1c78ccf18fe2 samba-winbind-modules-4.14.5-7.el8_5.aarch64.rpm 270224bbce6bfeb5c2d9ac1cb048c90d4733d8fe1110bedcb564ddf4a204f7c2 RLBA-2021:5174 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * [Rocky Linux 8.4] Backport container-selinux policy to allow spc_t domains to set bpf rules on any domain (BZ#2015846) * AVC prevents ping -I from running in UBI 8 container (BZ#2027691) none-baseos-rpms selinux-policy-3.14.3-80.el8_5.2.noarch.rpm 8c76dca18373e71c5f922ef3425d3b2a1dd2f277cf6cb3889f346f8b29d08603 selinux-policy-3.14.3-80.el8_5.2.noarch.rpm 8c76dca18373e71c5f922ef3425d3b2a1dd2f277cf6cb3889f346f8b29d08603 selinux-policy-devel-3.14.3-80.el8_5.2.noarch.rpm d9dc311e5966176a306d5819e0bedd5c3699b1c6fb36166cb51e3e6398e636ef selinux-policy-devel-3.14.3-80.el8_5.2.noarch.rpm d9dc311e5966176a306d5819e0bedd5c3699b1c6fb36166cb51e3e6398e636ef selinux-policy-doc-3.14.3-80.el8_5.2.noarch.rpm 0e7053abf5bbdb3112e0a96b5c2a68419381dce6723ee858994aae795d579f41 selinux-policy-doc-3.14.3-80.el8_5.2.noarch.rpm 0e7053abf5bbdb3112e0a96b5c2a68419381dce6723ee858994aae795d579f41 selinux-policy-minimum-3.14.3-80.el8_5.2.noarch.rpm d2949214a211cd64eb0d19680c9b8d3286b4bfac183163f9e8e44ea8282393fd selinux-policy-minimum-3.14.3-80.el8_5.2.noarch.rpm d2949214a211cd64eb0d19680c9b8d3286b4bfac183163f9e8e44ea8282393fd selinux-policy-mls-3.14.3-80.el8_5.2.noarch.rpm 999353d7ad1728f9b8544e42e9eb2b277ebf89e88a926f19c21f1fd6543893f7 selinux-policy-mls-3.14.3-80.el8_5.2.noarch.rpm 999353d7ad1728f9b8544e42e9eb2b277ebf89e88a926f19c21f1fd6543893f7 selinux-policy-sandbox-3.14.3-80.el8_5.2.noarch.rpm 49593efcd6442441fb989a321236f49c4c76fc38a244fe92005cbeef78776dac selinux-policy-sandbox-3.14.3-80.el8_5.2.noarch.rpm 49593efcd6442441fb989a321236f49c4c76fc38a244fe92005cbeef78776dac selinux-policy-targeted-3.14.3-80.el8_5.2.noarch.rpm f98720de037613c7bbdfa1411283ac77bd155f13302495b183776e7fe9dab0e2 selinux-policy-targeted-3.14.3-80.el8_5.2.noarch.rpm f98720de037613c7bbdfa1411283ac77bd155f13302495b183776e7fe9dab0e2 RLBA-2021:5202 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Network interface names are not necessarily predictable and don't match previous names (BZ#2030027) none-baseos-rpms systemd-239-51.el8_5.3.aarch64.rpm d1a5590c043e9ef8a3201bb102a2f795a01418aae1e67a21102e03ce0dcbdf81 systemd-container-239-51.el8_5.3.aarch64.rpm 21d7204d8b1297c8edad9beb632e783b5b4b52c961a76da0b31ffa637658b9ed systemd-devel-239-51.el8_5.3.aarch64.rpm 5b009e08921f02d43d9234c7e67391ca3dabe5f574017f02d045aaea17971c0a systemd-journal-remote-239-51.el8_5.3.aarch64.rpm 9a1b9d81e29cd368cdba535d48c90048799b52e21f8fd1f93262d85729ca030e systemd-libs-239-51.el8_5.3.aarch64.rpm 241b4286697f1ad0fc3436557ab7361d35c3de482054a670c2cd42119520930b systemd-pam-239-51.el8_5.3.aarch64.rpm 85fe1ecbac88864a2a95a387909097c53d8b26116e55beaabcd330bf4b2f3d47 systemd-tests-239-51.el8_5.3.aarch64.rpm 39fa577eb757703c8ea7261aa0a470ac995e787427720e658f31065471ac5a71 systemd-udev-239-51.el8_5.3.aarch64.rpm bb8ee4b281f9591c42a1b870006921eea642e1b4c690db3f9f4ccb2e08ad2a59 RLBA-2021:5224 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * IPA: usr/lib/api/apiutil.c Could not open /run/lock/opencryptoki/LCK..APIlock (BZ#2009328) none-baseos-rpms opencryptoki-3.16.0-7.el8_5.aarch64.rpm 11060cd031b6b2ab246af43767bacd6344e02c3df5993cd7df3e7b6d432e713f opencryptoki-icsftok-3.16.0-7.el8_5.aarch64.rpm af62949ba185e5074924be022bea4c90d4e1a9c46b3176fd555b2e20ee91db69 opencryptoki-libs-3.16.0-7.el8_5.aarch64.rpm a84f1f4f87394509433b3e07fda4c496828e6664e3bf91500fe803e9cf283fe2 opencryptoki-swtok-3.16.0-7.el8_5.aarch64.rpm 39ff9e9368de7bd77004d5627fa49042cc6bbfc4eeb47745582ebe7646084ea7 opencryptoki-tpmtok-3.16.0-7.el8_5.aarch64.rpm 1de87aeaf9849ca15a551028391a984e64f6b7f2986bb79df5c76fa36c52414c RLBA-2021:5225 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8.5][fence kdump] kdump kernel failed with default crashkernel size that "/bin/sh: error while loading shared libraries: libtinfo.so.6: cannot open shared object file: No such file or directory " (BZ#2018861) none-baseos-rpms kexec-tools-2.0.20-57.el8_5.1.aarch64.rpm 640a8dede55796b58595d689b695b4c7bc3f0df9237953eb82c03ff21d7370a0 RLSA-2021:5226 Moderate: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-1.1.1k-5.el8_5.aarch64.rpm 3ef838496a15a4670042e48b7dfe0791867b920922fff9d70d1e9f7399bc56ea openssl-devel-1.1.1k-5.el8_5.aarch64.rpm 153b6446799a08db344a8c5d78b0093e7d796f0c6c7719fbb44b5a6737a6d5ca openssl-libs-1.1.1k-5.el8_5.aarch64.rpm 871350e08951448fad973e5288ece57974c12b347c08a7ce26eee9cbd8386dac openssl-perl-1.1.1k-5.el8_5.aarch64.rpm 51d23bf5459b043de4fc0575c066349f61dcf9f2cb70be22eefac1ddb21cc6ef RLSA-2021:5227 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: In Overlayfs missing a check for a negative dentry before calling vfs_rename() (CVE-2021-20321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * panic while breaking a lease/delegation after user mode helper invocation (BZ#2010333) * The ASR driver is causing a system crash in Rocky Linux8.4 compared to Rocky Linux8.3 due to kernel changes (BZ#2016384) * Rocky Linux8: DFS provided SMB shares are not accessible following unprivileged access (BZ#2017177) * Avoid hitting the rtnl_trylock/restart_syscall logic in net-sysfs when possible (BZ#2021165) * Rocky Linux8: x86/Kconfig: Do not enable AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT (BZ#2024678) * Rocky Linux8.4-[Regression][P10][DD2.0][Rainier/Denali] - system crashed while offlining and onlining cores (BZ#2026450) none-baseos-rpms bpftool-4.18.0-348.7.1.el8_5.aarch64.rpm bef2ea1c7ae72c01ba1ff40e75a472ea376dd91832addfe3b5606b9a3ef10168 kernel-4.18.0-348.7.1.el8_5.aarch64.rpm 4efc0462186a77001789acb7bd06d1573f67e99036e1e867aab3ab3abe1831b7 kernel-abi-stablelists-4.18.0-348.7.1.el8_5.noarch.rpm 3a4a48b42a89a6f7f34726a0c80f812fb0e42e6eec0369a719d5d4c8e1b5f0ae kernel-abi-stablelists-4.18.0-348.7.1.el8_5.noarch.rpm 3a4a48b42a89a6f7f34726a0c80f812fb0e42e6eec0369a719d5d4c8e1b5f0ae kernel-core-4.18.0-348.7.1.el8_5.aarch64.rpm 1bd8f76d6bdf34e764380c6b3b25a01ad5d821e6abbea6163f3365ee95d0cd65 kernel-cross-headers-4.18.0-348.7.1.el8_5.aarch64.rpm 9914450a16d5603bfe20ad58e1af9a7d8360de61daae10b67c6b8ea5a2adcd08 kernel-debug-4.18.0-348.7.1.el8_5.aarch64.rpm 258a7a9d85cde03e78cc420a1fd68f1feef0877c87cbc94348d34684c763ee7a kernel-debug-core-4.18.0-348.7.1.el8_5.aarch64.rpm 3c4747952c3a4d03382a785eaa91794ffdf954f746a3f3f4c9c397e8ef6691f0 kernel-debug-devel-4.18.0-348.7.1.el8_5.aarch64.rpm 71de58f713baefc41b544ab3b521f701822d59cb847265f36ed2420877a5d642 kernel-debuginfo-common-aarch64-4.18.0-348.7.1.el8_5.aarch64.rpm d85f6f018d10e2ecdbfbdf461e29ab3c13f76f8c18de7c678e8592e75715ac5a kernel-debug-modules-4.18.0-348.7.1.el8_5.aarch64.rpm 9e37ffd38b4ad3b5c7508f98c302241979bf1fd554322c350d4b51ed058d200a kernel-debug-modules-extra-4.18.0-348.7.1.el8_5.aarch64.rpm 0ce98031fd173a1ba4d627fb192e94c537433e017136652103d457c241a0dd2a kernel-devel-4.18.0-348.7.1.el8_5.aarch64.rpm a434af7a6fbba4bf3d0f6f6c9e0670941fde77d950d7b8d52fed0ee2cfd787df kernel-doc-4.18.0-348.7.1.el8_5.noarch.rpm e9fff3a106e20eee79789ebc5fdc5d3bd1ee7b0d54b87341a4798a359746bc6d kernel-doc-4.18.0-348.7.1.el8_5.noarch.rpm e9fff3a106e20eee79789ebc5fdc5d3bd1ee7b0d54b87341a4798a359746bc6d kernel-headers-4.18.0-348.7.1.el8_5.aarch64.rpm 7545f9b5b1bd1e03d39dff60df80d9d1ba3da32083e3b3ee95a4ca67697cfcad kernel-modules-4.18.0-348.7.1.el8_5.aarch64.rpm 2be3361b190de34f939ce2af38d2efc2de47ae6ca513660d5a140b1f40b404a5 kernel-modules-extra-4.18.0-348.7.1.el8_5.aarch64.rpm ee84ce1c95e49b2ec320bf832f10c50c3ba6bc8e81db5d820f3cb8c01ec4ac9c kernel-tools-4.18.0-348.7.1.el8_5.aarch64.rpm 84754077c36bfacb94f0a5659f67f4425156464bf9e2cec9ccdd9d777f238c59 kernel-tools-libs-4.18.0-348.7.1.el8_5.aarch64.rpm 2d6d8e52c4df3a429a7b5a56222ddacb0f95c3b87fd5dd370519093204fc64c7 perf-4.18.0-348.7.1.el8_5.aarch64.rpm a9cc92e02ebe678aa5213b6dfa1928bcebc20792fef47fc8d177a7eb6f8a5232 python3-perf-4.18.0-348.7.1.el8_5.aarch64.rpm 734d759223fb621db8f9bb65fd68b6df611c9bce71d653517ec7dba5e2be901c RLBA-2021:5228 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Lookup with fully-qualified name does not work with 'cache_first = True' (BZ#2013379) * autofs lookups for unknown mounts are delayed for 50s (BZ#2016923) * 2.5.x based SSSD adds more AD domains than it should based on the configuration file (not trusted and from a different forest) (BZ#2018440) * Make backtrace less "chatty" (avoid duplicate backtraces) (BZ#2021499) * pam responder does not call initgroups to refresh the user entry (BZ#2028828) none-baseos-rpms libipa_hbac-2.5.2-2.el8_5.3.aarch64.rpm 86d2b5ba30a741af2898624c45d9b895d4758fcfd87565768bf1e58d3212eef7 libsss_autofs-2.5.2-2.el8_5.3.aarch64.rpm 5b72ff78109dde0a61c335094dd4fface7c09204a4c51354d4ceeb5b4f888ba0 libsss_certmap-2.5.2-2.el8_5.3.aarch64.rpm 05914d59ad000989229b404961f271f8c1608504c0d3037419d05d7804f056c2 libsss_idmap-2.5.2-2.el8_5.3.aarch64.rpm dec5cff04f38cb165ae59bcd5a89cd9ba79235e46f4ed0fdde6d557659ea1108 libsss_nss_idmap-2.5.2-2.el8_5.3.aarch64.rpm 409ba7cece8574fa9345993da6dc358e161acd9aeed3fd67acbac0fd59d805b4 libsss_simpleifp-2.5.2-2.el8_5.3.aarch64.rpm 63b85dd2b58b5bcae7881ce22bf8d9862ba07841adaa87d84b1f61e0897f69bb libsss_sudo-2.5.2-2.el8_5.3.aarch64.rpm fcd2a61d08bac0b40c8c87d0a4b29ae52206bd070b9c5e1f9f1a7d5205246624 python3-libipa_hbac-2.5.2-2.el8_5.3.aarch64.rpm adb8be0d54630412b6abf70e9d1d516b5c0eb759cbfa9efa47eff2101f0939ab python3-libsss_nss_idmap-2.5.2-2.el8_5.3.aarch64.rpm bb7f4000c820a434d650c1eb939b8310c336ee26064457da91fbd849f06eb89f python3-sss-2.5.2-2.el8_5.3.aarch64.rpm df4b48774b76722c0f674d5dc929fc99faf7b163892787bf65947d89638cc4c3 python3-sssdconfig-2.5.2-2.el8_5.3.noarch.rpm 52dca3200fc0b9bd4c5a3ec851274c722dcb3cdc2e0f2c35d5cc8b0bbcc73dcf python3-sssdconfig-2.5.2-2.el8_5.3.noarch.rpm 52dca3200fc0b9bd4c5a3ec851274c722dcb3cdc2e0f2c35d5cc8b0bbcc73dcf python3-sss-murmur-2.5.2-2.el8_5.3.aarch64.rpm c48050c4ec0f21f185c817da8a3b6980dec700b4c310c1b63a496723d7b68c55 sssd-2.5.2-2.el8_5.3.aarch64.rpm 412a9be722f74023d603efb57626569249dd0bc04795b5fbcef3fea0a6bd8fc7 sssd-ad-2.5.2-2.el8_5.3.aarch64.rpm b8c9cb8666ae9e320fb12b8d9d45d06f2af1a6a266c6567d351f271537d51d25 sssd-client-2.5.2-2.el8_5.3.aarch64.rpm 68cab8f8b04ddac3524025488c7cf414b24a0823470994cca7a7a0a84d085780 sssd-common-2.5.2-2.el8_5.3.aarch64.rpm 26ec23c9c40c203e4e2560d3b8cdf21f97f9445c4bc948a25a71fe7c3fff4c3b sssd-common-pac-2.5.2-2.el8_5.3.aarch64.rpm c0310a59d3301cf93cdebbbbb904ca69c27c693da084e07cab0a40d76a00d183 sssd-dbus-2.5.2-2.el8_5.3.aarch64.rpm 83ba2a62048a4b652380904e1faa8c5a0f591846259eac6aa1155d991c88767c sssd-ipa-2.5.2-2.el8_5.3.aarch64.rpm 0e05e8643a28877c10f67070603e22645d4008b82a128c603a2c9e32db8485e5 sssd-kcm-2.5.2-2.el8_5.3.aarch64.rpm 7c71550b8bcf54feee1556d33b646b3af7a0d5f6132efd5e26fa02d68fc0395a sssd-krb5-2.5.2-2.el8_5.3.aarch64.rpm 892b914a9f98f641653a036a5cd58ca13bd1d31d3ebe27fbe7426993090a79b6 sssd-krb5-common-2.5.2-2.el8_5.3.aarch64.rpm 6fec31f56db0a1cde605dbb6c52569f0911da30a7c864fa3febf01bac907f0e4 sssd-ldap-2.5.2-2.el8_5.3.aarch64.rpm 6aac6f0539423b65912adefa57d1aa34e144ce18aca7db16b6671b5e848742da sssd-nfs-idmap-2.5.2-2.el8_5.3.aarch64.rpm cf4799b3530b716bd03922b1afb359a47b86a70418fff35ddfded9319d4b6f16 sssd-polkit-rules-2.5.2-2.el8_5.3.aarch64.rpm a55113a07e927077311caf3d11bb19c5edea912cf808a0ce09c529cd5a33464b sssd-proxy-2.5.2-2.el8_5.3.aarch64.rpm cbf15fe46b6d154cdda041df1301354208243ce69ce832a50a07dfa0cf4d9909 sssd-tools-2.5.2-2.el8_5.3.aarch64.rpm 99276f60634bd40a24d0e0dac4ccbe1a269bbf5e4c21535d57a6ef1927889dac sssd-winbind-idmap-2.5.2-2.el8_5.3.aarch64.rpm fe395171482960742be589415775732944059f6bcbaebad09c97b574f7dfe9a6 RLBA-2021:5229 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * systemd coredump in message_extend_fields -> realloc (BZ#2024903) none-baseos-rpms systemd-239-51.el8_5.2.aarch64.rpm 45fc8ca3790d4078782bcf750f1364535ddef4b87900e7a4e7f5ba6dc2eceb8f systemd-container-239-51.el8_5.2.aarch64.rpm 01e83aa5792c608ac1480756cf4816ed196e2d914607c8b38051fc47cfa941e2 systemd-devel-239-51.el8_5.2.aarch64.rpm 4c44fca16cd6ec95dd2a91cbe4967fa9f1f28f4dbf693e4727299bff659e5237 systemd-journal-remote-239-51.el8_5.2.aarch64.rpm 485d78baa9b833591a8e28bead0350dd34fa933eea86ce54007470bd9b7ce08d systemd-libs-239-51.el8_5.2.aarch64.rpm 9d862586fe80e7f7d50f97bd7253033de2d23f4aab0b269aad5263c140902d72 systemd-pam-239-51.el8_5.2.aarch64.rpm 3bd3d6d77fa8d9a34c1565fd349b6a92be4571070d8411c6b248b7cfc90bd3a9 systemd-tests-239-51.el8_5.2.aarch64.rpm 477eb719ff941b6b40859a86b7c50afb51292e716bbf47000243f1ad3d7af637 systemd-udev-239-51.el8_5.2.aarch64.rpm 0c90cd664135680443d99debf0463d8f1e9cfd89c3e76d5c278a7e2f3c41167d RLSA-2022:0188 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155) * kernel: fs_context: heap overflow in legacy parameter handling (CVE-2022-0185) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel show “ BUG: scheduling while atomic:xxx“ and reboot when an uncorrectable memory error injection on Rocky Linux8.4 beta and GA (BZ#2008789) * tcp: Sockets can be orphaned in the FIN-WAIT-1 or CLOSING states. (BZ#2021574) * Hostnetwork pod to service backed by hostnetwork on the same node is not working with OVN Kubernetes (BZ#2024411) * ice: bug fixes for kernel crashes (BZ#2026698) * [Rocky Linux-8.6][SanityOnly] Backport leftover migrate_disable BPF related change (BZ#2027689) * xfs: I_DONTCACHE flag is ignored [xfstests: xfs/177] (BZ#2028534) * FIPS: deadlock between PID 1 and "modprobe crypto-jitterentropy_rng" at boot, preventing system to boot (BZ#2029365) * Rocky Linux8.6: Backport upstream RCU commits up to v5.12 (BZ#2029449) * i40e,ixgbe: revert XDP partial backport from kernel 5.13 (BZ#2029845) * spec: Support separate tools build (BZ#2031053) * RCU stall WARNING: at kernel/rcu/tree.c:1392 rcu_advance_cbs_nowake+0x51/0x60 (BZ#2032579) * block: update to upstream v5.14 (BZ#2034396) none-baseos-rpms bpftool-4.18.0-348.12.2.el8_5.aarch64.rpm be351831e37a24b2a9f6520e8721a4f36929a53144158f0c8d06bdb3c83d20ff kernel-4.18.0-348.12.2.el8_5.aarch64.rpm fdb99f0e4becda3820188d39eeeff433d7504f49f213afea87e229e8f9f612ba kernel-abi-stablelists-4.18.0-348.12.2.el8_5.noarch.rpm a1753d23596c4bd97bfaa8d2d93f4c43032f1812207312b7cd45a6e4e0ade2a8 kernel-abi-stablelists-4.18.0-348.12.2.el8_5.noarch.rpm a1753d23596c4bd97bfaa8d2d93f4c43032f1812207312b7cd45a6e4e0ade2a8 kernel-core-4.18.0-348.12.2.el8_5.aarch64.rpm a68661c9060d8b49743d60af886f0297fd87e54244a7df4cd77ac35526c90c36 kernel-cross-headers-4.18.0-348.12.2.el8_5.aarch64.rpm a19ebed9a2c463294e0faaea3118992ec590fb79b386f50318194b240e14f601 kernel-debug-4.18.0-348.12.2.el8_5.aarch64.rpm cf37b5ee37ed0091ac0a29bce8161d4f879b2a6f332ce90aab0e6d8843153d64 kernel-debug-core-4.18.0-348.12.2.el8_5.aarch64.rpm a343b412f9fdb2878ac6553ee49650940f0a3fb132573f6b58a7d3a918283501 kernel-debug-devel-4.18.0-348.12.2.el8_5.aarch64.rpm d0a3ab7cbbe3309c5734682e749dd6d8c96d4e30e15eb1903226ff6de36e5477 kernel-debuginfo-common-aarch64-4.18.0-348.12.2.el8_5.aarch64.rpm 8a7cdb30af08b9f6a62b3e5847f715fb0c276457b92aad173d58e1ca781cf78b kernel-debug-modules-4.18.0-348.12.2.el8_5.aarch64.rpm d90840e1f5ccddab6b2bf007c707c08e3593b42d1b9044f847afc2a40f09a2d5 kernel-debug-modules-extra-4.18.0-348.12.2.el8_5.aarch64.rpm 521dc5c050d137dee5ca004ebefbd7df1e3518739d8dd96ac6a91982eb207935 kernel-devel-4.18.0-348.12.2.el8_5.aarch64.rpm bbd632064bb35017e820cef41ffeaf0926319dfa02dcc0cea590c4067e16dedd kernel-doc-4.18.0-348.12.2.el8_5.noarch.rpm a0dc39e37a1e2e2ba227c27010e7fb85c8dd7e0791ee763822de72119f5886aa kernel-doc-4.18.0-348.12.2.el8_5.noarch.rpm a0dc39e37a1e2e2ba227c27010e7fb85c8dd7e0791ee763822de72119f5886aa kernel-headers-4.18.0-348.12.2.el8_5.aarch64.rpm 236cc8087a410dad121e3462ce8f8026b2c43cefa4792e2502a33254caa93f64 kernel-modules-4.18.0-348.12.2.el8_5.aarch64.rpm 5fd6601eb8da8a47e3ba849cea1cfadf7054256ed95214e862c23299cd5edfeb kernel-modules-extra-4.18.0-348.12.2.el8_5.aarch64.rpm 9c8bf5d64451bbb23d13673ab2c93700b880940890855a3bf2192bf86272bf44 kernel-tools-4.18.0-348.12.2.el8_5.aarch64.rpm e146f2bfe0342808ade7ff21ff21c8c5b3c8987dbbdca49fb83ecf24c00ff891 kernel-tools-libs-4.18.0-348.12.2.el8_5.aarch64.rpm 515096e69d32faa5c40480a0740ac49f3f184f88473c72e800b9a776349010ba perf-4.18.0-348.12.2.el8_5.aarch64.rpm 1e58588466db0f6f00f451eae46e34cdb06d9f9acf95c94822f71bc95ec97e75 python3-perf-4.18.0-348.12.2.el8_5.aarch64.rpm 2c0900e0df405ec52d845c9fb8dac3873efbaec9234c13287baa42a322cb3ec9 RLSA-2022:0267 Important: polkit security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Security Fix(es): * polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector (CVE-2021-4034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms polkit-0.115-13.el8_5.1.aarch64.rpm 333e987382d91c1eccde5e6f1fe579e8ea6c6a8c0d6d0c68287fcc9dd80ad08e polkit-devel-0.115-13.el8_5.1.aarch64.rpm b8755f925aaecd365b2b2ca10ab231939231ef6ba62b9941be790c2d089550a0 polkit-docs-0.115-13.el8_5.1.noarch.rpm 69b16552a1fa95c4dc4fe1d816ce9515d3f1a517965d47444b300338dcf10004 polkit-docs-0.115-13.el8_5.1.noarch.rpm 69b16552a1fa95c4dc4fe1d816ce9515d3f1a517965d47444b300338dcf10004 polkit-libs-0.115-13.el8_5.1.aarch64.rpm 80a735e4318576208320e112ef7a762fb6447dcc8e1ee5ef7b67922bd585a84c RLSA-2022:0332 Critical: samba security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Critical An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Fix username map script regression introduced with CVE-2020-25717 (BZ#2046174) * Fix possible segfault when joining the domain (BZ#2046160) none-baseos-rpms ctdb-4.14.5-9.el8_5.aarch64.rpm a87f6292d4c229be4e0beae74a9c7c4cb09a2b05e9a0757f4410d7ef28379405 libsmbclient-4.14.5-9.el8_5.aarch64.rpm 593e3c3ba6d3a3c6ee98abd18f2ec030c24ac16f99e0803df4ac02cd286add77 libwbclient-4.14.5-9.el8_5.aarch64.rpm aa1d47e76ef008dc019f06db57934a64c9d394b5f03202f2efba1c0dffc4f05e python3-samba-4.14.5-9.el8_5.aarch64.rpm 853ad62634fac8f7acfb5f0de4c744d5e10bc27880d2419845481ab6df019f4f python3-samba-test-4.14.5-9.el8_5.aarch64.rpm 685a59f731e43548e8818da744573d530d8f03665202651088c4b149957b0553 samba-4.14.5-9.el8_5.aarch64.rpm aefaeaf2c550582600eae096b874acc572c107bdc1a856195bafa2ba81cee33b samba-client-4.14.5-9.el8_5.aarch64.rpm b73faa4ae346b161f2d4b5ca08abf3d75724e3c561969261e808fd4ce70bda21 samba-client-libs-4.14.5-9.el8_5.aarch64.rpm 55ee038144ddf3c0b34f9f173a5a81098c2508aa7dd2f635816d6f993fe329f9 samba-common-4.14.5-9.el8_5.noarch.rpm f87c4f2b9bec2b10bf97bf034d9f3a0acc5767e91c366c02869672909a4b2027 samba-common-4.14.5-9.el8_5.noarch.rpm f87c4f2b9bec2b10bf97bf034d9f3a0acc5767e91c366c02869672909a4b2027 samba-common-libs-4.14.5-9.el8_5.aarch64.rpm 0025081e86c32c5dd9e0315f9272fddb2da180c86e38836e7b02df46d7a1859c samba-common-tools-4.14.5-9.el8_5.aarch64.rpm ee6a1b0f7f429c2a60af435352f5d50cc2084e2f6c8f4a7f151ddb8f8fe9facf samba-krb5-printing-4.14.5-9.el8_5.aarch64.rpm dbd04536b8b10e92cde5532d9e859501005764919960962f2a100561b2d61065 samba-libs-4.14.5-9.el8_5.aarch64.rpm 0a64588103295573f7271c68496d0150687d6b144859c19e49870fe4c58808f4 samba-pidl-4.14.5-9.el8_5.noarch.rpm ce00e8571d04da9acb0dbb02d9f001d6c5cca208d0eb577f859615e9b6d35315 samba-pidl-4.14.5-9.el8_5.noarch.rpm ce00e8571d04da9acb0dbb02d9f001d6c5cca208d0eb577f859615e9b6d35315 samba-test-4.14.5-9.el8_5.aarch64.rpm 57c386114ec399dc5f1b05d2bb7dbdff466155790ed3654ed73ad5e7a0995dbb samba-test-libs-4.14.5-9.el8_5.aarch64.rpm 5d4ff14b90cf166ad559678f7814f85b05feff54770e6d04597892d434fe305e samba-winbind-4.14.5-9.el8_5.aarch64.rpm 32786963dc811b0e5db2cd46ceef5a0d4bfe8b83b990154bc082d9baabef9be1 samba-winbind-clients-4.14.5-9.el8_5.aarch64.rpm 9942e8c40c9caee242f5d89b57a8c9697fa065fa7f2e51f436edeb15cffefbfc samba-winbind-krb5-locator-4.14.5-9.el8_5.aarch64.rpm d8c00a0d74c67c78f69dac68b4825b24ad1ab8011aae8b640e3a658345969232 samba-winbind-modules-4.14.5-9.el8_5.aarch64.rpm de2fab69e7b5975efd1219ede93ef0499bb0278d8f4860bfc2759eef662f02fa RLSA-2022:0366 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap-based buffer overflow in win_redr_status() in drawscreen.c (CVE-2021-3872) * vim: illegal memory access in find_start_brace() in cindent.c when C-indenting (CVE-2021-3984) * vim: heap-based buffer overflow in find_help_tags() in help.c (CVE-2021-4019) * vim: use-after-free in win_linetabsize() (CVE-2021-4192) * vim: out-of-bound read in getvcol() (CVE-2021-4193) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms vim-minimal-8.0.1763-16.el8_5.4.aarch64.rpm 85e6171e264b2490329a3b2a2260c74fa89f487a8a8314821e79e358320c32b2 RLBA-2022:0367 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Bug Fix(es) and Enhancement(s): * Cockpit 251 Administrative Access MFA Prompt Window Broken (BZ#2032849) none-baseos-rpms cockpit-251.3-1.el8_5.aarch64.rpm 0d49f600641e5f6c02eb8f52751b5870c9bde9254983e06b314aa6fd89240ad6 cockpit-bridge-251.3-1.el8_5.aarch64.rpm 4e09b789a3203834c96e80fe8d2ff5e0223acd1fc4f42ac8223b10ff34a2705a cockpit-doc-251.3-1.el8_5.noarch.rpm ce97b2df0e8b21c6344f3cc7807ff683ee0103c6aa2b3fd7ac6542b835dbdb5f cockpit-doc-251.3-1.el8_5.noarch.rpm ce97b2df0e8b21c6344f3cc7807ff683ee0103c6aa2b3fd7ac6542b835dbdb5f cockpit-system-251.3-1.el8_5.noarch.rpm 57e16a113fccdb1021483083f8a9404be120f2ec79adc6430a4fcacc67774004 cockpit-system-251.3-1.el8_5.noarch.rpm 57e16a113fccdb1021483083f8a9404be120f2ec79adc6430a4fcacc67774004 cockpit-ws-251.3-1.el8_5.aarch64.rpm f10db5e60d03430e5545c3b594a21ea2d85bf0d0500645393adfe95b53264c23 RLSA-2022:0368 Moderate: rpm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: RPM does not require subkeys to have a valid binding signature (CVE-2021-3521) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-rpm-4.14.3-19.el8_5.2.aarch64.rpm 1039743075d1f5b34d00759dcda4557d5b1e4e1988ccf055c2c2126547476ad5 rpm-4.14.3-19.el8_5.2.aarch64.rpm a5439da998d47a338a331178c8081d5f1fcd213d1527ed81e8ef3aca9b9bea24 rpm-apidocs-4.14.3-19.el8_5.2.noarch.rpm b50ccc3d780822f43bfa2e8a0000e55d78c042c7307ced7371fe7f69c85651fb rpm-apidocs-4.14.3-19.el8_5.2.noarch.rpm b50ccc3d780822f43bfa2e8a0000e55d78c042c7307ced7371fe7f69c85651fb rpm-build-libs-4.14.3-19.el8_5.2.aarch64.rpm c95fbef97959cb027abc805d041e80a94a2a1218e39b8d111887b1e40168a55f rpm-cron-4.14.3-19.el8_5.2.noarch.rpm 003e6a1d82093172f0a86c29a38e19b030a142a78b91a9026abdfc3f04f8d994 rpm-cron-4.14.3-19.el8_5.2.noarch.rpm 003e6a1d82093172f0a86c29a38e19b030a142a78b91a9026abdfc3f04f8d994 rpm-devel-4.14.3-19.el8_5.2.aarch64.rpm 5260cc05be059e4992d343c0c0f3f6dd7a0498a048de82d256299ef3a8f3a313 rpm-libs-4.14.3-19.el8_5.2.aarch64.rpm 96840156dbc7168546e3dbcf47d4a9ba29afb665554a30af11456928a17d880e rpm-plugin-ima-4.14.3-19.el8_5.2.aarch64.rpm 83c12b7da8af8870033ce905f3153f4fae198636d3bf9f4e1435b06989441db5 rpm-plugin-prioreset-4.14.3-19.el8_5.2.aarch64.rpm 82c6c6a12c0639063f1a986173e11417161865101922bdf7c27e660749a8a23b rpm-plugin-selinux-4.14.3-19.el8_5.2.aarch64.rpm 22266006caf5c29a06e483481a166078113bd8ecde65719f921291dc3836de41 rpm-plugin-syslog-4.14.3-19.el8_5.2.aarch64.rpm 26616ec34b46be1f4f16ae16949fec6cce22f30e5d43072a7c400e68f520cf1f rpm-plugin-systemd-inhibit-4.14.3-19.el8_5.2.aarch64.rpm 0abe942e8ed6b977a24ca4e521aaf0cf3593f27ef6573bdc665e33dee3892c51 rpm-sign-4.14.3-19.el8_5.2.aarch64.rpm de49845b68a0a10e68299c3b7ed2c2ee781bc4bc09669c1b2303a2fd969c3f54 RLBA-2022:0369 dnf-plugins-core bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dnf-plugins-core packages provide core plugins for YUM4. They add these commands: builddep, config-manager, copr, debug, debuginfo-install, download, needs-restarting, repoclosure, repograph, repomanage, and reposync. Bug Fix(es) and Enhancement(s): * "needs-restarting -r" not notifying kernel modification (BZ#2037008) none-baseos-rpms dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm 31b9c90083a8d45c095c783405cf2ac411d744e4738521ab2816027bc6857431 dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm 31b9c90083a8d45c095c783405cf2ac411d744e4738521ab2816027bc6857431 python3-dnf-plugin-post-transaction-actions-4.0.21-4.el8_5.noarch.rpm e438a4ae4555a1b06eed09f71f8f0d085adcae6119fa8a26cd4caff67d3769f0 python3-dnf-plugin-post-transaction-actions-4.0.21-4.el8_5.noarch.rpm e438a4ae4555a1b06eed09f71f8f0d085adcae6119fa8a26cd4caff67d3769f0 python3-dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm 3f56ddbddad3eb60098c140bddc06734cb7305f29ed30503c1a067f688c8f28f python3-dnf-plugins-core-4.0.21-4.el8_5.noarch.rpm 3f56ddbddad3eb60098c140bddc06734cb7305f29ed30503c1a067f688c8f28f python3-dnf-plugin-versionlock-4.0.21-4.el8_5.noarch.rpm 6a86925d90d543c94c1ac29766c6ea48db1b4aced14c327df93cb609c9b3434c python3-dnf-plugin-versionlock-4.0.21-4.el8_5.noarch.rpm 6a86925d90d543c94c1ac29766c6ea48db1b4aced14c327df93cb609c9b3434c yum-utils-4.0.21-4.el8_5.noarch.rpm 841a80cd87c0a6d96dd44b164255b9c9bdfd4fe7ff0ce90c6e10640b9efe922c yum-utils-4.0.21-4.el8_5.noarch.rpm 841a80cd87c0a6d96dd44b164255b9c9bdfd4fe7ff0ce90c6e10640b9efe922c RLSA-2022:0892 Moderate: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: extracting a symlink with ACLs modifies ACLs of target (CVE-2021-23177) * libarchive: symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive (CVE-2021-31566) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bsdtar-3.3.3-3.el8_5.aarch64.rpm d89ccab1f14d6bc62f020efbc76b38c44ac90171a5db222ef9d3c866f4af4b10 bsdtar-3.3.3-3.el8_5.aarch64.rpm d89ccab1f14d6bc62f020efbc76b38c44ac90171a5db222ef9d3c866f4af4b10 libarchive-3.3.3-3.el8_5.aarch64.rpm 603814c3abc6b1a4c1e8709b31e290bd452e6d219e3916e245abca0110b03b28 libarchive-3.3.3-3.el8_5.aarch64.rpm 603814c3abc6b1a4c1e8709b31e290bd452e6d219e3916e245abca0110b03b28 RLSA-2022:0370 Moderate: cryptsetup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The cryptsetup packages provide a utility for setting up disk encryption using the dm-crypt kernel module. Security Fix(es): * cryptsetup: disable encryption via header rewrite (CVE-2021-4122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cryptsetup-2.3.3-4.el8_5.1.aarch64.rpm 1fba770897cbe6f52dba2de92218167c4eaa7355701d63195fdbfdf3a2a494a0 cryptsetup-libs-2.3.3-4.el8_5.1.aarch64.rpm 9991e1cf81af75711d23c36bf0124fb0c4e94c11ef8ddd156eb95df6a5cedb74 cryptsetup-reencrypt-2.3.3-4.el8_5.1.aarch64.rpm e9315fb36871f81e71b5d8875031b1ebf05429ded39be59b2140281452b0bfc5 integritysetup-2.3.3-4.el8_5.1.aarch64.rpm a78fee42f557265e1a0048d392ce0d5730600081713cc34a0a733edc500981b4 veritysetup-2.3.3-4.el8_5.1.aarch64.rpm dc61573ae137275b11c9fbcdc4f78a13cb660bf69cc276232eae6b6ffdd84825 RLBA-2022:0371 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * sssd-kcm has requirement on krb5 symbol "krb5_unmarshal_credentials" only available in latest Rocky Linux8.5 krb5 libraries (BZ#2030651) * AD Domain in the AD Forest Missing after sssd latest update (BZ#2035285) none-baseos-rpms libipa_hbac-2.5.2-2.el8_5.4.aarch64.rpm 36fd3cde2ae87b41144c484342b3acb39ad43d815868825bcd5947a7697a3e09 libsss_autofs-2.5.2-2.el8_5.4.aarch64.rpm e1ebd0f703d5c4230e7e6db1274f7e80ab7f71f714b132ebb90f6be25014ce12 libsss_certmap-2.5.2-2.el8_5.4.aarch64.rpm 236b4df22df421fbb623d8bed2b568737f70876b6b98a62c901d787a9e96d35a libsss_idmap-2.5.2-2.el8_5.4.aarch64.rpm 0ebc08d1688c59523ff7a68ed430ba9e15f737cca93b783b6a3af9eaf07bde7d libsss_nss_idmap-2.5.2-2.el8_5.4.aarch64.rpm f496301583a15b99e360df29c0ca6cc331a2f8a8a5d43ab73a15217d95d9914a libsss_simpleifp-2.5.2-2.el8_5.4.aarch64.rpm 627c41229e26207cb1d794fd6a84c816ec323ae2bac2ce8f75bbb92460d40e3a libsss_sudo-2.5.2-2.el8_5.4.aarch64.rpm f964ecd631173c626667f282b284120be19715e721817c6ee4a6ed77aff26fab python3-libipa_hbac-2.5.2-2.el8_5.4.aarch64.rpm 1c60d19f1fb8dc59da99c310cb66a7e0809f5b7a8744edbdad79279e1ec8b413 python3-libsss_nss_idmap-2.5.2-2.el8_5.4.aarch64.rpm 9e497dc7a1f2af144afe571f791c9bd54644bda38d8a45b8759c76aef4b705a7 python3-sss-2.5.2-2.el8_5.4.aarch64.rpm 2193890c917a14239a9d08fdae1484a28129736366bb5fc0921f103d8f6f9b70 python3-sssdconfig-2.5.2-2.el8_5.4.noarch.rpm 83898074a81f114978fda83014a26fef9c73d9f777844ac04babdde382058e23 python3-sssdconfig-2.5.2-2.el8_5.4.noarch.rpm 83898074a81f114978fda83014a26fef9c73d9f777844ac04babdde382058e23 python3-sss-murmur-2.5.2-2.el8_5.4.aarch64.rpm f8cd2cfbb7a4e9e33368fa1f8ca3dd5e4017eac1f15de0a76602075ffedcfa8b sssd-2.5.2-2.el8_5.4.aarch64.rpm 8d0a604870dde6a44022380484b4e201ef6a87ee0d3eb85f150e15e59c1a9d50 sssd-ad-2.5.2-2.el8_5.4.aarch64.rpm 0174b8cf4ddc36a00b710bbc426b963a649a08a21c9d304f6ff9f730e50b105b sssd-client-2.5.2-2.el8_5.4.aarch64.rpm 35f9f2cc0e77e56cd0980dd3f7067542c484c7bf24d6ca1575b615c75a334a86 sssd-common-2.5.2-2.el8_5.4.aarch64.rpm e01eae79f8f0033506f4e5fde52874216c7b93bd26d2bf4eb5826184b9690ea9 sssd-common-pac-2.5.2-2.el8_5.4.aarch64.rpm 77600d731d12a355f1ef390cc6cfe411c2953ff01307451c46b48a3dfeed8307 sssd-dbus-2.5.2-2.el8_5.4.aarch64.rpm ab8e0ebb9641719e2b1b36c46149094c3b4dc3ad4b891b82f1f1742e12c4a7e0 sssd-ipa-2.5.2-2.el8_5.4.aarch64.rpm df3eb89302c3036677c6bfc97801cd1523c94b997854af22b2489bde83ef017e sssd-kcm-2.5.2-2.el8_5.4.aarch64.rpm bc8d98449dc50c616551c5383b94b4a8ccd79b730cba1eafb46198316da82260 sssd-krb5-2.5.2-2.el8_5.4.aarch64.rpm 20c1d9102ac8e54c1741fa8e108c9516384071e46fe910f7de14c78f0514638a sssd-krb5-common-2.5.2-2.el8_5.4.aarch64.rpm e2c5fa04c4dc9be5431ceef9b223d54e619a310bb54b7eb076ac27153dfced6d sssd-ldap-2.5.2-2.el8_5.4.aarch64.rpm 98adf14331bdaabdb2d65156ba6d893c6a6bc8ca937f4867d2cf05fbe7146825 sssd-nfs-idmap-2.5.2-2.el8_5.4.aarch64.rpm 8fadf8ac9fd8b7a5adcb8676bc59a7940aabaaaac2c78de7b46bb356a25d0a53 sssd-polkit-rules-2.5.2-2.el8_5.4.aarch64.rpm 502b52b97d7bdd669b020771280beb284592ef4de941bfd4429b763eeb188675 sssd-proxy-2.5.2-2.el8_5.4.aarch64.rpm 6cef20d2dcea7c664c82cf65ed9fcae27304fbb2dd123cd87ce5fa7e6c1c775f sssd-tools-2.5.2-2.el8_5.4.aarch64.rpm 1691e24be8a1422a9dae1df5aaf1b0be693cf07082ebebe2ca4270de540fc30a sssd-winbind-idmap-2.5.2-2.el8_5.4.aarch64.rpm c5411622d6f2959ad7a96f2b886029ff00a3974a1283dc0e245e6791580a9e4f RLSA-2022:0825 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The following packages have been upgraded to a later upstream version: kernel (4.18.0). (BZ#2036888) Security Fix(es): * kernel: improper initialization of the "flags" member of the new pipe_buffer (CVE-2022-0847) * kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920) * kernel: local privilege escalation by exploiting the fsconfig syscall parameter leads to container breakout (CVE-2021-4154) * kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330) * kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS (CVE-2022-0435) * kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) * kernel: missing check in ioctl allows kernel memory read/write (CVE-2022-0516) * kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Intel QAT Kernel power up fix (BZ#2016437) * Rocky Linux8.4 seeing scsi_dma_map failed with mpt3sas driver and affecting performance (BZ#2018928) * [Lenovo 8.4 bug] audio_HDMI certification failed on Rocky Linux 8.4GA (No hdmi out) (BZ#2027335) * [Rocky Linux-8.5][4.18.0-323.el8.ppc64le][POWER8/9/10] security_flavor mode is not set back to zero post online migration (BZ#2027448) * iommu/amd: Fix unable to handle page fault due to AVIC (BZ#2030854) * [Lenovo 8.4 bug]The VGA display shows no signal (black screen) when install Rocky Linux8.4(beta or rc1) in the legacy BIOS mode. (BZ#2034949) * Double free of kmalloc-64 cache struct ib_port->pkey_group from module ib_core . (BZ#2038724) * Bus error with huge pages enabled (BZ#2039015) * Rocky Linux8 - kvm: floating interrupts may get stuck (BZ#2040769) * Data corruption on small files served by httpd, which is backed by cifs-mount (BZ#2041529) * Add a net/mlx5 patch for Hardware Offload Fix (BZ#2042663) * Windows guest random Bsod when 'hv-tlbflush' enlightenment is enabled (BZ#2043237) * DNS lookup failures when run two times in a row (BZ#2043548) * net/sched: Fix ct zone matching for invalid conntrack state (BZ#2043550) * Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel (BZ#2047427) * OCP node XFS metadata corruption after numerous reboots (BZ#2049292) * Broadcom bnxt_re: RDMA stats are not incrementing (BZ#2049684) * ice: bug fix series for 8.6 (BZ#2051951) * panic while looking up a symlink due to NULL i_op->get_link (BZ#2052558) * ceph omnibus backport for Rocky Linux-8.6.0 (BZ#2053725) * SCTP peel-off with SELinux and containers in OCP (BZ#2054112) * Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode (BZ#2054117) * dnf fails with fsync() over local repository present on CIFS mount point (BZ#2055824) none-baseos-rpms bpftool-4.18.0-348.20.1.el8_5.aarch64.rpm 9efcb7c6f8fb3a1704941216b35633be751b6bd4535fd9e59b9029507d6c8186 kernel-4.18.0-348.20.1.el8_5.aarch64.rpm 193c4892bff39230cfb99dab2b6938ecc4d57c3d558ada5a2208e7dab1be6792 kernel-abi-stablelists-4.18.0-348.20.1.el8_5.noarch.rpm 2a5eb00946fd216ea1d6a2be65cc5049fa92d266b54427e8b37c54391f5ef21d kernel-abi-stablelists-4.18.0-348.20.1.el8_5.noarch.rpm 2a5eb00946fd216ea1d6a2be65cc5049fa92d266b54427e8b37c54391f5ef21d kernel-core-4.18.0-348.20.1.el8_5.aarch64.rpm 4ebb56bc2deb8799ecd2160039c76bfee9f996505e0f091ab425eb2e67d48f76 kernel-cross-headers-4.18.0-348.20.1.el8_5.aarch64.rpm 530390229ec48510e99b2e0499f52bc4c21810df2227639d89bb3ef36f654107 kernel-debug-4.18.0-348.20.1.el8_5.aarch64.rpm 3e36f50bed2e1b35a04521d0d156c342789f8c73175cd4c47467c2f95bdfefb9 kernel-debug-core-4.18.0-348.20.1.el8_5.aarch64.rpm 170bb91253b96acdbcd0ba70b35b7224d4f96e947e139d88b348c7d9e44251df kernel-debug-devel-4.18.0-348.20.1.el8_5.aarch64.rpm c721fb7b4ca1d99aec0896779e7917e5de4cb76a7d0f322ef572552ded665a84 kernel-debuginfo-common-aarch64-4.18.0-348.20.1.el8_5.aarch64.rpm e602ed87b4bbcc6a291c2960a3250c0b953fa5660f02b1c7bb0a461d2aa19631 kernel-debug-modules-4.18.0-348.20.1.el8_5.aarch64.rpm 837bd3c64c1cd5e147aa753a6313512f2cc837666d384dd27c6a55ca96bc9f96 kernel-debug-modules-extra-4.18.0-348.20.1.el8_5.aarch64.rpm 3536b1d9e9d65cb826ab97f4c50691a848958d78ac1560f32c85de46740fd6fc kernel-devel-4.18.0-348.20.1.el8_5.aarch64.rpm def0faeeb114eba73a1bf6c00966ed3265e977658f86166752a9d6f5520e5965 kernel-doc-4.18.0-348.20.1.el8_5.noarch.rpm a98a9f9cd6ca173baf5ae5444199c81a88abcd520cb0048f132ead8c28faff3e kernel-doc-4.18.0-348.20.1.el8_5.noarch.rpm a98a9f9cd6ca173baf5ae5444199c81a88abcd520cb0048f132ead8c28faff3e kernel-headers-4.18.0-348.20.1.el8_5.aarch64.rpm fc08fe610b7deadd52b27a11dd3266565a6831fdfcddb70eed302418a471e649 kernel-modules-4.18.0-348.20.1.el8_5.aarch64.rpm 3b69d54ef849312bb31044d779e1ec733169545523f3307c25e9800b3de04513 kernel-modules-extra-4.18.0-348.20.1.el8_5.aarch64.rpm ea7d9d7c5a3cbb4f5cfeb3c7ce8bfe35244c3833151a35981326fcac44a4a99d kernel-tools-4.18.0-348.20.1.el8_5.aarch64.rpm 902fb5d25f32c7b4ceca0e034081ef59b995e6290e11f8ed67f46219949d72cd kernel-tools-libs-4.18.0-348.20.1.el8_5.aarch64.rpm 53fa1dd67cbdfd87577e77916c18c493ceaadbf62ad996f52d322dc58c8ef2c9 perf-4.18.0-348.20.1.el8_5.aarch64.rpm 0a82eb5cf71bbf3718f9f516f7d1b44f3e6ce9e981c3d3c95d823b0a7eb1186d python3-perf-4.18.0-348.20.1.el8_5.aarch64.rpm cef2296e45686114cd5eb559ad5b23ef478b82604a261ab599a6080aad2e93c7 RLBA-2022:0893 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * Rate-limiting mount events can make starting/stopping mount units unreliable (BZ#2037395) * Node upgrade failed due to "expected target osImageURL" MCD error (BZ#2038878) * Unable to ensure pod container exists: failed to create container for [kubepods burstable ...] : Argument list too long (BZ#2039327) * Update list of Rocky Linux specific network naming schemes (BZ#2040244) none-baseos-rpms systemd-239-51.el8_5.5.aarch64.rpm 5fb1e6eb5e0d49d6a70ea87c458cfad34ced9fa7f9cb92011108309921bdc43a systemd-container-239-51.el8_5.5.aarch64.rpm e710a1c5593fd343757f8109582e6019de104993fb87108a167b6f403b27b544 systemd-devel-239-51.el8_5.5.aarch64.rpm a273435e9c0c2a6c9f1a1b59a7519abdaf57c72ea78c24cc05d6797f9b7287fc systemd-journal-remote-239-51.el8_5.5.aarch64.rpm 653cac2f981c809a55858b539003f837129777cc4e609643c8058941acee8aaf systemd-libs-239-51.el8_5.5.aarch64.rpm 69559115179e95e4ebe6192386e22d1b1b14eefec94e27f936781050c5d8f373 systemd-pam-239-51.el8_5.5.aarch64.rpm 4dd3453fd36a99d4f3f597ccf265fb8d7f7379bb4194e6c2be90427f8e10101c systemd-tests-239-51.el8_5.5.aarch64.rpm bf7c046dcdb143e007e0459113ae6f80d25c8eba5e503d89f95b5e2f38bd8cfe systemd-udev-239-51.el8_5.5.aarch64.rpm f5bde6f59536e85099b72b4160da2787f9c10e2c9c28ed40ba4aed7b949aad9d RLSA-2022:0894 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261) * vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318) * vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359) * vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361) * vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392) * vim: Use after free in src/ex_cmds.c (CVE-2022-0413) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms vim-minimal-8.0.1763-16.el8_5.12.aarch64.rpm cf683cd3bd235ff13463e60cb237816db1a4f9714c4a4ada92efbd93c0f9b4a4 RLBA-2022:0895 linux-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es) and Enhancement(s): * Certain amdgpu firmware files cause random hangs with AMD Picasso / Raven Ridge APUs (BZ#2018309) none-baseos-rpms iwl1000-firmware-39.31.5.1-104.el8_5.1.noarch.rpm 5971236d7b88db6a031a5f080294ee5c573021203a416f588822bc9c388d2077 iwl1000-firmware-39.31.5.1-104.el8_5.1.noarch.rpm 5971236d7b88db6a031a5f080294ee5c573021203a416f588822bc9c388d2077 iwl100-firmware-39.31.5.1-104.el8_5.1.noarch.rpm 8f5dcdcd6d592b6318a2a7aff63d05ed94bc091af8824d135399d4575f36239b iwl100-firmware-39.31.5.1-104.el8_5.1.noarch.rpm 8f5dcdcd6d592b6318a2a7aff63d05ed94bc091af8824d135399d4575f36239b iwl105-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 5a35fffac404551f88b18ee23cff424867f5304f6b0ca30c425cc2827c85f7f4 iwl105-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 5a35fffac404551f88b18ee23cff424867f5304f6b0ca30c425cc2827c85f7f4 iwl135-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 7a34a0dae327ae13e83f0f65429a4cd3af24deb1f83e5c864e8173971b9b70e4 iwl135-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 7a34a0dae327ae13e83f0f65429a4cd3af24deb1f83e5c864e8173971b9b70e4 iwl2000-firmware-18.168.6.1-104.el8_5.1.noarch.rpm fe95918877a19a4bc80176eb6740d200a13f8392ab6bd8d626409b321b1fd622 iwl2000-firmware-18.168.6.1-104.el8_5.1.noarch.rpm fe95918877a19a4bc80176eb6740d200a13f8392ab6bd8d626409b321b1fd622 iwl2030-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 4b68d09bda08ad714aab6c4b9604681039de5bed53810cbf8d27455fdc7fec1c iwl2030-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 4b68d09bda08ad714aab6c4b9604681039de5bed53810cbf8d27455fdc7fec1c iwl3160-firmware-25.30.13.0-104.el8_5.1.noarch.rpm d7697e982a20504182b55a19d6fe7a9faec694a235f6f5eef2c7a19b1c58d57c iwl3160-firmware-25.30.13.0-104.el8_5.1.noarch.rpm d7697e982a20504182b55a19d6fe7a9faec694a235f6f5eef2c7a19b1c58d57c iwl3945-firmware-15.32.2.9-104.el8_5.1.noarch.rpm 81597e12252f521a5140a8026d82c5dd1bdcb00a265c5db8abde913834b8de80 iwl3945-firmware-15.32.2.9-104.el8_5.1.noarch.rpm 81597e12252f521a5140a8026d82c5dd1bdcb00a265c5db8abde913834b8de80 iwl4965-firmware-228.61.2.24-104.el8_5.1.noarch.rpm bbdb7120b1d626d9e15dcdcbe939435c5b1898ca6a3e7f3d00eec352ce0bd852 iwl4965-firmware-228.61.2.24-104.el8_5.1.noarch.rpm bbdb7120b1d626d9e15dcdcbe939435c5b1898ca6a3e7f3d00eec352ce0bd852 iwl5000-firmware-8.83.5.1_1-104.el8_5.1.noarch.rpm df8da30c67d4aa84a87e3f52804d1c97f7acb3a0a0e2b7a2a3cae531f4e5b7a5 iwl5000-firmware-8.83.5.1_1-104.el8_5.1.noarch.rpm df8da30c67d4aa84a87e3f52804d1c97f7acb3a0a0e2b7a2a3cae531f4e5b7a5 iwl5150-firmware-8.24.2.2-104.el8_5.1.noarch.rpm 890f0ab7d90170b68f6556358cb4c525657b9de606ef78dee5454df7576c2ce4 iwl5150-firmware-8.24.2.2-104.el8_5.1.noarch.rpm 890f0ab7d90170b68f6556358cb4c525657b9de606ef78dee5454df7576c2ce4 iwl6000-firmware-9.221.4.1-104.el8_5.1.noarch.rpm b4367bad8758aa9667fa6ccf953da4fd17af5c7d185d417a89cece3e66be736b iwl6000-firmware-9.221.4.1-104.el8_5.1.noarch.rpm b4367bad8758aa9667fa6ccf953da4fd17af5c7d185d417a89cece3e66be736b iwl6000g2a-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 1026573db9da2fce76d1518c51827cc95be2f6905fc5190259d46a6f68869b7a iwl6000g2a-firmware-18.168.6.1-104.el8_5.1.noarch.rpm 1026573db9da2fce76d1518c51827cc95be2f6905fc5190259d46a6f68869b7a iwl6000g2b-firmware-18.168.6.1-104.el8_5.1.noarch.rpm ec6d6a4ccbea8019443b461e229c14d1a37679bf65618db323309ccd7339ebff iwl6000g2b-firmware-18.168.6.1-104.el8_5.1.noarch.rpm ec6d6a4ccbea8019443b461e229c14d1a37679bf65618db323309ccd7339ebff iwl6050-firmware-41.28.5.1-104.el8_5.1.noarch.rpm 8ce1eede015ccecd5450b3f0f37e6ac06ea350bbef1fa8294cf70116095f9f61 iwl6050-firmware-41.28.5.1-104.el8_5.1.noarch.rpm 8ce1eede015ccecd5450b3f0f37e6ac06ea350bbef1fa8294cf70116095f9f61 iwl7260-firmware-25.30.13.0-104.el8_5.1.noarch.rpm 2bfe1c9155d1e3bc28f95a28c79bd17f35dbfd3740761e77d93dea735d5e7f0e iwl7260-firmware-25.30.13.0-104.el8_5.1.noarch.rpm 2bfe1c9155d1e3bc28f95a28c79bd17f35dbfd3740761e77d93dea735d5e7f0e libertas-sd8686-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm 57bb0b0c258d6601b67e2544c651aa8ccc57adbe0a7b77325c7309a427254e5b libertas-sd8686-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm 57bb0b0c258d6601b67e2544c651aa8ccc57adbe0a7b77325c7309a427254e5b libertas-sd8787-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm 31543ca05c6bab86d4944e4bae1862be6df81e359115bbd205a6d9259b26d6ed libertas-sd8787-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm 31543ca05c6bab86d4944e4bae1862be6df81e359115bbd205a6d9259b26d6ed libertas-usb8388-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm ba816ad95cf30d826e53cdd88ad16385a6b4d299687b82d85e47d92b87202a0b libertas-usb8388-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm ba816ad95cf30d826e53cdd88ad16385a6b4d299687b82d85e47d92b87202a0b libertas-usb8388-olpc-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm dc258bf711a04d0a31b4a46378fa01d80f63c5ff3ed5bf06db90a520331fc85f libertas-usb8388-olpc-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm dc258bf711a04d0a31b4a46378fa01d80f63c5ff3ed5bf06db90a520331fc85f linux-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm 16f6eabd02c348cabafa5e8ecb458eb50c7d0584fa4fe76bf1b1df5f11a84d67 linux-firmware-20210702-104.gitd79c2677.el8_5.noarch.rpm 16f6eabd02c348cabafa5e8ecb458eb50c7d0584fa4fe76bf1b1df5f11a84d67 RLSA-2022:0896 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Off-by-one buffer overflow/underflow in getcwd() (CVE-2021-3999) * glibc: Stack-based buffer overflow in svcunix_create via long pathnames (CVE-2022-23218) * glibc: Stack-based buffer overflow in sunrpc clnt_create via a long pathname (CVE-2022-23219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-164.el8_5.3.aarch64.rpm 244437947182b56de5ac498df0abba1b66b7b449465695c87ff2c0219059c806 glibc-all-langpacks-2.28-164.el8_5.3.aarch64.rpm 9c6855570588198bd49cd6403c22be576d5ec77183080a47d7003312af665d56 glibc-common-2.28-164.el8_5.3.aarch64.rpm 40c3e8471aeb9841f6ac886588f082f8fc9e4f15998988ec181355a994d9d254 glibc-devel-2.28-164.el8_5.3.aarch64.rpm a32a7971e01735b7d36f5a712953df2cd647b2d66104c00ae007fac6aa74e6ff glibc-headers-2.28-164.el8_5.3.aarch64.rpm 69995576b7bb2fee3a9a3a701deeeaf3bed33f1441a418bff1b651ef0e60ff0d glibc-langpack-aa-2.28-164.el8_5.3.aarch64.rpm 53872006d6351bdcc67a6ce2f0d82e7054e57fec6a4d46b3cc3b0ba09a19057f glibc-langpack-af-2.28-164.el8_5.3.aarch64.rpm 99ed42998d09ac5cc3474623fe1b8be4c455ce5d4e70de397a3ec3abfb40d122 glibc-langpack-agr-2.28-164.el8_5.3.aarch64.rpm eefac8faeadcf51f624d865e7b7e5fffd35e5722e9777445c95038454d1c4c8b glibc-langpack-ak-2.28-164.el8_5.3.aarch64.rpm 78337bf12f2a5daa58d21687da94b3febbfdb3bfea79ad9daab1a1799c9edd2c glibc-langpack-am-2.28-164.el8_5.3.aarch64.rpm abde1cf280934a0a6bc50c4294ba736e60c7501abcf254a4f5b5f025ef92e43a glibc-langpack-an-2.28-164.el8_5.3.aarch64.rpm 4c3708eb0d18ed1823178ad3d107c269fe4f01291de6f6d02c8b0feff7716fab glibc-langpack-anp-2.28-164.el8_5.3.aarch64.rpm eaa567a46c8ab4e59ac04fa8c3274024cee42f24ac943d4d25448141acd4c579 glibc-langpack-ar-2.28-164.el8_5.3.aarch64.rpm 9c87a06966f7b60acf8441490dff00eff4564312b3d147c5e53380e3f3a311d6 glibc-langpack-as-2.28-164.el8_5.3.aarch64.rpm ec34cd1027e7b40fe7e24efdf7aca99a4fbcc424201e679fc095ec56152a67d0 glibc-langpack-ast-2.28-164.el8_5.3.aarch64.rpm d5dbf3a5f26d1e979990aa6ba39d8608b0ba78c4460ac009e78e6733259df78c glibc-langpack-ayc-2.28-164.el8_5.3.aarch64.rpm b574eae206285b2838cdae5285b172ccbe6dd79286b4fe4bdaba075b6493fbfe glibc-langpack-az-2.28-164.el8_5.3.aarch64.rpm dac8c7ff78a1fc588fa1d583ba2bcc4d6280ed93b15396bc8699b197078c9359 glibc-langpack-be-2.28-164.el8_5.3.aarch64.rpm d6e6df19f259b4b23a97c24432c34e365e9c0bfe2b17498e82a334117564b2c5 glibc-langpack-bem-2.28-164.el8_5.3.aarch64.rpm 43bbe2a8181685b2dd14af72c86c6a4cd4d56eb85bf8f670fc35e7dbfefe0949 glibc-langpack-ber-2.28-164.el8_5.3.aarch64.rpm aa2ebab91d43894aadddb06706e6083d4c567353c90309b8447a920a2c071e4f glibc-langpack-bg-2.28-164.el8_5.3.aarch64.rpm d44c94153acaec59bf75a5e6f9f5b8feb72788f3eba6935399cc099bcbff7cb3 glibc-langpack-bhb-2.28-164.el8_5.3.aarch64.rpm b055f021821dfc90a31dfdf48c33b5901c393f2d1cf3ff6bd7bdfe5316f23705 glibc-langpack-bho-2.28-164.el8_5.3.aarch64.rpm 41ab7edf76a9c58a65b779b1e614137d8b5028b1815f9bca2bf1a703555fced7 glibc-langpack-bi-2.28-164.el8_5.3.aarch64.rpm b88772b7e4c91437a1aa6a4271a247185b1752223fc20a064ef439fb93aac6df glibc-langpack-bn-2.28-164.el8_5.3.aarch64.rpm c6938535e64a92a14e681700b09b1002e0944a5f0a10444142026f8627b40dcc glibc-langpack-bo-2.28-164.el8_5.3.aarch64.rpm da6f190425591663c9ed1cc28123011ee05664ecd4bf7355393cf01aed68a3de glibc-langpack-br-2.28-164.el8_5.3.aarch64.rpm 3ff05e636ac21cb862e690e47e61b01cde28ff95358df1039a652da28a4014b7 glibc-langpack-brx-2.28-164.el8_5.3.aarch64.rpm 094da2fad77e9a380a3c04af29ace5d23a409a374cf72f0913591e0260bf7755 glibc-langpack-bs-2.28-164.el8_5.3.aarch64.rpm a7589324f8fd80ff18711ef9a7170dbda8708f96d5d2fb1ba87798a8742fa999 glibc-langpack-byn-2.28-164.el8_5.3.aarch64.rpm 841b38067a61744265724c8683ee735c6ba3dd5b12e3917d6cf58ea4400f2400 glibc-langpack-ca-2.28-164.el8_5.3.aarch64.rpm 385ccbcd65b2cd06734eeedd98a6d8a682dfe055854bee49d52ef7d71f13893e glibc-langpack-ce-2.28-164.el8_5.3.aarch64.rpm 7c017986149af2db3d5deb98c61c0514283a992fe8e4ba4ee08f95d08244ad7f glibc-langpack-chr-2.28-164.el8_5.3.aarch64.rpm 3810241907e8ecbde5525b7e39e53195bd6661c95a5d6618baec035e62d1f9f9 glibc-langpack-cmn-2.28-164.el8_5.3.aarch64.rpm a5e2dec1349a5a102d0fd8e93ca0488cb74be06a15b778588b197e430fd50066 glibc-langpack-crh-2.28-164.el8_5.3.aarch64.rpm ca8f6ebfea3eb6b95c5d12f94ea26febd4e68239aeec5241ad3737651fd11b5a glibc-langpack-cs-2.28-164.el8_5.3.aarch64.rpm b1d5ca8ad4069bfb4c8cfb9b8219b95155b9782e834b7c38635b52b8d79857c1 glibc-langpack-csb-2.28-164.el8_5.3.aarch64.rpm 8633f376cb7b7c887ef97baf9f92fe7ab6349cfc48b793f32677b7df8d0dc0bd glibc-langpack-cv-2.28-164.el8_5.3.aarch64.rpm 4ddf7febd34fd70b35cbaec8aa6cad6bf315a311b69c32691c3d9f08a6cb9392 glibc-langpack-cy-2.28-164.el8_5.3.aarch64.rpm a651429b1ed7217d37fbb28f2c92362173ca0e1dd0812f72f5d26e26d96fb80a glibc-langpack-da-2.28-164.el8_5.3.aarch64.rpm ff42783dde0617539e2eaa1eb652f790126af92f8b0bc9a847aa67152ad3101e glibc-langpack-de-2.28-164.el8_5.3.aarch64.rpm bb6e5bab814888505352ee29213fb963c3dd36bb96b9dc16c5df9cbf810fdc1d glibc-langpack-doi-2.28-164.el8_5.3.aarch64.rpm 8d95dd4db34a09920bce1845bd75fa4574c61248b7f1077b0a9fafede0139b4c glibc-langpack-dsb-2.28-164.el8_5.3.aarch64.rpm c3309d169ee23bfd92d9bf5d3e8227826af871e9026c1988e9509d3b7b4156fd glibc-langpack-dv-2.28-164.el8_5.3.aarch64.rpm f684fbef11aafe252530d8dab287613185a55b4515ad57e08cef1745f1ee8eaa glibc-langpack-dz-2.28-164.el8_5.3.aarch64.rpm 5e4bd478ff28ec5c4caa51ff7d6b5c8cabc728797feeb77371f6fb0355c3abe3 glibc-langpack-el-2.28-164.el8_5.3.aarch64.rpm e1d4854ef7940a0cf50cf0d735df8f697df02d6ab7e6f87daf0a1d06cc29298a glibc-langpack-en-2.28-164.el8_5.3.aarch64.rpm d948fd4af67e7a36d7d2682e197f686e61cdfe95542fce241d64098b191cf570 glibc-langpack-eo-2.28-164.el8_5.3.aarch64.rpm 0abec857fd5edc02fdb5a035d85aab47570c55416bd3fb287284b8c96ffa0faf glibc-langpack-es-2.28-164.el8_5.3.aarch64.rpm c6b0afaedc217b92a2f983e36d711eeff7887a4fe83a74dc9b05d6ed92f4dd35 glibc-langpack-et-2.28-164.el8_5.3.aarch64.rpm 1d4c463426ad405acb4fa1aa652f8429224bd09bec938b123f6306ef37b59ea2 glibc-langpack-eu-2.28-164.el8_5.3.aarch64.rpm a52a90c8b9860fbcf2235ef4517b15b9fc1147e17cc1ba820621d5a4ffe72bd8 glibc-langpack-fa-2.28-164.el8_5.3.aarch64.rpm fc564a1b79e0fa8dec0a2a1415c344380b22049f7d6ba6ce754fe3fa5a84a4c1 glibc-langpack-ff-2.28-164.el8_5.3.aarch64.rpm a9b57c6bbf9cd1ed3b3424bc136a06a49e18d0b72e695d34665f12c3a7935a08 glibc-langpack-fi-2.28-164.el8_5.3.aarch64.rpm bbaab335abe18030685f1e59f7fe646d4d91ad2be44a3e848e1358991fc5ab08 glibc-langpack-fil-2.28-164.el8_5.3.aarch64.rpm 977a233c5effc544493a80a727614a9aa4447cc716d4f5048ddcc2c2a184e85e glibc-langpack-fo-2.28-164.el8_5.3.aarch64.rpm 3ba893c9cf236304e407dfa9c4c0e8bc7ac82d855dcabb5a54e35f636cc2a073 glibc-langpack-fr-2.28-164.el8_5.3.aarch64.rpm 98a62ae694ac3891b9732bad7e6e3d6974db2b5bb6601b3f649f442b5e42d93c glibc-langpack-fur-2.28-164.el8_5.3.aarch64.rpm 3c3342eaea2ac8e67f555e2070d0003668f0d2a4ace7f3cf22fa3ed02a26aefc glibc-langpack-fy-2.28-164.el8_5.3.aarch64.rpm 14f9525caa6b0d04f9ec760a06e92a08e7fc49f79ec7c7cb6085079626f465ad glibc-langpack-ga-2.28-164.el8_5.3.aarch64.rpm c8305c6e3e0d4a9381d6d06697ff0bc88136b52c7e3cbe8bc2bfb2a45f7750d3 glibc-langpack-gd-2.28-164.el8_5.3.aarch64.rpm d0c4547ac3e635990f1ae48904872dd92566dd7a26285adefa655a7ce1948967 glibc-langpack-gez-2.28-164.el8_5.3.aarch64.rpm 61c6b4c9047267e431955440eb37e02d29c0f8d4c13741be79b8b7872da680d9 glibc-langpack-gl-2.28-164.el8_5.3.aarch64.rpm edd456d0b19aec754ab01a722dad2bb0cb357b257669aa44f4a9d5c24fe2d77a glibc-langpack-gu-2.28-164.el8_5.3.aarch64.rpm 0a94ccd40a1203177faf51380277e4d4bdfaa9a567713c889a4348000a04bec8 glibc-langpack-gv-2.28-164.el8_5.3.aarch64.rpm 73327c084cc0238d8b4fd3881702af5c9574a9ef4bc79de0e3fcbbf08f2b8d84 glibc-langpack-ha-2.28-164.el8_5.3.aarch64.rpm f4b0bf156a15620fa613a28b8603ff644b9fd43b9d2179216f21b1b487f19c5d glibc-langpack-hak-2.28-164.el8_5.3.aarch64.rpm 1ada366f3d541663ebe0f6cee22b035f8cedcbb1d5ed859cffbb2e67200fc733 glibc-langpack-he-2.28-164.el8_5.3.aarch64.rpm 50b6a080b6bf479196c550ee7245916eb6e1939ac1b6acc84470bd2202dc34fd glibc-langpack-hi-2.28-164.el8_5.3.aarch64.rpm e65c6430db3386399656974c546f3cc3e3f5dc0b3f41a8831ab43b6c9570f6a7 glibc-langpack-hif-2.28-164.el8_5.3.aarch64.rpm e6e58f7cf81ee76da7e13e23332383377a1d48b2ebd43b0b13e61fcbf39593ec glibc-langpack-hne-2.28-164.el8_5.3.aarch64.rpm 928572345cee59250fe371b8e84bc0d7c0ae0a931b3e5c3c2ed0438a0da7363b glibc-langpack-hr-2.28-164.el8_5.3.aarch64.rpm 27e52c979f51ba6538250eed6dc79bdd56b045a6ba7a042904987ecfd225b473 glibc-langpack-hsb-2.28-164.el8_5.3.aarch64.rpm cdf8048d8f9f4b14be32d77820195f1947b974f9f92c30beb4bb802763332ac4 glibc-langpack-ht-2.28-164.el8_5.3.aarch64.rpm a72b0a7e86e312a126bcd0a153186264097e3067e26251aa0911483af1da54f1 glibc-langpack-hu-2.28-164.el8_5.3.aarch64.rpm d55146177fc057afb3234e2b4a7aad2dadbba7dfcbe96def662509cf8583e854 glibc-langpack-hy-2.28-164.el8_5.3.aarch64.rpm 525c9a9e18d77499ee489f9744413920b3bb04b21b1d9dad941dc849187ec8c9 glibc-langpack-ia-2.28-164.el8_5.3.aarch64.rpm 60f150b33f6bc0a7c69e0a35e73a80b1eecc0ca91e5a2605ee1683fb995d7ebd glibc-langpack-id-2.28-164.el8_5.3.aarch64.rpm d9466bcf8405b82f746bb9a20db29d24319f7486313b1f1b02d9bc956dde6d2b glibc-langpack-ig-2.28-164.el8_5.3.aarch64.rpm cce74930463aa585bc09f9565f862b13290425ac5e074c28637728c951a6057f glibc-langpack-ik-2.28-164.el8_5.3.aarch64.rpm 85a6c81726c08a7d29c5c7d6d6adcc444eb946fc530fe049ed63919481c2b29a glibc-langpack-is-2.28-164.el8_5.3.aarch64.rpm 47d772f9150c7ed1162621f5183a0a214312f491f23b72d473426eaeb473ba2b glibc-langpack-it-2.28-164.el8_5.3.aarch64.rpm bf3a9bdf2dc6b6f4e1b3df9f211e926d4179e73c9196d29d7008849c1878896e glibc-langpack-iu-2.28-164.el8_5.3.aarch64.rpm ee650a7a0e642cf953c6bb340f297e288c06de5b63fb606e37e52bf90f13f796 glibc-langpack-ja-2.28-164.el8_5.3.aarch64.rpm 407f2dee0c5ef409f140739e22ec17d95a7aab02ee198f7182183dbf9f4903da glibc-langpack-ka-2.28-164.el8_5.3.aarch64.rpm f666beeaa2bf3228ad4322d9a8a7b0d3987a220816a402820ebc9cbe70cf562a glibc-langpack-kab-2.28-164.el8_5.3.aarch64.rpm e6e9b4954dab0bddf68c3f23e1377a702d85197932e00ba04d26c14179fa818c glibc-langpack-kk-2.28-164.el8_5.3.aarch64.rpm f4aa9e352a0945202e5b8d5ae76028e21ab4ab8b4ffda277c06e34771e8ec366 glibc-langpack-kl-2.28-164.el8_5.3.aarch64.rpm 94a6801fc9ca02dc39bf84a56da978fab6de92cc779ef50350239c026d9bd74c glibc-langpack-km-2.28-164.el8_5.3.aarch64.rpm d2f1b15f3bd20a4c6e808dc34e802a4a55f76c434c799d588586039798240893 glibc-langpack-kn-2.28-164.el8_5.3.aarch64.rpm 2c46580ff54ce4bf0e01c86951830798e084d461964199994f54d6ac7f33181e glibc-langpack-ko-2.28-164.el8_5.3.aarch64.rpm c90355b6d0c5dfb02903c72ef07397e46b3205e3bda63232ec676d633979a75a glibc-langpack-kok-2.28-164.el8_5.3.aarch64.rpm b7659c855d33be4b0e1d25a52645482c7998959ab8a7eaff13985c965737504e glibc-langpack-ks-2.28-164.el8_5.3.aarch64.rpm d3c78de6aa3160b8529be73180e35d9795e56a419ca1553efe5bc3b175d91ee4 glibc-langpack-ku-2.28-164.el8_5.3.aarch64.rpm c9cb55619c7a3e42353dd095705bad4ce293df2e5e4720b30ad7a21dddf8ae1f glibc-langpack-kw-2.28-164.el8_5.3.aarch64.rpm f3b52ec493fbeee7d79e3da427d3963716bab9bdc26de1f377b9c9b99e797be5 glibc-langpack-ky-2.28-164.el8_5.3.aarch64.rpm 16ff67a40dd5b8aa30f02bb77aefd88a9bbc21648dac2bbe9b8ccf5429ffe038 glibc-langpack-lb-2.28-164.el8_5.3.aarch64.rpm 3c0e4e06fd4c4cc8a4ca74f10fe0c06b4f88d22159ce6f6d5088a9ee7d0cd10b glibc-langpack-lg-2.28-164.el8_5.3.aarch64.rpm 715c9ee543085e803eaad234e5af64bf8e8a6a9b8d32638752c7081026ed15e1 glibc-langpack-li-2.28-164.el8_5.3.aarch64.rpm b136e8cae685fc3bc7ed9fc01191d8a9c6cebbf112c6b7bde5af1fef89a5d04a glibc-langpack-lij-2.28-164.el8_5.3.aarch64.rpm f4346eec2ba87be154be99fbd04776027102cd5e7063ee315c6f099f67c6d209 glibc-langpack-ln-2.28-164.el8_5.3.aarch64.rpm 3449207eccb9e5b9b50cdb2a46c25a8c7bac44df926c30c406b114b668053ed7 glibc-langpack-lo-2.28-164.el8_5.3.aarch64.rpm 22080ee9f09bfe601ba152c03146af5f9281a3495810ff1022cba87d6e1cc525 glibc-langpack-lt-2.28-164.el8_5.3.aarch64.rpm fa778f6d8414bdc5800e83e285db48b13ce4b35bf85f5432c79263682639cb26 glibc-langpack-lv-2.28-164.el8_5.3.aarch64.rpm 0942da01b8ffccdd2899f30e5f281655e19e947b6b37191edc2bc2fc8279ede6 glibc-langpack-lzh-2.28-164.el8_5.3.aarch64.rpm c808456f0b1291de7b55fe86461cf552403b07237178b1624f78bd95c6db9f89 glibc-langpack-mag-2.28-164.el8_5.3.aarch64.rpm ef1e500f340e43ea2b36da4736dec8a6fa8be57b487c7c4ddbae1f50147c3798 glibc-langpack-mai-2.28-164.el8_5.3.aarch64.rpm ab508c6f8bbd69af4de383ed7d1deafbb065934337fc31d394ff8d04b1c47058 glibc-langpack-mfe-2.28-164.el8_5.3.aarch64.rpm 6c0f83b8111cd5cf1bad09ed5bd763c7455306ee4343e3bb4db5c63615b8f851 glibc-langpack-mg-2.28-164.el8_5.3.aarch64.rpm ec68c654bc355966e48cac98172cb9217ad23b1eb116542fe68ad3faf7a92567 glibc-langpack-mhr-2.28-164.el8_5.3.aarch64.rpm 12623c795b4d8e5a679f4d2e8d8c8dc51b6051faa3199b51dcecd70f94e1a657 glibc-langpack-mi-2.28-164.el8_5.3.aarch64.rpm 3a368ba0dfc187fb0085f1aa82c4754a14d7888f68c561a34ecc7599c8845c09 glibc-langpack-miq-2.28-164.el8_5.3.aarch64.rpm de445a97ef1ef876ca9f804825c91c6972a6c6d58aef61a2650d71f97a1d6451 glibc-langpack-mjw-2.28-164.el8_5.3.aarch64.rpm 5470f0f6bf38465b563eb1b9d60c935e5537ff7133b958ef7ce380d02a085478 glibc-langpack-mk-2.28-164.el8_5.3.aarch64.rpm 0d63b8bf99fc06e12344d76f528d56ee45588a9d6e996c269dcaa987dfafead3 glibc-langpack-ml-2.28-164.el8_5.3.aarch64.rpm 4bf7d43e218e573b6a995a4ab459e55e9e94489a3aba2ea7132b22c17bb1cbcc glibc-langpack-mn-2.28-164.el8_5.3.aarch64.rpm 6aa4861b2391d8f96155e5288fa9296d7e0f5ea89452d5d6939fc42694ac6ec7 glibc-langpack-mni-2.28-164.el8_5.3.aarch64.rpm d8b79b88678150ca60050b8c9b67a828051c0f649a90f3c0f9049bdb9423baa3 glibc-langpack-mr-2.28-164.el8_5.3.aarch64.rpm d2e0c1331707360fb01c10c3d9f76d477990de5fc3fc6c909ec979b1ab7064e4 glibc-langpack-ms-2.28-164.el8_5.3.aarch64.rpm 32745bedf3306d302c2c56bf9c4cfe4e01a44ce0ad9697baee69c8acda7c3cf9 glibc-langpack-mt-2.28-164.el8_5.3.aarch64.rpm a39e74eb5818d3a567c3228a27f84ca94d238d57c374cf609f0599b314070ff9 glibc-langpack-my-2.28-164.el8_5.3.aarch64.rpm 30d94a10e0ef963060e534346302521963ea798e1a6c57f6fcae2794e1b85db0 glibc-langpack-nan-2.28-164.el8_5.3.aarch64.rpm 7ddca503d421a28342a901db0063d3f16c080e74362be699148e4244117c5932 glibc-langpack-nb-2.28-164.el8_5.3.aarch64.rpm aff340a2891038abae785faef4ba770f50128c3c71e8de0d28d3f4524ca45699 glibc-langpack-nds-2.28-164.el8_5.3.aarch64.rpm d0ba61d8b24b826a48dd61d5c7ecfb23033a9cfc29cc664d075c9d89e3a58ba8 glibc-langpack-ne-2.28-164.el8_5.3.aarch64.rpm e56acc6afb680b9693f4a1260c006a23011d44eccf1a5e8b5b14d306ecca32ee glibc-langpack-nhn-2.28-164.el8_5.3.aarch64.rpm c827474073aa1d86139603d2f7e4891c05a55e92a208c418a91af4ffc2416fe5 glibc-langpack-niu-2.28-164.el8_5.3.aarch64.rpm 509994d8e02f09d6490e7e502cc997a3a66a26f54e156fb2bd99088ed39be81b glibc-langpack-nl-2.28-164.el8_5.3.aarch64.rpm 23700827983dd190bb815f2a51e7452b7081e3bbae6b01a1250da4ca07bc3c23 glibc-langpack-nn-2.28-164.el8_5.3.aarch64.rpm 9480be1ab3f34220fd1c01e0dd5f2e2ebd63d41703a5d3eed8f6b1c4140b9088 glibc-langpack-nr-2.28-164.el8_5.3.aarch64.rpm b4915cfef76056e5ffc35d82b63939f6b2ee8b3b6f04892ca682b14979ad68c6 glibc-langpack-nso-2.28-164.el8_5.3.aarch64.rpm a556d3e40db42d949cd2e86ee72b65a17a7f5305a8b857327457100bac1d2e09 glibc-langpack-oc-2.28-164.el8_5.3.aarch64.rpm e12985ad74a6513026eedfb1be4676c7f4c50fd9e23bc68398a47de0a53b9dba glibc-langpack-om-2.28-164.el8_5.3.aarch64.rpm 29f971b8381b785a9ecaa50295109c1bbfa1f65afff297b56003c7aed92fa6d1 glibc-langpack-or-2.28-164.el8_5.3.aarch64.rpm 7da7046b4088eb3205c018fcb796b568807df3cc7e91f167d8d9ee5a83665c89 glibc-langpack-os-2.28-164.el8_5.3.aarch64.rpm f1c9e1166689ec8a404648510b0af109df563b4e8821f916ed8b10040766d840 glibc-langpack-pa-2.28-164.el8_5.3.aarch64.rpm 1329f61ced1a8952204427268ba2676f7012fab58bd9d954c8b0ecd496fbe9a5 glibc-langpack-pap-2.28-164.el8_5.3.aarch64.rpm 4cf8a81be833972f356f3beba906277cb34700ec74aec4b7c6ce03079e0be7fb glibc-langpack-pl-2.28-164.el8_5.3.aarch64.rpm fd40530a122fa0fa6d162653f1941a953f26e5304e79cae34c97e6a65cc3c6db glibc-langpack-ps-2.28-164.el8_5.3.aarch64.rpm b2113b696feb55766f3140959befac129cb9ce3ac4d7f26d816f759252bbdaa1 glibc-langpack-pt-2.28-164.el8_5.3.aarch64.rpm 1798bbb5950d1195fab496e87d9044411de0559977ff6a9f9f81ab28c3af915f glibc-langpack-quz-2.28-164.el8_5.3.aarch64.rpm 415fc384c1e98c292fbbbd1344a91d028cfc2749d154cddb8b4fe7ae0cde7bf4 glibc-langpack-raj-2.28-164.el8_5.3.aarch64.rpm 8dda6aa1e912a9d864f6ab0412e9ae422284de7349296ac9311bfb99615c3aa2 glibc-langpack-ro-2.28-164.el8_5.3.aarch64.rpm 17dfb360e23c78280c405fe2420e7f79629721a3137149717e6eb405549b9717 glibc-langpack-ru-2.28-164.el8_5.3.aarch64.rpm 02abbed1c68c06a88ab1127d2c7351c811c4569ca795702fff95da2cf02fb99f glibc-langpack-rw-2.28-164.el8_5.3.aarch64.rpm c246e81e0f461afa25ab20e5efdf4f07bd00a79465c95a91e4409b758b97741a glibc-langpack-sa-2.28-164.el8_5.3.aarch64.rpm e93b4e436b44cfb265271237ab7a08b80fac01fe6a32ffc6852e48a4695ab95b glibc-langpack-sah-2.28-164.el8_5.3.aarch64.rpm becb123650cce915dc9c61bbae43c58e286dd22372542f54cff5bff0ce4bccfe glibc-langpack-sat-2.28-164.el8_5.3.aarch64.rpm 8c5591ae5b22e321461095f691296988a6edf4d69815e90420b3e7f6a7b096da glibc-langpack-sc-2.28-164.el8_5.3.aarch64.rpm bf5ff1ce1f0e4f31d482e4a3e15ddf45904855c894f8881c65de171847193ab7 glibc-langpack-sd-2.28-164.el8_5.3.aarch64.rpm 61211b8b99f9c77599df904113201f15a79cb8e06cc9c92105024c2612b8d5c1 glibc-langpack-se-2.28-164.el8_5.3.aarch64.rpm 2246e0e184abdfa3f1ea31725104919fc2d066f7db68dd592c1ec4e56baf44b5 glibc-langpack-sgs-2.28-164.el8_5.3.aarch64.rpm 74d0775a9f2f6d63a942738e4e8485f4754c3af64c25ed6f953810b336e5e07a glibc-langpack-shn-2.28-164.el8_5.3.aarch64.rpm 7e0efe451e8f7c58c6a75e0389355d7dee0389f470939d94ebefbb081aed0927 glibc-langpack-shs-2.28-164.el8_5.3.aarch64.rpm b417369fa8d92c15e0d04a816464cecf13f75845ce957e2782cdcdf4c123810d glibc-langpack-si-2.28-164.el8_5.3.aarch64.rpm 3366a9781566d45a01971fc1fcb3c5a2d50415397640ad1c5cc45db81e6b9c8b glibc-langpack-sid-2.28-164.el8_5.3.aarch64.rpm 26a0b2941805defc8feecf62aaeca963b088592362d2d0966fb0377856fbb886 glibc-langpack-sk-2.28-164.el8_5.3.aarch64.rpm cae5c484a695e61f46ec3cbf08cb0e081d348973db49e753a2d68d89973c48ac glibc-langpack-sl-2.28-164.el8_5.3.aarch64.rpm 8b121e9ce88dac6b62ba4142711becf2d4927d5631894b5fc839eae4248d4d70 glibc-langpack-sm-2.28-164.el8_5.3.aarch64.rpm 29992ac902963d67b6a4589ae82e85c753323b040baedaf02c10f07367c9d105 glibc-langpack-so-2.28-164.el8_5.3.aarch64.rpm ab849e2ecf585388efb22badbc6375ed58989426593d12215dea1e42977a48da glibc-langpack-sq-2.28-164.el8_5.3.aarch64.rpm 9de1e007d8984688b71f960459bd4ca9cbbcbf0a416ee82650e73cecae2a92af glibc-langpack-sr-2.28-164.el8_5.3.aarch64.rpm ef020b23bb01c94d07ce7d4fedaeb2f9808ae2fa001b60a99da3d7661e44434b glibc-langpack-ss-2.28-164.el8_5.3.aarch64.rpm d97472a628863abfc59d2d86172d6f8d1a116b007f79ec7d1977c33aa1af362f glibc-langpack-st-2.28-164.el8_5.3.aarch64.rpm 9c20c86b371db668220704b1ac9482f912007b53c6f301d0e08e7e6f6d3f9a2b glibc-langpack-sv-2.28-164.el8_5.3.aarch64.rpm aecd45882c69c40e92231ae0e0f37c658e3cf524c2db2821e60510abc5f4890c glibc-langpack-sw-2.28-164.el8_5.3.aarch64.rpm 8bb98f10e232d4475f133c6fc7d73e735b1d4b551d95ed73e9939129e8d12a0c glibc-langpack-szl-2.28-164.el8_5.3.aarch64.rpm 2dfc58082a61f58cc1b5ee05c3f0505f5b9ba20a7b5f5aca81fc759343f9a9d1 glibc-langpack-ta-2.28-164.el8_5.3.aarch64.rpm 4a3e4cddc88716f2763d6bd979a6e749ddf6ae3edeff3455a4986eb69497e1ef glibc-langpack-tcy-2.28-164.el8_5.3.aarch64.rpm 404c49c0fb1c2c86da2285560e3d84d5c44205584b0f12b001bda8d81af0cdbb glibc-langpack-te-2.28-164.el8_5.3.aarch64.rpm c580d423c29f872e2b0ce2f1cf23d784d10c1c51709c39a39d1284be5f39b926 glibc-langpack-tg-2.28-164.el8_5.3.aarch64.rpm 94ec2b4a5c8c60d98fd33d2277a27e3cedd73c4f8b5d389048a2d65ed755ec47 glibc-langpack-th-2.28-164.el8_5.3.aarch64.rpm 1c0a549024671a0b2343b8f8dc0f3be9b1cec47d220355d90b38659f11bd0be2 glibc-langpack-the-2.28-164.el8_5.3.aarch64.rpm 6492e7d5d1b536ccee768d089f40b7486eb929ab0f527c3478a4f2b4e0655ce4 glibc-langpack-ti-2.28-164.el8_5.3.aarch64.rpm 2ea94398ff524a508e683d70f29717d46c611db2796c18c45d6cc20f6cc52f32 glibc-langpack-tig-2.28-164.el8_5.3.aarch64.rpm 2bd7bf1cb4ab5c027e755c7e9d623097b3f904c539191c36f4f4cabe2dd98aca glibc-langpack-tk-2.28-164.el8_5.3.aarch64.rpm 4aab342381a472177ad21791e70c0cc55f02503a72a9712c7bd5c45508f392d8 glibc-langpack-tl-2.28-164.el8_5.3.aarch64.rpm fcc8d944858847c61dfaad4fe09c15cb208b1c88acaa4ef4b6d8d1008ebdd84b glibc-langpack-tn-2.28-164.el8_5.3.aarch64.rpm 9b74aede4e377e163276cebc9e1a6b062e225d55536dffac93004271e0c0c29e glibc-langpack-to-2.28-164.el8_5.3.aarch64.rpm 8c45e835c52ecb5c291dc107eb844f2a343baf806743fb0fcc6a6cae07fcfef6 glibc-langpack-tpi-2.28-164.el8_5.3.aarch64.rpm b121932b6d69276ce13ddcde8fc2d8cb020aa6b27e9465164b19a9e53565cb19 glibc-langpack-tr-2.28-164.el8_5.3.aarch64.rpm 8840ea2049ff1bb1e2c5ffb0bdab8dc40c18e7da6555b0eb98909c62b6afd591 glibc-langpack-ts-2.28-164.el8_5.3.aarch64.rpm a20c8f1f1fb4f26b0c8ce1f24aa97638aebf13785c9011166643b63a7a84746c glibc-langpack-tt-2.28-164.el8_5.3.aarch64.rpm 4259731ba15e02983ba28287b5ffbc9ec534fa36a59b45d115d4bf1de516dd85 glibc-langpack-ug-2.28-164.el8_5.3.aarch64.rpm 986b57a7c0cfd825d89855fa7062bff39a5b6a6f94260d0993d7945445e09976 glibc-langpack-uk-2.28-164.el8_5.3.aarch64.rpm 0882e389c2022038b811b5ff2380a79c460ba200c50f09bb3b617a65af5b9572 glibc-langpack-unm-2.28-164.el8_5.3.aarch64.rpm 6a86706dc0df717efdd9968102620db494f7101382f842639976aa9627498afb glibc-langpack-ur-2.28-164.el8_5.3.aarch64.rpm d2aef17f70b441f1eed23490e1d356b7739a28e96604ba8937cee004a86126e4 glibc-langpack-uz-2.28-164.el8_5.3.aarch64.rpm 71ba6def3c3b9f421e47aaf1311c8a55a7cf01bdf38a2038d7a35ad2a6fe79e0 glibc-langpack-ve-2.28-164.el8_5.3.aarch64.rpm 3b1e2c8ba2119599dc2260a2a5b411caa150135bf23157ed333b5283b7c45702 glibc-langpack-vi-2.28-164.el8_5.3.aarch64.rpm b641fdf70c987d1317ca42ed9824110c0ff4194c5e05b83f0e3e2d2be00ecba0 glibc-langpack-wa-2.28-164.el8_5.3.aarch64.rpm d1a19727d15959374510756c7125d558845acccd190f1e0047a2ba533b301af8 glibc-langpack-wae-2.28-164.el8_5.3.aarch64.rpm 3b6246f3cf301d9c9e6d6b3eca740a29237026de42466d7d79b042ebe2bea11b glibc-langpack-wal-2.28-164.el8_5.3.aarch64.rpm 0ab1f20759eb84418df6bbf5d2c47a7c14cbc9c1a99da7789dd4b56c73b32c8f glibc-langpack-wo-2.28-164.el8_5.3.aarch64.rpm 439bab6a8dc8f01fcdcabe416516f1307cf0a860a3cc7fff0e259b7b0dded946 glibc-langpack-xh-2.28-164.el8_5.3.aarch64.rpm b6474b69a59ea4447a967420bc3ae1ac9de8ea82df37ad0402dc56c7a8549200 glibc-langpack-yi-2.28-164.el8_5.3.aarch64.rpm c10ba20cd82c9846862ddf2831b45ad3bb1a58fa492d06b6a977fd0f9b75d955 glibc-langpack-yo-2.28-164.el8_5.3.aarch64.rpm 57e76e86b46ca4b27f7110c82f6cc12ad642b184df1e912ecd34b554a4869aea glibc-langpack-yue-2.28-164.el8_5.3.aarch64.rpm 61a2f84c837e20b7379f4d5ea2bda586a8d1368d0d3b260279216ea2e84240c6 glibc-langpack-yuw-2.28-164.el8_5.3.aarch64.rpm 1acdea34f45118b60dafdc61fcff75fe9c96c5096327a3c6bf3805b3b22c520a glibc-langpack-zh-2.28-164.el8_5.3.aarch64.rpm ba4361721ee753dfee8f5a67bb106bd2186755b51f353b72413f08bf36ed2643 glibc-langpack-zu-2.28-164.el8_5.3.aarch64.rpm 08a46072a5a9b2503c416fff916fa3d74995250cdd18b6846cf874d7b04ad03c glibc-locale-source-2.28-164.el8_5.3.aarch64.rpm ae091a904dad0204b4778f7d13a2336ca59b7e66644a0b7c03850a61ff4a3698 glibc-minimal-langpack-2.28-164.el8_5.3.aarch64.rpm 3fed75cad12c113fb0de8515552616ef5907091495808b68ef5c1007b0fd16b2 libnsl-2.28-164.el8_5.3.aarch64.rpm f8e65149f0fa7ebf2d5b646f3a2aa1a0ad78bfe41346f4491a938828223c95d5 nscd-2.28-164.el8_5.3.aarch64.rpm 4a12e6a21842ce8afd4f0dc01574b564819be7a6653efd6a242a37495ac4e752 nss_db-2.28-164.el8_5.3.aarch64.rpm 1c95d85dbb92771dbbe3b71939e8480795517a152741bb8abf7dd2104ca9aed6 RLBA-2022:0897 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Bug Fix(es) and Enhancement(s): * Subscription manager sends redundant requests to the server in SCA mode (BZ#2044349) none-baseos-rpms dnf-plugin-subscription-manager-1.28.21-5.el8_5.aarch64.rpm c72f677a693d6a4fbd35d05335f81721c6aa14b6e1a5be3ef0efea2a26a96419 python3-cloud-what-1.28.21-5.el8_5.aarch64.rpm 36066a72408669277fcf99dd6d339585d1b22c7e33d77bcf58bbdb62cd33d2df python3-subscription-manager-rhsm-1.28.21-5.el8_5.aarch64.rpm f3b212961f23006b7832571e8c97d478500d66ccf3cc76094fcdead58fb523e6 python3-syspurpose-1.28.21-5.el8_5.aarch64.rpm aea53d6e1f8773faeddd8402c3bfae983e349043b6a5bf3ab4185b5f43350ce5 rhsm-icons-1.28.21-5.el8_5.noarch.rpm 2685ec43ee279e459a4e6e722f32e4e3eb7087a00b2d7aaa99f71e9a28adf3ff rhsm-icons-1.28.21-5.el8_5.noarch.rpm 2685ec43ee279e459a4e6e722f32e4e3eb7087a00b2d7aaa99f71e9a28adf3ff subscription-manager-1.28.21-5.el8_5.aarch64.rpm 88738298107bce3280952931ca110d64f03a1934045af013ab4bf5d54c114b1f subscription-manager-cockpit-1.28.21-5.el8_5.noarch.rpm 8a9c0c944b8df10798df233f84311648e146559bf94e9c880bb061cac9a32b09 subscription-manager-cockpit-1.28.21-5.el8_5.noarch.rpm 8a9c0c944b8df10798df233f84311648e146559bf94e9c880bb061cac9a32b09 subscription-manager-plugin-ostree-1.28.21-5.el8_5.aarch64.rpm 693d6551ae48c618b820ed5ed26aef0ef298be58826107405baafff05338851f subscription-manager-rhsm-certificates-1.28.21-5.el8_5.aarch64.rpm 7e57c28fcdfa1dfd7c747d3f0ba55cd263b8c6c5343e5e418ba8735657002c89 RLBA-2022:0898 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups. Bug Fix(es) and Enhancement(s): * Multiple concurrent lv refreshes fail (BZ#2040514) none-baseos-rpms device-mapper-1.02.177-11.el8_5.aarch64.rpm 521ffccfbc8d484ff9b18a5ab97459c187357aa501a0409f3ff4d860b24e855d device-mapper-event-1.02.177-11.el8_5.aarch64.rpm 35862aebbf56b25a9b2f96ac2810be50620a67907608cd62a8f44ce7b3eb2102 device-mapper-event-libs-1.02.177-11.el8_5.aarch64.rpm c279af2d897ce83ff908c2fdb0a5a078953f0b08930c4a3e1f7e7a8f193fc2ef device-mapper-libs-1.02.177-11.el8_5.aarch64.rpm 99dbbb97be21262161580e2a80cef8ec56d8c789b49476baed8137703a419f18 lvm2-2.03.12-11.el8_5.aarch64.rpm 4b7433760f934952dc11efbf64aaa2fdb2da5b6edb2ebfc73aabc0ff1ca3131b lvm2-dbusd-2.03.12-11.el8_5.noarch.rpm 69860ff90bc2ad064336263aa08fef9f84c20a0d158f01b03411236748e9d60f lvm2-dbusd-2.03.12-11.el8_5.noarch.rpm 69860ff90bc2ad064336263aa08fef9f84c20a0d158f01b03411236748e9d60f lvm2-libs-2.03.12-11.el8_5.aarch64.rpm ea10555b2b1cd1cebe43b862fa922df8baca442076573c6e30b29d42eca21963 lvm2-lockd-2.03.12-11.el8_5.aarch64.rpm abc8c08980a8db7932759b6ce260844135b9b0a3858dd9b2954d0e62a1aa29a8 RLSA-2022:0899 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use-after-free of ID and IDREF attributes (CVE-2022-23308) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-12.el8_5.aarch64.rpm ecea1a83179849b01e69e7a6be133d8bf732c24b8143550a01193885925bc337 python3-libxml2-2.9.7-12.el8_5.aarch64.rpm 78ff774087ff4955382d305811b02d0f490ffe119b2b193a1488c141b607f31e RLBA-2022:0900 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba 4.14.5 - virusfilter_vfs_openat: Not scanned: Directory or special file (BZ#2056877) none-baseos-rpms ctdb-4.14.5-10.el8_5.aarch64.rpm 1fd4f2aadae98b93622035cf94c85f2ec57bb208a7485823807750705f6f6b4e libsmbclient-4.14.5-10.el8_5.aarch64.rpm 21426d0fd07b0f9cbe9db06b829a590bdd661d657b978360a28c39ebd82425a7 libwbclient-4.14.5-10.el8_5.aarch64.rpm 83dca4bcff3dbc1fd6f0a73c0ca3a66d9be374940b892c8fa81907d19c25bb77 python3-samba-4.14.5-10.el8_5.aarch64.rpm ba172f8e1543237d7d0e7642e49d8027655b8191a2fff9990d17559501b3a085 python3-samba-test-4.14.5-10.el8_5.aarch64.rpm f6f311f2900bf5bf4f47465055a062dd00a704782261ef71c05cb7f633ca9572 samba-4.14.5-10.el8_5.aarch64.rpm bb406fd4f0e9b2110f5370524fb319ac2f0f27a125f7c67adbcaa9ea5704e575 samba-client-4.14.5-10.el8_5.aarch64.rpm 13c3bca8355d51461031d16e66156e346f260c3222568e5a3374df5b2330dacb samba-client-libs-4.14.5-10.el8_5.aarch64.rpm 8a8d3c619dadef5ca664396f267a5d49879feb34d80bb5740047f55ef9eb635b samba-common-4.14.5-10.el8_5.noarch.rpm 36395db705290487f4381ac7f43ebd359bd7c149c82802799fe470efa669539b samba-common-4.14.5-10.el8_5.noarch.rpm 36395db705290487f4381ac7f43ebd359bd7c149c82802799fe470efa669539b samba-common-libs-4.14.5-10.el8_5.aarch64.rpm 50c3a952738ac244caba12f7b5a9c084b6905cdd540f4aaa46ecab9aa7d2f168 samba-common-tools-4.14.5-10.el8_5.aarch64.rpm d3fce6c749a0f59ae5ee48bd47037c022fc3607c2c53cfacb94512379ace99ec samba-krb5-printing-4.14.5-10.el8_5.aarch64.rpm f83ff5cc0b091ce52fac60ec8b3fde9478f4a755f779df96140bf44143883ef1 samba-libs-4.14.5-10.el8_5.aarch64.rpm c4ca5219706903d0d7721e9caea798dc4ea774585627736ace7af45c2a718256 samba-pidl-4.14.5-10.el8_5.noarch.rpm d475cfd587c72bd74a312a47ec558cf153c9f00626a45a61522e4982b3fc6cd5 samba-pidl-4.14.5-10.el8_5.noarch.rpm d475cfd587c72bd74a312a47ec558cf153c9f00626a45a61522e4982b3fc6cd5 samba-test-4.14.5-10.el8_5.aarch64.rpm c613796fee3472db0fbeb0a8169c1ffdc7d312af638fcbdfa6b40ace4ea6c341 samba-test-libs-4.14.5-10.el8_5.aarch64.rpm 722deb26d2a9a33184d31e5b735b3c6faec67e5d3a12036474b6f160a533f0c5 samba-winbind-4.14.5-10.el8_5.aarch64.rpm 1c1453e9d30e61f35d39dbd9b8148e88060be061406e5175a570e6dbf9a698fe samba-winbind-clients-4.14.5-10.el8_5.aarch64.rpm 90cb2113e41becdff0c26f7b0a7dcb5e61b3f0d93af056d46883ec97323f47cc samba-winbind-krb5-locator-4.14.5-10.el8_5.aarch64.rpm f3064c2d3e9cf0a9e97fd513e120fa7085eb516fe6cb5e78c64099862b294643 samba-winbind-modules-4.14.5-10.el8_5.aarch64.rpm 68bcb8b5003ce567c41de0152f7bd0e4f76bc5c25a68957793330e2ef186f770 RLBA-2022:0901 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. Bug Fix(es) and Enhancement(s): * firewall-cmd takes hours when adding 55K ipsets (BZ#2046343) none-baseos-rpms firewalld-0.9.3-7.el8_5.1.noarch.rpm 1999ea7b588868ec6d98d54ca69702d9c5af417cc9b1eab3e918dcf2aaffc843 firewalld-0.9.3-7.el8_5.1.noarch.rpm 1999ea7b588868ec6d98d54ca69702d9c5af417cc9b1eab3e918dcf2aaffc843 firewalld-filesystem-0.9.3-7.el8_5.1.noarch.rpm 4c4d3749a05409559889fb3ea69b51178d8bbe166461ad297bfbaf319373b8b0 firewalld-filesystem-0.9.3-7.el8_5.1.noarch.rpm 4c4d3749a05409559889fb3ea69b51178d8bbe166461ad297bfbaf319373b8b0 python3-firewall-0.9.3-7.el8_5.1.noarch.rpm 33920c9e7ab58b641f68912fc3e8544584066e225e06121f6789ba94db9a8d1b python3-firewall-0.9.3-7.el8_5.1.noarch.rpm 33920c9e7ab58b641f68912fc3e8544584066e225e06121f6789ba94db9a8d1b RLSA-2022:0951 Important: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) * expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) * expat: Integer overflow in storeRawNames() (CVE-2022-25315) * expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960) * expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) * expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) * expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) * expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) * expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) * expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) * expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) * expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-4.el8_5.3.aarch64.rpm b54dfc2be8267b075d84e4834e56d2551895c0be11c47ef414bae04cc855c689 expat-devel-2.2.5-4.el8_5.3.aarch64.rpm 23dddb89a87de4992b992509dea3c35211fd19d6dd4af31d5456a0639fd33301 RLBA-2022:1547 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sanlock packages provide a shared storage lock manager. Hosts with shared access to a block device or a file can use sanlock to synchronize their activities. VDSM and libvirt use sanlock to synchronize access to shared devices or files. Bug Fix(es) and Enhancement(s): * sanlock lockspace stuck in 'ADD' for days (BZ#2066125) none-baseos-rpms sanlock-lib-3.8.4-2.el8_5.aarch64.rpm affd5c02c8427b22222851ae05723323948c6722635ac0e835a948665b6f6f89 RLBA-2022:1548 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es) and Enhancement(s): * multipathd.socket is missing start conditions (BZ#2054877) none-baseos-rpms device-mapper-multipath-0.8.4-17.el8_5.1.aarch64.rpm 691acaf2fc5143461fac2c0db64c796d723a059142949f4b2d9e2f619bb329ae device-mapper-multipath-libs-0.8.4-17.el8_5.1.aarch64.rpm 76afd6a8442a2fb2dfe3ce0f37cf9ca365e0592ae360813c2c405d9e2a75dc9e kpartx-0.8.4-17.el8_5.1.aarch64.rpm 2da73c944fd4fd9717fae7956c8fbc5db7019d938b632de1dd2e6314ddcd523c libdmmp-0.8.4-17.el8_5.1.aarch64.rpm 16f49032da9cbf1abfc480c53655228205388b3ecaa7c000346d30908a592f57 RLBA-2022:1549 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager DHCP client does not work maybe due to received NAKs (BZ#2065188) none-baseos-rpms NetworkManager-1.32.10-5.el8_5.aarch64.rpm 45cbd8f99875040d83f865b571e0f07a6f4ff6102cb6efdfa1d194ba434384d1 NetworkManager-adsl-1.32.10-5.el8_5.aarch64.rpm 5a07cf6379f457dadb3c058053d7960f69b9d44a409d2e98fc3dd89b9b88eb5e NetworkManager-bluetooth-1.32.10-5.el8_5.aarch64.rpm 6793bfcb2f0583c1238dceb10ee95c44996b9312a8cd8cfc0ca1aa23ec6c5eed NetworkManager-config-connectivity-redhat-1.32.10-5.el8_5.noarch.rpm 3205c15eecb678076ba608f462c6e8f8d307cf7c92cd0706cae8f47c1e600b8b NetworkManager-config-connectivity-redhat-1.32.10-5.el8_5.noarch.rpm 3205c15eecb678076ba608f462c6e8f8d307cf7c92cd0706cae8f47c1e600b8b NetworkManager-config-server-1.32.10-5.el8_5.noarch.rpm 392235eb743e2a22345b3247c79fc9f04f8ad93eb485ee8416c957af4b9d5ef7 NetworkManager-config-server-1.32.10-5.el8_5.noarch.rpm 392235eb743e2a22345b3247c79fc9f04f8ad93eb485ee8416c957af4b9d5ef7 NetworkManager-dispatcher-routing-rules-1.32.10-5.el8_5.noarch.rpm a623e5faec3fc6652e6eec6835f1b8a507ab903572f86bd257493574c33688ae NetworkManager-dispatcher-routing-rules-1.32.10-5.el8_5.noarch.rpm a623e5faec3fc6652e6eec6835f1b8a507ab903572f86bd257493574c33688ae NetworkManager-libnm-1.32.10-5.el8_5.aarch64.rpm b6e95b3f6401c420393b1bc53e3f8245c6ae600f96beeb19d5f0249ab73eab30 NetworkManager-ovs-1.32.10-5.el8_5.aarch64.rpm 47806de7de477eaec6ff242de5a5fac4039ad9dbb25a999a33dc09609bd7a0dc NetworkManager-ppp-1.32.10-5.el8_5.aarch64.rpm af5f9eab1210be77fab900f7a724783ece6622108e34d99a5c9920ac71c442ba NetworkManager-team-1.32.10-5.el8_5.aarch64.rpm f52d5d6290d198acff12488765194a543219126e3eacbcb0ed8e9e2edfac6c66 NetworkManager-tui-1.32.10-5.el8_5.aarch64.rpm 895ae01319e2616f46ce65359a626191b8ca905fce80b1928e73e2c0b90339f7 NetworkManager-wifi-1.32.10-5.el8_5.aarch64.rpm 295cca41974981984ddf506b50a8d45042ba7cbecc704e67b42873c0f790f53f NetworkManager-wwan-1.32.10-5.el8_5.aarch64.rpm ed4d95de103cca63ff98d4f4144f7c4ecb8e4956394adc78788c9c8bffbaec1e RLSA-2022:1550 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in RDMA listen() (CVE-2021-4028) * kernel: heap out of bounds write in nf_dup_netdev.c (CVE-2022-25636) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Backport DFS fixes from upstream (BZ#2056329) * [Rocky Linux8.5] lpfc driver often fails to detect storage directly connected to Broadcom FC HBA (BZ#2058193) * nf_reinject calls nf_queue_entry_free on an already freed entry->state (BZ#2061446) * gfs2 blocking in gdlm_lock (BZ#2069750) none-baseos-rpms bpftool-4.18.0-348.23.1.el8_5.aarch64.rpm 62fffc7162c9f0f6b15106a9f5d1f473d39ef193b99ad7034ea34fe66d375ba9 kernel-4.18.0-348.23.1.el8_5.aarch64.rpm d5eb627177e78c96e1a9579644cf3e390e45417b1fc14e9acc61d6dfc473cb44 kernel-abi-stablelists-4.18.0-348.23.1.el8_5.noarch.rpm 26666a57f0ea2fe4333260a6edf8011cf2ab53bf6862f4ddb0cf4addabe004f2 kernel-abi-stablelists-4.18.0-348.23.1.el8_5.noarch.rpm 26666a57f0ea2fe4333260a6edf8011cf2ab53bf6862f4ddb0cf4addabe004f2 kernel-core-4.18.0-348.23.1.el8_5.aarch64.rpm 1a4f7636c54e5030288601bda762ec938ba727b666ea20d94d50744937662ec0 kernel-cross-headers-4.18.0-348.23.1.el8_5.aarch64.rpm 5d1bcd5ca45c87de14f79ae8623d158776aac5f499e0c2cd4f6c5f0e8522bc56 kernel-debug-4.18.0-348.23.1.el8_5.aarch64.rpm 91bc1b15279f2c945c2589244e989e6618cd903fbfe8cdb3cb695529156d0340 kernel-debug-core-4.18.0-348.23.1.el8_5.aarch64.rpm 0378c0cf9162da6f279d0ceb15d664915241b95b92fb2234bd8468fffd4abab7 kernel-debug-devel-4.18.0-348.23.1.el8_5.aarch64.rpm 81598c01fd6b0e4f21064ce87b084734f69800e9cc7617d07d4ea73cc423c4c7 kernel-debuginfo-common-aarch64-4.18.0-348.23.1.el8_5.aarch64.rpm 517255539249c49368e2ae508ef763369179f51837b22cf0a4f44273c67dc920 kernel-debug-modules-4.18.0-348.23.1.el8_5.aarch64.rpm c1e8fcb47e6406013bc8706f9cd7828b9a96e4fabdb196780b56cb1b220984bc kernel-debug-modules-extra-4.18.0-348.23.1.el8_5.aarch64.rpm 6ce748609208f866a3195427820bd5e2402335445a177f4002d608915ee843ca kernel-devel-4.18.0-348.23.1.el8_5.aarch64.rpm 1511a89945df79b659c202f79a01fa9ac9074a36ddef608b4744ae76360ccc30 kernel-doc-4.18.0-348.23.1.el8_5.noarch.rpm 760f591adfa724989e0f71d985bf1eda31a40ce5ff96c4b23e18712e731bdac7 kernel-doc-4.18.0-348.23.1.el8_5.noarch.rpm 760f591adfa724989e0f71d985bf1eda31a40ce5ff96c4b23e18712e731bdac7 kernel-headers-4.18.0-348.23.1.el8_5.aarch64.rpm bd7108fd72867d242bd69165d4e8e5cf5d5fc8b398277f69a2a2955d55838a58 kernel-modules-4.18.0-348.23.1.el8_5.aarch64.rpm 1015e290b58f9cd864e3befa3eb6007c0d373a1da490fc2906a377f8b8b1cd04 kernel-modules-extra-4.18.0-348.23.1.el8_5.aarch64.rpm 9aca8bcad0173c700a144dc71a0693112008e1e9f056fddb390a0ecb23ae6579 kernel-tools-4.18.0-348.23.1.el8_5.aarch64.rpm 188a4d821e872cc8082777d41d49696bdc912fed04bb74d991c6769b0fdb0e04 kernel-tools-libs-4.18.0-348.23.1.el8_5.aarch64.rpm 435410aa074c96fa237ee15010199c8dd300f4d4bce79a9810158e5122dac107 perf-4.18.0-348.23.1.el8_5.aarch64.rpm 939d13aa0380334e957df2c5d5a005a9d5ec84c68ef2258b38ae0c2e4f4a33b5 python3-perf-4.18.0-348.23.1.el8_5.aarch64.rpm 9f225abaab6120e05ea906e0c428d1af865e71e12de9bf12e2b902bb4aea62fb RLSA-2022:1552 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: use after free in utf_ptr2char (CVE-2022-1154) none-baseos-rpms vim-minimal-8.0.1763-16.el8_5.13.aarch64.rpm 490018c787a9d219986e923c08dc7c5dec6448c4cff7a77fdaeb3a3a145205ad vim-minimal-8.0.1763-16.el8_5.13.aarch64.rpm 490018c787a9d219986e923c08dc7c5dec6448c4cff7a77fdaeb3a3a145205ad RLSA-2022:1642 Important: zlib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms zlib-1.2.11-18.el8_5.aarch64.rpm 00ba092bf892cfe55a166b8b0ab2c2593a5966cb01db6bfe8317153d90f82c5e zlib-1.2.11-18.el8_5.aarch64.rpm 00ba092bf892cfe55a166b8b0ab2c2593a5966cb01db6bfe8317153d90f82c5e zlib-devel-1.2.11-18.el8_5.aarch64.rpm b9a765a3ebb0be9f07d9a4773cdbbccf0f09c909a2eff3936c6c620a9003fc74 zlib-devel-1.2.11-18.el8_5.aarch64.rpm b9a765a3ebb0be9f07d9a4773cdbbccf0f09c909a2eff3936c6c620a9003fc74 RLSA-2022:1643 Important: xmlrpc-c security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms xmlrpc-c-1.51.0-5.el8_5.1.aarch64.rpm 2e0aa25dd18a2b902352b88c3747b1190d778b6e1e6f6ebf90ed54b4f3960afc xmlrpc-c-client-1.51.0-5.el8_5.1.aarch64.rpm bae407a41ae67997e16d0407cda5522548e2a3432379f1d451bcc5d002747a1f RLEA-2022:2012 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 tzdata-2022a-1.el8.noarch.rpm 5fc8f5a5441ce6956a6e821dc04e8ce6fa67ee762745143326f644e32cb44384 RLBA-2022:2005 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms glibc-2.28-189.1.el8.aarch64.rpm 88192072aa6245ff34fd486e80c389a15895f2c46de973b85dd270f71f9fac94 glibc-all-langpacks-2.28-189.1.el8.aarch64.rpm 8a913084c42577dbf5a7c192a0f2fba397670f9b68d9dd5223e49644862c82d6 glibc-common-2.28-189.1.el8.aarch64.rpm c7d321ae091350a6981024618449527fb055ee9a33e62b91cc706ef15ad904cc glibc-devel-2.28-189.1.el8.aarch64.rpm 26682c478e7eca31711225f5e62a70d2fe09b42c62127047dc70b9cd1f7e2ade glibc-gconv-extra-2.28-189.1.el8.aarch64.rpm 770c029da67d3ed7db81afb5118f6d07792535736a0c69921eb45bbc0db93ce2 glibc-headers-2.28-189.1.el8.aarch64.rpm abe35360b9546f8fb4cb9f37b5093c7df3b0bc71411c42b0978bc0ee9ad8704c glibc-langpack-aa-2.28-189.1.el8.aarch64.rpm c05bfc053a8c9d79ed8845f3aa1878f1892419e6af70fcce386212fa75a3edeb glibc-langpack-af-2.28-189.1.el8.aarch64.rpm 9bb1552c6990f62842777be5623c9962de412761970eac66faf6e2f68191d69c glibc-langpack-agr-2.28-189.1.el8.aarch64.rpm fa351873fc62340ac55d5f64613f0930a3353dfbfebeeb26d153b11ff63c0e10 glibc-langpack-ak-2.28-189.1.el8.aarch64.rpm c292bf46be661e0925d5e4d262e8cae7ddfd450c4c9aab45c11bfd673513181c glibc-langpack-am-2.28-189.1.el8.aarch64.rpm 6cc7d0e206704b1ead64fe6ac8a4fb175e7bfdc899bef0ce018e583423e10b8b glibc-langpack-an-2.28-189.1.el8.aarch64.rpm 901fbdd70f3d77e8c4ec3c8891e44cce90cdb4116a907a99ae9e6ebf9b194d6c glibc-langpack-anp-2.28-189.1.el8.aarch64.rpm 1e856aa15deb673524282a7b859441b837b3f483699d673b734839da3f957a2a glibc-langpack-ar-2.28-189.1.el8.aarch64.rpm 1b1f45577ca40de9938840c8ce496470b2d53cc0395432d66a45834f83e6bd30 glibc-langpack-as-2.28-189.1.el8.aarch64.rpm 8712667e3720640f078f042e9d53e7c2ede21291fa19975831bc14f43a3b6bc6 glibc-langpack-ast-2.28-189.1.el8.aarch64.rpm b8dbce2835a39738d5cb1aae555f2c9b85276b466c7a238f6555eac361ca161c glibc-langpack-ayc-2.28-189.1.el8.aarch64.rpm 2f7c6fd00f81790fea11a2591911a6f30685f6d232b6e5646851aad8481fbbcf glibc-langpack-az-2.28-189.1.el8.aarch64.rpm 6e8bdbc3bdff2c87ab34e281aafa613503901e9bcd1425017d7aab389d6b90f1 glibc-langpack-be-2.28-189.1.el8.aarch64.rpm 843e739c8c61e3696b6c4de0e8d9ed78ef6d2f8920b11634dffdb0336058eba0 glibc-langpack-bem-2.28-189.1.el8.aarch64.rpm 0d25664691ad51f6a2526c30dc008fec41946b3614bdad9f9f4af5b3325fc469 glibc-langpack-ber-2.28-189.1.el8.aarch64.rpm 3d77daae09cde2038a7756c40860648b6d191f19ed78ead1390d6d1ce349c99e glibc-langpack-bg-2.28-189.1.el8.aarch64.rpm 7ea7efb2737d72d277e3f2d5d4ba0a27dc6488a1ce39aef524702d8bb0824a92 glibc-langpack-bhb-2.28-189.1.el8.aarch64.rpm a90d4d0ca136796af54fee986f57a725875c2e8eb156b025e08eb23b211d8858 glibc-langpack-bho-2.28-189.1.el8.aarch64.rpm aa2afaf681e7dba495ec9c9b5288cf5131a26c4f86316056c2fdf32955e1a397 glibc-langpack-bi-2.28-189.1.el8.aarch64.rpm ded28cd3a6bbac8f76a7db08eb33fe46120e7fa96e20447542a3aed1ccb4691d glibc-langpack-bn-2.28-189.1.el8.aarch64.rpm 1b3102e21dcccaa0a3b51d10112c23eb1f96e316a9ca7e285961b0a16c813661 glibc-langpack-bo-2.28-189.1.el8.aarch64.rpm 429f58bfb88241ccacbe7d2f75e5485776f85c2703bb91cfea6bbfb08094c796 glibc-langpack-br-2.28-189.1.el8.aarch64.rpm 71063b6f8315aad3b0fd61e8c445cadbf763f6c3a1de0bedd4c4ca13ce0c14f4 glibc-langpack-brx-2.28-189.1.el8.aarch64.rpm be02638ce955867b759260407c19f6b2b77ef209571179cbe38c2934c08688aa glibc-langpack-bs-2.28-189.1.el8.aarch64.rpm e424551565252f945bb6ee9edb45ef2e6a4a4eaa00f85cf1b4c08e7f882822fb glibc-langpack-byn-2.28-189.1.el8.aarch64.rpm 2ed0c38b9cd3197bf8c55868484f2777d2484fdf9dc8fdd86796d019ee4757cd glibc-langpack-ca-2.28-189.1.el8.aarch64.rpm 0966137e58480b9780464cb4db4c76c5ce873beffad6de58968b368e32c02d35 glibc-langpack-ce-2.28-189.1.el8.aarch64.rpm eefaa03ca0185fd7418de7c9ccf9c978133a3e0066fe2804d484cc5364137529 glibc-langpack-chr-2.28-189.1.el8.aarch64.rpm abc1ca43bc443a9f201e6336ae216389f0b61c5154f869de44ef0ed151cbab45 glibc-langpack-cmn-2.28-189.1.el8.aarch64.rpm 7062843ddf2076cd44ee2b2afb21d07ad534b784570dba7db4768734f131f45b glibc-langpack-crh-2.28-189.1.el8.aarch64.rpm 607aa6ecfb96b32582b26e228af67bbe8a06bb1c600568aca627b2f42cd13ae0 glibc-langpack-cs-2.28-189.1.el8.aarch64.rpm 97329342d470ee23170c37901d8aba15ada807d6dc50911800071035ffbf1d67 glibc-langpack-csb-2.28-189.1.el8.aarch64.rpm 7c856e6324e8a184986e2632b7e289e084b3d8e4f838298df608ddc2d9c84a11 glibc-langpack-cv-2.28-189.1.el8.aarch64.rpm 8bc981751df8e227a04e67f30bd3a632936a93ef23f6a533f729097e9e98c247 glibc-langpack-cy-2.28-189.1.el8.aarch64.rpm ca42cb74db7affbb4bb378dec3e6e325ab3d5d5b5e2db9040bc36e61dbfede12 glibc-langpack-da-2.28-189.1.el8.aarch64.rpm 92b89b4eba01d8391b2577759c5e08bb1263b672569aaf7235668fd96f0fd9e0 glibc-langpack-de-2.28-189.1.el8.aarch64.rpm a6df60384ff534b33a750821172016584f565e6eed3691b04f297ff8b412a25d glibc-langpack-doi-2.28-189.1.el8.aarch64.rpm e91f216996df5b2f0e5f6cc48f4a23b403ad36adea0875a1fa36e74401c94588 glibc-langpack-dsb-2.28-189.1.el8.aarch64.rpm 48df5beb71ccd4ad180cc600d1e3437a8acfecacf71776ce43963de4ee72ff03 glibc-langpack-dv-2.28-189.1.el8.aarch64.rpm 09a33da482c381c2ad13d993f16848c8befa4a84fda0e7472befb19d18347139 glibc-langpack-dz-2.28-189.1.el8.aarch64.rpm a1244c13f16deb1e65994b9bfe5509477d76834a1e8a894dbaa00680dc312af3 glibc-langpack-el-2.28-189.1.el8.aarch64.rpm cd580f3f3352d6a80c64b9195cdc1a37df1496c9be45208f8f5fe853fa2d8d50 glibc-langpack-en-2.28-189.1.el8.aarch64.rpm 53d3d5845a42c74a5d6ce09d8c1e4fbe04a553adcdce3664f91e2d02177f7752 glibc-langpack-eo-2.28-189.1.el8.aarch64.rpm 3ecede053c8f2598670683e51b088f72c55eadea0ce6622199cd32cfbc4a8e95 glibc-langpack-es-2.28-189.1.el8.aarch64.rpm 842c3c0315e7c982dddf76578e9916b2d73ce992fcc9e82aaf204de791cf5838 glibc-langpack-et-2.28-189.1.el8.aarch64.rpm 2fa21b9adcf54e58a087cf823babefe2f7a354e44d4ec9a7edce637320300b15 glibc-langpack-eu-2.28-189.1.el8.aarch64.rpm d3bbc64fd52d62855b7830b51f4814c56a6274343d592810220876e411a8b699 glibc-langpack-fa-2.28-189.1.el8.aarch64.rpm 787af74153afa785afc5ffd526a9c9d40dbbad42a649f1610e9656ab4a3e5b8a glibc-langpack-ff-2.28-189.1.el8.aarch64.rpm a55b92120728970563dd3f2596f573835b81e58f183241ac31c93adfb05d1a19 glibc-langpack-fi-2.28-189.1.el8.aarch64.rpm 33f939b934dd106db92f6965fbd983d534ed3e2caffd1e85c4e9b78e6e73f5d9 glibc-langpack-fil-2.28-189.1.el8.aarch64.rpm 6ce750b09a656543db9754896676f58a13cfb4af65aaae27f9b0654498eb3975 glibc-langpack-fo-2.28-189.1.el8.aarch64.rpm eabe41dc21696e43dc23b5190f34b1c3cbc22e59b3103aa9f95b6a3083ceefca glibc-langpack-fr-2.28-189.1.el8.aarch64.rpm e0c152a6d2caf1b4419ecfee88d03bd9ea831c725951b4c9067a1554b8b40793 glibc-langpack-fur-2.28-189.1.el8.aarch64.rpm 3da3aa87c3b73986ecad165f78263c8adaacbb19798f6ea7e0205a36f8070afb glibc-langpack-fy-2.28-189.1.el8.aarch64.rpm 6521770174318d85637bf2a87cfcd499b6883600172ed06154f60c51a11b4b2f glibc-langpack-ga-2.28-189.1.el8.aarch64.rpm c2e1dcc55c10fbf88bcc97169d8414ed1dbbbbf85aa0ac54e1ca11b06a554c30 glibc-langpack-gd-2.28-189.1.el8.aarch64.rpm f8482be1bd75a386eddb5be3f8f1c26ab3eae23c47f9043274e65871c9f976f7 glibc-langpack-gez-2.28-189.1.el8.aarch64.rpm 5c554de4b4d21bac100fd64060e4010765dfa5868465550865cf06f58d832a96 glibc-langpack-gl-2.28-189.1.el8.aarch64.rpm bc1e30dd319490d25b88dc4e12768031d5a342ee623e0254b1bf448ecddeac19 glibc-langpack-gu-2.28-189.1.el8.aarch64.rpm 305d2e5367d23a3396ee2d60d2dcf1ddb72832041f090d1663d592c57d2907cf glibc-langpack-gv-2.28-189.1.el8.aarch64.rpm fc13cfd8358aa0e83ea0eccc041cd122580cb8114355cbce4e19309a9db782ba glibc-langpack-ha-2.28-189.1.el8.aarch64.rpm 1e76210bb4a96d8851b09036bb70485c6c84665903d798e2cedcf860e71e2618 glibc-langpack-hak-2.28-189.1.el8.aarch64.rpm d2ea3dc0d92c5845b0627f8b35e6f51071a7ec7a9192ade0f4078ea320d803b9 glibc-langpack-he-2.28-189.1.el8.aarch64.rpm 56252902b66651c3aba50fa4e8c97929afce62c420fb7f90b21f0ec8039e2e65 glibc-langpack-hi-2.28-189.1.el8.aarch64.rpm f0b7805b588bedd7a546c2af320451579b5c339c6e5ae712816e883ee3526f7f glibc-langpack-hif-2.28-189.1.el8.aarch64.rpm 56dba5c9b893b655b72bb1df4a8a82eaff1a39cc6831c9518d21d9b3fa9a074b glibc-langpack-hne-2.28-189.1.el8.aarch64.rpm 4e2faed2bf85ca8ded62bdfece170e19534d03b9f20422d756ef367ba03986fc glibc-langpack-hr-2.28-189.1.el8.aarch64.rpm db3a840d4f6a035ff9831af792e70275cb99ec02d13de87d1321a66fdac5e656 glibc-langpack-hsb-2.28-189.1.el8.aarch64.rpm 7be69453b318abcba2bcdb4af8143a558099f0af55ce5c6f056b4651aa9c038e glibc-langpack-ht-2.28-189.1.el8.aarch64.rpm 5c33e6cc80938c94c11402cdc96fd8defb61213f38c3dd9d663f0456a24186c8 glibc-langpack-hu-2.28-189.1.el8.aarch64.rpm 38def1ef34a060dd2833a403e384a97a75d010ce4ac5e8c7f5fb66b1768bca66 glibc-langpack-hy-2.28-189.1.el8.aarch64.rpm 153de23d41f10347b6c20ae3d1a2f75bbf3ff29bfac11a875b8881d858f9333d glibc-langpack-ia-2.28-189.1.el8.aarch64.rpm 8d5e733011ad422ec7fc28b951407a4a39d05e60527a1e65be8f0b2c80a1f7b7 glibc-langpack-id-2.28-189.1.el8.aarch64.rpm a040d320314642789dd29a091573925fcc5c243abdd9531f1850c4bc8f37d1a0 glibc-langpack-ig-2.28-189.1.el8.aarch64.rpm b8a168b166feb8589354771acc0b2e05f7b7a5e338faa35700e62df0c4a0f26d glibc-langpack-ik-2.28-189.1.el8.aarch64.rpm 7cfdb3d16d262a5b764c2179fefa4fccb248e92b33317b0d920e6c16c37b2d07 glibc-langpack-is-2.28-189.1.el8.aarch64.rpm 07ff8d447d6a184e65959bdd16d9d3a3a69d19b978ce52298e6f273110ab373c glibc-langpack-it-2.28-189.1.el8.aarch64.rpm 639f57f190a91db6ee8528fcfcdd93cad8eea86f0279e0411e13da9a809c1ab6 glibc-langpack-iu-2.28-189.1.el8.aarch64.rpm eec64046cf07d5cbcb52c2ed71c6f08331225b5331a37fdf90d01fad72ddc6cf glibc-langpack-ja-2.28-189.1.el8.aarch64.rpm 2402899123c1cf5d0fb96d4031ae025650eaf0bb6315874f4dae119a831ac9a6 glibc-langpack-ka-2.28-189.1.el8.aarch64.rpm 33fcf784d316c71ea00c4947d64e6570363d55b162c143a568acf2e77b05b3a3 glibc-langpack-kab-2.28-189.1.el8.aarch64.rpm 384b0f0409c7417f8d91c85a73c19a945c041f2a2e63c372b0065c6ad8162e9a glibc-langpack-kk-2.28-189.1.el8.aarch64.rpm d5a3d31d4ec4a90ee932df264f8b981a481b1d2836e4794b1c4bf8b8d5268042 glibc-langpack-kl-2.28-189.1.el8.aarch64.rpm 0221e2f28710baa1aa889c89ec03eada59d178503ac05c4fb3f7bb9fb21c6248 glibc-langpack-km-2.28-189.1.el8.aarch64.rpm 69a733cd4c3d824775ce5d25f95665cf27cb498b3becf1ec0594784511213e2d glibc-langpack-kn-2.28-189.1.el8.aarch64.rpm 9c0c5460dfd516059d575a31057c1b6a054f5f40a52a9b177fff2e2299d4095c glibc-langpack-ko-2.28-189.1.el8.aarch64.rpm 71a7dae164ca87c7a903d0eb75d2a768d92fb10c991b2da54783d4616a79bda3 glibc-langpack-kok-2.28-189.1.el8.aarch64.rpm 4b3404eb38417610c15ce918c1e4523ffc0703b15146d3b09a7216b23dc213a7 glibc-langpack-ks-2.28-189.1.el8.aarch64.rpm 16b6e5b27f0ff0c489c85e15321ad574e9c71cdac48c1392beb7bcb6f95e6b38 glibc-langpack-ku-2.28-189.1.el8.aarch64.rpm a5c82b12de9b0871229751e336edbb4bc4a86fd1eaf490e7706d2fb9c935f2cd glibc-langpack-kw-2.28-189.1.el8.aarch64.rpm 5de6ab82e68498f9406681dc4deafe27a93a9dbdb94d66bf6ea5ffcbdcf34b2b glibc-langpack-ky-2.28-189.1.el8.aarch64.rpm d245dc0e24d1fe85ba1d6c87a029676f3b43d01b4fbe6cd833281d53669dde2c glibc-langpack-lb-2.28-189.1.el8.aarch64.rpm c5c34dd8dab5d1a81a12e5c83f1111b064cd0e5c3b4d6aa5db84e520cf5cc551 glibc-langpack-lg-2.28-189.1.el8.aarch64.rpm 83951e11afe8c467d86287733079e64f769399610ea1cc99c20d6fc452824fc2 glibc-langpack-li-2.28-189.1.el8.aarch64.rpm b6092e7fe5014246fd6f69ae1bb7329d04ef6451af269ca2e090f6b5c4df0bf9 glibc-langpack-lij-2.28-189.1.el8.aarch64.rpm e41875a749072176518669971b6f08074c5e60c4a520afc6ed946f87fb6799d8 glibc-langpack-ln-2.28-189.1.el8.aarch64.rpm 97213367dc4b302e8b3dd4f031f2f944180bfe5e195ebd205eed415c3071122a glibc-langpack-lo-2.28-189.1.el8.aarch64.rpm d71e05cdab83b82c89bfda6f54aa10ef4e341b855275f863c95a60bd3a5f8958 glibc-langpack-lt-2.28-189.1.el8.aarch64.rpm fdd9eef25fb89dd03c40205013eb6b52f26abdb5b354f5e787d33a31284dd754 glibc-langpack-lv-2.28-189.1.el8.aarch64.rpm 2bb02ec02c7433f9844fb45b875ea837ff623abc429108943d88da9ce15b5b66 glibc-langpack-lzh-2.28-189.1.el8.aarch64.rpm fea3bf2542c09776f87b226ec9a0e9024e9957d4cc5ffbe77582bfbfc701e30c glibc-langpack-mag-2.28-189.1.el8.aarch64.rpm a7738b713d3961e72feee61fa478aa1286e06f4cb1b3506beba77e546a86669c glibc-langpack-mai-2.28-189.1.el8.aarch64.rpm 0b320a0ba2386a3db37a8b87a3aa7a60c1a1b29e688b42504754d0d5efb37823 glibc-langpack-mfe-2.28-189.1.el8.aarch64.rpm 62d1c4f555920484f12a96773afdac26199834a2ae9685f09d789e5332a148be glibc-langpack-mg-2.28-189.1.el8.aarch64.rpm b6e5218c1a1687930eace070df16a9808c2f4968b9162cc70b455e49789f7b07 glibc-langpack-mhr-2.28-189.1.el8.aarch64.rpm 798899db540c501f16d25237f6286b4b8f87fe78d58eb23e8ca32952d0ca7dfe glibc-langpack-mi-2.28-189.1.el8.aarch64.rpm fc685c6ec96bd19255c53cb02ea4e83bac6a4eb8ec69975c960f0428eeabdb51 glibc-langpack-miq-2.28-189.1.el8.aarch64.rpm 003203910dd40b0e55b0f98f9e74a69a734ae8fddcbef39c909b3de566502d7d glibc-langpack-mjw-2.28-189.1.el8.aarch64.rpm f2ad10d1e041730e3c790fbebe0eb7267636e7a4e8002c7068869426f35254c8 glibc-langpack-mk-2.28-189.1.el8.aarch64.rpm d7a00d02930c967ab645914bfe89971d77e7b029e0a7d825e280b79956aaf7e1 glibc-langpack-ml-2.28-189.1.el8.aarch64.rpm 8a277b92cdd865d26be0c77b32a03bea9b042733ad9a8f0f0b6943d0a9fc151f glibc-langpack-mn-2.28-189.1.el8.aarch64.rpm 8f31bfd2d9b28b911563889ef36fa158455585f8c68fc7853af2a6f8be51c841 glibc-langpack-mni-2.28-189.1.el8.aarch64.rpm 83615fa8d5c69b6fff7870cbfbad1f1f5310734f3a74c3f7713ee7829208a871 glibc-langpack-mr-2.28-189.1.el8.aarch64.rpm f59a25d336611a17945c831c01a389c07f91ae38e33cc555056ab04828948c5e glibc-langpack-ms-2.28-189.1.el8.aarch64.rpm 2c0898902643960fa77bded729261588b9547da3db47e994a9d393eab02eb725 glibc-langpack-mt-2.28-189.1.el8.aarch64.rpm b9b004493bc94f7b339747ec2b1c690e29e5560bba00477cfc936cf2b998c400 glibc-langpack-my-2.28-189.1.el8.aarch64.rpm a982a87ee15a5fb99c088a64cf0e8f2c78c8fe266ffcf4ca7a50c6ded7f60783 glibc-langpack-nan-2.28-189.1.el8.aarch64.rpm f51676cff9e07d4cb67b1abf63e306fd3fa3793b5e2cab16f852673c865c79a5 glibc-langpack-nb-2.28-189.1.el8.aarch64.rpm d44b0aec5c554bc0d1503212b2f12926b0aa8a53ec2decec941010f8fab47fa6 glibc-langpack-nds-2.28-189.1.el8.aarch64.rpm 88853cc74ddda5468a18cc68fb5e83d16f02403682d7f0ffb962703c132ac795 glibc-langpack-ne-2.28-189.1.el8.aarch64.rpm 731cad2e82841a31769206ad84e17375f176b56bc19088748faaa7a48ed65b5b glibc-langpack-nhn-2.28-189.1.el8.aarch64.rpm 2e6d14cabf64a9fff8149c7943d5d785a4f6948e3b914022988ecc7afa42898d glibc-langpack-niu-2.28-189.1.el8.aarch64.rpm 52d12839fd2e0e6c7c98f31ef72d80cc95aae79f51b14f8b9f97d724624d5ad6 glibc-langpack-nl-2.28-189.1.el8.aarch64.rpm fe9e8903ee02c3cea964207f1a294c81ab2aadd165c6635ce216a91c0601bca7 glibc-langpack-nn-2.28-189.1.el8.aarch64.rpm 525532560c2b76af260d275459dc2178ae113e5fa9358afd59d0e8f05bb105ec glibc-langpack-nr-2.28-189.1.el8.aarch64.rpm 3a12d4fc7ec9df8281c6fdf710b9312c145dbd9c2cfbdf86e277118b58b2c2e8 glibc-langpack-nso-2.28-189.1.el8.aarch64.rpm 5c4f6bfa1490e4b5a77c35dcb6e89454c5732e31ed75139c824b0922980c3831 glibc-langpack-oc-2.28-189.1.el8.aarch64.rpm 61d4c3dc1251c5f751307524324d83068cf3a3b95353baaec5a837f7a4153b47 glibc-langpack-om-2.28-189.1.el8.aarch64.rpm b39077b54c8bffc43acd3112a2194ba5b8056c2cb99bdb96c1d6ec4682d69b30 glibc-langpack-or-2.28-189.1.el8.aarch64.rpm d8f10e28d51edfe6779b2c9d64505b7d10fdd5cb6caaa2f576f1aa1f61c004ab glibc-langpack-os-2.28-189.1.el8.aarch64.rpm 364b914cbf97cbe776fb495d786f79407b5721e18a3b962d2cea390db9b4f1fc glibc-langpack-pa-2.28-189.1.el8.aarch64.rpm 1244660be2e688357f8caf9c24c162b47a6c06ae1441b746bd078d88bd7bf961 glibc-langpack-pap-2.28-189.1.el8.aarch64.rpm ccfc7868977e39b47c635b3691304d5eb8cb0b3be0d7e5b53845c0692aeff655 glibc-langpack-pl-2.28-189.1.el8.aarch64.rpm 028249897a4652e331b1820c788eb82d7e4e4fec6ba2f5a8959ad6eec017695c glibc-langpack-ps-2.28-189.1.el8.aarch64.rpm a2c3b0275a681d520a9a1d60e0efdb384bbb2037ffc489cf18119f709fef177d glibc-langpack-pt-2.28-189.1.el8.aarch64.rpm b3891807cf1ae309d67c50dfcc548003eaa0bb34c4a2a9cc9eb6c5eb9bad156f glibc-langpack-quz-2.28-189.1.el8.aarch64.rpm b48c496a3af18994054ccc3ccc02c88cd31ca871b9a865a88849699bbcf057c1 glibc-langpack-raj-2.28-189.1.el8.aarch64.rpm 219198452b5f6d820aadd7a99b85b79e2ee3faae073bf5baf923977efbe7a50f glibc-langpack-ro-2.28-189.1.el8.aarch64.rpm 40f68b891ed0e7ac5df9aa37c631ea26147807d37229309173da2b616de688eb glibc-langpack-ru-2.28-189.1.el8.aarch64.rpm ce4336aa5094a35265452a43808ed4d13c065d4958b199120de81d329e0afd00 glibc-langpack-rw-2.28-189.1.el8.aarch64.rpm 341457629a3aaa654b0c05b8c1144838358a590dccb464dbe5deb12e65c99679 glibc-langpack-sa-2.28-189.1.el8.aarch64.rpm 434083ab6a7aa0454bf573d048ab6d2629bbc248c5d30396c6fd0e36fc9120c3 glibc-langpack-sah-2.28-189.1.el8.aarch64.rpm f0aafa81e13c339e3b526d2e45f6c0e6c319d22d45f1cef50d2af08fdbaf2deb glibc-langpack-sat-2.28-189.1.el8.aarch64.rpm 166630aa72b0d319552467ae0c70bd9c6cc6a8a99829fa894af4806110cafb51 glibc-langpack-sc-2.28-189.1.el8.aarch64.rpm edd395bf57513e5557df1f6b41789fd4041e4f4d109a66543e85b7000255135c glibc-langpack-sd-2.28-189.1.el8.aarch64.rpm d69df93a55a272af28fcf7c4713cc0bd3c0549a2b0cf7fbd7deb0f0fed5cbb1f glibc-langpack-se-2.28-189.1.el8.aarch64.rpm 966ef05147f45aec8c50403365382f0c14d3a51f4875f0b04c5a6e83c94e348d glibc-langpack-sgs-2.28-189.1.el8.aarch64.rpm 4c401c9fa559681b484640299d283f35f08f609c9e252cbeefe427db760787cd glibc-langpack-shn-2.28-189.1.el8.aarch64.rpm d02cb73843c97d94aed2bcbd9c4f05f6311525376c5bd4460a9ff55674987195 glibc-langpack-shs-2.28-189.1.el8.aarch64.rpm b25fd9eefd560e4a286b35e2a13150f5ccb690441254e789fa63f0a49e8e4df9 glibc-langpack-si-2.28-189.1.el8.aarch64.rpm b48cbfcb92fc1e930d12ee2415887abc1fe55e85bedc214adbefb3b15a28336f glibc-langpack-sid-2.28-189.1.el8.aarch64.rpm c3ce90ab5c53bc256eb763a01fd91b650a6311513d1bce77c633c06bd8918197 glibc-langpack-sk-2.28-189.1.el8.aarch64.rpm 16f81d984fb02f864c862ab1cf08b6b4af37370db7a129d5437a15bf16989480 glibc-langpack-sl-2.28-189.1.el8.aarch64.rpm 1fe503e710c3117c254ea3e6ecfd63de4105036e42ed91b19a520991be6e94cb glibc-langpack-sm-2.28-189.1.el8.aarch64.rpm e01f80ffc57ff32015b681c83e5e97a70e8276e2b191376fc5f56393bdb0a8b4 glibc-langpack-so-2.28-189.1.el8.aarch64.rpm 0b7cbfed16c9e8c551fb913c16229c8c8263a8233d874673eb36cc32b3c12c8e glibc-langpack-sq-2.28-189.1.el8.aarch64.rpm b49ecd0646861210cb7754b69080ae9efbe346373284810c62d2cf91d003ef19 glibc-langpack-sr-2.28-189.1.el8.aarch64.rpm e19682a7f7c7963177aa3fd19db6439d61f35618d39421baf46133d9a9d9b7fd glibc-langpack-ss-2.28-189.1.el8.aarch64.rpm 43d30f95bef58f69edb69f45d8054557975cf889e9667ed9a352e77f9928ea79 glibc-langpack-st-2.28-189.1.el8.aarch64.rpm 08da1405783c8d0a25881479e3667eef723d4d3568b7eb35b32d7934537ee4fe glibc-langpack-sv-2.28-189.1.el8.aarch64.rpm 39e2e469c02f4d91a46294598d1ad6a0bdb9c80526e747dfb3d32041d7bbeb2a glibc-langpack-sw-2.28-189.1.el8.aarch64.rpm 01fb65a579e70fc6cbac2ff218de0646e981e11562351aee778b755f3f3cbaa7 glibc-langpack-szl-2.28-189.1.el8.aarch64.rpm e4f633b0a75e2ca775b79b153ee6d7ef6b389cc9e213781a4b61cfb78eb6dd54 glibc-langpack-ta-2.28-189.1.el8.aarch64.rpm 64cfc1e8bd47aba39f1459fe40d6efdb9f5de2f90bca814131bbd292b2d70270 glibc-langpack-tcy-2.28-189.1.el8.aarch64.rpm 197492a413d0429db3f862c45f05fe2fbabf88145a255a854277a3f7dd7fda43 glibc-langpack-te-2.28-189.1.el8.aarch64.rpm 95e1e98131552a8ba89a8331df57b803ab6b982198a321e585e8ac7b05034ead glibc-langpack-tg-2.28-189.1.el8.aarch64.rpm 1d37c3b847b69a74e7698e6373ec983076dcc1dfe235111ee23251a34a2396aa glibc-langpack-th-2.28-189.1.el8.aarch64.rpm d5edf9de4a1507f156a49de50acc1f193a675acea8197bcac58db982ff701b1f glibc-langpack-the-2.28-189.1.el8.aarch64.rpm 4cdf5d8ab05b813b70ef5177c4ff8eb85e8467c608eb66057fa751298f92568b glibc-langpack-ti-2.28-189.1.el8.aarch64.rpm 69f5d471ed2f8d063b25cde5337ff4e1b21c666510fe2c46c4e5dd024c74a9f0 glibc-langpack-tig-2.28-189.1.el8.aarch64.rpm 5412b33567691e240d697126636ded69eab36297d926a56301967f6f9c9a88e9 glibc-langpack-tk-2.28-189.1.el8.aarch64.rpm a54f994e51cd1f8334134fd51626163b5d334823a43e9b5c7d5cd67ed21a9423 glibc-langpack-tl-2.28-189.1.el8.aarch64.rpm be1750370842b5a1a8f3b528ccf5b95a72b6da8c0a921feefbcf730f824d8b7d glibc-langpack-tn-2.28-189.1.el8.aarch64.rpm c762b855b8ea7439501060f644aee1c5687e3e8d3f17d1a3898887179d5c284b glibc-langpack-to-2.28-189.1.el8.aarch64.rpm 22301ebd5210b120d3f4177e666cabeef84cb242e3a4a267dea6f09464f9c07b glibc-langpack-tpi-2.28-189.1.el8.aarch64.rpm 32c691f43ca797e4fd43d17ff59834043c00bec80a0e9b0c05683f56ab9e7ea1 glibc-langpack-tr-2.28-189.1.el8.aarch64.rpm c59df590bd64fafc6df499d5eb6bff1e3904f80802c4e4083e1adadb15c51e81 glibc-langpack-ts-2.28-189.1.el8.aarch64.rpm 5ec21c7555938b32262d6a54392d7a8014a718239358ad5b43776fe0c8c58438 glibc-langpack-tt-2.28-189.1.el8.aarch64.rpm d22043ff8b5fc8fe34028037a091afe0303fb633b706380847312efd261ff9f0 glibc-langpack-ug-2.28-189.1.el8.aarch64.rpm 44a9e542222f100b03572fc6dfeb08c0510b2afcf0f258ff73db08ba14ff692e glibc-langpack-uk-2.28-189.1.el8.aarch64.rpm be1b0bc91a6dfc88c63fb3707de6ba4f0f49e1c87bb140942d039df4a6ed826c glibc-langpack-unm-2.28-189.1.el8.aarch64.rpm 07ffdd3a6b6ef54a9e97e88e558a4cd186f886b1361f7d488784d0c7c8989662 glibc-langpack-ur-2.28-189.1.el8.aarch64.rpm 5d6de3a52958119977d3afb2d6a983518891d9158afc108340eb73c006afce4c glibc-langpack-uz-2.28-189.1.el8.aarch64.rpm 1f6d4c5fcc1e72529c078388d18f2d122285630edf5e0301bc62bb7539d28350 glibc-langpack-ve-2.28-189.1.el8.aarch64.rpm b2d09c0dd8fc3ef18093008b770e74bc162641d58dc6285905e305cc8aceea30 glibc-langpack-vi-2.28-189.1.el8.aarch64.rpm bafd9124f2251e99d861ea6b22ee5880b070172fc7167cb93846b459ddda616b glibc-langpack-wa-2.28-189.1.el8.aarch64.rpm fb8b389c28ee77099ca4967ec523561b67ae0666f1ddf670ad566d1c343a7b6d glibc-langpack-wae-2.28-189.1.el8.aarch64.rpm 9c0bd4b6a2b8bbab14204cb254643472846412ade73e9e8f3ff9caaaf1b2129e glibc-langpack-wal-2.28-189.1.el8.aarch64.rpm beed4b31df2faa119bc56363cef5d974e63b7332b7b2ac85802b5c7c4428ebb8 glibc-langpack-wo-2.28-189.1.el8.aarch64.rpm c795b2d3a291d13896db3d8245beba2ec3e0c7792bc52955eb7288e6deab5f11 glibc-langpack-xh-2.28-189.1.el8.aarch64.rpm b65ebf421262264e5d9404facfdeac132099482c18f45f8c81279d0c12f2e192 glibc-langpack-yi-2.28-189.1.el8.aarch64.rpm 9beaa96a7c7308fc3ba3e2bd01ec58de2dc19ae94b4e896461d271304842c91c glibc-langpack-yo-2.28-189.1.el8.aarch64.rpm 1a6b9c938f02424e42124d78bb46301a550a0410dab4f0cd1ab26d598743ee6a glibc-langpack-yue-2.28-189.1.el8.aarch64.rpm 29cc3033e8e045ffdadd401c49624a69552ca324a4a96879660e550f055d03c5 glibc-langpack-yuw-2.28-189.1.el8.aarch64.rpm 00f8dc46e4c034d706a98317ebbcae932020ffcd21528608c2384c3ae3322903 glibc-langpack-zh-2.28-189.1.el8.aarch64.rpm 6343e565ad11374ba1d5a4b4145feb96248864c5534e2c71f85ae07e6fad1215 glibc-langpack-zu-2.28-189.1.el8.aarch64.rpm af81cb781a245f642495ccbc47a8fb23189664b281dc7af3f3339bd57ba3b6cf glibc-locale-source-2.28-189.1.el8.aarch64.rpm ac1f984c9cf7de06f0680f71757e1fa4ff1bd850350f73e23972deeb34125d58 glibc-minimal-langpack-2.28-189.1.el8.aarch64.rpm 1f2f84c01fe02838d758227402b76902d41628a0f43b799235e2b0390ef0d7b1 libnsl-2.28-189.1.el8.aarch64.rpm 905238ae5c464006162b95f678ec1a5bba1b6ec3be45d55d3d52c8ad82a95e9e nscd-2.28-189.1.el8.aarch64.rpm e50dcae14176b173ea5f8b048211fe4da0ed6ebff4d5186d949e452425a1d529 nss_db-2.28-189.1.el8.aarch64.rpm 58ad5cbb0a8df9233856e80045db8bdfb3ebdda0e9c4ffa68ca975df818475ff RLEA-2022:1985 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms NetworkManager-1.36.0-4.el8.aarch64.rpm 883cfc7cb015917f5b60fe1b6b785f1417a7477c96582a95872cda823d8f4e18 NetworkManager-adsl-1.36.0-4.el8.aarch64.rpm e715fe14d8a63ce8d6bc02491119a9609f9fe4ce24d606ed9cf6ae30563a94e4 NetworkManager-bluetooth-1.36.0-4.el8.aarch64.rpm cb036140df7691c656745bbbf71a29d63b997c1174eec48834bf2ae644049d82 NetworkManager-config-connectivity-redhat-1.36.0-4.el8.noarch.rpm fef24e5778991cde815933a545b47096f40e17a224350436c0c5d7cb38aa93b4 NetworkManager-config-connectivity-redhat-1.36.0-4.el8.noarch.rpm fef24e5778991cde815933a545b47096f40e17a224350436c0c5d7cb38aa93b4 NetworkManager-config-server-1.36.0-4.el8.noarch.rpm 16e19499cf71fa9aa3f6d0125927494b3396b0c648ee270526a253a864f11612 NetworkManager-config-server-1.36.0-4.el8.noarch.rpm 16e19499cf71fa9aa3f6d0125927494b3396b0c648ee270526a253a864f11612 NetworkManager-dispatcher-routing-rules-1.36.0-4.el8.noarch.rpm de359a8aabf49c8c87da3a9165e02b3297801f3f563672bd3c465faea95da333 NetworkManager-dispatcher-routing-rules-1.36.0-4.el8.noarch.rpm de359a8aabf49c8c87da3a9165e02b3297801f3f563672bd3c465faea95da333 NetworkManager-initscripts-updown-1.36.0-4.el8.noarch.rpm a327bb51d16ab51e2f53012e32b902be6631891a546840b138737e6e10ef184b NetworkManager-initscripts-updown-1.36.0-4.el8.noarch.rpm a327bb51d16ab51e2f53012e32b902be6631891a546840b138737e6e10ef184b NetworkManager-libnm-1.36.0-4.el8.aarch64.rpm 92022e03d8aa3714b846d6141115d0e49b262eb3ae9f185f651ab909aced0b3a NetworkManager-ovs-1.36.0-4.el8.aarch64.rpm f3982955f5b67ade6ba63aa5c5b28e011edb8e29ab2b9fcea442d77bee033193 NetworkManager-ppp-1.36.0-4.el8.aarch64.rpm 2d62fea08d402beb47758a40a05a8cf679cb4abfc15f9a111bc578eb5e2f0fe7 NetworkManager-team-1.36.0-4.el8.aarch64.rpm 19aa60614288c330549c0cebe6b3c3efd0a51e8588dd4841d013cfbdca5600a6 NetworkManager-tui-1.36.0-4.el8.aarch64.rpm 0f0ad1ded7647ef050076ad926eab15be5819e343aaebc7794c5cb2907e8d98f NetworkManager-wifi-1.36.0-4.el8.aarch64.rpm 75a7f3bbe168eb4b78b05d2c450ca0c3f14077d1781127c3d7176315c3126c92 NetworkManager-wwan-1.36.0-4.el8.aarch64.rpm 80240e5aac4b9ef817ceae728e3a48720fb7cc580b11611aa3cf17fa64d7e38b RLEA-2022:1998 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms sos-4.2-15.el8.noarch.rpm 9896c7d46e258902fb8012ac0a5784001e411bfc1715be2608c7950f221445a9 sos-4.2-15.el8.noarch.rpm 9896c7d46e258902fb8012ac0a5784001e411bfc1715be2608c7950f221445a9 sos-audit-4.2-15.el8.noarch.rpm 92564df0461df6f0e53769c52a9358c884f5a413ecacad63c486087035c8612f sos-audit-4.2-15.el8.noarch.rpm 92564df0461df6f0e53769c52a9358c884f5a413ecacad63c486087035c8612f RLBA-2022:2002 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms iptables-1.8.4-22.el8.aarch64.rpm 4d1215c30a0026d07d7e02907054ca9e5dcf1508f6b4dadbad12036307347580 iptables-arptables-1.8.4-22.el8.aarch64.rpm 89b18c0c04442759f3cedf055ffaa8b3a4aa608dcf3bb18e07c29156ab2a4f72 iptables-devel-1.8.4-22.el8.aarch64.rpm 20cceb538f4bfed4eea341e663642d9f9ea31921f70c7574184048db9b1f9cac iptables-ebtables-1.8.4-22.el8.aarch64.rpm 599416d9129b61d9832d8bf8cbb9abae4c14ba6f6128dd5f29ebf05431233ca8 iptables-libs-1.8.4-22.el8.aarch64.rpm 1e449a3366be433d5bd6bedde047f4dbf51dc1069c2ea3e21d7c67374a77209e iptables-services-1.8.4-22.el8.aarch64.rpm af128ab01d438e629a375d7e7ed264f05278edbb8ef53d7fd284b1278bbfe166 iptables-utils-1.8.4-22.el8.aarch64.rpm cb379b17fd5662bde9247e2043a39870ea60dab444fd17a11e070427e8245619 RLBA-2022:2003 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.6.14-84.el8.aarch64.rpm ef1f708a31692589308e576da4c603a0dd77dc12d1a597b67da3f278991ca07a RLSA-2022:2008 Moderate: cockpit security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. The following packages have been upgraded to a later upstream version: cockpit (264.1). (BZ#1984902, BZ#1992620, BZ#2004041, BZ#2008208) Security Fix(es): * cockpit: authenticates with revoked certificates (CVE-2021-3698) * cockpit: pages vulnerable to clickjacking (CVE-2021-3660) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms cockpit-264.1-1.el8.aarch64.rpm bb50dba1b50f5c1e0dabc1cf9bef962d2a01a319add5451aaabadbfbc5c7024b cockpit-bridge-264.1-1.el8.aarch64.rpm f7bb635353aee68f546b58d4f42c3aa38b864c7275987a2f436df0206db666a0 cockpit-doc-264.1-1.el8.noarch.rpm e2d4f83f4d3472036c3e4e4aaf75ce20cf63c4179e48593aab5dc115719c9d4d cockpit-doc-264.1-1.el8.noarch.rpm e2d4f83f4d3472036c3e4e4aaf75ce20cf63c4179e48593aab5dc115719c9d4d cockpit-system-264.1-1.el8.noarch.rpm 2be6eab904fd072df9cd5d71e4afd82c07879690ff0976909b286d1dd1566377 cockpit-system-264.1-1.el8.noarch.rpm 2be6eab904fd072df9cd5d71e4afd82c07879690ff0976909b286d1dd1566377 cockpit-ws-264.1-1.el8.aarch64.rpm fb50dade4dc2ac5c632be34a66f07e5a8fdf985006febae69a8c85e4c86773c0 RLSA-2022:2013 Moderate: openssh security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms openssh-8.0p1-13.el8.aarch64.rpm 10e1f809bf6432b7a20ae1a6467fc47821e0129bbe82eacf8bb3924f9c8a2b48 openssh-cavs-8.0p1-13.el8.aarch64.rpm e5ef68ae86ac882a38bb3158ba9a880c2df0c4d904b14ef120d905bf46d4e62b openssh-clients-8.0p1-13.el8.aarch64.rpm 8c6bcac63486fb34281f0a5667abfe30d2a067c1fa339b273ffa757f6426b8e6 openssh-keycat-8.0p1-13.el8.aarch64.rpm a149cfddbe4b5811acc61a91702765485b311211464d15f9f3ad143a6889f588 openssh-ldap-8.0p1-13.el8.aarch64.rpm ea67aa7abad0bfa92c730c765c4179c0223c2332ab454cf2398c0422b846242f openssh-server-8.0p1-13.el8.aarch64.rpm 7189e5f62c90bce713ab0bd50c1767469043ce831ed7ac9f85d17931bef8fe41 pam_ssh_agent_auth-0.10.3-7.13.el8.aarch64.rpm 074c517d08b899d572e2500e509c376b074d3eb9905c01c17521ec1db62e930a RLBA-2022:2019 gdisk bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gdisk. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms gdisk-1.0.3-9.el8.aarch64.rpm b9b54011f4bce3f67c0eb3c600283cd20730ed4f9f5dddecb5e714482686e4af RLBA-2022:2025 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libnfsidmap-2.3.3-51.el8.aarch64.rpm 5591423a80e55e795b298b575db90a568df3be608efd5c517eb72df3ee236e3b nfs-utils-2.3.3-51.el8.aarch64.rpm 427a60ef32c587feac37465d937408a449f72e579de6fcf947f53b6af0cbb05c RLEA-2022:2026 strace bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms strace-5.13-4.el8.aarch64.rpm 746a4616db7313905c6067dd0390c553ed8e175f08a36cb04628fcdf80ca7046 RLBA-2022:2030 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms opencryptoki-3.17.0-3.el8.aarch64.rpm 45d80b4b14f9a7fd52d7f399fb3d3ac46e5ab0501fb0cd227c666da720b05291 opencryptoki-icsftok-3.17.0-3.el8.aarch64.rpm 06f3e2e54b1453c63be76e935749e253c1feaf7616c9940f9841406feee7f65e opencryptoki-libs-3.17.0-3.el8.aarch64.rpm 3c6c9d18afd86aacf2793e6674d8320cc2f9b8e99007d0e92e6ade6485875118 opencryptoki-swtok-3.17.0-3.el8.aarch64.rpm 2fbb400dc4151f1a08f996aec2e1d96743061a3052527e90f10a96a9c37d19f1 opencryptoki-tpmtok-3.17.0-3.el8.aarch64.rpm e83eecfff502d14766238e32146f27806a3c7bc2a1d921c6e89fae737f8ac602 RLBA-2022:2032 cups bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms cups-libs-2.2.6-44.el8.aarch64.rpm 16673fede209db37be92aaa38b3daed5b7b22e5d2807a73af41b8de0c284e34f RLBA-2022:2047 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.29-3.el8.aarch64.rpm 1abe844295016bd43d04f271d147f84bbe8426589c491c94e7f86476b0dacd53 python3-cloud-what-1.28.29-3.el8.aarch64.rpm 2f45db65daeae3211ad094f23928c1461094c8b4f67323014d9d587d98577525 python3-subscription-manager-rhsm-1.28.29-3.el8.aarch64.rpm b8609e47c63ccedf5d4826dc899787cfcd66cf57114ee4da3073b962fc3334b3 python3-syspurpose-1.28.29-3.el8.aarch64.rpm 008ea132c039bd3c5c1c9e3e3210e195b1a18bb78691784f6184bbea3e097b88 rhsm-icons-1.28.29-3.el8.noarch.rpm e5b8d8298eb1d2df57c1b78c873155f29df752ded25b2a7ed9d9278d7a12b228 rhsm-icons-1.28.29-3.el8.noarch.rpm e5b8d8298eb1d2df57c1b78c873155f29df752ded25b2a7ed9d9278d7a12b228 subscription-manager-1.28.29-3.el8.aarch64.rpm b6c87f29608355003a7560709a0851c3097a1459244f39c1155038a10c2cf54b subscription-manager-cockpit-1.28.29-3.el8.noarch.rpm 12520ecdb5459f642190bb41abfcf7442aa7e11aacd199ab52f766c690065890 subscription-manager-cockpit-1.28.29-3.el8.noarch.rpm 12520ecdb5459f642190bb41abfcf7442aa7e11aacd199ab52f766c690065890 subscription-manager-plugin-ostree-1.28.29-3.el8.aarch64.rpm 172d56aaf94b2ae91bfd623c5f4150f0ebbc736bc88e79b77cc18a9b4c32f06f subscription-manager-rhsm-certificates-1.28.29-3.el8.aarch64.rpm 8eac506f44a77d4fa04c1b3dd91755b14eddc85fddb657ca8c16c528c121aeb6 RLBA-2022:2055 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms elfutils-0.186-1.el8.aarch64.rpm 5acbcbe3d1bad25b9d9b1c59b04c713ca796b0581853c694cc215920760f2285 elfutils-debuginfod-0.186-1.el8.aarch64.rpm 92527b8cac49b166b685431fc6d8814da5e219472ffa545a31bf696ffd83edeb elfutils-debuginfod-client-0.186-1.el8.aarch64.rpm 86d9e3366ef1e9b283ccf0329a8b2d0564f4ad4227a0ab40259062a9a97486b5 elfutils-debuginfod-client-devel-0.186-1.el8.aarch64.rpm 143e37e6119c91fd30b177e84801b7effff8ae2f7ea0d7642985ed6942db4e81 elfutils-default-yama-scope-0.186-1.el8.noarch.rpm 11080f14e2c3f331365b2f8ec45b3fb5a8ed009f09de690c48cf818db21e2eae elfutils-default-yama-scope-0.186-1.el8.noarch.rpm 11080f14e2c3f331365b2f8ec45b3fb5a8ed009f09de690c48cf818db21e2eae elfutils-devel-0.186-1.el8.aarch64.rpm ef2e59f26ea8a8e6333ba05f460fb96da7fc07d143a7f72b638a31fc4dd80923 elfutils-libelf-0.186-1.el8.aarch64.rpm f54353bf6fab0f3bef9aa8039d356c471cc073899c7b4ec7801bf30d9bc77cac elfutils-libelf-devel-0.186-1.el8.aarch64.rpm e8187d0ee2a0b0109504cc352ed916c843e959aef99c232fd33a3685f08ea632 elfutils-libs-0.186-1.el8.aarch64.rpm 73265e0b24fcf333813dfe33d3c36eabf433e7dee0a26637c776f24151edb015 RLBA-2022:2068 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms policycoreutils-2.9-19.el8.aarch64.rpm 962b47a4ab53b8fdd73dd5edf0cc648f999e80db898be9322a16d17d138c5cd6 policycoreutils-dbus-2.9-19.el8.noarch.rpm cc4c3681f131c8a71ac5ff45468f2cb220e9838bf90e315ea0ee52e69b4751aa policycoreutils-dbus-2.9-19.el8.noarch.rpm cc4c3681f131c8a71ac5ff45468f2cb220e9838bf90e315ea0ee52e69b4751aa policycoreutils-devel-2.9-19.el8.aarch64.rpm 6d0ef6067805584ebc1d5bb1535a4b2e0bc7b5fa6266d3977c4aac0fdca2b7b4 policycoreutils-newrole-2.9-19.el8.aarch64.rpm 0429ae7a54b99eb9d9a603d4bb6022b4b0635bb52b9626cbdb9fc645e56c8dd9 policycoreutils-python-utils-2.9-19.el8.noarch.rpm f66c33dd17315357253779ffdf0341fa1014dbb19ebb394c4c8aa62707c1247c policycoreutils-python-utils-2.9-19.el8.noarch.rpm f66c33dd17315357253779ffdf0341fa1014dbb19ebb394c4c8aa62707c1247c policycoreutils-restorecond-2.9-19.el8.aarch64.rpm c073267d3190de1970b0f55fa45b822852444f9ce39bcc88fdb5098b7c3da9b1 python3-policycoreutils-2.9-19.el8.noarch.rpm 12e5e07af3908292fb33b74262f0af11ceea8f36aabe8ee535c1e66180a7aef1 python3-policycoreutils-2.9-19.el8.noarch.rpm 12e5e07af3908292fb33b74262f0af11ceea8f36aabe8ee535c1e66180a7aef1 RLBA-2022:2069 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms systemd-239-58.el8.aarch64.rpm 0a3f22173af5c4381c40cb86ff94fc0e0473cf27a9af56f70fbfcbc46e49ee18 systemd-container-239-58.el8.aarch64.rpm 7c8eae1b69c93837d9138349be724e82aeeb62963053e43c64ee1dd0db208f5b systemd-devel-239-58.el8.aarch64.rpm 67d8592cfd1235bef5898bc29c2bc7054b029894dc4aec323a9f3eef4dccc8a6 systemd-journal-remote-239-58.el8.aarch64.rpm 99127dbc0c81a718ecbed58403736e16a97d3270c8d4306b63beb6c80a1bb049 systemd-libs-239-58.el8.aarch64.rpm 3b67d2b42f6f17b6c3939a203c7aafb182d09576483805d5c279fed3e09a3126 systemd-pam-239-58.el8.aarch64.rpm ee829927402157fd54fc2ca36de1aaf3ae909cb4ab9cc2e902dcc57daa5bcf6f systemd-tests-239-58.el8.aarch64.rpm 8e0cdef7f5a010a9e725c271fbc45e0a4099cf3ce6b065c4bd83169d9e84be02 systemd-udev-239-58.el8.aarch64.rpm cf20c97cbd8f0de273b2cffdf3b1e2a09dea06a0ac76d498e3d8e84fdf0d886e RLBA-2022:2071 dbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dbus-1.12.8-18.el8.aarch64.rpm c480575a15b7e6d901bab21c13ea0e195c95e5d5fc9a87dbc3ff2586ed364a09 dbus-common-1.12.8-18.el8.noarch.rpm 0554c08b1e43fe097efb482289d05d99ae942a3fc40b93a32637025e5bf1c787 dbus-common-1.12.8-18.el8.noarch.rpm 0554c08b1e43fe097efb482289d05d99ae942a3fc40b93a32637025e5bf1c787 dbus-daemon-1.12.8-18.el8.aarch64.rpm 35fd10127ed494ef1bf97b790cdf7ad003a5221422bbbfbc76a59d6debaaf754 dbus-libs-1.12.8-18.el8.aarch64.rpm 1089adcc447e80582dfa7424d9ead98a1ed619282b74b5aa7d17870dfe139c7a dbus-tools-1.12.8-18.el8.aarch64.rpm 22ab6d6c6e4ee0033d6861af24ed8c7efb359db5ebdf47990d31101e6e971d2d RLBA-2022:2075 libtalloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libtalloc-2.3.3-1.el8.aarch64.rpm 8abfe55102816bdd835f857c795ffdd98602bb29c1bcab48f007cd95b348ca11 libtalloc-devel-2.3.3-1.el8.aarch64.rpm 4a31b43b2125d6480dd3ff2896ecba52263d4fb2ef089d5bbb91530ffeae863f python3-talloc-2.3.3-1.el8.aarch64.rpm 1c371d0405370ea7e83a70951ddf80a1193b97710005c6edce81b066667dc8ea RLBA-2022:2076 libtdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libtdb-1.4.4-1.el8.aarch64.rpm 8520cb3190316ae3423194a8d24844b883f64458afbd4890398f426ef668ff18 libtdb-devel-1.4.4-1.el8.aarch64.rpm 4929b23cb4037575ea929740d9c3e730afcb0675884e2c0a39e724815f0d6008 python3-tdb-1.4.4-1.el8.aarch64.rpm 0d26528c5308d97c567a7c091d7d73d4575c60f1cc6623b6e4a9c4619e8103b8 tdb-tools-1.4.4-1.el8.aarch64.rpm 9824eef6a5f90372f5527b64cd58e697483ced151e56f25e0f16a646a0db8c2d RLBA-2022:2077 libldb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ldb-tools-2.4.1-1.el8.aarch64.rpm baa4e60e3ee09026677c4aff9198ad13e66675acb963b170a7e25f3426f07dd2 libldb-2.4.1-1.el8.aarch64.rpm 2dd289f38b2af368f47566e3e1fa34937b4ec609a0d00b746477dc4660cdcace libldb-devel-2.4.1-1.el8.aarch64.rpm f1148b990cbb97de0fae1ff1e7a039d130ef8bef6a22cede08feee85d460f61c python3-ldb-2.4.1-1.el8.aarch64.rpm 61f3c0ef1edf6a26f2925656543d3f1ff3c83bdacccad013ba746ef9c49198c3 RLSA-2022:2081 Low: bluez security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Security Fix(es): * bluez: memory leak in the SDP protocol (CVE-2021-41229) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms bluez-5.56-3.el8.aarch64.rpm bc377eb1ccf8fe226d390fb1bc4801a5eeaddba1b7ac7b659955b874a7601540 bluez-hid2hci-5.56-3.el8.aarch64.rpm dc5c52beb4a61297f41649527bca4c72d0726f3dc50efd738146c7de77ebc4ce bluez-libs-5.56-3.el8.aarch64.rpm 63aa2c5ade6fbf5eb79cf08e48d8a8d750a6fb651a1d5c8f66dfe17791dbe5e9 bluez-obexd-5.56-3.el8.aarch64.rpm bad7e399af56ef14ac7f6fbb62d6b8a31bf6e0c7a4f64d9cc11583c547ce0130 RLBA-2022:2084 autofs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms autofs-5.1.4-82.el8.aarch64.rpm 9dc5c8fe47b2af6eb9b48e795ac75c738ba3fc6ac0ebb179bff7cd001e990acd RLSA-2022:2092 Moderate: bind security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The following packages have been upgraded to a later upstream version: bind (9.11.36). (BZ#2013993) Security Fix(es): * bind: Lame cache can be abused to severely degrade resolver performance (CVE-2021-25219) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms bind-export-devel-9.11.36-3.el8.aarch64.rpm b42395957bf7dc831f94ac305197f895ac57e0b1abfd09b382ed0debc1ec6075 bind-export-libs-9.11.36-3.el8.aarch64.rpm 5aef5c977d0dcdf6aff66f7584a021ad7c8e61ad345b14d0ffdabfb82be89338 RLBA-2022:2096 audit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms audispd-plugins-3.0.7-2.el8.2.aarch64.rpm b26bd4a022bedac22a61f82b25380139654811965b6bc3580535eeec125a0f0a audispd-plugins-zos-3.0.7-2.el8.2.aarch64.rpm 7d9930e3a17bae5d41dede99f0bccc938fcfd4197e14d5afcd4b87ebb6dced55 audit-3.0.7-2.el8.2.aarch64.rpm bd146ab57c28b303586a79256cc7ddbec8d8af73d90a500449ce74678d36b3d6 audit-libs-3.0.7-2.el8.2.aarch64.rpm 60a5d73c4dcf8e5c00f4b75b8d1d01d9d2f67b38556976661e506aac0661dda2 audit-libs-devel-3.0.7-2.el8.2.aarch64.rpm 7724d296f24a99bda0b1da084a69b9e6543739aef2225f897f14e9e84c054093 python3-audit-3.0.7-2.el8.2.aarch64.rpm 1865f4f4c8b2462518a403b785b511f3c4a88cea060e042534b1dcc3ab01170b RLBA-2022:2102 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms pam-1.3.1-16.el8.aarch64.rpm 2e592fcfcbeda1da8ae4a17c32c3d70aaa5be217bc01e19e39468baae55e4617 pam-devel-1.3.1-16.el8.aarch64.rpm 70f9b3f4601f61ee154d52c3cb3f00e7f94a0361e717c8c17d842b1d130a8341 RLBA-2022:2103 libcap bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libcap-2.48-2.el8.aarch64.rpm c95c207fc3acd6209459694ec43cebdf61374d4c065e50420f8350449afbacb5 libcap-devel-2.48-2.el8.aarch64.rpm e431b0e0da93bfc0e316f6f85406e510158a2bb30a5f171098caa8a2309dd8f1 RLBA-2022:2104 e2fsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for e2fsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms e2fsprogs-1.45.6-4.el8.aarch64.rpm 2f6da48ef25751b711a08d1fd898c8c9bce6a402f50ee44b96dfe241fbdf1604 e2fsprogs-devel-1.45.6-4.el8.aarch64.rpm d9b4ceae6b8ae83fab3427e435af5a003f5a4f2dc3a79d83aab2e166325b1b1c e2fsprogs-libs-1.45.6-4.el8.aarch64.rpm cf73ed8dfecc035e482e8a8a98272918c82a8090bbe6555321c343ab7246f838 libcom_err-1.45.6-4.el8.aarch64.rpm e8c4f5c22fa8d518be9b622720a43abd554a9ecc76bd1292af47c1699e93022a libcom_err-devel-1.45.6-4.el8.aarch64.rpm c744beaf800733c423a122725449f1d5ea5c17f1bcda8ab96f09443b68c2bde3 libss-1.45.6-4.el8.aarch64.rpm 8a571a3efae55816bf7678236aa48122fc1b5859f53adf1337eccc04b4378934 RLBA-2022:2105 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dracut-049-201.git20220131.el8.aarch64.rpm d5457c34f82a569d450630b8a7037dc68fab8b1c5c175c41c44f5fdf549359f3 dracut-caps-049-201.git20220131.el8.aarch64.rpm 73bd1e29bc6cccc88c3d0a54e9268e4e45b1af69a7e098c11482db6541054419 dracut-config-generic-049-201.git20220131.el8.aarch64.rpm 619a486f2c0e87a665527c7bd0168bfdc7fc9ad2656c4da72e048e0c6ef5e0ee dracut-config-rescue-049-201.git20220131.el8.aarch64.rpm 11cc743c4c3ef5bb5bb68b964783da877ae29d8b819746acc90db7e6065283a6 dracut-live-049-201.git20220131.el8.aarch64.rpm 7da8e9403a65d8a4f95db8e9d5f15d748be1038158c44a775c2ed6f644141846 dracut-network-049-201.git20220131.el8.aarch64.rpm 06050230da95651ecf52d3c0656de5602c58510f023af8d06bbfb26ab3a852b0 dracut-squash-049-201.git20220131.el8.aarch64.rpm f548e48495aab24e176e60d8171ace6b3e219a0238fc37e2ee5e07c973e4fdb7 dracut-tools-049-201.git20220131.el8.aarch64.rpm e1f118664ffe443ac670e59da5924539b266864d9de995c0f37208eab1044e19 RLBA-2022:2107 fuse bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms fuse-2.9.7-15.el8.aarch64.rpm 2e6c0e5dc508344400f6324ed55212b05adcf060e13d2d1aa739f45f1bb25f53 fuse3-3.3.0-15.el8.aarch64.rpm 711a06f5e1610751b21dee3de30e4e6bb38ccef0a0cf2988b3475e364fef7271 fuse3-devel-3.3.0-15.el8.aarch64.rpm 0cef5b21fd4dfcf8c8a8feeea7c7117e950e6b87bcf3ba1a8df60b45a36b4328 fuse3-libs-3.3.0-15.el8.aarch64.rpm 8c6379c3cda1dffe66fb6863102308a4d4c41ff4b36e6fe5b53bbf434126c906 fuse-common-3.3.0-15.el8.aarch64.rpm 069faf2537f58f9737e757ec41a8b158b75a495180d8522383fdae31ca1e1aa2 fuse-devel-2.9.7-15.el8.aarch64.rpm 3de88c81758074daebde2ca376a7eccb73227da8e32aacadad3ebe54dfe40b79 fuse-libs-2.9.7-15.el8.aarch64.rpm 3cd988ee6117a421b2a2569e0b0101ae5587f3d7427682d3bde532c9bc266f07 RLSA-2022:2120 Moderate: zsh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for zsh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more. Security Fix(es): * zsh: Prompt expansion vulnerability (CVE-2021-45444) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms zsh-5.5.1-9.el8.aarch64.rpm 0a51c3bfcdc8939a7af80f7975a644d96f63db2c53e8bf22431740abe6284c65 RLBA-2022:1987 kpatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kpatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms kpatch-0.9.4-2.el8.noarch.rpm 4138abc761e5203e31fe67101c5544caf3373e3112763cf40b99f5018e491651 kpatch-0.9.4-2.el8.noarch.rpm 4138abc761e5203e31fe67101c5544caf3373e3112763cf40b99f5018e491651 kpatch-dnf-0.4-2.el8.noarch.rpm 07bb0ee55a4ca638be72c37e8e61ff01627b3e955be7f989d8a281331b73a089 kpatch-dnf-0.4-2.el8.noarch.rpm 07bb0ee55a4ca638be72c37e8e61ff01627b3e955be7f989d8a281331b73a089 RLSA-2022:1988 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404) * kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788) * kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974) * kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941) * kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612) * kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669) * kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743) * kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744) * kernel: possible use-after-free in bluetooth module (CVE-2021-3752) * kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759) * kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764) * kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772) * kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773) * kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002) * kernel: security regression for CVE-2018-13405 (CVE-2021-4037) * kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157) * kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197) * kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203) * kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322) * kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781) * hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) * kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159) * kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864) * kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) * kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056) * kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389) * kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976) * kernel: use-after-free in the TEE subsystem (CVE-2021-44733) * kernel: information leak in the IPv6 implementation (CVE-2021-45485) * kernel: information leak in the IPv4 implementation (CVE-2021-45486) * hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001) * hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002) * kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286) * kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322) * kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011) * kernel: use-after-free in nouveau kernel module (CVE-2020-27820) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms bpftool-4.18.0-372.9.1.el8.aarch64.rpm 94d746962949d4d59c3f5cf36a4c1e9467daf81c7586294587c38689b2bdc8fc kernel-4.18.0-372.9.1.el8.aarch64.rpm 36c294ac1c900c14c4bb3ba0046561bb77f5af69ce120118640fde995b21a20f kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm d0a485f27dfb1b00828894ef76f71bf086ba6f1189092e479b56798c45a2455b kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm d0a485f27dfb1b00828894ef76f71bf086ba6f1189092e479b56798c45a2455b kernel-core-4.18.0-372.9.1.el8.aarch64.rpm f23933a80d6899440e98399f809ea8ded36d43869a4b9aa03672bf5a3ecb53ca kernel-cross-headers-4.18.0-372.9.1.el8.aarch64.rpm 3b31bbef63d79343ed35d046def00f5a0474a29c20e6e135cbfcb772f8b3c352 kernel-debug-4.18.0-372.9.1.el8.aarch64.rpm 2281a393bfe9c3e8b68fa3fccdcaa265a9e475328f92bdf80dea7b9035e4acf3 kernel-debug-core-4.18.0-372.9.1.el8.aarch64.rpm 0a6409ea40781fe7410c8b1e5d1e902fb7209e5de9b64c6c2fd14298acd0e10a kernel-debug-devel-4.18.0-372.9.1.el8.aarch64.rpm 8e88cb4146bc1622efbb9ab98e0413110a7e10c2216c1c591a60ea70e8598a4d kernel-debuginfo-common-aarch64-4.18.0-372.9.1.el8.aarch64.rpm 0b3b3d7be1d9a4315beaca6ef0b241a14f94b6d977372f807e62f35054ab3d78 kernel-debug-modules-4.18.0-372.9.1.el8.aarch64.rpm 00b569a9266202e02e1809343fd15338213734fe7953083faff438059f2f0f59 kernel-debug-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm d8904a5fea53e4f2afd4d9879e957930bcc412527deac5190080c553538ac576 kernel-devel-4.18.0-372.9.1.el8.aarch64.rpm 30771ad29902afeb3247962aa4329ae16f5d3a7f648a1fd4d756112c4ba9f943 kernel-doc-4.18.0-372.9.1.el8.noarch.rpm 836b52707ef57189bbe89194a01b511dfb51ef74dc22db6120afcc457d7eb01a kernel-doc-4.18.0-372.9.1.el8.noarch.rpm 836b52707ef57189bbe89194a01b511dfb51ef74dc22db6120afcc457d7eb01a kernel-headers-4.18.0-372.9.1.el8.aarch64.rpm d925d7921391eb191793297dbb29b750d17b5e7a0e1ff20ea85cabeec4a97f0a kernel-modules-4.18.0-372.9.1.el8.aarch64.rpm c0a44737fc43758e0119d84cabc3356dc613a6b526552d7b58359e497f269290 kernel-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm 06b586f0e4d82bb5887eab2c031bda1d0e8b11e340a7199c1846626343e942f6 kernel-tools-4.18.0-372.9.1.el8.aarch64.rpm 9edf2d3175443a688ce2a48b5014e90ce40b40b8ba46ee90b17144f380ba80e2 kernel-tools-libs-4.18.0-372.9.1.el8.aarch64.rpm 18f4b336292c28f7ac4cfea8db583aa6050b4092e8bcbf83a0b6e8616084419b perf-4.18.0-372.9.1.el8.aarch64.rpm 5dba03a74839f773a36f7a09925787a90c8ae3397d39cb7d9dcc5a9f732eab65 python3-perf-4.18.0-372.9.1.el8.aarch64.rpm a0fa26578c8e73c7021b820064ec7640487c63824b932027445b7893635d0d1f RLBA-2022:1992 rsync bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms rsync-3.1.3-14.el8.aarch64.rpm a9420155b5fc9c534cfb7b575299866b9c19b078e48bf85236337a5b9967d6bd rsync-daemon-3.1.3-14.el8.noarch.rpm 7ca7d967e5c9b8ef2326677520dbfdf82bce352f8b33b6bf0e2225db9dc19baa rsync-daemon-3.1.3-14.el8.noarch.rpm 7ca7d967e5c9b8ef2326677520dbfdf82bce352f8b33b6bf0e2225db9dc19baa RLBA-2022:1993 bash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms bash-4.4.20-3.el8.aarch64.rpm c68f07cccc0e2a7356ec658839b4dbbf25da2eed8d0e557a8a03c0ef22c48844 bash-doc-4.4.20-3.el8.aarch64.rpm fbcb95fefcf4f0eb6c59bdfcd121b0ec0d8c88f44b9c0c6be94c54fc2f2d2ccd RLBA-2022:1995 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms selinux-policy-3.14.3-95.el8.noarch.rpm 6e85269404fcb3646db4adeb05b996fa3fb77b6ff33a0b9c9e8ef72cbaf555d4 selinux-policy-3.14.3-95.el8.noarch.rpm 6e85269404fcb3646db4adeb05b996fa3fb77b6ff33a0b9c9e8ef72cbaf555d4 selinux-policy-devel-3.14.3-95.el8.noarch.rpm c7cebb847eaeecd3cd5726e73cd0103f86c7203f21f18df0beff6f40ab4327c3 selinux-policy-devel-3.14.3-95.el8.noarch.rpm c7cebb847eaeecd3cd5726e73cd0103f86c7203f21f18df0beff6f40ab4327c3 selinux-policy-doc-3.14.3-95.el8.noarch.rpm 04ebd05f9696edbe4ef0fb15fabeca9b26df7f5ece236ce171cd1aa57b4164af selinux-policy-doc-3.14.3-95.el8.noarch.rpm 04ebd05f9696edbe4ef0fb15fabeca9b26df7f5ece236ce171cd1aa57b4164af selinux-policy-minimum-3.14.3-95.el8.noarch.rpm e7af90f1a96e2ad0f27c0e5436262ff0f3b1d1804a8934e0099f8d288ef0330e selinux-policy-minimum-3.14.3-95.el8.noarch.rpm e7af90f1a96e2ad0f27c0e5436262ff0f3b1d1804a8934e0099f8d288ef0330e selinux-policy-mls-3.14.3-95.el8.noarch.rpm c944ffaad7ef33948d9b317a331112f1499b5869ba0b835c49248ea4fe896221 selinux-policy-mls-3.14.3-95.el8.noarch.rpm c944ffaad7ef33948d9b317a331112f1499b5869ba0b835c49248ea4fe896221 selinux-policy-sandbox-3.14.3-95.el8.noarch.rpm e4e31d5c82ed79c8ceaff25ce8228c963699167f6c63d33f2dac853f0662703c selinux-policy-sandbox-3.14.3-95.el8.noarch.rpm e4e31d5c82ed79c8ceaff25ce8228c963699167f6c63d33f2dac853f0662703c selinux-policy-targeted-3.14.3-95.el8.noarch.rpm f151753a94a0af303a91330e853c8170f69dbdc58c0dfeb5a6a6a576e9eebf60 selinux-policy-targeted-3.14.3-95.el8.noarch.rpm f151753a94a0af303a91330e853c8170f69dbdc58c0dfeb5a6a6a576e9eebf60 RLBA-2022:2000 glib2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms glib2-2.56.4-158.el8.aarch64.rpm 33b6d8f75e21785d0678d1e774bcec9f9a97bded84febf0e8720f770099aca68 glib2-devel-2.56.4-158.el8.aarch64.rpm c67711679b4988b17ba4dda26447c5830379efd8572b59c32895222b9645d7c1 glib2-fam-2.56.4-158.el8.aarch64.rpm 19a418cbdda10615493b9271e9b081447df938ed2b4516c21e27188ae42824b2 glib2-tests-2.56.4-158.el8.aarch64.rpm c0263cb14077dc0363b360e7c329b3caad4b082574fc05b75e5d0d5ed80b9a66 glib2-2.56.4-158.el8_6.1.aarch64.rpm 5183edb75014cfb1b3d341b12c19692d7c331bbff17cf767b6d4cb99d92c0830 glib2-devel-2.56.4-158.el8_6.1.aarch64.rpm ea8ece579861a004a9d3ef7edcc83e33b242d1ea666c30f8ee0c481f2f87e8bf glib2-fam-2.56.4-158.el8_6.1.aarch64.rpm 83f3317938248342e2ef36c029f0d1b9e9f52b86c8c645d5b38b95c4c5fcaf88 glib2-tests-2.56.4-158.el8_6.1.aarch64.rpm 0e82c10313b40160ec9d95e8b1ce9f3570de15fb7c8ad7d377947c1c8dd0b9bd RLBA-2022:2004 nftables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms nftables-0.9.3-25.el8.aarch64.rpm 66031b93ae6e8daa211eaf3ad3453ff8c83b1bf8acced19ae36f73e47af4ac92 python3-nftables-0.9.3-25.el8.aarch64.rpm 4b8a62a6c21b03e99e3b289336750d73a7cc6c74801a79ed52acad1ae25507b1 RLBA-2022:2007 cronie bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cronie. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms cronie-1.5.2-6.el8.aarch64.rpm 89510c42c2e154695e37815f25b33df9f7bb8006efae0cee70fd91eec22a4845 cronie-anacron-1.5.2-6.el8.aarch64.rpm db71cdd581c6277db841e23520e00dfc3da8c252e9ad4e100528e74fcad782e2 cronie-noanacron-1.5.2-6.el8.aarch64.rpm 12b5c0574a9fbe6faae0e772e408fa12b36f2123b7422ea4b0b07332e947677b RLBA-2022:2011 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms smc-tools-1.6.1-1.git7202891.el8.aarch64.rpm 18897f4869e0c6fe0b376d35c228242a45a7f2c564f2c8145b1b524f1cd75a34 RLBA-2022:2016 linux-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-107.el8.1.noarch.rpm 5a9e8cffc8d5caa868a1e591df46449b7b4d4ad816b318bdd244044ed9bd31f5 iwl1000-firmware-39.31.5.1-107.el8.1.noarch.rpm 5a9e8cffc8d5caa868a1e591df46449b7b4d4ad816b318bdd244044ed9bd31f5 iwl100-firmware-39.31.5.1-107.el8.1.noarch.rpm 703b8ca7a4c459cca55ffba7278612096a0aa4c199d670b344d882257f0142a5 iwl100-firmware-39.31.5.1-107.el8.1.noarch.rpm 703b8ca7a4c459cca55ffba7278612096a0aa4c199d670b344d882257f0142a5 iwl105-firmware-18.168.6.1-107.el8.1.noarch.rpm d3967648b49c6da23af6f78a919aacf60811b741bff96a43e081e79b766e3cc6 iwl105-firmware-18.168.6.1-107.el8.1.noarch.rpm d3967648b49c6da23af6f78a919aacf60811b741bff96a43e081e79b766e3cc6 iwl135-firmware-18.168.6.1-107.el8.1.noarch.rpm dc5aca51d65bd8039919626a9ee726f137958cdaff1f7a0fbff4b291c0b4b839 iwl135-firmware-18.168.6.1-107.el8.1.noarch.rpm dc5aca51d65bd8039919626a9ee726f137958cdaff1f7a0fbff4b291c0b4b839 iwl2000-firmware-18.168.6.1-107.el8.1.noarch.rpm 692ad62d00a784cebe708ce290e3fdf2e680bd69f236c407e2c0b114ed691195 iwl2000-firmware-18.168.6.1-107.el8.1.noarch.rpm 692ad62d00a784cebe708ce290e3fdf2e680bd69f236c407e2c0b114ed691195 iwl2030-firmware-18.168.6.1-107.el8.1.noarch.rpm b64564978c29fd901a39be34ce752094e89adc837a094bfa913a6edfc3db2176 iwl2030-firmware-18.168.6.1-107.el8.1.noarch.rpm b64564978c29fd901a39be34ce752094e89adc837a094bfa913a6edfc3db2176 iwl3160-firmware-25.30.13.0-107.el8.1.noarch.rpm d18555ef932869fc6b6a4353e2b5f4ebb2396ede88d77da0832a557e73b62952 iwl3160-firmware-25.30.13.0-107.el8.1.noarch.rpm d18555ef932869fc6b6a4353e2b5f4ebb2396ede88d77da0832a557e73b62952 iwl3945-firmware-15.32.2.9-107.el8.1.noarch.rpm 5762f53d98dda59bbd047d96f834fdf42f187abd97248a8f0462359bf7bbc7a8 iwl3945-firmware-15.32.2.9-107.el8.1.noarch.rpm 5762f53d98dda59bbd047d96f834fdf42f187abd97248a8f0462359bf7bbc7a8 iwl4965-firmware-228.61.2.24-107.el8.1.noarch.rpm b9f47070beff0016f08e29baabd0e70da644c16e7af51d1cc0dc8c12be74c209 iwl4965-firmware-228.61.2.24-107.el8.1.noarch.rpm b9f47070beff0016f08e29baabd0e70da644c16e7af51d1cc0dc8c12be74c209 iwl5000-firmware-8.83.5.1_1-107.el8.1.noarch.rpm 69af129de88684758740a23b8b6d3ff2b4cacde0b72f6dde85fd049c67994134 iwl5000-firmware-8.83.5.1_1-107.el8.1.noarch.rpm 69af129de88684758740a23b8b6d3ff2b4cacde0b72f6dde85fd049c67994134 iwl5150-firmware-8.24.2.2-107.el8.1.noarch.rpm b993d2aee1b4a6783f95fa37685397750044d3c403ce43475c8024798e24267f iwl5150-firmware-8.24.2.2-107.el8.1.noarch.rpm b993d2aee1b4a6783f95fa37685397750044d3c403ce43475c8024798e24267f iwl6000-firmware-9.221.4.1-107.el8.1.noarch.rpm 68bd74987bfb00165df6b999f9e387148e0bb71fec15066c214fb0b60dfdf6f3 iwl6000-firmware-9.221.4.1-107.el8.1.noarch.rpm 68bd74987bfb00165df6b999f9e387148e0bb71fec15066c214fb0b60dfdf6f3 iwl6000g2a-firmware-18.168.6.1-107.el8.1.noarch.rpm f23987cb2d1779803e0abf6b42fa4912b90d6f7af912ab33715151889a80520b iwl6000g2a-firmware-18.168.6.1-107.el8.1.noarch.rpm f23987cb2d1779803e0abf6b42fa4912b90d6f7af912ab33715151889a80520b iwl6000g2b-firmware-18.168.6.1-107.el8.1.noarch.rpm 5d062d2e1e49a3695b67cbc8189d9993a203e2327151e61ee83de92bc4d5911b iwl6000g2b-firmware-18.168.6.1-107.el8.1.noarch.rpm 5d062d2e1e49a3695b67cbc8189d9993a203e2327151e61ee83de92bc4d5911b iwl6050-firmware-41.28.5.1-107.el8.1.noarch.rpm f4d8ac4c7406fe69982dd97df12dccf4cbdad232a1858e4ae604855451789e16 iwl6050-firmware-41.28.5.1-107.el8.1.noarch.rpm f4d8ac4c7406fe69982dd97df12dccf4cbdad232a1858e4ae604855451789e16 iwl7260-firmware-25.30.13.0-107.el8.1.noarch.rpm 9b3cd6f401f5e31b18707f624630add624d22fb7887e8b5ce7f21415318c08c9 iwl7260-firmware-25.30.13.0-107.el8.1.noarch.rpm 9b3cd6f401f5e31b18707f624630add624d22fb7887e8b5ce7f21415318c08c9 libertas-sd8686-firmware-20220210-107.git6342082c.el8.noarch.rpm 648f28517485789671ff68814a43fa5b89b33d4151372c04c2d85d6e511a4cb4 libertas-sd8686-firmware-20220210-107.git6342082c.el8.noarch.rpm 648f28517485789671ff68814a43fa5b89b33d4151372c04c2d85d6e511a4cb4 libertas-sd8787-firmware-20220210-107.git6342082c.el8.noarch.rpm fee3a4bc092f161cacfb3ce289aff4314ed7958f064a27d70e2d14ec39c4a6e5 libertas-sd8787-firmware-20220210-107.git6342082c.el8.noarch.rpm fee3a4bc092f161cacfb3ce289aff4314ed7958f064a27d70e2d14ec39c4a6e5 libertas-usb8388-firmware-20220210-107.git6342082c.el8.noarch.rpm 39c5926e62ea36a9874b164b5573e4f3fecc7a8b390719ee2d3d7b3fd2f2c069 libertas-usb8388-firmware-20220210-107.git6342082c.el8.noarch.rpm 39c5926e62ea36a9874b164b5573e4f3fecc7a8b390719ee2d3d7b3fd2f2c069 libertas-usb8388-olpc-firmware-20220210-107.git6342082c.el8.noarch.rpm 0def1197d822d5ced7915640bdaaadd39c6be982257d0a39f5a9302e3c0edb93 libertas-usb8388-olpc-firmware-20220210-107.git6342082c.el8.noarch.rpm 0def1197d822d5ced7915640bdaaadd39c6be982257d0a39f5a9302e3c0edb93 linux-firmware-20220210-107.git6342082c.el8.noarch.rpm f09df3b5436a6f583df95c1b41036746416867615d26edab82b5523193f5057f linux-firmware-20220210-107.git6342082c.el8.noarch.rpm f09df3b5436a6f583df95c1b41036746416867615d26edab82b5523193f5057f RLBA-2022:2017 tuna bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms tuna-0.17-1.el8.noarch.rpm fa323413f717e5da595afd181657019f6f33241178f213a9f7ff35ed3eb23e95 tuna-0.17-1.el8.noarch.rpm fa323413f717e5da595afd181657019f6f33241178f213a9f7ff35ed3eb23e95 RLBA-2022:2021 shadow-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms shadow-utils-4.6-16.el8.aarch64.rpm 6a9d82787b1f70711bd13115d6c767ffd8b7fb2042f73815947f8b1ece54ef99 shadow-utils-subid-4.6-16.el8.aarch64.rpm c85ac875e84907640d5724cb4c094ee9c3d35f676825a94c8f5a10c998796970 RLBA-2022:2038 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.181-3.el8.aarch64.rpm 91d7f6ce590d78f56d96b56b00bf3bcd225d541111dca87c701dece6d594ebe9 device-mapper-event-1.02.181-3.el8.aarch64.rpm 72c3bdde85b22b1edc28dd1b161a1f3f51ded3f0e49e1d42e259f465aa737dd8 device-mapper-event-libs-1.02.181-3.el8.aarch64.rpm 2175f420b71a298e713acae8cab02e88043dc4bed4a53d732aea0cbf92a73aec device-mapper-libs-1.02.181-3.el8.aarch64.rpm 58c7b19756f842227650b6f287c9ebac4202e937a7dad25fefd9003910581ca7 lvm2-2.03.14-3.el8.aarch64.rpm 1671cc3010e58b49070bb2081b0dd4640eecb6f71b1af004b739605d19140267 lvm2-dbusd-2.03.14-3.el8.noarch.rpm ce043b1f360c54518fe0ce889e98274f695d79f474f20777ed58d42392917bd2 lvm2-dbusd-2.03.14-3.el8.noarch.rpm ce043b1f360c54518fe0ce889e98274f695d79f474f20777ed58d42392917bd2 lvm2-libs-2.03.14-3.el8.aarch64.rpm 9a09e3c915a80dca462d071f0b94a03d1a433a53a13c988b7678c0187aeef5dd lvm2-lockd-2.03.14-3.el8.aarch64.rpm 14837cc93a327ca3f4f432dd4331dafbdadcbb45134a086dc6609ef9ba207c00 RLBA-2022:2022 binutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms binutils-2.30-113.el8.aarch64.rpm acd0d350a24bc6136b17470c416f71587b7332ca668df129291ed5a78cbb884c RLBA-2022:2028 vdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms vdo-6.2.6.14-14.el8.aarch64.rpm 5c2394b90ea2a4e1b2e28d6d688edc7e87e5a18ce0257cb254c225fb6c8a1975 vdo-support-6.2.6.14-14.el8.aarch64.rpm 0cdeccc01341efac52cab8ca31470af7a6580def2bc212bfc849a5d478ccdca6 RLBA-2022:2033 device-mapper-persistent-data bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-persistent-data. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms device-mapper-persistent-data-0.9.0-6.el8.aarch64.rpm bb8ef337a20dc20f4a2db3ec74a3331b51c2646aaa257411c945fc874607f781 RLBA-2022:2036 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms device-mapper-multipath-0.8.4-22.el8.aarch64.rpm c0b6ee32baad1f683ad146b2f21ea8df1565128bc60c8b725af667b055f7f181 device-mapper-multipath-libs-0.8.4-22.el8.aarch64.rpm 8cd83fa14dc54901931a7fcb10a26b0140ab4654c0d0a251f94d86950c6e16a0 kpartx-0.8.4-22.el8.aarch64.rpm d3ef81d441cc2685841e775a94f634008ab48882b18de5480638c2446d72fde7 libdmmp-0.8.4-22.el8.aarch64.rpm d1130599b6d662202f8c437a36c8adedddf7b4fdb89e1549618f31e1794558f2 RLBA-2022:2039 libbpf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libbpf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libbpf-0.4.0-3.el8.aarch64.rpm 4db14c94c707926b3804111910982b82d9e7cf395985c5a65108eda4f0aa07b6 RLBA-2022:2042 ethtool bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ethtool. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ethtool-5.13-1.el8.aarch64.rpm 85e210d9a9768c9dbc7646c9b98d06982071a3ad450395e1962570cc8b2bc305 RLBA-2022:2045 librepo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms librepo-1.14.2-1.el8.aarch64.rpm 203bd607e95d7b0fc65868c2e2f7105fa68fcef610f95a92cba120e679c1e69b python3-librepo-1.14.2-1.el8.aarch64.rpm 1593986bde6a8900dd8632772154697df450ffcc8d53c4443ad46162f371cde1 RLBA-2022:2048 libdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libdnf-0.63.0-8.el8.aarch64.rpm 03c8c3d2ade5fb8326c8741174b390c72b7b6e0308356dc0708e8f938b93647c python3-hawkey-0.63.0-8.el8.aarch64.rpm ab0488f8e890418da68711adfafa15a8541d51bd30d46180842eecc37186fcf8 python3-libdnf-0.63.0-8.el8.aarch64.rpm 6f9ff278c2154809fbbb766365b2e263ec45fd90ae573e55462920a79e3f78e2 RLBA-2022:2049 iproute bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms iproute-5.15.0-4.el8.aarch64.rpm 0caad1eb5a58769efbe6ca93e252d8abd6439ba3c4439628bb372480ebfacc18 iproute-tc-5.15.0-4.el8.aarch64.rpm 29ec00f4725d25c8ecd3a930952fd0e6a6a4b7ef3c898b448c1233745122369d RLBA-2022:2050 libsolv bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsolv. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libsolv-0.7.20-1.el8.aarch64.rpm 132066b03d2699dba118cbfb4033c59ddd351156e490d024476bc33af027e1bd python3-solv-0.7.20-1.el8.aarch64.rpm 7899aa7b58889d9e71d7da3985e8937afd8b234f10c476c3a01780197dd66f01 RLBA-2022:2051 dnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dnf-4.7.0-8.el8.noarch.rpm 85a2a1480c183f1863f1c2af82c2ff9e0851a6c253acffbb49750bb38d87e74a dnf-4.7.0-8.el8.noarch.rpm 85a2a1480c183f1863f1c2af82c2ff9e0851a6c253acffbb49750bb38d87e74a dnf-automatic-4.7.0-8.el8.noarch.rpm 2ce7fa9b10fce3fff3afd2773c757ecd8e62eadf9b829e9d8617b85dd8ab3983 dnf-automatic-4.7.0-8.el8.noarch.rpm 2ce7fa9b10fce3fff3afd2773c757ecd8e62eadf9b829e9d8617b85dd8ab3983 dnf-data-4.7.0-8.el8.noarch.rpm 2322c0b93a344d0ddbf28e464528c28ab66f18e7aea431b7f191f09ce44f9095 dnf-data-4.7.0-8.el8.noarch.rpm 2322c0b93a344d0ddbf28e464528c28ab66f18e7aea431b7f191f09ce44f9095 python3-dnf-4.7.0-8.el8.noarch.rpm 84abe628d7376d6cb2a5937242a32f1680631b26a254ad3b3b77f72e9d48acf6 python3-dnf-4.7.0-8.el8.noarch.rpm 84abe628d7376d6cb2a5937242a32f1680631b26a254ad3b3b77f72e9d48acf6 yum-4.7.0-8.el8.noarch.rpm c665cd526e1ca704ef264546692ccd6ddf956abfaa97a5582e3fdd5f2cbb35b6 yum-4.7.0-8.el8.noarch.rpm c665cd526e1ca704ef264546692ccd6ddf956abfaa97a5582e3fdd5f2cbb35b6 RLBA-2022:2052 dnf-plugins-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dnf-plugins-core-4.0.21-11.el8.noarch.rpm c4ad6b6149d0b7ba661f93fe2d24bd5c2333ee0fdfb942eb5b498b88a704ae8d dnf-plugins-core-4.0.21-11.el8.noarch.rpm c4ad6b6149d0b7ba661f93fe2d24bd5c2333ee0fdfb942eb5b498b88a704ae8d python3-dnf-plugin-post-transaction-actions-4.0.21-11.el8.noarch.rpm baef7fc3a1e99f70199ecfcadc6959e4ed12635ae519fbeaedb074e0a1c0d95e python3-dnf-plugin-post-transaction-actions-4.0.21-11.el8.noarch.rpm baef7fc3a1e99f70199ecfcadc6959e4ed12635ae519fbeaedb074e0a1c0d95e python3-dnf-plugins-core-4.0.21-11.el8.noarch.rpm 4fe691697f5c2682e7575c95266f3f44934b2d3b7b8e4b154769709526238a98 python3-dnf-plugins-core-4.0.21-11.el8.noarch.rpm 4fe691697f5c2682e7575c95266f3f44934b2d3b7b8e4b154769709526238a98 python3-dnf-plugin-versionlock-4.0.21-11.el8.noarch.rpm 638b7b64f9c9a2865ab8acd4dcb13940d119bfe98b3f27f392ef8778d615bdbe python3-dnf-plugin-versionlock-4.0.21-11.el8.noarch.rpm 638b7b64f9c9a2865ab8acd4dcb13940d119bfe98b3f27f392ef8778d615bdbe yum-utils-4.0.21-11.el8.noarch.rpm 38875399e7f84ef3ed2c966ba4d6c4e835760a4d6b7daf379aa69f9c9de3bd00 yum-utils-4.0.21-11.el8.noarch.rpm 38875399e7f84ef3ed2c966ba4d6c4e835760a4d6b7daf379aa69f9c9de3bd00 RLBA-2022:2053 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.20-68.el8.aarch64.rpm 288931ff544ce28b243fe4de978b9917489dc6306d0dfc8eca2042f4964b59f5 RLBA-2022:2056 fwupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms fwupd-1.7.4-2.el8.aarch64.rpm ef33775acf6cfe2dc4fd071e035928d9a3070f2b7d5c9a80811e325a3411a597 RLBA-2022:2057 rng-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms rng-tools-6.14-4.git.b2b7934e.el8.aarch64.rpm 1ad3bceb614f2bf24b7d0da4a1c313664b4c709477ecff06f7c2ad3ed5e8894b RLBA-2022:2058 ndctl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ndctl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms daxctl-71.1-3.el8.aarch64.rpm 0e9947cff505c7c1dabd98ec9e2ca94701249731c4fda1a2be414baed3c05707 daxctl-libs-71.1-3.el8.aarch64.rpm bd9054daf2ee6ddde9e4e4ade97968ac56956b62b2623618c8db110a724935cb ndctl-71.1-3.el8.aarch64.rpm 5de307672cd70f531c7857263fc977d7d129a25ee40e2afc39badbe5dc9042e5 ndctl-libs-71.1-3.el8.aarch64.rpm e4b0bf88faa3e678b46ab3111eba6464f56f88dacb35292b182381e551e04298 RLBA-2022:2059 nvme-cli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nvme-cli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms nvme-cli-1.16-3.el8.aarch64.rpm 7de39f8fbcf8d0998ba0f29aec8269936193e7ab94a1b241c7e1cbaa77288239 RLBA-2022:2065 libtirpc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libtirpc-1.1.4-6.el8.aarch64.rpm 55a6b412aa72c816b4950163b8624c817ff0a6f386fbdd019263d5367d701309 libtirpc-devel-1.1.4-6.el8.aarch64.rpm 1a3edf453c5a5113baa03df07e8b12eacb6f8403b2d2d85f67f0fe44e3255503 RLBA-2022:2067 which bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for which. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms which-2.21-17.el8.aarch64.rpm 6103d926d33f86fe4965f6d9fc6ebf1f1fc71ff1945ed4b72c7d67daa86e889d RLBA-2022:2070 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libipa_hbac-2.6.2-3.el8.aarch64.rpm 712eb22fbf03e82ef591a3913c1166a83da0c686ad5a419dc686fb4aa39c459b libsss_autofs-2.6.2-3.el8.aarch64.rpm 5ed1eb4282dab690bb35fd8b8d776397afab50f2064294de8c945cf4705fd91e libsss_certmap-2.6.2-3.el8.aarch64.rpm 316c4cbcfaac94d1c7b1d1b07b2a42a8ba3bd14a62cfff4f0a54f2033a58b580 libsss_idmap-2.6.2-3.el8.aarch64.rpm fca3d4492092f2b300852bbd4348ed31db64b8ba0f7762cee8dea2e512279886 libsss_nss_idmap-2.6.2-3.el8.aarch64.rpm 4ace2d3da536662dc691fc95e0438f68d74599f8588f55bac23b54397f54f7ea libsss_simpleifp-2.6.2-3.el8.aarch64.rpm 9c2f378776e14a40fe6b4e339f92853d9e9665dde344eac0e13c26afae39c1c1 libsss_sudo-2.6.2-3.el8.aarch64.rpm 2ab5b0457866296be0b9959ec9863dc85f14209bfe82f4749cb5789b99947c45 python3-libipa_hbac-2.6.2-3.el8.aarch64.rpm 40fe98e7b34676b3b7968dcc186708399e5902db7a439e578375955900c14776 python3-libsss_nss_idmap-2.6.2-3.el8.aarch64.rpm ff5e10dba94c6e3f0f81c0b22a2eef7fd10bc6ebf0d56b7ee79102e777377af0 python3-sss-2.6.2-3.el8.aarch64.rpm 51b4c8c7b19fd8362b07e4e0b92b83bf6bd895d994c142b94efc1c0ffee93f05 python3-sssdconfig-2.6.2-3.el8.noarch.rpm 00f27a2f462e7dddb75ebe2881a7ec464f8e14a2274b9d4a17a99c3231c71b14 python3-sssdconfig-2.6.2-3.el8.noarch.rpm 00f27a2f462e7dddb75ebe2881a7ec464f8e14a2274b9d4a17a99c3231c71b14 python3-sss-murmur-2.6.2-3.el8.aarch64.rpm 2885c35ac96ec91bb9210db25614269345504fa65f7d37b032ae5684984b75ee sssd-2.6.2-3.el8.aarch64.rpm c4c7d02738c0f19c77839b75508f45ff8dcef36c948cd0c9deb05671d531c085 sssd-ad-2.6.2-3.el8.aarch64.rpm 1c09b0e093a87c9e5a6d8767774108d27d91efbf294ea42780036ceb708c6b06 sssd-client-2.6.2-3.el8.aarch64.rpm 38df144a0137dc542f039a875488912e9d963ae8c53b591f6e4dff03a6e5c0be sssd-common-2.6.2-3.el8.aarch64.rpm 8dd2bc0c9c874f28c2f7f70d6ca5d7b0c690a44e7548cf96d700ea6c46bae877 sssd-common-pac-2.6.2-3.el8.aarch64.rpm b1dc2e760aeac82ef76ebb3fe0bb086d72779b4e333765b358fbb97be2d115fb sssd-dbus-2.6.2-3.el8.aarch64.rpm 32680f5eb0a7af1ad1245dd92b444a28209e005134240b5b8f6ee88b0055aedb sssd-ipa-2.6.2-3.el8.aarch64.rpm 1ec3948aac696875a090ad27b37bd23efe49b4c088cd3674b3e1cda8d5037b4c sssd-kcm-2.6.2-3.el8.aarch64.rpm aa234d894c4f6bc2aff48a1103d457f79404dfad2c989ed3b8e215fdd825b310 sssd-krb5-2.6.2-3.el8.aarch64.rpm 5894193899886d78f011541c4e153ac1e76005590ecfc6b64352acc410873818 sssd-krb5-common-2.6.2-3.el8.aarch64.rpm 0eb429578a2e15670e8da7458dffee2438b8a2cb5ad1a77f784e6a4cf5fe806e sssd-ldap-2.6.2-3.el8.aarch64.rpm 82b144244519de04a017a4ebddbb3570eae769a9a82604307d5fc5d1bc77b172 sssd-nfs-idmap-2.6.2-3.el8.aarch64.rpm c164b2a6e0afeb3407c772ba95dfe346c77d6420d5bcccce07c666f1d7767d74 sssd-polkit-rules-2.6.2-3.el8.aarch64.rpm 551954f9f1cdad518fd3b759745992d0a3cb32b589a3a10e9b1fd20fdbe9f9e7 sssd-proxy-2.6.2-3.el8.aarch64.rpm 851493d803e980bf157ccca56999c46abd6835b41ba33df90f51528194ca1036 sssd-tools-2.6.2-3.el8.aarch64.rpm cfc23f4dbbd7bda522a7ce487c28e20bf6f725b9f4c1890fc67c01dfad1af87f sssd-winbind-idmap-2.6.2-3.el8.aarch64.rpm bba584108add5920b4aa4f6ed046632519230f4a512703f9c2cabba5e986ae2c RLBA-2022:2072 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libasan-8.5.0-10.el8.aarch64.rpm 85d42fecf890c06a232d56440a7d886d74c874192b516e130030bb97ad6c8bb0 libatomic-8.5.0-10.el8.aarch64.rpm 382c2ed6771ae3b68e52a2f12836f65c96117f66146e51cd5209c27995b0e7c0 libatomic-static-8.5.0-10.el8.aarch64.rpm 408b5dcc0e3a93b2b355e7fd839d7d3eafc04554556036e7b0e87d7d2b68f942 libgcc-8.5.0-10.el8.aarch64.rpm 12eda2a67b4fe82043a94415497fa008e4afaa7767c1491854519fae089cf72a libgfortran-8.5.0-10.el8.aarch64.rpm c2485e7a219bdcd4e5aaac6b18c3f2802d5c4261869082597d16ae5416fadeb8 libgomp-8.5.0-10.el8.aarch64.rpm ce12904dce766a117a7ca64cfab200a9eab75463be2b41dddeac1dfe0b342976 libitm-8.5.0-10.el8.aarch64.rpm d6a6429c27cac14cb5dbbe0b59479358d59558a9d2756968dea50a56237a1332 liblsan-8.5.0-10.el8.aarch64.rpm 477724de253a8088c556eaa0ed28f8dca8ca0cf8aee4655b74c7b9ab2b9b9363 libstdc++-8.5.0-10.el8.aarch64.rpm 2b460c2a2583ff60a0a387cda72a1ca81ed95d7078346b425c14d31b2ab23f02 libtsan-8.5.0-10.el8.aarch64.rpm 042dedf1bfb20a5feea334db80efc5ea2b45f335af6f953fb471fe1ab1d75465 libubsan-8.5.0-10.el8.aarch64.rpm 9d169c69e36ca90efea7da8a10677a70d05ebdca2cd721903cc8468953fe2e58 RLSA-2022:2074 Moderate: samba security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. The following packages have been upgraded to a later upstream version: samba (4.15.5). (BZ#2013596) Security Fix(es): * samba: Symlink race error can allow metadata read and modify outside of the exported share (CVE-2021-20316) * samba: Information leak via symlinks of existance of files or directories outside of the exported share (CVE-2021-44141) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms ctdb-4.15.5-5.el8.aarch64.rpm c68206fa2366cb4e0aa2fe4d02227196126dcd541bf51983f32a701d220a825d libsmbclient-4.15.5-5.el8.aarch64.rpm 3a76951892647b18d8784349d14fdccc59c79a2c69eb44854ce547ee871fcf04 libwbclient-4.15.5-5.el8.aarch64.rpm 0bf3233ac2c9d415a8bb8be179268c5a444d5620b090f602e6ad55c7f196372e python3-samba-4.15.5-5.el8.aarch64.rpm 7c1fecea13cb87414608ceae76c31e836a57f3b89a3a74c2a3dabe37401cc6a4 python3-samba-test-4.15.5-5.el8.aarch64.rpm 25cb1ed22eaccf77660f5441f8ab158c660bbf7cf555fdbfe7cd23e27627bb07 samba-4.15.5-5.el8.aarch64.rpm 8e2093200839f8da72f73772893ee364454fb0cbef7c80b20e6f11daab5ca30e samba-client-4.15.5-5.el8.aarch64.rpm fa5eb8e3ce166c992c75a5a423234cf20168f7df562a567fb25fcffc2db7347f samba-client-libs-4.15.5-5.el8.aarch64.rpm a436c33a011dee58459bb4238ff026b6728a8201dfcfc66615874a77fadbcfa1 samba-common-4.15.5-5.el8.noarch.rpm df25895da73528a50ab474f9c2a3c9f450484bba78970c4033d83782f2f75656 samba-common-4.15.5-5.el8.noarch.rpm df25895da73528a50ab474f9c2a3c9f450484bba78970c4033d83782f2f75656 samba-common-libs-4.15.5-5.el8.aarch64.rpm 3a3fac25a306b252cfdaa321d863c5d278f32fd49fe5b9687235d7ca0583f4f9 samba-common-tools-4.15.5-5.el8.aarch64.rpm 40f31b88f05d0ed8eee27623845f38e62518444f71fddf3a79378183b1fc18dd samba-krb5-printing-4.15.5-5.el8.aarch64.rpm 53c7c805521fcfb352a7096e9116955deda818383e78039c8cbab5e8ae032a57 samba-libs-4.15.5-5.el8.aarch64.rpm dad99a2657f8a77f081e1af35d9760a2eb204bd009d9fab6fb14ee2efb63f519 samba-pidl-4.15.5-5.el8.noarch.rpm e9b9b16cddf61a1613e3a4abe1199082a8d1b9979bcd54e3797b88e7cc4c4b16 samba-pidl-4.15.5-5.el8.noarch.rpm e9b9b16cddf61a1613e3a4abe1199082a8d1b9979bcd54e3797b88e7cc4c4b16 samba-test-4.15.5-5.el8.aarch64.rpm 965af8221ca2b5e67d594e859aed13c954c4a5c4106c6c5ed352d34c8ff66bab samba-test-libs-4.15.5-5.el8.aarch64.rpm e3abaa27bd4fe78e950877ac374c5d0cb5cb0384e039eb77846b485f898a41ea samba-winbind-4.15.5-5.el8.aarch64.rpm 2736e41282ba1178e6d94ab579416a8c8d1069bd9e571b56e3f054685586e0bb samba-winbind-clients-4.15.5-5.el8.aarch64.rpm f15df00914c6b23e011e62222967713810e6235e1c501f27ee5773f7ff6e2b92 samba-winbind-krb5-locator-4.15.5-5.el8.aarch64.rpm d87c060f66224a29419c94d5338d70876e034784dc1f43bb32cb2787a1122825 samba-winbind-modules-4.15.5-5.el8.aarch64.rpm 5f03f26f5a63faef3403971bd66cfb2e0ca1af87f6cf8c76de2c1ed990e1f55a RLBA-2022:2082 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms python3-rpm-4.14.3-23.el8.aarch64.rpm 8c5ba6098b20b25f9cb1164d7f14774da70e0c46020a149e0686964dcb50ac6c rpm-4.14.3-23.el8.aarch64.rpm 5a4f3bd437f4e1a7a9b56a67e543bfa4c72eefd05984217d990cc10f5becb483 rpm-apidocs-4.14.3-23.el8.noarch.rpm 70f1d847d839573338c44dfe3b048f734e3cf31291e92d4c5835e4be4b0ba03e rpm-apidocs-4.14.3-23.el8.noarch.rpm 70f1d847d839573338c44dfe3b048f734e3cf31291e92d4c5835e4be4b0ba03e rpm-build-libs-4.14.3-23.el8.aarch64.rpm b0484fe360dce2060805f789d58e73ce2aa23e027d2c33b8a7fe46724490381e rpm-cron-4.14.3-23.el8.noarch.rpm fb54bacd21f525423773e2e0eeb401832381b392905338ec076c5d5d5cd78cf9 rpm-cron-4.14.3-23.el8.noarch.rpm fb54bacd21f525423773e2e0eeb401832381b392905338ec076c5d5d5cd78cf9 rpm-devel-4.14.3-23.el8.aarch64.rpm 463298c614c944995488f3f398eb888cb29b00f678a7f6a3d1c9a1ad174842e2 rpm-libs-4.14.3-23.el8.aarch64.rpm 900542742dd78718563f585fec232dbe79051966bc17ce6f8c7d80da83424456 rpm-plugin-ima-4.14.3-23.el8.aarch64.rpm 8a9b9fa6e88b0423a71a5f94c58acb1ec7c1d1c09d079faa6dc37d49c844bbaf rpm-plugin-prioreset-4.14.3-23.el8.aarch64.rpm 175c007a6015ec3b106ecde9817adbee22cf4fd6002a8beaff929116000a45e5 rpm-plugin-selinux-4.14.3-23.el8.aarch64.rpm 76644c0c36fbacee5e87144dc5709865263982713f95f863191bd928531ba68b rpm-plugin-syslog-4.14.3-23.el8.aarch64.rpm d41cac33d28b25916cb31c21ff21b0eb9daa46ec4e67f2ac2bf35ee811471c51 rpm-plugin-systemd-inhibit-4.14.3-23.el8.aarch64.rpm ccb6692a72e5fb576308ab12f082cd999dc1dba39074213b3c1c4b55f9b45771 rpm-sign-4.14.3-23.el8.aarch64.rpm 5419f2c93386aeaf434259fa8678e84a453a2ebed5611cf395d21f7c28745e35 RLBA-2022:2083 gssproxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gssproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms gssproxy-0.8.0-20.el8.aarch64.rpm 362c2d4c87740f6f5f2d697e500247b683e593560b9e0b509482940d91e066d8 RLBA-2022:2086 iputils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iputils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms iputils-20180629-9.el8.aarch64.rpm dca52566063a582e2d211950a2151980f1369abdc7c8fa0a2b649e09bf6fcc48 iputils-ninfod-20180629-9.el8.aarch64.rpm 9f3159099367ce0fcef13b6f339caa36f0942323d38babd1b13719710fe8acfe RLBA-2022:2085 hwdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms hwdata-0.314-8.12.el8.noarch.rpm bfb214fde7b4e0e5c026623ea001d646086e95ab747d14efbf062f9500a9bcfd hwdata-0.314-8.12.el8.noarch.rpm bfb214fde7b4e0e5c026623ea001d646086e95ab747d14efbf062f9500a9bcfd RLBA-2022:2087 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms mdadm-4.2-2.el8.aarch64.rpm 09343e8695adfd2a6bed6e432878d5f39307fec30c39c27e5f95915dd17819c8 RLBA-2022:2090 virt-what bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for virt-what. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms virt-what-1.18-13.el8.aarch64.rpm 3ec4dd452b7e325a5a51e8fe831c1a5b0988601a7fb426f300a0c72ab9810594 RLEA-2022:2093 dhcp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dhcp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms dhcp-client-4.3.6-47.el8.aarch64.rpm a745984d45156f824d7dc15e9ec633b0a80afda5af4857a04d5cde4aae0e4876 dhcp-common-4.3.6-47.el8.noarch.rpm 47ff85a86490c4a51d90e92d7dec1afbe6a04a6d5b51112f87ece2d3091460c1 dhcp-common-4.3.6-47.el8.noarch.rpm 47ff85a86490c4a51d90e92d7dec1afbe6a04a6d5b51112f87ece2d3091460c1 dhcp-libs-4.3.6-47.el8.aarch64.rpm c315a38c1645f893409a5316894a8e5370325764a2c3bff0dc0bee35418bad1d dhcp-relay-4.3.6-47.el8.aarch64.rpm f23b720ac28c2fde7c598b53a429bc10176270fd21dd774ffb2346433fb8677b dhcp-server-4.3.6-47.el8.aarch64.rpm 4c61b271d682453f870b45fdf68c623bbfa34cb369bafd2666bb705a78521d25 RLBA-2022:2100 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libblkid-2.32.1-35.el8.aarch64.rpm 51a6b0d5f034fe8e4fd67f1d7352a312413ae10f2d2b9b76385df65e9de81388 libblkid-devel-2.32.1-35.el8.aarch64.rpm 913a6166dc7bce59bef4bf73fa898b76467aab6811acda8e9fa1f4dc0398548b libfdisk-2.32.1-35.el8.aarch64.rpm c809de9129a45e54553c5eac7e037d84001594f8fc6f0ec5d3bbf61fce5093d0 libfdisk-devel-2.32.1-35.el8.aarch64.rpm ace7b24d429d75abb22894196b09fe70f44d247a0d0eefccbf0fb656bb1291c1 libmount-2.32.1-35.el8.aarch64.rpm 2dbf31483f9ea10dd9d2e3b755649f9a83c6e41293fdc67daef5513c54f11b2e libsmartcols-2.32.1-35.el8.aarch64.rpm c42f067b7ed4c9ec6199e20853c817efd8b8d0ed2e8a4fd2ec404339cd5a7c87 libsmartcols-devel-2.32.1-35.el8.aarch64.rpm fe98bb79948c1d1b916c6fa1c74782b87393ada4b09f130bb010009beaf7b433 libuuid-2.32.1-35.el8.aarch64.rpm 69f52f080208adc7358396b7f5c512c2bb92cb0f2e7aafb956052c65a8844cfd libuuid-devel-2.32.1-35.el8.aarch64.rpm 983b588be2ddddd5ef7d5b45a3daf672dad35a6dba221b91851313aec07bc936 util-linux-2.32.1-35.el8.aarch64.rpm 8c7399d4d467da0970c5cd49a57dc148e1f073736e6d70858ea78da5a0f68861 util-linux-user-2.32.1-35.el8.aarch64.rpm 60dd7c4d5b6a1d54021f4144b597daec547b70cfb59fd32964ac8157430c18a2 uuidd-2.32.1-35.el8.aarch64.rpm 2ba48ededf8ee1f07076da021652691f35dee5892cba1be14db50f7fc835e525 RLBA-2022:2106 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms tuned-2.18.0-2.el8.noarch.rpm 5fce0e7edf3d92b66410dc34428420823fe1902d5739bb83344aa3a8ad15598e tuned-2.18.0-2.el8.noarch.rpm 5fce0e7edf3d92b66410dc34428420823fe1902d5739bb83344aa3a8ad15598e tuned-profiles-atomic-2.18.0-2.el8.noarch.rpm a1ee441a4d142c573f24276ce3588522453f1a35d7f8e0d44cd76df97d082eab tuned-profiles-atomic-2.18.0-2.el8.noarch.rpm a1ee441a4d142c573f24276ce3588522453f1a35d7f8e0d44cd76df97d082eab tuned-profiles-compat-2.18.0-2.el8.noarch.rpm 41a9b955a0dbcd156a46cc8bae4c9d43aa7206dde34237d7fc9626017f956f4c tuned-profiles-compat-2.18.0-2.el8.noarch.rpm 41a9b955a0dbcd156a46cc8bae4c9d43aa7206dde34237d7fc9626017f956f4c tuned-profiles-cpu-partitioning-2.18.0-2.el8.noarch.rpm 26df8653cfaaa6f126c052d1caf19d81ea139c8538228b6d2766d24f95ccb670 tuned-profiles-cpu-partitioning-2.18.0-2.el8.noarch.rpm 26df8653cfaaa6f126c052d1caf19d81ea139c8538228b6d2766d24f95ccb670 tuned-profiles-mssql-2.18.0-2.el8.noarch.rpm 1ed6ebd24ab570019ec7eaaf0b3f79352b3bc99df4b85d076ee04a23f36b31a7 tuned-profiles-mssql-2.18.0-2.el8.noarch.rpm 1ed6ebd24ab570019ec7eaaf0b3f79352b3bc99df4b85d076ee04a23f36b31a7 tuned-profiles-oracle-2.18.0-2.el8.noarch.rpm fc0ceffeba0fdf03da856c5d4378ecb92aac76190635ddd08af563db5768d8b1 tuned-profiles-oracle-2.18.0-2.el8.noarch.rpm fc0ceffeba0fdf03da856c5d4378ecb92aac76190635ddd08af563db5768d8b1 RLSA-2022:2110 Low: grub2 security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Incorrect permission in grub.cfg allow unprivileged user to read the file content (CVE-2021-3981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms grub2-common-2.02-123.el8.noarch.rpm 70e1b43a725f859c1f7458e7a5a6e2221e1b773a92b3ec953821d043ac515f44 grub2-common-2.02-123.el8.noarch.rpm 70e1b43a725f859c1f7458e7a5a6e2221e1b773a92b3ec953821d043ac515f44 grub2-efi-aa64-2.02-123.el8.aarch64.rpm 1453db93c6fcce35676e3a0c2ce408a46fe851c3b8e23d06a1b6b690b6a31fcb grub2-efi-aa64-cdboot-2.02-123.el8.aarch64.rpm c9781465ccd80380fe063a2703eb8eb661af7a3328b156f1104a372b15d642c2 grub2-efi-aa64-modules-2.02-123.el8.noarch.rpm 39caba50f51089470ca9eea93de6c215e54b3b0b6690eb967344483d82f9ffa3 grub2-efi-aa64-modules-2.02-123.el8.noarch.rpm 39caba50f51089470ca9eea93de6c215e54b3b0b6690eb967344483d82f9ffa3 grub2-efi-ia32-modules-2.02-123.el8.noarch.rpm 54d02b7097fbbf27377dce910c2f56f2585ea6dc6a210173ddbd6ab2e03d529c grub2-efi-ia32-modules-2.02-123.el8.noarch.rpm 54d02b7097fbbf27377dce910c2f56f2585ea6dc6a210173ddbd6ab2e03d529c grub2-efi-x64-modules-2.02-123.el8.noarch.rpm a64ef405184b7ee49015ae9590de588303833326fc1b8fd472c560dbc6ad3128 grub2-efi-x64-modules-2.02-123.el8.noarch.rpm a64ef405184b7ee49015ae9590de588303833326fc1b8fd472c560dbc6ad3128 grub2-pc-modules-2.02-123.el8.noarch.rpm 44c9c3844abbbe0df5fa598a2ea1cfd525fd422ffa80cdabb3573631c88791c5 grub2-pc-modules-2.02-123.el8.noarch.rpm 44c9c3844abbbe0df5fa598a2ea1cfd525fd422ffa80cdabb3573631c88791c5 grub2-tools-2.02-123.el8.aarch64.rpm 21fbea31d0432299b93c40844ebd09ad67e5a369373c3ebbbe40a86d00ddf088 grub2-tools-extra-2.02-123.el8.aarch64.rpm 45cde4c605ef45b285a9225ac74328d92657c62cd6e805c88b0e31aa882595c4 grub2-tools-minimal-2.02-123.el8.aarch64.rpm 948769c6e593e2e62cb010dfaa4dcbbd52ce36d993301a1bb58ce0f0bb6fda53 RLBA-2022:2113 expat update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms expat-2.2.5-8.el8.aarch64.rpm 7a242b5459a19352c07b68a2cf88c9c211dcb16ce221e23d9663d6964e0aa4e1 expat-devel-2.2.5-8.el8.aarch64.rpm 9ccc1fd665e417a9a2e605727c1fc09fac482005ff60fb223a77c939215ba84e RLBA-2022:2119 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libsemanage-2.9-8.el8.aarch64.rpm d75f6ccf225be447fa2cf2fa87314f6ea2200f2f7050d15fe47269ec2a1bcb40 python3-libsemanage-2.9-8.el8.aarch64.rpm 7bc5bf39d26aa019e8198d22580736d5b2a2b5abaa1120ea27786757f975ae0d RLBA-2022:2121 libxml2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms libxml2-2.9.7-13.el8.aarch64.rpm 9cd5ad59edcfe65c159d848d374e242eb3c3dd6594215b5b93ec3c0f5dc7a65b python3-libxml2-2.9.7-13.el8.aarch64.rpm 56747870d5669bbbdd2b322d81390419dca6dcf6df657657a250ff335289351c RLBA-2022:2124 xmlrpc-c bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms xmlrpc-c-1.51.0-6.el8.aarch64.rpm 38229bae5b83313e1c26bf9d6cbc4df10c8439e82773a8ae55965731cafd7e01 xmlrpc-c-client-1.51.0-6.el8.aarch64.rpm d0f5e4220b6bc10dae02bfc80dbae358dcdf400341f59c27403ac4b1ae3ea21c RLBA-2022:2125 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms sanlock-lib-3.8.4-3.el8.aarch64.rpm 934161c66d058152c4ac4c87e801805a6617dc00104804d032f5926b50e6ba75 RLBA-2022:2147 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * sssd_nss exiting (due to missing 'sssd' local user) making SSSD service to restart in a loop (BZ#2074648) none-baseos-rpms libipa_hbac-2.6.2-4.el8_6.aarch64.rpm e0f374b3185a2f8887dbf29b6af2c736d3db855c0cc8da612d0f890e6b3a845a libsss_autofs-2.6.2-4.el8_6.aarch64.rpm be117903f888426833d85caed706a5eb2d80f4230419e2e83f21cfec4ab01ec4 libsss_certmap-2.6.2-4.el8_6.aarch64.rpm ca5c653356161d9751dc50815e5c839e8b224ea24726b8cd1f45162d25584382 libsss_idmap-2.6.2-4.el8_6.aarch64.rpm 20e71dc5dd64dddfae0e3a06a73d8f8c9611f9bf0346a24f97e504a67a689ff0 libsss_nss_idmap-2.6.2-4.el8_6.aarch64.rpm b681d558c8c92abc5237c5f8b22cbeb85b5e19bdd2b73e6b51d47fdc1128cfd9 libsss_simpleifp-2.6.2-4.el8_6.aarch64.rpm 8fce65328398cbd5fe37d8cd8417a4b12173e6428e120cfc637a282c5c3e9e7f libsss_sudo-2.6.2-4.el8_6.aarch64.rpm 2c63538d906bfdbb5cc6ba70e6ec4a01931bbc0da405a1dda240230743afde87 python3-libipa_hbac-2.6.2-4.el8_6.aarch64.rpm fbf2f5c44f9863a6f47662d43d9b557815f4c642c35d601289097d0f5ec485c4 python3-libsss_nss_idmap-2.6.2-4.el8_6.aarch64.rpm ccddce089700fcad7b9ba2b2e8b4fa148a682537c62b2459e0bc4512ad4de4b7 python3-sss-2.6.2-4.el8_6.aarch64.rpm 44a67a0615c60f3fbbfbc31948200e83a55c48627d592397c8c6f68349654cc1 python3-sssdconfig-2.6.2-4.el8_6.noarch.rpm 6cd3e9a13d33c43d67c9abd0446b0afc23deb9b8952d6b1abffe140119bbc4ab python3-sssdconfig-2.6.2-4.el8_6.noarch.rpm 6cd3e9a13d33c43d67c9abd0446b0afc23deb9b8952d6b1abffe140119bbc4ab python3-sss-murmur-2.6.2-4.el8_6.aarch64.rpm dc3a7475899925337e63d8b9f5021112e713be0135475f01020c9636a76bbeb4 sssd-2.6.2-4.el8_6.aarch64.rpm c9a8501447c06d0eafbc81a2bcd9c2c773c3c7b64ce7a41676509bfa5f20562a sssd-ad-2.6.2-4.el8_6.aarch64.rpm 85218d5b91fe271f67603c79023d02090caded84e83d7a4061c15fea05c121c8 sssd-client-2.6.2-4.el8_6.aarch64.rpm 9687feb56d6e48d70508d6b8e7ad991899fa18478967770c20045bdd45ccbaff sssd-common-2.6.2-4.el8_6.aarch64.rpm 50bbbc3d188bc5a3148c397e4046b38eb3019713a4341ee1c81b26ff5f1de5db sssd-common-pac-2.6.2-4.el8_6.aarch64.rpm d27a84a3e19938d83b05566c8cbd32cd02315c7ec67e7e8a87754ace211e6ad2 sssd-dbus-2.6.2-4.el8_6.aarch64.rpm f49a9db54f52edd162aedfcf60ef80b1dd6a7cc3bc59b96be9e9133998883725 sssd-ipa-2.6.2-4.el8_6.aarch64.rpm 37ddcd8d6148ed3341207eb6e73b5d8efb58c213b6a57cfddf1bd4a98fa18acf sssd-kcm-2.6.2-4.el8_6.aarch64.rpm d8b7b72c354aae5c49b0b43165d8c0ae6c774c9ce428a00d803118ba80351442 sssd-krb5-2.6.2-4.el8_6.aarch64.rpm aa84a612977be6384b90aa7d9d43904253b6acff42dddf92ea14cbf453feb59f sssd-krb5-common-2.6.2-4.el8_6.aarch64.rpm d3b4cbbbfe5199150074b6a819b42dab132570b9dfc417cc5b30eaa6f846b9ba sssd-ldap-2.6.2-4.el8_6.aarch64.rpm 8fbd915aa2b78a05c1e4ff6dab03fdfbb27be0c3b959ca0dc2f1cf9a5fca4774 sssd-nfs-idmap-2.6.2-4.el8_6.aarch64.rpm f6e6eb0e85546fa2035583c8c271bbf5524fb23da85cba01ee2483ffc942f442 sssd-polkit-rules-2.6.2-4.el8_6.aarch64.rpm ac66a159a0d5da6044bd4f230201a25ab78af69e0b96772d5e975d4bfbd0be5f sssd-proxy-2.6.2-4.el8_6.aarch64.rpm cdc4577dfb9a5e87e0e2b9653780d92edd1f9b0118a4a60e332433b6d08ed64e sssd-tools-2.6.2-4.el8_6.aarch64.rpm 8dc899d16ca65805ce0955efb53495d8f977934751054bc19e4a08334a926819 sssd-winbind-idmap-2.6.2-4.el8_6.aarch64.rpm 403f14912140df8c055b0fa74b99bf75620b09c2f9a0098def90179b8c83d35b RLSA-2022:2201 Important: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms rsync-3.1.3-14.el8_6.2.aarch64.rpm bf917bdca8d8ad8441949d86837f31b3ba4e641457f43c96d6b9a93981062a1d rsync-daemon-3.1.3-14.el8_6.2.noarch.rpm a56bbdfb5353a1121d1825f7cffc5090b881620d18b49ba057cd151a184633e1 rsync-daemon-3.1.3-14.el8_6.2.noarch.rpm a56bbdfb5353a1121d1825f7cffc5090b881620d18b49ba057cd151a184633e1 RLBA-2022:4744 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos collect fails to get node list from a pacemaker cluster (BZ#2071695) * Tracker for 8.6 sos OCP focused async release (BZ#2071824) * sosreport causes out-of-memory with excessive memory usage (BZ#2071825) none-baseos-rpms sos-4.2-19.el8_6.noarch.rpm b2ad02840888c772908d9baceb5d54c30fb803ff219953cb7ec342c71131c4f6 sos-4.2-19.el8_6.noarch.rpm b2ad02840888c772908d9baceb5d54c30fb803ff219953cb7ec342c71131c4f6 sos-audit-4.2-19.el8_6.noarch.rpm b455d95fde5e963234ea732fb6f1748a59571b883e8931c97c23f849d59a4fd3 sos-audit-4.2-19.el8_6.noarch.rpm b455d95fde5e963234ea732fb6f1748a59571b883e8931c97c23f849d59a4fd3 RLSA-2022:5056 Important: cups security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: authorization bypass when using "local" authorization (CVE-2022-26691) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * 30-second delays printing to Windows 2016 server via HTTPS (BZ#2073531) none-baseos-rpms cups-libs-2.2.6-45.el8_6.2.aarch64.rpm 3f82c10e9aac9096acb8276bbd2b002545300c8300ad8924d684a57921f4977b RLBA-2022:5081 glibc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es): * glibc: build occasionally fails due to test timezone/testdata/gen-XT5 missing a Makefile dependency (BZ#2073432) * glibc: iconv: missing macron (unicode 0xAF) in EBCDIC-CP-ES (IBM284) (BZ#2084564) * glibc: tempnam() regression in glibc (BZ#2093457) * glibc: Incorrect results of POWER9-optimized strncpy (BZ#2094540) none-baseos-rpms glibc-2.28-189.5.el8_6.aarch64.rpm 295da7ea19438d37d4beff36a90504fe714f66261ccf521bea373574779702d9 glibc-all-langpacks-2.28-189.5.el8_6.aarch64.rpm 4e64eef8921770c502c0f06371917421e25bd41c3596f0cbc64bb864e94c703d glibc-common-2.28-189.5.el8_6.aarch64.rpm c60af76432175b20327d7c571d8a54e151e97aceb2623dcd6c3561c67dedf4cd glibc-devel-2.28-189.5.el8_6.aarch64.rpm 15e0273c3b1cd6b52d23afa8b500b43ef85c8303d9495f13c3b442aba41f937f glibc-gconv-extra-2.28-189.5.el8_6.aarch64.rpm 65e35f69b8f4ede80b42e5f2c2d79fdec7692d06c02a477c18633ed3100fa21c glibc-headers-2.28-189.5.el8_6.aarch64.rpm 8328779c4974e491e3bd5f0a6493b1f2911c4991cb98b8c9d00034e344932aec glibc-langpack-aa-2.28-189.5.el8_6.aarch64.rpm 9fd48129226ebd9fede0556d22ba5752f60309ab97fc35e7f064cc4b91a47f6f glibc-langpack-af-2.28-189.5.el8_6.aarch64.rpm 331500a1ff6cf11bc6db1c912a88ba83ad79f0d876823bcd6491b11945926076 glibc-langpack-agr-2.28-189.5.el8_6.aarch64.rpm 78924937056a259d5fa7274038c1dec2b9cff7dd734b66b508ef2e15584329af glibc-langpack-ak-2.28-189.5.el8_6.aarch64.rpm efec9a742fd2673f6c2ee02e1a179b03055d1f432c3093d244740bcb21503d12 glibc-langpack-am-2.28-189.5.el8_6.aarch64.rpm 810ee486708f27a32e270106b69694dcde920020c0c78a15e77f40dec7fd4ba0 glibc-langpack-an-2.28-189.5.el8_6.aarch64.rpm 5645968bd580145feff5c1c887bcef27ef1b4af1a90b53bdc892af104b2b616e glibc-langpack-anp-2.28-189.5.el8_6.aarch64.rpm b0314581e39b8a7063f343bb33664de92c20526eebca9235fde88682badaccd3 glibc-langpack-ar-2.28-189.5.el8_6.aarch64.rpm befa3b9df6a7547abfe2ed7d9055f09dce77e8dc05f7a1c8be4612436a9a2230 glibc-langpack-as-2.28-189.5.el8_6.aarch64.rpm 98038d6152744d8df965860a04948a2e21bdd9aca10a55aaa987092b3c8c4055 glibc-langpack-ast-2.28-189.5.el8_6.aarch64.rpm d55e20cbe1c2820560fc10c19c00bfb549fdc5d8ef1213f21c6b2f4882cc84bf glibc-langpack-ayc-2.28-189.5.el8_6.aarch64.rpm 0f8fe10ebdf4d77746851dcc7b70aa2604664fe8145fe8f86e899e035a4e7def glibc-langpack-az-2.28-189.5.el8_6.aarch64.rpm e0320c9cc7a7dca2b4bf55c5ad03a75410648d8615f8a2a6dc83df56cf08fdc8 glibc-langpack-be-2.28-189.5.el8_6.aarch64.rpm cba9f9c0bfdaa9d82ed73dacdfdf6cfd200a2df85d207df34ccefba5bafc756a glibc-langpack-bem-2.28-189.5.el8_6.aarch64.rpm 2df2544faca6812a546affb46e62283882b780a26c081f6eec446ca3100fbdfd glibc-langpack-ber-2.28-189.5.el8_6.aarch64.rpm 410709800fb85064760ba06781eacd578b6f99f74c3d5c3d6babbf26859289fe glibc-langpack-bg-2.28-189.5.el8_6.aarch64.rpm 0b316556af94e4f888f74df207ae95aaadfd128100c2463ba21f67722dd67f1f glibc-langpack-bhb-2.28-189.5.el8_6.aarch64.rpm 76692289c85347e6672580dccb566503650d1d359561c4ff0f7b2989b65b102a glibc-langpack-bho-2.28-189.5.el8_6.aarch64.rpm 9d422085a5c6f7190f8bc053a9b320f63bcbbcbe767995e482209db5a594be65 glibc-langpack-bi-2.28-189.5.el8_6.aarch64.rpm aee950e893b8b8bf72f68d1cb9a470f61a70f0e43fc22319ff2bfaf6d5485e40 glibc-langpack-bn-2.28-189.5.el8_6.aarch64.rpm 2c28c2375c192ae77ccd841e1bfd7ceed34eed65c56d4655c08a0d657723836a glibc-langpack-bo-2.28-189.5.el8_6.aarch64.rpm da70053bae2300706febcc6b21d972ae1078dbd0cf9a90534011a80358d11a69 glibc-langpack-br-2.28-189.5.el8_6.aarch64.rpm de470fdceecf4ac8d66e9d6be204896f0bfd0069eac234cd0c2f55bbd902b762 glibc-langpack-brx-2.28-189.5.el8_6.aarch64.rpm bf677219fe3bf489049d9371686d005b31f308709214955207f792fa076653ec glibc-langpack-bs-2.28-189.5.el8_6.aarch64.rpm a5e31e6e730433efcc84af2dfcdf1d1447305305ef53452633aaf4378e457f59 glibc-langpack-byn-2.28-189.5.el8_6.aarch64.rpm fa5867d349a40fbc90e1dfc295cc974268125036c517d00fd2c4ee9424fa1a56 glibc-langpack-ca-2.28-189.5.el8_6.aarch64.rpm 7d70b6dabe7d604299026b0cfd022bb43015b7e7960ca606c007303f6566321f glibc-langpack-ce-2.28-189.5.el8_6.aarch64.rpm 30c14cd344bdf4a79ca07c631d7f3a9bb3fa86272fc1f76ad908763c8831af2d glibc-langpack-chr-2.28-189.5.el8_6.aarch64.rpm 7ea2b3ed0d570de4102aa5a40bb1a0a6f4218cd24cd0b18addbf28fab1699be5 glibc-langpack-cmn-2.28-189.5.el8_6.aarch64.rpm 605db1f67ee0e25f934b4c576c2e456c6e0de19a1660b20af4594b0291dfd501 glibc-langpack-crh-2.28-189.5.el8_6.aarch64.rpm 54fe11059d95fdc438be78e97f4e94facb0ca1289fb07fa4953153ccce4d0918 glibc-langpack-cs-2.28-189.5.el8_6.aarch64.rpm 8445e5e68dd565e2d9343f0ffcfdc880010b558db39096638c7a3aa26eae4d60 glibc-langpack-csb-2.28-189.5.el8_6.aarch64.rpm 8e9a7cc29a771ad07e32639bd4603225a6cbf0e2dd72e1ddd2089006534ac95b glibc-langpack-cv-2.28-189.5.el8_6.aarch64.rpm 418686e5e22aef9f1ba430286cd834ed2c2e0b8cec55a11af180d541995456ac glibc-langpack-cy-2.28-189.5.el8_6.aarch64.rpm 71206157df9e723ce734bdf1dc625098b5563dabcb23abafcac78f5602d523b8 glibc-langpack-da-2.28-189.5.el8_6.aarch64.rpm a791e7a17819481cf4e2e081e0cb6be8c7152d724ded3c287f4ab33403484bd2 glibc-langpack-de-2.28-189.5.el8_6.aarch64.rpm db23e604b4d1bae1af7970aec780a116baec8616fbc6feafd68a9f8507ff5535 glibc-langpack-doi-2.28-189.5.el8_6.aarch64.rpm 51af585092be2531a2b96ad605d20835eeb23ccc414e14297d3a41d0d4145ac3 glibc-langpack-dsb-2.28-189.5.el8_6.aarch64.rpm da86cad2bc7d210a946b7ca54e36fde4cc6cee3a0dfb1341e492b4633046ece9 glibc-langpack-dv-2.28-189.5.el8_6.aarch64.rpm 409af94a12dadff92134674a1c7918b86ce420a779d5f83d481b8fb30e936568 glibc-langpack-dz-2.28-189.5.el8_6.aarch64.rpm 44600566d073a5a31ae8267fa6994400304a3bf101e6d06e09ade11a2d944926 glibc-langpack-el-2.28-189.5.el8_6.aarch64.rpm 386d1d3e0f427b68b1927c1352f4b99a56fcbdac4d103bb05fba4b287a05cc6a glibc-langpack-en-2.28-189.5.el8_6.aarch64.rpm ac6c83914f200f0153290d84a52e513402dcfee1dce2c3ad2378261237f35972 glibc-langpack-eo-2.28-189.5.el8_6.aarch64.rpm 468c23274288fbfeb237f8be04ae876d475473c72abc9fd2b3e129355f948847 glibc-langpack-es-2.28-189.5.el8_6.aarch64.rpm c9570e920c8fbef5a4edecb9bf4cfd7644e343504bf8285a4a889dbf50d1e45d glibc-langpack-et-2.28-189.5.el8_6.aarch64.rpm 043bc0c17d06f5e1300cc8bccd38364c16454e9f532b90e910be5475d667983b glibc-langpack-eu-2.28-189.5.el8_6.aarch64.rpm 3471ad79278bbaf9b13a7dcd1df0a0fcff8b59812468b7a51b50ccf77a8b7fd7 glibc-langpack-fa-2.28-189.5.el8_6.aarch64.rpm 974677918efe8c96fafdff7b4e18146f66fcc2b179e648b151edf853932c342f glibc-langpack-ff-2.28-189.5.el8_6.aarch64.rpm eb6bf4f316f694fb791c6c92c314dd0b1450caf97452fdd4f3c6fb5fca357f57 glibc-langpack-fi-2.28-189.5.el8_6.aarch64.rpm 56126cb6e967eb6478f6c184f0ba3c9fbdefce6c9266ff9c89e02df8a7de35b1 glibc-langpack-fil-2.28-189.5.el8_6.aarch64.rpm d1f8609ae26a08194386fffdbc339561b507609f6aa93aa3f4fb22def608ebce glibc-langpack-fo-2.28-189.5.el8_6.aarch64.rpm 56e929c41bdc095a085536c0cb052ac51ceace837f91b4fffb9f931536d613c4 glibc-langpack-fr-2.28-189.5.el8_6.aarch64.rpm df1e8ef84da911cc085b78f0d7a0b39079f4220b1119135c00f46fa1f19a395b glibc-langpack-fur-2.28-189.5.el8_6.aarch64.rpm 2b6890ca13ea3a6df1a227b55da87849e826e98a90a643cdaae1b8a1148dc1c4 glibc-langpack-fy-2.28-189.5.el8_6.aarch64.rpm 5b0ed42bbbc116a43cf9404ada3641c78c020aee264fae9c4759eb3b0890b60c glibc-langpack-ga-2.28-189.5.el8_6.aarch64.rpm da9678b1e5177b3f0610c80101f81079a31ebafdbb179e2e98d223aaf09db3f3 glibc-langpack-gd-2.28-189.5.el8_6.aarch64.rpm 9b37a0ce6de8fc9ae2662b2752e382bd04c24690564c15dd2ff719f01a41a744 glibc-langpack-gez-2.28-189.5.el8_6.aarch64.rpm c60cbff5cd597930337140b5e37e5bffe9b20a80a78f6f251b577f94eabb9a8b glibc-langpack-gl-2.28-189.5.el8_6.aarch64.rpm 43f9d0a046a64d8e1826388c23e42baed84940853aa209a9aaff0c438569b9e1 glibc-langpack-gu-2.28-189.5.el8_6.aarch64.rpm 40ab1acbd485890dade744a7a7073f016035a740b56951ed5b4f5a12e4382c15 glibc-langpack-gv-2.28-189.5.el8_6.aarch64.rpm 7a1a396504ec9bf9f5d775d0fd43280a0280654c08cd8b21021d272aa080383b glibc-langpack-ha-2.28-189.5.el8_6.aarch64.rpm 6af9061eca698b996cbf6c7ac635e30d427280884d34e35d5d220ba4e7507ca8 glibc-langpack-hak-2.28-189.5.el8_6.aarch64.rpm 285e8c2c96d32686eadefcb9794b03281c125da7e5e08ccb8d77bcef4c7c4bee glibc-langpack-he-2.28-189.5.el8_6.aarch64.rpm 7512806fe4ee698179c0d887c7b53ef3301f9ec6cd2eabef0f8c337d839c7c9c glibc-langpack-hi-2.28-189.5.el8_6.aarch64.rpm 73da0688f27b32cf06343717dc21ada377ed3f1425b1bdf10664a119e14cceb0 glibc-langpack-hif-2.28-189.5.el8_6.aarch64.rpm 98d8d5408f8f0a1201419379720602eee682c41f1c8109339588cf74be155d78 glibc-langpack-hne-2.28-189.5.el8_6.aarch64.rpm c360eba8efd6e4953bebd9e1dfc71cb0d05ad40ab2702234287d2d28c600e392 glibc-langpack-hr-2.28-189.5.el8_6.aarch64.rpm 55c3def61324a66959279b8e3d4670f59d674af67d6a04651394522a1fc1bfee glibc-langpack-hsb-2.28-189.5.el8_6.aarch64.rpm 4c096936c55b6bbd7ce464eb2d733430bc1a9c9fbaf6e4416ebfede92d72ecb8 glibc-langpack-ht-2.28-189.5.el8_6.aarch64.rpm 21bf5aa30b7ff9349b1987a1e46c589baebda29f1ce2e3c78336989a97294f32 glibc-langpack-hu-2.28-189.5.el8_6.aarch64.rpm 4f476e7f3dc7e3b9b3de0262e8c8dfd4c9709f02aafc6199154132194b318f8c glibc-langpack-hy-2.28-189.5.el8_6.aarch64.rpm 21dff793f456adba37ce9975883f13c8734d57b168f20707a97182814647e05b glibc-langpack-ia-2.28-189.5.el8_6.aarch64.rpm d2256215537028aa505907638b37bfa6f322dec7d6c3c4cb727ccafe84f2862c glibc-langpack-id-2.28-189.5.el8_6.aarch64.rpm 559cd4240e43b5e3d040a7f6bb91b200a47b4af62d89de45aa68e106e561cccd glibc-langpack-ig-2.28-189.5.el8_6.aarch64.rpm 2dbe27b75d13de7ed676bd1fed0a66285b5658ddb2f9aac511f0163327ff411f glibc-langpack-ik-2.28-189.5.el8_6.aarch64.rpm 42e9465978111bd1e3985d310e5b0de90f16591b38e23de9070aa1b8e6ba7c31 glibc-langpack-is-2.28-189.5.el8_6.aarch64.rpm faa4244928fefa31cf59423dea4bf976ed2543cae62330676c5d14878385ae63 glibc-langpack-it-2.28-189.5.el8_6.aarch64.rpm deb1fac189957308f4934874318005b9b8522f7c5172146551d98ded9a357fd2 glibc-langpack-iu-2.28-189.5.el8_6.aarch64.rpm 7d48a6c0d5f6512de21c09445e00c99cd5281e3e52f7e57456db36fb7a8bebb9 glibc-langpack-ja-2.28-189.5.el8_6.aarch64.rpm 2621c370e534b630b323c12fb073787ddd510e8ecbbd8a9d52b93e4371c277e8 glibc-langpack-ka-2.28-189.5.el8_6.aarch64.rpm df6bedeb4ae748af313ed2d8a2bce5f5abce9062f41a3629a560ffe6e02d9863 glibc-langpack-kab-2.28-189.5.el8_6.aarch64.rpm 769aee83524ee03afd64196cf39f4fac51cda40b9db725ba33f2f27da92f1f41 glibc-langpack-kk-2.28-189.5.el8_6.aarch64.rpm 3f46797a29db02f9439d6ca8eab515b499ecfc53383026885914cb4d00ceecec glibc-langpack-kl-2.28-189.5.el8_6.aarch64.rpm bd64f62057a542a3a4ef513e6a21397b4a76144d3bd30c2aa1173c1895ad97d1 glibc-langpack-km-2.28-189.5.el8_6.aarch64.rpm 861e1253d8bd1d5417ea2cdd54eafe0e08d2b8f889d9d8ab08c0f11c5c1109f4 glibc-langpack-kn-2.28-189.5.el8_6.aarch64.rpm 4c4567ce7dae454b61e1f976835a74dfc453d074bf5ae28275b87a70db26c304 glibc-langpack-ko-2.28-189.5.el8_6.aarch64.rpm f467c16fd6049fa3c400a0e37f3aa212fd36b77b218c7fd31055acae430820b0 glibc-langpack-kok-2.28-189.5.el8_6.aarch64.rpm 5f0c736ebc963c967d2252264e8ff6070017da91e55236232808ade6adff1542 glibc-langpack-ks-2.28-189.5.el8_6.aarch64.rpm 16a7d9bd557cb940a953675ad31ddb9ea05569306defc7003e08a310aa472df1 glibc-langpack-ku-2.28-189.5.el8_6.aarch64.rpm 57b9db99c91fe50caaec5254825bbef8c7f64a2eecf897d3d61e784a4137cc4a glibc-langpack-kw-2.28-189.5.el8_6.aarch64.rpm 8279107baa5a08c40ca55782308e5a5f1368c4ed60404fefc04f7369d9dc002b glibc-langpack-ky-2.28-189.5.el8_6.aarch64.rpm 95abedd5c0db50e86924662869b3ac44fde94c2e65b1d08c15a1c46475642594 glibc-langpack-lb-2.28-189.5.el8_6.aarch64.rpm 2c009d194d5fa648cb517637a0158a0f87c27cfdd054b4f4e808742a506d5cbd glibc-langpack-lg-2.28-189.5.el8_6.aarch64.rpm a38d9b69cf4d0f6e94e41e99d409193d665696b032d1f09956758e3764042178 glibc-langpack-li-2.28-189.5.el8_6.aarch64.rpm 9a3cead4973fedb3a067889d9de547bd7d0716ae50cf39f8154fa8942945ab36 glibc-langpack-lij-2.28-189.5.el8_6.aarch64.rpm 25be64681e0f813848a75d795353a500ad077f646e35e22bdca6bf2f89ae55c7 glibc-langpack-ln-2.28-189.5.el8_6.aarch64.rpm 97ce4ee3a4fa5223da4600a639703cbb45c918571b89dab1da7d5443f96639d1 glibc-langpack-lo-2.28-189.5.el8_6.aarch64.rpm 7e0f99feb51db7da487ed84fc09be41149e35ffee958fc45d0dec7d1cee9c7c5 glibc-langpack-lt-2.28-189.5.el8_6.aarch64.rpm e01a32e84c4d5e9aa494b60356fcf2e58485d8a8b9ddf8f6ceb77e71e93234ae glibc-langpack-lv-2.28-189.5.el8_6.aarch64.rpm 768afefe414c28a78eb0ad57ba3c2e76ece15b0256855a11e0d5dd92901cf618 glibc-langpack-lzh-2.28-189.5.el8_6.aarch64.rpm a307124900ea74d1e54978ec4018d0c295e1f7bac02a7aafad744a473e380571 glibc-langpack-mag-2.28-189.5.el8_6.aarch64.rpm 4725ab121e032eed2c8b22b172786501bfa4be44eb7a8ce3a0da3902d6b27f3e glibc-langpack-mai-2.28-189.5.el8_6.aarch64.rpm ab53edd1e46f1f16d53e18eeb37bfa32320284f6df34308008a822200aede6e8 glibc-langpack-mfe-2.28-189.5.el8_6.aarch64.rpm 441cd723784e50f483e691caac11c91c922f73b669bbe68a5f8cdd6ff7ad652d glibc-langpack-mg-2.28-189.5.el8_6.aarch64.rpm 1f16032ce5bdfbec1412eacd62327acf9185383b229b042909f5f22b4692ded0 glibc-langpack-mhr-2.28-189.5.el8_6.aarch64.rpm 2a0094b39d6121ca7715d2aa8b4cd7cda6ab7ceeb633d6012c0512c2b18d8ec3 glibc-langpack-mi-2.28-189.5.el8_6.aarch64.rpm 3d05838cb2d4ae4f96bfc38fa762c244f77d0c1c061c0e4e328a56b36baaa3a3 glibc-langpack-miq-2.28-189.5.el8_6.aarch64.rpm 9e0a8609e421b8b742a5c1053139c333d77f1ccf4df66ea6ad1c043c78d4bddc glibc-langpack-mjw-2.28-189.5.el8_6.aarch64.rpm 0cc4f920fe5616910046508598f0e34f3a4fb8a0be20bf627a072a850b9b39db glibc-langpack-mk-2.28-189.5.el8_6.aarch64.rpm 54160c09d8023d42303818e2904c97b28629b62eaabebc4cde56062c22c8590f glibc-langpack-ml-2.28-189.5.el8_6.aarch64.rpm d7a881e5fc792353f3172664cb172c72841ed5814cda095362be9e0f915fe7ea glibc-langpack-mn-2.28-189.5.el8_6.aarch64.rpm 1abf464984558bea848c019c60726c95b5d963c5a9fa9670f1a1fb956aebeb96 glibc-langpack-mni-2.28-189.5.el8_6.aarch64.rpm a5d44707f95ab851676180de65da337ad57ca09c186d3f493560e267c9331115 glibc-langpack-mr-2.28-189.5.el8_6.aarch64.rpm bc8570428280757d8eda8f0e21040e1092bbbbaa87c9fbaca6b9f3ba87ce6e63 glibc-langpack-ms-2.28-189.5.el8_6.aarch64.rpm fbb558eb0adc806f2b3d5b30f6eb207792cbfaa660a5494511909bfc84e012ea glibc-langpack-mt-2.28-189.5.el8_6.aarch64.rpm 5735149a53b28692ea401fa038a7b74b8caefbe53cb0c50f10a1937117d660e8 glibc-langpack-my-2.28-189.5.el8_6.aarch64.rpm e26d455d09418e289fcee62c90144a27cc1314161f69aa0d5344cbaa2940033a glibc-langpack-nan-2.28-189.5.el8_6.aarch64.rpm c841c2717c3a5cad0bc12c1c56bd3051d8e32991d6f7350a69905544fd47fdbe glibc-langpack-nb-2.28-189.5.el8_6.aarch64.rpm f24ca7c23429e85ea3be481c0fc2aa4e9f6deba67acb9464c3e5205ca2ac269e glibc-langpack-nds-2.28-189.5.el8_6.aarch64.rpm c9362ad140959067d2f882586877de4efc9e4a4f49148f7cb40b2abfeafa92e1 glibc-langpack-ne-2.28-189.5.el8_6.aarch64.rpm 8245302f8a4fe227b6ec34c0740dd31de362d3feeb2499bd59cc88969e56782d glibc-langpack-nhn-2.28-189.5.el8_6.aarch64.rpm c36c1bdf0524fea6ffd9e43a737c0ea744c1417b2a8baadc260bcf3bcaabfc6c glibc-langpack-niu-2.28-189.5.el8_6.aarch64.rpm 0de39e76f34b29f66bc65e9225af93f6252805fa5a995249e8a03aa13a223289 glibc-langpack-nl-2.28-189.5.el8_6.aarch64.rpm ac851804a41c6aebb46d866a5e3825770ed72beb143d2f11c94b90344fa4c11b glibc-langpack-nn-2.28-189.5.el8_6.aarch64.rpm dc18c02e38f33e649842528177a2f6fc36a66656bde69a89521168cdd2f1d1a5 glibc-langpack-nr-2.28-189.5.el8_6.aarch64.rpm 7cc487cf734c4068cf608ab64bb2fad6ac85e8c5103eebaea1355ce98ee0d456 glibc-langpack-nso-2.28-189.5.el8_6.aarch64.rpm d49b0e64291d3546d82dc619d9b20d66826c72a8b147cb48c9ebaf651aeba379 glibc-langpack-oc-2.28-189.5.el8_6.aarch64.rpm 5893b14459dd5d5a9e1872a5f22a49b0357604eee6988f61354e7287ee58efae glibc-langpack-om-2.28-189.5.el8_6.aarch64.rpm 37d1b11de423421b9e7a2b04719ac247d7d37377b2fe148057477163faa57548 glibc-langpack-or-2.28-189.5.el8_6.aarch64.rpm 5bd822f81e11a33572e5a5bbff143a6ef97921aaf200c132338d8e947dd00e45 glibc-langpack-os-2.28-189.5.el8_6.aarch64.rpm 280293f6dca07976fb41c7edd811a6b6d201ad86caac4ce84079d174404fd7f5 glibc-langpack-pa-2.28-189.5.el8_6.aarch64.rpm a413f123ff0ec4cdcbaa92263a09d580ecff45a5c762f4d969e2a7ed6d4138d2 glibc-langpack-pap-2.28-189.5.el8_6.aarch64.rpm 8d667b1ebedba0d62e2829cf63d3dbe67b42e5526e951906e328a6bf5e20f670 glibc-langpack-pl-2.28-189.5.el8_6.aarch64.rpm 293e1e3cade26f2c9a4f8c0ee38c055628dfd165a491ad8c0d2c937e1c1e7859 glibc-langpack-ps-2.28-189.5.el8_6.aarch64.rpm 5a6863c720cc0e6a620d74a21c6743c3431787a2e8dbdf561d5a9f5c5f000f64 glibc-langpack-pt-2.28-189.5.el8_6.aarch64.rpm 7e40f2ad3cea7e8e49d950c26d0459b6bf067138dc3dc4ac866ae0d17e279e0d glibc-langpack-quz-2.28-189.5.el8_6.aarch64.rpm 235f3e3261d0589304087d8dedc530cf1b16a8652ecc9e4bf17750985a214053 glibc-langpack-raj-2.28-189.5.el8_6.aarch64.rpm ac74ed817f97627156d52e7cb21258b10ee7a2d670ff6255b35ab2eaba170cf7 glibc-langpack-ro-2.28-189.5.el8_6.aarch64.rpm 199f52e8be97f2b051839db84a838c6c47c995ce0cb899580f13bdf1f93a9211 glibc-langpack-ru-2.28-189.5.el8_6.aarch64.rpm 14ba9113b78017022f82eac9e5b676794802dcd68acf08bedf98d4faf0986880 glibc-langpack-rw-2.28-189.5.el8_6.aarch64.rpm f1dad3912d86607878730fb079a86728e2b34afe62423add860b26e5ca595a48 glibc-langpack-sa-2.28-189.5.el8_6.aarch64.rpm f7a47866997b0df7b080fc463aff0899309be86dc1022ae5747bf7c96c1ca4f1 glibc-langpack-sah-2.28-189.5.el8_6.aarch64.rpm 3bce56f2dd93d48d7122e845c0370ba58b4239b626ec8fdf42b9dcc473f292cc glibc-langpack-sat-2.28-189.5.el8_6.aarch64.rpm ce8c045a8932eba9543e931e5ed67dd000506f243f5c79e45237a79db00c0655 glibc-langpack-sc-2.28-189.5.el8_6.aarch64.rpm b869343e567786c106279a84dcbe52a45a442f338fe9f8a770eade58094755fd glibc-langpack-sd-2.28-189.5.el8_6.aarch64.rpm d681942753f8262b940fcac1fdb57f647e761539dba20b75417b9a2f38b0713f glibc-langpack-se-2.28-189.5.el8_6.aarch64.rpm 616c8d0d097a204763f9809a17e5b764bbd9d707157f1d8685ddbfbecb2812e0 glibc-langpack-sgs-2.28-189.5.el8_6.aarch64.rpm 851ce550768d29afada77c4304ce26a608d15d7f0c1551a1fbca24723e95bbac glibc-langpack-shn-2.28-189.5.el8_6.aarch64.rpm 4487562dbf158236dfc67ac51f6df1a9842c83da800883e58bff312e0e1e2a26 glibc-langpack-shs-2.28-189.5.el8_6.aarch64.rpm ecea13680ae9b0f3e6c10a909be40ce6edefd824deb87b11b4b3e145b2b283ee glibc-langpack-si-2.28-189.5.el8_6.aarch64.rpm 4b3fab7d17d537df3538fd3d1d0a26d0d4bc6773d6e13e86d3b803ae53f69a20 glibc-langpack-sid-2.28-189.5.el8_6.aarch64.rpm 7866ad61d1bfc4517f4ba20931c05e9d02dc6531ce74e6f3c4401da733b7ef7a glibc-langpack-sk-2.28-189.5.el8_6.aarch64.rpm 329b32d89609deda7704031de5671c8c96a962708cbf9a8cd3c3ceef25f1bf5d glibc-langpack-sl-2.28-189.5.el8_6.aarch64.rpm abea38349f876b250c2804b844f95c24ee5d0893b5a08d06c8c8b8e2d0fd51af glibc-langpack-sm-2.28-189.5.el8_6.aarch64.rpm 291440b4c76c4ecb6ab533f49b2a066d09e7db8e1e1770ab5bb1610194055916 glibc-langpack-so-2.28-189.5.el8_6.aarch64.rpm 10fd1da7134b49348c04e508ac5daaf01cf6b58ec51155ac36b6f19ba4ea93bc glibc-langpack-sq-2.28-189.5.el8_6.aarch64.rpm 64306e1c69ec5c53a8489096bdfdeb226ccafee846cb1199f44b037e43707ff2 glibc-langpack-sr-2.28-189.5.el8_6.aarch64.rpm ea459053ee73dd02926e13e77730feae2a18a26aaabff4e85c9a7728f8814dee glibc-langpack-ss-2.28-189.5.el8_6.aarch64.rpm 87c3124c8840695aba213466f1e756042ae6dc4ade8e3ff04e990b232f4f77be glibc-langpack-st-2.28-189.5.el8_6.aarch64.rpm 23c4df7a3bb8256ecea701d40b9c0ad212da46342a650e95fa34e4a4248c7b14 glibc-langpack-sv-2.28-189.5.el8_6.aarch64.rpm 4f33fcf5028e2b4e7889e24d1329c96efa284dc66ef2258a8b8289f7d407dc39 glibc-langpack-sw-2.28-189.5.el8_6.aarch64.rpm b24420783164e0fca23222cd2431c3a37c8174ce6253d1a1f57318ae76c77676 glibc-langpack-szl-2.28-189.5.el8_6.aarch64.rpm 0906fa69640613827124ef1ffd759938071b0bc073f0ea3be7636562f50ae0a0 glibc-langpack-ta-2.28-189.5.el8_6.aarch64.rpm e7cef9432cb8b2e8beb3a5e5caf3a3b93479a4e75e44ada910faffb518d3e26d glibc-langpack-tcy-2.28-189.5.el8_6.aarch64.rpm 57f4f5dc394040b6de4784c40d52a0af3c1730b2dc5c9558e057023111b2a520 glibc-langpack-te-2.28-189.5.el8_6.aarch64.rpm f09b2f2ca16411e864e1350431fd1c3b4c9e487de237dbd2f9578f3bb3376e5f glibc-langpack-tg-2.28-189.5.el8_6.aarch64.rpm f5594145a6a055c0bb156f46b9705d95a3cdc3ad53c8df08202fd9aeea0f1c9e glibc-langpack-th-2.28-189.5.el8_6.aarch64.rpm 6d78f91a58bf932448132ead3d5bf45e62815961950b933ccb1bd399754116aa glibc-langpack-the-2.28-189.5.el8_6.aarch64.rpm d8364695a204c763fb918f03296b02b230450f5ab1802abd1abaa03678fa8e5b glibc-langpack-ti-2.28-189.5.el8_6.aarch64.rpm d7c10ffbdff9ba9f88d3080692877a68f76b4cda9a185f9ecc1e52bd877c4042 glibc-langpack-tig-2.28-189.5.el8_6.aarch64.rpm 8dce4cc8c1aaeda8726895fe98ce62893aef07dca07e7340b00e2c8428443621 glibc-langpack-tk-2.28-189.5.el8_6.aarch64.rpm 92b1df5889c4f86bc8d0432a28ededad3ace79415a777dd9dae1d6c0eda64489 glibc-langpack-tl-2.28-189.5.el8_6.aarch64.rpm d572ddaf65d543f82a37809d9ad4b8f6eae01cb307ef866bca93f8daf430ae0f glibc-langpack-tn-2.28-189.5.el8_6.aarch64.rpm b76eb6af685a548debe7b8f3d6e40463870b2e86c95d04e40210a7180e77c50a glibc-langpack-to-2.28-189.5.el8_6.aarch64.rpm 57f569def5ae6429d8e2b8d007e4badd2bf123b72206be4c0f338df8f597e6d3 glibc-langpack-tpi-2.28-189.5.el8_6.aarch64.rpm ed569fd99a71e3f20284ccccbad821233bafac9f377e517832584857c41447ee glibc-langpack-tr-2.28-189.5.el8_6.aarch64.rpm cef693a3da2ee7755909b88359051e750da431644b0424495341660c5653d8a1 glibc-langpack-ts-2.28-189.5.el8_6.aarch64.rpm f0f02865682b6a6717d879e88ff72441ab34a91491776b633c50aac8e1350590 glibc-langpack-tt-2.28-189.5.el8_6.aarch64.rpm ecece803338dece285ebee8827b2fa3c60e33aed118741adc4cf9a0125e94cbd glibc-langpack-ug-2.28-189.5.el8_6.aarch64.rpm 91926e152ce80c379ef6214a05ec57db0dbde2d9bdd609a4731bb092bf97eabc glibc-langpack-uk-2.28-189.5.el8_6.aarch64.rpm 10d2f33d0bf66de33a55521422a6cffdbee66b3cc3f65b470618e0860d15a7b7 glibc-langpack-unm-2.28-189.5.el8_6.aarch64.rpm db30d53679a88273d4096b83c947101b8f12cdac6df6861f8c071bf6077ac14b glibc-langpack-ur-2.28-189.5.el8_6.aarch64.rpm de53d929d490846bd9d60b29b0984e760dc5d33db590f132789ab087637f222f glibc-langpack-uz-2.28-189.5.el8_6.aarch64.rpm bf2178c6ee38371310f2003e292d874d11756254559bab7253da873df3388d69 glibc-langpack-ve-2.28-189.5.el8_6.aarch64.rpm 04db14f51abb1a1c4a3c044e200837645dc54931a692b8dca7de145571b8b285 glibc-langpack-vi-2.28-189.5.el8_6.aarch64.rpm 0850ba338af3a01c4bc786a431566e6cdd95dfbe03012fdae8bdac85776a308f glibc-langpack-wa-2.28-189.5.el8_6.aarch64.rpm b7086e45a4205bd0ad459fd61bddadad58a4f2fbb69f454d168e11a1d391b32a glibc-langpack-wae-2.28-189.5.el8_6.aarch64.rpm ccfa25f3d6fdc62a87f2499cc72d5cfcd2b438b5be90a0f0e98b9c7e51a968c1 glibc-langpack-wal-2.28-189.5.el8_6.aarch64.rpm 0928e1bbd9ffd899c614782385ce21d1eb58a52c2d45e62765dfd19c218b23b2 glibc-langpack-wo-2.28-189.5.el8_6.aarch64.rpm e8979a4a404884452642352257a14fad81fba3695f4eb550162dcbb6ce236d64 glibc-langpack-xh-2.28-189.5.el8_6.aarch64.rpm 5c29fd4a4fb6f78f8e73f6b3ff2d66f64103e8738167c7ca916cae2ef2843112 glibc-langpack-yi-2.28-189.5.el8_6.aarch64.rpm 94120283b54772867e1edc18124555c6c54ccd8dbc8b312b1f27b3af466f3c00 glibc-langpack-yo-2.28-189.5.el8_6.aarch64.rpm e5a0689ef8f8d19413ef8aab1e99650b50225c33ede10288e48a1a004140611b glibc-langpack-yue-2.28-189.5.el8_6.aarch64.rpm 51e0d25c1bbb08266536d86b74e6b7706ec58b07c740322d19dd4afcaa0afa90 glibc-langpack-yuw-2.28-189.5.el8_6.aarch64.rpm 0f9a0c64c2aebb306e8b9d75aa68bdbcb0dd91a1f3e9a9716f3d895fd0a721e1 glibc-langpack-zh-2.28-189.5.el8_6.aarch64.rpm be09c541136e29fd01cf7c0ccba3d352c4c8333da988099f84b2d356d87e7381 glibc-langpack-zu-2.28-189.5.el8_6.aarch64.rpm 46713875f4513eccf3e3585c85a7d10ea34f9a37596881375e2cc1837dd09a2c glibc-locale-source-2.28-189.5.el8_6.aarch64.rpm 71cd8f90b1740007974c6c645e7cfca11860a9964728e5a114c0a00ef3b15e6c glibc-minimal-langpack-2.28-189.5.el8_6.aarch64.rpm 6a835d63089db51f87f1126c4f98672566457454aa35507402cc4913f82603d1 libnsl-2.28-189.5.el8_6.aarch64.rpm 8bdf69b0e6d0cf7b9bbb661a0b66f3e0ec603c7f1f7436d767297b2230069822 nscd-2.28-189.5.el8_6.aarch64.rpm 223ae536d036ae34262cdfeccb3d752f13c07a93c37e76c408ce4022b0984b9c nss_db-2.28-189.5.el8_6.aarch64.rpm 962e5d932934c6b80a1c74a9da8b6a510143213abdae834e5be77999f1cd1797 RLBA-2022:5312 gcc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es) and Enhancement(s): * Backport Default widths with -fdec-format-defaults patch. (BZ#2079578) none-baseos-rpms libasan-8.5.0-10.1.el8_6.aarch64.rpm dd6df12b2c27d3bf4316fde846eb42d0fea332aeee0862678f8fe7172a64552e libatomic-8.5.0-10.1.el8_6.aarch64.rpm 03e2bd35d25323a553770594afb161a4e45a513978b3f9cbc8094a4c36d046c5 libatomic-static-8.5.0-10.1.el8_6.aarch64.rpm 48f9edcefdfb48cfe78bcc2dc1bff2e3e35572a733dba334437c262cd451394c libgcc-8.5.0-10.1.el8_6.aarch64.rpm c961380745f96fb2485f4963c2a641c0385288855c6c71f84033be67af88d64a libgfortran-8.5.0-10.1.el8_6.aarch64.rpm 3f4c7cebf4be4b7788b0c8b2ec944a4c30c705fc5f99e8bf4d396fcc5235547e libgomp-8.5.0-10.1.el8_6.aarch64.rpm 3cab50402ee50478747d1e6ab8bb5ac23af6c1e172a4eadb7e80ec01e201ba31 libitm-8.5.0-10.1.el8_6.aarch64.rpm cc24ab0beeb9c291428ae74459eaa3b8e7c6150270cc54c83cc557c271fe7f94 liblsan-8.5.0-10.1.el8_6.aarch64.rpm f688a7c11321c40b7cae0f2f83837daa6f323f889324adf167dff44e13855b28 libstdc++-8.5.0-10.1.el8_6.aarch64.rpm 502e6571bc4eb5007a6d0a59f7ae38c28c82dc647e616e390562db2b3446157c libtsan-8.5.0-10.1.el8_6.aarch64.rpm 163db705e65f7e6f66d96aded13f7fbadf60c9e25b84eb5e3c6229c9b936c26f libubsan-8.5.0-10.1.el8_6.aarch64.rpm b4f3486c6f5efa92adc8ad8ee7eb2b31ed0e63efbd677060a4d5ab2be5b668c9 RLBA-2022:5310 opencryptoki bug fixand enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 3.0 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages include support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * openCryptoki version 3.13 or higher with upgraded EP11 host library does not have Dilithium support available. none-baseos-rpms opencryptoki-3.17.0-4.el8_6.aarch64.rpm dcfc9dbe4750bb89c6e2eba188e4e9a2e5b66b436518bbf78fb1465cb24c4af4 opencryptoki-icsftok-3.17.0-4.el8_6.aarch64.rpm 9a15ed78df45a1f569ecb80af4b1a80cc872be495f0b2cf5569e2a86ef1a827e opencryptoki-libs-3.17.0-4.el8_6.aarch64.rpm 01e660a6ef8215049abaadc8483f6e9d8def1c10e2bf44aaf3e00fa0aace0db3 opencryptoki-swtok-3.17.0-4.el8_6.aarch64.rpm 923231223cca4a76c67e602d45ed7222bc414f16cc387e69160b4138fadafdfa opencryptoki-tpmtok-3.17.0-4.el8_6.aarch64.rpm 4b2cf9041157f2d4d5e0fe8e0a8ee50ae53553ac673ed8c988565db309e67470 RLSA-2022:5313 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: OAUTH2 bearer bypass in connection re-use (CVE-2022-22576) * curl: credential leak on redirect (CVE-2022-27774) * curl: auth/cookie leak on redirect (CVE-2022-27776) * curl: TLS and SSH connection too eager reuse (CVE-2022-27782) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-22.el8_6.3.aarch64.rpm 9868d8ac115beca743400d5a3f3b96c6b79ce29c88431a749bc332f86d0d7495 libcurl-7.61.1-22.el8_6.3.aarch64.rpm bc27260bd6263098d1a54d80279b4c63d1a5f3581cd93ccf1ffb139e1f22d27a libcurl-devel-7.61.1-22.el8_6.3.aarch64.rpm e6912bccf809342a6dcd515740830961a308e4933bb9961deab9c7f40abf6754 libcurl-minimal-7.61.1-22.el8_6.3.aarch64.rpm bedce1fe4b7143a923f5fe13fa30e484ce6c138ae43889d30bd563fe3fa7f6e0 RLSA-2022:5314 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: stack exhaustion in doctype parsing (CVE-2022-25313) * expat: integer overflow in copyString() (CVE-2022-25314) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-8.el8_6.2.aarch64.rpm 7968c84e241449e59eb639f39707013c5ec916141fe86d2f76b2be3a8b0cf86c expat-devel-2.2.5-8.el8_6.2.aarch64.rpm 46e2e6c26ed41ada1d51b367fb325adb4b76847e2d9e5e0bb9f6d835242e1f49 RLBA-2022:5315 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * PAM Kerberos authentication incorrectly fails with a clock skew error(BZ#2079299) * /etc/samba/smbusers erroneously applies unix group memberships to user account entries (BZ#2079303) * samba.conf's force user issue when the user only exist in the active directory and not locally (BZ#2079304) none-baseos-rpms ctdb-4.15.5-8.el8_6.aarch64.rpm a8778b9182d4c78537190729ebddbadf299911c9c5142bc215b6817c6c0f43a6 libsmbclient-4.15.5-8.el8_6.aarch64.rpm 3555e8ca74cd96e442b26d4aa70b06141f541929b72bfec8bb6f14023ff813a3 libwbclient-4.15.5-8.el8_6.aarch64.rpm efca6951d4e457298a60b3c9c447963d9b9a79c5e555a8cf721c0851a638e27d python3-samba-4.15.5-8.el8_6.aarch64.rpm 37c9d6f1ead4fec45c9d014cb0435e0c0b92855e412946671003e28476fe738e python3-samba-test-4.15.5-8.el8_6.aarch64.rpm c5f4106dd49376a69f1c7fcf427bef88d1e300a20007d53f3d4b1282fca607d3 samba-4.15.5-8.el8_6.aarch64.rpm 4ea09dd72e7145ab4ef5bbeee387aab2e99e00f00571c973acd88a7bb935f914 samba-client-4.15.5-8.el8_6.aarch64.rpm c8cd0d77c6a34f26aec4b0a401bee3751a6c8ada9bbf59b76e09a2bb607eee56 samba-client-libs-4.15.5-8.el8_6.aarch64.rpm 1f9250c2a71e766eab6843de2e69fb86094892bc6af85a7d7f53f451c8190793 samba-common-4.15.5-8.el8_6.noarch.rpm 25a4e01dd34ea53cb053800f8ffb0fd46f45283fc96d987c323f722e99e05c0d samba-common-4.15.5-8.el8_6.noarch.rpm 25a4e01dd34ea53cb053800f8ffb0fd46f45283fc96d987c323f722e99e05c0d samba-common-libs-4.15.5-8.el8_6.aarch64.rpm f0f5fecc5a2cd9f3801af90dcce8e35e29bbef4a5296fa4b4e681401f0fef12b samba-common-tools-4.15.5-8.el8_6.aarch64.rpm c7c5db52c422be00220a0906667509e1f500b163d1031c3fff37214be69f1c89 samba-krb5-printing-4.15.5-8.el8_6.aarch64.rpm d71e5f20fb91bafb687eb158dca5070e6f7628241a491a59babcbe6c81e77f20 samba-libs-4.15.5-8.el8_6.aarch64.rpm 3039af63562d8e30e7055ee9fef4eb38e7b06a37b7e6be350c71a5ab6f6c0536 samba-pidl-4.15.5-8.el8_6.noarch.rpm 8e81c605cc4ed91930d26f6f09bfd44775e1e9fc58b0e291df02982c92a5fea8 samba-pidl-4.15.5-8.el8_6.noarch.rpm 8e81c605cc4ed91930d26f6f09bfd44775e1e9fc58b0e291df02982c92a5fea8 samba-test-4.15.5-8.el8_6.aarch64.rpm 6784096ba13944c10bd790d5ece0559043509aae6ed0b4cf8e1faaeba7a0990f samba-test-libs-4.15.5-8.el8_6.aarch64.rpm 318e390d32d3aded06922bbfdaac72e8ae9ad6dd35719193187e45658657921c samba-winbind-4.15.5-8.el8_6.aarch64.rpm 3c9f4648e8cf0682ff4ecc9892d628355f77314696ba35776da521a24747528d samba-winbind-clients-4.15.5-8.el8_6.aarch64.rpm cb754a1e5d837ba0e78d88bb0db86271d1d51454a6a8d1c819f29e3f858402eb samba-winbind-krb5-locator-4.15.5-8.el8_6.aarch64.rpm 91f98493b1a3828bbd49834cac8a99b936f3ea11398127ea17d802ee52716e1b samba-winbind-modules-4.15.5-8.el8_6.aarch64.rpm 0fd96dcfca71f34192f74add6d0d90c9ce4b7c29f18793b1ff07ef4b2b8de862 RLSA-2022:5316 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666) * kernel: out-of-bounds read in fbcon_get_font function (CVE-2020-28915) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * weird port mapping with asymmetric traffic (BZ#2065266) * HBR3 is malfunction via MST HUB against Intel ADL-HX CPU (BZ#2066644) * openvswitch connection tracking sends incorrect flow key for some upcalls (BZ#2068476) * sctp connection abort unexpected. (BZ#2070959) * soft quota cannot exceed more the 5 warns which breaks timer functionality (BZ#2071713) * VirtIO Throughput for VM on host with OVS HW-Offload is very low (BZ#2074221) * SR-IOV performance > 50% degradation (BZ#2074829) * Call trace with parallel rules insertion and deletion (BZ#2075553) * Enable nested virtualization (BZ#2079069) * iscsi_ttx (iSERT) completions hung while waiting for mlx5_ib_drain_sq (BZ#2079433) * WARNING: CPU: 2 PID: 969 at kernel/locking/lockdep.c:895 register_lock_class+0x234/0x1640 (BZ#2079856) * mlx5: Some rule are not offloaded to HW in OVN K8s Pod 2 External use case (BZ#2079918) * OCP node kernel crash due to ceph_fsync - unsafe_request_wait+0x143 (BZ#2080071) * TCP doesn't retransmit if in reorder state and waits for RTO (BZ#2080972) * pnfs NFSv4.1 IO causes a soft lockup (after a server reboot) and an unresponsive client (BZ#2080998) * BlueField2: DPU can't switch to switchdev mode (BZ#2081011) * Important ice bug fixes (BZ#2081794) * For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084138) * Host is getting crash/abrupt reboot while the guest has been assigned with more than 128 GB RAM while it is using NVIDIA proprietary module. (BZ#2085572) * s_pf0vf2: hw csum failure for mlx5 (BZ#2086549) * kernel memory leak while freeing nested actions (BZ#2086590) * Regression: Bluetooth will not activate after 8.5 update (BZ#2087641) * mlx5,Internal port - traffic not offloaded on tunnel interface rules on chain > 0 when internal port is the vtep device. (BZ#2088610) * rule not offloaded on server side with syndrome(0x389e56) when direction is in (BZ#2088611) * TTL decrease only on the first packet (BZ#2088638) * TC HWOL of inbound traffic over geneve with ovs bridge as VTEP is not working (BZ#2088639) * Audio No Function on Orchid Bay(Mini Config) (BZ#2090423) none-baseos-rpms bpftool-4.18.0-372.13.1.el8_6.aarch64.rpm 498e9dabb3175f524b9f90bdaf183c1492b09cf5c4339391cc4bc930ef01263e kernel-4.18.0-372.13.1.el8_6.aarch64.rpm e7759482ad0650ab08849c68f884164e11ac8172844cdff473a679064e1a7233 kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm b4c1d00e1e0bfd61666267e14d354ac8c672d4be9eb5f97da15b757a937e058f kernel-abi-stablelists-4.18.0-372.13.1.el8_6.noarch.rpm b4c1d00e1e0bfd61666267e14d354ac8c672d4be9eb5f97da15b757a937e058f kernel-core-4.18.0-372.13.1.el8_6.aarch64.rpm e48ca0a1fb203ec8a26b9d96ba84d547fe79db278577116a40c63e83369f5d68 kernel-cross-headers-4.18.0-372.13.1.el8_6.aarch64.rpm 4c47e15cc728b22fab754757eb756407b38fe066b3055e7cbf01a5d558d06c6d kernel-debug-4.18.0-372.13.1.el8_6.aarch64.rpm 5653f7e25c4c3d762163343f9bd069000d26fa08eeaa1aa6289c194778d5517f kernel-debug-core-4.18.0-372.13.1.el8_6.aarch64.rpm 03b1712e26c851459a6ff83dd06763fbc35f1f02cbc3205ee022ccb264e1c2c6 kernel-debug-devel-4.18.0-372.13.1.el8_6.aarch64.rpm 919fc0ab1ae78a7308db76be4a8625d016ac83364033a0f27aa8298c6b5aa4f9 kernel-debuginfo-common-aarch64-4.18.0-372.13.1.el8_6.aarch64.rpm 2700858a3beb79aa2345d12bcbc70adec234ae02e36c191c82c7af51d8f46a4b kernel-debug-modules-4.18.0-372.13.1.el8_6.aarch64.rpm 193caa6004eacf95b39bb33f9bd8f3b71d424d5730d774b83c7bc408711a14e7 kernel-debug-modules-extra-4.18.0-372.13.1.el8_6.aarch64.rpm faeb9e263f718a078fdf2d86eed71693500aa71ddc116ef82a1046f92aaad9dc kernel-devel-4.18.0-372.13.1.el8_6.aarch64.rpm 89c1d7bf95ab8d86f3a9183c03c19808494cddf84a4c5faa8451989ab388ee83 kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm 77be784be5e0fd28ae20b42b387308211e9eaae3483a409141418380f85e8696 kernel-doc-4.18.0-372.13.1.el8_6.noarch.rpm 77be784be5e0fd28ae20b42b387308211e9eaae3483a409141418380f85e8696 kernel-headers-4.18.0-372.13.1.el8_6.aarch64.rpm 7a3e64961e2ca533f1266c0e439bec9ff128e8183a4f27b52712d1f059a9e7df kernel-modules-4.18.0-372.13.1.el8_6.aarch64.rpm 0111ec95185cb2612bcd6ebab18f91cd24c3761f095b4f98b8f22d7cb91656f7 kernel-modules-extra-4.18.0-372.13.1.el8_6.aarch64.rpm 411446e223906d40c465313041b7882d8954dfe883caf76610bb585b9f9f4edf kernel-tools-4.18.0-372.13.1.el8_6.aarch64.rpm 595178c9f114a353507904b272f06390ca00c649b7b44ed5537dea1aff6d4114 kernel-tools-libs-4.18.0-372.13.1.el8_6.aarch64.rpm c69d83ffa83a346fd743c88f5732ba3085d8777bf7fd0b4851cfb7b4b2219362 perf-4.18.0-372.13.1.el8_6.aarch64.rpm 6252171b7709e15a61095fdda4c551e54116b6b5234b01635b061d03c901a04a python3-perf-4.18.0-372.13.1.el8_6.aarch64.rpm 94f20c382c601f25396139b6633e73ab0fde093d09263c533c5cd31aa575afbf RLSA-2022:5317 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write (CVE-2022-29824) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-13.el8_6.1.aarch64.rpm e843cab0a9dd2eb32ea0e9cde216fa05351324e454a2bef3a507277b53925327 python3-libxml2-2.9.7-13.el8_6.1.aarch64.rpm 75b058a4da34d4a75b479b868ec1c07966b6f683c196639ae49f13cd06c417c1 RLBA-2022:5318 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The dracut packages contain an event-driven initial RAM file system (initramfs) generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. Bug Fix(es) and Enhancement(s): * RHCOS 4.8: FIPS is not working (BZ#2086507) none-baseos-rpms dracut-049-202.git20220511.el8_6.aarch64.rpm cda45164988255bfae572b20ad0d4ef9af0d293cef37d6234fe0c1d723153daa dracut-caps-049-202.git20220511.el8_6.aarch64.rpm 5193100c4e2eb9b81f9c264b840bf23225d9d6b2d608b8a00b6f06fc4861eb23 dracut-config-generic-049-202.git20220511.el8_6.aarch64.rpm b3155b0a0350a130a7fcdfa1806dd0749a8c754620af7d931fc2fe9532046b0a dracut-config-rescue-049-202.git20220511.el8_6.aarch64.rpm 46394d61aa25038ff0215583e66725c36afff7b1cd33f91d8dc315594ae15762 dracut-live-049-202.git20220511.el8_6.aarch64.rpm 398eafefb08fa0b3bac2abb4049f3c595e89a72488db6e01ca07ee15842144ce dracut-network-049-202.git20220511.el8_6.aarch64.rpm 80e4473faf77dd78e1470bfc2bfb01a3df320673562ea919e0671f9f3d5a5c62 dracut-squash-049-202.git20220511.el8_6.aarch64.rpm 2ec5f307ea292274ca17c44d08aa4ddf93b0627e8473d1499c63f6ddbf9a92bf dracut-tools-049-202.git20220511.el8_6.aarch64.rpm 4305b2c56fa4badc5d90bb93fa9148fa169ef082b3cdfcfbea4bc75244d18ecd RLSA-2022:5319 Moderate: vim security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for vim. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap buffer overflow (CVE-2022-1621) * vim: buffer over-read (CVE-2022-1629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms vim-minimal-8.0.1763-19.el8_6.2.aarch64.rpm b193b7d8a1128e74d3e34d6ff4a9731ea7f25f9bd3a671733fceba34bb80a6e2 RLBA-2022:5320 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager 1.36.0 loses DHCP lease and doesn't try again (BZ#2090280) * After NetworkManager update to 8.6, IP assigned through DHCP became secondary IP address (BZ#2092807) none-baseos-rpms NetworkManager-1.36.0-7.el8_6.aarch64.rpm d9217dadee6953a91494042d4097465e72b3a36512f5d06f2ab8f2e0c2f26e61 NetworkManager-adsl-1.36.0-7.el8_6.aarch64.rpm f446a290ec92a8e2aab75b26655eb917fbcd681959e9897c4d54b46970448ab4 NetworkManager-bluetooth-1.36.0-7.el8_6.aarch64.rpm b693105ffb44eb6c0d53121dbb997a2d177ce4272bef03225474499b9cedd17e NetworkManager-config-connectivity-redhat-1.36.0-7.el8_6.noarch.rpm 42ef2815d4a98cd57881143b2043e5c84ece1eb339b0b8d0b9fcf91f0fc14974 NetworkManager-config-connectivity-redhat-1.36.0-7.el8_6.noarch.rpm 42ef2815d4a98cd57881143b2043e5c84ece1eb339b0b8d0b9fcf91f0fc14974 NetworkManager-config-server-1.36.0-7.el8_6.noarch.rpm 814fc82752273efdf7cfcca9c48beb2ec622c6031ada71853650961db0287499 NetworkManager-config-server-1.36.0-7.el8_6.noarch.rpm 814fc82752273efdf7cfcca9c48beb2ec622c6031ada71853650961db0287499 NetworkManager-dispatcher-routing-rules-1.36.0-7.el8_6.noarch.rpm a899eb0188fc461611204dc41289ff4f0c0c80f081a392b0f912697ce50eb7cd NetworkManager-wwan-1.36.0-7.el8_6.aarch64.rpm 407f5c013fa0baa4ed587e940cc1f6180d40a0ad1658a042d6baf25ecdd61a28 NetworkManager-dispatcher-routing-rules-1.36.0-7.el8_6.noarch.rpm a899eb0188fc461611204dc41289ff4f0c0c80f081a392b0f912697ce50eb7cd NetworkManager-initscripts-updown-1.36.0-7.el8_6.noarch.rpm 4a67ec8084e995f232ce48146653dd63cba93a64e8b5f1064b04bd81160f7796 NetworkManager-initscripts-updown-1.36.0-7.el8_6.noarch.rpm 4a67ec8084e995f232ce48146653dd63cba93a64e8b5f1064b04bd81160f7796 NetworkManager-libnm-1.36.0-7.el8_6.aarch64.rpm 54f99c226d67563433f179c894b89d413b08f737d21aaeefb05918975c882948 NetworkManager-ovs-1.36.0-7.el8_6.aarch64.rpm 97eb8f358b2f00b1e37e99b9f1ac3561381f53360c66dbaee663cfc5630cb6a8 NetworkManager-ppp-1.36.0-7.el8_6.aarch64.rpm 181adcdae9318f15b7dfbc95bd3fb4527e7073da0d24b0b497581e75abe5923f NetworkManager-team-1.36.0-7.el8_6.aarch64.rpm 7cd36e0cd6ecdec0a3804a32e3afde7bfaf46269d3fffb3ad995ba8043f713dd NetworkManager-tui-1.36.0-7.el8_6.aarch64.rpm 583b977c14152ee2fed7541d28e03821c8ecd7355c837c9ab11f306bf441e0c3 NetworkManager-wifi-1.36.0-7.el8_6.aarch64.rpm a3b5d404df69d00c32b00267ab22790364da8967db51b38c49943408a9bfd1a2 RLBA-2022:5321 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es) and Enhancement(s): * Use right sdap_domain in ad_domain_info_send. (BZ#2072958) * pam_sss_gss ceased to work after upgrade to 8.6. (BZ#2089244) none-baseos-rpms libipa_hbac-2.6.2-4.el8_6.1.aarch64.rpm 18e6165f4fc19cff370fc44ccaa46e4b076379addaeb9c507848d3efbdfbda6e libsss_autofs-2.6.2-4.el8_6.1.aarch64.rpm f52e6c0a69fea9e3a2aef20ef8dea0214b247edf7db70417baef1482c9b10f87 libsss_certmap-2.6.2-4.el8_6.1.aarch64.rpm 55e41daa41c2c0a95ca7bf431acefaba6c3710cdf754dae0ea2e0f5d158bf0de libsss_idmap-2.6.2-4.el8_6.1.aarch64.rpm 2c4eb8d102b4932e7068c4d2ed91f2d66bcb541e50fb96aebbf66c2f400ea6b2 libsss_nss_idmap-2.6.2-4.el8_6.1.aarch64.rpm eb5f4e2387e6724b48355509c1a73df479e3568d32e6d89247e8884ed9a72f2c libsss_simpleifp-2.6.2-4.el8_6.1.aarch64.rpm 88a2ba673fb2fb33074b1048fc3ea879288b381f5fe2e71edc3eb64132572e94 libsss_sudo-2.6.2-4.el8_6.1.aarch64.rpm 3e3c42ed667befe8a7511fe7d4e6137741cb9a02ad659643c63515c94c96ebba python3-libipa_hbac-2.6.2-4.el8_6.1.aarch64.rpm 764497bfd4dc3b34952e2625a42fb8391a2f8871dfdf928ea327f44fa988a770 python3-libsss_nss_idmap-2.6.2-4.el8_6.1.aarch64.rpm 2cb105786e876a9f380fee3de7a81610507d6611e8ada098b25991c355f1b047 python3-sss-2.6.2-4.el8_6.1.aarch64.rpm 0a89251608f32223c117db025b082278893429620d1286b0488ec6240bc4bf28 python3-sssdconfig-2.6.2-4.el8_6.1.noarch.rpm be0ce675d193fe4112d527748c8495c423fe6602bdc598500a7b90de0d46812b python3-sssdconfig-2.6.2-4.el8_6.1.noarch.rpm be0ce675d193fe4112d527748c8495c423fe6602bdc598500a7b90de0d46812b python3-sss-murmur-2.6.2-4.el8_6.1.aarch64.rpm 9446d2eff6e9f12a07d4f911cfb7312bb3d96b4a035e28333ba809c8d94d304b sssd-2.6.2-4.el8_6.1.aarch64.rpm 5bebfd5998fc402f48ebafd907ecfea86147e9393eb3950b6e4f5eca9ef2e7be sssd-ad-2.6.2-4.el8_6.1.aarch64.rpm 9e849b081636521a930a64c2d791da76a192bd5e51635200b6e7c90c544e4d54 sssd-client-2.6.2-4.el8_6.1.aarch64.rpm dca351735067a74a5a8b25f9ba96931f883d464b54036a950ba5ff7398279d3a sssd-common-2.6.2-4.el8_6.1.aarch64.rpm 0553f83b4224763d9691a88b981c01e0cc3cd6b8dab3cbc99ced390812044254 sssd-common-pac-2.6.2-4.el8_6.1.aarch64.rpm e03ddafbadcefc8a981640cbf51ca72871fac31f0e33d38763cd898c761d9ba7 sssd-dbus-2.6.2-4.el8_6.1.aarch64.rpm 31bc5ff25780f4ac85333e322cf568f12bf65cad66c24f49deb3621c5d5ab071 sssd-ipa-2.6.2-4.el8_6.1.aarch64.rpm b06155795804b405a4d147332fd61c96f39cdfa67775a134f25243587516b6c5 sssd-kcm-2.6.2-4.el8_6.1.aarch64.rpm e460baa7eb6fbc411f6ec136098a6a6ed3721e92babcae9ce1c20030884e6da8 sssd-krb5-2.6.2-4.el8_6.1.aarch64.rpm 08c432ab48b5f4c9b6a81484f8b94ddf359eb9b0ddf9125990f9915d1e89f836 sssd-krb5-common-2.6.2-4.el8_6.1.aarch64.rpm ed1e9693120a292350687e348599b652faacbde47b40b7678faf19435f7c94cb sssd-ldap-2.6.2-4.el8_6.1.aarch64.rpm bceb4c33dfa4add0fc7c4769327abf8e9add8854921d11dd3b8906e9809fa08d sssd-nfs-idmap-2.6.2-4.el8_6.1.aarch64.rpm 4f7f2b2cdaff4689b810984f39bc907f3a6d82152dbbb7917207b367db3263cd sssd-polkit-rules-2.6.2-4.el8_6.1.aarch64.rpm 0bd25eb93b40901406b6d655a7647bf6de5ee446dec4f8546241889c1cc0c20b sssd-proxy-2.6.2-4.el8_6.1.aarch64.rpm 67ed1431f401e39c1625dbdce430a268f556747e77e8288a5b6a91e04742c0d5 sssd-tools-2.6.2-4.el8_6.1.aarch64.rpm 4a02bdd92564f0184736ed80a8beaf150318058d8197821cb58c69edc0e143f4 sssd-winbind-idmap-2.6.2-4.el8_6.1.aarch64.rpm 7127b3da8e1129987c4b2a59289ae270c99745fb6b723740f2a3a9afbef999a5 RLSA-2022:5564 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * conntrack entries linger around after test (BZ#2066356) * Any process performing I/O doesn't fail on degraded LVM RAID and IO process hangs (BZ#2075075) * fix data corruption caused by dm-integrity (BZ#2082184) * Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083308) * SUT will flash once color screen during boot to OS. (BZ#2083384) * Kernel Support Fixes for UV5 platform (BZ#2084645) * i/o on initiator stuck when network is disrupted (4.18.0-372.9.1.el8.x86_64) (BZ#2091078) * glock deadlock (using the dct tool) (BZ#2092073) * Recursive locking in gfs2_fault (read/write + mmap) (BZ#2092074) * 8.6.z backport of "vmxnet3: add support for 32 Tx/Rx queues" from BZ 2083561 (BZ#2094473) * System freezes with callstack in dmesg: ret_from_fork (BZ#2096305) * Need some changes in Rocky Linux8.x kernels. (BZ#2096931) * Bad length in dpctl/dump-flows (BZ#2097796) Enhancement(s): * Elkhart Graphics - remove force_probe flag (BZ#2075567) none-baseos-rpms bpftool-4.18.0-372.16.1.el8_6.aarch64.rpm a43bf538228bc72c995ad15b86221e1f48b4703c923a4dbb8faa4fbec8e4d57c kernel-4.18.0-372.16.1.el8_6.aarch64.rpm 789ac54dee99c816b132ab3721d184ff951a1e44cdd94f06e7023953d69f1a89 kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm fd8c1e4ac86304aa6e621630eb657466fdb49aca7963b7fbc2549465efb7e609 kernel-abi-stablelists-4.18.0-372.16.1.el8_6.noarch.rpm fd8c1e4ac86304aa6e621630eb657466fdb49aca7963b7fbc2549465efb7e609 kernel-core-4.18.0-372.16.1.el8_6.aarch64.rpm a8b1b8a4bfa17169bb69eb7a8885f9f78d326b6a5339a89ef958f3cd9c27b610 kernel-cross-headers-4.18.0-372.16.1.el8_6.aarch64.rpm b9da196dfcb484597e2dd766276b44758033bd6a8cbf5776e1a9ce8a15e530a4 kernel-debug-4.18.0-372.16.1.el8_6.aarch64.rpm 1e5ba59a380f55359417bf233215289b6373f3fb52b587ab5a11af250b80c5bc kernel-debug-core-4.18.0-372.16.1.el8_6.aarch64.rpm 90a973d87c3a86739c5dc0daa8db0eda905d691c2f6a3fb599982472be20c6cc kernel-debug-devel-4.18.0-372.16.1.el8_6.aarch64.rpm 3a7a7cbba32e8898207959f2e77b8686a65626bacfd9676229dc7585cab3b784 kernel-debuginfo-common-aarch64-4.18.0-372.16.1.el8_6.aarch64.rpm 24d13f89670ec7a3090350afea2a3889c86891b5c5e586201d177c4e67c53ad1 kernel-debug-modules-4.18.0-372.16.1.el8_6.aarch64.rpm dd1abb4cf5bd841130bbc9adc28f15bf5ef17e75585c10ba89d7f2f01787bee8 kernel-debug-modules-extra-4.18.0-372.16.1.el8_6.aarch64.rpm 364d3dbf6e8592909efbdd92668b4746ff3a52a45af540c93bcd8adf8469e56b kernel-devel-4.18.0-372.16.1.el8_6.aarch64.rpm 96fe585c142455f9e0695e5e2dc481a76ed3ff84f246f6e331630e1eaa8d4d81 kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm 3d6d09f4043634676712057ec9642685a5ea65221b091c255bebabca6df3d0aa kernel-doc-4.18.0-372.16.1.el8_6.noarch.rpm 3d6d09f4043634676712057ec9642685a5ea65221b091c255bebabca6df3d0aa kernel-headers-4.18.0-372.16.1.el8_6.aarch64.rpm c7cf8cdea94b3a32ee007be5be4631c04ba00b25e1078f6a045aef135b5fcf31 kernel-modules-4.18.0-372.16.1.el8_6.aarch64.rpm d43c7d22d7c7e0954283c01d27adeeec57a512f0783720f7f86c04a3c925786f kernel-modules-extra-4.18.0-372.16.1.el8_6.aarch64.rpm a373c71302399dfe0d5ab9177c32e5b985e776e456b69dcb432f823411b9ccae kernel-tools-4.18.0-372.16.1.el8_6.aarch64.rpm 1d13f6038f549f03869e7f6eddd520fc6997b3c13a57cb852d75059be84ac5e7 kernel-tools-libs-4.18.0-372.16.1.el8_6.aarch64.rpm 8f81ea5a63b3e020c8edab49ddc6d764128083d19ef1e9f2256ac95379b1e210 perf-4.18.0-372.16.1.el8_6.aarch64.rpm e8ad078ed0c7b938be4a956406909054636e495503983cd7614406364b798840 python3-perf-4.18.0-372.16.1.el8_6.aarch64.rpm 4d89d3b3000be836c6857daaa16a809b3250887d4877c8fb2c1e2ffef8b9d152 RLBA-2022:5807 rng-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rng-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rng-tools packages contain random number generator user-space utilities, such as the rngd daemon. Bug Fix(es) and Enhancement(s): * recent rng-tools updates to run udevadm --settle hang in container (BZ#2077035) none-baseos-rpms rng-tools-6.14-6.git.b2b7934e.el8_6.aarch64.rpm 2f04770098fd41bf3784bb43e2e620c6231228147d120835f6f2c4d36ea8ed48 RLBA-2022:5808 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * [Rocky Linux-8.4] systemd still crashes in version systemd-239-45.el8_4.6.x86_64 with coredump (BZ#2084052) * systemd services fail to start (BZ#2086553) * systemd may unnecessarily emit PropertiesChanged D-Bus signal when adding dependencies (BZ#2091590) * Delay running mount start jobs when we are in ratelimited state (BZ#2097336) none-baseos-rpms systemd-239-58.el8_6.3.aarch64.rpm bb1160461f8e8cf72000f1bdec4b92ceb3028ed04b5141abf02be732c09787ad systemd-container-239-58.el8_6.3.aarch64.rpm 4528c3ff0494e35a821aac8af5272cc67acb6a55e88131711bb8edd252f86fe5 systemd-devel-239-58.el8_6.3.aarch64.rpm be9e5617f21bf875e2675c6f8be9022b764c7a83c7aba5366c6c2033305e5f4e systemd-journal-remote-239-58.el8_6.3.aarch64.rpm b87f09be2d7a51385c4fcdb46ad47e50c91fdd403aeae58530074761517f073e systemd-libs-239-58.el8_6.3.aarch64.rpm 522d62022395efa56c07167ded6901f4545d37acbf1f9e2d540067388c3f15cc systemd-pam-239-58.el8_6.3.aarch64.rpm 3e96788df58f293f26ab0445ccc7758676e37031f52b1870f43a7553aa1bcf29 systemd-tests-239-58.el8_6.3.aarch64.rpm 6ad925d927bb5b93cb0f2f04178de1a89464ab8d4411abf12bfb05a9033faec2 systemd-udev-239-58.el8_6.3.aarch64.rpm 97ace087cd57d52108cf392d3be691c021c4096b6f011392827c0336c8074ff0 RLBA-2022:6458 iproute bug fix and enhacement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es) and Enhancement(s): * Fix buffer overflow on large labels (BZ#2099364) none-baseos-rpms iproute-5.15.0-4.el8_6.1.aarch64.rpm 6308d4bd393f49fb578a99845585cd401425ff2e371b054851acbdb3e50f01ac iproute-tc-5.15.0-4.el8_6.1.aarch64.rpm b5059910273c0da65a2f0849e4bd0df68c659a5d1742548acbc64634a8c50ccc RLBA-2022:5810 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es) and Enhancement(s): * Grub fails to boot the system when a disk renaming happens, due to tuned_initrd hardcoding the boot disk (BZ#2084643) none-baseos-rpms tuned-2.18.0-2.el8_6.1.noarch.rpm f5a9fb27a0d5533076fc6775efc58509aab79ac2725624712debbf8d33e22844 tuned-2.18.0-2.el8_6.1.noarch.rpm f5a9fb27a0d5533076fc6775efc58509aab79ac2725624712debbf8d33e22844 tuned-profiles-atomic-2.18.0-2.el8_6.1.noarch.rpm 87d8981c0afb3c212da77c1c8a665d8b2d75b00226bd1d8afcc273820fa97cb1 tuned-profiles-atomic-2.18.0-2.el8_6.1.noarch.rpm 87d8981c0afb3c212da77c1c8a665d8b2d75b00226bd1d8afcc273820fa97cb1 tuned-profiles-compat-2.18.0-2.el8_6.1.noarch.rpm 6a631778be6cc2941325c9ec55a26b8cda34938d0c4711f523ad9b985b9505b2 tuned-profiles-compat-2.18.0-2.el8_6.1.noarch.rpm 6a631778be6cc2941325c9ec55a26b8cda34938d0c4711f523ad9b985b9505b2 tuned-profiles-cpu-partitioning-2.18.0-2.el8_6.1.noarch.rpm a92ad7decc01091ed862f9bb7d370dfbec5714a23d0117d5ff0be24be1ab88d7 tuned-profiles-cpu-partitioning-2.18.0-2.el8_6.1.noarch.rpm a92ad7decc01091ed862f9bb7d370dfbec5714a23d0117d5ff0be24be1ab88d7 tuned-profiles-mssql-2.18.0-2.el8_6.1.noarch.rpm 244708cbea059f27f12ec10cc74264eba4fc7b5f30af2653cc56a57d66df9410 tuned-profiles-mssql-2.18.0-2.el8_6.1.noarch.rpm 244708cbea059f27f12ec10cc74264eba4fc7b5f30af2653cc56a57d66df9410 tuned-profiles-oracle-2.18.0-2.el8_6.1.noarch.rpm 0c91193c5756c903548bcea30d77843f5b317a63c3d7c9d390f5796b6846ac04 tuned-profiles-oracle-2.18.0-2.el8_6.1.noarch.rpm 0c91193c5756c903548bcea30d77843f5b317a63c3d7c9d390f5796b6846ac04 RLBA-2022:5811 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es) and Enhancement(s): * dm disk nodes do not pick up RO state from NVMe paths (BZ#2094472) none-baseos-rpms device-mapper-multipath-0.8.4-22.el8_6.1.aarch64.rpm 1f39484429f213a8f53eaf9373376ee317b9842fb76c761d34ed667ba92ab1f3 device-mapper-multipath-libs-0.8.4-22.el8_6.1.aarch64.rpm 3f70d6ff121b313c3bc01d78b6e682d56dc4fe17c98f4d0261b3b08964098332 kpartx-0.8.4-22.el8_6.1.aarch64.rpm 165b0974111529419138af6787542ae73ca0a6c5edecf3a469724a8f53116ffc libdmmp-0.8.4-22.el8_6.1.aarch64.rpm eaa23b51cd7eefd7f0b0e7de3ff4fd013f852021ba251e638831d90a1558d3f3 RLBA-2022:5812 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * AVC lldpad denied sendto scontext=system_u:system_r:lldpad_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=unix_dgram_socket (BZ#2095184) none-baseos-rpms selinux-policy-3.14.3-95.el8_6.1.noarch.rpm ee4b10799ce679b18a5c3ecd27e377712aa699893c7ed0a01027d7972739684b selinux-policy-3.14.3-95.el8_6.1.noarch.rpm ee4b10799ce679b18a5c3ecd27e377712aa699893c7ed0a01027d7972739684b selinux-policy-devel-3.14.3-95.el8_6.1.noarch.rpm 7e5e2ff71a5d78f79771b2849609566c892b21c9f5e3532f78a79b76ead61477 selinux-policy-devel-3.14.3-95.el8_6.1.noarch.rpm 7e5e2ff71a5d78f79771b2849609566c892b21c9f5e3532f78a79b76ead61477 selinux-policy-doc-3.14.3-95.el8_6.1.noarch.rpm a2b6ee1a0476016a33ac0491cbc727d35fa4adf2839a21e0890af8f0f90442a9 selinux-policy-doc-3.14.3-95.el8_6.1.noarch.rpm a2b6ee1a0476016a33ac0491cbc727d35fa4adf2839a21e0890af8f0f90442a9 selinux-policy-minimum-3.14.3-95.el8_6.1.noarch.rpm e71ca0131e8a18eaa0f1624ebf03f898d2629b4931ac00bec8e6ff795ea3f4bf selinux-policy-minimum-3.14.3-95.el8_6.1.noarch.rpm e71ca0131e8a18eaa0f1624ebf03f898d2629b4931ac00bec8e6ff795ea3f4bf selinux-policy-mls-3.14.3-95.el8_6.1.noarch.rpm 3ca789e4c1d04562357b5d0ae759d5b9c8265376fcf4f8de1dd97c345456bde5 selinux-policy-mls-3.14.3-95.el8_6.1.noarch.rpm 3ca789e4c1d04562357b5d0ae759d5b9c8265376fcf4f8de1dd97c345456bde5 selinux-policy-sandbox-3.14.3-95.el8_6.1.noarch.rpm f301fa56c0cfab1fd03282c11ef2fa840ddeecf9d7ab3b901ca06422a431ce9a selinux-policy-sandbox-3.14.3-95.el8_6.1.noarch.rpm f301fa56c0cfab1fd03282c11ef2fa840ddeecf9d7ab3b901ca06422a431ce9a selinux-policy-targeted-3.14.3-95.el8_6.1.noarch.rpm 6f2310fc5e5edf6cfd1aaccc75f3309bb6682c296943d87fe9d51186893764a8 selinux-policy-targeted-3.14.3-95.el8_6.1.noarch.rpm 6f2310fc5e5edf6cfd1aaccc75f3309bb6682c296943d87fe9d51186893764a8 RLBA-2022:5816 libdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library providing simplified C and Python API to the libsolv package dependency solver. Bug Fix(es) and Enhancement(s): * Performing security update from Rocky Linux 8.5 to Rocky Linux 8.6 causes dependency errors. (BZ#2095764) none-baseos-rpms libdnf-0.63.0-8.1.el8_6.aarch64.rpm 558312511295911800520506eb4cb50eb6af031833b5b618b916582aa6f11ec2 python3-hawkey-0.63.0-8.1.el8_6.aarch64.rpm 154462fdbd60d0ab45313d2c98332e72b400d2d00d8793be87ebdc4ab69fb3c3 python3-libdnf-0.63.0-8.1.el8_6.aarch64.rpm 4330d96b7df428be40a8815bd7d8ce7d605f693cc9b8c32c51790cfc586d16ba RLBA-2022:5817 dbus bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Bug Fix(es) and Enhancement(s): * gio process invoked from /usr/libexec/dbus-1/dbus-kill-process-with-session never quits (BZ#2097784) none-baseos-rpms dbus-1.12.8-18.el8_6.1.aarch64.rpm 7623d035872fee92783aae92dd6e585b3bba0da796a233462175cb1d3fcc9202 dbus-common-1.12.8-18.el8_6.1.noarch.rpm 70a8d0d533fa7f20d536de76bf6d2dae5e8e7c0bb5a59d7b31b0aac5c5a7d30d dbus-common-1.12.8-18.el8_6.1.noarch.rpm 70a8d0d533fa7f20d536de76bf6d2dae5e8e7c0bb5a59d7b31b0aac5c5a7d30d dbus-daemon-1.12.8-18.el8_6.1.aarch64.rpm 82cdf6265cf635c3a1436c609ecba6f091908d34b2fd79cd3878ffa3fd6d56ad dbus-libs-1.12.8-18.el8_6.1.aarch64.rpm d2eb435b8e539de1922c7e53c12f3880eecf87eb7232258e68e3a2344319c618 dbus-tools-1.12.8-18.el8_6.1.aarch64.rpm 44d5dc590adad863bba4263f42c47adc32b09b6810fb28660ba238a6d32535cb RLSA-2022:5819 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012) * kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu’s. (BZ#2090484) * enable/disable multiqueues repeatedly while ping local host, guest kernel panic (BZ#2093416) * Backport kernel audit enhancements and fixes from v5.13-rc1 to v5.16-rc6 (BZ#2095434) * blk_update_request: I/O error, dev nvme0n3, during xfs creation (BZ#2100150) * SCSI updates for Rocky Linux 8.7 (BZ#2100254) * Kernel bug on mm/slub.c:314 (BZ#2102251) * Implement new tc action for check_pkt_len (BZ#2102333) * too long timeout value with TIME_WAIT status of conntrack entry (BZ#2104002) * Connectx6-DX, mlx5 , backport 087032ee7021 ("net/mlx5e: TC, Fix ct_clear overwriting ct action metadata") (BZ#2104012) * mlx5: Software steering memory allocation failure, netperf TCP_CRR with ct(). (BZ#2104013) * tcp: request_sock leak in Calico OCP (BZ#2104670) none-baseos-rpms bpftool-4.18.0-372.19.1.el8_6.aarch64.rpm f795a2c6a275a13482fbabf3ea4c7429ddefc60bae83a895109e43b8261e7cc2 kernel-4.18.0-372.19.1.el8_6.aarch64.rpm ef75f33a747a74f4334aa11a3a021d6232e4b1d499458338e166bcd7a16cb979 kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm 5d6bd7531716699ff3b1a5fa2e179a392c843f021397b3078db4c6f652570b2e kernel-abi-stablelists-4.18.0-372.19.1.el8_6.noarch.rpm 5d6bd7531716699ff3b1a5fa2e179a392c843f021397b3078db4c6f652570b2e kernel-core-4.18.0-372.19.1.el8_6.aarch64.rpm a2bc921bc17398ed7dd12986d3ef70ea50539364726dffa77cab12e929a3587b kernel-cross-headers-4.18.0-372.19.1.el8_6.aarch64.rpm 2540a239eb13ef6eadc34031944b8edc7bf13171edd77da29f2ce90e70e59980 kernel-debug-4.18.0-372.19.1.el8_6.aarch64.rpm 0d7de5a327af4c11f4990b6d71765ab5c37c5b620a79821c0b78e73fe484f133 kernel-debug-core-4.18.0-372.19.1.el8_6.aarch64.rpm 7fa87aa5fb6dcd70219a12fd0f1c23cb13cbced10f8014424c45a7ffbce67ab1 kernel-debug-devel-4.18.0-372.19.1.el8_6.aarch64.rpm d6743349b6ab91fcaeb56ebf7fc51e7a5776226c5930d3fa5725a1f04cb3a3b7 kernel-debuginfo-common-aarch64-4.18.0-372.19.1.el8_6.aarch64.rpm 560d189ff1c4ff1d82e98cd8b66cb831da698b05bdaab3db3398f01cbd249759 kernel-debug-modules-4.18.0-372.19.1.el8_6.aarch64.rpm d131f37cee44b69cc9bdfa739e8ea51f7e34d2ccfeb23e8a0955fd368d73fbda kernel-debug-modules-extra-4.18.0-372.19.1.el8_6.aarch64.rpm 53a60b1cb25bbad5f226d5df68e57f8333f954f28a96b0712f8fbd26d981ecc8 kernel-devel-4.18.0-372.19.1.el8_6.aarch64.rpm 8f7746bd5673129ac5c72426ff09061cfe7b0e5f0db17e3fe94c576ec92d19b3 kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm c6fcda0d0a92a2d91f3564fe8226e289e1c48330ac3c81eb769172f2ce74e06f kernel-doc-4.18.0-372.19.1.el8_6.noarch.rpm c6fcda0d0a92a2d91f3564fe8226e289e1c48330ac3c81eb769172f2ce74e06f kernel-headers-4.18.0-372.19.1.el8_6.aarch64.rpm 8d6768b740bb7da597c1e5685d0b5979fd25a696b8ab8971ef3378ae6d8b373e kernel-modules-4.18.0-372.19.1.el8_6.aarch64.rpm 80110e7b1e8955aaf32923fd9ab2b6c8cd1d41b17216177bd6484e4ee174ea6b kernel-modules-extra-4.18.0-372.19.1.el8_6.aarch64.rpm e4c35495b65a13cd9877a0b6f711a7fefd4f7d239ec60314eefbd066329660c7 kernel-tools-4.18.0-372.19.1.el8_6.aarch64.rpm 6ca22ca581ffbcd37416a5e4ca632bb1f7b384ac12ccf5734bcd6e502fcc5818 kernel-tools-libs-4.18.0-372.19.1.el8_6.aarch64.rpm 337fd21c10b40980d7127d4a4d7e5e4c07f30a56086e3e03f1bd14e02a8447c0 perf-4.18.0-372.19.1.el8_6.aarch64.rpm ebc744b8564fea2ff38b27c19e9d45b36f0946e2c5bd5c7c490f74e0b443af6f python3-perf-4.18.0-372.19.1.el8_6.aarch64.rpm ac0c08d1c2375a870ec68fd6d93d3f8304b60b78234d754adbfe590198664f0a RLBA-2022:5820 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups. Bug Fix(es) and Enhancement(s): * lvm ignores multipath blacklist configuration (BZ#2100133) none-baseos-rpms device-mapper-1.02.181-3.el8_6.2.aarch64.rpm 17188ed1d7fb5ab7edd72f169cededb9c85e69ca01ec293c033ac7c2960b7de5 device-mapper-event-1.02.181-3.el8_6.2.aarch64.rpm 73f4cf3ed9fe759720e0863eb1bc11cac2f9a3b50cd67665c9d1144c5db9c729 device-mapper-event-libs-1.02.181-3.el8_6.2.aarch64.rpm 2ba7035c5444813d575f5b5714ba1f62f7618862b6c590ce091f117048cdf271 device-mapper-libs-1.02.181-3.el8_6.2.aarch64.rpm e1868b43360ce0e536183ba46e8056c4050d98352ea4a1757a45b0e6a0d81ef7 lvm2-2.03.14-3.el8_6.2.aarch64.rpm 80e1e2cb51c1575bfef1ecf4ce53a46c59b559ca25486a6275f0ec3398bd60f1 lvm2-dbusd-2.03.14-3.el8_6.2.noarch.rpm 6ae8b3bd0f5290da5bb08059fe534b162ab46ae3d2398b8b53d58362556757c5 lvm2-dbusd-2.03.14-3.el8_6.2.noarch.rpm 6ae8b3bd0f5290da5bb08059fe534b162ab46ae3d2398b8b53d58362556757c5 lvm2-libs-2.03.14-3.el8_6.2.aarch64.rpm dd96ae89dfba2f3f6f301c5738fe74568da653683595349c99cff7c106bd0b34 lvm2-lockd-2.03.14-3.el8_6.2.aarch64.rpm 3a746c5dd0c67817d892b3fc31d90dd0b7c5a846b9f86daf5d102816f0b214d0 RLBA-2022:5872 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Obfuscate all passwords from ovirt answer files (BZ#2098639) * sos disables openshift_ovn plugin (BZ#2098643) none-baseos-rpms sos-4.2-20.el8_6.noarch.rpm 580809c0f0256c6168315e9c82beea64c602578b31ad17f0a2b63a584e92c0a1 sos-4.2-20.el8_6.noarch.rpm 580809c0f0256c6168315e9c82beea64c602578b31ad17f0a2b63a584e92c0a1 sos-audit-4.2-20.el8_6.noarch.rpm f33a023afeb1babb7bc4580742cf7b195c26750f79d6c5c96d98819ac53f0c90 sos-audit-4.2-20.el8_6.noarch.rpm f33a023afeb1babb7bc4580742cf7b195c26750f79d6c5c96d98819ac53f0c90 RLBA-2022:6138 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022c, which addresses recent time zone changes. Notably: * In Chile (the America/Santiago time zone), the daylight saving time (DST) starts on September 11, 2022 instead of September 4. none-baseos-rpms tzdata-2022c-1.el8.noarch.rpm 212a9156d1109e2aa3f0a644b756f6ff90670b4bbb68e9b1c0cbe1befdac4f53 tzdata-2022c-1.el8.noarch.rpm 212a9156d1109e2aa3f0a644b756f6ff90670b4bbb68e9b1c0cbe1befdac4f53 RLBA-2022:6151 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * After upgrading system to Rocky Linux 8.6, insights-client fails to run when it's triggered via systemd (BZ#2103606) none-baseos-rpms selinux-policy-3.14.3-95.el8_6.4.noarch.rpm d046551333d94bcbc4691bc29280da00b71ff8741e43a20705b2dc5c3dd28809 selinux-policy-3.14.3-95.el8_6.4.noarch.rpm d046551333d94bcbc4691bc29280da00b71ff8741e43a20705b2dc5c3dd28809 selinux-policy-devel-3.14.3-95.el8_6.4.noarch.rpm bed1e1aaed952420ca96c3882cf682029d26002421c7bfe49c4ff3d61243189f selinux-policy-devel-3.14.3-95.el8_6.4.noarch.rpm bed1e1aaed952420ca96c3882cf682029d26002421c7bfe49c4ff3d61243189f selinux-policy-doc-3.14.3-95.el8_6.4.noarch.rpm e9faf8ebd49fd1db5bf7450a9c619778b07a70183d5c6bc2006d7c877c069fcb selinux-policy-doc-3.14.3-95.el8_6.4.noarch.rpm e9faf8ebd49fd1db5bf7450a9c619778b07a70183d5c6bc2006d7c877c069fcb selinux-policy-minimum-3.14.3-95.el8_6.4.noarch.rpm 009b8e001da08e031721686912fdae0d656f383f8efae6f27da3f8e488b75af2 selinux-policy-minimum-3.14.3-95.el8_6.4.noarch.rpm 009b8e001da08e031721686912fdae0d656f383f8efae6f27da3f8e488b75af2 selinux-policy-mls-3.14.3-95.el8_6.4.noarch.rpm b62ef1fff2ce13be32c667cb4c91556dab07e00480d190d613bad5670c8be871 selinux-policy-mls-3.14.3-95.el8_6.4.noarch.rpm b62ef1fff2ce13be32c667cb4c91556dab07e00480d190d613bad5670c8be871 selinux-policy-sandbox-3.14.3-95.el8_6.4.noarch.rpm 4eb695f8c33fa2673e7496e78093d18f5f8c758b70e213ce237fce50a28b24f2 selinux-policy-sandbox-3.14.3-95.el8_6.4.noarch.rpm 4eb695f8c33fa2673e7496e78093d18f5f8c758b70e213ce237fce50a28b24f2 selinux-policy-targeted-3.14.3-95.el8_6.4.noarch.rpm 3ec86f880c28ab2eb16900c1985215448e13ca5bb58697f8b66019b19c8b6558 selinux-policy-targeted-3.14.3-95.el8_6.4.noarch.rpm 3ec86f880c28ab2eb16900c1985215448e13ca5bb58697f8b66019b19c8b6558 RLSA-2022:6159 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP compression denial of service (CVE-2022-32206) * curl: FTP-KRB bad message verification (CVE-2022-32208) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-22.el8_6.4.aarch64.rpm 86cd5cfad7c247145501ba1be49fa3423bc44b6dcdca98526234ae230840b270 libcurl-7.61.1-22.el8_6.4.aarch64.rpm 366b4490e92304377fbc5297d2b0ca1facb7c9468849774eb0cd339793bb8d3b libcurl-devel-7.61.1-22.el8_6.4.aarch64.rpm f77bf508d72409738cfcee75cc10c36f7105e30a77ebfc54da888991c4a354ed libcurl-minimal-7.61.1-22.el8_6.4.aarch64.rpm 4f24427fcf099f7aaf5990a55233e7d27033d4394beaf67b43d8a7a0e80c1fbf RLSA-2022:6180 Important: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms rsync-3.1.3-14.el8_6.3.aarch64.rpm 669da84435937e8234074e211df5c4928a75ec2350d05b22e06b8ce6348896a7 rsync-daemon-3.1.3-14.el8_6.3.noarch.rpm 0a70d78744021e4be9a55e52c20fa71dded490766078aed7ded17c9cfbf3398b rsync-daemon-3.1.3-14.el8_6.3.noarch.rpm 0a70d78744021e4be9a55e52c20fa71dded490766078aed7ded17c9cfbf3398b RLSA-2022:6206 Important: systemd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms systemd-239-58.el8_6.4.aarch64.rpm 1244ec28d4103ece57408425c6b5588acb8d869f4dbe996833a4194b5bac14f9 systemd-container-239-58.el8_6.4.aarch64.rpm 38fb440f887f4ed6c95a6b8cb12c2762bc0bc9cec3bb896f5e4405a6501b08ae systemd-devel-239-58.el8_6.4.aarch64.rpm e0d366eed94ac27453bc460b97df7d9c459294cc5e85c6b55a62baa809f873f5 systemd-journal-remote-239-58.el8_6.4.aarch64.rpm 6bb96f99d20e99c74e7065222461b63ccf2b7e580713cc2390c9ee5d72d8540a systemd-libs-239-58.el8_6.4.aarch64.rpm 76599ccd0cd6e4b3bf83693329d3fc89ec99ca7f15c28810a130a352b5f47ef6 systemd-pam-239-58.el8_6.4.aarch64.rpm 9388fd32b1485b4f703d603d5e1d2b8416607e7548c0c2eca3fdcf781b6d592c systemd-tests-239-58.el8_6.4.aarch64.rpm bc091477f615b43c1a3f074c4ae02fbe16d5f8d0201e03fcb2175f5aeb3307ea systemd-udev-239-58.el8_6.4.aarch64.rpm 4f9a12f575d4cd738a1290fd5700e5e643d09d7a2c3838ae5945198eac24cc51 RLSA-2022:6460 Moderate: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) * Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) * Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Bad page state in process qemu-kvm pfn:68a74600 (BZ#2081013) * slub corruption during LPM of hnv interface (BZ#2081250) * Affinity broken due to vector space exhaustion (BZ#2084646) * 'rmmod pmt_telemetry' panics on ADL-P IOTG (BZ#2091079) * Unable to boot Rocky Linux-8.6 on Brazos max. config (Install is success) (BZ#2092241) * kernel crash after reboot of T14/G2 AMD laptop (mt7921e module) (BZ#2095654) * mt7921: free resources on pci_probe error path (BZ#2101684) * NLM should be more defensive if underlying FS changes fl_owner (BZ#2102099) * Rocky Linux8/async-pf Guest call trace when reboot after postcopy migration with high stress workload (BZ#2105340) * execve exit tracepoint not called (BZ#2106662) * QProcess dead lock on kernel-4.18.0-358 (BZ#2107643) * KVM fix guest FPU uABI size to kvm_xsave (BZ#2107652) * KVM selftests fail to compile (BZ#2107655) * Some monitor have no display with AMD W6400 when boot into OS. (BZ#2109826) * Percpu counter usage is gradually getting increasing during podman container recreation. (BZ#2110039) * multipath failed to recover after EEH hit on flavafish adapter on Denali(qla2xxx/flavafish/Rocky Linux8.6/Denali) (BZ#2110768) * soft lockups under heavy I/O load to ahci connected SSDs (BZ#2110772) * trouble re-assigning MACs to VFs, ice stricter than other drivers (BZ#2111936) * Intel MPI 2019.0 - mpirun stuck on latest kernel (BZ#2112030) * Multicast packets are not received by all VFs on the same port even though they have the same VLAN (BZ#2117026) * Hyper-V 2019 Dynamic Memory Problem hv_balloon (BZ#2117050) * kernel BUG at kernel/sched/deadline.c:1561! (BZ#2117410) * ALSA (sound) driver - update Intel SOF kcontrol code (BZ#2117732) * bridge over bond over ice ports has no connection (BZ#2118580) * Fix max VLANs available for VF (BZ#2118581) * offline selftest failed (BZ#2118582) * INTEL NVMUpdate utility ver 3.20 is failing to update firmware on E810-XXVDA4T (WPC) (BZ#2118583) * VM configured with failover interface will coredump after been migrating from source host to target host(only iavf driver) (BZ#2118705) * Fix max VLANs available for untrusted VF (BZ#2118707) * Softlockup on infinite loop in task_get_css() for a CSS_DYING cpuset (BZ#2120776) Enhancement(s): * KVM Sapphire Rapids (SPR) AMX Instructions (BZ#2088287) * KVM Sapphire Rapids (SPR) AMX Instructions part2 (BZ#2088288) * ice: Driver Update (BZ#2102359) * iavf: Driver Update (BZ#2102360) * iommu/vt-d: Make DMAR_UNITS_SUPPORTED a config setting (BZ#2112983) none-baseos-rpms bpftool-4.18.0-372.26.1.el8_6.aarch64.rpm 0783115b4d3d58f3a653f6bf231308cf485b89d81ba8740fcb52f64d80f1ab5f kernel-4.18.0-372.26.1.el8_6.aarch64.rpm ca29cd1e9069248a1f7e7afab83f094de17b17d8ec8294693605067cb7614477 kernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm b049506ca2f279ee9b9a7799a8db9b51a4eb2fa8adf9991318812d4bd9202f53 kernel-abi-stablelists-4.18.0-372.26.1.el8_6.noarch.rpm b049506ca2f279ee9b9a7799a8db9b51a4eb2fa8adf9991318812d4bd9202f53 kernel-core-4.18.0-372.26.1.el8_6.aarch64.rpm 61296b0da3482197039ed7e5e215975c156683591fd0703e7f379136034a77ef kernel-cross-headers-4.18.0-372.26.1.el8_6.aarch64.rpm 9271f84b65d009a58d43a636f5596f0ec0448275772c7423d8cc63c617579de5 kernel-debug-4.18.0-372.26.1.el8_6.aarch64.rpm 4adc8373dd17989f1ed99c21f0881838ae7766484cd80611fae2f0caaef5ece0 kernel-debug-core-4.18.0-372.26.1.el8_6.aarch64.rpm 216db0a1ee3e0be678f025e25dde6b590152bbc4c726159a4ddcccb6d3ce9830 kernel-debug-devel-4.18.0-372.26.1.el8_6.aarch64.rpm e62341922476d65e9c9ef6655b797b55b9835477111426843843790a251614a2 kernel-debuginfo-common-aarch64-4.18.0-372.26.1.el8_6.aarch64.rpm f19f54792182aa988d5c6959783789aa6a8f1ea166cb3d4857edc840563895c3 kernel-debug-modules-4.18.0-372.26.1.el8_6.aarch64.rpm 58ee1392ac61229113aebd14c0f8c9506e6088e3ef90f3854f7bc8c46ff86ba5 kernel-debug-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm bbc2c7c88b3459ae637c7a5e4d66670b7ef627ec3e1a220ee4693c9af5b0c6f6 kernel-devel-4.18.0-372.26.1.el8_6.aarch64.rpm 11e99d4ab6041e4ae371bdbf2221f2d5d6b0750ba87e48f93c1c35e7cc84f283 kernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm ea5b4449c556c60799ad95f87ec8e5a72bddbe2ae80c1f99139e0e98363df5ad kernel-doc-4.18.0-372.26.1.el8_6.noarch.rpm ea5b4449c556c60799ad95f87ec8e5a72bddbe2ae80c1f99139e0e98363df5ad kernel-headers-4.18.0-372.26.1.el8_6.aarch64.rpm 221466cb7a657a67bbbdaf095c01bf91c01d661f36f985a96626a93b5f638137 kernel-modules-4.18.0-372.26.1.el8_6.aarch64.rpm d9ec240e592ba6d94b4c96aead5306747f169ff1f30b83b0c2e48393ca06d483 kernel-modules-extra-4.18.0-372.26.1.el8_6.aarch64.rpm ecce9d8961ac45b2d4d9cadcb8014d60aacb876c138bee49a79027a081a0bebe kernel-tools-4.18.0-372.26.1.el8_6.aarch64.rpm d992e360ea420f58be8c46610d5896edeab4e1ca0f9fa317be0d1cb7b12ea7b7 kernel-tools-libs-4.18.0-372.26.1.el8_6.aarch64.rpm f0e1f4cf21856879091890cbca8ddf866dafa9d38e84e875a89b83b08a41176e perf-4.18.0-372.26.1.el8_6.aarch64.rpm 2459abe63dc9c4afc6a1b3099f9d5dc2c24df32b0da349f4d265ce07d046ec02 python3-perf-4.18.0-372.26.1.el8_6.aarch64.rpm f093e6f43dc3b1fd227d67505ef3600bc94db19f7ce1b7c3579191dbfc6027db RLBA-2022:6461 pam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Bug Fix(es) and Enhancement(s): * faillock command does not read faillock.conf option (BZ#2112889) none-baseos-rpms pam-1.3.1-16.el8_6.1.aarch64.rpm ffb9870bcac6ad08154b49923231eb14ac4c40883fdb9f74d77fab47bcfcd0f5 pam-devel-1.3.1-16.el8_6.1.aarch64.rpm c7f3a22f4977972c738a8f890e0c4303eb242c42c6f631d3296d95c6af5ec1a1 RLBA-2022:6462 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Bug Fix(es) and Enhancement(s): * testcases/pkcs11/gen_purpose.c:258) C_GetMechanismList 2 rc=CKR_BUFFER_TOO_SMALL seen when running the gen_purpose tests on mixed CEX7P/8P card openCryptoki setup (BZ#2114806) none-baseos-rpms opencryptoki-3.17.0-5.el8_6.aarch64.rpm 4ba30179e305478f946fdc476c4a57ce880332d3bfd413608b1cdcd7771a8970 opencryptoki-icsftok-3.17.0-5.el8_6.aarch64.rpm df8bb90f2e4905573aabf65ebaa3717888a27c068b640ac36a239ffe091c467d opencryptoki-libs-3.17.0-5.el8_6.aarch64.rpm 2bb692696983032eca4f168e13a9599629490d68a89703aaa3f679d23203b552 opencryptoki-swtok-3.17.0-5.el8_6.aarch64.rpm 3c0530332591767b3490f71b4ff889c95d91fc36abff58ef0bd8423ddf394c31 opencryptoki-tpmtok-3.17.0-5.el8_6.aarch64.rpm a65e68e3c2eb3bbe23a428221fb01ac29187477c6dbddc4c4b29e609c43b5aed RLBA-2022:6464 initscripts bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for initscripts. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The initscripts packages contain basic system scripts that boot the system, change runlevels, activate and deactivate most network interfaces, and shut down the system cleanly. Bug Fix(es) and Enhancement(s): * IPv6 Default gateway fail to be configured when interface have both IPv4 and IPv6 address - IPv4 brings iface up, then IPv6 initilalization set accept_ra = 0. Since interface was already up default route was added upon receiving Router A. (BZ#2118274) none-baseos-rpms initscripts-10.00.17-1.el8_6.2.aarch64.rpm f6438c8808b2e36fce3caf03979d846bd3d3dfbd7e178d595aed35797d4453e7 netconsole-service-10.00.17-1.el8_6.2.noarch.rpm 4abe188afc35de1f4feec02cd319f248d58b1beb7135d2177ab3fd0dda085e5b netconsole-service-10.00.17-1.el8_6.2.noarch.rpm 4abe188afc35de1f4feec02cd319f248d58b1beb7135d2177ab3fd0dda085e5b network-scripts-10.00.17-1.el8_6.2.aarch64.rpm ff08752078b9aa1dd3349c092eb6ab79ec936d7c6a4242257f6a674bb326a689 readonly-root-10.00.17-1.el8_6.2.noarch.rpm 1856d51cf591dea99b16090604fb17447d580d48ec6296b12dab95f6419524a7 readonly-root-10.00.17-1.el8_6.2.noarch.rpm 1856d51cf591dea99b16090604fb17447d580d48ec6296b12dab95f6419524a7 RLBA-2022:6465 libdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library providing simplified C and Python API to the libsolv package dependency solver. Bug Fix(es) and Enhancement(s): * Additional fix for Performing security update from Rocky Linux 8.5 to Rocky Linux 8.6 causes dependency errors. (BZ#2116945) none-baseos-rpms libdnf-0.63.0-8.2.el8_6.aarch64.rpm c924f559a1d1c3cbd08765c30828f3800f0c30c85a780a4552e683437ed0fd46 python3-hawkey-0.63.0-8.2.el8_6.aarch64.rpm 19fa3ef8320641b6aa8473a52af7902a2f0cc0a03c25c993fcf77c9f230a9dcc python3-libdnf-0.63.0-8.2.el8_6.aarch64.rpm dee2fa6f1242d1945033e732c4d5c88a1f8e468a004055466d8f51ada58cd0e2 RLBA-2022:6466 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * systemd leaks pipes when executing Type=exec services (BZ#2116892) * imsm raid device hangs during reboot after mdmon is stopped (BZ#2120608) none-baseos-rpms systemd-239-58.el8_6.7.aarch64.rpm 25bf48ce005bf6e11a832432c8d7a3cfba4e4c735020cb9030341ec5d4f9a4f2 systemd-container-239-58.el8_6.7.aarch64.rpm 502854b33e9e203e2d8e0a4b92099df89f09286e3e0da498fc23b52377ffb500 systemd-devel-239-58.el8_6.7.aarch64.rpm e3760330f39560a8b96a9ee59b034440e40ebf077190acc3fb14d9f4dbaf9d0e systemd-journal-remote-239-58.el8_6.7.aarch64.rpm 100db36c90fd12a5a3e937dd98a7aeedec31918d41669a79a7b2f4edec5dd9e8 systemd-libs-239-58.el8_6.7.aarch64.rpm e2392115e099cc7fd8c4c760ead2e2cdee1d046efd8434381db51353165e2246 systemd-pam-239-58.el8_6.7.aarch64.rpm e0b6e15cc38cc704dbc50edaa4d6529c968133c1925925508b5274e2e437495c systemd-tests-239-58.el8_6.7.aarch64.rpm 9d4584900040e4a7f198385834140f4fbb8caa7f55ac3dd329413ea6b7b7292d systemd-udev-239-58.el8_6.7.aarch64.rpm 3432a3c5e8c3e93cab803207411c07975f0fb3e704005cf65d2870bd2abaf027 RLSA-2022:6778 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) * bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.36-3.el8_6.1.aarch64.rpm b947b443fd9e0ef0c42ed0856588603625cbdd7e082d22afd8187adb8651ba73 bind-export-libs-9.11.36-3.el8_6.1.aarch64.rpm d014da7e26f0fb7286e722052b5eb44bd566444795796fb840e7ce13a425d2bc RLBA-2022:6827 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022d, which addresses recent time zone changes. Notably: * Palestine will transition to daylight saving time (DST) on October 29, 2022 instead of October 28, 2022. * Europe/Uzhgorod and Europe/Zaporozhye are moved to the 'backzone' file. none-baseos-rpms tzdata-2022d-1.el8.noarch.rpm 6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1 tzdata-2022d-1.el8.noarch.rpm 6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1 RLSA-2022:6878 Important: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-8.el8_6.3.aarch64.rpm a5bc95e074abac36da9d16dcb835d051977b971a8224e9ebd2a683a64bacd307 expat-devel-2.2.5-8.el8_6.3.aarch64.rpm ef73f127ac21d17caea464e9f76f57604674eb7ede241ce8f29efeea817d24ee RLBA-2022:7067 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably: * Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently. none-baseos-rpms tzdata-2022e-1.el8.noarch.rpm 553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c tzdata-2022e-1.el8.noarch.rpm 553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c RLBA-2022:7104 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * [NMCI] stable_mem_consumption2 test fails (BZ#2107161) * NetworkManager didn't automatically renew the lease on the VLAN interface configured using nmstate (BZ#2109411) * NetworkManager does not update /var/run/NetworkManager/resolv.conf (BZ#2130417) none-baseos-rpms NetworkManager-1.36.0-9.el8_6.aarch64.rpm e1e69ea1b30a5e081799310b6491bd073ae4dfe66139bfb2c9ac9d74ad10ca9a NetworkManager-adsl-1.36.0-9.el8_6.aarch64.rpm f4cb7fe90d5f1c3cab291e6cfdcb2f4702cb8ddac913d8ddb155a2a40f936c64 NetworkManager-bluetooth-1.36.0-9.el8_6.aarch64.rpm 8afeb6091eb46e5f17acdd73e6d3a4da2dbeaa7bc2a78f53685c5d36fc5036bb NetworkManager-config-connectivity-redhat-1.36.0-9.el8_6.noarch.rpm 14d11f08b81fce0df4a8cf602c12a2c385aff0353626b0995d5b0be638baf1a3 NetworkManager-config-connectivity-redhat-1.36.0-9.el8_6.noarch.rpm 14d11f08b81fce0df4a8cf602c12a2c385aff0353626b0995d5b0be638baf1a3 NetworkManager-config-server-1.36.0-9.el8_6.noarch.rpm 09a09da9e37c59dd7ee1b35001b5e1c27c655bf751ac1295d39253405a8a771e NetworkManager-config-server-1.36.0-9.el8_6.noarch.rpm 09a09da9e37c59dd7ee1b35001b5e1c27c655bf751ac1295d39253405a8a771e NetworkManager-dispatcher-routing-rules-1.36.0-9.el8_6.noarch.rpm 4be1b22cf8add267ab4525292f13cd9daa34a565f8582a624c82cde016651d86 NetworkManager-dispatcher-routing-rules-1.36.0-9.el8_6.noarch.rpm 4be1b22cf8add267ab4525292f13cd9daa34a565f8582a624c82cde016651d86 NetworkManager-initscripts-updown-1.36.0-9.el8_6.noarch.rpm ace840b348a1be52762d3971f1c08824aeaa218e20563a826a89e4c4aa04235d NetworkManager-initscripts-updown-1.36.0-9.el8_6.noarch.rpm ace840b348a1be52762d3971f1c08824aeaa218e20563a826a89e4c4aa04235d NetworkManager-libnm-1.36.0-9.el8_6.aarch64.rpm 7b09e99e8c5a7827aa4bf58bcf775f72e73be31b2286a10d67cc55b689e7667f NetworkManager-ovs-1.36.0-9.el8_6.aarch64.rpm edfc8175f2abc3f39277939ea4e186595f1e1309f8e3724253d91a2fde1317ca NetworkManager-ppp-1.36.0-9.el8_6.aarch64.rpm 95dab63ae6a4e11b4603d33d5ed82eb48984503ef984e37f244ba8dd99a4c483 NetworkManager-team-1.36.0-9.el8_6.aarch64.rpm 91b169efb358e9aac5fa57eccbdd791b24836aa850685b1ed82842f6f77b60b5 NetworkManager-tui-1.36.0-9.el8_6.aarch64.rpm d43eddf0a3d9b9843ea36f516bd4fb2ee916331451178599ecca05eb3e5646ce NetworkManager-wifi-1.36.0-9.el8_6.aarch64.rpm 566024af8433a84528665aa50aad0986a9b621e766f52a8dd2eca3c836ee7b89 NetworkManager-wwan-1.36.0-9.el8_6.aarch64.rpm ba059c1c79c587f3d07ef331d7676e011e91c948327529a89362bf2014497458 RLSA-2022:7111 Moderate: samba security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: server memory information leak via SMB1 (CVE-2022-32742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * python3-samba requires samba and that is a bug (BZ#2126041) none-baseos-rpms ctdb-4.15.5-10.el8_6.aarch64.rpm 767f1d69772ba33eab56aacdb8fae59e24b6e6079bcb5036ed18298abc1071f1 libsmbclient-4.15.5-10.el8_6.aarch64.rpm c414c2e6a02975020e93148515a9147dab5295cef4489e958282f9669438bc2c libwbclient-4.15.5-10.el8_6.aarch64.rpm bbe1a01d76f2ef4d95905a76dd12e4e9cad4f871d1703863d8363df30053afb4 python3-samba-4.15.5-10.el8_6.aarch64.rpm 61d5b285422f4520f4878b54e487bdbf38fbd69770f0dd9bd3a15bf7a271ad88 python3-samba-test-4.15.5-10.el8_6.aarch64.rpm c4044754c63a0353f392594cb4b215c4af15b9b7c3b84d9cbebba38f993ab96b samba-4.15.5-10.el8_6.aarch64.rpm 3a5a5d4480eb613c2c70e65c46f573b6ed154935c1bb3e547c86a25728bfd63f samba-client-4.15.5-10.el8_6.aarch64.rpm a8a0ec2f9029a462e8ece0f3b3133e1c1ab6fa5d0c2d575db617e35ef0c002d8 samba-client-libs-4.15.5-10.el8_6.aarch64.rpm 89dc151c87f7560bb6253868046ddded2865172e338d547f05bc16349b95a21b samba-common-4.15.5-10.el8_6.noarch.rpm b5225fc0c75a66a52e2edd23a72a2b4bb27a045aa651bdd5581e9e68abed2abe samba-common-4.15.5-10.el8_6.noarch.rpm b5225fc0c75a66a52e2edd23a72a2b4bb27a045aa651bdd5581e9e68abed2abe samba-common-libs-4.15.5-10.el8_6.aarch64.rpm 506f4f0069047848438eb50c4b4905b16c21ac0b420f66a176e28c7172156446 samba-common-tools-4.15.5-10.el8_6.aarch64.rpm e59316bd90df95838a60ed411f7e5a505f86446bd7e1f1a2a7462b7c09ec871b samba-krb5-printing-4.15.5-10.el8_6.aarch64.rpm 16ebd10e2f9a6f49c3f80bf8e1caf03383619bce7554f8154a687736936ef907 samba-libs-4.15.5-10.el8_6.aarch64.rpm 1f2f5a297bc36c053dbb008eb28e01e6ebddace02c7890b93fa62dd14729a394 samba-pidl-4.15.5-10.el8_6.noarch.rpm 394edb47ab7dec9f02df85812818cce064af58a2efbbc37dd00a9967ae8e65f4 samba-pidl-4.15.5-10.el8_6.noarch.rpm 394edb47ab7dec9f02df85812818cce064af58a2efbbc37dd00a9967ae8e65f4 samba-test-4.15.5-10.el8_6.aarch64.rpm 58d89ccd6b0a4dbcf97e581f068382944ed8b4f66fd8f62e3e12b6cfbedf11b3 samba-test-libs-4.15.5-10.el8_6.aarch64.rpm b17848e497b9979ba81720a7fe6263964653a6456d667e9b82ca0cedddf630ae samba-winbind-4.15.5-10.el8_6.aarch64.rpm 485e585537714e5850e7afd38de1bacd8296ed8326e6d2b71fe68925e4788823 samba-winbind-clients-4.15.5-10.el8_6.aarch64.rpm b70f13c18617d34c4edac8168ea844182e9d7f1902d09a556d8e9959ff731352 samba-winbind-krb5-locator-4.15.5-10.el8_6.aarch64.rpm 7a0734403be41385989a6a616d18753364fbcb99e8fa77a909b6eb901394921c samba-winbind-modules-4.15.5-10.el8_6.aarch64.rpm f179d7cc69c3f5328c4ec5b0b141fd1c4dcb64a02f0f73072bb215102272cc22 RLSA-2022:7106 Moderate: zlib security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for zlib. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zlib packages provide a general-purpose lossless data compression library that is used by many different programs. Security Fix(es): * zlib: a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field (CVE-2022-37434) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms zlib-1.2.11-19.el8_6.aarch64.rpm 06b13e3c24bfe4242d4f1bd31a9590cef9b32ae47fd4b78338b0059843544ae3 zlib-devel-1.2.11-19.el8_6.aarch64.rpm 3eb6a7572d5170120a9683281e86b1c2e3b62691238438b395b8cd406278de0a RLBA-2022:7109 linux-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es) and Enhancement(s): * [Marvell 8.7 FEAT] qed - firmware update (BZ#2121415) none-baseos-rpms iwl1000-firmware-39.31.5.1-108.el8_6.1.noarch.rpm 57b5588ad8555e3425a8a6af759dedac912c2bd3c37a3673a2ba64499f9dbc18 iwl1000-firmware-39.31.5.1-108.el8_6.1.noarch.rpm 57b5588ad8555e3425a8a6af759dedac912c2bd3c37a3673a2ba64499f9dbc18 iwl100-firmware-39.31.5.1-108.el8_6.1.noarch.rpm ed963196c89fb65c86ab99c3de3952e9405ff5ebbf205f4e4d08b72d18f5d086 iwl100-firmware-39.31.5.1-108.el8_6.1.noarch.rpm ed963196c89fb65c86ab99c3de3952e9405ff5ebbf205f4e4d08b72d18f5d086 iwl105-firmware-18.168.6.1-108.el8_6.1.noarch.rpm dc1bc26d92d552baad8bcf7240bf393e8023dbc801d154d440096f98f37b9bf9 iwl105-firmware-18.168.6.1-108.el8_6.1.noarch.rpm dc1bc26d92d552baad8bcf7240bf393e8023dbc801d154d440096f98f37b9bf9 iwl135-firmware-18.168.6.1-108.el8_6.1.noarch.rpm 9516323235639babd272ff5a1881c7e763bfa5d7a3e8125ecb507b353b368256 iwl135-firmware-18.168.6.1-108.el8_6.1.noarch.rpm 9516323235639babd272ff5a1881c7e763bfa5d7a3e8125ecb507b353b368256 iwl2000-firmware-18.168.6.1-108.el8_6.1.noarch.rpm bb03690f60a56102980fcbe6fd7de3a93d8001744f052e94e1d9794ff336d487 iwl2000-firmware-18.168.6.1-108.el8_6.1.noarch.rpm bb03690f60a56102980fcbe6fd7de3a93d8001744f052e94e1d9794ff336d487 iwl2030-firmware-18.168.6.1-108.el8_6.1.noarch.rpm 13072fee233b4f39ca621ddaf3c3b38dfdc0c144e4c63470e4c475272fb3d22a iwl2030-firmware-18.168.6.1-108.el8_6.1.noarch.rpm 13072fee233b4f39ca621ddaf3c3b38dfdc0c144e4c63470e4c475272fb3d22a iwl3160-firmware-25.30.13.0-108.el8_6.1.noarch.rpm 0e0b9442e3311d7d8642ede764486664db50fa249e1f5a7372552ccbbc3ffc99 iwl3160-firmware-25.30.13.0-108.el8_6.1.noarch.rpm 0e0b9442e3311d7d8642ede764486664db50fa249e1f5a7372552ccbbc3ffc99 iwl3945-firmware-15.32.2.9-108.el8_6.1.noarch.rpm 9bc0dacb1160649f7d7164f977c2d945a0a3792515a334911840b80d89e5df74 iwl3945-firmware-15.32.2.9-108.el8_6.1.noarch.rpm 9bc0dacb1160649f7d7164f977c2d945a0a3792515a334911840b80d89e5df74 iwl4965-firmware-228.61.2.24-108.el8_6.1.noarch.rpm cce0c2286afbfcce843c36f58acffd573aceefc0e38db0fd08fffaa0f11ed7d6 iwl4965-firmware-228.61.2.24-108.el8_6.1.noarch.rpm cce0c2286afbfcce843c36f58acffd573aceefc0e38db0fd08fffaa0f11ed7d6 iwl5000-firmware-8.83.5.1_1-108.el8_6.1.noarch.rpm 8b4c5f05fea404289f565e36b8f4899f33cc3c2738fbedd501d00b0d6679ac3b iwl5000-firmware-8.83.5.1_1-108.el8_6.1.noarch.rpm 8b4c5f05fea404289f565e36b8f4899f33cc3c2738fbedd501d00b0d6679ac3b iwl5150-firmware-8.24.2.2-108.el8_6.1.noarch.rpm 5bc12319ee76bd70506ffc1fd2d35c6847000383cc0788a0362afb90e73bee58 iwl5150-firmware-8.24.2.2-108.el8_6.1.noarch.rpm 5bc12319ee76bd70506ffc1fd2d35c6847000383cc0788a0362afb90e73bee58 iwl6000-firmware-9.221.4.1-108.el8_6.1.noarch.rpm ccff5daa832158fcd8ab6813d3370925714092aae2f84e4ffef4aa6816eed069 iwl6000-firmware-9.221.4.1-108.el8_6.1.noarch.rpm ccff5daa832158fcd8ab6813d3370925714092aae2f84e4ffef4aa6816eed069 iwl6000g2a-firmware-18.168.6.1-108.el8_6.1.noarch.rpm b0baec60c0f3fbdebb4e98ad1cbc2ab5d5e91157227e4032cecf2b466c8ef653 iwl6000g2a-firmware-18.168.6.1-108.el8_6.1.noarch.rpm b0baec60c0f3fbdebb4e98ad1cbc2ab5d5e91157227e4032cecf2b466c8ef653 iwl6000g2b-firmware-18.168.6.1-108.el8_6.1.noarch.rpm 298d1bd448814e6e036c36c2436e6d9b7023455f65ccef08705023512cd8fe29 iwl6000g2b-firmware-18.168.6.1-108.el8_6.1.noarch.rpm 298d1bd448814e6e036c36c2436e6d9b7023455f65ccef08705023512cd8fe29 iwl6050-firmware-41.28.5.1-108.el8_6.1.noarch.rpm 9b570c09ec258a99209d6ebbcc7540951cffc2f70a72cb92a016732ef9cb73e0 iwl6050-firmware-41.28.5.1-108.el8_6.1.noarch.rpm 9b570c09ec258a99209d6ebbcc7540951cffc2f70a72cb92a016732ef9cb73e0 iwl7260-firmware-25.30.13.0-108.el8_6.1.noarch.rpm 3a59383d8380f4505388744435c8b299a94bbb6430afd914b86b77bff6166e59 iwl7260-firmware-25.30.13.0-108.el8_6.1.noarch.rpm 3a59383d8380f4505388744435c8b299a94bbb6430afd914b86b77bff6166e59 libertas-sd8686-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 1a742befb2582f43cc720ce4630ac41925c29b3d47f12cf499e69f3755501a09 libertas-sd8686-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 1a742befb2582f43cc720ce4630ac41925c29b3d47f12cf499e69f3755501a09 libertas-sd8787-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 16068fd769c48c018bbe63a65575a69de56cc7857daa37a1058b7ab2de883b0e libertas-sd8787-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 16068fd769c48c018bbe63a65575a69de56cc7857daa37a1058b7ab2de883b0e libertas-usb8388-firmware-20220210-108.git6342082c.el8_6.noarch.rpm e52b9b85a24d083b6b691cd5c607cd8e20c882e998d75dcb8f978eb02d22491f libertas-usb8388-firmware-20220210-108.git6342082c.el8_6.noarch.rpm e52b9b85a24d083b6b691cd5c607cd8e20c882e998d75dcb8f978eb02d22491f libertas-usb8388-olpc-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 27736b2e49e2892fde9d372b34c7191b1fc50737727e333f223bbe59e5a06a4d libertas-usb8388-olpc-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 27736b2e49e2892fde9d372b34c7191b1fc50737727e333f223bbe59e5a06a4d linux-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 81e82045ef499606a99de2efa79b50adb5379f1a5500242c81ebf9363f92d894 linux-firmware-20220210-108.git6342082c.el8_6.noarch.rpm 81e82045ef499606a99de2efa79b50adb5379f1a5500242c81ebf9363f92d894 RLSA-2022:7110 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588) * Information leak in scsi_ioctl() (CVE-2022-0494) * A kernel-info-leak issue in pfkey_register (CVE-2022-1353) * RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) * Branch Type Confusion (non-retbleed) (CVE-2022-23825) * RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Add s390_iommu_aperture kernel parameter (BZ#2081324) * Blackscreen and hangup after resume from hibernate or S3 with DFGX WX3200 (BZ#2091065) * Update NVME subsystem with bug fixes and minor changes (BZ#2106017) * Fix parsing of nw_proto for IPv6 fragments (BZ#2106703) * "vmcore failed, _exitcode:139" error observed while capturing vmcore during fadump after memory remove. incomplete vmcore is captured. (BZ#2107488) * 'disable_policy' is ignored for addresses configured on a down interface (BZ#2109971) * Backport request for new cpufreq.default_governor kernel command line parameter (BZ#2109996) * Panics in mpt3sas mpt3sas_halt_firmware() if mpt3sas_fwfault_debug=1 enabled when poweroff issued to server (BZ#2111140) * IOMMU/DMA update for 8.7 (BZ#2111692) * Update Broadcom Emulex lpfc driver for Rocky Linux8.7 with bug fixes (14.0.0.13) (BZ#2112103) * Incorrect Socket(s) & "Core(s) per socket" reported by lscpu command. (BZ#2112820) * Panic in ch_release() due to NULL ch->device pointer, backport upstream fix (BZ#2115965) * pyverbs-tests fail over qede IW HCAs on "test_query_rc_qp" (tests.test_qp.QPTest) (BZ#2119122) * qedi shutdown handler hangs upon reboot (BZ#2119847) * cache link_info for ethtool (BZ#2120197) * Important iavf bug fixes (BZ#2120225) * Hibernate crash with Aquantia 2.5/5 Gb LAN card (BZ#2124966) * While using PTimekeeper the qede driver produces excessive log messages (BZ#2125477) * general protection fault handling rpc_xprt.timer (BZ#2126184) * Not enough device MSI-X vectors (BZ#2126482) * Atlantic driver panic on wakeup after hybernate (BZ#2127845) * Memory leak in vxlan_xmit_one (BZ#2131255) * Missing hybernate/resume fixes (BZ#2131936) Enhancement(s): * Update smartpqi driver to latest upstream Second Set of Patches (BZ#2112354) * qed/qede/qedr - driver updates to latest upstream (BZ#2120611) * Update qedi driver to latest upstream (BZ#2120612) * Update qedf driver to latest upstream (BZ#2120613) * Include the support for new NVIDIA Mobile GFX GA103 on ADL Gen Laptops (BZ#2127122) * Need to enable hpilo to support new HPE RL300 Gen11 for ARM (aarch64) (BZ#2129923) none-baseos-rpms bpftool-4.18.0-372.32.1.el8_6.aarch64.rpm cd70f961e2d544281797602977ca846381b4e6c361cbf018ed473ce9e2eed411 kernel-4.18.0-372.32.1.el8_6.aarch64.rpm 4bb57cb0ea58847101026f0d96626770363b9754291fa2f7f9e57bcc0f6ea3ac kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm 3ae344f3c9f6ad791d0f3a6e1abcaa9941a55b3cf80600f486de061558eb6172 kernel-abi-stablelists-4.18.0-372.32.1.el8_6.noarch.rpm 3ae344f3c9f6ad791d0f3a6e1abcaa9941a55b3cf80600f486de061558eb6172 kernel-core-4.18.0-372.32.1.el8_6.aarch64.rpm b92c9051f48872cd9e912f000ab0dc8bfe352df97d1d39b2d7b1c5f634b4a863 kernel-cross-headers-4.18.0-372.32.1.el8_6.aarch64.rpm 7c686a558569bb692355009717bb4a9bb48dc55ce1d7fc34ec29fb10e9d6545c kernel-debug-4.18.0-372.32.1.el8_6.aarch64.rpm 57c95be4464ac0788e8f8369013a63522d01dae99afdaf123ab3326ac9b34f18 kernel-debug-core-4.18.0-372.32.1.el8_6.aarch64.rpm 2ed7016bbf11f53e124a159b4b568b69efd7e8ac7a55aa49113fd2757674d679 kernel-debug-devel-4.18.0-372.32.1.el8_6.aarch64.rpm f5d4b67e8a469571d300170708238a2917aacac0ef405f3322a91f83f42ded2c kernel-debuginfo-common-aarch64-4.18.0-372.32.1.el8_6.aarch64.rpm 7fd06b6d3106935af7b6c39ef9bbc29a179384c55dfa67e2fe2fd32ae849138e kernel-debug-modules-4.18.0-372.32.1.el8_6.aarch64.rpm b40bd2ecb070dfe5fd062d1492e91bf6040de7e0bf6c19c1009614e2834cee13 kernel-debug-modules-extra-4.18.0-372.32.1.el8_6.aarch64.rpm 9bcc5a692f4268c63601bba645cd0eafd73b64dff8500dabffd8d2bafc7fcc2f kernel-devel-4.18.0-372.32.1.el8_6.aarch64.rpm adc2859cf0c59e5875e260598eff1b0390e95685bdf7bab50f56b45e3e0ac843 kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm 2b05e4c5decb4e624aa0f39ace257684ada8f9cee1306f4d98f36c4aea75b54f kernel-doc-4.18.0-372.32.1.el8_6.noarch.rpm 2b05e4c5decb4e624aa0f39ace257684ada8f9cee1306f4d98f36c4aea75b54f kernel-headers-4.18.0-372.32.1.el8_6.aarch64.rpm d16e0f7f33597f21b7491e07e227d9021e0165d1fa5c1e333be275e308ee5cef kernel-modules-4.18.0-372.32.1.el8_6.aarch64.rpm fa1e379c29b7a70da0348bc419067fb9cb53dfc0c8010f74fd73dbf926495b0d kernel-modules-extra-4.18.0-372.32.1.el8_6.aarch64.rpm fce50579cf40b73147885b51f8531e128685909a56f14007f6fb1e447fe3197d kernel-tools-4.18.0-372.32.1.el8_6.aarch64.rpm a6196d85be6812dab717efee820c6af57d41893147c9aab55f22709ed42e899f kernel-tools-libs-4.18.0-372.32.1.el8_6.aarch64.rpm 3ffb40c3cbec35982cb304ae6d3b47cb5698d30a2586b42167d0de5ece1199fd perf-4.18.0-372.32.1.el8_6.aarch64.rpm 769e3de0bde0319b8b7f0e80a0971298ead2a62545117c853f7b21d5f9419f6e python3-perf-4.18.0-372.32.1.el8_6.aarch64.rpm 9e3d2db5e2da8e74129dba9b670d6b3f1d532b7a8cd202f48f25688f7d4031e4 RLBA-2022:7112 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * vdsm plugin does not collect LVM information of RHV SDs if the host uses LVM devices. (BZ#2121774) * Default plugin timeout doesn't works if block devices count up to 10K. (BZ#2125656) * Add convert2Rocky Linux archived log collection. (BZ#2129105) none-baseos-rpms sos-4.2-22.el8_6.noarch.rpm 442a91a0c6e9911fd6969290216e2bc27fee26f5a49ed6d83a4b57a1ce1bb4ff sos-4.2-22.el8_6.noarch.rpm 442a91a0c6e9911fd6969290216e2bc27fee26f5a49ed6d83a4b57a1ce1bb4ff sos-audit-4.2-22.el8_6.noarch.rpm 9fe20eb5e1e34f4a2dca155f29116bdf601524099bd39b175d6fdb9c16e60301 sos-audit-4.2-22.el8_6.noarch.rpm 9fe20eb5e1e34f4a2dca155f29116bdf601524099bd39b175d6fdb9c16e60301 RLBA-2022:7113 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Bug Fix(es) and Enhancement(s): * Login fails with "This web browser is too old" with upcoming Firefox and Chromium browsers (BZ#2129055) * Cockpit locking out users with strict password policies (BZ#2129058) none-baseos-rpms cockpit-264.2-1.el8_6.aarch64.rpm ce25d758711b62a97154cf1ad49da68a0a3584ada8407e3d5cba3d2db64db8af cockpit-bridge-264.2-1.el8_6.aarch64.rpm 15ec0b447c7744c589db9edbce8638b3d914fbb671f0f556808cada7794aca2c cockpit-doc-264.2-1.el8_6.noarch.rpm df1b868886f1c8b708ee9a322ce20659d1c0542272f73995f8a617910cbca1b9 cockpit-doc-264.2-1.el8_6.noarch.rpm df1b868886f1c8b708ee9a322ce20659d1c0542272f73995f8a617910cbca1b9 cockpit-system-264.2-1.el8_6.noarch.rpm 238228edf42e2ad0636ceb84f9249583e1e16413a1c1d2f18846c2238233adc3 cockpit-system-264.2-1.el8_6.noarch.rpm 238228edf42e2ad0636ceb84f9249583e1e16413a1c1d2f18846c2238233adc3 cockpit-ws-264.2-1.el8_6.aarch64.rpm 96e3868ea97492819d6c90404e37db3f600cf0dcb0be5d04f5a7d23abee6d4ee RLBA-2022:7114 systemd update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es) and Enhancement(s): * longer mount points cause systemd invalid argument messages (BZ#2094712) * systemd path unit fails when triggered unit conditions not met (BZ#2123801) * ShutdownWatchdogSec value is not taken into account on reboot (BZ#2127171) none-baseos-rpms systemd-239-58.el8_6.8.aarch64.rpm 0f2808f320feb02ba1b33f38b2191ffa027c15e632dd8bb4eccf8732e617f1bd systemd-container-239-58.el8_6.8.aarch64.rpm 6297574247d4e309487c113dcf9e57e9e112fd28b94fa2c7b84fa7f4adfa9b2d systemd-devel-239-58.el8_6.8.aarch64.rpm 7c6d0d69a0f3ec31b267699acdbfedb05aade3de9c90860f744130078465a2d3 systemd-journal-remote-239-58.el8_6.8.aarch64.rpm ffc745170d59da8dca2f7211f1f796dd0b4d0574042f5d546e16b430a9823a80 systemd-libs-239-58.el8_6.8.aarch64.rpm 30257c6fd3e885b551c56080a8bdf98dc12b87ce4eed27e636ea1ed2a01049b5 systemd-pam-239-58.el8_6.8.aarch64.rpm 4dccc54716e8ad08fa1c396c8a5fd4aa5b7fbbe22216354ba4406cf52ad6d91d systemd-tests-239-58.el8_6.8.aarch64.rpm 40740dd21deddc137c0e33428214d61e80b0a9f0c32afa433a5f62ec652a1123 systemd-udev-239-58.el8_6.8.aarch64.rpm 6d597d8e71e24d4b35553234c35bfad40073e0500044b766d49b52a8fd716330 RLSA-2022:7192 Important: device-mapper-multipath security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Security Fix(es): * device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms device-mapper-multipath-0.8.4-22.el8_6.2.aarch64.rpm 17f8a9db049add35a4eaa225b4b00eab60cd87ffe7f22f63f0a915c15e8cfbb9 device-mapper-multipath-libs-0.8.4-22.el8_6.2.aarch64.rpm 36a2d9852e0fe49f0d15ca75b6891268d159df292bac43516dc781b35b4c5828 kpartx-0.8.4-22.el8_6.2.aarch64.rpm e6e19d2b030ac5a90d3ea11fc2adbcf2825353fea535428316ba77cba8b973fd libdmmp-0.8.4-22.el8_6.2.aarch64.rpm d06738b70d25c9b9201089d9395f98b4a2d90e74265509950b836909966f5021 RLEA-2022:7690 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms tzdata-2022d-1.el8.noarch.rpm 6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1 tzdata-2022d-1.el8.noarch.rpm 6680de16e81ad6c87c848c5b04ee5b342503f1c7267cebc662d19dc5ec6c99f1 RLBA-2022:7824 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably: * Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently. none-baseos-rpms tzdata-2022e-1.el8.noarch.rpm 553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c tzdata-2022e-1.el8.noarch.rpm 553f0c1bf2c66a9fb1567c723f9d48c1f10b842aec6927c4e04757bba20f888c RLBA-2020:4499 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for network-manager-applet. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms jimtcl-0.77-6.el8.1.aarch64.rpm 87d714e47cc7fa5195d68974ad1027f044ea098f0c6210d9634653044272a833 RLBA-2019:1957 python3 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * urlsplit doesn't accept a NFKD hostname with a port number (BZ#1714756) none-baseos-rpms platform-python-3.6.8-48.el8_7.rocky.0.aarch64.rpm 2cbdc696809c998a98df3588174a4867bbff5dab2aee3ed2f04582adfcf3bf58 python3-libs-3.6.8-48.el8_7.rocky.0.aarch64.rpm 0911260fb7e4c19d0f7950da395e71ce080aa134bbe2eb92161817f75e604ee2 python3-test-3.6.8-48.el8_7.rocky.0.aarch64.rpm 68e6b32bb1f0cbbadfeb68b215ac93969b8bd724869e6518484bf69649fd62ca RLBA-2019:3596 hwdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 hwdata-0.314-8.14.el8.noarch.rpm f5c166acc52db9ae9836178b01bfb72aa33fac6c2d6f23debcee7d4f5159a343 RLBA-2019:3628 xfsprogs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms xfsprogs-5.0.0-10.el8.aarch64.rpm dab31500b020c6b5caf69b5d6b8fdff9637e4cc84ce5a13464c38a12cadc55c4 xfsprogs-devel-5.0.0-10.el8.aarch64.rpm d2a76cb9bde3a18aad91add45c3411e30954ff49475b0046540d952d81ddcd08 RLBA-2020:4435 abrt bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gnome-abrt, abrt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.3 Release Notes linked from the References section. none-baseos-rpms libreport-filesystem-2.9.5-15.el8.rocky.6.3.aarch64.rpm 4695adc6d30e666d097155de8a950ddee663626f3486b1fc6e00c7f5e7f12117 RLEA-2020:4552 atlas bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for atlas. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Enterprise Software Foundation Enterprise Linux 8.3 Release Notes linked from the References section. none-baseos-rpms atlas-3.10.3-8.el8.1.aarch64.rpm 3281c1ad7e4b864147e913413f4e37389e5bd9100803f9049b0c2d9f9062d223 atlas-devel-3.10.3-8.el8.1.aarch64.rpm ca99f99c3a72acd833e7e944073102a5b644ea0a84a39d5435e49297529779c6 RLBA-2022:2006 python-pip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section. none-baseos-rpms platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm 4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951 platform-python-pip-9.0.3-22.el8.rocky.0.noarch.rpm 4dc82e21beb0c285c4a765dfe48f5df6d8ee15c38bb4d0cda37cc826a2c7e951 python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1 python3-pip-wheel-9.0.3-22.el8.rocky.0.noarch.rpm b2beb19f4cc4a7865bcc4394b24994f53c675d14865ad39bcf2bcb3ca67a2ad1 RLBA-2022:7726 grub2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm 6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6 grub2-common-2.02-142.el8.rocky.0.2.noarch.rpm 6175338b02c00922aae1c9241c84ea5c71cd59bb24bec6dd84981f9f6143f9e6 grub2-efi-aa64-2.02-142.el8.rocky.0.2.aarch64.rpm 44921fce9c4c369c8e24c35c668a99a642d4bf43632b287e0a61b72bc17a9a97 grub2-efi-aa64-cdboot-2.02-142.el8.rocky.0.2.aarch64.rpm c4fd913a470902d33a14e93c6b9b993066486fec80878628dd06b6b63d69f215 grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75 grub2-efi-aa64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 3963bf6faa29aaea861bc1a256d0423698ba885faee100d9dc9b6037dc296a75 grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c grub2-efi-ia32-modules-2.02-142.el8.rocky.0.2.noarch.rpm b986ac569ebe723ae5bab0de5a3779a30f27752791db7cedcf71be257016768c grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025 grub2-efi-x64-modules-2.02-142.el8.rocky.0.2.noarch.rpm 0a51865aec1df2804e25f67978bbdd93278cd4f94641afe8304e0c948373d025 grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6 grub2-pc-modules-2.02-142.el8.rocky.0.2.noarch.rpm c2374cad2069df6c2fbf3fe92b892c9bd04ebab2f8794cd38c2827b3b9c71ce6 grub2-tools-2.02-142.el8.rocky.0.2.aarch64.rpm bfde4af1e96ce6dc24979c4dd2dffb40a4ac37444dc802a30305b0cdc21153c5 grub2-tools-extra-2.02-142.el8.rocky.0.2.aarch64.rpm f3eb57e7ba3a08f6d7a2ec80bbd09b2a38d1eb1f5903564990184cee441d8cfc grub2-tools-minimal-2.02-142.el8.rocky.0.2.aarch64.rpm 77c6568b7ab29c608f88d10e8123377c10f8deb19bf44543de42a53f77ec6f20 RLBA-2022:7739 sssd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm f6ca2b24f0094be6e8d8f1bb1400989c7bb09ceada8343d4e81294bc404a8278 libsss_autofs-2.7.3-4.el8_7.1.aarch64.rpm 8988f55f5f17c81049b97f280d8745f88491bf9a82e83465028c90ca89125d15 libsss_certmap-2.7.3-4.el8_7.1.aarch64.rpm a9454aaa161abdac527c120ddc2e4c08a80407004f4eb7697afff9b7f1b3b452 libsss_idmap-2.7.3-4.el8_7.1.aarch64.rpm a1ee51f3874cf52d1c9d5bc4d6b17afd98bfc779220d856a483876f543cdd41f libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm f5f688cdbc09bfb23fb13b086113df23d3977676ad1c6af2828c03040cbab3d5 libsss_simpleifp-2.7.3-4.el8_7.1.aarch64.rpm ee7a2cf5e9f157944b7c6f710f4b3555ddba1b164aa2cba35a49a0be992a0a0c libsss_sudo-2.7.3-4.el8_7.1.aarch64.rpm 38b1770a78bbfcc1e3dceb89b0c84c1e60d339f235189881bd46214749c03a6d python3-libipa_hbac-2.7.3-4.el8_7.1.aarch64.rpm 0256a0d370205f1342febe2316bc8374f106d55336a34ee22a71f9b91d91486a python3-libsss_nss_idmap-2.7.3-4.el8_7.1.aarch64.rpm 6d5ca0b568fee971d5ba0e228e00f710bd4f02480b71503c7989856707e9b40d python3-sss-2.7.3-4.el8_7.1.aarch64.rpm b2075424a1ae98c819326d6ca212bafa6d4de2fb0071d8f6aade9a52917fe04d python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sssdconfig-2.7.3-4.el8_7.1.noarch.rpm 6811985d5a4f6967f90b2d5c11d3ffaa45bc03c2dea771e06c1377e77078772c python3-sss-murmur-2.7.3-4.el8_7.1.aarch64.rpm e4589d466fe5b91f31af1133764d188b9ac7dec579e896efbeedc81f4f160055 sssd-2.7.3-4.el8_7.1.aarch64.rpm 53b9778e7f74b30592a792ee307223c152ae8b54a781983e43df0396b755a24d sssd-ad-2.7.3-4.el8_7.1.aarch64.rpm e1f9df087cb16869a4802174b5bcc8e4a1d078e1f1705c119fd3e96bbbba0d09 sssd-client-2.7.3-4.el8_7.1.aarch64.rpm 41549ade31322026fa9727f97616ce6d6d97060e22d7aa6313a2f0ccfb574de5 sssd-common-2.7.3-4.el8_7.1.aarch64.rpm 901e447910ccd0a2de3b87b6c214f0d59e90af84a9f509c05d2d2c1e2846d50d sssd-common-pac-2.7.3-4.el8_7.1.aarch64.rpm 3ae9235f551fa5b3a60f3402bc45adbfd0cf25f3446b4b8b1a773c2414fb20db sssd-dbus-2.7.3-4.el8_7.1.aarch64.rpm 6fdf3e565cc091c308b5e9c93ead29304999c2daa293eafbe3191e770b30568c sssd-ipa-2.7.3-4.el8_7.1.aarch64.rpm 97c0610f3d7b7ba7ecfa9f9f235abac8c1dcf207ba14d42b242083c2deb0c3c7 sssd-kcm-2.7.3-4.el8_7.1.aarch64.rpm f14e314cdf3c8219686dcb63fecb701fb908243c3f11f39b17233a55cb2b8877 sssd-krb5-2.7.3-4.el8_7.1.aarch64.rpm 183067a7111c75c935f6f1a3169ad498b3f56cad2b34f8fde63e06c67d5c0743 sssd-krb5-common-2.7.3-4.el8_7.1.aarch64.rpm a0b2344f398c259b58a689c41a05090e0f6fd0c441228eaca08bc03ba967f6c0 sssd-ldap-2.7.3-4.el8_7.1.aarch64.rpm 71d6b994645253eaba4e6566a2fb3938dd072d2a3d3b250c58b27b56ce5cf368 sssd-nfs-idmap-2.7.3-4.el8_7.1.aarch64.rpm 3122023820615f39f71aa8cab46fb0d366877c9a8b2674c54847b0ccf024a710 sssd-polkit-rules-2.7.3-4.el8_7.1.aarch64.rpm 4e39328478a67acc3d3df1ed01729c8ad3f643866057cd43e72657dc6cc157f5 sssd-proxy-2.7.3-4.el8_7.1.aarch64.rpm 97a736d8a1b73b1b5d25d357256e787a227177a91aafdf28eaed2a02a1b1ae0a sssd-tools-2.7.3-4.el8_7.1.aarch64.rpm 08edbdecee4de860ae28e94fd11903411d226c5512849ec5dfebdb523fb68fea sssd-winbind-idmap-2.7.3-4.el8_7.1.aarch64.rpm e555c731c11ad6807d8c413a4323d7fa8dde9b7d85f9241aaffeb9083887f91d RLBA-2022:7766 fwupd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms fwupd-1.7.8-1.el8.rocky.0.3.aarch64.rpm a976f5167496b2def93a551777946c778d8571dd4a4202e5762b7617ffd4db98 RLBA-2022:7784 chrony bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms chrony-4.2-1.el8.rocky.0.1.aarch64.rpm bb21f910d5368e3394b5f5bd81676c4d8026a2a757833ba22cad90f79ab25c7a RLSA-2022:7790 Moderate: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section. none-baseos-rpms bind-export-devel-9.11.36-5.el8_7.2.aarch64.rpm cac036e9f739d175ccfe317187447784e04bfd1382f0172b148e0db682b30865 bind-export-libs-9.11.36-5.el8_7.2.aarch64.rpm 744eb1121a493e66cdb806b7d92c94b75a261740adf56933a3080487e906abf1 RLBA-2022:7832 python3 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Bug Fix(es) and Enhancement(s): * python3: Bump the release of python3 to fix the upgrade path. (BZ#2136436) none-baseos-rpms platform-python-3.6.8-48.el8_7.rocky.0.aarch64.rpm 2cbdc696809c998a98df3588174a4867bbff5dab2aee3ed2f04582adfcf3bf58 python3-libs-3.6.8-48.el8_7.rocky.0.aarch64.rpm 0911260fb7e4c19d0f7950da395e71ce080aa134bbe2eb92161817f75e604ee2 python3-test-3.6.8-48.el8_7.rocky.0.aarch64.rpm 68e6b32bb1f0cbbadfeb68b215ac93969b8bd724869e6518484bf69649fd62ca RLSA-2023:0049 Moderate: grub2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601) * grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9 grub2-common-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 5b88d6f55060a730cf0f5b8688ae26c8eff68c853c842247a090d6e81c50a4b9 grub2-efi-aa64-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm e4527f13d0a56e4aa6e230a158103053e16e9288ca571eea25edb7c246bad49e grub2-efi-aa64-cdboot-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm 12902e75bf00ddc063d5f3526bdbb99acab44515b608fa9c9d5e164af8316986 grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b grub2-efi-aa64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 4f09a4d990d333e3265c18b4c0a5158e47d639596d85deecfd57a2abb8f5e31b grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9 grub2-efi-ia32-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm defdae03ca69e0522d87a043586cf9d9935f951cb0e0ef419eaa2754992664e9 grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb grub2-efi-x64-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm 96dbda0fb20996d949e00180be8c7abbb3d43e8ad2e6baf5ae0f80a16ef0aceb grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da grub2-pc-modules-2.02-142.el8_7.1.rocky.0.2.noarch.rpm ded04f98279737ee20b5f99c735b31ab66168490b763fff0d3670e8af01243da grub2-tools-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm b352f0f39cfbe35b244853379699821a0b99da89e1e657cf044f260d506b0625 grub2-tools-extra-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm 0238d279a49dba959f21d2d9c7e6d630a753bfe31a61a0f967291e45658d41b2 grub2-tools-minimal-2.02-142.el8_7.1.rocky.0.2.aarch64.rpm 09951dd97b206d390b931fbeee0325bc5bb30db539fe0e9cd3ea5df809ede60f RLSA-2023:0625 Important: libksba security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libksba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS. Security Fix(es): * libksba: integer overflow to code executiona (CVE-2022-47629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libksba-1.3.5-9.el8_7.aarch64.rpm 6c81a2178037a7f546d1a9e4388f8b42b660c3e7b51e3b7a229a7445cfa124b8 RLBA-2023:0830 iptables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es) and Enhancement(s): * Rocky Linux8.6 Packet drop in ebtables (BZ#2144922) none-baseos-rpms iptables-1.8.4-23.el8_7.1.aarch64.rpm db2b5896e4395660d4e76880e07828b12a51c03b6ce70757c3ded5bff591f0db iptables-arptables-1.8.4-23.el8_7.1.aarch64.rpm 33bbf5d2fe8bb7c13d91d1e3c95f3e308757927abe36290d93384bfa09071199 iptables-devel-1.8.4-23.el8_7.1.aarch64.rpm 234093b652bf78d13a9dda6edf6dea983e741c890f29ccd77f9e09d071e8cb3a iptables-ebtables-1.8.4-23.el8_7.1.aarch64.rpm f48bad6f88e004270eab32e4a11ac9d6a92d8e56194e7fb9cf78b53268843f59 iptables-libs-1.8.4-23.el8_7.1.aarch64.rpm 565b7bae7d31a0570f88dac73c55b016d7907884883f45c4dd3aeb3e43d3e235 iptables-services-1.8.4-23.el8_7.1.aarch64.rpm fae1b81df3761bae19df0a36c4b1d4ddccfc0049e1975c380b5767cebbce9568 iptables-utils-1.8.4-23.el8_7.1.aarch64.rpm dae661560154654e358428ad4d14e893d01c7966cfd318c2ab4c838ea7aada88 RLBA-2023:0831 nfs-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nfs-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server and related tools, which provides better performance than the traditional Linux NFS server used by most users. These packages also contain the mount.nfs, umount.nfs, and showmount programs. Bug Fix(es) and Enhancement(s): * Update to nfs-utils 2.3.3-51 broke nfs-mountd service on Rocky Linux8.2 (BZ#2150899) none-baseos-rpms libnfsidmap-2.3.3-57.el8_7.1.aarch64.rpm bb2e77f49138a9935289b67869ff329e0ff4afac3c58f748924dab2f1b462e2f nfs-utils-2.3.3-57.el8_7.1.aarch64.rpm c94448365687f2a29df3d60e6cb561c4dd0e32d644bceb6bef30c1bcfa3d1419 RLSA-2023:0832 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm/mremap.c use-after-free vulnerability (CVE-2022-41222) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134586) * Hardware error: RIP: copy_user_enhanced_fast_string+0xe (BZ#2137592) * Cannot trigger kernel dump using NMI on SNO node running PAO and RT kernel (BZ#2139580) * MEI support for Alder Lake-S (BZ#2141783) * Host Pod -> Cluster IP Service traffic (Pod Backend - Different Node) Flow Iperf Cannot Connect (BZ#2141959) * Rocky Linux8.7: Xorg cannot display resolution higher than 1024x768 on system using ast graphics driver (BZ#2149287) * Intel 8.7 Bug: OS doesn't boot when vmd and interrupt remapping are enabled (BZ#2149474) * i40e,iavf: SR-IOV VF devices send GARP with wrong MAC address (BZ#2149745) * Rocky Linux8.4 - boot: Add secure boot trailer (BZ#2151530) * error 524 from seccomp(2) when trying to load filter (BZ#2152138) * Workqueue: WQ_MEM_RECLAIM iscsi_ctrl_1:98 __iscsi_unbind_session [scsi_transport_iscsi] (BZ#2152734) * Connectivity issue with vDPA driver (BZ#2152912) * High Load average due to cfs cpu throttling (BZ#2153108) * The "kernel BUG at mm/usercopy.c:103!" from BZ 2041529 is back on rhel-8.5 (BZ#2153230) * Rocky Linux8: tick storm on nohz (isolated) CPU cores (BZ#2153653) * kernel BUG: scheduling while atomic: crio/7295/0x00000002 (BZ#2154460) * Azure Rocky Linux 8 z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2155272) * Azure: VM Deployment Failures Patch Request (BZ#2155280) * Azure vPCI Rocky Linux-8: add the support of multi-MSI (BZ#2155289) * MSFT MANA NET Patch Rocky Linux-8: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155437) * GSS: OCP 4.10.30 node crash after ODF upgrade : unable to handle kernel NULL pointer dereference at 0000000000000000 : ceph_get_snap_realm+0x68/0xa0 [ceph] (BZ#2155797) * Error in /usr/src/kernels/4.18.0-423.el8.x86_64/scripts/kernel-doc script causing irdma build to fail (BZ#2157905) * Rocky Linux8.8: Backport upstream patches to reduce memory cgroup memory consumption and OOM problem (BZ#2157922) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158813) * ethtool -m results in an out-of-bounds slab write in the be2net driver (BZ#2160182) * (Redhat OpenShift)Error downloading big ZIP files inside pod on power OCP and pod getting restarted (BZ#2160221) * i40e/iavf: VF reset task fails "Never saw reset" with 5 second timeout per VF (BZ#2160460) * iavf: It takes long time to create multiple VF interfaces and the VF interface names are not consistent (BZ#2163257) none-baseos-rpms bpftool-4.18.0-425.13.1.el8_7.aarch64.rpm 032ce3ccec59ea3c047ab6258f38af6cfa4e5c8ec8e06d8ee254614eda10bd1a kernel-4.18.0-425.13.1.el8_7.aarch64.rpm f230a1e1b0be0c1950cba07817c20045a6704095ee6bc82f8b70a23def762f36 kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm 112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6 kernel-abi-stablelists-4.18.0-425.13.1.el8_7.noarch.rpm 112fd585aeb8f69a65d5191dfb7710c00a2fa0818413eb730a52c519c9e798a6 kernel-core-4.18.0-425.13.1.el8_7.aarch64.rpm 5d4a3f5ec1c8b7665aa23c45a66626ae91838b0554b0232189704aa2ef5f2b36 kernel-cross-headers-4.18.0-425.13.1.el8_7.aarch64.rpm 60bc2fcc9d6999ee511379b6e5f9d19faa04b478fec47a70400e3b40278c2336 kernel-debug-4.18.0-425.13.1.el8_7.aarch64.rpm bd618748ef51663b21b46c3f0a2c32f0a81ee9c2825f88a54fd2ea3fbe3447d4 kernel-debug-core-4.18.0-425.13.1.el8_7.aarch64.rpm 7751b2c7b8bd8984ee03b5c4936ae07501f152d071d88fe7b53f546d8ab7ed69 kernel-debug-devel-4.18.0-425.13.1.el8_7.aarch64.rpm 50eb312c239567ca035750e9b0d5779f9da8b4a30e76a340f6f743a0db34aab0 kernel-debuginfo-common-aarch64-4.18.0-425.13.1.el8_7.aarch64.rpm a6c79786677536266cc11ffb8b3dd5f8ba681ab52dfd752916cf68981b6b6a8d kernel-debug-modules-4.18.0-425.13.1.el8_7.aarch64.rpm 9754804488edda8a09a8c58d941629f4d75e1dab08a5ecc603ef01a978e8b2de kernel-debug-modules-extra-4.18.0-425.13.1.el8_7.aarch64.rpm 4d88b99dba2294c746eddf676912a1384d3b434d1a67404ee2b2bfa09013d555 kernel-devel-4.18.0-425.13.1.el8_7.aarch64.rpm efa7bd275a36028561fba78e22907c2f1109715b6d37101572566c942aa00fea kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6 kernel-doc-4.18.0-425.13.1.el8_7.noarch.rpm d29d0316ba11bbbfb22ebf404f6aa18c7d6f67d1cb3d705b22918ebbe1e272a6 kernel-headers-4.18.0-425.13.1.el8_7.aarch64.rpm c7a1fc914387daf0fd280f7d24e69c6281f8df745698274d8103a8e45e023042 kernel-modules-4.18.0-425.13.1.el8_7.aarch64.rpm 9905c0fb0d0122fbc71f1bdbe813c7cefccb2538d3f67394c1ad661d24b0f982 kernel-modules-extra-4.18.0-425.13.1.el8_7.aarch64.rpm fa6388e53ccef0a4e41fc8edfc476667b7f4fc63d59dca32e7582f3e09f3a340 kernel-tools-4.18.0-425.13.1.el8_7.aarch64.rpm 5713099e6e8d206551ee0447d1fb1a6e54c49b3a410055e96f672b7ae477772c kernel-tools-libs-4.18.0-425.13.1.el8_7.aarch64.rpm ecd16e51b799aa951cfbacbbf21f4ccba14cb682b9241cd105072e9514afc4f6 perf-4.18.0-425.13.1.el8_7.aarch64.rpm 6278a6509e632bbfa21cb21bba95b236b052cf61fb6caea3a843065e00051981 python3-perf-4.18.0-425.13.1.el8_7.aarch64.rpm 2578986d17c39926b86f5f117ebc21293ec3621b8ca06954d3008258d80ec090 RLSA-2023:0833 Moderate: python3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735) * python: open redirection vulnerability in lib/http/server.py may lead to information disclosure (CVE-2021-28861) * Python: CPU denial of service via inefficient IDNA decoder (CVE-2022-45061) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm 032f12d764303afbe4db7ff9c2c7ae7297372fc34baec25af080b2c4eeba4b8a python3-libs-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm c380184a5a8bbf379dbc8c82f6d04b9e571f62bf7ec562d176c27bfa77fc6136 python3-test-3.6.8-48.el8_7.1.rocky.0.aarch64.rpm 9271bca1ec9d4a7dd71a3a6dbb74120aea956cee8a5901c81bc39d5cc8657185 RLBA-2023:0834 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kmod-kvdo packages provide the kernel module for Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es) and Enhancement(s): * Rebuild kmod-kvdo against kernel version 4.18.0-425.10.1.el8_7 (BZ#2158783) none-baseos-rpms kmod-kvdo-6.2.7.17-88.el8_7.aarch64.rpm 123190f3249c81165ea0ed6d3dd9612cab036359a7a0665b79917a050e5a1267 RLSA-2023:0835 Moderate: python-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py (CVE-2022-40897) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm 79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e platform-python-setuptools-39.2.0-6.el8_7.1.noarch.rpm 79df645d4964ddd0977ff1df4c6eab07573681474107927e5c1a236a8db7682e python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm 086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b python3-setuptools-39.2.0-6.el8_7.1.noarch.rpm 086432d50e40817e2dc2c45c54f60802f4368f5bde2949757f65804f48c9120b python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e python3-setuptools-wheel-39.2.0-6.el8_7.1.noarch.rpm a088f6171dec158f26bf60f942294f5ec8ba1f30f447f3828ff201b59a87a19e RLBA-2023:0836 OpenSSH bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es) and Enhancement(s): * backport Incorrect parsing of IPv6 IPs in sftp client [Rocky Linux 8] (BZ#2162732) none-baseos-rpms openssh-8.0p1-17.el8_7.aarch64.rpm 9492b5ceece55e95a480503e9c170cea3df1d17c752f0b6cdccd39f5b3885464 openssh-cavs-8.0p1-17.el8_7.aarch64.rpm 66644b4859986b9c52da00a6f7597711d2034c23d789209786d5203213f5b44d openssh-clients-8.0p1-17.el8_7.aarch64.rpm ce95fe60e47438a9bc3ca5b8b437444bba79d64d482f8dbd91316fbed3d2aaf5 openssh-keycat-8.0p1-17.el8_7.aarch64.rpm fb4ab8cc87b4fa55e58b558be3de75cd7173f98025259d420aca9ca6ba43a43d openssh-ldap-8.0p1-17.el8_7.aarch64.rpm 1028ebf570c8a8d3c0a2902e3d9bf78d0c622bd8aab212188e55785fb269a0ec openssh-server-8.0p1-17.el8_7.aarch64.rpm 33772ddaf431e6f1413e524c7a5f53abe70dbe3dc27d9735405c25be79245bf6 pam_ssh_agent_auth-0.10.3-7.17.el8_7.aarch64.rpm ab5a6997bf9f094acd4bd33ab6c0ece4fd40bbd70c35b7fb741b6f217d8e94d7 RLSA-2023:0837 Moderate: systemd security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: local information leak due to systemd-coredump not respecting fs.suid_dumpable kernel setting (CVE-2022-4415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd doesn't record messages to the journal during boot (BZ#2164049) none-baseos-rpms systemd-239-68.el8_7.4.aarch64.rpm 39402bde20dea199a88e4d01c31497a6554bfabd2638ae25a6bd96a63f047528 systemd-container-239-68.el8_7.4.aarch64.rpm 8bcf6b864ddcd8bda0d470d33d7ccfe1db9dfccd2d4cfbf2cc5b6d46ed667924 systemd-devel-239-68.el8_7.4.aarch64.rpm cc5fbb74aea6a3c417ee653977ea7121f70a2e4e55876a715dfe4624a27f3074 systemd-journal-remote-239-68.el8_7.4.aarch64.rpm 06ab1cf2b86c2627c904102e7ca2579bcbc6261b2439ec35da0d8f8a44a3362c systemd-libs-239-68.el8_7.4.aarch64.rpm 3e5a0d0d36f9e86d6a147f4068a6f8676305f847bdd48f11290c5a8d347770ba systemd-pam-239-68.el8_7.4.aarch64.rpm 9de00813af7bd36bb95de6d98ed6699fb7ac12afd44ca7b3c1a3d08628c71031 systemd-tests-239-68.el8_7.4.aarch64.rpm e3d640f9b3d63e6ef345815472e34d3d2de9c3f3bd8067973387482f0a4d487b systemd-udev-239-68.el8_7.4.aarch64.rpm e6dae4fc72c953c051586f2113aa0835d8fbe397d80392cb78fc4331ac973f01 RLSA-2023:0838 Important: samba security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Security Fix(es): * samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms ctdb-4.16.4-4.el8_7.aarch64.rpm 5df20949e8fa35998483cb15f53561f572741ec296ef754d14c50b219279bce0 libsmbclient-4.16.4-4.el8_7.aarch64.rpm 18833ab26eef75b6a0558a403d5d768b4944c9a9aaf9554b36da20581046b9a6 libwbclient-4.16.4-4.el8_7.aarch64.rpm d53c33eb7baa820ecf352644681c3ce089bcf9821af8f4fb110229b7d884338c python3-samba-4.16.4-4.el8_7.aarch64.rpm 95ebd3ea6c2825e8c9330375ea9092833adf47fbb51c0a0bb898df2288597f12 python3-samba-test-4.16.4-4.el8_7.aarch64.rpm cd71cda6b7621c1dda1ca4541fc7ef57d3c9df9c9ed242bd5dc1a0741a9be6e5 samba-4.16.4-4.el8_7.aarch64.rpm e71953221c56e7dc1cc8cc5324ad5b178414f740e50268897d774e1835118ede samba-client-4.16.4-4.el8_7.aarch64.rpm 6a142414433bfae3549a38f8c0726d9ab7c9fb88178d32d8c3bae1ccbb990f7a samba-client-libs-4.16.4-4.el8_7.aarch64.rpm 122c7cf5264ce982fb10d32fa9ab408e000cbba40130070fd50d8ee2271efa76 samba-common-4.16.4-4.el8_7.noarch.rpm 920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535 samba-common-4.16.4-4.el8_7.noarch.rpm 920a53593c8fc91fbcb9b53fda376f997eaf9ebc446e682369e57001c749c535 samba-common-libs-4.16.4-4.el8_7.aarch64.rpm e4ebf8d71ffef3f47ab3987c4b688623ce3c18898775830a638984b971a8c125 samba-common-tools-4.16.4-4.el8_7.aarch64.rpm a6e8d33c3106c067c68731390c846401c4ccfcb746a9249a83e8785e38d6c4ab samba-krb5-printing-4.16.4-4.el8_7.aarch64.rpm e675b8297290674d8f3b0cd8996739e61d773bdfa04a5a456d39081643c6766a samba-libs-4.16.4-4.el8_7.aarch64.rpm 00d62e442032122a365ece93b410ac5f61417b562324d560a384972aa2795f46 samba-pidl-4.16.4-4.el8_7.noarch.rpm b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4 samba-pidl-4.16.4-4.el8_7.noarch.rpm b4ed5fcbf7bb9802c768852c4a23821a354feb7440f5cc28df778882400c41d4 samba-test-4.16.4-4.el8_7.aarch64.rpm c97174f442d5679d9f24ce7071e58c543857e2a556f268b34a2b399f01ca94d1 samba-test-libs-4.16.4-4.el8_7.aarch64.rpm 9973894c6356954ac735f85af445bb205d62d065c912bafc8cc565e0b0667fea samba-winbind-4.16.4-4.el8_7.aarch64.rpm 8befb32b738ab1742f378e0d1a51d95f6721e20fd1e2d2d53f4432bc8edb0bb5 samba-winbind-clients-4.16.4-4.el8_7.aarch64.rpm e4a4a3143dbb29e73bb5219e1e17672d2831f297b14b12b0833f37a118687cba samba-winbind-krb5-locator-4.16.4-4.el8_7.aarch64.rpm 5a46f987aa0fcf75b7d1d288407f7c747c50f8dfeefe94e88c54dbcc86d5b557 samba-winbind-modules-4.16.4-4.el8_7.aarch64.rpm 72dd58b77888e98c092fa30d7c01240306ea56989deb4f6da014510de0a17506 RLBA-2023:0840 curl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es) and Enhancement(s): * curl fails large file downloads for some http2 server (BZ#2167825) none-baseos-rpms curl-7.61.1-25.el8_7.2.aarch64.rpm 583843322d6e2c178a03dcb9dd43d78e72a5fc5a29674cca908af8e5081acec3 libcurl-7.61.1-25.el8_7.2.aarch64.rpm a9b2bf5b6427f517ee4bb4b7f4b0576b359399d8a31d7fba35104bb10326241c libcurl-devel-7.61.1-25.el8_7.2.aarch64.rpm 7594dfa55739eadf1edea5e278adae57f92a2ec31edbd0c618221e763257f057 libcurl-minimal-7.61.1-25.el8_7.2.aarch64.rpm 196d6b011ace92ad917841e7c51bad5a5a8a6a912b9f2343318e0acd0a42aae9 RLBA-2023:0841 grub2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es) and Enhancement(s): * HOT:ISST-LTE:[P10]:LPAR is not booting up after inactive LPM (BZ#2162411) none-baseos-rpms grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5 grub2-common-2.02-142.el8_7.3.rocky.0.2.noarch.rpm d9144ef96e60849f7499704dccc1769bf2e202b10c020e8e60e990a94073c7a5 grub2-efi-aa64-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 069d7da6a072f4ed18240e150622569d7b1b81159a4996e5681d5b08aa5919a7 grub2-efi-aa64-cdboot-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 4649be4df18b0d1b382ee61a58de03f9c1090162486fef14b088ad089b768a17 grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b grub2-efi-aa64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm c35195531f6ad155e0bbb19a5cbdb30ea89aa1088eb0aec40af8cc31c4753f4b grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571 grub2-efi-ia32-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 0a31dfc5494ba26886bb20882418e884a2f4fc51ecf2cc3bbf33c51e86b05571 grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29 grub2-efi-x64-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 53b84245064eb9a42bae0cc85e1fa43b7871085446b813bcf71dfd0c734acb29 grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400 grub2-pc-modules-2.02-142.el8_7.3.rocky.0.2.noarch.rpm 8d96bea14500c3f01fc24e2c37ae18dfa8f92c27c0b0721ff923d568b6ed8400 grub2-tools-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 1ea4ecc946f8d4732c78e303cd55b2cfa1a30d21e25e2ac9ce38959907502211 grub2-tools-extra-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 8e49b9e598f96f983018219a7df54e6cd5092befc108f45cf711cf4b5e75be16 grub2-tools-minimal-2.02-142.el8_7.3.rocky.0.2.aarch64.rpm 4eee270ce37bf57fbdeb2d828afd3cf6490f0765bd1c6c34de6276c6e6cbe3f6 RLSA-2023:0842 Moderate: tar security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU tar program can save multiple files in an archive and restore files from an archive. Security Fix(es): * tar: heap buffer overflow at from_header() in list.c via specially crafted checksum (CVE-2022-48303) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms tar-1.30-6.el8_7.1.aarch64.rpm 3dda4f6793ebb52c614eb18e44ee52a7bd6544ee6b200cdff37b56ac9a2fa83f RLSA-2023:1140 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP multi-header compression denial of service (CVE-2023-23916) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-25.el8_7.3.aarch64.rpm acf1ea3733bc52a80e12bb82d2770aaf0398b0436c331dd0931aa9440616cdde libcurl-7.61.1-25.el8_7.3.aarch64.rpm 24bf3e171023587c37593d5eb8c0cd088825882ea7bd7db2da27f622c55a2a93 libcurl-devel-7.61.1-25.el8_7.3.aarch64.rpm b7ab317ff955affaa301102d9eabfca077f11ab74c7c2d48fea781e3243ae05e libcurl-minimal-7.61.1-25.el8_7.3.aarch64.rpm 71792b5b40cf2487aa164e115fd4aacaa13ed9717bd58ec9ac473fa5b43d89b6 RLBA-2023:1300 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos tool has been upgraded to the latest 4.5.0 upstream release, which includes a lot of underlying improvements and fixes. (BZ#2166655) none-baseos-rpms sos-4.5.0-1.el8.noarch.rpm 09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4 sos-4.5.0-1.el8.noarch.rpm 09cecb873d49432c060f6a8e741833a7cbe0ddae4d2cee238694b9c3dd7eaed4 sos-audit-4.5.0-1.el8.noarch.rpm d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf sos-audit-4.5.0-1.el8.noarch.rpm d11f01fb828ef8de3e04bcc64f976a61fe0955eec21da53e379a03263f9254bf RLSA-2023:1405 Important: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) * openssl: timing attack in RSA Decryption implementation (CVE-2022-4304) * openssl: double free after calling PEM_read_bio_ex (CVE-2022-4450) * openssl: use-after-free following BIO_new_NDEF (CVE-2023-0215) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-1.1.1k-9.el8_7.aarch64.rpm 603a7b2c935add53fbdfde77ee27afe911606868ad96afd42512986886cd71ea openssl-devel-1.1.1k-9.el8_7.aarch64.rpm 87318f73db6c692abbe3991e4d1e67fa68701866cf5cd2835a534350d89bb8cf openssl-libs-1.1.1k-9.el8_7.aarch64.rpm 648a25c2c5f1b26fbd9ed50bdff45848c252326ef073eae5ef7d52ae0b6c2e87 openssl-perl-1.1.1k-9.el8_7.aarch64.rpm dbaadb6d30b3558ad3ed40dc63ac3daa556cbf846c1f585046a6473674116834 RLBA-2023:1553 linux-firmware bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es) and Enhancement(s): * [AMDCLIENT 8.8 Bug] amdgpu firmware update to fix certain "multiple monitor scenarios" (BZ#2165148) none-baseos-rpms iwl1000-firmware-39.31.5.1-111.el8_7.1.noarch.rpm d6b1367a96fdd1328070287bb4808db9036e0ead5df550f929a210ff32613e50 iwl100-firmware-39.31.5.1-111.el8_7.1.noarch.rpm 9351ea8cf87ea5bc4b95cb42948d128b83c9f9e197c60f7a277464cf5d7b45e0 iwl105-firmware-18.168.6.1-111.el8_7.1.noarch.rpm a84292a42a7de195a2f9f1ba0f2f085388640c34e4439221995298e649602c05 iwl135-firmware-18.168.6.1-111.el8_7.1.noarch.rpm 9e3f315d2d1719b3156279f942cbf1c1fdc25f5282ef217166a64086f73d4f9a iwl2000-firmware-18.168.6.1-111.el8_7.1.noarch.rpm 95a9a8cc0bd908b16231a6877dd2e47b204ce5136207b94d8e59aa262106c2a8 iwl2030-firmware-18.168.6.1-111.el8_7.1.noarch.rpm ff8807423de5c5f552e6f461d95abf901b87e7eb66d6698145c33cfb39c30ae3 iwl3160-firmware-25.30.13.0-111.el8_7.1.noarch.rpm 2aef2e06db9609c3bddddec5d828b21cd265ea81205d5e655e9ee15c282e5134 iwl3945-firmware-15.32.2.9-111.el8_7.1.noarch.rpm 4f486d13a3599d5c73f7cdcfb2e2a7ad444643930cb14044f5f7f92d5ea2ba3c iwl4965-firmware-228.61.2.24-111.el8_7.1.noarch.rpm e689b272104b1c62146234ca94c391f976fac7f53d80745673301df28b9038b3 iwl5000-firmware-8.83.5.1_1-111.el8_7.1.noarch.rpm 9f8c9d2ae7c6456db27a0a3f2becce130b920eb15ac1f5c0b3e75272e1052015 iwl5150-firmware-8.24.2.2-111.el8_7.1.noarch.rpm 11f4c5d536e5b92d575f449f49887352dbfdb32bec6c2a59d0cc71e0d262997f iwl6000-firmware-9.221.4.1-111.el8_7.1.noarch.rpm 05c572d66c3c2a9e5da10cf5ae3255c8e0cc635b4e1124be89d1c9066326c909 iwl6000g2a-firmware-18.168.6.1-111.el8_7.1.noarch.rpm 24d02231cd1281febee88652dd4ea1d3dd6321af83ea46b09dba23f7e09dd250 iwl6000g2b-firmware-18.168.6.1-111.el8_7.1.noarch.rpm d8f57463a148d115ea1752681e53cbba329663911533c13c3940d0499a1786c2 iwl6050-firmware-41.28.5.1-111.el8_7.1.noarch.rpm 107934970687d8b2b9276784202c13a32de90650ed51d14bfe1e18b40d1f99b2 iwl7260-firmware-25.30.13.0-111.el8_7.1.noarch.rpm 29e46c7cde1633402e3bdec2037d2527b627750aca1c901e21cf8c6cf46bba5a libertas-sd8686-firmware-20220726-111.git150864a4.el8_7.noarch.rpm fcab71d89332db55570bca52f189db1572548cd366cfab8d774da3773c89ac79 libertas-sd8787-firmware-20220726-111.git150864a4.el8_7.noarch.rpm 1a970311eccdfe89500206af694759b499ab95f0f24f7f44d43fce468b581db8 libertas-usb8388-firmware-20220726-111.git150864a4.el8_7.noarch.rpm 8f58245633ae3a6e5be2daaed4d25d79fe90574c7dc0ddad0309a6ef26a79ed2 libertas-usb8388-olpc-firmware-20220726-111.git150864a4.el8_7.noarch.rpm a848ed27770fda7824850fc415d1704bbd759c97cbfabba5499a469956143ff5 linux-firmware-20220726-111.git150864a4.el8_7.noarch.rpm 1ef0b17c57975748cbdb64e31cd5aab909b31589cd1483fa0775907fc386dacd RLBA-2023:1565 device-mapper-multipath bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The device-mapper-multipath packages provide tools that use the device-mapper multipath kernel module to manage multipath devices. Bug Fix(es): *Multipath segfault after running newest patched version (BZ#2161393) none-baseos-rpms device-mapper-multipath-0.8.4-28.el8_7.3.aarch64.rpm e5fa857ab81c6b899b8d88cc794b7346ab95d5d4b5d72234cd7e5a302c159f51 device-mapper-multipath-libs-0.8.4-28.el8_7.3.aarch64.rpm 5af6e74914d8c1dedb825eea4ac8b258bcd82253367ca04c51a1763939180c8a kpartx-0.8.4-28.el8_7.3.aarch64.rpm d1f247cbcc5214090cdaeb16bb0cd4da28832964be9cd90a64305b1c37248f6a libdmmp-0.8.4-28.el8_7.3.aarch64.rpm 1c06901e9108460612d63e275c90179aea0b87d04205ec5dec88800b204112e8 RLSA-2023:1566 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: FUSE filesystem low-privileged user privileges escalation (CVE-2023-0386) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel panic on reboot due to a bug in mei_wdt module (BZ#2139770) * Rocky Linux8: Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142170) * AMDSERVER 8.7: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151275) * Rocky Linux-8.8: Update RDMA core to Linux v6.0 (BZ#2161750) * Kernel panic observed during VxFS module unload (BZ#2162763) * Client not able to connect to rhel server: SYN is answered by chalange ACK and RST is ignored (BZ#2165587) * Rocky Linux8.4: s390/kexec: fix ipl report address for kdump (BZ#2166296) * kvm-unit-test reports unhandled exception on AMD (BZ#2166362) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2166368) * Unable to get QinQ working with ConnectX-4 Lx in SR-IOV scenario (BZ#2166665) * panic in fib6_rule_suppress+0x22 with custom xdp prog involved in (BZ#2167602) * net/mlx5e: Fix use-after-free when reverting termination table (BZ#2167640) * Rocky Linux 8.7: EEH injection failed to recover on Mellanox adapter. (BZ#2167645) * mlx5: lag and sriov fixes (BZ#2167647) * Rocky Linux8.4: dasd: fix no record found for raw_track_access (BZ#2167776) * GSS: Set of fixes in ceph kernel module to prevent OCS node kernel crash - blocklist the kclient when receiving corrupted snap trace (BZ#2168896) * Azure Rocky Linux8 scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (BZ#2170228) * fast_isolate_freepages scans out of target zone (BZ#2170576) * Backport Request for locking/rwsem commits (BZ#2170939) * ipv6 traffic stop when an sriov vf have ipv6 address (BZ#2172550) * Hyper-V Rocky Linux8.8: Update MANA driver (BZ#2173103) Enhancement(s): * Intel 8.8 FEAT SPR CPU: AMX: Improve the init_fpstate setup code (BZ#2168384) none-baseos-rpms bpftool-4.18.0-425.19.2.el8_7.aarch64.rpm d2f4bcb7d8eff462c755a9355a19308df1e9664d584c91f3e5a57716a99a1aab kernel-4.18.0-425.19.2.el8_7.aarch64.rpm eff75bdc5c1e2d3460385ac309822c0152ef3ae2ef59cbc71ee3c4169b975055 kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm 42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963 kernel-abi-stablelists-4.18.0-425.19.2.el8_7.noarch.rpm 42e95052460987534f500f7d2475155e2253339a854c66081b660da0e93a2963 kernel-core-4.18.0-425.19.2.el8_7.aarch64.rpm 5d3d148f51837a1aec1436fc718c0b47654f4da3df6dfffe0e8024a15cbfa324 kernel-cross-headers-4.18.0-425.19.2.el8_7.aarch64.rpm 834cdaaea33e57a803fec786456f1b82f36abe4d0c1b5073d32abd8d9a640ed2 kernel-debug-4.18.0-425.19.2.el8_7.aarch64.rpm 6f951026c61c69023d3587e4e8dffc1fd90ebb182e6f8e3f5234898b2bd4599c kernel-debug-core-4.18.0-425.19.2.el8_7.aarch64.rpm d90e5b220ea2421f380784875db748db756d2729e373b6083aa3023b47bab94c kernel-debug-devel-4.18.0-425.19.2.el8_7.aarch64.rpm 74cc8f69654bcafb1139320d02e01989b6f2132bb43cbd3ae9da09cfb83bc618 kernel-debuginfo-common-aarch64-4.18.0-425.19.2.el8_7.aarch64.rpm 866d61df6d095006845a317696d06b2c625ff2528d72f1d9f032cbdbe90d8469 kernel-debug-modules-4.18.0-425.19.2.el8_7.aarch64.rpm dba6a41316940762ba4a47cb1e7f8e6b467859e0d4fcf219d5013f0db6bdfdfc kernel-debug-modules-extra-4.18.0-425.19.2.el8_7.aarch64.rpm fb4130a8c4fb9682884d626ffda0d288366f5866fdec9f6dfe0380690a9ba722 kernel-devel-4.18.0-425.19.2.el8_7.aarch64.rpm 57dfd7e8a6753bfd961062c729333356246fd923a5c1f0e0e84b4557f52be8e7 kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9 kernel-doc-4.18.0-425.19.2.el8_7.noarch.rpm c72d6e283b89b4330922b34ba4cf3dbda58d9e847fd00d75d963d139ea2c53c9 kernel-headers-4.18.0-425.19.2.el8_7.aarch64.rpm deddb885d67f53f2cb0c4814a0cb32c0fd6484a8dc75469bd5343f705423f68b kernel-modules-4.18.0-425.19.2.el8_7.aarch64.rpm 1363fc5717ef871fd0d18db0b84daff04620d2b1c7ba992f7595327c57f1a753 kernel-modules-extra-4.18.0-425.19.2.el8_7.aarch64.rpm e952a099ad4af42a29d8592460ed7ba887780aeff64d8806ebc37115f12ec7f4 kernel-tools-4.18.0-425.19.2.el8_7.aarch64.rpm 8cbed7f5ece89eb5c50849a24bf8fcfee89aff8c000049ee67169a6939395d75 kernel-tools-libs-4.18.0-425.19.2.el8_7.aarch64.rpm 0f20402f16f2be67052c071eae1bcf7ed0709d06a228606b33218ce4979dfe3e perf-4.18.0-425.19.2.el8_7.aarch64.rpm d1e6e6d638ef71f14c5d51f3f0b995c4fca1f7883461ebc2fb103dafd3e80963 python3-perf-4.18.0-425.19.2.el8_7.aarch64.rpm b7abe990de788164f07be81ae1f2b53d30517c31adadaaecea827ae1dafbc835 RLBA-2023:1567 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es) and Enhancement(s): * Samba shares not accessible from MacOS Ventura after upgrade to Samba 4.16.4-2.el8 (BZ#2170394) * ctdb should have dependency for package samba-winbind-clients (BZ#2170467) * Samba with Winbind can not retrieve user groups from Active Directory (BZ#2170468) * samba-tool reports an uncaught exception (BZ#2170469) * Ship new samba subpackages (BZ#2173975) none-baseos-rpms ctdb-4.16.4-6.el8_7.aarch64.rpm 56799dc0955859aecc67bf659dd049776d4fbe668b89c92add3b9a68aeed4528 libsmbclient-4.16.4-6.el8_7.aarch64.rpm cb3ce2b06b3f9a276626be38be59170119bd334d4d1f6bac0c54b6ab19f15330 libwbclient-4.16.4-6.el8_7.aarch64.rpm efa974b869430f1f53e1900ee1420d551ffcbe1b76fbea6dfde89679be52e642 python3-samba-4.16.4-6.el8_7.aarch64.rpm 864bef79a637c0d109cd18a9269a1716f0dc12f144ec3e133b4736f2e4dfbe45 python3-samba-test-4.16.4-6.el8_7.aarch64.rpm c629fb96bb551604a4640788efde38ce7ab6be89b0a6b680548384cce7b9f6da samba-4.16.4-6.el8_7.aarch64.rpm f675da829a6f18474b5e2d58a595f8dade4ce567aee8b55707ae2836d475602f samba-client-4.16.4-6.el8_7.aarch64.rpm 1ffce194d5d6c730012f34b4c9e66f4e674e558b4670bfa3308d7df4bdb40c3b samba-client-libs-4.16.4-6.el8_7.aarch64.rpm 1dd6eccb5452e386a183a4bbdf623fb424b1a358ddca345e25b4aacc41b3c19c samba-common-4.16.4-6.el8_7.noarch.rpm 97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395 samba-common-4.16.4-6.el8_7.noarch.rpm 97d51a6b773106001a616d443beb10dc4f2720de02c2cdebe92cc6fb33289395 samba-common-libs-4.16.4-6.el8_7.aarch64.rpm c3a4266a76e137b9594ffafcacd7d4028190a16e62d06e6682f7880b9d97425a samba-common-tools-4.16.4-6.el8_7.aarch64.rpm 4d408a4211ff806eef10920e0fd01c522bc581a573d69e2d112e577f821736ab samba-dcerpc-4.16.4-6.el8_7.aarch64.rpm c80bb7bcdc6cb495e94f0c1ee29427052b00862a0315b714f91d4a1dc8ddf2fc samba-dc-libs-4.16.4-6.el8_7.aarch64.rpm 5a7a2273757670b0fe6846aa9a999a94a0a7e1d975760e4cf9b191ff866368e1 samba-krb5-printing-4.16.4-6.el8_7.aarch64.rpm dd8ed9ab82b9c91c9d9a60db4484f1ae8766dbb856ff30f6beb7c12bce69895b samba-libs-4.16.4-6.el8_7.aarch64.rpm 27bff6adeb16b7fde8414b2e492952b375bebed5c3e315d04c0d6bf7b7965d25 samba-pidl-4.16.4-6.el8_7.noarch.rpm 934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e samba-pidl-4.16.4-6.el8_7.noarch.rpm 934707d614ffd5c2222c70f953a539bc8b92ffc4b75414a8ad034e53d82ea84e samba-test-4.16.4-6.el8_7.aarch64.rpm c3085909b39ca93bee037ee3fd02d11a441f23604e20008fcd06c20dcad8c3d5 samba-test-libs-4.16.4-6.el8_7.aarch64.rpm 55762d80cb5a9cc20a4623cb538400301df935be60f527b707ed3c236b0223da samba-winbind-4.16.4-6.el8_7.aarch64.rpm 15a2fb843ec99659541b2b231980becd03596da9d6987f9868a86e8fc1322777 samba-winbind-clients-4.16.4-6.el8_7.aarch64.rpm 1110407b7d618b38b42e30a0bb9f46437f1b472a9236ea184996e171bae26bd5 samba-winbind-krb5-locator-4.16.4-6.el8_7.aarch64.rpm dc2013990ed7b8e235c0195aaefd43f5a4d5131a309f08b9b08dae55eb681398 samba-winbind-modules-4.16.4-6.el8_7.aarch64.rpm 9f59cf88cc1d1d752e122001ca2d6e59f90cca79dc96efd80c871883ac32a0a1 RLBA-2023:1568 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es) and Enhancement(s): * [Rocky Linux8/Insights/Bug] SELinux violations insights client SAPHostAgent (BZ#2170510) none-baseos-rpms selinux-policy-3.14.3-108.el8_7.2.noarch.rpm 2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c selinux-policy-3.14.3-108.el8_7.2.noarch.rpm 2013aed46a43d0a5dc40c88703d4d87f417fac5e30b5fc4a0aa22f971e85839c selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm 862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb selinux-policy-devel-3.14.3-108.el8_7.2.noarch.rpm 862b21fb9d39d528ba3c4706401063f5cd769ddd246aeb2784f0bc204833d5cb selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16 selinux-policy-doc-3.14.3-108.el8_7.2.noarch.rpm c7960959abe31333dbdfc42cf004e54bec43c5b82816d0efe13f3c5dc65c3e16 selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm 59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc selinux-policy-minimum-3.14.3-108.el8_7.2.noarch.rpm 59ba05d47369d385080c7601f5a0f110ed043454bc2f8a2442b90f1450e5dccc selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm 9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4 selinux-policy-mls-3.14.3-108.el8_7.2.noarch.rpm 9644f8b01fa6ff683ab447ce29d6433db26f6516bb67e147a87bc50d603876f4 selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm 800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7 selinux-policy-sandbox-3.14.3-108.el8_7.2.noarch.rpm 800716bd8afd4b143ad5d2da713ce0c9c27b5775f7ee840ea6e1f27e6264f8f7 selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591 selinux-policy-targeted-3.14.3-108.el8_7.2.noarch.rpm edca9f783ee64438467aab41236f4d68bf0cc390c4b6975cdaad10d04b5d5591 RLSA-2023:1569 Moderate: gnutls security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152) none-baseos-rpms gnutls-3.6.16-6.el8_7.aarch64.rpm 3ccff4c553d33bc67c5b4dad6ea92f37d26fc22138654eab7a68400ee3d62bc4 RLBA-2023:1570 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * NetworkManager hostname lookup fails with IPv6 (BZ#2174362) none-baseos-rpms NetworkManager-1.40.0-6.el8_7.aarch64.rpm c95f99ea8e877260f7160e39b20c5e3c1832915b6286bbd0982cdeafd8869102 NetworkManager-adsl-1.40.0-6.el8_7.aarch64.rpm be9f9fe9ada8fcf0a1e9fe49fccae55c36224fe9bbb81ad07c44bcef56238166 NetworkManager-bluetooth-1.40.0-6.el8_7.aarch64.rpm a82032f1709e2aaa1ac88b5221023237e9ae6aee22d88a8a3cc8615528e04817 NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm 6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8 NetworkManager-config-connectivity-redhat-1.40.0-6.el8_7.noarch.rpm 6cbb3a4599412d4f9532c78c37a25a7fc1d13c3db025c56ca81b018ceb4474b8 NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a NetworkManager-config-server-1.40.0-6.el8_7.noarch.rpm c19ab8732408c8519100a185a29a88f6552b6c13f88179999a3478c61a98fa0a NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a NetworkManager-dispatcher-routing-rules-1.40.0-6.el8_7.noarch.rpm f5b804bb2124b9760066f570061afcedb5c51ac16c6fb7d78c8d987a4472d69a NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731 NetworkManager-initscripts-updown-1.40.0-6.el8_7.noarch.rpm bd3bb61ec99c1b671a3cd14b349cf56bd38d4951dc63bdc5d5c33b964df64731 NetworkManager-libnm-1.40.0-6.el8_7.aarch64.rpm de5910008f184f0421cb5048bbd41e4f928d41ff4040d5fa06fe3a5570727ddc NetworkManager-ovs-1.40.0-6.el8_7.aarch64.rpm 4e322109991380ca359eebd1f85f3894359ad3a845910199351e49672042cc97 NetworkManager-ppp-1.40.0-6.el8_7.aarch64.rpm 63ac3c1ff897171885744e531ad625b039dec726bcaf82541715475eebedf284 NetworkManager-team-1.40.0-6.el8_7.aarch64.rpm 9e67495cb808dff86f676820f4c44197ba2ce081da3a37b92c3cda4d2f8a010a NetworkManager-tui-1.40.0-6.el8_7.aarch64.rpm 4f855119e3d47ddd5cda3baa27a46011a7abc0aab9019227a4eb4f739dfab119 NetworkManager-wifi-1.40.0-6.el8_7.aarch64.rpm d5c5eb6ec76f824a99c58c5092bfe0161c0aa6371b2eaeaee9c963d6f7b8e93c NetworkManager-wwan-1.40.0-6.el8_7.aarch64.rpm 7769d5855dc8a57b496cbcff7aa555d7b6279f86548902d50b183499aee1b143 RLBA-2023:1571 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.5.1 (BZ#2175806) none-baseos-rpms sos-4.5.1-3.el8.noarch.rpm 6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297 sos-4.5.1-3.el8.noarch.rpm 6b7406d995defe6c7158fd2342a79920920c06c94b0ed3670423892afb782297 sos-audit-4.5.1-3.el8.noarch.rpm 43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133 sos-audit-4.5.1-3.el8.noarch.rpm 43723ff3f321f3847b20a5162268aace1d60dbb7812534ae808add2d3ba93133 RLSA-2023:1930 Important: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: command injection vulnerability in org-mode (CVE-2023-28617) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms emacs-filesystem-26.1-7.el8_7.1.noarch.rpm e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0 emacs-filesystem-26.1-7.el8_7.1.noarch.rpm e818eac7fc25269dec708905b869d866a00355e16ca5524cacb291d1f6d383f0 RLBA-2023:3103 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably: * The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25. * This update also includes changes for Egypt, Morocco, and Palestine that shipped with tzdata-2023a. none-baseos-rpms tzdata-2023c-1.el8.noarch.rpm 172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0 tzdata-2023c-1.el8.noarch.rpm 172d38efe4e48e867246cfc57b33d60043c4b31cd7787e9a2b2567e89753c9d0 RLBA-2023:2953 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.25-5.el8.aarch64.rpm 467492387a44e85dd26ac4ebf5049ba3a2fc09a2189fa220efa23c2638ff51db RLBA-2023:2956 libteam bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libteam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms libteam-1.31-4.el8.aarch64.rpm 221167622197fde92909db4f7985ebc7e5987f7ccd18c16a78cf8b4b90c61dd2 libteam-doc-1.31-4.el8.aarch64.rpm 5af97c9f55caea1f24af55d6b950b6367e5b6e180a0daeefb37985fa2fb59166 network-scripts-team-1.31-4.el8.aarch64.rpm 080842a645df15cecbea6c357dd74f7931564ea31b7af79bb7cb323078a21650 teamd-1.31-4.el8.aarch64.rpm 1e9348a132ee41318fcb184d4fa335234ed8844ebf1ceee4a5dfefc0cf4cbc3d RLBA-2023:2957 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.8.7-88.el8.aarch64.rpm 054763ec23801d6a7b290c1274da897610d742988c50e2a4598db474cc6f6099 RLBA-2023:2978 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms opencryptoki-3.19.0-2.el8.aarch64.rpm 1360f9ce271d1eb1fec0002478aa659ff222381d83ca85e58c9d041a24a55c88 opencryptoki-icsftok-3.19.0-2.el8.aarch64.rpm 253304292ed29c381ebd371d6a1d97d09527987a4f50a2ac5d1ee9db59147de1 opencryptoki-libs-3.19.0-2.el8.aarch64.rpm 2e0194ee63e3329c8a9446418eaed65af977985711cab32b8b24a6f299dd41a9 opencryptoki-swtok-3.19.0-2.el8.aarch64.rpm 61710002c198a06860e88fe6c13ea8c87ad92da2938cb7ebc652cc9ea31cee5c opencryptoki-tpmtok-3.19.0-2.el8.aarch64.rpm 7a50cd4e281527ba77b98b4a6feb24a7af4782b0a82242e1eae644890d7792cb RLBA-2023:2979 libdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms libdnf-0.63.0-14.el8_8.aarch64.rpm 6726756fb07a0dae3c032fa03408b329fd7622973163b67d0084a96e5184f6ad python3-hawkey-0.63.0-14.el8_8.aarch64.rpm 8231fc0fde1f0b11d57ac3875a12b48e6f1ec2635974dbe14155b6a941174f82 python3-libdnf-0.63.0-14.el8_8.aarch64.rpm 9a6889a00e43cd923513efd595b06460b8552976ff6b955e2a99a77b1156ed4d RLBA-2023:2984 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.36-2.el8.aarch64.rpm d2003ed981ac4d47de67a204ffde4e661515c6aa984267fcd35ab5cf819ad9c5 python3-cloud-what-1.28.36-2.el8.aarch64.rpm a60e74d611a7d2c6dd92b98307b78980ce61df5c86be79e4746f21c529211474 python3-subscription-manager-rhsm-1.28.36-2.el8.aarch64.rpm a8a07caa0ae458c33fdc9ec4e1d43917be834f5a92d254f102490de6f78c9768 python3-syspurpose-1.28.36-2.el8.aarch64.rpm 22a984e00abc477b0b24f21a27c392c165f7405447fc7140022bb1ce0574e1b0 rhsm-icons-1.28.36-2.el8.noarch.rpm cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f rhsm-icons-1.28.36-2.el8.noarch.rpm cd7db5da1b82708148a5720eed115437564328817ef9c61cb33c4c140f70da1f subscription-manager-1.28.36-2.el8.aarch64.rpm 027bc79d91648e308f83e663e31a2bff0c6cac678b30f0cfd66e8e6a25808ba7 subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904 subscription-manager-cockpit-1.28.36-2.el8.noarch.rpm d82b6f2e75b756e034caacd882e52fc8378568e89b82a82a60c11ef9ed8af904 subscription-manager-plugin-ostree-1.28.36-2.el8.aarch64.rpm 82ca3d1d8380322cab2683f118cbd777d23758f02dc505157821c7fe198f93bc subscription-manager-rhsm-certificates-1.28.36-2.el8.aarch64.rpm 0dd6f2bc092416ce7246c5b6c2411e5950238469e01b8dbd8e1749c472831ed8 RLBA-2023:2991 libtalloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms libtalloc-2.3.4-1.el8.aarch64.rpm bf04fd1e09059e596232affcf4374ce47cba4b02a8d62fc2f1b9e26bdc2fc4fa libtalloc-devel-2.3.4-1.el8.aarch64.rpm dff0208ba8b20d80ecfcbffa24e3f84e2ca01efc01aa2c6c5a888b648fe45914 python3-talloc-2.3.4-1.el8.aarch64.rpm fb232656f22f92bf2be091f0e58c2f48cd8b5c10d79ef9fd304ff3860239fbcb RLBA-2023:2996 cryptsetup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cryptsetup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms cryptsetup-2.3.7-5.el8.aarch64.rpm 78443d578295c56bf0bd24d21055f86d9e6ca5ad0527a88779b787cbe977bcf0 cryptsetup-libs-2.3.7-5.el8.aarch64.rpm 7c71894f4273c532ba07a7a7b24b192fd2ae8ae20861564713f797a32f27b9b4 cryptsetup-reencrypt-2.3.7-5.el8.aarch64.rpm 22dc30c96b45d35bf2a11535258f9bbd47df67609d0f4b972ff90de17ad1f553 integritysetup-2.3.7-5.el8.aarch64.rpm dcbb69559941ab0bc74fd3b0252ccdbdfe8be059e44c28a033eeb84e19440f86 veritysetup-2.3.7-5.el8.aarch64.rpm 3f3388a3aaf70f2f1a53c03b9a3de3d52e582a865050c11cbf118e8fe8192957 RLBA-2023:2997 adcli bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for adcli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms adcli-doc-0.9.2-1.el8.noarch.rpm 15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e adcli-0.9.2-1.el8.aarch64.rpm 5b7359e76fd820b53bb8d24f18f3f6b2b29510d5222dee4fbe07d5331e6d72e8 adcli-doc-0.9.2-1.el8.noarch.rpm 15217133c085f89b79dc4b20a9e14b0e0b0f0f1884f3aef111327d47fa8df53e RLBA-2023:3007 libtraceevent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtraceevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms libtraceevent-1.5.3-1.el8.aarch64.rpm 3cdb13bd872a3f7aea48ebccfd6b7598453216a9f10830bb6757ca11d8c7c31e RLBA-2023:3010 libtracefs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms libtracefs-1.3.1-2.el8.aarch64.rpm de4d063ecaf00f0c11f11ce0e4370743f240df0f6868d5fd13da2462802648b1 RLBA-2023:3016 tar bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tar. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms tar-1.30-9.el8.aarch64.rpm f92312f6da5bc8167ae07dfe31be1ed87314741263dc663178323ea84d55d058 RLBA-2023:3036 librhsm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librhsm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms librhsm-0.0.3-5.el8.aarch64.rpm 626ddbf9753000ccfc235cc4437668b643f0a3d8f26077ed1e46fb092f3ee1de RLBA-2023:3043 perl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms perl-Errno-1.28-422.el8.aarch64.rpm baa63922875404ce1932ad475b44760dc557fa6e61c75a2bc7e3eea7356c218c perl-interpreter-5.26.3-422.el8.aarch64.rpm 9ebfe2bf3764169f1ba29d2746a160f230c8844d544103c57a235637a12620fb perl-IO-1.38-422.el8.aarch64.rpm 783504d6785993bc302ffed5cb707972697798b43034835e053d0b9cb99b6289 perl-IO-Zlib-1.10-422.el8.noarch.rpm 0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0 perl-IO-Zlib-1.10-422.el8.noarch.rpm 0d3e1c768da883fe6c7f9c2b889eb0f6b2d0618d3897dac5e9db54cac1b396c0 perl-libs-5.26.3-422.el8.aarch64.rpm 43c7a7362df2821a2dbddfdc41cad09ca1877bff1a7694c1a2a9d73f000f68f5 perl-macros-5.26.3-422.el8.aarch64.rpm ba9a0f21d314edb3e259a47e1e1e9b03f9775d7126e42ab50fc862bbfd9e0e86 perl-Math-Complex-1.59-422.el8.noarch.rpm 39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a perl-Math-Complex-1.59-422.el8.noarch.rpm 39ea34de65b999e9d930e330d681f41de8e33867cc8b21f81ecd8c3a2983c40a RLBA-2023:3048 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.181-9.el8.aarch64.rpm d532bed0061391969f61706fca883c180099a060d5ac58d3e6f1e1e18b225c7f device-mapper-event-1.02.181-9.el8.aarch64.rpm 356706d0d76f462e41ebd251348d01c89130f30db1bde83f7ab0393b5ada517d device-mapper-event-libs-1.02.181-9.el8.aarch64.rpm 6eddba0fd1e1cb80c896e887588f1240e9bf451f6895d9f546d1fceecf9d0c98 device-mapper-libs-1.02.181-9.el8.aarch64.rpm a8b8f6454325ce803af7373e1cdc3de996722b657b7a3ff7e8d19b0b9cb0590a lvm2-2.03.14-9.el8.aarch64.rpm 702ecf3d76c1625309094572aa5272b828f451270c4fd9c5dc7436d61be7ce13 lvm2-dbusd-2.03.14-9.el8.noarch.rpm 9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277 lvm2-dbusd-2.03.14-9.el8.noarch.rpm 9009cba46706d0f596478343943c8c4d13896b61ccb641a836658735f8d51277 lvm2-libs-2.03.14-9.el8.aarch64.rpm b33670318b7feea6ef3bea1144a3ee6cd4095f755800e955f5539a70a3f76430 lvm2-lockd-2.03.14-9.el8.aarch64.rpm cac02f1d76e323d53bf6d4e9955601517d21a7076b79adc3af3167d8df4ebf69 RLBA-2023:3063 file bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.8 Release Notes linked from the References section. none-baseos-rpms python3-magic-5.33-24.el8.noarch.rpm e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d file-5.33-24.el8.aarch64.rpm d5bbc1bee7d4a472436db834875f103014f64b103bf35b31a49d586869e3790e file-libs-5.33-24.el8.aarch64.rpm 7d492277743031bb154f0032c97bb0d5389ccf7b82e877dd9efaafd9e0e2db2a python3-magic-5.33-24.el8.noarch.rpm e1561599f12135b7b36a64fe32ccea7c919aaf5ec469b42f42a6acfee796673d RLBA-2023:3102 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es) and Enhancement(s): * Backport hint about systemd daemon-reload. (BZ#2180442) none-baseos-rpms libblkid-2.32.1-42.el8_8.aarch64.rpm 9fb707eee5bd9351ada2dd2a232a2e9dc945d30820eaffded55ffebbd54ffbad libblkid-devel-2.32.1-42.el8_8.aarch64.rpm 160ac451b9fdb4bf39979fb7c5e08706b0e69705da0f74d194680b9677443b06 libfdisk-2.32.1-42.el8_8.aarch64.rpm 88d83e2e237751a722eb2cc239d326917cc62e0e112e200bd238b1e534c4d9a1 libfdisk-devel-2.32.1-42.el8_8.aarch64.rpm a9cf7d886477fc210fabd71bec814105e787edb0c567d012cc010e424ebba448 libmount-2.32.1-42.el8_8.aarch64.rpm 7690cadf7a0728ac02dbd1ac33d032c846ebdc23513157301910fb7ae431ecf3 libsmartcols-2.32.1-42.el8_8.aarch64.rpm efac17454e401f87960b08b9ff1ca8958e524167ef4ff458c1548be8ca70fc4a libsmartcols-devel-2.32.1-42.el8_8.aarch64.rpm 2582eaad26c6660ebb2ef4e36b0ee3b89ffcdd5caaf1586fea5046eac794b2a4 libuuid-2.32.1-42.el8_8.aarch64.rpm a608f154af45578e4fa7ac66503be083b50279ef9837d65b9bbefac7fbd02e0f libuuid-devel-2.32.1-42.el8_8.aarch64.rpm 3f9843f29d5653f8d9a51c27f3faab69851ae965730fedabea453497975b25df util-linux-2.32.1-42.el8_8.aarch64.rpm d94d9770eeb4db7192d11a25f7769370b2f1a0650076387c8160d663adedc131 util-linux-user-2.32.1-42.el8_8.aarch64.rpm f131597d3fc6e73034a2f767a045a9c827846933772385daea74fbc887e52d65 uuidd-2.32.1-42.el8_8.aarch64.rpm 677d8bf524f444d7cac9e99595f832f5457989d4947765c48c800dca6d5ff4c4 RLSA-2023:3106 Moderate: curl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: FTP too eager connection reuse (CVE-2023-27535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Cannot upload files to Jscape SFTP server: file gets created empty (BZ#2188029) none-baseos-rpms curl-7.61.1-30.el8_8.2.aarch64.rpm 902935689a900c013836688f9795afae8f647148ec4e725aead278dbbb60207a libcurl-7.61.1-30.el8_8.2.aarch64.rpm ffbcf2b126a8cab46bd89e9a2529d7214511ab1ec8ced49fa8a882320ab53140 libcurl-devel-7.61.1-30.el8_8.2.aarch64.rpm a1129e4f5de388553c06773be7ce96b14c8c85db8c6e091f1c4472148ae2cb93 libcurl-minimal-7.61.1-30.el8_8.2.aarch64.rpm 646abb83fddca4afcb0c22cb541b193a4bad6daa873eceb3eb47e9afc00c2bc4 RLBA-2023:3414 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * unpackaged gives false positive about /usr/lib/jvm/java-*-openjdk-*.x86_64/bin/jfr (BZ#2169684) * [Rocky Linux9] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2174254) * [cee/sd][RFE]sosreport is not capturing ceph Orchestrator CLI outputs. (BZ#2116602) * [Rocky Linux8] sudo plugin does not scrub BINDPW in /etc/sudo-ldap.conf (BZ#2143272) * sos subscription_manager plugin may collect proxy passwords (BZ#2177282) * [virsh] may collect SPICE passwords in virt-manager logs (BZ#2184062) * sosreport collect configs that contain plaintext passwords - /var/lib/iscsi/nodes/<IQN>/<PortalIP>/default (BZ#2187859) * [powerpc]: This patch updates powerpc plugin to collect the slots and active memory sharing information (lsslot, amsstat) (BZ#2190176) * Collecting logs for lparnumascore in IBM Power Systems (sos/sosreport) (BZ#2177984) none-baseos-rpms sos-4.5.3-1.el8.noarch.rpm 7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f sos-audit-4.5.3-1.el8.noarch.rpm 775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f sos-4.5.3-1.el8.noarch.rpm 7f0a8ece1f9aef2b5284bb694100b677b74d6fa26017d106cc1d6d5e66be5b3f sos-audit-4.5.3-1.el8.noarch.rpm 775fe1c26d95e93cb646eb46b0f9b89b9322f55e1be3e39a360e9d816165248f RLSA-2023:3584 Important: c-ares security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms c-ares-1.13.0-6.el8_8.2.aarch64.rpm 5111c729ffe36b14b30f03fe8ad3abdf75518adfdcda18df26931cb7f6ed404b c-ares-devel-1.13.0-6.el8_8.2.aarch64.rpm 9da7e43b88c5315e31236401c178b2067dd296442eb6422ca14790f063fa395f RLSA-2023:3591 Important: python3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: urllib.parse url blocklisting bypass (CVE-2023-24329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-51.el8_8.1.rocky.0.aarch64.rpm f917f12982dfbd015bcf2deb7e277b371d13079d39b45be008187ffea3b84f12 python3-libs-3.6.8-51.el8_8.1.rocky.0.aarch64.rpm 30e20877e36bb914e77eb2f1a3fb1c85b0bda4724a836769d5cd50e5f7136556 python3-test-3.6.8-51.el8_8.1.rocky.0.aarch64.rpm 467d51aa54834a9ad2eaa243a211e9f34e6a068dfd475bcbab16ee8dd2aaf551 RLBA-2023:3845 NetworkManager bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * NetworkManager brings down connection when the IPv6 link-local address is removed (BZ#2209355) * ifcfg: Mask the high bit in InfiniBand P-Key IDs again (BZ#2209975) none-baseos-rpms NetworkManager-1.40.16-3.el8_8.aarch64.rpm 0e0634d42b6c0902d4ead00c0556d3a7b8f2e7d9740b1c670e533a1c35ab9d5e NetworkManager-adsl-1.40.16-3.el8_8.aarch64.rpm 74b04b5da0178821b7d8d11992bb14226695e72d7c4ffc2d671b423f374c8705 NetworkManager-bluetooth-1.40.16-3.el8_8.aarch64.rpm 777df2f217759dbd53c75952a503acbea6ce9765d24ef89e4bf1146d7b3f81e1 NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34 NetworkManager-config-connectivity-redhat-1.40.16-3.el8_8.noarch.rpm f555a68b7f7a51585c2e2292d108862b31b85209d3668c0e9c1678007cb79e34 NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8 NetworkManager-config-server-1.40.16-3.el8_8.noarch.rpm eb4c373898ee5ffaffb55512fa494558d19a0dcfd937431cdb402178a6bf9fd8 NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm 157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26 NetworkManager-dispatcher-routing-rules-1.40.16-3.el8_8.noarch.rpm 157c9fa8363f772c6097d63fa65cc10ed18314dd5f2315835acc256916fece26 NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm 7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa NetworkManager-initscripts-updown-1.40.16-3.el8_8.noarch.rpm 7e6e14dc80f29ab22894c3f854fedd4973546c1713d98c6897b25b7d728f50fa NetworkManager-libnm-1.40.16-3.el8_8.aarch64.rpm b846b3e51b3aac34eda7f62e6d9500db998900e8fef05cebe4192e4214e106c0 NetworkManager-ovs-1.40.16-3.el8_8.aarch64.rpm 19cba337187dac6cc6cadcef14e21a258422af5e054e6c0bd9db63a192b75ddb NetworkManager-ppp-1.40.16-3.el8_8.aarch64.rpm f637b7de8817bc4911155275a5c9c916e2e67f8093e92939652c7e1661e43a75 NetworkManager-team-1.40.16-3.el8_8.aarch64.rpm 607e9e1f6a39c788abb3fbe59a70bed77df8c1f1074127bc9309e663a812c00c NetworkManager-tui-1.40.16-3.el8_8.aarch64.rpm 69ece4dc0cec2230749f7320af778f77e436963268c05321ee7a8260fc9d78a2 NetworkManager-wifi-1.40.16-3.el8_8.aarch64.rpm 94a609c91d6eeec993df033cd3aef322a583efba35d98ae15ef081e438fe3a9f NetworkManager-wwan-1.40.16-3.el8_8.aarch64.rpm 13c621ef8ad93a753bab043542f6828c4074d5fae1e039f7fe19a44f3f865aa8 RLBA-2023:3846 selinux-policy bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * systemd-pstore fails to start due to avc denial (BZ#2188268) * Relabeling of /run/fsck (BZ#2212328) none-baseos-rpms selinux-policy-3.14.3-117.el8_8.2.noarch.rpm 7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3 selinux-policy-3.14.3-117.el8_8.2.noarch.rpm 7f6ad0f813879d1a51baaef4745c48cd432c147db3b72dcee814cb671635f3a3 selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20 selinux-policy-devel-3.14.3-117.el8_8.2.noarch.rpm dd9e5f89926683ec01278f6f61f08ceadfd5041833c4220e1c7b265619515e20 selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm 26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451 selinux-policy-doc-3.14.3-117.el8_8.2.noarch.rpm 26d11647b989995b16ece5dedc1b58881c25019c88b1b48e895dc0f9c4d84451 selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm 42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a selinux-policy-minimum-3.14.3-117.el8_8.2.noarch.rpm 42709415e373b719dd05d16041fd82b5dc5e90c9d8243e742b4bfeef9f76685a selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm 6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032 selinux-policy-mls-3.14.3-117.el8_8.2.noarch.rpm 6762f3e25f7f9474012da46063831e81b81fcf1c0d9cc6e36b0845c7f79b3032 selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540 selinux-policy-sandbox-3.14.3-117.el8_8.2.noarch.rpm cc9920876bf370315c6b7646f5c547d6b2bf53a4bb3242550bd30b02199fe540 selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm 609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70 selinux-policy-targeted-3.14.3-117.el8_8.2.noarch.rpm 609cffecdf4eb34c9f6fbf929c027afa97b9af645d911a1c60335c1a412bcf70 RLSA-2023:3839 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: NULL pointer dereference during rekeying with algorithm guessing (CVE-2023-1667) * libssh: authorization bypass in pki_verify_data_signature (CVE-2023-2283) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libssh-0.9.6-10.el8_8.aarch64.rpm 48cca0d757bcf9c732ea6aba957ae65ca5422f3f3c7f4a7c50697100d1ce425a libssh-config-0.9.6-10.el8_8.noarch.rpm 3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087 libssh-config-0.9.6-10.el8_8.noarch.rpm 3e5d27decdf556d137d933343df069c27646eddc24424daf0a955d734d0a9087 RLSA-2023:4102 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.36-8.el8_8.1.aarch64.rpm a33e745db5a363d574b81c96243bfe44b9a73065f4abfe1b3399de9729ebca87 bind-export-libs-9.11.36-8.el8_8.1.aarch64.rpm c0bdd761e0da985daa1a4a0d374d8b3005678f3b90cdd3ab7d547726cf37bc21 RLBA-2023:4279 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos report collects data from container instead of host due to symlinks    Triaged (BZ#2075720) * sos report --clean doesn't obfuscate all MAC addresses. (BZ#2207562) * RFE: embed Grub's "custom.cfg" and "user.cfg" in the sosreport (BZ#2213951) * Exception raised by hpssm plugin in plug.setup(). (BZ#2216608) * rebase sos to 4.5.5 in rhel8.8 and 9.2 (BZ#2217943) * sos clean - Respect permissions of sanitised files (BZ#2218279) none-baseos-rpms sos-4.5.5-2.el8.noarch.rpm 5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0 sos-4.5.5-2.el8.noarch.rpm 5cd5a9aef2b3a62a5e1a27c419b5113af2b62c3f8323aa8875eedad8343727a0 sos-audit-4.5.5-2.el8.noarch.rpm d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98 sos-audit-4.5.5-2.el8.noarch.rpm d0f18c4d5e5b388aac649b277d7313885af6bbdc61b5ae7d62c3c56d2f487e98 RLSA-2023:4419 Important: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssh-8.0p1-19.el8_8.aarch64.rpm a3223be6d4ce5f839ffa3b080822d39f49a547e7ff552ec17faf0f27d1a37efd openssh-cavs-8.0p1-19.el8_8.aarch64.rpm e88f8bbb386b0afa96ece23103c67eac2dee665ae11e54da4f422688dfb43be5 openssh-clients-8.0p1-19.el8_8.aarch64.rpm d4d6b41657f205f573edd66b8cffa062075f4e2fb5c111a07173ca19441e18c3 openssh-keycat-8.0p1-19.el8_8.aarch64.rpm 7be1e0801cfacbcfef4140e29e62ba27ffdfb034018432700109a4c84d2b3682 openssh-ldap-8.0p1-19.el8_8.aarch64.rpm 2058d3e49f8eaa023f16785b2b0d56976f943b8a7809cd7bc95bd262785a3ded openssh-server-8.0p1-19.el8_8.aarch64.rpm 7d926da278d607ca4790f9f30b7c9bbcb193da975d6a667244eec07f68cab7a6 pam_ssh_agent_auth-0.10.3-7.19.el8_8.aarch64.rpm 6510c82c181c4b8f3c3b77d48988e498295a8e3665753668de0d3f0409da5d75 RLSA-2023:4498 Moderate: dbus security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for dbus. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list D-Bus is a system for sending messages between applications. It is used both for the system-wide message bus service, and as a per-user-login-session messaging facility. Security Fix(es): * dbus: dbus-daemon: assertion failure when a monitor is active and a message from the driver cannot be delivered (CVE-2023-34969) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms dbus-1.12.8-24.el8_8.1.aarch64.rpm 2bc9a54d699aef03e2687ef72fdf526d2b8618056dcb6105884e6c6b8eac3223 dbus-common-1.12.8-24.el8_8.1.noarch.rpm 51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c dbus-common-1.12.8-24.el8_8.1.noarch.rpm 51ab0fbbd3337ca006d0b4febe7f4b916195538845c87a8bbf1dddd9f9962f9c dbus-daemon-1.12.8-24.el8_8.1.aarch64.rpm ca14de2ad6ed84f2aa8bfc02c009fb51eea8264f291cf617b5316ccb7936c996 dbus-libs-1.12.8-24.el8_8.1.aarch64.rpm c9501a8f99e5efbb7fe904fcb97ebdcf651c21c17527e3cf9db90fef2c0ac9ea dbus-tools-1.12.8-24.el8_8.1.aarch64.rpm baf9bb7b9087c1e46b63946c582b2f769329e1249e7affbd9964b391d2f90bd2 RLSA-2023:4524 Moderate: libcap security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Security Fix(es): * libcap: Integer Overflow in _libcap_strdup() (CVE-2023-2603) * libcap: Memory Leak on pthread_create() Error (CVE-2023-2602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libcap-2.48-5.el8_8.aarch64.rpm d44102db00318d277fd18f6810194d13966704b820398bbc7e30cc9139b166f1 libcap-devel-2.48-5.el8_8.aarch64.rpm 0e6f8f1f8c7acea1b1681ce9c52f2a40ad0c65f988249061e5668f95ed9715f3 RLSA-2023:4520 Moderate: python-requests security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-requests package contains a library designed to make HTTP requests easy for developers. Security Fix(es): * python-requests: Unintended leak of Proxy-Authorization header (CVE-2023-32681) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-requests-2.20.0-3.el8_8.noarch.rpm b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0 python3-requests-2.20.0-3.el8_8.noarch.rpm b9245956faa62d6e4dd443679dd3aefd437c2510a3558a4a8772e50c6b5abeb0 RLSA-2023:4706 Important: subscription-manager security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Rocky Enterprise Software Foundation entitlement platform. Security Fix(es): * subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 0c10003d7c57644233e715e5245b5518090d690482cea2f2ea07ef32a9483006 python3-cloud-what-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 86a1e2cf454cdbeab4a3d6002c344bada749291af7d8c1b9e93194677b359b8d python3-subscription-manager-rhsm-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 993fd439312d4fcf6d4ce5b243dd9a6f04db2f508a23717711f9e4ff844eccd3 python3-syspurpose-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm dba06152938b723ab9ea466cae48b92c51007200a45a000cecad4bf065cf3455 rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f subscription-manager-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm d2474678ff6570b9de91e31eee25b788979703f79f60767f3fe52105a3a2a793 subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2 subscription-manager-plugin-ostree-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm a64ba6347fd5f2e2418918fa3401030a5e21fb534db5ea3dfbf557942a6848ab subscription-manager-rhsm-certificates-1.28.36-3.el8_8.rocky.0.1.aarch64.rpm 93b9fb0dd1bf96362f35e54debec1afa04d12f97682c48da7f48fc314e2c3d20 rhsm-icons-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 7424b2d3e9d10f0a1c2c18bfe80b60f635d4dc924a8ac942a67f0574e041692f subscription-manager-cockpit-1.28.36-3.el8_8.rocky.0.1.noarch.rpm 6c04f3fc34a4cc4a8ad23a5ec1f19f496cd4974266d4540e1e17d520f77457e2 RLSA-2023:3837 Moderate: systemd security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd: privilege escalation via the less pager (CVE-2023-26604) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * systemd-pstore crashes when attempting to move standalone files out of /sys/fs/pstore (BZ#2190153) none-baseos-rpms systemd-239-74.el8_8.2.aarch64.rpm 12b64864c252b18bc759b0138e27de3826655d258ce06b9805d63fd45543d2bf systemd-container-239-74.el8_8.2.aarch64.rpm 415dcae3f610c7ee802fef6d0bd60993e5afb5934331da04d78031770dc48603 systemd-devel-239-74.el8_8.2.aarch64.rpm eb22acd7face8d3ff17a05b53cb4df54dc7ca8b7914e22d2c70d5982a1882806 systemd-journal-remote-239-74.el8_8.2.aarch64.rpm 90e48499ab73556caf2b52aa4b397c0829ee946bf196cdf75d3e01d2a9d44c39 systemd-libs-239-74.el8_8.2.aarch64.rpm 703df35a239160a23206dd2c53fc14ef333520244c0a4e5731909f208c294ea3 systemd-pam-239-74.el8_8.2.aarch64.rpm cfe25dd56cdb5c2c8b9bd3f3a71e2af46af190b74ae61ea0ccfc71742611cccd systemd-tests-239-74.el8_8.2.aarch64.rpm 992cbc5400fb73aa244330dd5dea5388377ef8666f0dfd743e587153f6895764 systemd-udev-239-74.el8_8.2.aarch64.rpm 545a84f2b7ba3eefea7a7543f5d596407e7b7253fdcb7fa9fe8615e4abb5de5a RLSA-2023:3840 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Crash due to misuse of window functions. (CVE-2020-24736) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-3.26.0-18.el8_8.aarch64.rpm 6f3a90af1541bcd5a0c2c9f0099706e45ddec86b533129029409831f1fa2291a sqlite-devel-3.26.0-18.el8_8.aarch64.rpm 9acf757ac781490b8db9b6fa16902d2b640b4230a8c949d250c076c35203852c sqlite-doc-3.26.0-18.el8_8.noarch.rpm 37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de sqlite-doc-3.26.0-18.el8_8.noarch.rpm 37bf72b866e31176a58ad1187061e3ce2ade2a2829677ca7d15a2ee3f5b7d4de sqlite-libs-3.26.0-18.el8_8.aarch64.rpm 3794e7cf7525f8e2e317870d8d5f352f15236f732f3c2a6973398f8d8992dad1 RLBA-2023:3841 kexec-tools bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * [FJ8.6 Bug]: makedumpfile fails for crash dumps collected by Fujitsu's firmware dump tool when 5-level paging is enabled (BZ#2189377) none-baseos-rpms kexec-tools-2.0.25-5.el8_8.1.aarch64.rpm 21ee67b67b486ec41e7766825a114c480cfe141e3fffe389836811d97c51dfb5 RLBA-2023:3844 xfsprogs bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsprogs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsprogs packages contain a set of utilities to administer the XFS file system, including the mkfs.xfs utility to construct an XFS file system. Bug Fix(es): * xfsprogs: ignore autofs mount table entries (BZ#2208391) none-baseos-rpms xfsprogs-5.0.0-11.el8_8.aarch64.rpm b2f552c2b4d237b0fbabb1ef9ac2227690a74ce12a9beb7f00600fe6dacd176d xfsprogs-devel-5.0.0-11.el8_8.aarch64.rpm c42a86040d3eff183bc3d2d4129d790a13c76f35519367e136d5e5cb8c411032 RLSA-2023:3847 Moderate: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * RPL-P IOTG/RPL-S IOTG: cpu frequency issues (BZ#2179332) * iscsi target deadlocks when the same host acts as an initiator to itself (i.e. connects via 127.0.0.1) (BZ#2182092) * HPEMC Rocky Linux 8 REGRESSION: acpi-cpufreq: Skip initialization if a cpufreq driver exists (BZ#2186305) * kernel[-rt]: task deadline_test:2526 blocked for more than 600 seconds. (BZ#2188623) * Dying percpu kworkers cause issues on isolated CPUs [rhel-8] (BZ#2189595) * block layer: cherry pick recent upstream fixes (up to v6.3-rc1) for 8.9 (BZ#2193236) * xfs: deadlock in xfs_btree_split_worker (BZ#2196390) * Rocky Linux 8.9 hwpoison: data loss when memory error occurs on hugetlb pagecache (BZ#2196665) * Intel E810 card unable to create a MACVLAN on interface already configured as SRIOV (BZ#2203214) * mlxsw: kselftest case -usr-libexec-kselftests-drivers-net-mlxsw-devlink-trap-policer-sh trigger call trace (BZ#2207564) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208284) Enhancement(s): * Intel 8.9 FEAT SPR power: Intel SST SNC4 support (BZ#2185604) none-baseos-rpms bpftool-4.18.0-477.15.1.el8_8.aarch64.rpm 838418bcf4a958499d37921837f16986d111f02ab47d7aeaae9dc6487b4d270d kernel-4.18.0-477.15.1.el8_8.aarch64.rpm cc9777444b4a47b480eba8d86381cc3727cf43e954d0ebc99907340dd5a2c8f8 kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm 4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1 kernel-abi-stablelists-4.18.0-477.15.1.el8_8.noarch.rpm 4b57da1f93ac79480252481b3447f34b1ff62e9d62d2a0c2d11b691fdd871ed1 kernel-core-4.18.0-477.15.1.el8_8.aarch64.rpm 91b989e39d2548879dc64e23e8377a217c1d4ae68486bf66eda7397f73f862f4 kernel-cross-headers-4.18.0-477.15.1.el8_8.aarch64.rpm b47a59b9f66721193026568988e56276ec559e975a289ed18fa4ab760ee47b3f kernel-debug-4.18.0-477.15.1.el8_8.aarch64.rpm 7d5227f5746cae7b4771a895f032045b4b94dd518d8439b60bdb195e1167645e kernel-debug-core-4.18.0-477.15.1.el8_8.aarch64.rpm 88c26433e2f2f4a09be1a90cc8b281a74ccf6bf582e0896ba5ba1d11e683702d kernel-debug-devel-4.18.0-477.15.1.el8_8.aarch64.rpm 6f61780a348c3c709de07ea301fd9216f1462a858488f68037d603bc6c6004e0 kernel-debuginfo-common-aarch64-4.18.0-477.15.1.el8_8.aarch64.rpm 622ccadf25713195dc6acaf9657018bb926775d6ee4a66011a001c4331d01fe4 kernel-debug-modules-4.18.0-477.15.1.el8_8.aarch64.rpm f9f893d8c25d4e66c77681c88bf481f4631e9213c75e1882717f69d7a5332f9d kernel-debug-modules-extra-4.18.0-477.15.1.el8_8.aarch64.rpm 3862e293e5398fa50d9c1bef02f3fdc7718b16af5b9074958a15675721e55b35 kernel-devel-4.18.0-477.15.1.el8_8.aarch64.rpm 892eb95f535581425bc9dd233f41778a7c2cce1811e051cf4e1d641fecada343 kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm 043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd kernel-doc-4.18.0-477.15.1.el8_8.noarch.rpm 043697866fe6d669b7208572774446c3534f6783578414487bf872ee7ecb10bd kernel-headers-4.18.0-477.15.1.el8_8.aarch64.rpm 53007214fbc1b8cd422556ccc9f7e07a505a32c8c36e3f2f166117f05bd34567 kernel-modules-4.18.0-477.15.1.el8_8.aarch64.rpm 58a752a444fca124915e1c73883bec33a654c277ecaf9999b53d19cb972eea40 kernel-modules-extra-4.18.0-477.15.1.el8_8.aarch64.rpm aa59ca6575b65207a522019787929a4bae300cef8c4dcf2e7862eb03f280532e kernel-tools-4.18.0-477.15.1.el8_8.aarch64.rpm e12a80a1ce326c29df9fd738e636dfbe0ed1ac57fbeeaa339ec8cbcd04968792 kernel-tools-libs-4.18.0-477.15.1.el8_8.aarch64.rpm 9240544691100cb13bcf85a719c4c35646cb7f387c2339d67fd1ad86ca3c9625 perf-4.18.0-477.15.1.el8_8.aarch64.rpm 9402916d3bab92d8756cf211aeadbcae3f3d5c3f836e861f6df2e98036f8f0c6 python3-perf-4.18.0-477.15.1.el8_8.aarch64.rpm 012f575753263b18be2527a1521fcb028694df10d16fded2ae52dd03702e7e72 RLBA-2023:3848 autofs bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * autofs fails to start with combination of +auto.master and local direct map lookups after upgrading to 5.1.4-93.el8 (BZ#2212588) none-baseos-rpms autofs-5.1.4-102.el8_8.2.aarch64.rpm 65a03c725eded657b6638f400753f32cc12964823101bafdae6a06ebc0b92b3d RLEA-2023:3849 iproute bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iproute packages contain networking utilities, such as ip and rtmon, designed to use the advanced networking capabilities of the Linux kernel. Bug Fix(es): * macvlan: Add bclim parameter (BZ#2209687) none-baseos-rpms iproute-5.18.0-1.1.el8_8.aarch64.rpm 3468909070ca2016b684abfe130816331c2af966d88d968337f005e138175512 iproute-tc-5.18.0-1.1.el8_8.aarch64.rpm f2846127ac16787c2ff6bd8645191d00518c1d58b687abfc4f789e1b20f51fc9 RLEA-2023:3850 krb5 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * CVE-2022-37967: MS-PAC extended KDC signature (BZ#2211390) none-baseos-rpms krb5-devel-1.18.2-25.el8_8.aarch64.rpm 303a386cfd445ce9c2fbb184f13d00bf88fb13ca4a28d9627db3b869c0f22705 krb5-libs-1.18.2-25.el8_8.aarch64.rpm a09732c284b329751c8c6e1a0a6d170f00b74ee781c0c18f0cad198364efba7e krb5-pkinit-1.18.2-25.el8_8.aarch64.rpm 371d7f650e5d586da5987c555717f42fa92540c7f87558ea486034a596799ef4 krb5-server-1.18.2-25.el8_8.aarch64.rpm 66c196c29e549a5ec16fcf7e029d7b88661a72a372209e2980f5ba0ca9d13e73 krb5-server-ldap-1.18.2-25.el8_8.aarch64.rpm f3700277d56298f5749fa9324568666162e85546d2f6f4b3b7ebb32e952a4dae krb5-workstation-1.18.2-25.el8_8.aarch64.rpm 44cbf1fac60ee038a334602b33218864c81a86dad059d889320a94f096f749d8 libkadm5-1.18.2-25.el8_8.aarch64.rpm 1fc3f6f30a2ae2b19034e0cfd09eb059f40a7a89d3b9b7c976e1167e09453ab6 RLSA-2023:4864 Important: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.2.6-51.el8_8.1.aarch64.rpm 0b1c3528da55d897ab1ca144b78fcadbf4dfa55e8cebc095793aa3fda93a9528 RLBA-2023:4880 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * The sos report does not gather /etc/grub2-efi.cfg when present. (BZ#2218563) * Add ovn-ic related changes for OCP 4.14. (BZ#2226682) * [rebase] Release sos-4.5.6 to 8.8 and 9.2. (BZ#2226724) none-baseos-rpms sos-4.5.6-1.el9.noarch.rpm 6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3 sos-4.5.6-1.el9.noarch.rpm 6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3 sos-4.5.6-1.el9.noarch.rpm 6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3 sos-4.5.6-1.el9.noarch.rpm 6e76ee567dfe8338aeeaf096ae871f8a2e4974fe59dd5f2337d666e2df8cb7e3 sos-audit-4.5.6-1.el9.noarch.rpm c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310 sos-audit-4.5.6-1.el9.noarch.rpm c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310 sos-audit-4.5.6-1.el9.noarch.rpm c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310 sos-audit-4.5.6-1.el9.noarch.rpm c800188c02fe91f1ac8f5596cbd8a6dc404b21b737acdc628891f16692956310 sos-4.5.6-1.el8.noarch.rpm f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7 sos-4.5.6-1.el8.noarch.rpm f47f98ca59d2b49077d1894cd6e92df557dbfc2edcd8d3f66dddfc8652e7f0f7 sos-audit-4.5.6-1.el8.noarch.rpm 56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987 sos-audit-4.5.6-1.el8.noarch.rpm 56078dba10109b53639db2f7da13d8fdb2ef539f9b609f1ee496b714ffeb2987 RLSA-2023:5244 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() (CVE-2023-4004) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * low memory deadlock with md devices and external (imsm) metadata handling - requires a kernfs notification backport (BZ#2208540) * Intel 8.9 BUG, SPR EMR FHF ACPI: Fix system hang during S3 wakeup (BZ#2218025) * OCS 4.8, cephfs kernel crash: mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218271) * st_gmac: tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219907) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221010) * avoid unnecessary page fault retires on shared memory types (BZ#2221100) * enable conntrack clash resolution for GRE (BZ#2223542) * ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (BZ#2224515) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227073) * Important iavf bug fixes July 2023 (BZ#2228161) * i40e error: Cannot set interface MAC/vlanid to 1e:b7:e2:02:b1:aa/0 for ifname ens4f0 vf 0: Resource temporarily unavailable (BZ#2228163) * oops on cifs_mount due to null tcon (BZ#2229128) * iptables argument "--suppl-groups" in extension "owner" does not work in Rocky Linux8 (BZ#2229715) * Hyper-V Rocky Linux 8: incomplete fc_transport implementation in storvsc causes null dereference in fc_timed_out() (BZ#2230743) * Withdrawal: GFS2: could not freeze filesystem: -16 (BZ#2231825) * Rocky Linux 8 Hyper-V: Excessive hv_storvsc driver logging with srb_status SRB_STATUS_INTERNAL_ERROR (0x30) (BZ#2231988) * Rocky Linux-8: crypto: rng - Fix lock imbalance in crypto_del_rng (BZ#2232215) * Intel 8.9 iavf: Driver Update (BZ#2232399) * Hyper-V Rocky Linux-8 hv_storvsc driver logging excessive storvsc_log events for storvsc_on_io_completion() function (BZ#2233227) Enhancement(s): * Intel 8.9 FEAT, EMR perf: Add EMR CPU PMU support (BZ#2230152) * Intel 8.9 FEAT, SPR EMR power: Add uncore frequency control driver (BZ#2230158) * Intel 8.9 FEAT EMR perf: RAPL PMU support on EMR (BZ#2230162) none-baseos-rpms bpftool-4.18.0-477.27.1.el8_8.aarch64.rpm 1626b225490146531be107e984a802e530aee80f768b475ba5974bea23240b4e kernel-4.18.0-477.27.1.el8_8.aarch64.rpm 424eac8970397470516a01ee933b4a794b4c66ca889e54e6fa9ab752dfc34830 kernel-abi-stablelists-4.18.0-477.27.1.el8_8.noarch.rpm b55ead5c3ec3fb22192360a9fd9abf0cb41a072cca633990ad61d65d47c41e48 kernel-core-4.18.0-477.27.1.el8_8.aarch64.rpm 8194df20ebc17923fa54ce2918116fe807cbf61654c233e4e238a739d6f0faa9 kernel-cross-headers-4.18.0-477.27.1.el8_8.aarch64.rpm 31a8bb2e7ab7003d43d5aa293f2501640aea11a29ba1049af9fc36926afde1f7 kernel-debug-4.18.0-477.27.1.el8_8.aarch64.rpm f791e361137c5e4074ae1d9f94e9e0e57ef946098eef6c9b92aa3b0506a1833e kernel-debug-core-4.18.0-477.27.1.el8_8.aarch64.rpm 39718514d3f0c551990e5f125c1a69b1047f648c6e1436ec13beb5a4238be082 kernel-debug-devel-4.18.0-477.27.1.el8_8.aarch64.rpm 4ac61bd29099d89c64d09e11c60daf869b2d4bbd31b0e9250d86d883c4272a70 kernel-debuginfo-common-aarch64-4.18.0-477.27.1.el8_8.aarch64.rpm 7923ba970f5a9bb04ac4529924d04f8b70f61a59e58f6719a56e329bebfd8863 kernel-debug-modules-4.18.0-477.27.1.el8_8.aarch64.rpm d3af0cc70df6b4d71fc629fa819ee257dbdd0a9a6edb11e285d17a2523cb85ff kernel-debug-modules-extra-4.18.0-477.27.1.el8_8.aarch64.rpm 207b436f601be074c9e6e37f484d07d944d5b8baaac2622e4f001035dd033eec kernel-devel-4.18.0-477.27.1.el8_8.aarch64.rpm 30ae657eda52000c5cc1669db0b4c61ed9a0910c42439d1db468cf9393293718 kernel-doc-4.18.0-477.27.1.el8_8.noarch.rpm 349f57059306e84dd0facbd099645432eb38cd34e6ef15131e8a3183da3182c7 kernel-headers-4.18.0-477.27.1.el8_8.aarch64.rpm 4ee16f3008ad395a48365ccceecab2080c64855fac5007f5428c69c5ecc0f051 kernel-modules-4.18.0-477.27.1.el8_8.aarch64.rpm 031d1748ad3b2daeb42f2e2b4540389bdb7f7064cca5aad39c0e08c8319db6e9 kernel-modules-extra-4.18.0-477.27.1.el8_8.aarch64.rpm b6d16f7d4aab836564f3e40baf90f7f99ea0f45a5d0d8929187a83c0be6c03cd kernel-tools-4.18.0-477.27.1.el8_8.aarch64.rpm aa5fc96f035c951dbbbb2a441a5979de9678f8da7c2d7a597fc4def906345b2a kernel-tools-libs-4.18.0-477.27.1.el8_8.aarch64.rpm 54f41431526d42d659d6dd41178470ef14178ac075c1672ba8dce67423cb1f57 perf-4.18.0-477.27.1.el8_8.aarch64.rpm ef7e36b1efc341408dd5a60872605af92c21437b910dbd23e619a997b3c7b64a python3-perf-4.18.0-477.27.1.el8_8.aarch64.rpm 3efe05807c5b4769dec4b283ccb06ad82c0f2fbd0d1a3ba752fbd615bc95fdd1 RLBA-2023:5250 findutils bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments. Bug Fix(es): * find not obeying option -ignore_readdir_race (BZ#2232514) none-baseos-rpms findutils-4.6.0-20.el8_8.1.aarch64.rpm 54973f0cc1bf93ab38688fe78cbb8e07f700695ca28f5412fd8929c55c11e2f6 RLBA-2023:5354 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Adding Huawei UltraPath commands to sos package (BZ#2187407) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2217906) * sos: Python tarfile extraction needs change to avoid a warning (CVE-2007-4559 mitigation) (BZ#2218873) * Discovery plugin no longer captures data. (BZ#2222134) none-baseos-rpms sos-4.6.0-2.el8.noarch.rpm 9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f sos-4.6.0-2.el8.noarch.rpm 9217d56c722350a4c2fcf26c9ddeec2a08b2bef49c2c5263bc7c0970508bae9f sos-audit-4.6.0-2.el8.noarch.rpm 67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c sos-audit-4.6.0-2.el8.noarch.rpm 67423124c974cf93feee2d9371a89ecfd17ca923daecb0889b9d6b297dfc4c4c RLSA-2023:5455 Important: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in ld.so leading to privilege escalation (CVE-2023-4911) * glibc: Stack read overflow in getaddrinfo in no-aaaa mode (CVE-2023-4527) * glibc: potential use-after-free in getaddrinfo() (CVE-2023-4806) * glibc: potential use-after-free in gaih_inet() (CVE-2023-4813) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-225.el8_8.6.aarch64.rpm 2cc78adf103748a4f5f02662f7a01672175f8667c780862e652075ab4001bba6 glibc-all-langpacks-2.28-225.el8_8.6.aarch64.rpm bd77930d162554adc259af530034917bf0313e444f92e44d76e2d9dd020191e0 glibc-common-2.28-225.el8_8.6.aarch64.rpm 05907dd4a51b34685a7dbd768ada66cb45713568bc8163a3c7972968b60122b1 glibc-devel-2.28-225.el8_8.6.aarch64.rpm 0a1cedeb2444a3ebdd87db089c9177a3941bc59301900118f9b6b9de2ec135b0 glibc-doc-2.28-225.el8_8.6.noarch.rpm 0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529 glibc-doc-2.28-225.el8_8.6.noarch.rpm 0d2c33d3ad73b6049df6396e1691aa379ded166ada58801e971528be28ab0529 glibc-gconv-extra-2.28-225.el8_8.6.aarch64.rpm 7c439caba78dbb9ac1e20c193ea3c0cf54ecd6c3cbe2b57c0a45c73504c616ae glibc-headers-2.28-225.el8_8.6.aarch64.rpm 3ab9b0357188c80dcd34232e2cbfbfd02b665078f09bbb81762626ae9ceccbf9 glibc-langpack-aa-2.28-225.el8_8.6.aarch64.rpm 2f4620f7616cae8a3f5aea3d9fd6d698dff81d7937799caf0608ca95d87c8e42 glibc-langpack-af-2.28-225.el8_8.6.aarch64.rpm 4f770cdd9da31c8c3c6ffa0f295d78d3de1ced016134abc57baa4d11ab0a6240 glibc-langpack-agr-2.28-225.el8_8.6.aarch64.rpm f3c347203147a342270281bd6a2299848c44a2d625a32a740cc847b9c3411ce5 glibc-langpack-ak-2.28-225.el8_8.6.aarch64.rpm 0a958ed917b26fc6551e734b15d03788f0b5aca18f0ed7c9bdcaa0a757efdeaa glibc-langpack-am-2.28-225.el8_8.6.aarch64.rpm ee767d3b08107d120162d12628f38ffb0eb6dd60e6568c10c99d2b1859f171ec glibc-langpack-an-2.28-225.el8_8.6.aarch64.rpm 18fcae3d693832bc22dd4e2f04f32994442634db53ef736431be040b7f77550b glibc-langpack-anp-2.28-225.el8_8.6.aarch64.rpm 61230608471f566344cd995949a7cb6cb4e9e1ac8c8c4562130c45f5376d86e1 glibc-langpack-ar-2.28-225.el8_8.6.aarch64.rpm 079be322488a9b361bae78262eb0f0b24b0cfe1590ec02aa55a4582e3db7c1c7 glibc-langpack-as-2.28-225.el8_8.6.aarch64.rpm 992c0552f4941df191c454d2cab850e272ad84189a198627d6268ed6b35f6947 glibc-langpack-ast-2.28-225.el8_8.6.aarch64.rpm fa0591fdce2353e086580942c793845628ec65cb0fc2964b8f4e1c97674dedc3 glibc-langpack-ayc-2.28-225.el8_8.6.aarch64.rpm b77e25a034b369e1f426952d98f1ae7053c7ff653b63ab802ed7c3d95d347f6a glibc-langpack-az-2.28-225.el8_8.6.aarch64.rpm b7d4d067d48be5ffa6ffb8e0cf25f65a82481592dbac0fad7daab19cbb16228b glibc-langpack-be-2.28-225.el8_8.6.aarch64.rpm 5e9dff2177d1c80f4170a9a67f6b5f073fd8675d35916f1a9db2ec001ee4da08 glibc-langpack-bem-2.28-225.el8_8.6.aarch64.rpm 8452cb375438923f04b7024a0abfad6e586ab3e1a785a8320a36e5aa28e278bc glibc-langpack-ber-2.28-225.el8_8.6.aarch64.rpm 5ec3c620622b607817997d528ecc04cb85c67b8323dba0bdbed7eef9df68c50c glibc-langpack-bg-2.28-225.el8_8.6.aarch64.rpm a3f2eca75183288d936b588a4c3ed4dbdeeaa74056a90f25dc6b5ae7d8e06c04 glibc-langpack-bhb-2.28-225.el8_8.6.aarch64.rpm e61f9c66e4e2f9801a25655dabf1df76c04668c4dea786afe2f28943f5304913 glibc-langpack-bho-2.28-225.el8_8.6.aarch64.rpm 155923cdf022f3d3acf3037710324e9ece8cb5f3e1f87e665c83184e0b92cf17 glibc-langpack-bi-2.28-225.el8_8.6.aarch64.rpm fe644ac2fb64ba69aa7c398dac17ae92587de03292943ecdc6fb6cbe8b53aa19 glibc-langpack-bn-2.28-225.el8_8.6.aarch64.rpm 8087297c24c3eed1a13312f2f95dc5ceb220d5b3ad674a318159d30c3e09b13e glibc-langpack-bo-2.28-225.el8_8.6.aarch64.rpm 744dd992219e02155a2d2f52c7669b8126f2913de39fe70aaba7cc8a9bc94cbd glibc-langpack-br-2.28-225.el8_8.6.aarch64.rpm a949ffc5fc423a56a2a3509af6454f558268d81ea922df55455cefbb7a5d633d glibc-langpack-brx-2.28-225.el8_8.6.aarch64.rpm 6ed093a8bf5e6fb493658d188668f531af2a9d4e7c850857c3c235a7bd76dcc0 glibc-langpack-bs-2.28-225.el8_8.6.aarch64.rpm b29942942950d74bfbd75050dc2af3d4a3f6cd14992224066050fc967e212114 glibc-langpack-byn-2.28-225.el8_8.6.aarch64.rpm 9f8f74f7ba35601b1064914648d0bfa031755277cd8febfe9942e0723ef9a47e glibc-langpack-ca-2.28-225.el8_8.6.aarch64.rpm fc7f09af9c090c6d75f3cdb1e2fb0d77deb9ceaed72ae5ca5af035e2ee1e80e3 glibc-langpack-ce-2.28-225.el8_8.6.aarch64.rpm 40c4b24f59214f0f1a6b06c4e329f6dacc31339a31ac428509760792e8ae14bf glibc-langpack-chr-2.28-225.el8_8.6.aarch64.rpm f141b4962c5b014597416a94072e6e3fd07447abf6568833e0d0b93a6f3c3103 glibc-langpack-cmn-2.28-225.el8_8.6.aarch64.rpm 0e8019a092f56d86799bac4dc893b1a1649539e782f6b7629e74790540c4c871 glibc-langpack-crh-2.28-225.el8_8.6.aarch64.rpm d2460a15321f4d728d311bafb762b49c266dc27010fadf29e59aef23059bbc89 glibc-langpack-cs-2.28-225.el8_8.6.aarch64.rpm 309e64c3381f0902ac8605ac368ac7bfc4e3a71cd39b92cb917ce7762f01a1ac glibc-langpack-csb-2.28-225.el8_8.6.aarch64.rpm 397de45337892a38ab79175b6e016836217b28fc17063265ebbfe6eb01f7228e glibc-langpack-cv-2.28-225.el8_8.6.aarch64.rpm 8b63e1fcce332368bb12dbf801145171c83d62e3c0178a063951183e5e943386 glibc-langpack-cy-2.28-225.el8_8.6.aarch64.rpm 720660869e85260c90d45bf4c8f2fb94adcd63055039e0d1a068cd5d675ec74c glibc-langpack-da-2.28-225.el8_8.6.aarch64.rpm 763ec481244d4d1ba712007b939f3c4f02cc293ec3dcc9c24e593d7f1c271c6f glibc-langpack-de-2.28-225.el8_8.6.aarch64.rpm d74a7eaf966dc94171237531b71d6afd3b64c79e3b4420aacc90343cd1c36008 glibc-langpack-doi-2.28-225.el8_8.6.aarch64.rpm 8672c44ba0695784f1d74e4c9685e04475e030d32b6f4e957bbcad13a8f2b163 glibc-langpack-dsb-2.28-225.el8_8.6.aarch64.rpm 390bae62aaed7aca980a6932ce2865fac5624a11a23556223735bbe3f1a5246a glibc-langpack-dv-2.28-225.el8_8.6.aarch64.rpm 122bfab927300c0910b2adb9c5d4ececee13e66e0de0f2dd68241b8d3836e23a glibc-langpack-dz-2.28-225.el8_8.6.aarch64.rpm c65a515ef1891c6ea24ccabbfcb32117758887ac694a64b0bde256405ebae533 glibc-langpack-el-2.28-225.el8_8.6.aarch64.rpm a80eeb234444acf79ee75f17b364bc3d11e53e91855841f3961b016418b02c93 glibc-langpack-en-2.28-225.el8_8.6.aarch64.rpm 86d13a099c963b22d4c747df8500567be2889b48c8c95fb2e2a1ed2bc356bb3f glibc-langpack-eo-2.28-225.el8_8.6.aarch64.rpm d5f9282a40e7429d97729cf4e6deb1c142bf25b6e74d54dd5f8439329952ce53 glibc-langpack-es-2.28-225.el8_8.6.aarch64.rpm 58b3f442d764a543d80e0e4fdde5f7c7f6f79dfe651a6c8eed385d936e51afbb glibc-langpack-et-2.28-225.el8_8.6.aarch64.rpm b4f0ad77f8c2cbe041c38220b5d70148bea955a9e7459c31fa1ad6999dfa51c8 glibc-langpack-eu-2.28-225.el8_8.6.aarch64.rpm c940ea2cbdc76edd7d88824abd9bf481a9bcd158f1e2bc0923cb27e89c026aeb glibc-langpack-fa-2.28-225.el8_8.6.aarch64.rpm 9b5eb2b6e64c0bd45b13802a82270eeff6b9c723569954416c7793195fc6cc44 glibc-langpack-ff-2.28-225.el8_8.6.aarch64.rpm 679977d3ca0cc31b51276432952718c17dda08e3c1305a690a9eb03c8bf6a7c9 glibc-langpack-fi-2.28-225.el8_8.6.aarch64.rpm 9ec0f14bde2bfd5f7a4542193180e496c997d6d5b6fff7ef544cc7d639a45d52 glibc-langpack-fil-2.28-225.el8_8.6.aarch64.rpm e405050c4d540ff69296cfa3049e811bca944eea5aab20b5fe90f702ef61e2a3 glibc-langpack-fo-2.28-225.el8_8.6.aarch64.rpm 8aa4c96c00e4d97bde520ace99ec27a6821546535ed59fdcd96b215f3c6bbb41 glibc-langpack-fr-2.28-225.el8_8.6.aarch64.rpm 3ee3a456edb161cab315b2f0d18aa696520eb1d36fb1c53341993eeac033a029 glibc-langpack-fur-2.28-225.el8_8.6.aarch64.rpm 8a94fe9af4d280b9c4e517fd38cc1775763ef9b23adaec54253fd5e46c276d60 glibc-langpack-fy-2.28-225.el8_8.6.aarch64.rpm 7aeb60fa9f23fa9b210aa7cd362cd9057b9fe35b89bc2fe47e27f70539523375 glibc-langpack-ga-2.28-225.el8_8.6.aarch64.rpm c1386d744ab9df45ba553624b66de0b81fb0fd1d2d7a864fc672e33f6930f808 glibc-langpack-gd-2.28-225.el8_8.6.aarch64.rpm ae2f297f8435a6c7dd8a437e7292ca8c36c43269308b5ec9e41eaee875208233 glibc-langpack-gez-2.28-225.el8_8.6.aarch64.rpm 52d5c15fd0957bdc4c5b3009a13439d17754ba183781082211702c76a9271c90 glibc-langpack-gl-2.28-225.el8_8.6.aarch64.rpm 05a3cf13abc5a5c000052777e66ef61e7de3f36b41d9d727e44f5c2a19d886f2 glibc-langpack-gu-2.28-225.el8_8.6.aarch64.rpm 4144c6c868659ccc1b76a6f8fa2f6abd6e14a9deea4f4a1caf8a5e6b5131ce8f glibc-langpack-gv-2.28-225.el8_8.6.aarch64.rpm bfcfe839052ead86a5362ebf5702077eb4eee3a20fa3f268d70f6e8779626ae1 glibc-langpack-ha-2.28-225.el8_8.6.aarch64.rpm 24248f8108bc252c3fa67cf57d1868dc46e2e343c43d474218686e909dd4e8e7 glibc-langpack-hak-2.28-225.el8_8.6.aarch64.rpm 4624a3ca819cb6349d82089bc6fadc1de6b1c60d8b3f739da87716f5f41c61ff glibc-langpack-he-2.28-225.el8_8.6.aarch64.rpm 4f7ed0e4ad20b4b91e0ef98c44ad69a330d5205b3aeacdb1301df00cd369cba5 glibc-langpack-hi-2.28-225.el8_8.6.aarch64.rpm 463e44fc3c63c728d54dba1bdef332fa5ba5e3f7df4ee3c2ba8eb09a864c7373 glibc-langpack-hif-2.28-225.el8_8.6.aarch64.rpm 6cd14cbb7aa5b14e775fad6843fba56f67c01565772c6c9b26eed78fda1f15cc glibc-langpack-hne-2.28-225.el8_8.6.aarch64.rpm 89204cc6a32089afe4bdde39ba6f07c2431657abc031c5d22d9328c0878f04fe glibc-langpack-hr-2.28-225.el8_8.6.aarch64.rpm 40dbb23ce14a5c74faf761373038dabbf6fb00fbde80c3f2529ce0c9c91a0430 glibc-langpack-hsb-2.28-225.el8_8.6.aarch64.rpm 8b385ca155c16c05702cf775bc53aff6d89ba554e744d42e369abe400a775dd6 glibc-langpack-ht-2.28-225.el8_8.6.aarch64.rpm 2b86a05b5d88ba7dae8f1e4229d2f3e0b43405bfa133134a6f30e558c2f9b429 glibc-langpack-hu-2.28-225.el8_8.6.aarch64.rpm 6b63a45252c2b69a229946f08022e82016598ef687aa267d6aee4d72bc7e4142 glibc-langpack-hy-2.28-225.el8_8.6.aarch64.rpm a02cbd824d913ad91ec1f0c1efe3602889d7a2a342356345796ce1b1876b5966 glibc-langpack-ia-2.28-225.el8_8.6.aarch64.rpm 8225fe915a68429fae68e3815155efaf6d44110e653258004eb653c311d28270 glibc-langpack-id-2.28-225.el8_8.6.aarch64.rpm aec145fb56c323e5f4f6d3e16e45346246674b4459df1c1a7d772d4f63f12411 glibc-langpack-ig-2.28-225.el8_8.6.aarch64.rpm ca1a079e466cf3b758caae05b90d9557a5e3d8bb4e1f293ac92f8d88aebaa02b glibc-langpack-ik-2.28-225.el8_8.6.aarch64.rpm 8d84f9cd9f699cfa80a4466b4977ad9822fd2cedcd50085c3134b05861910aaa glibc-langpack-is-2.28-225.el8_8.6.aarch64.rpm e6b12e61e28f75218ed45f2384dbe04ae8d540894bafb5f9630405bed16af547 glibc-langpack-it-2.28-225.el8_8.6.aarch64.rpm af9f4f3568fff5d54aa7a653d22af347f39a040c651825a4293d1f6a73b7dc5f glibc-langpack-iu-2.28-225.el8_8.6.aarch64.rpm e1944f52cc87245c439527a880f287fd12d5b9abe3eddbd5816c0d985a457cf4 glibc-langpack-ja-2.28-225.el8_8.6.aarch64.rpm edee9a329fa620a834266623bf54d1e76ba6aedcc386b606183cab67d8cfc490 glibc-langpack-ka-2.28-225.el8_8.6.aarch64.rpm f5ec83c02e5e24943d06d2e2b3b651018f8eabca03b528189748e3825e72d356 glibc-langpack-kab-2.28-225.el8_8.6.aarch64.rpm d6f13e15ccb219a3c6ccb626a614be5b3a74d1832478b1d44da47f96669bcff7 glibc-langpack-kk-2.28-225.el8_8.6.aarch64.rpm 5840b3c02e398e5864a30dd72c67db09edeb2ec7d8934b17b675c21c3ae04c68 glibc-langpack-kl-2.28-225.el8_8.6.aarch64.rpm 675c4f81b57b0d21d4dd161c4f9c407d3e59239b7980ad6d61b1d6cdc73addc9 glibc-langpack-km-2.28-225.el8_8.6.aarch64.rpm 318fd06a06df617cf3b38e207371584f704b25d2e8ca084fb3fbfbbbb716e8f7 glibc-langpack-kn-2.28-225.el8_8.6.aarch64.rpm d5696f839d81e1e16bceab299cf7aea8463f7ee4c930ba20eb803decf7cde698 glibc-langpack-ko-2.28-225.el8_8.6.aarch64.rpm 752dfffa04d6d5e2e3e3c378467c9f37888581e1e1d1c631d965e5ac914cecce glibc-langpack-kok-2.28-225.el8_8.6.aarch64.rpm e2f670b502d27acb91d0b76f26e1c3a780f7cd2f10c4c73e9532a88b2c272f53 glibc-langpack-ks-2.28-225.el8_8.6.aarch64.rpm 0af051b36144bcfeb2dfaeea8d60b6ba3b25840e08a982ca5189b1ab62609b79 glibc-langpack-ku-2.28-225.el8_8.6.aarch64.rpm 5c6adc5f4224b05aab12d3ec6dd2b23ae5d3ce078ab5651cd17a1c86ffb62e5b glibc-langpack-kw-2.28-225.el8_8.6.aarch64.rpm c69e3330265088e19b5fbb2cc68067077ced4ff1ad1c3fca591f5ee275c4df2c glibc-langpack-ky-2.28-225.el8_8.6.aarch64.rpm 35a191dd66bc7e7eae4bb16ff186c044693f3478531f34d58744583f01e3bb09 glibc-langpack-lb-2.28-225.el8_8.6.aarch64.rpm a16c336ab855b8ad90e4dd54cef495fe0cc85d1a2b12dde66a620fb739b7dacd glibc-langpack-lg-2.28-225.el8_8.6.aarch64.rpm ff21b3df964249998b13968e3d4bb6fd3e6e6442369c590033b57edc10dfafbc glibc-langpack-li-2.28-225.el8_8.6.aarch64.rpm a3bc84c4c24b83f16a3ee292f4576f37912a42fc79deeffe4565d43dcd6c8e25 glibc-langpack-lij-2.28-225.el8_8.6.aarch64.rpm a5bc6c699148f95c3dbee763aa236e5dcad2bc8ba43781308036b304c9beb6ff glibc-langpack-ln-2.28-225.el8_8.6.aarch64.rpm 474e395c23f4102425acc7d01dd1b8ffc8ad3e60b5936c42131bd3036eda2ce1 glibc-langpack-lo-2.28-225.el8_8.6.aarch64.rpm a035bc14723815bea32384be89f751058e9eb270ef7f5cbd69795b3cd88482c6 glibc-langpack-lt-2.28-225.el8_8.6.aarch64.rpm aaeb923436c9597f9ccf75e05b3d7284796d6a94d16f8793ea28fb76c4adb30a glibc-langpack-lv-2.28-225.el8_8.6.aarch64.rpm 44154dd0d9ac7dbd92794d195480b9d7fb2235825df8614663edbfd0a8597ee2 glibc-langpack-lzh-2.28-225.el8_8.6.aarch64.rpm 73fa00c96d7e96523f716376e1523c6796f6ec0a9901b220301b61f186232acc glibc-langpack-mag-2.28-225.el8_8.6.aarch64.rpm d7e07a713097c9e9c4fe794315443d87d65d75786dc8c802dec10b251f3a77e0 glibc-langpack-mai-2.28-225.el8_8.6.aarch64.rpm 230e7adfafd4cd68122dabe5c923424df09451be7feed52fef85a03a55b8d0b5 glibc-langpack-mfe-2.28-225.el8_8.6.aarch64.rpm 799bb5e6402778480793a8eb40d774f71afc2119e868c6a5fa91d7775a75fb53 glibc-langpack-mg-2.28-225.el8_8.6.aarch64.rpm 8e3b76115d68af55a06951b2f26e7c1167252f08d21e53817b2d895cfde6211f glibc-langpack-mhr-2.28-225.el8_8.6.aarch64.rpm 9b322a0ee9695c49ee27cb2e4604cd3d4a77164f3777c22861eac1e1587051d5 glibc-langpack-mi-2.28-225.el8_8.6.aarch64.rpm a5b698707c852d2f8ccd6dde43f8313dc208560b208fb9d6e21ee9edb249bccb glibc-langpack-miq-2.28-225.el8_8.6.aarch64.rpm dddcd2fe242aeefd0f14486edf6eeb7bb812878c00e1b8197d6f0f16de1a06c6 glibc-langpack-mjw-2.28-225.el8_8.6.aarch64.rpm e952eee02669c4ec0ff89d16c2f8684bd10758e23b5ebea4f2a00b1919e30207 glibc-langpack-mk-2.28-225.el8_8.6.aarch64.rpm deed382cead39f5498872db5b5c4d9971132690d612bb8408cd7b546f1397d2a glibc-langpack-ml-2.28-225.el8_8.6.aarch64.rpm cb0217748d6531938dd0e725ac0288137ed264ead75b048beb9952340e52cdc9 glibc-langpack-mn-2.28-225.el8_8.6.aarch64.rpm fe5d46ae2a5befbbd9719e2c2d0e49217ec7358c133473aef34781850bdb7d12 glibc-langpack-mni-2.28-225.el8_8.6.aarch64.rpm 0cba015bb7ff3707b57e95b0aadd78b32438c0c8c2bc76c02244c2aeb9003df6 glibc-langpack-mr-2.28-225.el8_8.6.aarch64.rpm 6212e798dbe22808198a5b4f2471b87cff6cb223b94e58b05611b086ee1117f7 glibc-langpack-ms-2.28-225.el8_8.6.aarch64.rpm 3f8b7f03eadba286c602ebf27d7580aabf5b9381fae445143aa90cf32177a557 glibc-langpack-mt-2.28-225.el8_8.6.aarch64.rpm 5985a6ec8ad89ab9ec473a9987550933759f21660915cb5906b39afe10037ba1 glibc-langpack-my-2.28-225.el8_8.6.aarch64.rpm 97c9be48ff03cc8f970651adc945a93640a94c3fdf1252a5670eda3308289a1e glibc-langpack-nan-2.28-225.el8_8.6.aarch64.rpm f5429c2a79fc13207a1d3500a8a0989aa8e39dd2b0b644091c4e18d7d1a8fe8c glibc-langpack-nb-2.28-225.el8_8.6.aarch64.rpm 517a54bcf399afc8aad5748ffce174303eda9196a6b897ae94a2807b0c386bf3 glibc-langpack-nds-2.28-225.el8_8.6.aarch64.rpm 22d61802fea0764eea1ca53cf91bf5d18eb69bca4400ffb2996da7e97508fc71 glibc-langpack-ne-2.28-225.el8_8.6.aarch64.rpm 9cf00d0136260002af45cb878381de43efca21c3e3a1333910f5bc91b24ed2e0 glibc-langpack-nhn-2.28-225.el8_8.6.aarch64.rpm 8ec90035a9e5329d901b38cd11201eccdf3df914729dbcba84a01fdfe6b7ab74 glibc-langpack-niu-2.28-225.el8_8.6.aarch64.rpm b81131bfd6449d18915bb4add27738a6869f1a0e168a99a5b8648dc801c8a6d5 glibc-langpack-nl-2.28-225.el8_8.6.aarch64.rpm f5a70d358729bb90948c93cd2cb6750a47fd028dbb48dde57f64f698440c15da glibc-langpack-nn-2.28-225.el8_8.6.aarch64.rpm 5fb5c1d41d37402be129314f0711d4d9ec498642647c2c39cd10b91716eaf0f2 glibc-langpack-nr-2.28-225.el8_8.6.aarch64.rpm 16d15591c7f31296215588c40be150a14332561e82df81d14138f7d55544f43b glibc-langpack-nso-2.28-225.el8_8.6.aarch64.rpm 49fbbfce1636890f0d1f6d3cb00c7cf49402baa72192e919430794c5b066586c glibc-langpack-oc-2.28-225.el8_8.6.aarch64.rpm 007ef3e70bb2dbcb9451ced8979f103718c4ecde4e38b9e68586a7539b10c836 glibc-langpack-om-2.28-225.el8_8.6.aarch64.rpm ab1075f8cee7372484269fa4fb449559a2b56ffa060dcb47c5c309e0fb07d523 glibc-langpack-or-2.28-225.el8_8.6.aarch64.rpm 65606a49991481b2a339e4574042ef5a1765672c3320cc5186ae88e6f566e81c glibc-langpack-os-2.28-225.el8_8.6.aarch64.rpm 0b8e4018069e9a179f4cf7bf613e6627a46fe3f9c6d40a6448cf44e23bd8fed2 glibc-langpack-pa-2.28-225.el8_8.6.aarch64.rpm e49862ab6729c4426f27c569241ee96bfa7898c2662c3afbc3f07928032df753 glibc-langpack-pap-2.28-225.el8_8.6.aarch64.rpm 17400c0a30795b503782fe18d452de5d3050e39fe5345fcaa606a37fa44fed65 glibc-langpack-pl-2.28-225.el8_8.6.aarch64.rpm 1b6b1532383faa4bd9644544682a62ef5e670d7d72f5b6c8dc13f15a322fad55 glibc-langpack-ps-2.28-225.el8_8.6.aarch64.rpm e962cb369a79f82bb49e5c1a7c9ed43c583ac624c3b8ecedb3bcd90c55d48c3b glibc-langpack-pt-2.28-225.el8_8.6.aarch64.rpm 8441267ed42ac688b4e806dd49d00cc798062f453a91010f3ff2d8cfc6882ec8 glibc-langpack-quz-2.28-225.el8_8.6.aarch64.rpm f7dabd3b0fb04c581d1adaf9de93d92e50fdfafa9562b330b6d7883fb20204d8 glibc-langpack-raj-2.28-225.el8_8.6.aarch64.rpm 4ebfb066fe2b6430a55ddd59c71e2ad5e16d1a29e1edf99f49f3de112118cf61 glibc-langpack-ro-2.28-225.el8_8.6.aarch64.rpm 7bc8c853bd2316220cce890d74e42e6df943b096cccc10cb282ac24e7765df8f glibc-langpack-ru-2.28-225.el8_8.6.aarch64.rpm 6644e15c7c6625e7a81339450457e22d3975e76d8f1f63eb49cceff633d5e5e7 glibc-langpack-rw-2.28-225.el8_8.6.aarch64.rpm d5c3d697d025780ff8f14588153649c11081affd178553996b5e17dbd5771192 glibc-langpack-sa-2.28-225.el8_8.6.aarch64.rpm 90e62b0e47fa3b553acae0ae2a3b98e58fb30228c27280449fa7d0397bcba2da glibc-langpack-sah-2.28-225.el8_8.6.aarch64.rpm 9378acee39f89a0be7e5cccf61c2514fe833a60f595e2644dd24498e3c443a76 glibc-langpack-sat-2.28-225.el8_8.6.aarch64.rpm 3d19da80184d0b47d15ede55dc0614a0310bb0a56802e9ad993035e3338779a5 glibc-langpack-sc-2.28-225.el8_8.6.aarch64.rpm db04842d2c52bdb188b68edf6837549c021bac5170baa604a1f5d5a76a333a2f glibc-langpack-sd-2.28-225.el8_8.6.aarch64.rpm dd8f033245e0cd9db10d62a87c8aae4e233afc31eefcd95fcff1308678406344 glibc-langpack-se-2.28-225.el8_8.6.aarch64.rpm 6ef9631434beb253842810f365a954a590bddb77c01d4ac34f351971182feadb glibc-langpack-sgs-2.28-225.el8_8.6.aarch64.rpm 750d6a6e52d4b9b3f501248469b5f7c8a9efa78ae9531c71117ce4f8a518a4d1 glibc-langpack-shn-2.28-225.el8_8.6.aarch64.rpm eb34260baa4f352b446740bcfa5a88662ac64aba1b08fe9d85899dd04a0f4ddf glibc-langpack-shs-2.28-225.el8_8.6.aarch64.rpm 718036decdb3496f6ca83cf3d4ad2ec49e0f47f0679fb0a6968faa706b4dc254 glibc-langpack-si-2.28-225.el8_8.6.aarch64.rpm 8c08b2cdf15e2830554fb504affdb9c57b8357305fcb3e27275fee840e4fcfed glibc-langpack-sid-2.28-225.el8_8.6.aarch64.rpm 3fc4d3f129446e78f583584a2b6bb45b2ec5c54693f252bd7d11ea7e86cbb211 glibc-langpack-sk-2.28-225.el8_8.6.aarch64.rpm 66a06210a8c1b535918322f8aaa9a5c2c02e9659299f114019ddc86451222d2b glibc-langpack-sl-2.28-225.el8_8.6.aarch64.rpm 2f58cd0f960eee594cbb53ef3679fe3972134d47c39087204a1940b22fc8e3cd glibc-langpack-sm-2.28-225.el8_8.6.aarch64.rpm 035ea0937d78c2882e35a740d05c88c8aae4d1a9edd9801673ac6f05f4fc917f glibc-langpack-so-2.28-225.el8_8.6.aarch64.rpm 7db3a20b49c8e27eeab7d6b8573b5666517a0bd95ddaeffc5d77888eca631a75 glibc-langpack-sq-2.28-225.el8_8.6.aarch64.rpm dbcff04d9930c3e09ec7c5319308aae4f8f4e6a5bc19f4a7e0279df2464982f2 glibc-langpack-sr-2.28-225.el8_8.6.aarch64.rpm 34f44543a611cb96d334ad59047ee2bf4c7a5af345af97a5f92baf6460e16f3b glibc-langpack-ss-2.28-225.el8_8.6.aarch64.rpm 366df7947a6b7d91bbe35157ecaa9ef8965be41fa9e8229646ea0006f401bfee glibc-langpack-st-2.28-225.el8_8.6.aarch64.rpm f7cd704f16ca426b64a51bbff1dbd29bbd634bd1c25203fe15b6b9bdf1fdceae glibc-langpack-sv-2.28-225.el8_8.6.aarch64.rpm 08451b232aea6e90c0fc610865ad11fb97c53c0a4acff3da0b987b206c763d87 glibc-langpack-sw-2.28-225.el8_8.6.aarch64.rpm da25cd29d9178f1a1914674c7347c192c483be60303ff2b733d3a74003496a95 glibc-langpack-szl-2.28-225.el8_8.6.aarch64.rpm 9d602b2d8e194a1e9625ac5221b89f6b238da61c3b18408f100b435786095ba9 glibc-langpack-ta-2.28-225.el8_8.6.aarch64.rpm a08371f1914f26cdb45106e2549158b6b7de05cc6c3e89ec119f064e39443143 glibc-langpack-tcy-2.28-225.el8_8.6.aarch64.rpm 07a94762da9d35cea35a411cb5d8a862e9d10c5f194f73cb4416d23c992ec5e9 glibc-langpack-te-2.28-225.el8_8.6.aarch64.rpm 2dfa763b22cef8443e52aeee849c7db7f7864ea02c7e791e951c063c2638b4da glibc-langpack-tg-2.28-225.el8_8.6.aarch64.rpm dfd89e4a6638ab152c0ccaf7e4559abace870356ef9fda76ea4608f17b737165 glibc-langpack-th-2.28-225.el8_8.6.aarch64.rpm 3aa10d2d308ddb715db26e593cf55826ff5b39effcca60dcbb58d7a367c62faf glibc-langpack-the-2.28-225.el8_8.6.aarch64.rpm 8ad6aacd20a15ad71087141fc165215462191769d49d62e0575b16ba19dd8aa3 glibc-langpack-ti-2.28-225.el8_8.6.aarch64.rpm 7bb79a2e7a0efc7f316f2bcaeb11caf77ed1f501d12c1f121d1dab4c9b394fae glibc-langpack-tig-2.28-225.el8_8.6.aarch64.rpm 66afbd26593a240084aed31f268450fd13bf489d90ef32a854e06e8f9dcd7bed glibc-langpack-tk-2.28-225.el8_8.6.aarch64.rpm 763d8a1aedfdaa43aa70f673bce1a69e6768771f2a5a0f7f10985174561631d1 glibc-langpack-tl-2.28-225.el8_8.6.aarch64.rpm 98c087f19c1c5edca828a4ce52173a35ab8bdaa408fbfb0bb7bdc828557c328b glibc-langpack-tn-2.28-225.el8_8.6.aarch64.rpm f065fe9daa21ad2864fd328559812aeeeef990309a1b2825c3062593ffcabccd glibc-langpack-to-2.28-225.el8_8.6.aarch64.rpm c37d43680465011c40d47ac56937c02cd0c067c55632176a960adabce2f57e8b glibc-langpack-tpi-2.28-225.el8_8.6.aarch64.rpm 8d7c977b33a141c813e62a3911a4cd04483d623eab22801e997fb083b0c9600c glibc-langpack-tr-2.28-225.el8_8.6.aarch64.rpm b0dea3dc2774c51a24ecb46068bcb2a20f4fbf9842e1811dafd436df0f5ea701 glibc-langpack-ts-2.28-225.el8_8.6.aarch64.rpm d48b94712d5954b17c9f9b50e2a4c66d9f522ee02d2d30ab0f4d43728de72d7e glibc-langpack-tt-2.28-225.el8_8.6.aarch64.rpm f5d6b2c0337a19136bf64903cd697d2e056b41014450c7e32f771177fa9fbf48 glibc-langpack-ug-2.28-225.el8_8.6.aarch64.rpm c3c284b5539252be365130bc03bb815bdf84b3e411fb4ae2c39e6e1ee982a9b9 glibc-langpack-uk-2.28-225.el8_8.6.aarch64.rpm c6262b947159b6ea917382035fabe3ca9ff7f72766b74cbba05fcd3031db85ac glibc-langpack-unm-2.28-225.el8_8.6.aarch64.rpm e796ec715eb3a24ce5c7319ac0368b8f7614748fc99a12f261821d0c9a919b4f glibc-langpack-ur-2.28-225.el8_8.6.aarch64.rpm b8ab3a21d7abb0f5a8d7c7613437f21e94420dea443d3efe6611fdb0eb93394b glibc-langpack-uz-2.28-225.el8_8.6.aarch64.rpm b25935163b7fd71ead1a7c3c4b5a78a399868e98d7b95ff4495d899bc7dde033 glibc-langpack-ve-2.28-225.el8_8.6.aarch64.rpm aa743186668b019016724346c846bb338def48d07577accb55fe23ecc2f81ae8 glibc-langpack-vi-2.28-225.el8_8.6.aarch64.rpm 739bc806a13ef5661529d6f238c689b85c99e6ed0c1c45bc114e7a3ebb177359 glibc-langpack-wa-2.28-225.el8_8.6.aarch64.rpm c341a0a6a58c06f42959070bb8aed364c3adc82ac1622427d35229e02b6801c8 glibc-langpack-wae-2.28-225.el8_8.6.aarch64.rpm 072f7995a8ac88098c02a18f0b0605395c35bcb4f8b7d0948010f6e06816805e glibc-langpack-wal-2.28-225.el8_8.6.aarch64.rpm 638e4f2802d3e620047632edb9e44f0b1ecf48deab3b52ef97093e865dd76d66 glibc-langpack-wo-2.28-225.el8_8.6.aarch64.rpm 51b8919347916403acdba14da0b53578cc9bcde88ed6e5d76a0dcb6284094259 glibc-langpack-xh-2.28-225.el8_8.6.aarch64.rpm 07b6f5bf9da6f426c37c6bbc2ac64aaa81bec452f37778c453fc2201294cc110 glibc-langpack-yi-2.28-225.el8_8.6.aarch64.rpm b61274988290d48169494d9e6e76b53333d08d95fe0ed0cd1c0e2d2acc66fced glibc-langpack-yo-2.28-225.el8_8.6.aarch64.rpm 8cec94b2419d6ee0f20af6fc364e87f9bdced720a9916739787f69b3f03c108b glibc-langpack-yue-2.28-225.el8_8.6.aarch64.rpm 9112d9eb7f50bfce02a6b45330c810f744b5fdcba1c692e1dddeff89b8453a5b glibc-langpack-yuw-2.28-225.el8_8.6.aarch64.rpm 73eeaaf39dbd5b283f632d951188cc93b6fa4c1e799e2990a119545f86c3158c glibc-langpack-zh-2.28-225.el8_8.6.aarch64.rpm a00a48bd4c196d1214ec12f947a5c297bd6ee65367608742d7c09280ab187c6a glibc-langpack-zu-2.28-225.el8_8.6.aarch64.rpm f5be9240842b333a67d0040332c0621fa05f83f398d00fcbdce54dd4c655e903 glibc-locale-source-2.28-225.el8_8.6.aarch64.rpm 51d2baac4785c5230ac17d4787077d4ba1ba6de6d4fc81856e1605099241aae7 glibc-minimal-langpack-2.28-225.el8_8.6.aarch64.rpm 234c6b2b13ec2d60cd37fcdf9fa9315508f397fb431e235f5c679190f9d337d1 libnsl-2.28-225.el8_8.6.aarch64.rpm 1f7f6ea47ae48af71836ff8a499d6392cc1f103d872b19dad3893d3b1c03c6ab nscd-2.28-225.el8_8.6.aarch64.rpm 8a47086994e5fea1a826d3981ad1340c47ad82dc1036efff2dd4f1dfc0442f67 nss_db-2.28-225.el8_8.6.aarch64.rpm 943ffa430cb85f43e6e946ed90f6c8174e2ecb7bb892aae00d6dfadd2eb403d6 RLSA-2023:4517 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation (CVE-2023-1281) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events (CVE-2023-2235) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * kernel: i2c: out-of-bounds write in xgene_slimpro_i2c_xfer() (CVE-2023-2194) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184101) * Rocky Linux 8.4 - kernel: fix __clear_user() inline assembly constraints (BZ#2192602) * LPAR is crashed by Phyp when doing DLPAR CPU operations (BZ#2193375) * ice: ptp4l cpu usage spikes (BZ#2203285) * Kernel - Significant performance drop for getrandom system call when FIPS is enabled (compared to Rocky Linux 8.x for all x < 6.z) (BZ#2208127) * macvlan: backports from upstream (BZ#2209686) * Intel 8.9 BUG VROC: Pull VMD secondary bus reset patch (BZ#2211198) * Incorrect target abort handling causes iscsi deadlock (BZ#2211494) * swap deadlock when attempt to charge a page to a cgroup stalls waiting on I/O plugged on another task in swap code (BZ#2211513) * BUG_ON "kernel BUG at mm/rmap.c:1041!" in __page_set_anon_rmap() when vma->anon_vma==NULL (BZ#2211658) * Rocky Linux 8.9: IPMI updates and bug fixes (BZ#2211667) * Rocky Linux 8.6 opening console with mkvterm on novalink terminal fails due to drmgr reporting failure (L3:) (BZ#2212373) * Rocky Linux 8.8 - P10 DD2.0: Wrong numa_node is assigned to vpmem device (BZ#2212451) * Rocky Linux 8.8 beta: Occasional stall during initialization of ipmi_msghandler (BZ#2213189) * ESXi Rocky Linux 8: Haswell generation CPU are impacted with performance due to IBRS (BZ#2213366) * xen: fix section mismatch error with xen_callback_vector() and alloc_intr_gate() (BZ#2214281) * jitter: Fix RCT/APT health test during initialization (BZ#2215079) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216498) * Hyper-V Rocky Linux 8: Fix VM crash/hang Issues due to fast VF add/remove events (BZ#2216543) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216769) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220810) none-baseos-rpms bpftool-4.18.0-477.21.1.el8_8.aarch64.rpm acb94e77cdde502c5ecf7a508ffe4f5e8459066485ce3af651d18a75bf6c5d10 kernel-4.18.0-477.21.1.el8_8.aarch64.rpm 2c8ac4c94c737cd9df5c531bcdbaf2d79bda7fd92dafbbe880f78595a3341c09 kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm 46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989 kernel-core-4.18.0-477.21.1.el8_8.aarch64.rpm 37e22d134377df7ac8112b01adea4d9a0c08734c8b0fa9d4f75bcba2953095c3 kernel-cross-headers-4.18.0-477.21.1.el8_8.aarch64.rpm 88179566ca5a875716317866ef7d6800556e90cf4f7683e37478894f557290d7 kernel-debug-4.18.0-477.21.1.el8_8.aarch64.rpm d5283208ff8ea5593c8fa13ad582af33bf9382d544e1dae7eeadc75aa3e156d0 kernel-debug-core-4.18.0-477.21.1.el8_8.aarch64.rpm b3699e6306d16ead8f0b3ae967f66e4adceb557c8d1e2602c91661ed4b8c5a55 kernel-debug-devel-4.18.0-477.21.1.el8_8.aarch64.rpm 44f7afc0532cf2454b9012ff355c75f6c8f4c2e3168a65939754f30d794811e4 kernel-debuginfo-common-aarch64-4.18.0-477.21.1.el8_8.aarch64.rpm 281b5ea921e14367612724ca4e50d4c2a0476b5980546193d86aadc8fa021480 kernel-debug-modules-4.18.0-477.21.1.el8_8.aarch64.rpm 6175bf60b553b7b4e3c10e6fd4ac683d647254cb37fcefd09749df2e1f0db96c kernel-debug-modules-extra-4.18.0-477.21.1.el8_8.aarch64.rpm d6e06d6a71ad07eaf82417b6269d207ec15d2c886307283e1cf4d0f2a3720666 kernel-devel-4.18.0-477.21.1.el8_8.aarch64.rpm 05e8e238bfd13581a042d359a52eac9b7b40e4611cb9405b26c857a710c7f87e kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f kernel-headers-4.18.0-477.21.1.el8_8.aarch64.rpm 8dc2be5c4b322d44c546aa9710712473d96b3a4a78dbe8f1412511cd7b257b6a kernel-modules-4.18.0-477.21.1.el8_8.aarch64.rpm 941565d5774b19a5efcc834238bd5d27a3dfe8b90d29a5b3ff24657e38d5860c kernel-modules-extra-4.18.0-477.21.1.el8_8.aarch64.rpm dd21a6fccea8cd3b267d69056670dba62fbccb81e94caba1aba36e7aebcf73c7 kernel-tools-4.18.0-477.21.1.el8_8.aarch64.rpm 1d1b4263e4699b9e845210eac9fd2a601a7be83f5ad0bfab2461738ce00ea4a4 kernel-tools-libs-4.18.0-477.21.1.el8_8.aarch64.rpm 1d183f9a608475f5d2ad36c28959fa8b29d15b590932c238f22bef6a2da664b9 perf-4.18.0-477.21.1.el8_8.aarch64.rpm 027908e4591719a829eadf97f445f6c279915df363abd6e8f5c4d595d837f5e3 python3-perf-4.18.0-477.21.1.el8_8.aarch64.rpm 3988feaf57da631465b8f26910be5252ca3c0dd3b380220bbdbefeffda7d4f27 kernel-abi-stablelists-4.18.0-477.21.1.el8_8.noarch.rpm 46309ee4d8b9fc44ee2081582b47047f0a93384f1caacd47500761d3d10d5989 kernel-doc-4.18.0-477.21.1.el8_8.noarch.rpm cdabad6a0fe918b3c9e54ab73b1565b64b75531e8b0141603cf529c46ece982f RLBA-2023:4518 iscsi-initiator-utils bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iscsi-initiator-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iscsi-initiator-utils packages provide the server daemon for the Internet Small Computer System Interface (iSCSI) protocol, as well as the utility programs used to manage it. The iSCSI protocol is a protocol for distributed disk access using SCSI commands sent over Internet Protocol (IP) networks. Bug Fix(es): * Patch3 reverts a patch merged upstream (BZ#2215111) none-baseos-rpms iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm 4cb8254bafcaa4a38fe44b1e2f2b1f19dae4d509aeb391fc98981a17e84911e8 iscsi-initiator-utils-iscsiuio-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm fa9470cff6286d5215c85ec209f20927e114ebb715c0458752a653abd9914a28 python3-iscsi-initiator-utils-6.2.1.4-8.git095f59c.el8_8.aarch64.rpm c4e9b29c333437cf2677dd822155a5c21d1517c243f57540110d1df6eb1467e5 RLBA-2023:4521 NetworkManager bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * VLAN of bond will not get autoconnect when bond port link revived. (BZ#2217899) none-baseos-rpms NetworkManager-1.40.16-4.el8_8.aarch64.rpm b51d39e70d2b9b7c2d36c8e4601233bb81c855329e54bf3e82c1e326f41107f9 NetworkManager-adsl-1.40.16-4.el8_8.aarch64.rpm f896968ef8b15c9a9a07eabe7315d2b1823336e033a64c9ad92549abca55d390 NetworkManager-bluetooth-1.40.16-4.el8_8.aarch64.rpm 36bd210d42f0d7d4c0e316fa73868b96383dbefbfee2e475c0fbfeddf66f3fc2 NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm 3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52 NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm 56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432 NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm 861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038 NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm 0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd NetworkManager-libnm-1.40.16-4.el8_8.aarch64.rpm c23a433382c6515cb434882b77e44ac58cb313d8c56f4ffc6cd4c06e439dec43 NetworkManager-ovs-1.40.16-4.el8_8.aarch64.rpm 44432915c4978b1a2f4251dc53d774968cc5368e87aaf52b601351fe876830ac NetworkManager-ppp-1.40.16-4.el8_8.aarch64.rpm 3add0ec9492e34bebecf1b3c7ab0f3178f267cfc4426e03639e2d3ad0262fe12 NetworkManager-team-1.40.16-4.el8_8.aarch64.rpm a663f1af0246e9c34921b7351d02c6b8556f4dad094c44c3978f7919d0fab4ab NetworkManager-tui-1.40.16-4.el8_8.aarch64.rpm ace2fdad409dc3eb11ccd78f3e75836d6b69fa18c74f5ba76418aff462525af0 NetworkManager-wifi-1.40.16-4.el8_8.aarch64.rpm 3c988599f29fe7ac0d713be01b61b4c3de1241aca9cc9d3ef640ac31c429e07d NetworkManager-wwan-1.40.16-4.el8_8.aarch64.rpm 1bc6f707eb792aa3d81e0f3dc6c409de68c9d9bd3e02e962048af503ff2d5bf0 NetworkManager-config-connectivity-redhat-1.40.16-4.el8_8.noarch.rpm 3fa816eb686a631eaf6dba0a376d071c52b04973b1a0a3fc863ece672f573c52 NetworkManager-config-server-1.40.16-4.el8_8.noarch.rpm 56e20b73c67df24520b3f71346b1151167269bb65cdceef53588df7fc8955432 NetworkManager-dispatcher-routing-rules-1.40.16-4.el8_8.noarch.rpm 861ccc3c0b0ec2b7714971e08282120aef53e31e667a3d23ac9b7013c0de1038 NetworkManager-initscripts-updown-1.40.16-4.el8_8.noarch.rpm 0cf9f96f80808ca6ce9804779d9efc64cc564c8b7cbb98afc5c5f1315e7340cd RLSA-2023:4523 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: GSS delegation too eager connection re-use (CVE-2023-27536) * curl: IDN wildcard match may lead to Improper Cerificate Validation (CVE-2023-28321) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-30.el8_8.3.aarch64.rpm 1030612316a48f1b69f662f1ada6b2060ea245545bdb8c82044a0611467f91c2 libcurl-7.61.1-30.el8_8.3.aarch64.rpm 4d8b00bc2b3e1d0508b89d0d65b521c637e6c5aaff4bb02cc60d36a67af07950 libcurl-devel-7.61.1-30.el8_8.3.aarch64.rpm 5d1a3ed0aac8f6a00251c8c4a84b010c38843121b13647ff0b2d6b903a337d92 libcurl-minimal-7.61.1-30.el8_8.3.aarch64.rpm 00b1003d16ad44bd6b31e82ff78e1009852965e20a0dc6e812dd346f61369510 RLBA-2023:4522 grub2 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * HTTP boot issue on RL300 (BZ#2221202) * Not able to activate SAP VM deployed with SAP Large Profile mh1-90x16200 (BZ#2207972) none-baseos-rpms grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992 grub2-efi-aa64-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 41d830840b6bdd8a33d4cd4c7ab383a33986c5e7e8f2259e3e1dc8bc94b4e445 grub2-efi-aa64-cdboot-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 452ed7318af54b832178cd0061dc32af7dee80ca4bbe2066360c54019667c1ad grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0 grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm 4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17 grub2-tools-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 40f4d9684f7bb5c534b67d815e6ae4d3de5002c7600efaac4f8a9b25df405bf1 grub2-tools-extra-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 150447301c921c7dc5f2832ec9e96997189f6cf5eba5a37a8f84d38360de9fcc grub2-tools-minimal-2.02-148.el8_8.1.rocky.0.3.aarch64.rpm 55709dba401b96ffee14056f282ffd76887e66662fb8319874a4d0a5c935bcaa grub2-common-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a419f460ebd079f4838ee8b3f35e862106c969e5530702380e708ecba8047992 grub2-efi-aa64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm f88cc3e63d47e8eb411a43fd713c961c90f355f4056cfbfb70d3145155c273c0 grub2-efi-ia32-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm 4d033cf7ef4c6deb674888486a6eeef5bc976f23e3aec92db83a759a71e430bb grub2-efi-x64-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm ea5673584ba5557b92e950255c9746c4925a1ce4557a54993955e9dcbc11444e grub2-pc-modules-2.02-148.el8_8.1.rocky.0.3.noarch.rpm a177c63e0f25d5da4afafc7ffacbf31c76f6a1105321cce74d755682d3811c17 RLBA-2023:4525 sssd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed'. (BZ#2196838) * SSSD enters failed state after heavy load in the system. (BZ#2219351) none-baseos-rpms libipa_hbac-2.8.2-3.el8_8.aarch64.rpm cfceeab05212bf5823836dfcbb373e629dfced30451939e545bca59b9edaf795 libsss_autofs-2.8.2-3.el8_8.aarch64.rpm 5b828c3fdc4b9fbdb33aa4a939c0f62d6e52a76a102aea1fca0cb67f7ae4a897 libsss_certmap-2.8.2-3.el8_8.aarch64.rpm 16e349e9815424a42d9726a56522bf6da6c1329be9f434ca3765edb583170b53 libsss_idmap-2.8.2-3.el8_8.aarch64.rpm 71501fd799cea94c5e3b7e893ebfa442d823e7129d7c81509d77462d17e470f4 libsss_nss_idmap-2.8.2-3.el8_8.aarch64.rpm 745ec8aa5e97394e4474c38dd5751f01b96e1452937f978fbbff530822ac8801 libsss_simpleifp-2.8.2-3.el8_8.aarch64.rpm 8859dfabff07f3262dd7e36bbcf40329e7c5a080b8cedfef816088a1e5ec6c96 libsss_sudo-2.8.2-3.el8_8.aarch64.rpm 7c9eb88d097d6f7e75bbef8f212d58948d073716223381f12b3c3de346118635 python3-libipa_hbac-2.8.2-3.el8_8.aarch64.rpm 82124f21672fa06bd340deae280491d3889d411b3fbffd2c0cde15cffcfe07c0 python3-libsss_nss_idmap-2.8.2-3.el8_8.aarch64.rpm e911a03c6d95791dad65729546e0b2e3e8ac74fb8494238641bf9c1800769104 python3-sss-2.8.2-3.el8_8.aarch64.rpm 7d81f9c58b2e52efc855ad67fc925efcd7c197f7b9d4bed104c80d7332ff792c python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d python3-sss-murmur-2.8.2-3.el8_8.aarch64.rpm 4d87b765bbf647d2e27e727f02390933aa5547d86b8eea7edae9739ff5d94a4a sssd-2.8.2-3.el8_8.aarch64.rpm fcbfce71b38e7516cd03a45a807b4b4494d350a453c546ee9c91157fab97dfc3 sssd-ad-2.8.2-3.el8_8.aarch64.rpm 282acec2afed5456ae1566a16ff00283709aa22932277824d6f547877e55222f sssd-client-2.8.2-3.el8_8.aarch64.rpm f97183b7d8f6c69957065c9498b69753aa7d9ae5f75e2972f69014e434d73b25 sssd-common-2.8.2-3.el8_8.aarch64.rpm d109dd4ea98d2067f8701b9e8ee569441c99590e49d46c5dd29aa980a69b5de0 sssd-common-pac-2.8.2-3.el8_8.aarch64.rpm 6ebf28c16b32fbbc03bb0d07d67db3fb38b9c48a9ac2410273081739a1796b7f sssd-dbus-2.8.2-3.el8_8.aarch64.rpm 029254d7cbf7b4f26182954e2c31400760b356c8c1ce934e28b403235464a764 sssd-ipa-2.8.2-3.el8_8.aarch64.rpm 73299fd3f7969e1c50b7ed2ff634b94d29ef206250d78998fe934732a63d3bd3 sssd-kcm-2.8.2-3.el8_8.aarch64.rpm 5059c23199fd2b439b92dc03c35b16741bf04f96a48754ec96642c8afeb77273 sssd-krb5-2.8.2-3.el8_8.aarch64.rpm 1010174a554a490cedaaa711ec4f69ec6bc95d10e8dff33100140fe71a7bed3e sssd-krb5-common-2.8.2-3.el8_8.aarch64.rpm e9892f463525953830a113de877e1238c227c35907b5289d7f44270b361369eb sssd-ldap-2.8.2-3.el8_8.aarch64.rpm 2b6d04f057457bab35254840ac917907d6ace72a020cc576b62ff5e8a23fe033 sssd-nfs-idmap-2.8.2-3.el8_8.aarch64.rpm 2bf09ca31202c10d817d361c6eee9557adf473d6ec5dbd2c3c862cffec443a40 sssd-polkit-rules-2.8.2-3.el8_8.aarch64.rpm ae1089369d8616f4022fafc4425c20572c8b1e9e1938d01fa69de9025873a923 sssd-proxy-2.8.2-3.el8_8.aarch64.rpm 2aad24298c585ababdf72e98c8c842c588d5c07ad9881044589e25ea0b7f6df3 sssd-tools-2.8.2-3.el8_8.aarch64.rpm 8b0a62e86ba0f22f7b2ab53b33fbd55dc0c35177cc80b795d2290f74932f18a5 sssd-winbind-idmap-2.8.2-3.el8_8.aarch64.rpm 2a299af5c1c4a18ef1c38a6eff42d9ed6801d70ded2e6986282ba6147c661b7c python3-sssdconfig-2.8.2-3.el8_8.noarch.rpm a5f0f60d75de585d424896b1228fcfb9d99c3514e69ac32931a7b926d77eb49d RLBA-2023:4526 systemd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * systemd-logind: Assertion 'pid > 1' failed at ../src/login/logind-dbus.c:3332, function manager_start_scope() (BZ#2223602) none-baseos-rpms systemd-239-74.el8_8.3.aarch64.rpm 18a1dbefa7c0ebfa2b6c41fc81363348756b442fcae754a8be7c3e77fc6745d7 systemd-container-239-74.el8_8.3.aarch64.rpm 1f4a918288126fdbfa58091d29fa6f255c2c104be92e1df3d0873af91d7ba56b systemd-devel-239-74.el8_8.3.aarch64.rpm 17fa58c3db09b66b4f0dace2e14844d718f431ad1341960f95da5cea7e1edfb6 systemd-journal-remote-239-74.el8_8.3.aarch64.rpm 24872527fb51ae3c4cf3902831af3891c93829bf2b26acd4aa648d439bf89b5f systemd-libs-239-74.el8_8.3.aarch64.rpm c206403fb669cc88081d1a84804bb595efac8ef0a982aa15c8057eeca6cc8dc9 systemd-pam-239-74.el8_8.3.aarch64.rpm 07eb19696d94f466e343b4717705dbfab999c96995e9e783f115d83d64154a38 systemd-tests-239-74.el8_8.3.aarch64.rpm 72600ea8ab46f777fcbd43f188bd8dfdfe17ec5d265e6ec00ec9afc2d7290b68 systemd-udev-239-74.el8_8.3.aarch64.rpm 07eb618ae6fe8c244037cfe5e3485bb1d5924ca844f7efd0acda95709746fc66 RLSA-2023:4529 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: NULL dereference in xmlSchemaFixupComplexType (CVE-2023-28484) * libxml2: Hashing of empty dict strings isn't deterministic (CVE-2023-29469) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-16.el8_8.1.aarch64.rpm a5c70c6a15f9aaa8a6a39e83d4f589050f1324fbd785df4cdd54591459f8ebbd python3-libxml2-2.9.7-16.el8_8.1.aarch64.rpm 786aef408ede9a0979c6bb22e1ea61a9c84f07513a519e18ff9a68f0c5c6c762 RLSA-2023:5997 Important: python3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: TLS handshake bypass (CVE-2023-40217) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-51.el8_8.2.rocky.0.aarch64.rpm 77f83c8f25a5d3222f2041b6851f6d25d8c243d01596c96fe6e93b06c834e709 python3-libs-3.6.8-51.el8_8.2.rocky.0.aarch64.rpm 9ed163d318a8b9630fdd66d2133e931e5cbcbac33a06b3d9d640b12383ebbf74 python3-test-3.6.8-51.el8_8.2.rocky.0.aarch64.rpm 9e74b382939b8589190e1c8df8389529fa408013dbbcd3a7e38d2f41dcec28c2 RLBA-2023:6797 xfsdump bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es) and Enhancement(s): * xfsdump/xfsrestore: Suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14493) * xfsrestore: Files from the backup go to orphanage dir because of xfsdump issue.(BZ#2245344) * xfsdump: Restoring inventory prevents non-directory files being restored from tape (BZ#2245677) none-baseos-rpms xfsdump-3.1.8-5.el8_8.aarch64.rpm fbbdaf9e045fd561af063ea070fdd4f22cb5e2a857b544667512ef0184d52882 RLSA-2023:6236 Moderate: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: NULL pointer dereference in _bfd_elf_get_symbol_version_string leads to segfault (CVE-2022-4285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms binutils-2.30-119.el8_8.2.aarch64.rpm b94621db41ced6c52655b6794ab4027343b73fcc6a257f64432d845e365a5987 RLBA-2023:6293 sos bugfix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es): * Deliver SUPDEV-148 (Microshift backports) in Rocky Linux9.2.z (Rocky Linux-12886) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-8.6.0.z] (Rocky Linux-13696) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-8.8.0.z] (Rocky Linux-13697) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.0.0.z] (Rocky Linux-13700) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.2.0.z] (Rocky Linux-13701) * sos: Ansible Automation Platform collects customer passwords and tokens via sosreport [rhel-9.3.0] (Rocky Linux-13702) none-baseos-rpms sos-4.6.0-5.el8.noarch.rpm 8ad31b982df01b78ce994a8a97cd2f08a2c9f1dde22402d168fbc205ac220978 sos-audit-4.6.0-5.el8.noarch.rpm 9b6f6952de1df5e5fe8ae1e48970bd00321852b9a959969e9a3a964113c44226 RLBA-2023:6792 net-snmp bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Bug Fix(es): * snmpd reacting with "Failure in sendto" to a request to a broadcast IP [rhel8] [rhel-8.8.0.z] (Rocky Linux-10520) none-baseos-rpms net-snmp-libs-5.8-27.el8_8.1.aarch64.rpm 36210cfe7d1f80b0a0f5d3d3b7333fb3b0250a730286d5cd7218c0a2c41b63b9 RLEA-2019:3448 perl-Net-SSLeay and perl-IO-Socket-SSL bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-Net-SSLeay. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms perl-Net-SSLeay-1.88-1.el8.aarch64.rpm 4d8fd563a8009b25df70a82b39d74b2e8e5a9ca3dce60f0957df45cf480dc3ca RLBA-2023:7080 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.26-8.el8.aarch64.rpm 397b7648d272c1a8994cde691af6c209d864da8e71e867125d445d27d8b69049 RLBA-2023:7185 nftables bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms nftables-1.0.4-3.el8_9.aarch64.rpm a1a5030788f79dffa02a1e27c0f0636843fe9441019b2d44ab373fab162d631c python3-nftables-1.0.4-3.el8_9.aarch64.rpm 8c072e5359e4487d2b248753cdd6cb761b36a3912b9228273241a93b89f34394 RLBA-2023:7186 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms libblkid-2.32.1-43.el8.aarch64.rpm aca8978ac24d4ea9b2a6f180b406dcbc437e6089cbc1695b6976fd00aca23978 libblkid-devel-2.32.1-43.el8.aarch64.rpm 31ac385d04ee652da2ede8de2e6c1ae88ef7f1a392173d9195d95e58e78fe20d libfdisk-2.32.1-43.el8.aarch64.rpm 86597b006fc810868bbe9bc75cd0303750bfc612feb1035a886f0ba2126ae00d libfdisk-devel-2.32.1-43.el8.aarch64.rpm 18561e8f587ee1074494e6b514578391f223ff7115c253131d2dba5087e67941 libmount-2.32.1-43.el8.aarch64.rpm 08d968cbb3a42a04acf02a5e6f1feca81a3c6a078c5b3e3780d55d6f1efc5447 libsmartcols-2.32.1-43.el8.aarch64.rpm 40c4fb20f1d49d251f10e5faf06807fad02ee77cdf4a30992438555b9a7e240e libsmartcols-devel-2.32.1-43.el8.aarch64.rpm a34032b0f7d7cb821a4c4e6575c9800acf1d26931995e00894a41e2306093a04 libuuid-2.32.1-43.el8.aarch64.rpm 9e5d473e65cb27dce9689634f1aa93434cbeaa02b7d1a9ad8561c324043b03ee libuuid-devel-2.32.1-43.el8.aarch64.rpm a74868108649b02c9301b7c9326a59bc3cebc12cbfb633f38e4a05c1adea2749 util-linux-2.32.1-43.el8.aarch64.rpm ac69b7478dd9d1bd645a55870fd9e3628c5235664308c67ef4cbc20b5b98deca util-linux-user-2.32.1-43.el8.aarch64.rpm adbbcdae1a922a49acbd659c63f52be86d403290aebf17dee05164bb29a9d626 uuidd-2.32.1-43.el8.aarch64.rpm 400d854db6da3e1214d2ad3781d7a2a3b8dc25acf023112a71effdab2681bc9c RLBA-2023:7188 dmidecode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms dmidecode-3.3-5.el8.aarch64.rpm 187bb45ce2ee39ca4b72f3f7e7d82003ffe45e4cc6c9dd924187c53b2ef9216c RLSA-2023:7187 Low: procps-ng security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for procps-ng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The procps-ng packages contain a set of system utilities that provide system information, including ps, free, skill, pkill, pgrep, snice, tload, top, uptime, vmstat, w, watch, and pwdx. Security Fix(es): * procps: ps buffer overflow (CVE-2023-4016) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms procps-ng-3.3.15-14.el8.aarch64.rpm 2496f52adf4a2e10431a91593cde05aff091327ba65c27ac43bf2c8ceceb0c84 procps-ng-i18n-3.3.15-14.el8.noarch.rpm 821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd procps-ng-i18n-3.3.15-14.el8.noarch.rpm 821a3db12b38137553beaab052f93c3223d3952bf1db6458042609122e967dbd RLSA-2023:7189 Moderate: fwupd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for fwupd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The fwupd packages provide a service that allows session software to update device firmware. Security Fix(es): * fwupd: world readable password in /etc/fwupd/redfish.conf (CVE-2022-3287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms fwupd-1.7.8-2.el8.rocky.0.1.aarch64.rpm 46ec1113de2a289404e5f789c84c9d7a3a5a428fd9e751cec8a06dab8463d145 RLSA-2023:7190 Moderate: avahi security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: avahi-daemon can be crashed via DBus (CVE-2023-1981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms avahi-0.7-21.el8.aarch64.rpm acd7a1430af95383284970e23ed625ded921a0eae557454d20cee05f751d2e1c avahi-autoipd-0.7-21.el8.aarch64.rpm 3168fac01d53a6026040c6d1bded341fa2a04240d7f59e04e0aeb6ad4c6e5507 avahi-glib-0.7-21.el8.aarch64.rpm c39a88dcd9890e1066ac75089f93ba9984be9d7891cf6cf633da5547728f3aa3 avahi-gobject-0.7-21.el8.aarch64.rpm 1151caee59e5f752c423738df976ec334ebdb80e9069ab69d80dc6f4da3802a7 avahi-libs-0.7-21.el8.aarch64.rpm 65f27b055370dccb8048225bb7246a12909fd239a23c0cfff87ed4ea785b2f2e python3-avahi-0.7-21.el8.aarch64.rpm 2dfe3896b91882a1d756078e9f85a5374eaf8c3755f9f65c9c191ec74fa20748 RLBA-2023:7191 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.181-13.el8_9.aarch64.rpm 4c2e1c6eb129e06e2fc8fec36c3cba36b4e217c722cd43d0cf7410996f547acd device-mapper-event-1.02.181-13.el8_9.aarch64.rpm 70983857369425b821dc8fda9ceccdb2ddc83bec41e6bac601b6d2e755d1c11c device-mapper-event-libs-1.02.181-13.el8_9.aarch64.rpm a1590ddcb23932aa2b894dfaa0c238bd5a5dc57c9b8e2f9dee04e92523e10d8d device-mapper-libs-1.02.181-13.el8_9.aarch64.rpm 9cc87344235d71e7f09eee2ab9eea260cf1cb21e87acf99518f6d98c07689b83 lvm2-2.03.14-13.el8_9.aarch64.rpm f0dda30145e51c59fafeee6f9553db38d9ce6c7ca60e0f820a5ccd6089f69233 lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711 lvm2-dbusd-2.03.14-13.el8_9.noarch.rpm a8519cf7f02e592e61b33dbda1b53c5467356db8be66948b81b0ff9ec49ce711 lvm2-libs-2.03.14-13.el8_9.aarch64.rpm 1b0c6c46c52c1a77225d1b50df06b57a015d38e0bb98eaa7968b0a4c574e6045 lvm2-lockd-2.03.14-13.el8_9.aarch64.rpm 4e7f854a9adb7a664db1752685f0e05a088a4b868343f6a74a762af65273abb2 RLBA-2023:7192 numactl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms numactl-2.0.16-1.el8.aarch64.rpm 7ce9b9b6da27f56400d835c3e0971c1b8065153f9e1dc8e5b9d924b4b7b7b175 numactl-devel-2.0.16-1.el8.aarch64.rpm 600ab10649abf04c4bbf95cc3ff03a245963dfd8e508ab67ab4a47e5854b3412 numactl-libs-2.0.16-1.el8.aarch64.rpm 791d205fd33f33813fb11522c3eaf589cdb4221cc48caeb8695acbba9d9d14f2 RLSA-2023:7207 Moderate: c-ares security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Heap buffer over read in ares_parse_soa_reply (CVE-2020-22217) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms c-ares-1.13.0-9.el8_9.1.aarch64.rpm 0bbe927aa77184dd5d8536f3041a197ef3b305725e652bd736144ca063085f08 c-ares-devel-1.13.0-9.el8_9.1.aarch64.rpm 2f4fda4be136c0dfb5a56993029f081f9ddd60f38c4ca43f2bc1b373398407d7 RLBA-2023:7210 sssd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * dbus and crond getting terminated with SIGBUS in sss_client code (BZ#2236414) * SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working in sssd-2.7) (BZ#2237302) none-baseos-rpms libipa_hbac-2.9.1-4.el8_9.aarch64.rpm 26de749017ffb64dcc0e5a6cd629e8fee87d8f8d6d7955b8081882c7c696a6e1 libsss_autofs-2.9.1-4.el8_9.aarch64.rpm e04628cbda1ec4978f41f85715757a848b48b27d85d4df444f091f003498eb36 libsss_certmap-2.9.1-4.el8_9.aarch64.rpm 214dac60735c2fa777903aec4f9f3ec8459928740dc9544fc338ba24dff2481b libsss_idmap-2.9.1-4.el8_9.aarch64.rpm 532b533984f25cb3f0a94b55241a98dbca2b35533cdd646b41b66fc1b504d995 libsss_nss_idmap-2.9.1-4.el8_9.aarch64.rpm 939f40e3cfb87aeaedd58726ae47e553016ac78034910bf34c55a6caabf8c6d8 libsss_simpleifp-2.9.1-4.el8_9.aarch64.rpm d3b7f80d95f7c121b03b39f368a6983213a591ccadfb963c38be10d9bf93c30c libsss_sudo-2.9.1-4.el8_9.aarch64.rpm de21674635ea819009851a086aa859a711924983bb5c77bbe5622605120411c2 python3-libipa_hbac-2.9.1-4.el8_9.aarch64.rpm 0a5913c66c86ad7fa893e963753f6e83d33186abc27433823f6007a89055e19c python3-libsss_nss_idmap-2.9.1-4.el8_9.aarch64.rpm 6167118ff9f65e2841b16ae0cb649e7a6d708458b05b1aead3e102d175901cf6 python3-sss-2.9.1-4.el8_9.aarch64.rpm d6de3a1b9101e2b2f72fd105c81a2cac09a4ee249192852afff17cce4932138f python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a python3-sssdconfig-2.9.1-4.el8_9.noarch.rpm b148427ebe8ec952f6cafa76baaa0c3d10cea8d467e4da4c60b3907c08fdfa3a python3-sss-murmur-2.9.1-4.el8_9.aarch64.rpm 40c7dc9e2e37684c4ee97817c7bdb49ba5b513b7da4917f3f85158c3d718a220 sssd-2.9.1-4.el8_9.aarch64.rpm 535c89412a61c1c9544d92cfca0c49a97657410f64aaf5e660cf847232f7d773 sssd-ad-2.9.1-4.el8_9.aarch64.rpm cb3f1a9f02428552a3eab4f6b46e2e99ee0126005135d859e0e6166424856627 sssd-client-2.9.1-4.el8_9.aarch64.rpm 0d96b7c9b63b078a47f3137509b40e7b65e0e09a05e442bcf4b668425d2ef495 sssd-common-2.9.1-4.el8_9.aarch64.rpm e01f99d2dd90dfb23368d5b5cdc1050fd9ad511dde7983eb2d3db535459bf402 sssd-common-pac-2.9.1-4.el8_9.aarch64.rpm 496e8c967b17f7d5e9bd245dde24d97ff0df22ff15f5d8a9437c38bf0ae4cf42 sssd-dbus-2.9.1-4.el8_9.aarch64.rpm 05921e4978d0452379741400fe380ab884fc219efb99f0f0dddd590850ce1f54 sssd-ipa-2.9.1-4.el8_9.aarch64.rpm 49b476dd53ee9d69aed5e04c36aea3084a5f508c7dd5e8a7bd4de89e2ca2515c sssd-kcm-2.9.1-4.el8_9.aarch64.rpm 947c991d984526757a9db6382b3f72e16e8c470fd7b4e6339bd93785f19606f7 sssd-krb5-2.9.1-4.el8_9.aarch64.rpm 0de4624edb20c4ff0bcadcaa62112c7033f0608264abbe6a2b133de66a73a28b sssd-krb5-common-2.9.1-4.el8_9.aarch64.rpm 655f97356e6582362d9bff7a8b91611b8b43916e7c3d9bf75a0c1828f86f5989 sssd-ldap-2.9.1-4.el8_9.aarch64.rpm 8d62bb44257696f5e03afa7a3a48ceec73e20cee3406201417a9902fc9dc99d1 sssd-nfs-idmap-2.9.1-4.el8_9.aarch64.rpm b9183d4e7f6cd1e2e585a43d10c5a9dacf56e3cc2e43cb3f1cfdcdee4c6532ac sssd-polkit-rules-2.9.1-4.el8_9.aarch64.rpm 8c5de5af7560c17277aa6e35d5e4394d2e457d67255ce2f8f552a97703401be2 sssd-proxy-2.9.1-4.el8_9.aarch64.rpm 60dddce7775171d45f6e52143518032a397614e57481530c3c3abcea426bec0b sssd-tools-2.9.1-4.el8_9.aarch64.rpm c6b2321818cceffe52f329e5ed465d238b9c915e7eb3dd7a5d59ec6912eea4d1 sssd-winbind-idmap-2.9.1-4.el8_9.aarch64.rpm d1228c10585f32912ac4cbd00c62e15a5e5ef2ef873d364f8830a1eb74f8f387 RLBA-2023:7211 krb5 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * Allow to make AD-SIGNEDPATH optional (JIRA:Rocky Linux-10514) none-baseos-rpms krb5-devel-1.18.2-26.el8.aarch64.rpm d7b2b4d1ac90b2494ea8c7817073c38a25eaf9cbd9f09b618785e934007712eb krb5-libs-1.18.2-26.el8.aarch64.rpm 24733dfccafe7ca20df0ff52eb983e4502e7398645c1e3a7f7d6f36b96f01e4c krb5-pkinit-1.18.2-26.el8.aarch64.rpm 1e41accaf2f3b663443ea5bce33aaf460511b32fa85332c05d83b2920beb1e30 krb5-server-1.18.2-26.el8.aarch64.rpm 36cb4609adee86177b63f7a97534402a50f1a695b80b8aa96b9668894c3e0bf8 krb5-server-ldap-1.18.2-26.el8.aarch64.rpm b4501dec3d26b78edd93803a135e775d3a62755f610ee55279e42877e82453c0 krb5-workstation-1.18.2-26.el8.aarch64.rpm 82089d45d2ce3a18ba9f7dd6b67f5f6a837fa6c77fc5a384c38505ae04298af1 libkadm5-1.18.2-26.el8.aarch64.rpm 1a5f4279c41e2fde921dbdef262cbe2b8ea999fbe002c11091a76152f584aeec RLBA-2023:7097 systemd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms systemd-239-78.el8.aarch64.rpm 58256c545f6e5748183aae42af3118b1949ea10e7f1f3b533e32f34c7a2df9e3 systemd-container-239-78.el8.aarch64.rpm 1965e59929171a255361b02067ca633aac4775dfde5cce5437a0f6707bb1a7fb systemd-devel-239-78.el8.aarch64.rpm bd3384809583c564fcf35d754a3175df7c6025b691d9fc6628560972e7495a53 systemd-journal-remote-239-78.el8.aarch64.rpm 19c67985295e22a6b25ce4b7905c0eaaa67a92bee0d08edb89c64bc19e1d2b9b systemd-libs-239-78.el8.aarch64.rpm a8a49ea49683d4ab6e5ff9811c46e6bf709aa36770b226955379bf1bd643ee0c systemd-pam-239-78.el8.aarch64.rpm a2b97fcd173b7a1ce7afbab0903a2e02e84440c3f067ab1fcfa8ef5f34f3a5bc systemd-tests-239-78.el8.aarch64.rpm 091de504e069baf8adb501d97a6639692ecacfc476576c99ecdcf437a76cf58b systemd-udev-239-78.el8.aarch64.rpm 931232632eaafbf23bdba05775c30d9a0c008dd73eaf79160ff7812ff2c86614 RLBA-2023:7078 vdo and kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo, vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.8.7-92.el8.aarch64.rpm faecc9aab568e083fdcb606873947563aaf93dc160a7a7c7e82e2668614d3f0f vdo-6.2.9.7-14.el8.aarch64.rpm fcb88678fca171f45085a4423f5d726f742d61e3a079a946ca4bc05d33fd640f vdo-support-6.2.9.7-14.el8.aarch64.rpm 64d754225778bea0b8832fa41afa3a645862914e1343d1422fb0edd95ca12bfb RLBA-2023:7128 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms mdadm-4.2-8.el8.aarch64.rpm 0dd7be587897b71b03ff9aaf9c0e93f13ec3479b7850b1c000f2216827b3edf8 RLBA-2023:7133 libfabric bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libfabric. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms libfabric-1.18.0-1.el8.aarch64.rpm 80587899f31d4970a5e09129bd35e39806e528a331fe4e68aabcd1dabd43c2d4 RLBA-2023:7135 libldb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms ldb-tools-2.7.2-3.el8.aarch64.rpm 5d3701a93e3956a6c4d83cf9f471bdcf5652b7e6b67186a724c0f822d0d5d0fc libldb-2.7.2-3.el8.aarch64.rpm 000f93a0be804bbae93c1b369dc54889f91730dd7f8cfc802e00957a43c49ac3 libldb-devel-2.7.2-3.el8.aarch64.rpm e8c4ef307940e80532073cfb546d2045c935ceacbac967037af9421d504f8fcd python3-ldb-2.7.2-3.el8.aarch64.rpm 9a4a50974960548ab37fe089dae0a25bed21fac5e462ef380960ce0f7b909879 RLBA-2023:7141 grubby bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms grubby-8.40-48.el8.aarch64.rpm bd8f02d35fde51fbdc5fa511bfbb4712b76b0d1b398ab85d01c74524ffd4441a RLBA-2023:7158 curl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms curl-7.61.1-33.el8.aarch64.rpm a1f16eb711a822b7b7afffb2a26cdd6320f7edb6028c3b26a12a85cb09c538a9 libcurl-7.61.1-33.el8.aarch64.rpm 23cfa155e621dacb75a533a86ff4896d067d35160bcad41abea8cd6430862bd3 libcurl-devel-7.61.1-33.el8.aarch64.rpm 8e90d7a29bda4f6b44b5778d2e6aca8c1bc2b04b42cdde1c17a84dca81ba950d libcurl-minimal-7.61.1-33.el8.aarch64.rpm 21c13b724687b39841b13dbf4446c1c0cc4c0fc1c1422f12035c16a353357335 RLBA-2023:7297 nghttp2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.9 Release Notes linked from the References section. none-baseos-rpms libnghttp2-1.33.0-5.el8_8.aarch64.rpm 90360678e8b5cd31bfc78b12db6ce4ecd1f924d0beabd75ba242b5c585d9def1 RLSA-2023:7549 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe (CVE-2023-2163) * kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags (CVE-2023-3812) * kernel: use after free in nvmet_tcp_free_crypto in NVMe (CVE-2023-5178) * kernel: use-after-free due to race condition occurring in dvb_register_device() (CVE-2022-45884) * kernel: use-after-free due to race condition occurring in dvb_net.c (CVE-2022-45886) * kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c (CVE-2022-45919) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Random delay receiving packets after bringing up VLAN on top of VF with vf-vlan-pruning enabled (BZ#2240750) * bpf_jit_limit hit again (BZ#2243011) * HPE Edgeline 920t resets during kdump context when ice driver is loaded and when system is booted with intel_iommu=on iommu=pt (BZ#2244625) none-baseos-rpms bpftool-4.18.0-513.9.1.el8_9.aarch64.rpm cc31e6ba8fdf419a23b7738eefe8aea689ed411b90c5b80d84f33f71081fe4ed kernel-4.18.0-513.9.1.el8_9.aarch64.rpm 9ccbfc1f62dfb76e59fd80127c327742cd99f88431e7224bccf4eced25ab2866 kernel-abi-stablelists-4.18.0-513.9.1.el8_9.noarch.rpm 6c0b0b7f1ca4aa2fb5a7e7f5e0e6549865a34e95afadcca0c0df0dc3d38e851e kernel-core-4.18.0-513.9.1.el8_9.aarch64.rpm 5283261bd3ec3be1f00bb5fc0f3db918d89f5745b5ae66f7408eac4f534f5598 kernel-cross-headers-4.18.0-513.9.1.el8_9.aarch64.rpm 42a0b64b7b857913ff4ac8bcaed7b3cbb608e12bb54272e768fedba993b8dee7 kernel-debug-4.18.0-513.9.1.el8_9.aarch64.rpm bb9bd4f072293d290b455ab66772b9ca85e1f3f01e6599129b47896b4e637a03 kernel-debug-core-4.18.0-513.9.1.el8_9.aarch64.rpm 9df09dc3288c2196ec8acd29ebac9fe9ae691800715f001634f84a1b3fbe0807 kernel-debug-devel-4.18.0-513.9.1.el8_9.aarch64.rpm 69396e6da04d6db0f1b6f40b0c04e2c935d0147b28ccaf5bf4f7a769acc9f802 kernel-debuginfo-common-aarch64-4.18.0-513.9.1.el8_9.aarch64.rpm 1663741b5492d1895da597e66bdeb7298eb470624d6c1ef003d60dd546a97992 kernel-debug-modules-4.18.0-513.9.1.el8_9.aarch64.rpm 5e6b024e71e9e968212b0ea0bc928ae3f4fc739a4f772ba318626b494dca3c0a kernel-debug-modules-extra-4.18.0-513.9.1.el8_9.aarch64.rpm 59e451e3a0643d12fb91cbd4974eb686e210106af02bffcd06e6fb5648f85ef9 kernel-devel-4.18.0-513.9.1.el8_9.aarch64.rpm 1b75e35963e4dbd6c437056f789391a2b0319e0a2a5913e379c06a5a385ba0c3 kernel-doc-4.18.0-513.9.1.el8_9.noarch.rpm 985b204c67a0910fde2ceffdad9dc95b4f5316c29ad5b5a3e3c4c33631f0bcf4 kernel-headers-4.18.0-513.9.1.el8_9.aarch64.rpm 8daeace9f434d23929bdeaac290797bfa31217f7401211a859a1c740befbad65 kernel-modules-4.18.0-513.9.1.el8_9.aarch64.rpm 7a4d2150ec1f01bc47a4f1b330698ac6a73989f68f24e92afb67aa12ea28bacf kernel-modules-extra-4.18.0-513.9.1.el8_9.aarch64.rpm 8fd402ecebdea675e3ca85561fcc7b60466c16df820bf94ef65a58f520615264 kernel-tools-4.18.0-513.9.1.el8_9.aarch64.rpm 756b73a04774beb97814c32293dc10daf22e3c211b8e7932314e5e77f0a2a76c kernel-tools-libs-4.18.0-513.9.1.el8_9.aarch64.rpm d5f450cdf2f4e17125051cc165239ad14a87edee2f63a8f224d1350d5746dbbd perf-4.18.0-513.9.1.el8_9.aarch64.rpm 520366e18d2e3c0a450edfa8dcd9a0f533c2a9ac11c9b25cc517fb1e54bf4cea python3-perf-4.18.0-513.9.1.el8_9.aarch64.rpm 07a08013f1441d9155d2652062d0544895b226558af1c2f7ab7ac80eb6165456 RLSA-2026:1662 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error (CVE-2024-26766) * kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem (CVE-2025-38022) * kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution (CVE-2025-38024) * kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415) * kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion (CVE-2025-38459) * kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760) * kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258) * kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271) * kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling (CVE-2025-40322) * kernel: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() (CVE-2022-50865) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.100.1.el8_10.aarch64.rpm 83f4c88339c9a54428614cf528204b8c992f1121ca94918405157f6c513275ec kernel-4.18.0-553.100.1.el8_10.aarch64.rpm 9f759b3f6d7a98a8b0ef8c92c7edb36b1ab8ab27ed97adb5eb5ca7f948895ba5 kernel-abi-stablelists-4.18.0-553.100.1.el8_10.noarch.rpm eb3305c89153e0da9f3c699c3c2fefba50db09533c3996c2151ec402e132d6ef kernel-abi-stablelists-4.18.0-553.100.1.el8_10.noarch.rpm eb3305c89153e0da9f3c699c3c2fefba50db09533c3996c2151ec402e132d6ef kernel-core-4.18.0-553.100.1.el8_10.aarch64.rpm 751d1a6bb6c8fa5363f753e61055e09fec15ca42de3bebaa1e5860aad68c4b24 kernel-debug-4.18.0-553.100.1.el8_10.aarch64.rpm 7e4c4a231807a87cb45bc2f97beab458654b158b9872dc06a6636da07aa03951 kernel-debug-core-4.18.0-553.100.1.el8_10.aarch64.rpm 1c97cf9bbebec450b8fb4a9158e3932d802d03191b59ef9f653d79e9e4477056 kernel-debug-devel-4.18.0-553.100.1.el8_10.aarch64.rpm dac3ce82aef672ec61d591cb7e3ff88e2038544239831d36e7139a9291258176 kernel-debuginfo-common-aarch64-4.18.0-553.100.1.el8_10.aarch64.rpm ce42b29b4e7393140b69de90e74a1d831c248c97cc39432c1ab801eedebd8cc3 kernel-debug-modules-4.18.0-553.100.1.el8_10.aarch64.rpm cedd91f801c3660b43ec2d99f6a11bee974a135c0956a2ee8fb3ac8a90ba90a9 kernel-debug-modules-extra-4.18.0-553.100.1.el8_10.aarch64.rpm 3ff6fcce19eba8226c41df70deb9e6ba01c5b358a343e0c594848d7299636465 kernel-devel-4.18.0-553.100.1.el8_10.aarch64.rpm f53b1ab1c72bb4f7b23fb7d9ebe88515b1945fa96dc82955ba1d5092a8022702 kernel-doc-4.18.0-553.100.1.el8_10.noarch.rpm 45c04fe96a1dc7b27690dee97a6a86eab5841efe39836932db32d6a3618477de kernel-doc-4.18.0-553.100.1.el8_10.noarch.rpm 45c04fe96a1dc7b27690dee97a6a86eab5841efe39836932db32d6a3618477de kernel-modules-4.18.0-553.100.1.el8_10.aarch64.rpm 7443da4dd4cbd10c4dc237d4a6c1e98d5ea154c902886298325255158104924c kernel-modules-extra-4.18.0-553.100.1.el8_10.aarch64.rpm 85143a0b8b86cbeeab550253c49455064eff94684d8a6c51f5136f78f17b1728 kernel-tools-4.18.0-553.100.1.el8_10.aarch64.rpm 2df4369887a2fe564ff9cd011df6aed471e66f71447ee965f86b0e8fa14b0679 kernel-tools-libs-4.18.0-553.100.1.el8_10.aarch64.rpm 816760893aa4fad96755ce0d2b4abb7b4990fbc2c6e7024ff3efebd9c69c3f13 perf-4.18.0-553.100.1.el8_10.aarch64.rpm 3f90e7ed561a96ed9c8abbc4e19e6306e84e18dde6a5268c3cf0fe3f4cd5925c python3-perf-4.18.0-553.100.1.el8_10.aarch64.rpm 0a977d775b33e9d75e410b5c8b5364a5c71d2e7717c17149bad356c0c3454ab1 RLSA-2023:7836 Moderate: avahi security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Security Fix(es): * avahi: Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket (CVE-2021-3468) * avahi: Reachable assertion in avahi_dns_packet_append_record (CVE-2023-38469) * avahi: Reachable assertion in avahi_escape_label (CVE-2023-38470) * avahi: Reachable assertion in dbus_set_host_name (CVE-2023-38471) * avahi: Reachable assertion in avahi_rdata_parse (CVE-2023-38472) * avahi: Reachable assertion in avahi_alternative_host_name (CVE-2023-38473) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms avahi-0.7-21.el8_9.1.aarch64.rpm 2a333e37680a72d173978a27486cff7f9679caa98d18b18eed54c937068a78a8 avahi-autoipd-0.7-21.el8_9.1.aarch64.rpm dafe46f8dcb5d92e6f2c95bb54112aa18afdbaa726657df61c3c5f97afb73015 avahi-glib-0.7-21.el8_9.1.aarch64.rpm a3f1f12aacce005adca67ece0a943bf8779a99bec5283e809a9ca660aeab1e43 avahi-gobject-0.7-21.el8_9.1.aarch64.rpm 9f85945c8c14b065cbf630b619e8b98aae473bc66a8184dd54879a0b167d65ab avahi-libs-0.7-21.el8_9.1.aarch64.rpm e0b5703340946e5a80e3afb31eecf9ce6fda80ae1250d13a44905364f61718de python3-avahi-0.7-21.el8_9.1.aarch64.rpm beb5e966a2dffae6cf83e5196afe1c17cca63a53400759a85dba968e417afc9a RLBA-2024:0111 selinux-policy bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The selinux-policy packages contain the rules that govern how confined processes run on the system. Bug Fix(es): * Allow selinux transition from ifconfig_t to httpd_t and sshd_t [rhel-8.9.0.z] (JIRA:Rocky Linux-15427) * AVCs with samba-dcerpcd and samba_export_all_rw [rhel-8.9.0.z] (JIRA:Rocky Linux-16274) none-baseos-rpms selinux-policy-3.14.3-128.el8_9.1.noarch.rpm c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03 selinux-policy-3.14.3-128.el8_9.1.noarch.rpm c7433d674d6f5d9a7a8bf0ea180d467e6f68f113ad23a099be84b71ca8a56c03 selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm 7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a selinux-policy-devel-3.14.3-128.el8_9.1.noarch.rpm 7fe0299de89fcebcf37a86be62b57736b0c5557f4d182a664a3ec58d16989d1a selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm 9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff selinux-policy-doc-3.14.3-128.el8_9.1.noarch.rpm 9471f6adb2710ed4bfcc6695e4bd72e84b0f4c79d9717d554a585ff319b63eff selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm 072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b selinux-policy-minimum-3.14.3-128.el8_9.1.noarch.rpm 072fc4d0e4315817acb5b0ce0f1bc930e81f9c22c604e2870c133ff77f74ef3b selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm 0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e selinux-policy-mls-3.14.3-128.el8_9.1.noarch.rpm 0d1ad8a88f168fb39c385ab5e4da73b2c458a9b4b06dff84896f688f2ecf1c6e selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm 3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762 selinux-policy-sandbox-3.14.3-128.el8_9.1.noarch.rpm 3e3c5e2e37404331b64f013dd313d08444612b6bffa1114de993772973492762 selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm 7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2 selinux-policy-targeted-3.14.3-128.el8_9.1.noarch.rpm 7e06389eb99b9c66b0cf8e3459816672d2603a5b87094c6ba8bb7e56c95c5dd2 RLBA-2024:0117 libcap bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libcap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Bug Fix(es): * libcap NVR in Rocky Linux-8.9.0 is lower than the package from Rocky Linux-8.8.z [rhel-8.9.0.z] (JIRA:Rocky Linux-19362) none-baseos-rpms libcap-2.48-6.el8_9.aarch64.rpm 72805c8a2622a89c354d7ffcd69acce11c0f45e227209bc5040a4f56e177afc9 libcap-devel-2.48-6.el8_9.aarch64.rpm ab48ff9865d5d739fc46a028af5f7bc7528d588b4d38ea4881803b86dc4e24b1 RLBA-2024:0118 xfsdump bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The xfsdump package contains xfsdump, xfsrestore, and other utilities for backing up and restoring XFS file systems. Bug Fix(es): * xfsdump/xfsrestore: suggest recovery for false roots may be possible using -x (JIRA:Rocky Linux-14494) none-baseos-rpms xfsdump-3.1.8-7.el8_9.aarch64.rpm f1dc8f7799cb34a51e9a028d4e39b3d3bc95b7eaa753a9fc286d515495df0b38 RLSA-2024:0155 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: timing side-channel in the RSA-PSK authentication (CVE-2023-5981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.16-8.el8_9.aarch64.rpm 126fcfdef8cc390f13adc3bd61e378c8b146f5ed5d938f346dc0510e2bc982d9 RLSA-2025:11850 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead (CVE-2022-49977) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.64.1.el8_10.aarch64.rpm 977c3a72a59552b339cd962ec252466bdc9444a340e40f42aaeed17dd33cbbae kernel-4.18.0-553.64.1.el8_10.aarch64.rpm 7df2dabf2ab46057666a8a7ec681b317299deb361eaac62667f860e56ddd2be7 kernel-abi-stablelists-4.18.0-553.64.1.el8_10.noarch.rpm d1dfcf9ed736ebfe6700693a5d3b54fa3fdc2fda4aa88d47dc6ea21d5326493c kernel-abi-stablelists-4.18.0-553.64.1.el8_10.noarch.rpm d1dfcf9ed736ebfe6700693a5d3b54fa3fdc2fda4aa88d47dc6ea21d5326493c kernel-core-4.18.0-553.64.1.el8_10.aarch64.rpm c5e6e7dca198917f24993c17ad2ba85074157e0723aa662d0fa9ac3c1512b207 kernel-cross-headers-4.18.0-553.64.1.el8_10.aarch64.rpm 4c2015d2e598ae5c383831f8c6cb81e9d4c6fcfd7958ef92267467cfc98ca4ad kernel-debug-4.18.0-553.64.1.el8_10.aarch64.rpm 77ff455045535f3d41c1d3fa25546237707602283f90a59d8fcbf2b14deb2126 kernel-debug-core-4.18.0-553.64.1.el8_10.aarch64.rpm a845f774ed7e8b5a045718ba956116014a98d467d0546e77b44ea56381742996 kernel-debug-devel-4.18.0-553.64.1.el8_10.aarch64.rpm b9eabcaeef2a013a5b908dafdc7bea1a3a49f203d1a1941149d0242769459ecb kernel-debuginfo-common-aarch64-4.18.0-553.64.1.el8_10.aarch64.rpm 51d7e0def00ff44ad272dfdf63dd2e9cff2536c39207c0214cef980d7fd7de88 kernel-debug-modules-4.18.0-553.64.1.el8_10.aarch64.rpm 00d6d79178c142f09d34da405cc976869731069c92ecb67a4eacad157f0c6d0d kernel-debug-modules-extra-4.18.0-553.64.1.el8_10.aarch64.rpm bac792c2ca891c9fae30cd087b52d2530ced9535572c0ffca89a1a291060ee6f kernel-devel-4.18.0-553.64.1.el8_10.aarch64.rpm ad85e60d30da92d35c034f20021ba9c4f61502a084107588bbafbfeeb021869b kernel-doc-4.18.0-553.64.1.el8_10.noarch.rpm 985470b9e39595b464001dacaf22c3e6e266075e57c375449ca7032ed4478ed5 kernel-doc-4.18.0-553.64.1.el8_10.noarch.rpm 985470b9e39595b464001dacaf22c3e6e266075e57c375449ca7032ed4478ed5 kernel-headers-4.18.0-553.64.1.el8_10.aarch64.rpm aaddb5353654ea72ded17f21c1e7bce61be857742d8588f49070772c5aa084f6 kernel-modules-4.18.0-553.64.1.el8_10.aarch64.rpm 8110af1c7522d2775e55c610f3e2c4c508597eda67b52666af643fccd98863d7 kernel-modules-extra-4.18.0-553.64.1.el8_10.aarch64.rpm 573de76b1f4ea1e5cbf3e2ca13612386c96094e305b81e16326668d103380ec5 kernel-tools-4.18.0-553.64.1.el8_10.aarch64.rpm 2f752fa6f8b849c39331997418f081e50c2bf8e034ecdee8f6ceafa74286ada0 kernel-tools-libs-4.18.0-553.64.1.el8_10.aarch64.rpm 718a169129092b7220ddb9d9dd95dde082af197bd537cf43eb29686fc71c4e16 perf-4.18.0-553.64.1.el8_10.aarch64.rpm b75b7f0860d0188382121bb9602792caa3862dcdc50861c41d6ca1d6121aea4b python3-perf-4.18.0-553.64.1.el8_10.aarch64.rpm da23108206edfd7ed07cbded528be3571a3f902cf60277a50f73e3bf6c59c014 RLSA-2024:0253 Moderate: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: heap-buffer-overflow at sessionfuzz (CVE-2023-7104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-3.26.0-19.el8_9.aarch64.rpm 596ec34b04092313e6b5598ad62aa1d6307c5154e092ead1fe7fbbec91abb31d sqlite-devel-3.26.0-19.el8_9.aarch64.rpm 24d1a6daadd9b122e4ac484f29fcf54cf1e257a46b39e712c2b0f84000163a80 sqlite-doc-3.26.0-19.el8_9.noarch.rpm 062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79 sqlite-doc-3.26.0-19.el8_9.noarch.rpm 062df3cfd98abe04f209e6412438476e99f396b73ff1308ba4ec9c799a482e79 sqlite-libs-3.26.0-19.el8_9.aarch64.rpm f3b403272aac32feb6809be53a598e184528f0876b9ef017995be730dec16b06 RLSA-2024:0256 Moderate: python3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple (CVE-2023-27043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-56.el8_9.3.rocky.0.aarch64.rpm aeb7703bae5aea9a2109258c93263ca1448d0d2191b58afaf4f56756c8d730bc python3-libs-3.6.8-56.el8_9.3.rocky.0.aarch64.rpm f2b079ef084b6a27ddf24105006e9048a1fe22f898ac94d3048ce568d8268886 python3-test-3.6.8-56.el8_9.3.rocky.0.aarch64.rpm d0c3b51f01f288cee07d1410a3dd79e8024b1c723c9e0182228d3b7c73536903 RLSA-2024:0606 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795) * openssh: potential command injection via shell metacharacters (CVE-2023-51385) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssh-8.0p1-19.el8_9.2.aarch64.rpm d95cbb9d86e6d4a2a7dc7280165263a108923fb8f88b5f141bc9a47c3da7f3b4 openssh-cavs-8.0p1-19.el8_9.2.aarch64.rpm 49abc4dea5de7b8b8f44cc9a69e11a1e79674e12c9939f05baabf11165f7bbb0 openssh-clients-8.0p1-19.el8_9.2.aarch64.rpm 1c421edc997d33141b924373a93b3d569dc0f5e32063eb9541fbfb64cf3e689c openssh-keycat-8.0p1-19.el8_9.2.aarch64.rpm eeb8461673f84751f3e2322709453d7890ddb8ed798b7e84aca238739d790725 openssh-ldap-8.0p1-19.el8_9.2.aarch64.rpm f334376afd993dea03ba0a6f1f37a06d46e3d916a2fcd977b855dbe16d232bd1 openssh-server-8.0p1-19.el8_9.2.aarch64.rpm 94125a0e0231ab3257b88748d5707aae89428c8426c62b3b48494ec1707c2ab4 pam_ssh_agent_auth-0.10.3-7.19.el8_9.2.aarch64.rpm c1586356d36e3712a67ac936f8f5c4b27b368a8a20cfe1983f623a775b263bdd RLSA-2024:0628 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libssh-0.9.6-13.el8_9.aarch64.rpm 4b24d4776dee7faf185fce19c577f35185ede844a4bdfec335dcd45ea9933339 libssh-config-0.9.6-13.el8_9.noarch.rpm 95f8cd739183ac321da16c9855bf7fd0007d04b4dfddbeb8f7f8368d051275b9 RLSA-2024:0627 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: incomplete fix for CVE-2023-5981 (CVE-2024-0553) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.16-8.el8_9.1.aarch64.rpm 49889d8844b37dddcc54526053fe07bec3130a54f503290b7d8298302719fa12 RLSA-2024:0647 Moderate: rpm security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Security Fix(es): * rpm: TOCTOU race in checks for unsafe symlinks (CVE-2021-35937) * rpm: races with chown/chmod/capabilities calls during installation (CVE-2021-35938) * rpm: checks for unsafe symlinks are not performed for intermediary directories (CVE-2021-35939) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-rpm-4.14.3-28.el8_9.aarch64.rpm 42b57f27c8bf47c79da5fb910772aac1bb8393910abf682bb0162c25a8a5f205 rpm-4.14.3-28.el8_9.aarch64.rpm 697a76e7759305bca11bf3f37a881a6a402dde2d92a0cc733ff9ceb34792535f rpm-apidocs-4.14.3-28.el8_9.noarch.rpm 292ab5434a558d5783d3f51a6420dc09f103c137a66cbb8f6244b4c22fff0b79 rpm-build-libs-4.14.3-28.el8_9.aarch64.rpm aa7d6f97c61338717a1b8f9fc31914cc1ac920302f4538838da5576d0b2217e0 rpm-cron-4.14.3-28.el8_9.noarch.rpm eb1ead21a24d1c943d9de5489120f1a3075cf35644adc373b05f9895095d4217 rpm-devel-4.14.3-28.el8_9.aarch64.rpm fdd25358710321b96294c10717f997cb6f601158018a9b5bb1cbd921b9539d99 rpm-libs-4.14.3-28.el8_9.aarch64.rpm 188037ed99fcdd5af12c419a7fb25ce71e172f6bc6c954576881c4b9796ef975 rpm-plugin-ima-4.14.3-28.el8_9.aarch64.rpm 8819feab3b978705897be455ad8178e691c6a120336a28e23ba637739296b217 rpm-plugin-prioreset-4.14.3-28.el8_9.aarch64.rpm 3c656f6799854dd98482da68a7c29874095251f1bee71b12f01b90cc2fd03e7c rpm-plugin-selinux-4.14.3-28.el8_9.aarch64.rpm f221450f7359af4b9a2a6e664b3482dcd5f20d97cd95aba2e7e3ce850e0f80eb rpm-plugin-syslog-4.14.3-28.el8_9.aarch64.rpm ae2ec2e7c9a8ef10c2478542ac53c4656986cd5923d196e026bb4a4386fd3660 rpm-plugin-systemd-inhibit-4.14.3-28.el8_9.aarch64.rpm 9d1d14d82dc082b66d9645a2e68588211b9072f46d90ef326df42cd21860c5b1 rpm-sign-4.14.3-28.el8_9.aarch64.rpm 545117f4555c09276d9556db535fe6b257560f52fabb22f28022eb31d9797d82 RLBA-2024:0721 sos bugfix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Rebase sos to 4.6.1 in Rocky Linux8. (JIRA:Rocky Linux-21173) * Rebase sos to 4.6.1 in Rocky Linux9. (JIRA:Rocky Linux-21174) * Use device authorization for uploading sosreports in Rocky Linux7. (JIRA:Rocky Linux-21176) * Use device authorization for uploading sosreports in Rocky Linux8. (JIRA:Rocky Linux-21177) * Use device authorization for uploading sosreports in Rocky Linux9. (JIRA:Rocky Linux-21178) none-baseos-rpms sos-4.6.1-1.el8.noarch.rpm 460b874a56caf9bd90d547c53cb5e36cbbd5c847436b3f7d655061d8c5673186 sos-audit-4.6.1-1.el8.noarch.rpm 23616ddfd1107a94eca0c215329438ef71226fdf77f1287f86d3d69e973de722 RLSA-2025:12752 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: ext4: avoid resizing to a partial cluster size (CVE-2022-50020) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.66.1.el8_10.aarch64.rpm 197e7a61a4dfa959588e0a477cb6149b12e10128db68fcfb4d7dbe08d43d7b74 kernel-4.18.0-553.66.1.el8_10.aarch64.rpm b6b64089a129bae49a57793547ab3291d55a928fa561cb4aa459088870d99774 kernel-abi-stablelists-4.18.0-553.66.1.el8_10.noarch.rpm c88b86850a18b29453b36e5a6c7a0cbf376853c9842b28b13b8fe4d42bc320db kernel-abi-stablelists-4.18.0-553.66.1.el8_10.noarch.rpm c88b86850a18b29453b36e5a6c7a0cbf376853c9842b28b13b8fe4d42bc320db kernel-core-4.18.0-553.66.1.el8_10.aarch64.rpm 61adc7e9de2f9687ef68e5f28ae2c5e0bedbf92b1f0e20f3be36a7da3aa06c3c kernel-cross-headers-4.18.0-553.66.1.el8_10.aarch64.rpm 734f8906d8007d488b6b4a7a099f1abc5d0f9dba401f110a99065b376b8d63bb kernel-debug-4.18.0-553.66.1.el8_10.aarch64.rpm 8b7458141d34fbf99c98634d2db7f37f554644aac8f492a4dd7d063be056ef57 kernel-debug-core-4.18.0-553.66.1.el8_10.aarch64.rpm d5b52f374f1a0ef6ed1dc92319eb15ba8cd9a77bedb8ef3773b870f6b00bf443 kernel-debug-devel-4.18.0-553.66.1.el8_10.aarch64.rpm 818682a37a72344d2056b1121e3727818efa942b141602179545031066365b0f kernel-debuginfo-common-aarch64-4.18.0-553.66.1.el8_10.aarch64.rpm 1a19fc82f563cab386ec0fb0cef7b520e4e2be3457aff7b6bc08090ef44b2684 kernel-debug-modules-4.18.0-553.66.1.el8_10.aarch64.rpm 57f407d7c9fcb6b51d6feadc4245011244538dbb38ed5dc7a5f2e9ed33bd2d27 kernel-debug-modules-extra-4.18.0-553.66.1.el8_10.aarch64.rpm e081db686a27e97a95cdd25a2d8c1978b0ff73f9a984225eea25d9d6e3312871 kernel-devel-4.18.0-553.66.1.el8_10.aarch64.rpm 1cc85bff43cae68598403b538d2b1da5e12741f15de819f1c137b84b4fb81fda kernel-doc-4.18.0-553.66.1.el8_10.noarch.rpm 092de3840aa67e17772e7a6363cb5f36ad216acec7630fe398accff61b138a81 kernel-doc-4.18.0-553.66.1.el8_10.noarch.rpm 092de3840aa67e17772e7a6363cb5f36ad216acec7630fe398accff61b138a81 kernel-headers-4.18.0-553.66.1.el8_10.aarch64.rpm 6fc0b4159bcc702e47ddfcd29769a854fd7048e44dd9923edbae9ad7096bc8de kernel-modules-4.18.0-553.66.1.el8_10.aarch64.rpm 4ae46f31810e21acc6196ba600c4ad4020c6b2afd75d3a7e5f509e38b43adaf6 kernel-modules-extra-4.18.0-553.66.1.el8_10.aarch64.rpm 501ab63a0bc3107f9a776750d147efe03136828ca21d11a284b36c6087faa47f kernel-tools-4.18.0-553.66.1.el8_10.aarch64.rpm 8315bb2a93206ff255c8581dd061a02df1c7cef0a6d5f24e3c6a24a83b9d821b kernel-tools-libs-4.18.0-553.66.1.el8_10.aarch64.rpm 8fd79f6b9a317e5f02564102ea579088e441142c6cdd56dca54be9f15ea5e3fb perf-4.18.0-553.66.1.el8_10.aarch64.rpm deec9786611ffff6884b1c6275aec3ebb6d8996fb11c344d59d3361f3aa19657 python3-perf-4.18.0-553.66.1.el8_10.aarch64.rpm e315c35a395a29e7c306527658d3fc2fba5aaf9dfb6d8f2e1dc893d2810b6457 RLSA-2025:12980 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Double free in glibc (CVE-2025-8058) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-251.el8_10.25.aarch64.rpm 1ccf7beb01b651247b424510a4c418212a70bb0abf2e4d4eab33b0f9f67d03e4 glibc-all-langpacks-2.28-251.el8_10.25.aarch64.rpm 1226484e5f312c804d937c518f1a991e423bffa34e5495fa61490b3762bbfe82 glibc-common-2.28-251.el8_10.25.aarch64.rpm 2154939f54817d73c11854a56108118ea02398835673e1bface50e6c46dc5795 glibc-devel-2.28-251.el8_10.25.aarch64.rpm 8c4056744ff733f245c6786367cc7ae40dd1d81dd5eb8d0819e45e67cb44cfb6 glibc-doc-2.28-251.el8_10.25.noarch.rpm c90ea9438a557de8d2e9e2df0c86ba31917c9a8d58784db64ba11b4dd6a9f750 glibc-doc-2.28-251.el8_10.25.noarch.rpm c90ea9438a557de8d2e9e2df0c86ba31917c9a8d58784db64ba11b4dd6a9f750 glibc-gconv-extra-2.28-251.el8_10.25.aarch64.rpm d280ccd1e103d37039ceafdaa114e04419432b5dd53edd523d21c15afe53117e glibc-headers-2.28-251.el8_10.25.aarch64.rpm bc166b16504167c3618aab95ac13ba81c58fce4673c7d763098d534746da9395 glibc-langpack-aa-2.28-251.el8_10.25.aarch64.rpm 33870ca54ebd572588341fe73f5103be2e09e1c04c990a32acc3c8d6425f3c69 glibc-langpack-af-2.28-251.el8_10.25.aarch64.rpm c5c10dac90a98bc1fd497e9699ae4becb25f2557b2dac873f59291cc8797f434 glibc-langpack-agr-2.28-251.el8_10.25.aarch64.rpm 8dd3f5960f10136e0d29abf7b6937b0fcbf046781f5565d61d29329b70fb1d5a glibc-langpack-ak-2.28-251.el8_10.25.aarch64.rpm bbf6ad3fb3549b07e303c8690ccbe67d18dadb00f01079807f4cfe2bf0a84ccf glibc-langpack-am-2.28-251.el8_10.25.aarch64.rpm b4359616f7263aaeabf1b145dc97451cde2e6eb07a16d5c21e14db44a375fa8d glibc-langpack-an-2.28-251.el8_10.25.aarch64.rpm 388c8ca3198051ecd638f91ec31d404594b5f3494fb297612540ff1f7b30ce07 glibc-langpack-anp-2.28-251.el8_10.25.aarch64.rpm e68ca812deb514b282f92730bcda5c265e928b654f84dd5e857f8db17bab0426 glibc-langpack-ar-2.28-251.el8_10.25.aarch64.rpm 57c0d5c5e6ae233fbca0f18e0c3258d6adbf799f251c42a43ed682560118f6a2 glibc-langpack-as-2.28-251.el8_10.25.aarch64.rpm c595afe7e4165a78d23c9f0b656dded7038744d101dd9465ecac8ab2942b0b2a glibc-langpack-ast-2.28-251.el8_10.25.aarch64.rpm 99c8be65ea95d09cb8738198116574645bb28541a90b6b6113c8bb4bad9a1c4a glibc-langpack-ayc-2.28-251.el8_10.25.aarch64.rpm ec7c0ea967d3ef941afd1592bad53a1eab4703f530df7196dd4c9b68dc8d5860 glibc-langpack-az-2.28-251.el8_10.25.aarch64.rpm b9e579d3f6b6c5affc1a42d219f135cad9c078f8cfc135e774bba0ff143dd5bf glibc-langpack-be-2.28-251.el8_10.25.aarch64.rpm b20431a47b8071ddda91db0cced7d441cc37da8ccc78d7aeb529e38051850d10 glibc-langpack-bem-2.28-251.el8_10.25.aarch64.rpm c6caf179d76829956ee05cb8e87c3ffd7b6c23cfaf44bab68cdeb856a3772ed7 glibc-langpack-ber-2.28-251.el8_10.25.aarch64.rpm 22629aab7ff726cb51ec6628e3ec242fcac08eba3aaec1a8d60b070ffbba6489 glibc-langpack-bg-2.28-251.el8_10.25.aarch64.rpm 3705f27aeb1b81a922d3056a9f18f585f0aefa49e94054867f76a95a85763a29 glibc-langpack-bhb-2.28-251.el8_10.25.aarch64.rpm f3ab02357e68b15432de06e95796cef78770ddeb198710172608fd57a21511f1 glibc-langpack-bho-2.28-251.el8_10.25.aarch64.rpm be255a01f6122a4f60913f5640ef1137f55875cd945282837e6ea53d3420d640 glibc-langpack-bi-2.28-251.el8_10.25.aarch64.rpm 39f7e9ffc73628f88ad0108833bd1f9553504d5d23aca097ba18ef8c2e040dc7 glibc-langpack-bn-2.28-251.el8_10.25.aarch64.rpm c89f1f5f39645192eea21f3d36bc3327acd59b4b4edb961ae61c0f0b7e9baa22 glibc-langpack-bo-2.28-251.el8_10.25.aarch64.rpm d6a9d559019579214245ddbcda0450cbd3304190f9db6b22644300d6d505576e glibc-langpack-br-2.28-251.el8_10.25.aarch64.rpm 4a03865ab653066525c2b1b2dd94dc6c7807d7526b7ef873c68cd27d62aba3cd glibc-langpack-brx-2.28-251.el8_10.25.aarch64.rpm 6ce5c3ea89f0d8ba41240f9c07f73b6806325cf3764199a39d97b54a433aeea8 glibc-langpack-bs-2.28-251.el8_10.25.aarch64.rpm 1218bf7f2e114eff575cce810298acb57311d9c7d4e6782690bea8e777679e30 glibc-langpack-byn-2.28-251.el8_10.25.aarch64.rpm c44f5c97d83492d5d6c99c7f0830d90b8aaa2acd9c7737bc8792bbf7b57a908c glibc-langpack-ca-2.28-251.el8_10.25.aarch64.rpm 89f735a4757537d7c96524f3a071e6f74c87146b7b797c9f274d6967e0d496c2 glibc-langpack-ce-2.28-251.el8_10.25.aarch64.rpm 6a1bd242e6bc3277b133b732f92b41a96a307a96dee0531cae7313a99b1e420f glibc-langpack-chr-2.28-251.el8_10.25.aarch64.rpm 4e2d0507dcf424038bc81b76b74bea75649da2c45c79f2eec69a6f58ceb65f40 glibc-langpack-cmn-2.28-251.el8_10.25.aarch64.rpm b62ef16f34220e7160f42226d9abc88b0486d8444dcef64a76a7a90c9eb3a09d glibc-langpack-crh-2.28-251.el8_10.25.aarch64.rpm f5caaadb3b95174c67cf0d95bf3356d711ea83dfb8e7603c0ce270b72b0f7442 glibc-langpack-cs-2.28-251.el8_10.25.aarch64.rpm e522df58191fc0a1ae44c6e12a7ccb1457cfaff0f346c51a884558bcc39e7c7b glibc-langpack-csb-2.28-251.el8_10.25.aarch64.rpm bc63acc26c06127ed0e069df65786446836be753c999cfca1fbf05d49d2e600c glibc-langpack-cv-2.28-251.el8_10.25.aarch64.rpm 1a2e70cb83a0d0eadd37d186308cb406ee5fb3166a8ea2613ca1d0b1c6a769a1 glibc-langpack-cy-2.28-251.el8_10.25.aarch64.rpm 2209fca329aeddb56f81e6c3af8ed62b437f4d4243cfdafa7a7ab11f05d02578 glibc-langpack-da-2.28-251.el8_10.25.aarch64.rpm 17b2e809d531d0dcddae3fc0ec4a6cda48b666ec080c17848fb44f8a7a91bfa7 glibc-langpack-de-2.28-251.el8_10.25.aarch64.rpm 6dd822be640b623025d88be7d56571a0b002701c7f2979b9b6bcc1f63f6df2c3 glibc-langpack-doi-2.28-251.el8_10.25.aarch64.rpm ac2580f771bc2b4f959201b53018d4580b05fa8139dfded20918609dc8af1808 glibc-langpack-dsb-2.28-251.el8_10.25.aarch64.rpm 1bb4458e3662b4a18743d0e077683a531840071952712aa4442085fa4095f669 glibc-langpack-dv-2.28-251.el8_10.25.aarch64.rpm ed58350315bf9f9f08fbda9703d5a41e3e28f0d80709f3006139fbd62647cab1 glibc-langpack-dz-2.28-251.el8_10.25.aarch64.rpm 9ca50f185821e3c82d914084bc19a130ecd685e524795f55516428f35ef772ff glibc-langpack-el-2.28-251.el8_10.25.aarch64.rpm 5eb8b0101c536cd3cf6e6e5238078b1841cda73de40d2c4f79b8a2f348f211cd glibc-langpack-en-2.28-251.el8_10.25.aarch64.rpm 2990b25f5351f515a16f24ee4ac32c2b05b4e2c9bd138cfb104137566cfbaece glibc-langpack-eo-2.28-251.el8_10.25.aarch64.rpm cfeeeb8fd636e6a064a348c6400fcc32db2bcd20053b90bee2e5de6b0e194a03 glibc-langpack-es-2.28-251.el8_10.25.aarch64.rpm 3ffd68b7d634ae9b69e8c5a1595720fc48b986b617a4584912918d1346d175fb glibc-langpack-et-2.28-251.el8_10.25.aarch64.rpm 023056ce8844a4be79c0e9ea283e0aac21cfbabaec355c4871ff3f5ced22634d glibc-langpack-eu-2.28-251.el8_10.25.aarch64.rpm e11cfc4f9ab61661aa4b86fe6fee19af529157fe0947cf239135a45ba347c0fa glibc-langpack-fa-2.28-251.el8_10.25.aarch64.rpm cacc8ce742a79417fa6b2ca1b35d8260bf2f665848c201d9d5e893354e8c3100 glibc-langpack-ff-2.28-251.el8_10.25.aarch64.rpm eefffecbd30e7d5c7c1b7d50ceea794965c486d37034b2fd6e9ee0d3034878ed glibc-langpack-fi-2.28-251.el8_10.25.aarch64.rpm 7c91ebecdb44b2f9e8114815000f6bf3f63e51c14cb44a4847e0244a51ab3c44 glibc-langpack-fil-2.28-251.el8_10.25.aarch64.rpm 698ffa13c60b483caa1878a79567bca46e7a76df6c92b98ae8739c42a82ec0b8 glibc-langpack-fo-2.28-251.el8_10.25.aarch64.rpm dc509318e9d71ef16eac3cdd1dec0a800f3d8d3d2bda6cb77550143abfbc0ca8 glibc-langpack-fr-2.28-251.el8_10.25.aarch64.rpm 85ddb84df1a01c7d63c1aeab3636ef7d8de995c194cfe09246c0fbabce30767f glibc-langpack-fur-2.28-251.el8_10.25.aarch64.rpm fa416ea45751cab000b215413e3f04ced2e4431ea076af56189bed137325403d glibc-langpack-fy-2.28-251.el8_10.25.aarch64.rpm 948c620b6916cd33d8f0227815e88571a16621e086803320600bd4812ba505ed glibc-langpack-ga-2.28-251.el8_10.25.aarch64.rpm b192ec2fa66ba3cb5bc9fcf7817770a811a4980989b459a63443dcdb083295cd glibc-langpack-gd-2.28-251.el8_10.25.aarch64.rpm f5130b0cfbec913569683706e81147a5f3e1447ea759e7fc059c40ded5822789 glibc-langpack-gez-2.28-251.el8_10.25.aarch64.rpm e8b8c4819ab67e89391262979d7364641546329d587ab888accbe5d688d09939 glibc-langpack-gl-2.28-251.el8_10.25.aarch64.rpm 7d4869c817895f2dc3cd60c92895945059905ee3d947324915fdfe40e07facb7 glibc-langpack-gu-2.28-251.el8_10.25.aarch64.rpm a6394cda3a36c3a5df54076d52765f818d0cd28e3947443e464ac45a76317ff2 glibc-langpack-gv-2.28-251.el8_10.25.aarch64.rpm ce487a813cb87dc0daa7c585e44cc5c42f23b0b3ae9e734475f814f700f71d91 glibc-langpack-ha-2.28-251.el8_10.25.aarch64.rpm dd2233ca741024ce5650148745d0b96b8e27d3b5705743e928c9026b40e6abbb glibc-langpack-hak-2.28-251.el8_10.25.aarch64.rpm d7e36b4f6d2249e040824fe559667172ddb6a95ec1d9c484eed836219120636f glibc-langpack-he-2.28-251.el8_10.25.aarch64.rpm 1b6b8b90e3e2a3e1161b45ab0e8d2e97f6ea8f92c7be60b8476ef8416909f16e glibc-langpack-hi-2.28-251.el8_10.25.aarch64.rpm aa9366b3cdd8091a8883f16e4a7698133f0b17ba234dcc7aa429061bc39374c6 glibc-langpack-hif-2.28-251.el8_10.25.aarch64.rpm d7fea1079c0b7de6cf6ab4acf655b0cd622e10424bfbe22db5de687038ab6668 glibc-langpack-hne-2.28-251.el8_10.25.aarch64.rpm 79a1caf55a07bd626a44a1f4119e1aa4f1c8c1500d815c38d1f30c7d446f841e glibc-langpack-hr-2.28-251.el8_10.25.aarch64.rpm dc5caed34004be68e307aaae1fa094235015851f3d573e1ae84bbf635413e223 glibc-langpack-hsb-2.28-251.el8_10.25.aarch64.rpm 8835778be0d4b6b4018d3ad8bd899ce212b5c5339d5964b73db20c1e97dc6289 glibc-langpack-ht-2.28-251.el8_10.25.aarch64.rpm 2cea47c84577f43d339458a3b0ce3eb804d6b3e2e5b2ae8f0ea66a47a44e1d26 glibc-langpack-hu-2.28-251.el8_10.25.aarch64.rpm e191b1a24dd3fb8ffeb7cfe9f779b551bf79c1757984e36df6887a36412ea918 glibc-langpack-hy-2.28-251.el8_10.25.aarch64.rpm c690cab3db7f50b251d2f53e48cbc2976d171686153ca3d39e5963d1bf85a324 glibc-langpack-ia-2.28-251.el8_10.25.aarch64.rpm 2b0edfec791cf1086b4954ae05f462e3e9d8c70c064bf94b9cf08ce6eca0ea26 glibc-langpack-id-2.28-251.el8_10.25.aarch64.rpm d8b21869391dc391528fac7fbc62783cfbc3aa45640e3c336108c078921e79a5 glibc-langpack-ig-2.28-251.el8_10.25.aarch64.rpm d26f2bfda18b11536e7b0a9916aee8e9f4871920936329da9ac7edb20bf6d068 glibc-langpack-ik-2.28-251.el8_10.25.aarch64.rpm 99200f5418f7018abf49be599f4caff1c11e374912947757a9f58abc1145c3df glibc-langpack-is-2.28-251.el8_10.25.aarch64.rpm 756db108f2ed8a0735100c223d733d0f6515560363df7689fed4df337050cbbc glibc-langpack-it-2.28-251.el8_10.25.aarch64.rpm cb44c02053cdcdcaec341f326dddf1230ed849d593a95c83f2dac0d38c1d7b79 glibc-langpack-iu-2.28-251.el8_10.25.aarch64.rpm fcd7b5a3d043c03748785bfd3c8735d8b33d02929f89a6130d5e228f87eda5e1 glibc-langpack-ja-2.28-251.el8_10.25.aarch64.rpm fc55fc469ea7993c1d65f35240f4bf82e442759703b1c992a79ca05e649eec68 glibc-langpack-ka-2.28-251.el8_10.25.aarch64.rpm bb79a96fa2512c6e6d8a1ed9db8f0a48697b6b74401925d74c9d7f2e3a3c3925 glibc-langpack-kab-2.28-251.el8_10.25.aarch64.rpm 19d6d70dae2a3bdf327dfd79455e745b3330ac5b06783f3298ff5ae1f3a2bc7c glibc-langpack-kk-2.28-251.el8_10.25.aarch64.rpm 5cb2bfdf870f45932ea958d2287d93c171701b59c1ad0769c37219075643efc4 glibc-langpack-kl-2.28-251.el8_10.25.aarch64.rpm 2cff8b534b6612af22abd546cf04f3e2cffd320ef189beca1b6c01510084a6a2 glibc-langpack-km-2.28-251.el8_10.25.aarch64.rpm 6ea31f64038db1c2fa7bd5bee165928cb7f03748b3bab82ca2f6faf5c12e42c9 glibc-langpack-kn-2.28-251.el8_10.25.aarch64.rpm ed87aac8786a18fc91f3daadcc1feb7cb1746f9c2ffea2b4e05aa02726c8e2ab glibc-langpack-ko-2.28-251.el8_10.25.aarch64.rpm 4b0a56ed0c78466f7472ad05e69bbc5d76338d2521644ba3c47521b95bfcd001 glibc-langpack-kok-2.28-251.el8_10.25.aarch64.rpm e3a66694d309b8490c2a90aa651c876dc000ed9335388c30bf5ed31b67615380 glibc-langpack-ks-2.28-251.el8_10.25.aarch64.rpm 3f980da1d12447d82f05a06fd52a904e8d46fad90061929fc4958a66abc21cda glibc-langpack-ku-2.28-251.el8_10.25.aarch64.rpm 590472ac8ed28c538155b37b1204d4b7ef6081388721bc6ae666735c3e84405f glibc-langpack-kw-2.28-251.el8_10.25.aarch64.rpm 357dc09fec5cbcb634259e7f5e6c3515bcdc627c7b91d83fc8c760916890f345 glibc-langpack-ky-2.28-251.el8_10.25.aarch64.rpm 115a27a4ad9ad470d3d3cd9b06d18b2b1edf78c85b2bb6c0327c2d4018b79eef glibc-langpack-lb-2.28-251.el8_10.25.aarch64.rpm 74b7864bb860c3fd3d7b4da048c12b4e7307e7d3e87d1b079c5f9b4a099aa9fe glibc-langpack-lg-2.28-251.el8_10.25.aarch64.rpm c56d5bf526e1519516e8b331de94a1dbc71346b1e8d0d328979bbf782df0880f glibc-langpack-li-2.28-251.el8_10.25.aarch64.rpm 2135af19fcb676166c8bc2eaa75de2e6c06369498e9c08b9b6c11ed788ce2a92 glibc-langpack-lij-2.28-251.el8_10.25.aarch64.rpm f927ac47c61a678b66643dbdd18ea0cfd83aa7f1cff3725ba6a68f5c981e40c4 glibc-langpack-ln-2.28-251.el8_10.25.aarch64.rpm 48c7d2cba6e6d9d0390cd2a0b731c4959ca6bff5725a3a1fe3f09632040a35e6 glibc-langpack-lo-2.28-251.el8_10.25.aarch64.rpm 2afbc6e8d6b52ed0a10be5f68d0695715ca3f9cc35dadf608b4ae42135b0166e glibc-langpack-lt-2.28-251.el8_10.25.aarch64.rpm 9ba0e93b27ffd8872eaba0de7f27d9302883e61978131007230bd29760c24011 glibc-langpack-lv-2.28-251.el8_10.25.aarch64.rpm 7b59cd8405cf5626707b48c748f397b8e14ca8094714c7dd8dd7bf0dc199c110 glibc-langpack-lzh-2.28-251.el8_10.25.aarch64.rpm d9a131b046611fba56d7ab2bf93dada0359c1e8870ac8b615e1ace5445dd49e5 glibc-langpack-mag-2.28-251.el8_10.25.aarch64.rpm 50ea7e767773823e265dbcbe352d5a0a3d493d7fa811abc7d096a0e83f0500cc glibc-langpack-mai-2.28-251.el8_10.25.aarch64.rpm d7f33271477f3469eda3fc50b68f1c909db092b63c11909ff6fecbf09c4d009b glibc-langpack-mfe-2.28-251.el8_10.25.aarch64.rpm e85564273de5ac1d3797d687f95fe14749aef8a80dbe5910396effe261e5bfbd glibc-langpack-mg-2.28-251.el8_10.25.aarch64.rpm de6e37087f6546f6a2849c21bdd268ab3b0214529267f21f2fe9bb9a53595fca glibc-langpack-mhr-2.28-251.el8_10.25.aarch64.rpm aec1089e12904e057f4ca65be7ff0d641f9cf1e3ce79b623a523999927b2c06c glibc-langpack-mi-2.28-251.el8_10.25.aarch64.rpm ca11259432112bc37409403077724d21a81bc0c20e3e2b45298712dce2d83912 glibc-langpack-miq-2.28-251.el8_10.25.aarch64.rpm b64eff2c5bbd0111ce32004306f238643c9cfb4fccdeb494e0969b956c42387f glibc-langpack-mjw-2.28-251.el8_10.25.aarch64.rpm 4dd28b0dd6da8b1fb74b19ba88b052ffcd80fabbb6f4840f1bd496a279da9d08 glibc-langpack-mk-2.28-251.el8_10.25.aarch64.rpm 1efe5212ceaee6cf2cb3bbe2f3c947ceb480b13f768d85689586b5cb98debe19 glibc-langpack-ml-2.28-251.el8_10.25.aarch64.rpm 8d4546d4f0cc1a2252f09c89bf9b7e57f9b3fd64d55d5463fef367e04bea1d23 glibc-langpack-mn-2.28-251.el8_10.25.aarch64.rpm 41c061a1e3390ccd4bb43efd606353227364f850b66e8dc3cf6c2c8004cbc816 glibc-langpack-mni-2.28-251.el8_10.25.aarch64.rpm e879f58283b515d52bc394f4b7e92c598cc953a1a8d1f4c993ade5e02580c586 glibc-langpack-mr-2.28-251.el8_10.25.aarch64.rpm 82abb4ebd519aadaadfc4c01ee481b77bd5c58f28d16dbafcefa501186f24fcf glibc-langpack-ms-2.28-251.el8_10.25.aarch64.rpm 9156b895dbd14046331f77287ce171a106355034522708ca1cef9549bc432552 glibc-langpack-mt-2.28-251.el8_10.25.aarch64.rpm 62c1a09fc87038cf988d6aea213f81ba8d18b242413eb06d62c9353efccb9980 glibc-langpack-my-2.28-251.el8_10.25.aarch64.rpm e41c0a30cc39554f223394eee30acbccb54aa644944f91dd0f74d8116f6c8d8c glibc-langpack-nan-2.28-251.el8_10.25.aarch64.rpm d6e8e2ec6b8cac87689835d57c11c3602ddcdafc1f14e4030a3591d734d6c29f glibc-langpack-nb-2.28-251.el8_10.25.aarch64.rpm 42a774a5c9b0dd735b9b9d775a1fa869b591363306e944cb224cadb2f27a1d56 glibc-langpack-nds-2.28-251.el8_10.25.aarch64.rpm e203e846e3e689e417472cf221a981162ce03be724d069cc3a16188e5f4f1039 glibc-langpack-ne-2.28-251.el8_10.25.aarch64.rpm b7d07826961775743f563f21986569b8fc1b5e5c98bcec7ec4ed475f952474c9 glibc-langpack-nhn-2.28-251.el8_10.25.aarch64.rpm 2202e26df2c2e3c237eeb31eacb8c8f4fcdb994f9c5e34395952b8f89836d0f0 glibc-langpack-niu-2.28-251.el8_10.25.aarch64.rpm 86fe52812228425abd673837cfdfd9d3d9803f0cfd938ad42156193b50a54f93 glibc-langpack-nl-2.28-251.el8_10.25.aarch64.rpm bf9ef934b3594062e32ace98294d16fe4ec66d5370af67bec8f0e3774f5d1783 glibc-langpack-nn-2.28-251.el8_10.25.aarch64.rpm 5f7026062ca66c11467f1b44fe05c3a0d94fd283dc78b73a8e798166dbc4fa20 glibc-langpack-nr-2.28-251.el8_10.25.aarch64.rpm a242c08e366237fb96bcf0c376a252ec169453c577d5b057dd6fd1b7728066aa glibc-langpack-nso-2.28-251.el8_10.25.aarch64.rpm b23bdfe1a9636c161e00d7286c7f7055209bcbecd423fc985a1af2941ca5a452 glibc-langpack-oc-2.28-251.el8_10.25.aarch64.rpm 1dfe458d03791cdaf83f6dc81ca4813eb23486f51cd4f6ab6e207092d58928c4 glibc-langpack-om-2.28-251.el8_10.25.aarch64.rpm 22566f81e5c2e1e38aeaf62eb7a683824c6eaf39b92dab9351657f453ab5bd10 glibc-langpack-or-2.28-251.el8_10.25.aarch64.rpm 109222ebcdc03eb2b1a18fb2a2c7d56d1fb74a28b951e14818f8a456ae1c93dc glibc-langpack-os-2.28-251.el8_10.25.aarch64.rpm 0bba1b37735841d8f586f60dd188a853ccc0fc3a848a11d9ab5fade21b732168 glibc-langpack-pa-2.28-251.el8_10.25.aarch64.rpm a9813d94b94699d92426423d2f859fff5d28e67a9bab9798025938664bd41a96 glibc-langpack-pap-2.28-251.el8_10.25.aarch64.rpm d9a24a2f6a7b3ff4b6042c3e49f7060223ed06b3899607d340f5bb588361c70e glibc-langpack-pl-2.28-251.el8_10.25.aarch64.rpm 986300173d2aec537c74a387a4d668384e3f24693e0ac0403c43f2d601926928 glibc-langpack-ps-2.28-251.el8_10.25.aarch64.rpm 472eda196db9c24afb7edceae71d711cb8fb8e7ccc1f88bb76937537625bdb34 glibc-langpack-pt-2.28-251.el8_10.25.aarch64.rpm c068235e5de5239ab823b8711c1fe8891a562671572c659f7d2dbc0a1fa3ea0f glibc-langpack-quz-2.28-251.el8_10.25.aarch64.rpm 8ccd6be1e6b912ee1e8c7f36eb2c6e33d0acc82282a674b3744c29dd4ddf8e47 glibc-langpack-raj-2.28-251.el8_10.25.aarch64.rpm 7c20d97f5860ad9f5ffb93223de13117f58ed9e07a2c480e577ebc407715bc1c glibc-langpack-ro-2.28-251.el8_10.25.aarch64.rpm c16104d976aa9ff713fcedb0c3dec4de879c4134035542bfe1308867f39a945a glibc-langpack-ru-2.28-251.el8_10.25.aarch64.rpm 5ac6bbd30b13398d36d90fc4e56709d14b9d57c81a93c94f1902d43c27f70021 glibc-langpack-rw-2.28-251.el8_10.25.aarch64.rpm 4d7dc149b47a43b0e5252a783b45c95d6e06c34fe7f7a6b5242c34951059b0a3 glibc-langpack-sa-2.28-251.el8_10.25.aarch64.rpm d5192b2770aed560bee29f410b44b291f701431f5feb53d98fe2565a8dc1880a glibc-langpack-sah-2.28-251.el8_10.25.aarch64.rpm 325249d91745d2c415ed541d4037ec99100a40b23d03c7a48b31532c99d7c37e glibc-langpack-sat-2.28-251.el8_10.25.aarch64.rpm bc7341a37e5342813e5c94c6009d7d70b9bcdbcfa035a4f05fa635abc9ebffea glibc-langpack-sc-2.28-251.el8_10.25.aarch64.rpm 7bf74c598907771dd4acc7bf1ea6291203dea0a789064927ab86f506388c423c glibc-langpack-sd-2.28-251.el8_10.25.aarch64.rpm 6698b7f9c8583e6b954bc5a4e5e67c509e6abf5933ddc40a9321bdb833e7051a glibc-langpack-se-2.28-251.el8_10.25.aarch64.rpm fc65a17e6573833051ad9de64e1e9494e26eb7e1dcb8e280c05d3680c3b614ee glibc-langpack-sgs-2.28-251.el8_10.25.aarch64.rpm 539ac9d9a17ec9a6a753bcfecf68b4ff92c518607ff19ec83731efb0871af1a2 glibc-langpack-shn-2.28-251.el8_10.25.aarch64.rpm 5e3947c14c974c8483a79d604c2372b6af399d4d088f47a777d05861e90276a4 glibc-langpack-shs-2.28-251.el8_10.25.aarch64.rpm 1fb238fe2577666c67752a8e570dbc187c629b516dc705ae12dbae1e75da0b48 glibc-langpack-si-2.28-251.el8_10.25.aarch64.rpm 59b5e7b6ca0b6ec282e9dc0b8217a3c109d02e68d8b048135700cbb4e7264b1b glibc-langpack-sid-2.28-251.el8_10.25.aarch64.rpm b3912aa19c3ba7e1c4ef93f511cb25425ebc8f1cf7dacabe25dfc7fcea89bc24 glibc-langpack-sk-2.28-251.el8_10.25.aarch64.rpm 28142d852ced8cc33e6e872c1d0e57467811607d0bd0bc197761df868c66da10 glibc-langpack-sl-2.28-251.el8_10.25.aarch64.rpm 67a5207b0772a7a8f228aca6fd48eed2f9fbe92d13ace05413a67ce331dd35d7 glibc-langpack-sm-2.28-251.el8_10.25.aarch64.rpm 6b948e2efd9a38af591912fa09508772001dd03e1904875c4a06af8cdcdf61d4 glibc-langpack-so-2.28-251.el8_10.25.aarch64.rpm 724460820dd83a8ff9c47decdbb7de61c89c0301a3e6878cfcc5dadba1457b08 glibc-langpack-sq-2.28-251.el8_10.25.aarch64.rpm 7597d6ee5c72e1d6ec215bb1ea90ef238e1895f6b51087723d64da8d6dc05b69 glibc-langpack-sr-2.28-251.el8_10.25.aarch64.rpm e9a89738061e22b21fd9a5bdc0f03b646cd8e9ef9e44a7bbb90500557a0dcc23 glibc-langpack-ss-2.28-251.el8_10.25.aarch64.rpm d6fd027f83d066e6ace185f3170ea3cba7138f76424a2915572b1c2dbc1267c1 glibc-langpack-st-2.28-251.el8_10.25.aarch64.rpm 26b12800e5c19272c81736146a227c6ed024f648e05e3ebd67228399cd3541fa glibc-langpack-sv-2.28-251.el8_10.25.aarch64.rpm 3eecab64587840e188824f088e13539836e80717664816e5af5f3c522eb69cea glibc-langpack-sw-2.28-251.el8_10.25.aarch64.rpm 52c4a2d6c61e347a997b5b1f3e794235ec23a9400e6e37f72302f786d0f51c93 glibc-langpack-szl-2.28-251.el8_10.25.aarch64.rpm 9723352c644ef55e79b427da7de4939ee49e58bb1404ea1ca015b2f2b30e0673 glibc-langpack-ta-2.28-251.el8_10.25.aarch64.rpm a5add289c8ec3a1b6df830cd717617a163ecc29e44c200c22e01651db473c177 glibc-langpack-tcy-2.28-251.el8_10.25.aarch64.rpm 4cc4cc26cb60e32f66aba352034282fce41c2af406539e15ea6e703fb9aa9eac glibc-langpack-te-2.28-251.el8_10.25.aarch64.rpm e700aa5ecc45eda34ed0bff65756022045e173e97e5a6ac4c07fcc38b72684a2 glibc-langpack-tg-2.28-251.el8_10.25.aarch64.rpm 178cc6028822a2fb496b9045d7728613bc4e34e3cd54a5f64ca5bfe2265a164e glibc-langpack-th-2.28-251.el8_10.25.aarch64.rpm 88870db019548c0ccd4586ed8eaef7a8f89b83e2cad74e3ee87ae8b866371dde glibc-langpack-the-2.28-251.el8_10.25.aarch64.rpm 36b011e96533d0c23bf4113d15ea4bb6b5ef5ce72988e0685abd4f8a2bf22fae glibc-langpack-ti-2.28-251.el8_10.25.aarch64.rpm 18f1cb98fd2d498dc326043ca868b4dd12eed29c2c2e7aa8c82553afe263f92e glibc-langpack-tig-2.28-251.el8_10.25.aarch64.rpm ebb4e8cb64594e5fbcfe8b5d6d7aad2624b05e3e3ea2096748b4f19f15603c25 glibc-langpack-tk-2.28-251.el8_10.25.aarch64.rpm a861140897363d23bfb6d290226bf2dbaa344125ea34a290cf0d1bbed91d97e5 glibc-langpack-tl-2.28-251.el8_10.25.aarch64.rpm 5f9250a904ebd4587e463e13ec42aa463bf1f0a51854204c9fbef99f44ade2b7 glibc-langpack-tn-2.28-251.el8_10.25.aarch64.rpm 7a6a126a31060683b63aa16977a994773c3ca63654b33da2738cf5e0f9289c5e glibc-langpack-to-2.28-251.el8_10.25.aarch64.rpm 3df3c8f2a8a9f4da2b825dbc4462be630131fe6c92be3733221dbd9b2f0c9fbd glibc-langpack-tpi-2.28-251.el8_10.25.aarch64.rpm 8f2ebb349f08761fc1d2b333a0e133edac8f642f9dfae0aeb4c57722a3f2d7f4 glibc-langpack-tr-2.28-251.el8_10.25.aarch64.rpm b5b7ffbff140b918bfecbe34c91f5cd73b84db58e932dbb5328ca7435b6a36c4 glibc-langpack-ts-2.28-251.el8_10.25.aarch64.rpm 1569cbcb8a6c590461a73d29407e7a155881fddfcbbaaf15e2ab57baf1352943 glibc-langpack-tt-2.28-251.el8_10.25.aarch64.rpm c95de4b06ce5a09607a7f662698bce1fdf42ca8954822665c0b4a69015286a0c glibc-langpack-ug-2.28-251.el8_10.25.aarch64.rpm 40c38f95ff01e327d0a47563769707aedb2c98c31a45bd3fd030f2c7d08457b9 glibc-langpack-uk-2.28-251.el8_10.25.aarch64.rpm bd25500737502cdf8f8498d7fe65e9dd181ac8ea61f74a63abb79f2cf6459edc glibc-langpack-unm-2.28-251.el8_10.25.aarch64.rpm 9ba8d672ac69f77fbfd1057f292a78bd265cfba3c8f5b8831794f05bb792e5a8 glibc-langpack-ur-2.28-251.el8_10.25.aarch64.rpm 42f461a78d9d26f905857ea70e69216a39390bd5d52852dc57c8b5a4e9411c43 glibc-langpack-uz-2.28-251.el8_10.25.aarch64.rpm 8d6cf56e73d1696cba54125ef184b069f77cde207cdfd374b5d1df09e3dd6f1b glibc-langpack-ve-2.28-251.el8_10.25.aarch64.rpm ab96f28ec3abbc6d8f091f547231adf4182ce8c5902a11ded0e61a5f32d5e5e2 glibc-langpack-vi-2.28-251.el8_10.25.aarch64.rpm 1a3b43f78aa06d2938285442a36c8105d0dbfaafc8f589354b6052eea3ffad69 glibc-langpack-wa-2.28-251.el8_10.25.aarch64.rpm 1947f7afabc81299541d32356a50fc62d3003a5c1ff5e32655338f6d9df82ea6 glibc-langpack-wae-2.28-251.el8_10.25.aarch64.rpm 07825ab45e09ab7ec51e59c8e0270fd1435f082cf16ca5b1628cfdfeabba6c1a glibc-langpack-wal-2.28-251.el8_10.25.aarch64.rpm 905462916ecc76789fb2c5d55baf1a9cca334649d52d99f4c0f886cdacccbeb7 glibc-langpack-wo-2.28-251.el8_10.25.aarch64.rpm 87ed09df3a348c9b8c880d07cbc6df2f983d2677daf6fa3ff8c83b555b214f98 glibc-langpack-xh-2.28-251.el8_10.25.aarch64.rpm 0f4279bfab69c6b95add72db975ed8ddbf040b83b0f0405a1223415fe27f60e1 glibc-langpack-yi-2.28-251.el8_10.25.aarch64.rpm 8db8a6ae4556c43438c666986b8870dc46c569b718f4ee981e025719f527fdc0 glibc-langpack-yo-2.28-251.el8_10.25.aarch64.rpm 89774b9aaa586857a59fe062757d99a8be04459ece9a9c74a698beb48e7a39f4 glibc-langpack-yue-2.28-251.el8_10.25.aarch64.rpm 19944dea7a825ab54cd1fc03b075863430fd748d5586f790531ac937a08a0da6 glibc-langpack-yuw-2.28-251.el8_10.25.aarch64.rpm 25b8b445dd8efd462a00239594f65afb347ddd66be1109abe05bbc969f7e74da glibc-langpack-zh-2.28-251.el8_10.25.aarch64.rpm 19f4e5439a365fb00a5b2fbcd8e99c998881ce3df69573bebafc72762c4765d4 glibc-langpack-zu-2.28-251.el8_10.25.aarch64.rpm 6cb6f05980eadf461f3db138b7f733f4292d3c542bd21fd371ecf4b5d0294b75 glibc-locale-source-2.28-251.el8_10.25.aarch64.rpm 88a868b8a4001a88a89e01957f97e21ba63843de567df915d85ae15f1c9dde71 glibc-minimal-langpack-2.28-251.el8_10.25.aarch64.rpm 49ae98e9d4b81f6521659f91ebc6e584204feb483a6eb3e29a57e37a1776abb5 libnsl-2.28-251.el8_10.25.aarch64.rpm 99da382ad3eccd113531a7d3ed04ebf18e2a3a9a324c70c4f5727cab166373c8 nscd-2.28-251.el8_10.25.aarch64.rpm ce03ae9d4d67e31fa0a273a9301ed7c276e5bc0e37cc42ceb587e51ae5f194ca nss_db-2.28-251.el8_10.25.aarch64.rpm 338c60695e470de8dae0f34bf43cb0a23854ca1d3a6b240319293f7b77e7ccc8 RLBA-2024:0898 python-cryptography bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers. Bug Fix(es): * [FTBFS] rsa_pkcs1_implicit_rejection breaks test_decrypt_invalid_decrypt (JIRA:Rocky Linux-17873) none-baseos-rpms python3-cryptography-3.2.1-7.el8_9.aarch64.rpm 16010a3f55cff9c96d8db5cdb87ff7f3c742b341b562efcca390c9a6d5c84076 RLBA-2024:0899 sssd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * Excessive logging to sssd_nss and sssd_be in multi-domain AD forest (JIRA:Rocky Linux-19212) * latest sssd breaks logging in via XDMCP for LDAP/Kerberos users (JIRA:Rocky Linux-19994) * SSSD GPO lacks group resolution on hosts (JIRA:Rocky Linux-21085) * Make sure 8.9.z/9.3.z doesn't build 'passkey' code (JIRA:Rocky Linux-21164) none-baseos-rpms libipa_hbac-2.9.1-4.el8_9.5.aarch64.rpm 0f0ae331bbceef589d4f7eaf32aeee840c3f2d09386fd1a47043fa1a1474369a libsss_autofs-2.9.1-4.el8_9.5.aarch64.rpm 92225b1345aaad1ee49759a93fb73faa2171867ea107c3756323c36ebefa91c6 libsss_certmap-2.9.1-4.el8_9.5.aarch64.rpm ffaa102f5b83759533feb18e409ad7da0c92f4c085da7370438287ec582d2132 libsss_idmap-2.9.1-4.el8_9.5.aarch64.rpm 4a9c87860617801f71f8562561e713600ebd79364673a7b88da825a9a161e765 libsss_nss_idmap-2.9.1-4.el8_9.5.aarch64.rpm 634038b24436ff605a6fd163abec20cccb11c1f9cc78992f9e99929c4cb5216d libsss_simpleifp-2.9.1-4.el8_9.5.aarch64.rpm 32d26e83de2f8200af38f8568743286a07d1cd642f931e26aae8ff5a7e57ad92 libsss_sudo-2.9.1-4.el8_9.5.aarch64.rpm 3b303a4840314710ca54cf6ee2591972c477360f9c85ec30c8e81e862bbec0f9 python3-libipa_hbac-2.9.1-4.el8_9.5.aarch64.rpm aadcef04356f02f4d291cadbcef6c687b9b53fdaa37eeb77263c48968393fba9 python3-libsss_nss_idmap-2.9.1-4.el8_9.5.aarch64.rpm e7587663d3036c022117a8ac9ff08311bfbc605a3d44d7f3accb24fc71cd7fcc python3-sss-2.9.1-4.el8_9.5.aarch64.rpm d8e0d5b85371cab6b574c23f2ba84240e1eddd2318d4e1c4817031913de1e603 python3-sssdconfig-2.9.1-4.el8_9.5.noarch.rpm 5bf15cbd155b7e584c7389abe2f3ecc5e4dc0b5e0f63a1e4ff3d64a74975926e python3-sss-murmur-2.9.1-4.el8_9.5.aarch64.rpm 9b3eb4566c0a652333d60cd5634393b172355be3daddd06a1e0f2da101e72fc4 sssd-2.9.1-4.el8_9.5.aarch64.rpm a1837a990cdcdc041489c3e5d7834262503d087ff0c51be08e5878c0c129c6e4 sssd-ad-2.9.1-4.el8_9.5.aarch64.rpm 34d125a5abd81ada487f90c1f89d021caabd749f0d6829d9eaf27d825d548c9c sssd-client-2.9.1-4.el8_9.5.aarch64.rpm d90049bb49d281782ff3c44489b525cbb69a03299b3b48ea95a9b9f1cec167aa sssd-common-2.9.1-4.el8_9.5.aarch64.rpm 0633432d9c02afd552f137bd11f1e5de4f9d760f07502ade80748a3c5adb0afd sssd-common-pac-2.9.1-4.el8_9.5.aarch64.rpm 4b5d0c0bf2ad247439bcb7191b385c2b0a1316ccb7d9ceb60b7f2a16adfbe3e0 sssd-dbus-2.9.1-4.el8_9.5.aarch64.rpm c6eab88b4ad3db6f9574f596b0c57ab67819e06cbfcf58fe8a470e11d75d57c0 sssd-ipa-2.9.1-4.el8_9.5.aarch64.rpm 7248cdeedc16d249d525b8a283182c271a4c4271140583913a342ee920e27194 sssd-kcm-2.9.1-4.el8_9.5.aarch64.rpm 3814d775a035f04edb07e18adf3bda75957640b3621739cc88348c17e587a91c sssd-krb5-2.9.1-4.el8_9.5.aarch64.rpm 069e4d4bc1088ed8dbfa75179eef120ead5c36a67425468579771f46389f8e60 sssd-krb5-common-2.9.1-4.el8_9.5.aarch64.rpm 34e7f3b6c3a81e44534831c32b7870210658d99d24b834c4510530dc9001cf25 sssd-ldap-2.9.1-4.el8_9.5.aarch64.rpm b404c8f6b6b26b76f178d223c9a1ae032e3f87252237e265ebdf4c87168808e8 sssd-nfs-idmap-2.9.1-4.el8_9.5.aarch64.rpm 3d129155a49fe34bba27e2e33cf93ba5817205c52535f27afef2a0568121174e sssd-polkit-rules-2.9.1-4.el8_9.5.aarch64.rpm 378e27d9612656d2d6b62011b27b77add69d4129c6dcc4125ce6a83b25815685 sssd-proxy-2.9.1-4.el8_9.5.aarch64.rpm 03b3a9659d0b90e97d9a4aa0e26d429f5d05e7211be4a84fd602dd61607cc113 sssd-tools-2.9.1-4.el8_9.5.aarch64.rpm 434585612f89f8fb82c256a0806cabb42d68e84cd91e16d5889c1ba4d6ed3523 sssd-winbind-idmap-2.9.1-4.el8_9.5.aarch64.rpm e9ed8c911910305c21cd99f782ac3174c89e48e63a0e900a738d5e22e1cf88b0 RLSA-2024:1601 Moderate: curl security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: information disclosure by exploiting a mixed case flaw (CVE-2023-46218) * curl: more POST-after-PUT confusion (CVE-2023-28322) * curl: cookie injection with none file (CVE-2023-38546) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * libssh (curl sftp) not trying password auth (BZ#2240033) * libssh: cap SFTP packet size sent (Rocky Linux-5485) none-baseos-rpms curl-7.61.1-33.el8_9.5.aarch64.rpm 12bc0c8df84092e9d918483d5dd1741dbaac9989bfd51398330c9ab0a3c644b1 libcurl-7.61.1-33.el8_9.5.aarch64.rpm 1dd95baf9a9466e62c679d632270f0d9d0a29997e1576a0154bcd1a7e182de0d libcurl-devel-7.61.1-33.el8_9.5.aarch64.rpm 1ff9076dab9e3cd77a1daa89218578d1d76cf3a7d0490e7982680fd546424303 libcurl-minimal-7.61.1-33.el8_9.5.aarch64.rpm a3f4f9e66abafce802a165e5cddc3bf983d5f149295b06e17ec25d809b8e25a1 RLBA-2024:1604 NetworkManager bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es): * Reapply of device network update DNS changes retrieved from DHCPv4 to /etc/resolv.conf (JIRA:Rocky Linux-20600) * [FJ8.7 Bug]: Suppress NetworkManager's harmless warning when IPv6 is disabled at kernel level (JIRA:Rocky Linux-24968) none-baseos-rpms NetworkManager-1.40.16-15.el8_9.aarch64.rpm 60e70b26d8c4eb9ac83158551f0d2018f385eece0318b5703d7959b48ede21a0 NetworkManager-adsl-1.40.16-15.el8_9.aarch64.rpm e17e6bbf5ef810ea87530dce899cfbb59d9ec2aa2b3bd63c6ac3002c7a07142b NetworkManager-bluetooth-1.40.16-15.el8_9.aarch64.rpm 80d7d80b62da7d985472f62c0b2bae626cc6af2beb07d341d0b755e137cd3805 NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm 7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44 NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm 7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44 NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm 705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30 NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm 705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30 NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm 6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93 NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm 6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93 NetworkManager-libnm-1.40.16-15.el8_9.aarch64.rpm 776c187874f857d3a49992f57762fb62979d261d2cfe822429ebe8c04af19813 NetworkManager-ovs-1.40.16-15.el8_9.aarch64.rpm b35cd21f424556dcf1096db197c5e1bdabe9ddabaefa1423bf8909ce1c77aea0 NetworkManager-ppp-1.40.16-15.el8_9.aarch64.rpm 6cabda9799361e0eeedc797f1f64c8f777321ee9e6c0bce990bc78f793eca20b NetworkManager-team-1.40.16-15.el8_9.aarch64.rpm 87dd75a1096b0831c3a5cffe15de668b0b9ce73ad42ef61fc7965489c5999193 NetworkManager-tui-1.40.16-15.el8_9.aarch64.rpm b742298e3ba8d04be06fe0ca650cca9d5636b2c7e9c6bbb1957d71c11789fd2f NetworkManager-wifi-1.40.16-15.el8_9.aarch64.rpm 75a3335aa89cd2eafa244d83f010fa574af5c38d1036fba1e2c2e2ac5df53206 NetworkManager-wwan-1.40.16-15.el8_9.aarch64.rpm acdd2c83ae2da3462b8ae04a3d63bbf36a2f82c6e783fbb559fc833a835a2edb RLBA-2024:1605 perl-HTTP-Tiny bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list HTTP::Tiny is a small and simple HTTP/1.1 client written in Perl. Bug Fix(es): * perl-HTTP-Tiny: man page not updated to reflect fix for CVE-2023-31486 [rhel-8.9.z] (JIRA:Rocky Linux-21793) none-baseos-rpms perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm 2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596 perl-HTTP-Tiny-0.074-2.el8_9.1.noarch.rpm 2a2106eb7e08a0bfd8a6daf5770cd4616b46dc037a2e5f569fedfc8922c84596 RLBA-2024:1606 util-linux bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities necessary for a Linux system to function. Among others, these include the libuuid and uuidd daemon. Bug Fix(es): * lscpu throws EBUSY error if cpu is offline [rhel-8.9.0.z] (JIRA:Rocky Linux-21562) none-baseos-rpms libblkid-2.32.1-44.el8_9.1.aarch64.rpm d1cabf86686e9a4255b8757b955731188f8963364efb284fdfb654e1c3b223d1 libblkid-devel-2.32.1-44.el8_9.1.aarch64.rpm c23e505f492505bd95dd52e23986b4c33e72179ceba0962181f5e50d8715fc10 libfdisk-2.32.1-44.el8_9.1.aarch64.rpm b0af879a55eb711585fdf365c4bd09ab03bf33bcee7b1dfa9b9b41be19e20cee libfdisk-devel-2.32.1-44.el8_9.1.aarch64.rpm 66bf4389a73990d6814d8872207a4d5179c5f578ae0c50a63b730df16764afaf libmount-2.32.1-44.el8_9.1.aarch64.rpm 0213fc403c033760c0ce2db34dde9fd53f253b841306dd4457aa22f2198f51b2 libsmartcols-2.32.1-44.el8_9.1.aarch64.rpm e7bff0e5af5d128d2a0cdee0d52e4498ba2ee47cc0871c370cbe57a5a318516c libsmartcols-devel-2.32.1-44.el8_9.1.aarch64.rpm 07a24d60fb4731a51bcc93a9ecec599af9db8a00bcc5ff7aa6b1a721945545e3 libuuid-2.32.1-44.el8_9.1.aarch64.rpm b9caafb1ba8b6f3a367be0641b724ff5a3d52215cc2c9a4aecb8042b10c15424 libuuid-devel-2.32.1-44.el8_9.1.aarch64.rpm 30d25b9b24ac4f04cfe76cef1914923bd1d187b1341e4fbd4aae373d9f7bb7b0 util-linux-2.32.1-44.el8_9.1.aarch64.rpm 9de5fdca5d3692652232494a644a01baec6dc3260375bc1512f87f0a256e6622 util-linux-user-2.32.1-44.el8_9.1.aarch64.rpm ad256adf7039808ccd29e9153c60856835e34471e9351fdec0a14af0a848aeab uuidd-2.32.1-44.el8_9.1.aarch64.rpm 3a403da49c32a9377150f58134baac97816e84a0a9bf6517ec0f018aebab4b22 RLSA-2024:1607 Important: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query (CVE-2022-38096) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (CVE-2023-6931) * kernel: GSM multiplexing race condition leads to privilege escalation (CVE-2023-6546,ZDI-CAN-20527) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (CVE-2024-0565) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (CVE-2021-33631) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086) Bug Fix(es): * OCP 4.12 crashed due to use-after-free in libceph in rhel8 (JIRA:Rocky Linux-21394) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (JIRA:Rocky Linux-24010) * Screen floods with random colour suggesting something not initialised (JIRA:Rocky Linux-21055) * kernel: vmxgfx: NULL pointer dereference in vmw_cmd_dx_define_query (JIRA:Rocky Linux-22766) * tx-checksumming required for accessing port in OpenShift for Rocky Linux 8.6 (JIRA:Rocky Linux-20822) * kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client (JIRA:Rocky Linux-22077) * kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size (JIRA:Rocky Linux-22930) * rbd: don't move requests to the running list on errors [8.x] (JIRA:Rocky Linux-24204) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (JIRA:Rocky Linux-24479) * ceph: several cap and snap fixes (JIRA:Rocky Linux-20909) * [RHVH] Migration hangs between RHVH release bellow 4.5.1 and RHVH over or equal 4.5.2 release (JIRA:Rocky Linux-23063) * unable to access smsc95xx based interface unless you start outgoing traffic. (JIRA:Rocky Linux-25719) * [Rocky Linux8] ] BUG bio-696 (Not tainted): Poison overwritten (JIRA:Rocky Linux-26101) * kernel: GSM multiplexing race condition leads to privilege escalation (JIRA:Rocky Linux-19954) * backport smartpqi: fix disable_managed_interrupts (JIRA:Rocky Linux-26139) * kernel: ext4: kernel bug in ext4_write_inline_data_end() (JIRA:Rocky Linux-26331) * ceph: always check dir caps asynchronously (JIRA:Rocky Linux-27496) Enhancement(s): * [IBM 8.10 FEAT] Upgrade the qeth driver to latest from upstream, e.g. kernel 6.4 (JIRA:Rocky Linux-25811) none-baseos-rpms bpftool-4.18.0-513.24.1.el8_9.aarch64.rpm 74d9ed9c399aac2cfc711ba323927e278a251e78dacde4ccfe4008c276ec1af7 kernel-4.18.0-513.24.1.el8_9.aarch64.rpm 3b1b3d876159103819ca7957fca4ee385a3db532ba778d77c4983588055e563c kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm 9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753 kernel-abi-stablelists-4.18.0-513.24.1.el8_9.noarch.rpm 9dc4f48648f746ab7608ac9c020aaa0ba2c223bc5a53d56be0b1d2e25784e753 kernel-core-4.18.0-513.24.1.el8_9.aarch64.rpm efb9ab446f6ab64d74d6b22e345f2d0cc1b6b5e542e7c020ea3dd69336b416c9 kernel-cross-headers-4.18.0-513.24.1.el8_9.aarch64.rpm 3d320a6f45767c6b4f5015d19b32ecf6db727ed289d29ce7cc2b28e0bba0a734 kernel-debug-4.18.0-513.24.1.el8_9.aarch64.rpm e4f475b491c30dd2e14cabd1f5fcf726aeca76bf09d41020aa47387849f721e7 kernel-debug-core-4.18.0-513.24.1.el8_9.aarch64.rpm 472ce4fa5740bed57115097bdffd9316b3f93b4191bacd889c0a5d860657f9d3 kernel-debug-devel-4.18.0-513.24.1.el8_9.aarch64.rpm 2dc4199a7b9906d54c5cb9b4379f3a503d5c59ebbab3795c0df020706636430a kernel-debuginfo-common-aarch64-4.18.0-513.24.1.el8_9.aarch64.rpm 775c672940b4b4299b001241feb3046476f8db81d247c79e79bbac18d3eba972 kernel-debug-modules-4.18.0-513.24.1.el8_9.aarch64.rpm 6baad0d89e342c9ea44a1e4ad3498daeeefdfa044a23f72eff75688607b7af92 kernel-debug-modules-extra-4.18.0-513.24.1.el8_9.aarch64.rpm 979309c9f5b4f47553675ecc0db45e2733536340765228183e597dc9d18e76f4 kernel-devel-4.18.0-513.24.1.el8_9.aarch64.rpm f966819c4054012f00f1a2eb6af2e90b9595b3c133b493a4f0c994f0883d0f56 kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm 0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937 kernel-doc-4.18.0-513.24.1.el8_9.noarch.rpm 0def6c11404ddde26d393bca3efa0981d5813ee1745c7e4a2b15c86c98b86937 kernel-headers-4.18.0-513.24.1.el8_9.aarch64.rpm 342d3ce38ce5fc9efca741a556d7f87d15c202730af80777e2c9a611001636c3 kernel-modules-4.18.0-513.24.1.el8_9.aarch64.rpm 9e1d05c6583fe852e4fa63bdef2aa8eaa9340890766a720a31e2ca97a010bc1f kernel-modules-extra-4.18.0-513.24.1.el8_9.aarch64.rpm 4ee9ad8196413979048a1468039e0358a4303568bc1d463629aa47cbdd4373f7 kernel-tools-4.18.0-513.24.1.el8_9.aarch64.rpm 1e1b2593c89a3b0f300d5a0c9f2b7a60ca119d6fcbbeb785a90f32af4ef35a70 kernel-tools-libs-4.18.0-513.24.1.el8_9.aarch64.rpm fa6e1c515f2c2d6f3f67b6d01132df5941cacb39a751027b5892507ac9c80837 perf-4.18.0-513.24.1.el8_9.aarch64.rpm bed0d8d6ee9a1d15236e8a29cb05d4ad260bd7d68d1fab746a59d1b6d91e6136 python3-perf-4.18.0-513.24.1.el8_9.aarch64.rpm eca2daf52920fe92595d674730ab7182abf6f4ec33328cbadbc43088d3a60969 RLSA-2024:1608 Moderate: opencryptoki security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The opencryptoki packages contain version 2.11 of the PKCS#11 API, implemented for IBM Cryptocards, such as IBM 4764 and 4765 crypto cards. These packages includes support for the IBM 4758 Cryptographic CoProcessor (with the PKCS#11 firmware loaded), the IBM eServer Cryptographic Accelerator (FC 4960 on IBM eServer System p), the IBM Crypto Express2 (FC 0863 or FC 0870 on IBM System z), and the IBM CP Assist for Cryptographic Function (FC 3863 on IBM System z). The opencryptoki packages also bring a software token implementation that can be used without any cryptographic hardware. These packages contain the Slot Daemon (pkcsslotd) and general utilities. Security Fix(es): * opencryptoki: timing side-channel in handling of RSA PKCS#1 v1.5 padded ciphertexts (Marvin) (CVE-2024-0914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms opencryptoki-3.21.0-10.el8_9.aarch64.rpm 0caeb5e618ef2c0487a0953438a8533ea9e9a31cfc40a84e83f30afaccec79c3 opencryptoki-icsftok-3.21.0-10.el8_9.aarch64.rpm 2429318431e3d81c38dc49b29226c3908af34c41157c63a8f548a739f675bcd9 opencryptoki-libs-3.21.0-10.el8_9.aarch64.rpm b951ecb719679934e45833fdc0bb29cb48ea1dd061579960018c0ed132852e93 opencryptoki-swtok-3.21.0-10.el8_9.aarch64.rpm aed83d51510e123deaf79dcd05b59535e7a0c40ac90ec7b08f515cfd33386a0c opencryptoki-tpmtok-3.21.0-10.el8_9.aarch64.rpm 6877e5f25a7dfc0ec6d4a60223cc8c18d737151cc0d88bfdca80e435059ccf76 RLBA-2024:1609 python-pip bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Bug Fix(es): * python-pip - require Python with tarfile filters [rhel-8.9.0.z] (JIRA:Rocky Linux-25449) none-baseos-rpms platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm 5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74 platform-python-pip-9.0.3-23.el8_9.1.rocky.0.noarch.rpm 5fc0d2372285ab4b67ce22df0e339dc53f7cf961a7d4304f870a4d03c7719a74 python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d python3-pip-wheel-9.0.3-23.el8_9.1.rocky.0.noarch.rpm c35cfde3728fbeb84e395247089088c87a9750091950213631435e86f86ec07d RLSA-2024:1610 Moderate: less security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for less. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms less-530-2.el8_9.aarch64.rpm 376cdd6cdf78cc9858ebf30658a5d9367a295cfdcb6ec2dbb531a7b16db49e6a RLSA-2024:1615 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: parsing large tokens can trigger a denial of service (CVE-2023-52425) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-11.el8_9.1.aarch64.rpm 3d12ee4be78b4fd54a6a563e850e867ce8dbb70c04075a74b0562f5e01b8bdd3 expat-devel-2.2.5-11.el8_9.1.aarch64.rpm 180eb733520b957bd5d0a77f667319836c302578be17786a5a70a935fe1dcbca RLBA-2024:1739 sos bugfix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Update reference to sphinx in upstream wiki. (JIRA:Rocky Linux-17924) * Capture information for pre-conversion in convert2rhel. (JIRA:Rocky Linux-21331) * presets test failure on sos-4.6.1-1 (JIRA:Rocky Linux-22395) * The "#wbinfo -t" and "#net ads testjoin" outputs should be available in sosreport. (JIRA:Rocky Linux-23665) * Entries "epo" and "map" in hostname_map section of default_mappings change the "sosreport" file name. (JIRA:Rocky Linux-2399) * fwupd starts to run during sosreport and it continues to run after sosreport (JIRA:Rocky Linux-24342) none-baseos-rpms sos-4.7.0-1.el8.noarch.rpm 021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4 sos-4.7.0-1.el8.noarch.rpm 021f3d73e9f1e3880d66db3b3e4d5ec3a86bf4895f050c942672c97b438dd2b4 sos-audit-4.7.0-1.el8.noarch.rpm 8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796 sos-audit-4.7.0-1.el8.noarch.rpm 8e362a542e2317f6987396591278c1f33f9c987f0579b9392b0fd0c608e53796 sos-4.7.0-1.el9.noarch.rpm 629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960 sos-4.7.0-1.el9.noarch.rpm 629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960 sos-4.7.0-1.el9.noarch.rpm 629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960 sos-4.7.0-1.el9.noarch.rpm 629e3df2472f0cf3cfec97a4ae8218cce1e8a246430c0c8baa95d150d3fd1960 sos-audit-4.7.0-1.el9.noarch.rpm 300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d sos-audit-4.7.0-1.el9.noarch.rpm 300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d sos-audit-4.7.0-1.el9.noarch.rpm 300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d sos-audit-4.7.0-1.el9.noarch.rpm 300a907fc0a90691127639ad6cf25b13bcefc8356ed6bc8c8924b69e329d8c0d RLSA-2024:1782 Important: bind and dhcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp, bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.36-11.el8_9.1.aarch64.rpm f8729420c557021ee1478674acfc76ea7ff68887f15614d1d690db691668768d bind-export-libs-9.11.36-11.el8_9.1.aarch64.rpm 272e38763cfb74ad14d6f3edb8ac4ba51d93c08d2a824c9cd6d4b62bd5a9cdf8 dhcp-client-4.3.6-49.el8_9.1.aarch64.rpm 44021e35cf744c90e4a38223be3b9d0a326c94e7a96249fd70858e45811cdb75 dhcp-common-4.3.6-49.el8_9.1.noarch.rpm 1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e dhcp-common-4.3.6-49.el8_9.1.noarch.rpm 1172e129dc346143f495e27267dca4e708fb70a055ae13dcdbaea140db37033e dhcp-libs-4.3.6-49.el8_9.1.aarch64.rpm 6ed56d5364d65c793380ea790dd09e69cb6d2cac5b1721889d801aba407b7846 dhcp-relay-4.3.6-49.el8_9.1.aarch64.rpm cf5111a91427fe525af50c1521045740b0eb2c0892e64f46cd96bf3174029b39 dhcp-server-4.3.6-49.el8_9.1.aarch64.rpm 5ef4fcc334cf22d58287f9b49997e3479baf1b28581f48b074c34a70bfcb7dff RLSA-2024:1784 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls package provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. This package update fixes a timing side-channel in deterministic ECDSA. Security Fix(es): * gnutls: vulnerable to Minerva side-channel information leak (CVE-2024-28834) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.16-8.el8_9.3.aarch64.rpm 0499b4573dd8e084685255d8f3a0f0bdc6d78dbd3f2ca851955d34d063ce7d6c RLSA-2024:2722 Important: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-common-2.28-236.el8_9.13.aarch64.rpm 3e0c92a02ae6704f22546c64b3e9b19dc36c724fc17fc7a3346bcaca45e77adf glibc-langpack-ar-2.28-236.el8_9.13.aarch64.rpm ea2d6c2266be75397f9630947602eed7234b545b07f6936f924e2265248cf9ff glibc-2.28-236.el8_9.13.aarch64.rpm 553c0240b0ff5c6c0d8aedf0bd46d6bb1a9784c9fcd04af4bff1fa56f12e6c34 glibc-all-langpacks-2.28-236.el8_9.13.aarch64.rpm 33e70521847cfbdf0546ee06facf23c39741dab4e4d2c5ff75e6275999e6feef glibc-devel-2.28-236.el8_9.13.aarch64.rpm 8b38670e1c370541e4a63373b45e429f3970d9289094332b1854d899c9472570 glibc-doc-2.28-236.el8_9.13.noarch.rpm ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa glibc-doc-2.28-236.el8_9.13.noarch.rpm ce65550a6e53d9dfdef6627470f4adec0fee717f2339624386ebee7c95e5e5aa glibc-gconv-extra-2.28-236.el8_9.13.aarch64.rpm 59f9a7ff7eb3abea83d38efa40a38927bc40a1c6538ec41d57eedbeb2ff7d79d glibc-headers-2.28-236.el8_9.13.aarch64.rpm a55155dee5e2319b1bdf19d268cede6007c35e7c7a0c20b5e29b5aa0969b9132 glibc-langpack-aa-2.28-236.el8_9.13.aarch64.rpm a0b0d1bb20f3f9da4c8654e0d68f98de67e4eb0f2f6c81a992e93a840fad56f8 glibc-langpack-af-2.28-236.el8_9.13.aarch64.rpm 45a0530528315a2f100b018bd7a6a20e357b3cb69ac728fb92ba383f9b9fd01d glibc-langpack-agr-2.28-236.el8_9.13.aarch64.rpm c19400e0bb0730107783a35f7f6959303e2269b9f72c237ab80a0f685f153fce glibc-langpack-ak-2.28-236.el8_9.13.aarch64.rpm d596f335ba257fcc436bb4064cebfd9eb492f2e830dabedbe93ca4cb2a3ed283 glibc-langpack-am-2.28-236.el8_9.13.aarch64.rpm 33fa251149d332c343e8a4e76a18d7aa1867630666957abc72054bb1fdfcfe13 glibc-langpack-an-2.28-236.el8_9.13.aarch64.rpm b1e4672156726704287d217d72c56621cc42f83415c857549478a2ebf699d4ef glibc-langpack-anp-2.28-236.el8_9.13.aarch64.rpm 2f72302aa03c0c6479eeb893e2f59fbf32ee72ab8efeab2379b9569d4f202cf9 glibc-langpack-as-2.28-236.el8_9.13.aarch64.rpm 6d061412e32b067c49c4a425605646fc9a8218c5b9c29da87bf5e84f907dcf16 glibc-langpack-ast-2.28-236.el8_9.13.aarch64.rpm bff67ecc9e0f33c9354084501c014746cbe774a8082a91730f2fcf8f60f7c2b8 glibc-langpack-ayc-2.28-236.el8_9.13.aarch64.rpm 8239fc2b920946128f1d42517bc5caad956a2f0f8603eb0f3f4685cea4287117 glibc-langpack-az-2.28-236.el8_9.13.aarch64.rpm e66634be9cf4d1f23b38782233446a16521411119d5953b4c3c9c3ec4f1449ee glibc-langpack-be-2.28-236.el8_9.13.aarch64.rpm 0796d0197366a6c0fe62fb258b812b125f37de526222ea1388ed0b7c71f0d392 glibc-langpack-bem-2.28-236.el8_9.13.aarch64.rpm 21825876c674027a748dd1406b24b5a1b90ff08d9a86f15f24d9ab5fe85d5e06 glibc-langpack-ber-2.28-236.el8_9.13.aarch64.rpm 0465473b5211056b6759124a264a5dd80e8c21dd0ce595574c8983a4ed51c1e1 glibc-langpack-bg-2.28-236.el8_9.13.aarch64.rpm 8a45fd80e0ebb413ffdfcc17f16d55a79d5968fd9c2c87a1dffe7464d87f7fd1 glibc-langpack-bhb-2.28-236.el8_9.13.aarch64.rpm 72b16fddccea57b3832c46bdbfd106b780e025c2c20b30e75aefa5aa44e81ad6 glibc-langpack-bho-2.28-236.el8_9.13.aarch64.rpm 496ac949854b547d4d7bf9eb098268f52f07570e1e40155919452adff10e6892 glibc-langpack-bi-2.28-236.el8_9.13.aarch64.rpm 03a7e37327e333e6e6a0a62fd254e09694bc3c66ec510ab15fcc3d89fbd34ca1 glibc-langpack-bn-2.28-236.el8_9.13.aarch64.rpm ea02f9e3deadc93b079114a79f5cd97b296558c3b54246376e97194a69f99946 glibc-langpack-bo-2.28-236.el8_9.13.aarch64.rpm 1091c24c5efa57f3bf9cd87234ac30adc95dc77dd86ce1c1c2eba0b6be14cb87 glibc-langpack-br-2.28-236.el8_9.13.aarch64.rpm de43239383af41532ab5d8c7b6974fc008e70881f49e0c3fb463fc3ded9c8fa2 glibc-langpack-brx-2.28-236.el8_9.13.aarch64.rpm 378762e6d1b516951ac0fd9dded1c4fd5d022a279c4529db1777bdf90b8e4a51 glibc-langpack-bs-2.28-236.el8_9.13.aarch64.rpm d766ce13b413139c09423d483f7a048f88ca22ae2ce2e83ea275660cf4f00bf5 glibc-langpack-byn-2.28-236.el8_9.13.aarch64.rpm 8b0ef3ed905358898ed6f80d36feb79ab9adba0118c08cf04f2472797d46e104 glibc-langpack-ca-2.28-236.el8_9.13.aarch64.rpm 620af9b2e5d439206a6f663cadae21de08d831d407dd36e4cafe9ecd020ca82b glibc-langpack-ce-2.28-236.el8_9.13.aarch64.rpm 9140f30e64c5332b686bfcc8b038d55374c8c1f3b20b7ae4165c97d2e7bfa64c glibc-langpack-chr-2.28-236.el8_9.13.aarch64.rpm 829612d05140e1fd4263b90f61eb2c3f0cb91fef3464142a0c35a70e1d48418d glibc-langpack-cmn-2.28-236.el8_9.13.aarch64.rpm 715eee6fa23eccb5875ca56dac6c7852175fe328b0655c16be84ec248ade3f05 glibc-langpack-crh-2.28-236.el8_9.13.aarch64.rpm 17f7069e4adab6d663abb10c5f7c86aac475ec968279d8e38a1ef9c9a75e2a6b glibc-langpack-cs-2.28-236.el8_9.13.aarch64.rpm 18b4d82b47f0ad0c899bc9eeaabe149950d9cafc533479ffd476fe57d578360f glibc-langpack-csb-2.28-236.el8_9.13.aarch64.rpm 49462ccf61ade5fe899c113c8498faac51a4d69f1b11770db569b32ae48db628 glibc-langpack-cv-2.28-236.el8_9.13.aarch64.rpm 4a4748b8d952f683e56b6db7486660785bb42773d600354443b734508b443b4a glibc-langpack-cy-2.28-236.el8_9.13.aarch64.rpm abbcdaa5cb6ca76e438ce268031944686f7a0023713ec1e1b9da036d0dd5904b glibc-langpack-da-2.28-236.el8_9.13.aarch64.rpm 0c1caab26ca265b624fb0aea447641c0f23ab67d897b4866ceb517d8141de621 glibc-langpack-de-2.28-236.el8_9.13.aarch64.rpm ab62c1dae2f58ac66d4b506c64116b1d9375a1aaf3c94de4cb4c9bfc18169084 glibc-langpack-doi-2.28-236.el8_9.13.aarch64.rpm 5a24d135f8ebde7c7bcbe5ef3eba9018ad24416f3a864d7cac5221a0a1d79bc9 glibc-langpack-dsb-2.28-236.el8_9.13.aarch64.rpm 1def855888df189429a113d23869b6e8a155ff636322790842eebe92448622c4 glibc-langpack-dv-2.28-236.el8_9.13.aarch64.rpm b711b409edab7636cbb0d85b5ce0b411939049a6f2f7c8e2cd4eff3f8a1a2732 glibc-langpack-dz-2.28-236.el8_9.13.aarch64.rpm 4a8f08be39463183b1ffd1a88132eefa13ca6b63cc42f481d204aee4d34b3c32 glibc-langpack-el-2.28-236.el8_9.13.aarch64.rpm 2a7ae4b759843bfdda5b1baabfea0c38be8fbb165c806bdab351c5f2fc0b2b94 glibc-langpack-en-2.28-236.el8_9.13.aarch64.rpm e8f89011ed89cb140355b7a8d179f2f556649e6e9d3b4e03e947175abbe34103 glibc-langpack-eo-2.28-236.el8_9.13.aarch64.rpm 6fb24623e8f6c823642c9862314a0dfe2ed5eb28be834220d9d16dd0bb3b1e9d glibc-langpack-es-2.28-236.el8_9.13.aarch64.rpm 2bcf3cbe3ace9f14466f2ef5d3d80fa6c1da84172254d2c09acd4abb0a57c475 glibc-langpack-et-2.28-236.el8_9.13.aarch64.rpm 1454e0c9630aee0865c62a3e6f454b4112dd81b964757184c433533bb34e506b glibc-langpack-eu-2.28-236.el8_9.13.aarch64.rpm bd4a6f7e1adfeb501f7be1b6ed343e19d135539b5188864c08c744c1cea0c238 glibc-langpack-fa-2.28-236.el8_9.13.aarch64.rpm 63787d559d1495788413fc2daf9ceecafc83762e0337570af2655041a25edfa7 glibc-langpack-ff-2.28-236.el8_9.13.aarch64.rpm 17a75bf36ccd153da135a158085ab58de2e7ca35dbf9294ef646c66b15b7e7cc glibc-langpack-fi-2.28-236.el8_9.13.aarch64.rpm bceb1f23bf89185b6cf9250d697bd3456c250fb6783c1de5658b62162c49b1b1 glibc-langpack-fil-2.28-236.el8_9.13.aarch64.rpm 5d5ba3f213d2c14ba59c12602baa2b6ad6a8d0016387c59f00a55e199e8681ed glibc-langpack-fo-2.28-236.el8_9.13.aarch64.rpm 497abffaaa417e87788b25ae8113c215d1271b264b861d5d384f04008044fc52 glibc-langpack-fr-2.28-236.el8_9.13.aarch64.rpm 2d1319ce671cd6a0237b4496f8326c3c38470c612f53b86b97fd0b028396d7e2 glibc-langpack-fur-2.28-236.el8_9.13.aarch64.rpm 422e6432ea1c3acbc34d828f4e688c5c1d824c8c2b963b89b0d2bce85112948c glibc-langpack-fy-2.28-236.el8_9.13.aarch64.rpm d6cdfcdad602159a7b280e26991f6323c1062fc3ec2f9be91cf912fc1934cf1e glibc-langpack-ga-2.28-236.el8_9.13.aarch64.rpm 7f9403cc8b4a1d4e9372ef7bc5017128391b08f1440419b63e1fe96c6dd154c2 glibc-langpack-gd-2.28-236.el8_9.13.aarch64.rpm 12dbc1ada52268efc4d97998f90a07621ccd29e20bea6a395ff21d785e0e8d40 glibc-langpack-gez-2.28-236.el8_9.13.aarch64.rpm 94c4956d2111fa2fa2db32e5a4c1e3d8abca68f7850a5ea3e50c49da375c92b9 glibc-langpack-gl-2.28-236.el8_9.13.aarch64.rpm 0855d652b2ae8473809b70083b969317907f1473e4d6307be7c5f7b3c447508d glibc-langpack-gu-2.28-236.el8_9.13.aarch64.rpm 3a290f839fd46307a7aff9bc1a8d68902a23821cd82098cbfddef7521ef68471 glibc-langpack-gv-2.28-236.el8_9.13.aarch64.rpm 52746cf5e445087b351d2af31dcfdb73c9e8715e7646322cec84e74c6c49fa7f glibc-langpack-ha-2.28-236.el8_9.13.aarch64.rpm 1de350a61a7436e1aa7709cdde1e4eea11265064b0d9ee09615b60f0c68e8157 glibc-langpack-hak-2.28-236.el8_9.13.aarch64.rpm fd25935c8fadb31ea5eaaa85d2267e124218c507928b8b11eaee414ef8bd852f glibc-langpack-he-2.28-236.el8_9.13.aarch64.rpm 794a2c97bcebac8705b0413ead6c3c741f558098a5700dd59e06833be37d9cbf glibc-langpack-hi-2.28-236.el8_9.13.aarch64.rpm d9a3a85a10147e7b60bd3e4e0d60c1e4d17c963c0f0445fbc989481cc152d93c glibc-langpack-hif-2.28-236.el8_9.13.aarch64.rpm 524c7e8bc16a05feb9c0922e4d536c91b02150af0584fe05ea399d14eeda1dbb glibc-langpack-hne-2.28-236.el8_9.13.aarch64.rpm b4962f31592fc9025decedbbb82f4457ebb2b988c745181d7333ff1343fa1449 glibc-langpack-hr-2.28-236.el8_9.13.aarch64.rpm cde4c1fa4dc69525334d88fbd49012512f991101789fa32d916059ed30e3537a glibc-langpack-hsb-2.28-236.el8_9.13.aarch64.rpm 58e295b5aa7a11062e11e5ca76fa90473b2cc39b5ba85fffb7c02a6620a0b003 glibc-langpack-ht-2.28-236.el8_9.13.aarch64.rpm 51e6170f8471869fcc20073cbc618dddc395bcefb0576fd64761a4271011ca8f glibc-langpack-hu-2.28-236.el8_9.13.aarch64.rpm 5b8788508d251f377aeee620715271e00ff47ca2419bb5a11db6c4323c714323 glibc-langpack-hy-2.28-236.el8_9.13.aarch64.rpm 19a189753c965dba8e5778517fba20205a5245510aa5a1e93d735814ded839ca glibc-langpack-ia-2.28-236.el8_9.13.aarch64.rpm 35be27fceb57951e545616aec1cf3f098c902a6d31ebd0927a6dd487adfabb6d glibc-langpack-id-2.28-236.el8_9.13.aarch64.rpm 15ce11b1327f9f092aadacc3cc06e312147996c41e7c7f29614e621786b8a57a glibc-langpack-ig-2.28-236.el8_9.13.aarch64.rpm edbf8217959300dd55e6e42a33161e785ec8c79590a90ac23425bd8081c6d123 glibc-langpack-ik-2.28-236.el8_9.13.aarch64.rpm 34fbcea99216a269185e91c048628315db2141117f2263588bdc0e00630aec2b glibc-langpack-is-2.28-236.el8_9.13.aarch64.rpm b47a54c4899923947470c4d6fa6adf780990123c24bed7cbc41461fd4421b5e6 glibc-langpack-it-2.28-236.el8_9.13.aarch64.rpm 60220652e16a7cc52a60b2038b9e88d06c717771db897f188d613c0366638e4e glibc-langpack-iu-2.28-236.el8_9.13.aarch64.rpm 5df494b830c4aa6c1bcd3e46138a547d5ded28aae9e1148da2fbec11c182a7cf glibc-langpack-ja-2.28-236.el8_9.13.aarch64.rpm 15d9f07f16496e46fd30759321ac46564a14d173947881fad1c9ee8c59284621 glibc-langpack-ka-2.28-236.el8_9.13.aarch64.rpm 7bd16346490bf4bc35930c738c3a7d68e2bd67099ca43709b9224a5368d890ac glibc-langpack-kab-2.28-236.el8_9.13.aarch64.rpm b24f81fc075c8cdf39a26e2c2d61cac589df573d1a9d28856bc3cd9d6474c52c glibc-langpack-kk-2.28-236.el8_9.13.aarch64.rpm badaad958b98aaaa6ab1e87bddbf46211b731328986547864dff465e072f1b1b glibc-langpack-kl-2.28-236.el8_9.13.aarch64.rpm 15bcb3411399b6b2b038bfc8bcf00914b4ffb22fabeaa76a8b48b35b60ea134e glibc-langpack-km-2.28-236.el8_9.13.aarch64.rpm e7fb9bc4914c0ca8c21ee1ba303f1b526421aff9f3af9af9b028ad99802f9b4a glibc-langpack-kn-2.28-236.el8_9.13.aarch64.rpm 412baa58023f76a25ca464571b72df12a005595d2f11c5de3c923bd198e9945a glibc-langpack-ko-2.28-236.el8_9.13.aarch64.rpm 9343bcdeb0d44628d6c4fd0d49bd224faa41ac9e9b6ef429ecdc32348e49fae6 glibc-langpack-kok-2.28-236.el8_9.13.aarch64.rpm a233d78c96cda1d17c34840bfe3ab6c98cf52f40750043e97e06a4558cb82df9 glibc-langpack-ks-2.28-236.el8_9.13.aarch64.rpm edcf5d562bf9fad182b596c619e3af6d421e79008f23fa2d94585f4cdc52f794 glibc-langpack-ku-2.28-236.el8_9.13.aarch64.rpm 6d43b729893ba8df146f146c4044ffa1f998972b10361ef3e0d5f86cd61b332c glibc-langpack-kw-2.28-236.el8_9.13.aarch64.rpm 90e386e540ac887e53f2b6ea4e161e6e50a1ee86162a2f11b3166123e0f1ea96 glibc-langpack-ky-2.28-236.el8_9.13.aarch64.rpm 5bae5486323cdf320b743a915e5dbfc9830f7511fb1e52034edae98d822d3b80 glibc-langpack-lb-2.28-236.el8_9.13.aarch64.rpm adbc6ce49c5f5e124b04d3a6c1b83be9dd61a5f114cca44bd54395d9c5042365 glibc-langpack-lg-2.28-236.el8_9.13.aarch64.rpm e6d3cc0a490205993549efef9b8b4cf02e88c04914a6e4c77bbf4cbad8e85ff1 glibc-langpack-li-2.28-236.el8_9.13.aarch64.rpm 06798fd44903d6a1f4036e0d9c2ea85bc162bdb0f3da856e5d5a5d54d7ea4f62 glibc-langpack-lij-2.28-236.el8_9.13.aarch64.rpm 2002eca12ec8570aaf93d5be29dc100dbbbe3a0627f870940a5486aad096563b glibc-langpack-ln-2.28-236.el8_9.13.aarch64.rpm 2481cb066c08031a41033f2afea7e702cce50087acf23c8553777b845da9e379 glibc-langpack-lo-2.28-236.el8_9.13.aarch64.rpm 74f369d394700f740f69d557a26daa1edb58863a29fc2dcbf83825af5bcd2e7d glibc-langpack-lt-2.28-236.el8_9.13.aarch64.rpm af4059e88b10cb3ed7d2fd51a3ef63ac3c9ae1e2bd577bc39b3bf9b4217eeabf glibc-langpack-lv-2.28-236.el8_9.13.aarch64.rpm adc776439685acac43c0ff581872320a7152156c78163a15f6ecfde2a63ead17 glibc-langpack-lzh-2.28-236.el8_9.13.aarch64.rpm a3bf2b129ac08fe85e160918265c0b198dd97ed95f03a0922ce52a023d9c5d90 glibc-langpack-mag-2.28-236.el8_9.13.aarch64.rpm 0d61b1121ce0ed6a28c67bee1825334a6bff8fd9eb121f21fb681378f46561bd glibc-langpack-mai-2.28-236.el8_9.13.aarch64.rpm b53844c5d346e20430152d10d4ef186a0d0963b6b24cc1711f0f43ceda250897 glibc-langpack-mfe-2.28-236.el8_9.13.aarch64.rpm 8bd4db08ed8c902adb1e514d611312677000bb9447d4e5190baed271e29fce5b glibc-langpack-mg-2.28-236.el8_9.13.aarch64.rpm 0017fef006920eb82c07ac41b6144e9837c327a2689551adda388d1cf15e84f8 glibc-langpack-mhr-2.28-236.el8_9.13.aarch64.rpm bbe076cf62ae1e04f229b154f20f5a60e6580f838c22e64bd339debdaf1625b7 glibc-langpack-mi-2.28-236.el8_9.13.aarch64.rpm ab806c51a563ccd26e2dac24294be00f5fb3ae16da64c8c7c45a23d5bc840d08 glibc-langpack-miq-2.28-236.el8_9.13.aarch64.rpm 8652f9c89cd38e654dac4d216b1ed5862097c5eb14ab30f90e7cea6113b5f3c4 glibc-langpack-mjw-2.28-236.el8_9.13.aarch64.rpm 6c3661527fc1149cd33ca697d04380e46d905733a1dd0776b030dc7c9cd2e0bd glibc-langpack-mk-2.28-236.el8_9.13.aarch64.rpm cb07d1e87b8a7b7f36be71ef2bd2dad4152c640c7b7db2e93f49176f4b0290d0 glibc-langpack-ml-2.28-236.el8_9.13.aarch64.rpm d9f58610e8de9f12e9002f8d02d5f4a6629fe77300598144ad25bd69b9969e3e glibc-langpack-mn-2.28-236.el8_9.13.aarch64.rpm 2ad4c81fb15e982315f5dcdac74e3f90b92ea1c6de40ab9c65ec45299c031f1b glibc-langpack-mni-2.28-236.el8_9.13.aarch64.rpm 65fb04eec592ac46912b9fd095e6b282f1816efa47a547951280604c2e035121 glibc-langpack-mr-2.28-236.el8_9.13.aarch64.rpm ba702ab56566596421af04eb3ea2ab24b70d45a573d7212938893bd788d427bd glibc-langpack-ms-2.28-236.el8_9.13.aarch64.rpm 89102e618c9366d210389feb4b9be2cccb195b5facf30b9bd0c9003ed76048fe glibc-langpack-mt-2.28-236.el8_9.13.aarch64.rpm b0ad61be98abe12e86a310bdab04bac1857c18167e551ea9bb9ae8ebfdc4254f glibc-langpack-my-2.28-236.el8_9.13.aarch64.rpm ab3a6c9b153eaef7f389d8c84a120bbfb3f3eed1d3670ea15ada42d329d4fb32 glibc-langpack-nan-2.28-236.el8_9.13.aarch64.rpm e5ba1c60003e9148b2b0bca70b09b59890c0e8b53c985998f2665fa81d507d96 glibc-langpack-nb-2.28-236.el8_9.13.aarch64.rpm cf49a4d61217f01f098090a6be29da7e86a8051fbca0dce7e4f82ed87e2988fc glibc-langpack-nds-2.28-236.el8_9.13.aarch64.rpm b131c6962bdce826c3071e6bdec29904919acca4894c4fa80b96183e54e37632 glibc-langpack-ne-2.28-236.el8_9.13.aarch64.rpm c72479167f177f32cc713375b511750c063a8d74f635471204fd28599014c267 glibc-langpack-nhn-2.28-236.el8_9.13.aarch64.rpm 03a9114dab9ff06e24ca8d9796bc7b1c8d0a539e4e224cff839bf83e6aee180c glibc-langpack-niu-2.28-236.el8_9.13.aarch64.rpm 076c47a9c52e9cbac514338c221fcfd8b04c761f1b06d2f3275af689f41b5d2b glibc-langpack-nl-2.28-236.el8_9.13.aarch64.rpm 7c0c87fd2c1bed0d79d55e0f91808674e2c071700172da92a072befda23db384 glibc-langpack-nn-2.28-236.el8_9.13.aarch64.rpm 220efc20f761a26e8c78bed58ee03f9efe35b28f4e19addfdae6bbd68fa228f1 glibc-langpack-nr-2.28-236.el8_9.13.aarch64.rpm 4f050a3949ba2418fbad6df59edd8598ab6be4cbf90c184646109c134ccf0a09 glibc-langpack-nso-2.28-236.el8_9.13.aarch64.rpm c2723860ab034b977f8f395d786b0b669fe3bb509bbf8cca94ad2c8d740e9a1b glibc-langpack-oc-2.28-236.el8_9.13.aarch64.rpm 53351401997f9e8b5b13c2c5c8dac4e02cd2b8a32db3bcd5375cadf28bd25ae5 glibc-langpack-om-2.28-236.el8_9.13.aarch64.rpm c052127aef2c1d90afde2c9d66727114baa1241b893585125c76547820704dbf glibc-langpack-or-2.28-236.el8_9.13.aarch64.rpm 65000acbb58e29ffa6591a01455849dc6a1e7a6acfcdcb6f1737dcaf7640f3ef glibc-langpack-os-2.28-236.el8_9.13.aarch64.rpm 2b344f89cdf420b1c8bba5b99694a1d20f13498d55acd86783d968f3c8218069 glibc-langpack-pa-2.28-236.el8_9.13.aarch64.rpm 18dcd79bdad6cf99eac0b8ba93d19fe94f5f3acb724183e3495ccc6c33aa75bd glibc-langpack-pap-2.28-236.el8_9.13.aarch64.rpm 87bd4fcaf250befd3c4a18ca560fbd8b30176ecee81ac1f217264d43d011308c glibc-langpack-pl-2.28-236.el8_9.13.aarch64.rpm fa7865686a4e1f7f33b584fff222a990390ead44ff39c5412b3dd111e39a33c0 glibc-langpack-ps-2.28-236.el8_9.13.aarch64.rpm 74136b84aa378f7528121d6ba42c0a1c89de86995bac367312043d1c9a4260b5 glibc-langpack-pt-2.28-236.el8_9.13.aarch64.rpm 06205d8060b0c5f2dc8403f35df2dbca51ddc912f40af2f3fb2093943e50a80f glibc-langpack-quz-2.28-236.el8_9.13.aarch64.rpm 2adee2f27bec3e062c8e4d9be73f947fcfadb40bd4da33ebe6f06c3b5fab6342 glibc-langpack-raj-2.28-236.el8_9.13.aarch64.rpm 1f0c675dcf45e36e39d3626762b4df813407315dcbf1cfda97c54e69fc06b3a8 glibc-langpack-ro-2.28-236.el8_9.13.aarch64.rpm aac30e519b66e60076a56841ac054ee02e74283d39b67c98f66024ec7853304d glibc-langpack-ru-2.28-236.el8_9.13.aarch64.rpm 8924ec6944f1c9e1fc0123082864d4951eaabd5d3259f9393073f02a47496e1d glibc-langpack-rw-2.28-236.el8_9.13.aarch64.rpm b37c6d8c4cc1e8b5fd1b2216fc2ebc7612c37b0843b6e7d8cedd3331b5830a60 glibc-langpack-sa-2.28-236.el8_9.13.aarch64.rpm b87cbcd339a1e8c5686ae6835d03a12b93e2e55be4147d224d55379cf021e992 glibc-langpack-sah-2.28-236.el8_9.13.aarch64.rpm 961f5763d82af2c69c56d47d3bc83c6cd8edfce77cf1c3967b0ad8291dd404c7 glibc-langpack-sat-2.28-236.el8_9.13.aarch64.rpm cc9b0750beb601af5c3be45e649b211454ed718cf45b08c83b190c2273d61f4a glibc-langpack-sc-2.28-236.el8_9.13.aarch64.rpm a11b3641acba5dc75cc35e2e455a789d6e0e300f8d133ef3c0989e5993a81bb9 glibc-langpack-sd-2.28-236.el8_9.13.aarch64.rpm 592e2adf29e1d805a6cd4881cf10608775f93502f292e433e021d10e0f4f95bb glibc-langpack-se-2.28-236.el8_9.13.aarch64.rpm fe07cc7ccbb6fa631986df4eb115bff6244f7bc368f27167917df0ce691eaa2e glibc-langpack-sgs-2.28-236.el8_9.13.aarch64.rpm e7e80202ff79b39f01d112e1cbeb55f984ecfcd571f98fbd1508ea1fbe7258a1 glibc-langpack-shn-2.28-236.el8_9.13.aarch64.rpm 90b06bf78c991a307385ff4a89162ded13e44eeef6fa2e61008983df6bb1e84e glibc-langpack-shs-2.28-236.el8_9.13.aarch64.rpm 97f0345f85be487c1c071e9630dfe36472b1b3db499159f472967bf9bed940f9 glibc-langpack-si-2.28-236.el8_9.13.aarch64.rpm cb0bc6185f39346157e55d9f1821d1a23348facdc96b79374c6df7d511edf903 glibc-langpack-sid-2.28-236.el8_9.13.aarch64.rpm e27282a938fe436a36909dc983ea19c5d0e020a93b7ac30ed98a6ee90f2bcd22 glibc-langpack-sk-2.28-236.el8_9.13.aarch64.rpm 78f09cc35f4c654276c175e4d1589673ce7f619b0e88c1bc29894b099f7c5c35 glibc-langpack-sl-2.28-236.el8_9.13.aarch64.rpm d8aee0a015e88e7d21cac65da6b7fce4f57e5f58c6ba5d1ede8f721d655939ec glibc-langpack-sm-2.28-236.el8_9.13.aarch64.rpm 6e3ab6622eea1c823ae1e2cb6878b70978eff6a72d6d73fc958f27fc65a65c46 glibc-langpack-so-2.28-236.el8_9.13.aarch64.rpm 29ed6ef1d86a099eb9f22bc7320eb9e962cf4756c1b4383b1d96967309b58b39 glibc-langpack-sq-2.28-236.el8_9.13.aarch64.rpm 025d4a7d1597a1f7478e394f1c8f37955617fe316909ee5570982b04ad574382 glibc-langpack-sr-2.28-236.el8_9.13.aarch64.rpm 0c7ed48fcffb502a10cefb3815eac4b769bed2f0e75a078e86fab8ad5644a5d1 glibc-langpack-ss-2.28-236.el8_9.13.aarch64.rpm 22b5717bdbd52d698f2d80aaef61708ea5a7045a65915345991f53c4c77d848e glibc-langpack-st-2.28-236.el8_9.13.aarch64.rpm 035b3431ab46c6e4aab12f80b6b4acdbcb5ee97a302f349d0e8fbaad7cf8517d glibc-langpack-sv-2.28-236.el8_9.13.aarch64.rpm 7bf32d40c271274fd4ebc2f07e57d04d57b4b968cd81b59cf6bd9a026522d306 glibc-langpack-sw-2.28-236.el8_9.13.aarch64.rpm 33c70e257928e4570120104ad06324b8f68eb70a93ec4c117c8c7902a652cf25 glibc-langpack-szl-2.28-236.el8_9.13.aarch64.rpm c802f356e5d9be1bb0c8fb45ada236c950dd6c0082654371846a9d7c2ded6972 glibc-langpack-ta-2.28-236.el8_9.13.aarch64.rpm 9bfbb8b5be148fb9775346cec26117f5e155964c2b2e6ef7830b3245f63a5157 glibc-langpack-tcy-2.28-236.el8_9.13.aarch64.rpm d8ffbce86376a4a2ed19bab5f96813ce28c30161860b525aac775ed6299581ba glibc-langpack-te-2.28-236.el8_9.13.aarch64.rpm 98f5b1c3562aca9fb3fcb8445b6089b1d4e54c07ee554fe586d03b001eca08df glibc-langpack-tg-2.28-236.el8_9.13.aarch64.rpm bd8f75b441b2ac23d2dbab3634af58199f91059497cdc116805ff491c76274ca glibc-langpack-th-2.28-236.el8_9.13.aarch64.rpm f560d2593636759ea0be57a6e1c9b29e043221e34fb00eb832c794b63af5a73b glibc-langpack-the-2.28-236.el8_9.13.aarch64.rpm ecb08f0717575d843ff3ed3aee87384ea8b87594466c1eb53d8d824e317ce75a glibc-langpack-ti-2.28-236.el8_9.13.aarch64.rpm ecefdaf9f04513696b543c33241e231ac44a1f91358b3046d89edbbc51011ad1 glibc-langpack-tig-2.28-236.el8_9.13.aarch64.rpm 2e56a73232de47f2e5270e0550498037d52c6d34d8d79eb43d8e5329aaf39e77 glibc-langpack-tk-2.28-236.el8_9.13.aarch64.rpm f6596b1213e726d489993df6a3a3e916c9fec951bd5b8825c00b9e3fc3b1306c glibc-langpack-tl-2.28-236.el8_9.13.aarch64.rpm f181e986837c77a5d8ad53116f95261ffe9153a5474c55530e972fa9ac85fec1 glibc-langpack-tn-2.28-236.el8_9.13.aarch64.rpm 4f14743c8dd8dc386d3759403d2060db9cbccae3e9d0124a722d1a96e8318a10 glibc-langpack-to-2.28-236.el8_9.13.aarch64.rpm 0c6c256e3db4aa5c4ab72b8af454e6073da441590595e02f9703f6cb1627240c glibc-langpack-tpi-2.28-236.el8_9.13.aarch64.rpm ea363b147b4fb7c31121695ebb1ade95f1ced84e6ee11e0b92ba6237b86b2a9a glibc-langpack-tr-2.28-236.el8_9.13.aarch64.rpm 22c43045235482b4b7441076ffd9cb8720b34e56e1e22d0bc8f9a1452fa87ca0 glibc-langpack-ts-2.28-236.el8_9.13.aarch64.rpm 67f7ce10a98abb567988e3a4e3362ea21aa967dab35fef4ad3e57946514b7054 glibc-langpack-tt-2.28-236.el8_9.13.aarch64.rpm 29ec022ce85e2b6b06b2b3c9caf8bef16ae1d8464800f4076b78a7378275a25a glibc-langpack-ug-2.28-236.el8_9.13.aarch64.rpm ebc3bc3bb3d7ac519a2d282423bfa89e685286b161cedfb150302f47958f723d glibc-langpack-uk-2.28-236.el8_9.13.aarch64.rpm 1e80d1c3cc601a159b0bdd59643bcbfcf9dab91d50e710398c58d5f4b920e999 glibc-langpack-unm-2.28-236.el8_9.13.aarch64.rpm 2b9584ab78adbd5a495b6f5b803c397d88b6783bb68bdcf6f90121ed6318520d glibc-langpack-ur-2.28-236.el8_9.13.aarch64.rpm bfc9cbe0180a87b70d9dedb965812463049690e5e2dc799ac479b398048e98cf glibc-langpack-uz-2.28-236.el8_9.13.aarch64.rpm 6355e4c0d6b52965103f0af77048c688fed86f2eb62b43d2bac4bcabbe058c61 glibc-langpack-ve-2.28-236.el8_9.13.aarch64.rpm 81a937e9a45d03194ffc179d0380eefd9c302d39b364d1699e5254f234fd6f15 glibc-langpack-vi-2.28-236.el8_9.13.aarch64.rpm f3d3765d51cd105f7c23a84f47962c9e8d8247fd72fc6f23dab316962e5e2728 glibc-langpack-wa-2.28-236.el8_9.13.aarch64.rpm cf110509b7fc2331b970656ce615de4d34f9dcd751b97fb7885f9614ee7f92b0 glibc-langpack-wae-2.28-236.el8_9.13.aarch64.rpm 6b1a5f1af27830c70cee7a1243c936f47bac4bace5626ce5ed56ea9a5ee76018 glibc-langpack-wal-2.28-236.el8_9.13.aarch64.rpm 8123f355f87dae06148f5ad18f7142af110e9165855c13055685bb7be9a5aef2 glibc-langpack-wo-2.28-236.el8_9.13.aarch64.rpm 75dd06b37cd647135d47f6f59cbd3eaff93f037b92e7950f5365690123ed69a4 glibc-langpack-xh-2.28-236.el8_9.13.aarch64.rpm 93656253f13378edbcea13521f75c9db954bd1a7eb0aefc7fa8e6fea55e23f42 glibc-langpack-yi-2.28-236.el8_9.13.aarch64.rpm b516c1c61b2a6e061d136a57da152006959ee40cc699533141f0542973ffd800 glibc-langpack-yo-2.28-236.el8_9.13.aarch64.rpm 5ffd36e75ea969d72cdf23cdc7e5e996a36bffe0416d198051d7b4472c2333e7 glibc-langpack-yue-2.28-236.el8_9.13.aarch64.rpm 9fe17ad868d4c5c2389ccd00eb87ad2f105588ef8caa7d61637d11e681c51612 glibc-langpack-yuw-2.28-236.el8_9.13.aarch64.rpm e4b3599e8fa62b6903d36358bfc437d0322570e76c6b1529b1e4f5989ed36f71 glibc-langpack-zh-2.28-236.el8_9.13.aarch64.rpm 707afd5d09cf64bf796c2d77f4f10339be53bc1b7cb0910231c30fe294bf46b2 glibc-langpack-zu-2.28-236.el8_9.13.aarch64.rpm 0393c34d8acb30b11e08117042078eb569c991e0cecb7895fb803838be302f31 glibc-locale-source-2.28-236.el8_9.13.aarch64.rpm 0fe808c5b4c6806d74ee55f731832b9c0593146b947dfd03eb08f42e518b22d9 glibc-minimal-langpack-2.28-236.el8_9.13.aarch64.rpm 52f8aec71905e6dc473587d300fa302e96a2a8d7d965817236f2ff4b8ce1f1d1 libnsl-2.28-236.el8_9.13.aarch64.rpm abf86fc9c0e80a5f363a03419a3e0d2c46e2217c9095109f9435915ffa60b718 nscd-2.28-236.el8_9.13.aarch64.rpm 812ab7dc070936c26d86c228d1f371b225fc0db5724066eb9fab1490eb8038e4 nss_db-2.28-236.el8_9.13.aarch64.rpm 28877c81825b054748cadc02736e38b1ebf204afb5009db1bd8ad557922b940f RLBA-2019:3778 hwdata bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bug Fix(es): * Pull PCI/USB IDs for 8.1.0.z (BZ#1767717) none-baseos-rpms hwdata-0.314-8.22.el8.noarch.rpm 08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69 hwdata-0.314-8.22.el8.noarch.rpm 08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69 RLBA-2024:1602 nftables bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * nftables counter (JIRA:Rocky Linux-2596) none-baseos-rpms nftables-1.0.4-4.el8.aarch64.rpm 3574a05165eb5bd2888dc3d4419dab6394c9c3ea753d660d3869a8f906aeb842 python3-nftables-1.0.4-4.el8.aarch64.rpm 8cbb5c45e18c51505cac71a5a99de85453fc5422a159c9d0c06f514acaaa1784 RLBA-2024:1603 iptables bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iptables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The iptables utility controls the network packet filtering code in the Linux kernel. Bug Fix(es): * ebtables core dumped when set unsupport table (JIRA:Rocky Linux-12350) * New defects found in iptables-1.8.5-8.el8 [rhel-8.9.0.z] (JIRA:Rocky Linux-16654) none-baseos-rpms iptables-1.8.5-11.el8.aarch64.rpm 96f98e1a0567fb395ca408a3fe66bc004ed5ced22c8f44beddf6dff02bf61db5 iptables-arptables-1.8.5-11.el8.aarch64.rpm ac1991925b384fad6f62e82001336ac16ba6430cf19811cd0718478d67424970 iptables-devel-1.8.5-11.el8.aarch64.rpm d9680b82f415c8acb8cf44f05de3a88deef1371630128058f1f0cfb277943460 iptables-ebtables-1.8.5-11.el8.aarch64.rpm b23289b0728ba8d9622e3c92e4e93985fb383badd3b3bafc361ad2a54101685c iptables-libs-1.8.5-11.el8.aarch64.rpm 065c24eeb7dab26c0338accc84de0d4d56db8923c057379867abb70e99019b38 iptables-services-1.8.5-11.el8.aarch64.rpm 73ee231a62777f8f11171704446a6bd85b52ce7c8d1b841f0c473bfe7b79fe24 iptables-utils-1.8.5-11.el8.aarch64.rpm a9a30d3b2670e9bf313ba6f5349a97d694494da847c1260362195d5941a79ae6 RLBA-2024:3136 libsoup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libsoup-2.62.3-5.el8.aarch64.rpm e5a3e396756b0dc182659679c863ff1a026815488a74aa23a3140dc5ba32e905 RLBA-2024:3142 numactl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numactl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms numactl-2.0.16-4.el8.aarch64.rpm 1d33b24571e6e4172d14c42e63bb8f935d7618b5f43cb5437c356822fed50112 numactl-devel-2.0.16-4.el8.aarch64.rpm b0957e0e948655d88edf81bbc45eb632353279e51d4e59f32f84c2eb3e09df3a numactl-libs-2.0.16-4.el8.aarch64.rpm c235b01708cb0a3773b1dc5ad2b63646edf8ab8668498fdc666db4d6910f246f RLBA-2024:3140 kexec-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms kexec-tools-2.0.26-14.el8.aarch64.rpm 4d3836a93353a958ba396f938b37bdc7200f8bb7f9aab259e28194b8c1ad43ee RLBA-2024:3141 c-ares bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms c-ares-1.13.0-10.el8.aarch64.rpm eeacd4b6d88680615bf3f53f732c65fd3a7409502827c04e7eccb56ca7210a92 c-ares-devel-1.13.0-10.el8.aarch64.rpm f4bec6edcd0daa007d370c5812b27afa345e3260853299b664daff4f9155640f RLBA-2024:3137 libtracefs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtracefs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libtracefs-1.3.1-3.el8.aarch64.rpm d30069df9a94499210e1d9753494b67bfffa956607722607fe3ed2a546d19630 RLSA-2024:3139 Moderate: squashfs-tools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for squashfs-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SquashFS is a highly compressed read-only file system for Linux. These packages contain the utilities for manipulating squashfs file systems. Security Fix(es): * squashfs-tools: unvalidated filepaths allow writing outside of destination (CVE-2021-40153) * squashfs-tools: possible Directory Traversal via symbolic link (CVE-2021-41072) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms squashfs-tools-4.3-21.el8.aarch64.rpm 4cbe79a2ad134f8f24132bdd74fba667fabb1bdae593397f482e1f48c3b28c5e RLSA-2024:3138 Moderate: kernel security, bug fix, and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms bpftool-4.18.0-553.el8_10.aarch64.rpm 08ce4dbf16e18571cef72f924e82c51248c575aa163e6ea44c28cf76f04ed119 kernel-4.18.0-553.el8_10.aarch64.rpm a628c7af1070f15d63ac83b37998d6c579d298c4d3e409780d1d7aed4aaccaa2 kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm 4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8 kernel-abi-stablelists-4.18.0-553.el8_10.noarch.rpm 4a654bf1f356dc3c1db0c813b00868d3d3f3dc5633e85ffe6507aec53c3652a8 kernel-core-4.18.0-553.el8_10.aarch64.rpm 22417b6a6fdd2ad3d35d755272f21b22cf2dbd53f394bde9b4952082e2926c0d kernel-cross-headers-4.18.0-553.el8_10.aarch64.rpm a65a7d21dac609667ae51a160f72d4638bb3b28580bfbc4a7b673284541bdd73 kernel-debug-4.18.0-553.el8_10.aarch64.rpm f9fc7b8863151c40b2e42fc97b167e399eb1033b5098179663c7397d4b73db0b kernel-debug-core-4.18.0-553.el8_10.aarch64.rpm 7fb3016d7457f940c334b3e513dea509cad8543c1d1a8bd9822ae79aadb6e054 kernel-debug-devel-4.18.0-553.el8_10.aarch64.rpm 7295b72bdd3b30052f0d080d8a00c027964001266bc13c3e4fba5df869dd1935 kernel-debuginfo-common-aarch64-4.18.0-553.el8_10.aarch64.rpm 2cba6673ee43fa5737b638236e355e054a5af42e78117ca55dcf196cb0351487 kernel-debug-modules-4.18.0-553.el8_10.aarch64.rpm 20e870e3e01a5cc277e09fd866dee83b8620f85c4fa76c6edcea15a1fed97f09 kernel-debug-modules-extra-4.18.0-553.el8_10.aarch64.rpm fb84f98a33b28034a2701de01f61e5d2d0c2fad1c192815c5f415f2e3a184c4e kernel-devel-4.18.0-553.el8_10.aarch64.rpm d929d72d38d3804e2557f7b087c5bf29a2232b479016ce01c2c1b77c35f5f11f kernel-doc-4.18.0-553.el8_10.noarch.rpm 2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292 kernel-doc-4.18.0-553.el8_10.noarch.rpm 2b50aa89af6bc25639ebd05ec71ac66e0bc9f5b550f8173e4dbdf278084d8292 kernel-headers-4.18.0-553.el8_10.aarch64.rpm 25b02aaf4fd4095b23f6344d1766abafc462b4f261dd2f8d4adb3576d6ff011e kernel-modules-4.18.0-553.el8_10.aarch64.rpm 0ab80acaa76c894b9d21de7f42116086e05a8e80bf2e13259d2356be92404a6a kernel-modules-extra-4.18.0-553.el8_10.aarch64.rpm 26d0a921a90e14eec8f9486eb4d2db7418685d633db9079239a7d0d2210c198c kernel-tools-4.18.0-553.el8_10.aarch64.rpm e1777ffddf26b46082fcafcc9714b5d3c59a93fca9674f5dbfd6e4f44cdaf950 kernel-tools-libs-4.18.0-553.el8_10.aarch64.rpm 042d8190808daf1a97e517d12e67c2fd6cf1df5367279a9a0fd690a716623f38 perf-4.18.0-553.el8_10.aarch64.rpm c855a2f0cb7b97d4799396bab96bd44eabc03af881ccb08f778b302da401ca95 python3-perf-4.18.0-553.el8_10.aarch64.rpm 02593361543abe1a63ced89983cad12cac9ca26a777c6b2289faf804d6de4936 RLBA-2024:3152 glibc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms glibc-2.28-251.el8_10.2.aarch64.rpm 6a413ed2317b51ff6622ca7ddee28134c71f444f36652a532f3e59ee881c136c glibc-all-langpacks-2.28-251.el8_10.2.aarch64.rpm e9d0f115b2399050db194270ededa117a363a92696cefe033dfe2507fda20d95 glibc-common-2.28-251.el8_10.2.aarch64.rpm 5b3f49e5075a456fef06cceea69e0fba3f0f29e6515e96d570dd5fed5bf50fe7 glibc-devel-2.28-251.el8_10.2.aarch64.rpm 976059c5e325c19b1be410a1838ad7f063dc12dab1a8b9ecf08cd0f2970791c4 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-gconv-extra-2.28-251.el8_10.2.aarch64.rpm e6aa94ae49e7ed1f2d7b1d7dd4538dc5271bbc9126888c63acdb00415fc0ad85 glibc-headers-2.28-251.el8_10.2.aarch64.rpm ea7c046ba7541c00b12185278c0c2b46735abf4ca5352a8f7480661d8843af5d glibc-langpack-aa-2.28-251.el8_10.2.aarch64.rpm 1706c598222eb1233aa3ae9afa86835cdc274593ab4b6b521d658d27e11134fa glibc-langpack-af-2.28-251.el8_10.2.aarch64.rpm 37ef5e44687cc3815672c42f0448eb9f49182274cada11846187550a3a2a840c glibc-langpack-agr-2.28-251.el8_10.2.aarch64.rpm c5bb033e2708260223ff14d6091213fa67f724699dbdd40083a132e7779e6bf7 glibc-langpack-ak-2.28-251.el8_10.2.aarch64.rpm c39e69d3b8b1bf77030518280f68f8b6f3448102b67e187de56c7bfe9fd41ff8 glibc-langpack-am-2.28-251.el8_10.2.aarch64.rpm f5d0ddf3409cdd6af2be2fe307c97e252c0fd147a73f157d241228b0ea21c03a glibc-langpack-an-2.28-251.el8_10.2.aarch64.rpm 75ed9e8a4a69497ce12ad4541c3122afc5dadfb3c2080f611a400305660cf07a glibc-langpack-anp-2.28-251.el8_10.2.aarch64.rpm 9375cee507681d707baaf384f3c21fcd8908a0aea5f134a05fb157fce325f656 glibc-langpack-ar-2.28-251.el8_10.2.aarch64.rpm 791124ef9912e208c60db56ea7279548de186ab86db78a2d05cc74ed7447b796 glibc-langpack-as-2.28-251.el8_10.2.aarch64.rpm 9a9a0255e80a90c7445ad36b71d5839fb757d537600f1f77720094172ba62402 glibc-langpack-ast-2.28-251.el8_10.2.aarch64.rpm 4d43efda3edf04a083f1c99189e319b3ac933af1dc289cc4927fedcf94b7e28f glibc-langpack-ayc-2.28-251.el8_10.2.aarch64.rpm 55df4c943f48e3573ff2d59b1fe430e4f4455335a8f8aef6237cbef5936bd3d7 glibc-langpack-az-2.28-251.el8_10.2.aarch64.rpm 15a16bc53f07498a0e2f3b322e0a055fcf641305bda4bba739b5b698b41a4ea0 glibc-langpack-be-2.28-251.el8_10.2.aarch64.rpm 83e9ecc50f85b7bfb6717c1332021d05614b0b2b2681c0bc4ab218406fd80354 glibc-langpack-bem-2.28-251.el8_10.2.aarch64.rpm ae246650a22434682f17c5d8ecddb882189300be6ef6bae080e8039a6fba03f5 glibc-langpack-ber-2.28-251.el8_10.2.aarch64.rpm a04d4382ccab07b14746580212c2a7c4df4310cc5058744e1c0ced9949136642 glibc-langpack-bg-2.28-251.el8_10.2.aarch64.rpm aa2aa33ac33edbd225815d2cd161b4a963b70e7fc803a8ea43bfcf52cb907c84 glibc-langpack-bhb-2.28-251.el8_10.2.aarch64.rpm ab6fd47bb75be4854b6a28aed54cc915c408e12d4f2def62c22db7f27221cefa glibc-langpack-bho-2.28-251.el8_10.2.aarch64.rpm 4a36f5fbde4d53f776e23500354bf8ad645b2acc1c9ed4c97d244f80b905053c glibc-langpack-bi-2.28-251.el8_10.2.aarch64.rpm dbb28681440fa67b56594ad254f794c5f69fbf466a4e54aca22e636caa120d39 glibc-langpack-bn-2.28-251.el8_10.2.aarch64.rpm d1a3f6b19da7fddbf79daad034fd962c6ff2a34e5989143182fdad809954fe9f glibc-langpack-bo-2.28-251.el8_10.2.aarch64.rpm 4a53c43bbaeeef24fcecf1680e9e7109dae9d7b00e12827549c8d868ff6ddb61 glibc-langpack-br-2.28-251.el8_10.2.aarch64.rpm 2752174aeaf65f6b290fd2925f424962a732a2f921a56fd36b0def39e9edada0 glibc-langpack-brx-2.28-251.el8_10.2.aarch64.rpm bd8c5d972dc4d7a0e758f7bdb31ff7c1aca9714c11c0826344a481c6d7b78a03 glibc-langpack-bs-2.28-251.el8_10.2.aarch64.rpm 4bffa792631572868af2da0561e552359fd5a2eadce32e8da64b277fa1c80330 glibc-langpack-byn-2.28-251.el8_10.2.aarch64.rpm fd19229a706ce256c5b621af56175d6fafc767f582653d811519f4ba6a92076d glibc-langpack-ca-2.28-251.el8_10.2.aarch64.rpm 09cf2ed3e3bb23f157676a4c97298443dc081896e1e99fd6e5e0718e957d0262 glibc-langpack-ce-2.28-251.el8_10.2.aarch64.rpm 7dfd060097b86ea6c53866e77fcf13aeb3086fead85f481d7b59d96a66675960 glibc-langpack-chr-2.28-251.el8_10.2.aarch64.rpm d5ae5bbf677bd4f4eea20db7bf5391987863134b9db20aee0ef2e512af86c79b glibc-langpack-cmn-2.28-251.el8_10.2.aarch64.rpm ccc3016a64edf024df8a2be6187bfdec1c8355f5b910075b0c18a1a301c70d12 glibc-langpack-crh-2.28-251.el8_10.2.aarch64.rpm d8785a4af7efc5e9d98f395cce20faa7430b116d320fcb831384f8b7c1641a36 glibc-langpack-cs-2.28-251.el8_10.2.aarch64.rpm 126c94816629b4a6347bf5a422001d84a2a158eb7f0908d1c83e6f8d6982e68d glibc-langpack-csb-2.28-251.el8_10.2.aarch64.rpm f73bd72c0bfb0f8b848584cf6fb2a739cf34bbf796c521c02bbbc3ab5e081af7 glibc-langpack-cv-2.28-251.el8_10.2.aarch64.rpm e1a4b008a8903068b6725180541cb559a47c98dc32d606d090852a8aa9e8a959 glibc-langpack-cy-2.28-251.el8_10.2.aarch64.rpm ed13595e4d32971b7efe160b1afb869d77cd0e3dfa25bc069afbb7df6a27ec8f glibc-langpack-da-2.28-251.el8_10.2.aarch64.rpm f9097d0013cd8119e6927080a17f3b237960c02418185fef6914aac021c2a3c7 glibc-langpack-de-2.28-251.el8_10.2.aarch64.rpm b6bc677564c01958a2599be17a5d119fdac1f5ef4858212de136046e3b1f2942 glibc-langpack-doi-2.28-251.el8_10.2.aarch64.rpm bc17357722278512adbac90440f1a35914f744d7aa533513bc32274f88f13c9f glibc-langpack-dsb-2.28-251.el8_10.2.aarch64.rpm 4a18cfe5a2ae881a6198f1867f87529a350fcbafd70039646b4c062152f823ee glibc-langpack-dv-2.28-251.el8_10.2.aarch64.rpm 39ad36209c958c4e08635273f7f24e44fe8d25be8b8331fef8c35773177bdbe2 glibc-langpack-dz-2.28-251.el8_10.2.aarch64.rpm 62e40c8223b474ee84fc3b4880b1e5c487345e93b1bd6236f0c717361b0a3780 glibc-langpack-el-2.28-251.el8_10.2.aarch64.rpm e1931445b2fb1ceea667d9331f8f19c1ab54ca569df6c65ae39f6be252626a90 glibc-langpack-en-2.28-251.el8_10.2.aarch64.rpm 38336752a555dd443e48a69b38c905743ff2967f0118b54b508a76386b9f7e9b glibc-langpack-eo-2.28-251.el8_10.2.aarch64.rpm 1a70e7add4b88aea5e03a24e56ebcb1e29cc72dbb705d2605817ac9f32596b8d glibc-langpack-es-2.28-251.el8_10.2.aarch64.rpm 8cc8a7ca9441adf6992d282157f9bda2c23e0958f892a6f8a5ceb16989b90913 glibc-langpack-et-2.28-251.el8_10.2.aarch64.rpm 18f0a25fe4fa86330ca20e1e7a10b3321be563f967600928f2342374b2a02498 glibc-langpack-eu-2.28-251.el8_10.2.aarch64.rpm aab236840afb39ffeb616129fe9d483a3875e29ff47933e534440b44822632f7 glibc-langpack-fa-2.28-251.el8_10.2.aarch64.rpm 3f33603eb11c6d4fd139766347a1e39b5cfc309d3c54335c059f4478044cf639 glibc-langpack-ff-2.28-251.el8_10.2.aarch64.rpm 0233f3bf3713a6456e5c67ea2e3eedb52b3df0119b10d3710510d4aa39dba857 glibc-langpack-fi-2.28-251.el8_10.2.aarch64.rpm ccf432959d31309a3e13d1357a739808f38c378f3c4635a3d70aeb3d6b8cb054 glibc-langpack-fil-2.28-251.el8_10.2.aarch64.rpm d5363e694b1dfe15eb29604c2e352313b48e8af5aec5fba5859c6c7123416550 glibc-langpack-fo-2.28-251.el8_10.2.aarch64.rpm e1636dfc3cd782c51866da2d815d5f46f30e6d7b5a42c8d4c68c84333cc5250c glibc-langpack-fr-2.28-251.el8_10.2.aarch64.rpm c00fc3030e0d4c716ca86a8e4a8bd4785a3d4fbed3fb2c40aed9056efe3702cb glibc-langpack-fur-2.28-251.el8_10.2.aarch64.rpm f33b144a30edae560c4ba111e8e52779975c8a3734ad965defd26b5e6b7d76df glibc-langpack-fy-2.28-251.el8_10.2.aarch64.rpm 39f444982ddf67400235980aef806e0379d5db9fe440c361f7eac827abd9f1ac glibc-langpack-ga-2.28-251.el8_10.2.aarch64.rpm 4d48f1841ce98a969c12512e0f90c0d49a954460dc5269f064d001c8040f0f08 glibc-langpack-gd-2.28-251.el8_10.2.aarch64.rpm be987b063b7353d307a3f9ca578fa854ae49fc14e1d6629ae2c4f064730c37b7 glibc-langpack-gez-2.28-251.el8_10.2.aarch64.rpm 64fafa61873d7c3d8be8eafde329efc72eba282e6c94b5cc2484a112120e60ef glibc-langpack-gl-2.28-251.el8_10.2.aarch64.rpm 9aa8635f18a1bb13af82b384615e006062a0bc6cf4c9ef21cb6eadd25b3c7b1a glibc-langpack-gu-2.28-251.el8_10.2.aarch64.rpm c9d908d5ee821cc416bd2101b28be2bfe553bb3c0b1ff7f4c4e569369e14a331 glibc-langpack-gv-2.28-251.el8_10.2.aarch64.rpm 9aa0e2b9a475b81ac33888b6c9c10fac2600f88cd058a615c31a7e2a547938ff glibc-langpack-ha-2.28-251.el8_10.2.aarch64.rpm 21fb10606d2429cf1b9e83e04261899a056d7cffc2c81f346c0c99c6f36d943b glibc-langpack-hak-2.28-251.el8_10.2.aarch64.rpm 96bfa56792b3d3d378b4ae3af83e7bad5ade6b367dee8ec7b0fe0d4df2843ab4 glibc-langpack-he-2.28-251.el8_10.2.aarch64.rpm 427398c940f6cc3482476e84b6cc569b1efa8a89542739a4673c98c56be547d5 glibc-langpack-hi-2.28-251.el8_10.2.aarch64.rpm 843c91354e62cefa06fef439189fa4c75503cabc4c3ad430b4293cefa1cbe424 glibc-langpack-hif-2.28-251.el8_10.2.aarch64.rpm e90d49c6f6c6499f01fa0c8df796796c1935dba0ecf97cc8ea3f05aede9b2649 glibc-langpack-hne-2.28-251.el8_10.2.aarch64.rpm 71e474d690a23a408c4f846de2d56c651d3e16c0de82f3a8c5a43372d9eeb59f glibc-langpack-hr-2.28-251.el8_10.2.aarch64.rpm 2ddddfd532ee8dda4af952fe1636eb135390244acdaacce0b31b7d2aa41b7330 glibc-langpack-hsb-2.28-251.el8_10.2.aarch64.rpm 90d5e9d99ca2c6dcfbb1c2e791526f306607412c07ae455c19bdabe2de5f7072 glibc-langpack-ht-2.28-251.el8_10.2.aarch64.rpm 586092a2fb1f01ae5522306269fd0ed0163eace0ca88016acb334cd8c4baac6c glibc-langpack-hu-2.28-251.el8_10.2.aarch64.rpm 21b20071fa37e61b3c0e5e4b355d0b7ff34eda5b96128df42c19909c31d8c56a glibc-langpack-hy-2.28-251.el8_10.2.aarch64.rpm 10a3638c23723d6b86a6de84befdcfa3b393120fcd41e7307cdf4b6bb48e2887 glibc-langpack-ia-2.28-251.el8_10.2.aarch64.rpm 940107dc25482b2d497ef523530842c20bf7d6c2ec6257498bf3c609cc99c84f glibc-langpack-id-2.28-251.el8_10.2.aarch64.rpm 45438439722c4cfbb582ecd6d7863d221acb9f66cf59e3aee858a8726e689acb glibc-langpack-ig-2.28-251.el8_10.2.aarch64.rpm 6e413b917b32850055ed7fcdec05540fbcc923936df9a156d95504401067a710 glibc-langpack-ik-2.28-251.el8_10.2.aarch64.rpm 28702a736efd4808f7d09227a5c2290e640a5880a637c0fb1770374c1fedc54d glibc-langpack-is-2.28-251.el8_10.2.aarch64.rpm 69fb878cb66fbf9274fb02b5bdb537ec6d0814aacaf067d5492049769f8a2e60 glibc-langpack-it-2.28-251.el8_10.2.aarch64.rpm cfa2700e6434db8dce1d6109a2d29d7d7f2d018abd393d628641c31a3a1a1583 glibc-langpack-iu-2.28-251.el8_10.2.aarch64.rpm e66c695b54d0d1b881807c0be95926767c625948dd88c1d5d752be75c8445f1d glibc-langpack-ja-2.28-251.el8_10.2.aarch64.rpm c4d5be4cf3c04386f4c9474152497202e3ec8280db03dc4be233bbfa2f922e32 glibc-langpack-ka-2.28-251.el8_10.2.aarch64.rpm a5104e625f36de73d621beb2de9d5e58d2d2a194568aedb27f8d906c109edb39 glibc-langpack-kab-2.28-251.el8_10.2.aarch64.rpm a7511df59fc93e0b95717bc62cd87003c6f36a6a6f2f4502cfe3c670ffce944d glibc-langpack-kk-2.28-251.el8_10.2.aarch64.rpm f2a507fb11570bfe7b019c12334a9f6e23bb69429625ac04814243f8868bb06f glibc-langpack-kl-2.28-251.el8_10.2.aarch64.rpm ec93226374fbe005f6fd0bb338f003b1ad87a7fa9d1c0140bf48eb6ebabecb2e glibc-langpack-km-2.28-251.el8_10.2.aarch64.rpm 9aeb3a50e36cad7aa186c345ac16905bbe8cf05827c3370f78d199dc8af59239 glibc-langpack-kn-2.28-251.el8_10.2.aarch64.rpm 29ea6d9925d4dd554619ba750c93d145562b9ecbfbc22783b03e769aa572771e glibc-langpack-ko-2.28-251.el8_10.2.aarch64.rpm 52bf5b1029f585380c570175d32590ee948bc804f647aa90be9fd4482a69a698 glibc-langpack-kok-2.28-251.el8_10.2.aarch64.rpm ceced36abc68996173b28302cc07cdc790fc34dfafa1c1ccd5925cdb71e40fd0 glibc-langpack-ks-2.28-251.el8_10.2.aarch64.rpm 95e1798bd4756626358547874c7f92b1df92963b8ee982d2bc11939b043cee45 glibc-langpack-ku-2.28-251.el8_10.2.aarch64.rpm 611a1f5951ca7c750e4a6a1a1383df78bf10c7eba0adcfa65fb4a44225988347 glibc-langpack-kw-2.28-251.el8_10.2.aarch64.rpm 56b6f53de0cc13b9f4aae2f73c0090df0d48f4b95683a4e943feccfd606af578 glibc-langpack-ky-2.28-251.el8_10.2.aarch64.rpm 8976ef39e2f8d7a944a12b9ea5d9e3c9dc89e9ec0764b3a83dbaa83eeb492e57 glibc-langpack-lb-2.28-251.el8_10.2.aarch64.rpm 2b4b291b517d3e5b7fd1c9f0f459066998dfae704796b974e2bda5149488231f glibc-langpack-lg-2.28-251.el8_10.2.aarch64.rpm 74fd503dfd2c58ae6896a8c34ccd7486eff32c3d92ee0ec0912c55cf6ffdd2d3 glibc-langpack-li-2.28-251.el8_10.2.aarch64.rpm 87f7d6ba6f80e8888af590a21fff476026c858505bb994afaf3aadc7d680f0fd glibc-langpack-lij-2.28-251.el8_10.2.aarch64.rpm 58c05b93fedc8351986a9761505c68089de27d2c808b4d49950857001f282bb7 glibc-langpack-ln-2.28-251.el8_10.2.aarch64.rpm 34d42baa6a4f80c51aac5187a862235a65661b50c9291224685d33a840fc63fd glibc-langpack-lo-2.28-251.el8_10.2.aarch64.rpm 5ae0b617df31a779f21e2c3e95bf12b643e718ef0c391cc17ec6f80aae70b302 glibc-langpack-lt-2.28-251.el8_10.2.aarch64.rpm 6ceeee51e41432ca0153fb4f6255fd6fd3b7aad6fed725c48e418715d0dc1b01 glibc-langpack-lv-2.28-251.el8_10.2.aarch64.rpm 0f7f4aaf24cf9b56cd9410a5efc12c1238f168daeff0cb705ba089dcd261a1d4 glibc-langpack-lzh-2.28-251.el8_10.2.aarch64.rpm 793d2f9b1f0693be417e6084f98a8bdcbd0db63339bb8845c0d8b9df61dca77a glibc-langpack-mag-2.28-251.el8_10.2.aarch64.rpm aab7ea570d120b295404486789be663b193986e80bf051deb1f83036a2c4626a glibc-langpack-mai-2.28-251.el8_10.2.aarch64.rpm d3e6a1fabbb321033ba64a40ef50c7cc4dba330cfd2adb561be5495901c53d9f glibc-langpack-mfe-2.28-251.el8_10.2.aarch64.rpm 7673c0d70341b12db34ff23faafa09eaf96d82077e33683725940bdff0b74fee glibc-langpack-mg-2.28-251.el8_10.2.aarch64.rpm d799a75fe732d61f52b002faac526be557e77c9e2410ccf7ac6cbecd3837c269 glibc-langpack-mhr-2.28-251.el8_10.2.aarch64.rpm 9705329ec1b2ef0c404fe4a72087a03cb8e4938ae5d5bdeddea08942286dadf7 glibc-langpack-mi-2.28-251.el8_10.2.aarch64.rpm 0d45f666ede8263f3bd0c3d7d45f26e33d69b41151dbf473a9da6f388fdb6952 glibc-langpack-miq-2.28-251.el8_10.2.aarch64.rpm e8ae170215a7fb9bbdc8131aec96bb9a97d9e100109e1d99bff0ec392f9fb466 glibc-langpack-mjw-2.28-251.el8_10.2.aarch64.rpm 7f8c88cde74f3b8ff944b3aa9b773e692ad5115326c7d2834dfb404ff81c649f glibc-langpack-mk-2.28-251.el8_10.2.aarch64.rpm 5de9a6e1cf4957e62042643d0b815ab513458adce99ed58d7a1a65d7993a76cb glibc-langpack-ml-2.28-251.el8_10.2.aarch64.rpm 5b32b28752928f06920b5b233ff762ec2b75a05c7aefb487aadab793579ac16f glibc-langpack-mn-2.28-251.el8_10.2.aarch64.rpm b1da3f3cb4c8ef61cf2fd4a70d8f3923244b94ac86548460878c86dd758ade90 glibc-langpack-mni-2.28-251.el8_10.2.aarch64.rpm 06decac67589b29b90a964846f7f8c00d0e073ef258eeb239fe2a1878629040c glibc-langpack-mr-2.28-251.el8_10.2.aarch64.rpm 8959e8566eb0132793cbb57b0c182dc192652630d172ccabcf2a4b86edd795d9 glibc-langpack-ms-2.28-251.el8_10.2.aarch64.rpm 7586b78961e4c1b2f29a91353f46a639c8fce3d47252dec281b227312e5049ea glibc-langpack-mt-2.28-251.el8_10.2.aarch64.rpm f31d4d3d5278defad45fc6cb262ce21cbae57df602a4ad95b6cbb8a71cdf9f4b glibc-langpack-my-2.28-251.el8_10.2.aarch64.rpm df05d53dda1efd8797f070411becd587fd936a163f6bde94fbcb336c446e4920 glibc-langpack-nan-2.28-251.el8_10.2.aarch64.rpm e93458e63a427e2cb8e5d91ceb68761622cce95dbf97b6a07275e6ead2ee6806 glibc-langpack-nb-2.28-251.el8_10.2.aarch64.rpm 8328be4603ccb7bc65290c6e1bbc923915463f1f2e8a78c6c98179335bf4673c glibc-langpack-nds-2.28-251.el8_10.2.aarch64.rpm b492154b73a561639bcfe8bb336ac85e7d727bcaaa0f5dc678af641c0abaee06 glibc-langpack-ne-2.28-251.el8_10.2.aarch64.rpm db8b67f409166cdc07c82164fe1adf353f21c28f77c1172eb67282607f8919a2 glibc-langpack-nhn-2.28-251.el8_10.2.aarch64.rpm d0efc9857c917298ddca9af4fac2fb016f60f6107d448abe69d92e9c19419cd6 glibc-langpack-niu-2.28-251.el8_10.2.aarch64.rpm 0c17c6314ad3e641b4e9fe4816a36e1b0a933600b7e5a07ede97f4a87e83642c glibc-langpack-nl-2.28-251.el8_10.2.aarch64.rpm 0d298cfab8c435796470b9e063dae3b2a77d7e98126a7a08544437359ab1d57c glibc-langpack-nn-2.28-251.el8_10.2.aarch64.rpm 89202f7c01d6553724b9b581071fda5e7f38e67a6fea6e4aec1bef3045054ab2 glibc-langpack-nr-2.28-251.el8_10.2.aarch64.rpm 7f15e4b7a369c998b837e782c14ae79ef6f341ef7aece7ddda8f75b57e07b2e6 glibc-langpack-nso-2.28-251.el8_10.2.aarch64.rpm 80f8e57bb9c155669762706af1e1b332e7c77b965da57f2f79931cad6c970845 glibc-langpack-oc-2.28-251.el8_10.2.aarch64.rpm 50cd2e1345c0072052d7f14053256fa9b87161fa8ffaea5aa0f41d59349e3af7 glibc-langpack-om-2.28-251.el8_10.2.aarch64.rpm 4139da0377d453f28b00bfb27835e6524915df48cd609050fa5f83c998513042 glibc-langpack-or-2.28-251.el8_10.2.aarch64.rpm 7c11dbadd1b8e9cf4934217665ecacb130addb57c901c9d9a7bb0ab57533f728 glibc-langpack-os-2.28-251.el8_10.2.aarch64.rpm 03837b9e1beec2bbfb88ef2613a5d58135063de9090154dd300ab39a558c58ee glibc-langpack-pa-2.28-251.el8_10.2.aarch64.rpm 744efc3609951d56cb4beb10fc9cfdecabab0ddd971dcc2e04e16be0a2da2b09 glibc-langpack-pap-2.28-251.el8_10.2.aarch64.rpm bc220743bc79d519a70cc6368129195c99a48906a8f393abf22f39cc295331fd glibc-langpack-pl-2.28-251.el8_10.2.aarch64.rpm 56a06cc77d3e487dae9ab88cd9bcaf66c71aade66f23edc0ffba9c055619f736 glibc-langpack-ps-2.28-251.el8_10.2.aarch64.rpm c6e55032878d3121924949602b61ba58774b163c69f514ed2ee4c21ab634b5a0 glibc-langpack-pt-2.28-251.el8_10.2.aarch64.rpm d8351cb6661f0c258d1e7080db524277633337012323d3bf710a0bb108609e5d glibc-langpack-quz-2.28-251.el8_10.2.aarch64.rpm f9b8bb4f9c974aa338060c60768b24991a93e9d47639e5e19eee8b3373cb6d63 glibc-langpack-raj-2.28-251.el8_10.2.aarch64.rpm 403d5fee68acd1a98a5f564762bba604f7d0400b3a636d6023e6859ecc8f39a4 glibc-langpack-ro-2.28-251.el8_10.2.aarch64.rpm 59d5d7cf94dfa76809b12016bdc1dd0deeaab9141f667330219068af9e485f02 glibc-langpack-ru-2.28-251.el8_10.2.aarch64.rpm 49381e5eb754a5dc117a4898c8b89bce19d0b14c4a5f6fc0ac0be6c07ff28478 glibc-langpack-rw-2.28-251.el8_10.2.aarch64.rpm b5650f27ec25537723af8d94e54117edc230316d3bf22854a126a460b5c700fd glibc-langpack-sa-2.28-251.el8_10.2.aarch64.rpm 4424b0cb6515cbaaeb17683ff7ac377d6cc645832ee2296e269793e10ee43f0a glibc-langpack-sah-2.28-251.el8_10.2.aarch64.rpm 9892a30f78a02e96179226b54cb3d286453a7432fdec7192860a8533c6a0e2a5 glibc-langpack-sat-2.28-251.el8_10.2.aarch64.rpm 9f391db596c3e9ede93e57d7bad6399b38d3cc01296a6f3a66a33baf18923e9e glibc-langpack-sc-2.28-251.el8_10.2.aarch64.rpm 77ea066ca749b2e8a1decffb0bcd56428a8929060e2a8105bec4ef806a1d4f87 glibc-langpack-sd-2.28-251.el8_10.2.aarch64.rpm 47d6d63cb1341d5a5fc37752ca4c43f6a92d77e4f75fcf7a6bebc7d78e4152a0 glibc-langpack-se-2.28-251.el8_10.2.aarch64.rpm a2e041b54772ee75017863980452df0c1e7a5aff38aa33389311ea42b6a48c1f glibc-langpack-sgs-2.28-251.el8_10.2.aarch64.rpm ac4a709b6246adff2ab243c49e8700b4357106a85c5b7c5df8423fd4c107794b glibc-langpack-shn-2.28-251.el8_10.2.aarch64.rpm 74f7c9bcc24c5803840ed2d7035c349b3facc8510ef9dd3da432fa348861a4fa glibc-langpack-shs-2.28-251.el8_10.2.aarch64.rpm 359b71a9e449730df23733f703b8bb270fe7712ce256eb3657f44b842f96f417 glibc-langpack-si-2.28-251.el8_10.2.aarch64.rpm 09ab91f1bd4369d9ee9581e20878951c84433ca29fab90f8e7efdf37ab624209 glibc-langpack-sid-2.28-251.el8_10.2.aarch64.rpm 271648e16236b0f72b6a8f121ae259404368d971cbb6c9ad6162feee40bd301a glibc-langpack-sk-2.28-251.el8_10.2.aarch64.rpm 767ac22d4bf5b1feee0a685b39143ba7223c02ff17b876ba269f9bcde463b902 glibc-langpack-sl-2.28-251.el8_10.2.aarch64.rpm 72b66b33b9be393de4bff05671af84e75bcea1702c26bf527292231fa4a86a8d glibc-langpack-sm-2.28-251.el8_10.2.aarch64.rpm aba916d49424d567ae753cab9512ea7a2411d404557d1cae69822117f7e99973 glibc-langpack-so-2.28-251.el8_10.2.aarch64.rpm 2f83e3480f3ffc7d2d470a5791dd439e8d6ee98b2512efee20f249325d7d5d3b glibc-langpack-sq-2.28-251.el8_10.2.aarch64.rpm fdca1b9118e7f9d1bd61d38c869a00fd3e08f96c2a47a385e6b342fb01f92dee glibc-langpack-sr-2.28-251.el8_10.2.aarch64.rpm cf442e697fcc3c5ac8ee8b81303f74088a8cd38f5f5eb9550f166abc313e7327 glibc-langpack-ss-2.28-251.el8_10.2.aarch64.rpm a4578743534dc3b3255570a902bc069558c5ba78d1d6c8adc7558eecc238bb29 glibc-langpack-st-2.28-251.el8_10.2.aarch64.rpm 119f57eb768493082627d476ae1753c020f20a5581bf5082e4e44c6ac24f7856 glibc-langpack-sv-2.28-251.el8_10.2.aarch64.rpm 4deae2c1d94ee86eedf24b1f83ed70d2b76d0222804615bb75b79ee8b2fb652c glibc-langpack-sw-2.28-251.el8_10.2.aarch64.rpm 98f66c0ecad1639b7efbe52b4009bfcfa0bb5a3c8049a07b2fbe33431239edf9 glibc-langpack-szl-2.28-251.el8_10.2.aarch64.rpm 38e8c98ee77fe7a55ad85cda4358f6d8f2e0a5e2d899614da2cdb4d3e89a6a29 glibc-langpack-ta-2.28-251.el8_10.2.aarch64.rpm 4ec8a9a2a418077208a34bdd0c37cc36eae45af5d91cd403bc32f5cf91a3b477 glibc-langpack-tcy-2.28-251.el8_10.2.aarch64.rpm cbde8ac97f3b47e894847b1f75bb7b65d830bb31b343d3d0a63eee39787fbeaf glibc-langpack-te-2.28-251.el8_10.2.aarch64.rpm 91ef7c62875fe3a2e60f874432b996790567fdeb985c22e84bbbabb99ca14987 glibc-langpack-tg-2.28-251.el8_10.2.aarch64.rpm 6cfcb2ba842958e6af15440909f58278d9120ab9ddc0b93accb8b35671bff5cc glibc-langpack-th-2.28-251.el8_10.2.aarch64.rpm c1fa4edfc79dd8d5c43fc8bd7c0ee7fb1817e0966ca072ddde7bf5feb68c48a2 glibc-langpack-the-2.28-251.el8_10.2.aarch64.rpm fb4ffe73c59365a263c2f5e3824e58cd154bb14007d5ff9aff95a28ae3db5556 glibc-langpack-ti-2.28-251.el8_10.2.aarch64.rpm 10bc1a584d62c739128b56408e959d68a3cd804e456bfe4f98f4578b5e66dec6 glibc-langpack-tig-2.28-251.el8_10.2.aarch64.rpm 8a8ad788e86921f441d2a5447d74db7800aabfeda390f0eddab09fcd8856ac76 glibc-langpack-tk-2.28-251.el8_10.2.aarch64.rpm 7b3f6bb36d3aa06e6af47fb3b1ef77625b19fc2ad0ff19dab5678dd4ebb6d1f0 glibc-langpack-tl-2.28-251.el8_10.2.aarch64.rpm f3c2ec06c717543db7f62737a8cf4f99495314ce963d03d7184fd9ea71aabffa glibc-langpack-tn-2.28-251.el8_10.2.aarch64.rpm faf5e5baff9e695401e8ee2147ac92d0b53a7fb449682e7c06904ee62f3dfbe5 glibc-langpack-to-2.28-251.el8_10.2.aarch64.rpm be2e6f1c52d23ed239c8df1c391ad9de14c7a10e21f2e7fe2670e80105550fb5 glibc-langpack-tpi-2.28-251.el8_10.2.aarch64.rpm 8a8391a3c1dde841182d262cf00837f0284231150d75a08253577b818e1f79fa glibc-langpack-tr-2.28-251.el8_10.2.aarch64.rpm c4ed366308dda16844442368f49af8f5a4b334b53d886e74a9e68c0019dca308 glibc-langpack-ts-2.28-251.el8_10.2.aarch64.rpm dea6bc3a1a78790d3bc4f9329fb724389ea78e69f4fee1bee9fb3ed508225a75 glibc-langpack-tt-2.28-251.el8_10.2.aarch64.rpm 72f0812706b3acbadf0d35561c184827f5db87869918d14531027013a6ad6b0a glibc-langpack-ug-2.28-251.el8_10.2.aarch64.rpm 62f7b56dfe37957bbf342ebb618ab5bf3f3c3b55a6660a2f87d515ec404b45bf glibc-langpack-uk-2.28-251.el8_10.2.aarch64.rpm 1c53e25fb54dc4ab1ab67115f04dd673759855b854dbb0bafbfe03f8d0c25ce9 glibc-langpack-unm-2.28-251.el8_10.2.aarch64.rpm 972c0bd42075b81d360f8d6d4d57e2f55f0ee832e0c8fca929105ea886664ae8 glibc-langpack-ur-2.28-251.el8_10.2.aarch64.rpm 38fe28a53ee1682e664e6331286f03940ed4df9ceaeb08a5571f6cd3eecbc79f glibc-langpack-uz-2.28-251.el8_10.2.aarch64.rpm 3b615a1e9245fde1884aa07d23470b0687eb287d1e981b7f74d60ae30d28529a glibc-langpack-ve-2.28-251.el8_10.2.aarch64.rpm 89aee77d668066fad71f178c59a7288bd2757ac4172259dbef2b412417250e1f glibc-langpack-vi-2.28-251.el8_10.2.aarch64.rpm 213b0ba03ae9acd79c79f28f407e2737f0245a41f06d3467801d94cf366b6e04 glibc-langpack-wa-2.28-251.el8_10.2.aarch64.rpm f211ecc5fb032225ea29c4eb09773f8287a6c303e8882a2a051d702195093571 glibc-langpack-wae-2.28-251.el8_10.2.aarch64.rpm 8fa29d40bb1863f88b032e7ff29b94de76d0a2e7a061564277e29ad51c39a904 glibc-langpack-wal-2.28-251.el8_10.2.aarch64.rpm 5511350e20813e2533d630a539146bc192549dff1e3e8aa2ec7cafde058f7091 glibc-langpack-wo-2.28-251.el8_10.2.aarch64.rpm d7c2dde4aa33e751432c046f9a4f64a081b7211be2e30fafbbe08e93f415fd00 glibc-langpack-xh-2.28-251.el8_10.2.aarch64.rpm d48890498a44b14e4b55cfc404e414fb67f50bc17e1b1b18de5e453f02f12188 glibc-langpack-yi-2.28-251.el8_10.2.aarch64.rpm 6adddda28c63810b4f80d049dba00ed3548c3de685e06792b1975cde1bcd367a glibc-langpack-yo-2.28-251.el8_10.2.aarch64.rpm c3a32cb1dbbffb21f8c74230b35d1361a85b927ebee6540b0abfe13b84849747 glibc-langpack-yue-2.28-251.el8_10.2.aarch64.rpm 875c99501371ddeea4a07d069d2fd67ab51de52615a8dbb8c733233cfb81269d glibc-langpack-yuw-2.28-251.el8_10.2.aarch64.rpm 41037ff0ce13adc5887db53668e458d221b425c4b9bd65ae64d5576e6b8253fe glibc-langpack-zh-2.28-251.el8_10.2.aarch64.rpm 978ce1283eac5d01ff75001472a56eb88dfc10a12ba6980d46d20c22f683a8f7 glibc-langpack-zu-2.28-251.el8_10.2.aarch64.rpm 697140a7f4d7c96ddefd6d028d8d465ba7cebc88c5ed7c21c39b7b5269f2674b glibc-locale-source-2.28-251.el8_10.2.aarch64.rpm 7d899e3728d7c379202abbdafe824d85972ef20783099f9d1e0dde2804c5439d glibc-minimal-langpack-2.28-251.el8_10.2.aarch64.rpm 5906a4b3c4166764a3fb7e9fa09449b625af11a3ecfe0f17d6b0071634f5d632 libnsl-2.28-251.el8_10.2.aarch64.rpm 69119a265e7515f95cdba06747de0448f3f73cc7a9f17c95fd80d62753f0fdcf nscd-2.28-251.el8_10.2.aarch64.rpm ef1b2a7dc6929019735d936e3b70d7492a069a580fbc999aa6eaeb1bd5e9a77f nss_db-2.28-251.el8_10.2.aarch64.rpm fd931e85e0cab317595bbd2a56f8c80ac820ef5e73d58f3750b2e45c958d046a RLBA-2024:3151 acl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for acl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms acl-2.2.53-3.el8.aarch64.rpm 2561677938cb79ad039b79b3ca2ce4bd020a5851a7cb25801666d78a8e00d079 libacl-2.2.53-3.el8.aarch64.rpm a4d711601dbe6f5843b1489042f3b71743b26e7790cdbc654ff7e0abb7d9eb9c libacl-devel-2.2.53-3.el8.aarch64.rpm cd325a1b812f88fa254c0596f147139ef99ecc14a3ef6d91ff4a8011e675be2d RLBA-2024:3150 python-urllib3 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms python3-urllib3-1.24.2-7.el8.noarch.rpm 9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c python3-urllib3-1.24.2-7.el8.noarch.rpm 9b2db8ee6315e4ce5bfa1224dae9cd74ee4807b04b4911368193d3982875fd5c RLBA-2024:3149 autofs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms autofs-5.1.4-113.el8.aarch64.rpm 0f363498c49fc422b692f5430df35bb6be4e79159d95c0b282d5adab2383a260 RLBA-2024:3159 python-linux-procfs bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-linux-procfs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms python3-linux-procfs-0.7.3-1.el8.noarch.rpm c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211 python3-linux-procfs-0.7.3-1.el8.noarch.rpm c726c1c16d23294bcc9d933f2a146650cf699f96d2e78da4a30b24643bbcf211 RLBA-2024:3157 cockpit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms cockpit-310.3-1.el8_10.aarch64.rpm 8b56e6f775d80b6ba614cd41471f77fff626e27ee4481f1efc052abea1cb302f cockpit-bridge-310.3-1.el8_10.aarch64.rpm 2ab0db0171f367e752cced9b43e637b1ef515788f6d599a57df1d8296178f07e cockpit-doc-310.3-1.el8_10.noarch.rpm 09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339 cockpit-doc-310.3-1.el8_10.noarch.rpm 09d0260587da36d67475c95ae593e4eab984d050065fec136f63724601599339 cockpit-system-310.3-1.el8_10.noarch.rpm 39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d cockpit-system-310.3-1.el8_10.noarch.rpm 39da3e77b24c240578a3603b653963535da509fe39873db0dc313ba300eb465d cockpit-ws-310.3-1.el8_10.aarch64.rpm a2ff7692078daf3081db41e8420647b252ee1174a29cc12f9db81001a9a8511a RLBA-2024:3165 cups bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms cups-libs-2.2.6-57.el8.aarch64.rpm d8ddc58078cdc9ef5d08420041578b34790eaaf1c5f61a8562a93fef5b569b97 RLBA-2024:3164 dnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms dnf-4.7.0-20.el8.noarch.rpm fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425 dnf-4.7.0-20.el8.noarch.rpm fa9560a29d68f159a8f9db7fd874c5be638e9a19d83af1dc50c2c49c7895e425 dnf-automatic-4.7.0-20.el8.noarch.rpm 59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6 dnf-automatic-4.7.0-20.el8.noarch.rpm 59a202af22c1d767d75fef1277304393f2bed7134666b6c69eb820579bf830c6 dnf-data-4.7.0-20.el8.noarch.rpm d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f dnf-data-4.7.0-20.el8.noarch.rpm d2c0ba2bdb3d72d558a4467afea5923c27cdcda5b41f0c23e0d3b9a0881a1e7f python3-dnf-4.7.0-20.el8.noarch.rpm 8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a python3-dnf-4.7.0-20.el8.noarch.rpm 8195a2a40afcaef2c3c0d9b288bde41ab71847cc2fe2ba24f113a4ae980ca99a yum-4.7.0-20.el8.noarch.rpm 2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b yum-4.7.0-20.el8.noarch.rpm 2793583cffdb76e783f1f58fc0f6a19469ac49e7e54726240774257df95e745b RLSA-2024:3163 Moderate: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: allowing unprivileged user to block another user namespace (CVE-2024-22365) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms pam-1.3.1-33.el8.aarch64.rpm 50edaf0b25d3037427b348fa841e9fdf1f70b20f14b497b65284a3c6831d9d5b pam-devel-1.3.1-33.el8.aarch64.rpm 11575640b35fe58bdd513a0a85000991d2546ad5845ba530b485fa9b38f7f74d RLBA-2024:3167 rdma-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rdma-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms ibacm-48.0-1.el8.aarch64.rpm 0f4b658acf065a181fbbf7cefed9ed8fd4ae7c3859d0f9e314efad00f21da567 infiniband-diags-48.0-1.el8.aarch64.rpm 57c36276a389721e9ff56c51c87cfe9a57dce9a9a166f03c51609601786bf731 iwpmd-48.0-1.el8.aarch64.rpm fdcbf4751059f2226c42374492be6209d061122151e8f810f1e6e168f6a1d659 libibumad-48.0-1.el8.aarch64.rpm 6cc29431ccd3267a80ea522d0ea8e3a6a8d842be68b5d3078cd4fd932ce233c0 libibverbs-48.0-1.el8.aarch64.rpm d91f8e09930544315e976b8776c9600eb29c690a2f48710798de99e619f712e3 libibverbs-utils-48.0-1.el8.aarch64.rpm f3c1094b629c7784c7e75a9bddac451cc975d4be06bdfc9b49b6398e65c86f84 librdmacm-48.0-1.el8.aarch64.rpm e0eae0b77f99975dc12d290a7a93ccf9284c9cb1cfebbe5013160aed0310525c librdmacm-utils-48.0-1.el8.aarch64.rpm 672968bbce067348c1f4bbda29ef6f29b5f8609b246334064e6de33b2e350b1b python3-pyverbs-48.0-1.el8.aarch64.rpm 08b028c72a2e895583d3c9ac572cd8b01674621d28c864f411d9e94136164238 rdma-core-48.0-1.el8.aarch64.rpm b0527830b8a37606dd08c7088556f39446c8780cd9fe3fb3198835d335e4ed1f rdma-core-devel-48.0-1.el8.aarch64.rpm 93d2f10e39f7c86c013db9c1e6401681380e7e59f2044e396c0cc55b36ecc7d3 srp_daemon-48.0-1.el8.aarch64.rpm f49565fcdcc8a364bec72d766e3199cfbbd147bd61663d46d3a261d70c8703ef RLBA-2024:3169 dnf-plugins-core bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf-plugins-core. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms dnf-plugins-core-4.0.21-25.el8.noarch.rpm 069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4 dnf-plugins-core-4.0.21-25.el8.noarch.rpm 069c1e02fbed2d9fdee08d1b9bfb09f590d27b88da3b273f33cd9314a7f803a4 python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm 8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399 python3-dnf-plugin-post-transaction-actions-4.0.21-25.el8.noarch.rpm 8e9283d4362cea2328da7f8e203a93ca9adf6df29da1ee210c573439b4ecb399 python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm 236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9 python3-dnf-plugins-core-4.0.21-25.el8.noarch.rpm 236c8eff4747c7391433cc2a447ac03ea95c39307de117a45a4d7bba298a20a9 python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm 5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77 python3-dnf-plugin-versionlock-4.0.21-25.el8.noarch.rpm 5c5078cbf684d477d9b77e31b8bc227d14f3b2fbc6a8b591ba72a7f8681e2e77 yum-utils-4.0.21-25.el8.noarch.rpm 7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac yum-utils-4.0.21-25.el8.noarch.rpm 7ccf9325c27dcbb50eba6ebeada3bef286c402e7edc866d73933099fb50fddac RLEA-2024:3168 libkcapi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libkcapi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libkcapi-1.4.0-2.el8.aarch64.rpm cd9a90549e907fdfd6b8d6be0e122a47e8f60da0780fccc46ea9a365e17f985a libkcapi-hmaccalc-1.4.0-2.el8.aarch64.rpm e98a4cd5f3163b809ea2a5dee709597babe337efae0152060b697d1a4ca1a8b3 RLBA-2024:3173 audit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for audit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms audispd-plugins-3.1.2-1.el8.aarch64.rpm 7cd59dcc357641602b7f87bd298c2de2a5ef596c054b9890329b511251e93d62 audispd-plugins-zos-3.1.2-1.el8.aarch64.rpm 4b082b6c49bfe7bf770256935ca5e0c3160b12e6374c910e7dd752b9851ab9b1 audit-3.1.2-1.el8.aarch64.rpm e127b74898f65a21dbde27b89e995fa0eb73d0249d861e5743f818975d57890d audit-libs-3.1.2-1.el8.aarch64.rpm 87c7db72be329e1c16bfec866d3390c8977093dc0f0831abcf208d2d19f5a55d audit-libs-devel-3.1.2-1.el8.aarch64.rpm 7ecb520d2ef6f5c1b8d3ab4257d631a6e16195204e78e7f30777804bf1b18ec5 python3-audit-3.1.2-1.el8.aarch64.rpm fdabba1276621ff7047b695000b7ae8676beb3bf78c822f0ff42b739ac32c2b4 RLBA-2024:3171 mdadm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms mdadm-4.2-14.el8_10.aarch64.rpm 2698814509a04514163f0cad08d2e7de18905ed40c8fe7c5f0bdcfd92b3607ce RLBA-2024:3177 numad bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for numad. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms numad-0.5-27.20150602git.el8.aarch64.rpm 5d090fd081a97140091a0b7597527b6c9fabcb3d64d97c361b9db5b9022f281e RLBA-2024:3174 findutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms findutils-4.6.0-22.el8.aarch64.rpm 016a49180cbde3c1d9f4139695f475f5325ef6bd92689ccf9cb7f1a4ccb8b780 RLBA-2024:3179 avahi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms avahi-0.7-27.el8.aarch64.rpm da091ceb0c63a13a40769823527960f8d9e78d218fcb27951c0734d121e82549 avahi-autoipd-0.7-27.el8.aarch64.rpm e01b38b9c1474680b81a9ecfb8180087cf9559670d883ec7497f3a5cd4f2f180 avahi-glib-0.7-27.el8.aarch64.rpm 4a64e8ceee72cf76deae2689c77d575aa359d971a74484d6474293b1c97a1710 avahi-gobject-0.7-27.el8.aarch64.rpm d0c3bd0ae4282963dd9177cf621baec7bd50e0aea1d7b5572b34c5a9940413c6 avahi-libs-0.7-27.el8.aarch64.rpm 5148867d1db21fc862765ef66b544ce688cb1ab8c014b91d5ae52cad8885117a python3-avahi-0.7-27.el8.aarch64.rpm ee8ee8459ea6952ba0f4a21c39e2d54fdcf7c9367a18d1f148f8ce5df500ec27 RLBA-2024:3182 smartmontools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smartmontools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms smartmontools-7.1-3.el8.aarch64.rpm e34767cfc80303962b1c364e2bff54a1e16fa522fc376188069af943e53531d4 RLBA-2024:3180 dracut bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dracut. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms dracut-049-233.git20240115.el8.aarch64.rpm 9dfc8a87138f391627cf0962caef9e3a7660608fbf2b4e6bb45d0cc1fc4cb56c dracut-caps-049-233.git20240115.el8.aarch64.rpm 8570c3804c2b544a6df875723cec034278fa0ff77afc6900c2568fb75e99cf63 dracut-config-generic-049-233.git20240115.el8.aarch64.rpm 90636b57ec9d037a51c130df707a88fdf6df0695bc14bc2497db3de23265fda4 dracut-config-rescue-049-233.git20240115.el8.aarch64.rpm cc1e6758bf8897cb40127f9c9469250cc81b830b8f2a2540422ab9bd66804bc8 dracut-live-049-233.git20240115.el8.aarch64.rpm 09cd641a25263832ca6eb606bd52c1450591434ec1068b6c523e7313bc507c6d dracut-network-049-233.git20240115.el8.aarch64.rpm 73771bcc4a0ecf872d22852c5de6bbbc26edec1c995439b60dca19f28123b974 dracut-squash-049-233.git20240115.el8.aarch64.rpm 06b437952b416ca8737c2acb63a664d8af20652e772aef33e1e32a52f25b2c46 dracut-tools-049-233.git20240115.el8.aarch64.rpm 0b7cb8d75b45d4c9e8b6134420ab959ef919c9fed51f9a72a135c064a83f2731 RLBA-2024:3181 tpm2-tss bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tpm2-tss. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms tpm2-tss-2.3.2-6.el8.aarch64.rpm 21d66c5f56a29c1084b85bd27745956cec66aa50e13137c036872c98dfc31d44 tpm2-tss-devel-2.3.2-6.el8.aarch64.rpm ec2b8607e46e6f057e08e58c450e4ae9584277154bb42d72615e6459ae1599d2 RLBA-2024:3186 libldb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms ldb-tools-2.8.0-0.el8.aarch64.rpm 4e1f87cbc511a959665aca2126f99d07ca4e54409f70cc39cccaa370be48db90 libldb-2.8.0-0.el8.aarch64.rpm 36c2460f7430ce463b5db031c5f22107120fe9eb92c6d27ad97613a4100233e2 libldb-devel-2.8.0-0.el8.aarch64.rpm 5d66bb265c3b75ebe798df0513672b630fe1364f2d26b491da9987b8e8f7eaa8 python3-ldb-2.8.0-0.el8.aarch64.rpm 035e27552a4ffa7a179d255c166a59b665654708d09f9d625df742e3e94f47c1 RLSA-2024:3184 Moderate: grub2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Security Fix(es): * grub2: grub2-set-bootflag can be abused by local (pseudo-)users (CVE-2024-1048) * grub2: Out-of-bounds write at fs/ntfs.c may lead to unsigned code execution (CVE-2023-4692) * grub2: out-of-bounds read at fs/ntfs.c (CVE-2023-4693) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm 8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c grub2-common-2.02-156.el8.rocky.0.1.noarch.rpm 8672438a84f9c0ea80fa80d375557bd1965460bfc0e24f4ab27705f85b4f467c grub2-efi-aa64-2.02-156.el8.rocky.0.1.aarch64.rpm 6758f0c2684798ebc8616f2a86276e5f40f83fc586578ca61865d1596455d2aa grub2-efi-aa64-cdboot-2.02-156.el8.rocky.0.1.aarch64.rpm a73d3861e9af042cd8149df90efa5c3229e638de4cde70323231c2f79fd332d5 grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0 grub2-efi-aa64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 21a7a7b661d4f5176b5ddb73a171660a0b90f741ba19e5a986864b5d697623b0 grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm 6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003 grub2-efi-ia32-modules-2.02-156.el8.rocky.0.1.noarch.rpm 6a055a026ac4cf272378b45157641031445cc6c7008eb177a1e9bf1e4e188003 grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d grub2-efi-x64-modules-2.02-156.el8.rocky.0.1.noarch.rpm 27b17a886367eed378864d93b9e159725162596131c95d588196e86ad37e301d grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781 grub2-pc-modules-2.02-156.el8.rocky.0.1.noarch.rpm c376d6bd24f24eb4869a4305c6ab2ef98a59f352996d45357cac4b2a1b7e2781 grub2-tools-2.02-156.el8.rocky.0.1.aarch64.rpm f5e2a88e1780e094c7478fb4440db28587ce7d732a9ddf6c859b3d6de664d14e grub2-tools-extra-2.02-156.el8.rocky.0.1.aarch64.rpm 4e47a6e55a6db047843bf216a8948370c7e730723e5f6f3fcbae65cdd9a313e2 grub2-tools-minimal-2.02-156.el8.rocky.0.1.aarch64.rpm 6b0d6928f3bc6e44ad3a40ad0516e5b39c5642429550c0272c41d256b116cf4f RLBA-2024:3187 libtevent bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtevent. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libtevent-0.16.0-0.el8.aarch64.rpm 2d24e4ae3b3ea3c106e02878bdce38800f4383371259bd2d96105937e5e9a94b libtevent-devel-0.16.0-0.el8.aarch64.rpm c7b24a4c54643e466ea485bf6e48297465680d78930b1ddcd2ea191dfe537eac python3-tevent-0.16.0-0.el8.aarch64.rpm 7725e1283eece34fc10fe379de33e1e9f3e5951f8958b13026a9cdaf40de8fa9 RLBA-2024:3190 trousers bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for trousers. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms trousers-0.3.15-2.el8.aarch64.rpm ef47a940221e11746a7fe4929b1c0f14e3a947be79cf8367d91911894a61bbd6 trousers-lib-0.3.15-2.el8.aarch64.rpm 6c020786b2fbc25e0396f21c8cc8799560a02008072f7a50d175ede78a81352f RLBA-2024:3197 librepo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librepo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms librepo-1.14.2-5.el8.aarch64.rpm 2b4029162e8b0867c767ef6477ff0cb7633d927d6d939fd56f886aa226028d38 python3-librepo-1.14.2-5.el8.aarch64.rpm 88e8b69d28545d5e300e900a0f8dcc5c3ac8bbefc4563380c70df358fb650545 RLBA-2024:3195 subscription-manager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for subscription-manager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms dnf-plugin-subscription-manager-1.28.42-1.el8.rocky.0.2.aarch64.rpm 460d1b1c586ed06143537140dbe1d442a78767e9c412e8b3c097a80407ad32f2 python3-cloud-what-1.28.42-1.el8.rocky.0.2.aarch64.rpm 5ae8b57dfb4b0daa2efe248a0a23ead28bfda3b9972e6abd8df10606f258e1ce python3-subscription-manager-rhsm-1.28.42-1.el8.rocky.0.2.aarch64.rpm 641e7be3d8f16bb1a288877d838a3ec16818a21f30a2ad53ac1b8b9575220d79 python3-syspurpose-1.28.42-1.el8.rocky.0.2.aarch64.rpm e8bc625d6aeb80c6fa2829f09cacef7e20972223b705c10191d137f0fdfd0011 rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d rhsm-icons-1.28.42-1.el8.rocky.0.2.noarch.rpm d65e834f65e012f7d86c832024ad0aed7f47cf0d1fa8f17cfdf08d33c986b76d subscription-manager-1.28.42-1.el8.rocky.0.2.aarch64.rpm 22b8c0b1d439c4d6390327b14ebe863c3843a8f6a82112505ce17181e354d266 subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm 65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2 subscription-manager-cockpit-1.28.42-1.el8.rocky.0.2.noarch.rpm 65db90606dffb188dec079966e58bd4d21a51a41852008b594d0f79b84e0a4a2 subscription-manager-plugin-ostree-1.28.42-1.el8.rocky.0.2.aarch64.rpm 0b5bafd9ede2f1657463b951d91d54ea0bb95cf7009a348cb3c91730073e8b8e RLBA-2024:3198 shared-mime-info bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shared-mime-info. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms shared-mime-info-1.9-4.el8.aarch64.rpm 1fc60f66edf30bdff5ca0b5c9502339843cf051e83fa5b39cb79b161f341db76 RLBA-2024:3200 smc-tools bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for smc-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms smc-tools-1.8.3-1.el8.aarch64.rpm 3ba3db8ebae771c5dfb4247ab89b94439a645f2395bf91cc8777fcbcefce427c RLBA-2024:3199 opencryptoki bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for opencryptoki. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms opencryptoki-3.22.0-3.el8.aarch64.rpm 5f062bbf6b372cf9a05330c8e72352b4f62a9a4b4ab9ada2773779ffe17e0705 opencryptoki-icsftok-3.22.0-3.el8.aarch64.rpm 8aa8ec31e2b7195c597bd17d4a1e4bf317d41e0eba14a5e2e755c73cb59cb3b8 opencryptoki-libs-3.22.0-3.el8.aarch64.rpm aae9a1d8008835420540389a2f9bc3277e18d81480da720656172330dff4990e opencryptoki-swtok-3.22.0-3.el8.aarch64.rpm 0ae156fe9d5e2e6fd26fffaa4ec153585e65df4b65b146c2126fe50c389d9936 opencryptoki-tpmtok-3.22.0-3.el8.aarch64.rpm 06b734ff8a8bdacbe29535a1f737ff1d18473e94384c4996016321a97ba2cc14 RLBA-2024:3205 iotop bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iotop. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms iotop-0.6-18.el8.noarch.rpm 6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010 iotop-0.6-18.el8.noarch.rpm 6b9def672669de10601625eefd3fb0277e1f327e33a12a85bd06881129081010 RLBA-2024:3206 perl-HTTP-Tiny bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perl-HTTP-Tiny. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms perl-HTTP-Tiny-0.074-3.el8.noarch.rpm ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f perl-HTTP-Tiny-0.074-3.el8.noarch.rpm ce9e9ec3f33a863a4821fb6fdc872c1cef1f1fae0b63ded1bee3ea25bdd25e7f RLSA-2024:3211 Moderate: traceroute security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for traceroute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Security Fix(es): * traceroute: improper command line parsing (CVE-2023-46316) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms traceroute-2.1.0-8.el8.aarch64.rpm 5c351d83662dadba8bc2f7ad29b6343467de54223d17dbe5fc35c6ba96852185 RLEA-2024:3209 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms tzdata-2024a-1.el8.noarch.rpm cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066 tzdata-2024a-1.el8.noarch.rpm cce3fd2ca0fc64023c22f9a242d92bbfe3685429daa64b0ce7956de025dde066 RLBA-2024:3216 net-snmp bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms net-snmp-libs-5.8-30.el8.aarch64.rpm 846ff7923515ac9ce7022828c6fd044c6b25ec5d682c1d78e7fdc97c6beb04d6 RLBA-2024:3220 python-pip bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for python-pip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm 48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6 platform-python-pip-9.0.3-24.el8.rocky.0.noarch.rpm 48027ea5f805c0edb218fe0f241d2b0c34e9f1be8e828997516766dbfe7f96e6 python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0 python3-pip-wheel-9.0.3-24.el8.rocky.0.noarch.rpm ccc41a042fbfc423e7cac48dbf161f94d6da6196e1770d2e6bb00232bdfef2c0 RLBA-2024:3225 sgpio bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sgpio. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms sgpio-1.2.0.10-23.el8.aarch64.rpm 1d38d4f237a2cae3b9e5106896fc78aa7664a7c8a76b3fa6ff059860370c4b6f RLBA-2024:3223 fuse bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for fuse. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms fuse-2.9.7-19.el8.aarch64.rpm 9a1c5903769a267d90638eeb820f4354008acf220428397d90f61a00faf5ee17 fuse3-3.3.0-19.el8.aarch64.rpm b3dc2aad9650cbb7142f5c2064c6e3b6afef6aaf309f49e2568805b0e75c16b0 fuse3-devel-3.3.0-19.el8.aarch64.rpm 145fda41dba97b7dd6bdaa42c512c8860b75ba2aa38caa05e8095fc430141cfa fuse3-libs-3.3.0-19.el8.aarch64.rpm 183c91382174c419103a12a4f3d877a56ff8523f36600ed71da31025ce67a990 fuse-common-3.3.0-19.el8.aarch64.rpm 1a582aff5e2210d244049841d8ae008e998e3e01efee63f5a1720194460e330c fuse-devel-2.9.7-19.el8.aarch64.rpm 4a758893334f02c4043a4fd013ea0ebfcba8aefa99af0c8fa8bf20045c5020f0 fuse-libs-2.9.7-19.el8.aarch64.rpm 16d9255bbd24b36de41f59871e27d006c1e31e64b869951ccb1288f0fc83dceb RLBA-2024:3221 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms tuned-2.22.1-4.el8_10.noarch.rpm 98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785 tuned-2.22.1-4.el8_10.noarch.rpm 98d42bb16c8dd7ebc21b8b2619c6de04db2ef88b8308c6cbc61d5be4138e7785 tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b tuned-profiles-atomic-2.22.1-4.el8_10.noarch.rpm ce9584475dd7a313f00d838b5f680bf9107b4315336d87af55f2760091a5430b tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c tuned-profiles-compat-2.22.1-4.el8_10.noarch.rpm b0f063d48939f443ec742495e02a9b975fd37fa20245f2c2ee19441b9935508c tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm 549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.noarch.rpm 549ab06fd76f805bdcc0f610f089c47e04db2413433309be863bd25da4ffeafd tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm 6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc tuned-profiles-mssql-2.22.1-4.el8_10.noarch.rpm 6a4de3754851d2f7503d683655933e59b541b97c01ac98de306c7959477137dc tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm 534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459 tuned-profiles-oracle-2.22.1-4.el8_10.noarch.rpm 534208b9e8f20cff79150b8a9895af71b1c3414847d02970062037baf3235459 RLBA-2024:3231 realmd bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for realmd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms realmd-0.17.1-2.el8.aarch64.rpm 3e2d7c5477543fb92019af3323912a8e514287482fb8fa9e5c249edc4541e886 RLBA-2024:3230 file bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for file. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms file-5.33-26.el8.aarch64.rpm 80bd8ecd944ae5c701cd42f6815a721b2f90b848d2a3ca49a35e11424737eaa1 file-libs-5.33-26.el8.aarch64.rpm f92ff5de64a0a69347c18c1b56973f148c78b43fcd2665ec9fad75e146ca2365 python3-magic-5.33-26.el8.noarch.rpm 83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0 python3-magic-5.33-26.el8.noarch.rpm 83c0b04c8f15ca79012c86a0915dcf0fc5026dc22bebe3de26806cf614fdfbe0 RLBA-2024:3237 bash bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for bash. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms bash-4.4.20-5.el8.aarch64.rpm fb5045660e17e456eca1fc60bfefb9a972ca5fe99f1de148d07f4af3e928bdd2 bash-doc-4.4.20-5.el8.aarch64.rpm 2f9027e1b4543fb90d254d25cbfa6ceea2e28cc6cf546b22a3b9f3cbabe5c499 RLBA-2024:3236 expat bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms expat-2.2.5-13.el8_10.aarch64.rpm a17915bc98a8294d8fff0eaa9837c9a7dc168090cff42c2d2860770fde9fcf0c expat-devel-2.2.5-13.el8_10.aarch64.rpm aa08ccf885294b2c90b08fe23744eb6f3dbe1de65bd8ebd4f09386ceef3e4c4d RLSA-2024:3233 Low: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname (CVE-2023-6004) * libssh: Missing checks for return values for digests (CVE-2023-6918) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libssh-0.9.6-14.el8.aarch64.rpm f3a23c342af43593ae4b7b2e97d36801e923ddf29d90d14394ab14219d91d4db libssh-config-0.9.6-14.el8.noarch.rpm 802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5 libssh-config-0.9.6-14.el8.noarch.rpm 802ffb16ca31193afc400d9f057f8bcb04224a85a3452fd878cb4a088823dfe5 RLBA-2024:3232 freeipmi bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for freeipmi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms freeipmi-1.6.14-2.el8.aarch64.rpm 656a04207a51363cea4ce6b281cde9126616207a7873f91bf08c34804f1cf046 freeipmi-bmc-watchdog-1.6.14-2.el8.aarch64.rpm e8cc261878ec9f51217b2fb95df9ec5f651ae07cd02954beacafbaad6b3e0595 freeipmi-ipmidetectd-1.6.14-2.el8.aarch64.rpm 0d526e2d14dfdf98394fb55dec700eb4f6d5fb0ea8e3a1e4c95c0194bc3f75c1 freeipmi-ipmiseld-1.6.14-2.el8.aarch64.rpm 7b2271979c1cb27dafd69da6442072ad66531c350235c64da9baa32ad40a85b2 RLEA-2024:3235 iproute bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for iproute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms iproute-6.2.0-6.el8_10.aarch64.rpm b7e26855cc564c1fd84a31e6d95b2459eabef417dde953e880c5b2cf3ca64ead iproute-tc-6.2.0-6.el8_10.aarch64.rpm 7d8c0fa06a8a9fd8a6c76b466a7cbc1956e12fb6180589fc31d6a4b9e69387d4 RLSA-2024:3268 Low: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c (CVE-2024-26458) * krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (CVE-2024-26461) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-27.el8_10.aarch64.rpm 78bab143d32f0c8a62f36ef4b432410dc0f6841dd3f2bc3aa122a6f9d9ac4d58 krb5-libs-1.18.2-27.el8_10.aarch64.rpm 65a921998e5fef8b788d80d897987d773adab4cee62a49a2f23cc126246c873b krb5-pkinit-1.18.2-27.el8_10.aarch64.rpm e3dab5b985439f828ed055d124bba144a5a7312a5a0706cfea694b5fc407c2eb krb5-server-1.18.2-27.el8_10.aarch64.rpm 5a763065532dc1adb64a317f98519e3a33bb60951d851e96c5cd0fd950a06684 krb5-server-ldap-1.18.2-27.el8_10.aarch64.rpm c2eadd7f7036d43fd14d0282e94cb7fb3b29cbdfbc588b375571ab41cbed3fda krb5-workstation-1.18.2-27.el8_10.aarch64.rpm de9788bf155fef5dff43286fff3d3da0f57550b002ff7d34b25a92f4f7e12d6c libkadm5-1.18.2-27.el8_10.aarch64.rpm f73a48d1f2e3219ff43a753dbaa66abb228941687475f9b0b5bc60d01a24d67e RLSA-2024:3270 Moderate: sssd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libipa_hbac-2.9.4-3.el8_10.aarch64.rpm e3fedd1c23060707600ea115c541592721bacaab96df6872d5af080d13fab777 libsss_autofs-2.9.4-3.el8_10.aarch64.rpm 68e881968f1ea83c823a5ce3161b102216d5dc478fe6ab45bab6156ccf83897a libsss_certmap-2.9.4-3.el8_10.aarch64.rpm eeca69d9401909b4237c61ac19478edc28cbdea7073bbe1c7069d0733666e552 libsss_idmap-2.9.4-3.el8_10.aarch64.rpm 2f70299972537c4bb04233968bac9efc3d54deeb284498fcd06f2b83f55189d7 libsss_nss_idmap-2.9.4-3.el8_10.aarch64.rpm 873f9351f5be7eff444d51a12c4f4eedbd142105bc31ced496640f9b7b679d2d libsss_simpleifp-2.9.4-3.el8_10.aarch64.rpm 951863e5c5c1d331368a07daf8b4ff641b0d0a3a756d4f31f2769218ce39ebac libsss_sudo-2.9.4-3.el8_10.aarch64.rpm b0b14ed2bcc53428a2d2c57cea8bc0d7516af639598a92fd893588305650973c python3-libipa_hbac-2.9.4-3.el8_10.aarch64.rpm 11770489e7ae842baca1fe5dc5bd3105f9d0160d6c531ee9fc5ca74d27f89c6b python3-libsss_nss_idmap-2.9.4-3.el8_10.aarch64.rpm 183dd22c7d7c374347b63c1c1dd9c91e4b0bb7710f119b7de3fd4bcf2f0e2a16 python3-sss-2.9.4-3.el8_10.aarch64.rpm aa54a93ca25e5a2ac81f0418e6a77adb21cc4bc67dea2bd76a8d7ecb43341f87 python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15 python3-sssdconfig-2.9.4-3.el8_10.noarch.rpm f298ff9bf27268b86d01be28afeafd0ebc50b830ea4f338f8c222950c7feae15 python3-sss-murmur-2.9.4-3.el8_10.aarch64.rpm 9dc02b4e3b4c1df422bb3df7955af6bb9eda3007f4713f4223a9291564b6c148 sssd-2.9.4-3.el8_10.aarch64.rpm 18c3385408bfd67af2c73508df7e13b3e13abcd0226e30d7555b6154cc594ee9 sssd-ad-2.9.4-3.el8_10.aarch64.rpm d3192f762aae0e7d793f19d9abe3e64dd996a872b7f0e80b176d7238763d16c7 sssd-client-2.9.4-3.el8_10.aarch64.rpm 85e3bcdc5dba3b3a64395d8d0cd7773a082c1c4417860023ddab195a0bee99f7 sssd-common-2.9.4-3.el8_10.aarch64.rpm 66f1172192e4c4f610fd65dc37ff7f5e3cbbd01ed43b5be2fafb5bf380ca0c69 sssd-common-pac-2.9.4-3.el8_10.aarch64.rpm 5c08bea97b0ee66b70b6d0dac307aa534db039da78355ee10528d4d0f5cfeb5e sssd-dbus-2.9.4-3.el8_10.aarch64.rpm d33f8438da1aac4467636ac3faaeaabdfdfb4fcedbdce4674b1c10ba5587d114 sssd-ipa-2.9.4-3.el8_10.aarch64.rpm 8e6eb7eaed37cb908626ad2b282fca91a155d2bca1a363701f98129a963b51d5 sssd-kcm-2.9.4-3.el8_10.aarch64.rpm 95dd27ce9eb986c5a6e14da8c42aa80c24ecf1b65051f78ebeda7159d7aac72a sssd-krb5-2.9.4-3.el8_10.aarch64.rpm af0a75d808a45f0f9487cc2cab27c8ffc2babfea539e03b1207db3dfc2ed2056 sssd-krb5-common-2.9.4-3.el8_10.aarch64.rpm bca45c229afc842ebf6b00fd2e8f24edf88ed1c4d8261822b5357c6129cead9f sssd-ldap-2.9.4-3.el8_10.aarch64.rpm cae5b371848e6c5b14db1cc6d685c9144be42efe17f9f6a9ff14ef253c4a7bf1 sssd-nfs-idmap-2.9.4-3.el8_10.aarch64.rpm e29f254797115f389730c07f4b62fe3e3e9a90199706003f391a913fe1915641 sssd-polkit-rules-2.9.4-3.el8_10.aarch64.rpm 790d53e9d8b0a3832db6ce091db081867c61469f156a5f7f1611012f57a9aee3 sssd-proxy-2.9.4-3.el8_10.aarch64.rpm 1bf53673a570d309bd19bd617228dab1402ede4d321209a1b81ea19dfd9ddd15 sssd-tools-2.9.4-3.el8_10.aarch64.rpm 715c8d54ec202b284104f93abfe5b50d2e9430973e983a3badd8a7af257c9556 sssd-winbind-idmap-2.9.4-3.el8_10.aarch64.rpm 2a593cd842d1d675bb8afd1c7d4eb5f8bf8ac96cf47330853b0216a4a56d1be9 RLSA-2024:3271 Important: bind and dhcp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for dhcp, bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Security Fix(es): * bind9: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408) * bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) Bug Fix: * dhcp rebuilt after API change of bind-export-libs For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.36-14.el8_10.aarch64.rpm 7d87c6048aa24982cc5684d0b19e1f8e25d4d77b4dcd999cf5217939b7202c01 bind-export-libs-9.11.36-14.el8_10.aarch64.rpm d6879eba2b77ba29a341195b1b3b9a30af06d8b1179da2cbb13e01d5e6945683 dhcp-client-4.3.6-50.el8_10.aarch64.rpm 2a678a9b73ad06489bcca1b64704fa7ca67e7a3a5669e97184a672c4290068ac dhcp-common-4.3.6-50.el8_10.noarch.rpm 8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2 dhcp-common-4.3.6-50.el8_10.noarch.rpm 8c253b3afeaff236bdb93edc0a90444a1c27ad8c2bf70b950edacc1a0fdd2ed2 dhcp-libs-4.3.6-50.el8_10.aarch64.rpm 15de93baa756a305dfbd82150609941e3fdb2b94c67520e48a33155ac14a87ed dhcp-relay-4.3.6-50.el8_10.aarch64.rpm cf3c127fd0d157e5a5257cb44fb69d51b60286e30e452728880e49e3ea6a83dd dhcp-server-4.3.6-50.el8_10.aarch64.rpm 5bc36502471ad730e76dc88cae26a5b34bd36ad1bdb99c03776e7a91f9370f47 RLBA-2024:3272 gcc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * Rocky Linux8.9 - Internal compiler error compiling small testcase [rhel-8.10.z] (JIRA:Rocky Linux-33426) none-baseos-rpms libasan-8.5.0-22.el8_10.aarch64.rpm 52f93f97e9184b351b92f12815b46ad29fed7b4706243a0e903fb528fd96d09f libatomic-8.5.0-22.el8_10.aarch64.rpm 63c02fe9150287435ac1d3beefd006b5f16d5cbe8c31981d60f673fa77c86840 libatomic-static-8.5.0-22.el8_10.aarch64.rpm de56193372fd59a85bff7924716f44438b99ede5074c9000a08058eff05ad17f libgcc-8.5.0-22.el8_10.aarch64.rpm 651343d3df1f682991ca734f55e1cf85e114d145b984129c525c9cd2c80500a3 libgfortran-8.5.0-22.el8_10.aarch64.rpm bd5184199a58a335e2e56738b9aba227d280e74d461f3c7e70d2124ba210a6f6 libgomp-8.5.0-22.el8_10.aarch64.rpm 651edae6bccbe78687e665de3d7834caaa826b78165dd2660036408d3ebb0a66 libitm-8.5.0-22.el8_10.aarch64.rpm 5ce1d476b564a22bef7cd5dacc7b7af0267f334d6a831ead4990df55e8290edf liblsan-8.5.0-22.el8_10.aarch64.rpm 1e9a74758219c244270c5740298271a814b9f37d649937276ebcfe736f050520 libstdc++-8.5.0-22.el8_10.aarch64.rpm 02100299337b564c449b3d5a48308c4bbb5aa88752197e70aa5f54f4a79e2ea5 libtsan-8.5.0-22.el8_10.aarch64.rpm 7cc6196cba02192634eadfba83dddf2deb55bd01e46d92739e7eb9d0012c810f libubsan-8.5.0-22.el8_10.aarch64.rpm 99b5b569e50f0a4175ed1f8cdbcecd8baa6cb3b4e3e7afc4dcaa59bf7283dda6 RLBA-2024:3274 sos update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Please update none-baseos-rpms sos-4.7.1-2.el8_10.noarch.rpm abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197 sos-4.7.1-2.el8_10.noarch.rpm abd068e760a11dfa4968b09a736df74a1a67510cb8190dde5dad95474f021197 sos-audit-4.7.1-2.el8_10.noarch.rpm bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7 sos-audit-4.7.1-2.el8_10.noarch.rpm bd4ed92df408c921494faacbcbe20eab0af05319266eeea393440ec623e767d7 RLSA-2024:3275 Moderate: python-dns security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-dns. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-dns package contains the dnslib module that implements a DNS client and additional modules that define certain symbolic constants used by DNS, such as dnstype, dnsclass and dnsopcode. Security Fix(es): * dnspython: denial of service in stub resolver (CVE-2023-29483) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-dns-1.15.0-12.el8_10.noarch.rpm 952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8 python3-dns-1.15.0-12.el8_10.noarch.rpm 952b915ac9bf76ace65688631e26438c6d7fde8ea327b12aa7aebdf3ca6767b8 RLSA-2024:3341 Moderate: gdk-pixbuf2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk-pixbuf2: heap memory corruption on gdk-pixbuf (CVE-2022-48622) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gdk-pixbuf2-2.36.12-6.el8_10.aarch64.rpm e038ad13018f8a31c32290e5922f26c192f832e677f7c72f05e1642908cc8030 RLSA-2024:3344 Important: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion (CVE-2024-33600) * glibc: netgroup cache may terminate daemon on memory allocation failure (CVE-2024-33601) * glibc: netgroup cache assumes NSS callback uses in-buffer strings (CVE-2024-33602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-251.el8_10.2.aarch64.rpm 6a413ed2317b51ff6622ca7ddee28134c71f444f36652a532f3e59ee881c136c glibc-all-langpacks-2.28-251.el8_10.2.aarch64.rpm e9d0f115b2399050db194270ededa117a363a92696cefe033dfe2507fda20d95 glibc-common-2.28-251.el8_10.2.aarch64.rpm 5b3f49e5075a456fef06cceea69e0fba3f0f29e6515e96d570dd5fed5bf50fe7 glibc-devel-2.28-251.el8_10.2.aarch64.rpm 976059c5e325c19b1be410a1838ad7f063dc12dab1a8b9ecf08cd0f2970791c4 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-doc-2.28-251.el8_10.2.noarch.rpm 8071a0f2c4763b65e7e8a1fc6549a1434184ec25488eb6813fa1ee09cd3e6d53 glibc-gconv-extra-2.28-251.el8_10.2.aarch64.rpm e6aa94ae49e7ed1f2d7b1d7dd4538dc5271bbc9126888c63acdb00415fc0ad85 glibc-headers-2.28-251.el8_10.2.aarch64.rpm ea7c046ba7541c00b12185278c0c2b46735abf4ca5352a8f7480661d8843af5d glibc-langpack-aa-2.28-251.el8_10.2.aarch64.rpm 1706c598222eb1233aa3ae9afa86835cdc274593ab4b6b521d658d27e11134fa glibc-langpack-af-2.28-251.el8_10.2.aarch64.rpm 37ef5e44687cc3815672c42f0448eb9f49182274cada11846187550a3a2a840c glibc-langpack-agr-2.28-251.el8_10.2.aarch64.rpm c5bb033e2708260223ff14d6091213fa67f724699dbdd40083a132e7779e6bf7 glibc-langpack-ak-2.28-251.el8_10.2.aarch64.rpm c39e69d3b8b1bf77030518280f68f8b6f3448102b67e187de56c7bfe9fd41ff8 glibc-langpack-am-2.28-251.el8_10.2.aarch64.rpm f5d0ddf3409cdd6af2be2fe307c97e252c0fd147a73f157d241228b0ea21c03a glibc-langpack-an-2.28-251.el8_10.2.aarch64.rpm 75ed9e8a4a69497ce12ad4541c3122afc5dadfb3c2080f611a400305660cf07a glibc-langpack-anp-2.28-251.el8_10.2.aarch64.rpm 9375cee507681d707baaf384f3c21fcd8908a0aea5f134a05fb157fce325f656 glibc-langpack-ar-2.28-251.el8_10.2.aarch64.rpm 791124ef9912e208c60db56ea7279548de186ab86db78a2d05cc74ed7447b796 glibc-langpack-as-2.28-251.el8_10.2.aarch64.rpm 9a9a0255e80a90c7445ad36b71d5839fb757d537600f1f77720094172ba62402 glibc-langpack-ast-2.28-251.el8_10.2.aarch64.rpm 4d43efda3edf04a083f1c99189e319b3ac933af1dc289cc4927fedcf94b7e28f glibc-langpack-ayc-2.28-251.el8_10.2.aarch64.rpm 55df4c943f48e3573ff2d59b1fe430e4f4455335a8f8aef6237cbef5936bd3d7 glibc-langpack-az-2.28-251.el8_10.2.aarch64.rpm 15a16bc53f07498a0e2f3b322e0a055fcf641305bda4bba739b5b698b41a4ea0 glibc-langpack-be-2.28-251.el8_10.2.aarch64.rpm 83e9ecc50f85b7bfb6717c1332021d05614b0b2b2681c0bc4ab218406fd80354 glibc-langpack-bem-2.28-251.el8_10.2.aarch64.rpm ae246650a22434682f17c5d8ecddb882189300be6ef6bae080e8039a6fba03f5 glibc-langpack-ber-2.28-251.el8_10.2.aarch64.rpm a04d4382ccab07b14746580212c2a7c4df4310cc5058744e1c0ced9949136642 glibc-langpack-bg-2.28-251.el8_10.2.aarch64.rpm aa2aa33ac33edbd225815d2cd161b4a963b70e7fc803a8ea43bfcf52cb907c84 glibc-langpack-bhb-2.28-251.el8_10.2.aarch64.rpm ab6fd47bb75be4854b6a28aed54cc915c408e12d4f2def62c22db7f27221cefa glibc-langpack-bho-2.28-251.el8_10.2.aarch64.rpm 4a36f5fbde4d53f776e23500354bf8ad645b2acc1c9ed4c97d244f80b905053c glibc-langpack-bi-2.28-251.el8_10.2.aarch64.rpm dbb28681440fa67b56594ad254f794c5f69fbf466a4e54aca22e636caa120d39 glibc-langpack-bn-2.28-251.el8_10.2.aarch64.rpm d1a3f6b19da7fddbf79daad034fd962c6ff2a34e5989143182fdad809954fe9f glibc-langpack-bo-2.28-251.el8_10.2.aarch64.rpm 4a53c43bbaeeef24fcecf1680e9e7109dae9d7b00e12827549c8d868ff6ddb61 glibc-langpack-br-2.28-251.el8_10.2.aarch64.rpm 2752174aeaf65f6b290fd2925f424962a732a2f921a56fd36b0def39e9edada0 glibc-langpack-brx-2.28-251.el8_10.2.aarch64.rpm bd8c5d972dc4d7a0e758f7bdb31ff7c1aca9714c11c0826344a481c6d7b78a03 glibc-langpack-bs-2.28-251.el8_10.2.aarch64.rpm 4bffa792631572868af2da0561e552359fd5a2eadce32e8da64b277fa1c80330 glibc-langpack-byn-2.28-251.el8_10.2.aarch64.rpm fd19229a706ce256c5b621af56175d6fafc767f582653d811519f4ba6a92076d glibc-langpack-ca-2.28-251.el8_10.2.aarch64.rpm 09cf2ed3e3bb23f157676a4c97298443dc081896e1e99fd6e5e0718e957d0262 glibc-langpack-ce-2.28-251.el8_10.2.aarch64.rpm 7dfd060097b86ea6c53866e77fcf13aeb3086fead85f481d7b59d96a66675960 glibc-langpack-chr-2.28-251.el8_10.2.aarch64.rpm d5ae5bbf677bd4f4eea20db7bf5391987863134b9db20aee0ef2e512af86c79b glibc-langpack-cmn-2.28-251.el8_10.2.aarch64.rpm ccc3016a64edf024df8a2be6187bfdec1c8355f5b910075b0c18a1a301c70d12 glibc-langpack-crh-2.28-251.el8_10.2.aarch64.rpm d8785a4af7efc5e9d98f395cce20faa7430b116d320fcb831384f8b7c1641a36 glibc-langpack-cs-2.28-251.el8_10.2.aarch64.rpm 126c94816629b4a6347bf5a422001d84a2a158eb7f0908d1c83e6f8d6982e68d glibc-langpack-csb-2.28-251.el8_10.2.aarch64.rpm f73bd72c0bfb0f8b848584cf6fb2a739cf34bbf796c521c02bbbc3ab5e081af7 glibc-langpack-cv-2.28-251.el8_10.2.aarch64.rpm e1a4b008a8903068b6725180541cb559a47c98dc32d606d090852a8aa9e8a959 glibc-langpack-cy-2.28-251.el8_10.2.aarch64.rpm ed13595e4d32971b7efe160b1afb869d77cd0e3dfa25bc069afbb7df6a27ec8f glibc-langpack-da-2.28-251.el8_10.2.aarch64.rpm f9097d0013cd8119e6927080a17f3b237960c02418185fef6914aac021c2a3c7 glibc-langpack-de-2.28-251.el8_10.2.aarch64.rpm b6bc677564c01958a2599be17a5d119fdac1f5ef4858212de136046e3b1f2942 glibc-langpack-doi-2.28-251.el8_10.2.aarch64.rpm bc17357722278512adbac90440f1a35914f744d7aa533513bc32274f88f13c9f glibc-langpack-dsb-2.28-251.el8_10.2.aarch64.rpm 4a18cfe5a2ae881a6198f1867f87529a350fcbafd70039646b4c062152f823ee glibc-langpack-dv-2.28-251.el8_10.2.aarch64.rpm 39ad36209c958c4e08635273f7f24e44fe8d25be8b8331fef8c35773177bdbe2 glibc-langpack-dz-2.28-251.el8_10.2.aarch64.rpm 62e40c8223b474ee84fc3b4880b1e5c487345e93b1bd6236f0c717361b0a3780 glibc-langpack-el-2.28-251.el8_10.2.aarch64.rpm e1931445b2fb1ceea667d9331f8f19c1ab54ca569df6c65ae39f6be252626a90 glibc-langpack-en-2.28-251.el8_10.2.aarch64.rpm 38336752a555dd443e48a69b38c905743ff2967f0118b54b508a76386b9f7e9b glibc-langpack-eo-2.28-251.el8_10.2.aarch64.rpm 1a70e7add4b88aea5e03a24e56ebcb1e29cc72dbb705d2605817ac9f32596b8d glibc-langpack-es-2.28-251.el8_10.2.aarch64.rpm 8cc8a7ca9441adf6992d282157f9bda2c23e0958f892a6f8a5ceb16989b90913 glibc-langpack-et-2.28-251.el8_10.2.aarch64.rpm 18f0a25fe4fa86330ca20e1e7a10b3321be563f967600928f2342374b2a02498 glibc-langpack-eu-2.28-251.el8_10.2.aarch64.rpm aab236840afb39ffeb616129fe9d483a3875e29ff47933e534440b44822632f7 glibc-langpack-fa-2.28-251.el8_10.2.aarch64.rpm 3f33603eb11c6d4fd139766347a1e39b5cfc309d3c54335c059f4478044cf639 glibc-langpack-ff-2.28-251.el8_10.2.aarch64.rpm 0233f3bf3713a6456e5c67ea2e3eedb52b3df0119b10d3710510d4aa39dba857 glibc-langpack-fi-2.28-251.el8_10.2.aarch64.rpm ccf432959d31309a3e13d1357a739808f38c378f3c4635a3d70aeb3d6b8cb054 glibc-langpack-fil-2.28-251.el8_10.2.aarch64.rpm d5363e694b1dfe15eb29604c2e352313b48e8af5aec5fba5859c6c7123416550 glibc-langpack-fo-2.28-251.el8_10.2.aarch64.rpm e1636dfc3cd782c51866da2d815d5f46f30e6d7b5a42c8d4c68c84333cc5250c glibc-langpack-fr-2.28-251.el8_10.2.aarch64.rpm c00fc3030e0d4c716ca86a8e4a8bd4785a3d4fbed3fb2c40aed9056efe3702cb glibc-langpack-fur-2.28-251.el8_10.2.aarch64.rpm f33b144a30edae560c4ba111e8e52779975c8a3734ad965defd26b5e6b7d76df glibc-langpack-fy-2.28-251.el8_10.2.aarch64.rpm 39f444982ddf67400235980aef806e0379d5db9fe440c361f7eac827abd9f1ac glibc-langpack-ga-2.28-251.el8_10.2.aarch64.rpm 4d48f1841ce98a969c12512e0f90c0d49a954460dc5269f064d001c8040f0f08 glibc-langpack-gd-2.28-251.el8_10.2.aarch64.rpm be987b063b7353d307a3f9ca578fa854ae49fc14e1d6629ae2c4f064730c37b7 glibc-langpack-gez-2.28-251.el8_10.2.aarch64.rpm 64fafa61873d7c3d8be8eafde329efc72eba282e6c94b5cc2484a112120e60ef glibc-langpack-gl-2.28-251.el8_10.2.aarch64.rpm 9aa8635f18a1bb13af82b384615e006062a0bc6cf4c9ef21cb6eadd25b3c7b1a glibc-langpack-gu-2.28-251.el8_10.2.aarch64.rpm c9d908d5ee821cc416bd2101b28be2bfe553bb3c0b1ff7f4c4e569369e14a331 glibc-langpack-gv-2.28-251.el8_10.2.aarch64.rpm 9aa0e2b9a475b81ac33888b6c9c10fac2600f88cd058a615c31a7e2a547938ff glibc-langpack-ha-2.28-251.el8_10.2.aarch64.rpm 21fb10606d2429cf1b9e83e04261899a056d7cffc2c81f346c0c99c6f36d943b glibc-langpack-hak-2.28-251.el8_10.2.aarch64.rpm 96bfa56792b3d3d378b4ae3af83e7bad5ade6b367dee8ec7b0fe0d4df2843ab4 glibc-langpack-he-2.28-251.el8_10.2.aarch64.rpm 427398c940f6cc3482476e84b6cc569b1efa8a89542739a4673c98c56be547d5 glibc-langpack-hi-2.28-251.el8_10.2.aarch64.rpm 843c91354e62cefa06fef439189fa4c75503cabc4c3ad430b4293cefa1cbe424 glibc-langpack-hif-2.28-251.el8_10.2.aarch64.rpm e90d49c6f6c6499f01fa0c8df796796c1935dba0ecf97cc8ea3f05aede9b2649 glibc-langpack-hne-2.28-251.el8_10.2.aarch64.rpm 71e474d690a23a408c4f846de2d56c651d3e16c0de82f3a8c5a43372d9eeb59f glibc-langpack-hr-2.28-251.el8_10.2.aarch64.rpm 2ddddfd532ee8dda4af952fe1636eb135390244acdaacce0b31b7d2aa41b7330 glibc-langpack-hsb-2.28-251.el8_10.2.aarch64.rpm 90d5e9d99ca2c6dcfbb1c2e791526f306607412c07ae455c19bdabe2de5f7072 glibc-langpack-ht-2.28-251.el8_10.2.aarch64.rpm 586092a2fb1f01ae5522306269fd0ed0163eace0ca88016acb334cd8c4baac6c glibc-langpack-hu-2.28-251.el8_10.2.aarch64.rpm 21b20071fa37e61b3c0e5e4b355d0b7ff34eda5b96128df42c19909c31d8c56a glibc-langpack-hy-2.28-251.el8_10.2.aarch64.rpm 10a3638c23723d6b86a6de84befdcfa3b393120fcd41e7307cdf4b6bb48e2887 glibc-langpack-ia-2.28-251.el8_10.2.aarch64.rpm 940107dc25482b2d497ef523530842c20bf7d6c2ec6257498bf3c609cc99c84f glibc-langpack-id-2.28-251.el8_10.2.aarch64.rpm 45438439722c4cfbb582ecd6d7863d221acb9f66cf59e3aee858a8726e689acb glibc-langpack-ig-2.28-251.el8_10.2.aarch64.rpm 6e413b917b32850055ed7fcdec05540fbcc923936df9a156d95504401067a710 glibc-langpack-ik-2.28-251.el8_10.2.aarch64.rpm 28702a736efd4808f7d09227a5c2290e640a5880a637c0fb1770374c1fedc54d glibc-langpack-is-2.28-251.el8_10.2.aarch64.rpm 69fb878cb66fbf9274fb02b5bdb537ec6d0814aacaf067d5492049769f8a2e60 glibc-langpack-it-2.28-251.el8_10.2.aarch64.rpm cfa2700e6434db8dce1d6109a2d29d7d7f2d018abd393d628641c31a3a1a1583 glibc-langpack-iu-2.28-251.el8_10.2.aarch64.rpm e66c695b54d0d1b881807c0be95926767c625948dd88c1d5d752be75c8445f1d glibc-langpack-ja-2.28-251.el8_10.2.aarch64.rpm c4d5be4cf3c04386f4c9474152497202e3ec8280db03dc4be233bbfa2f922e32 glibc-langpack-ka-2.28-251.el8_10.2.aarch64.rpm a5104e625f36de73d621beb2de9d5e58d2d2a194568aedb27f8d906c109edb39 glibc-langpack-kab-2.28-251.el8_10.2.aarch64.rpm a7511df59fc93e0b95717bc62cd87003c6f36a6a6f2f4502cfe3c670ffce944d glibc-langpack-kk-2.28-251.el8_10.2.aarch64.rpm f2a507fb11570bfe7b019c12334a9f6e23bb69429625ac04814243f8868bb06f glibc-langpack-kl-2.28-251.el8_10.2.aarch64.rpm ec93226374fbe005f6fd0bb338f003b1ad87a7fa9d1c0140bf48eb6ebabecb2e glibc-langpack-km-2.28-251.el8_10.2.aarch64.rpm 9aeb3a50e36cad7aa186c345ac16905bbe8cf05827c3370f78d199dc8af59239 glibc-langpack-kn-2.28-251.el8_10.2.aarch64.rpm 29ea6d9925d4dd554619ba750c93d145562b9ecbfbc22783b03e769aa572771e glibc-langpack-ko-2.28-251.el8_10.2.aarch64.rpm 52bf5b1029f585380c570175d32590ee948bc804f647aa90be9fd4482a69a698 glibc-langpack-kok-2.28-251.el8_10.2.aarch64.rpm ceced36abc68996173b28302cc07cdc790fc34dfafa1c1ccd5925cdb71e40fd0 glibc-langpack-ks-2.28-251.el8_10.2.aarch64.rpm 95e1798bd4756626358547874c7f92b1df92963b8ee982d2bc11939b043cee45 glibc-langpack-ku-2.28-251.el8_10.2.aarch64.rpm 611a1f5951ca7c750e4a6a1a1383df78bf10c7eba0adcfa65fb4a44225988347 glibc-langpack-kw-2.28-251.el8_10.2.aarch64.rpm 56b6f53de0cc13b9f4aae2f73c0090df0d48f4b95683a4e943feccfd606af578 glibc-langpack-ky-2.28-251.el8_10.2.aarch64.rpm 8976ef39e2f8d7a944a12b9ea5d9e3c9dc89e9ec0764b3a83dbaa83eeb492e57 glibc-langpack-lb-2.28-251.el8_10.2.aarch64.rpm 2b4b291b517d3e5b7fd1c9f0f459066998dfae704796b974e2bda5149488231f glibc-langpack-lg-2.28-251.el8_10.2.aarch64.rpm 74fd503dfd2c58ae6896a8c34ccd7486eff32c3d92ee0ec0912c55cf6ffdd2d3 glibc-langpack-li-2.28-251.el8_10.2.aarch64.rpm 87f7d6ba6f80e8888af590a21fff476026c858505bb994afaf3aadc7d680f0fd glibc-langpack-lij-2.28-251.el8_10.2.aarch64.rpm 58c05b93fedc8351986a9761505c68089de27d2c808b4d49950857001f282bb7 glibc-langpack-ln-2.28-251.el8_10.2.aarch64.rpm 34d42baa6a4f80c51aac5187a862235a65661b50c9291224685d33a840fc63fd glibc-langpack-lo-2.28-251.el8_10.2.aarch64.rpm 5ae0b617df31a779f21e2c3e95bf12b643e718ef0c391cc17ec6f80aae70b302 glibc-langpack-lt-2.28-251.el8_10.2.aarch64.rpm 6ceeee51e41432ca0153fb4f6255fd6fd3b7aad6fed725c48e418715d0dc1b01 glibc-langpack-lv-2.28-251.el8_10.2.aarch64.rpm 0f7f4aaf24cf9b56cd9410a5efc12c1238f168daeff0cb705ba089dcd261a1d4 glibc-langpack-lzh-2.28-251.el8_10.2.aarch64.rpm 793d2f9b1f0693be417e6084f98a8bdcbd0db63339bb8845c0d8b9df61dca77a glibc-langpack-mag-2.28-251.el8_10.2.aarch64.rpm aab7ea570d120b295404486789be663b193986e80bf051deb1f83036a2c4626a glibc-langpack-mai-2.28-251.el8_10.2.aarch64.rpm d3e6a1fabbb321033ba64a40ef50c7cc4dba330cfd2adb561be5495901c53d9f glibc-langpack-mfe-2.28-251.el8_10.2.aarch64.rpm 7673c0d70341b12db34ff23faafa09eaf96d82077e33683725940bdff0b74fee glibc-langpack-mg-2.28-251.el8_10.2.aarch64.rpm d799a75fe732d61f52b002faac526be557e77c9e2410ccf7ac6cbecd3837c269 glibc-langpack-mhr-2.28-251.el8_10.2.aarch64.rpm 9705329ec1b2ef0c404fe4a72087a03cb8e4938ae5d5bdeddea08942286dadf7 glibc-langpack-mi-2.28-251.el8_10.2.aarch64.rpm 0d45f666ede8263f3bd0c3d7d45f26e33d69b41151dbf473a9da6f388fdb6952 glibc-langpack-miq-2.28-251.el8_10.2.aarch64.rpm e8ae170215a7fb9bbdc8131aec96bb9a97d9e100109e1d99bff0ec392f9fb466 glibc-langpack-mjw-2.28-251.el8_10.2.aarch64.rpm 7f8c88cde74f3b8ff944b3aa9b773e692ad5115326c7d2834dfb404ff81c649f glibc-langpack-mk-2.28-251.el8_10.2.aarch64.rpm 5de9a6e1cf4957e62042643d0b815ab513458adce99ed58d7a1a65d7993a76cb glibc-langpack-ml-2.28-251.el8_10.2.aarch64.rpm 5b32b28752928f06920b5b233ff762ec2b75a05c7aefb487aadab793579ac16f glibc-langpack-mn-2.28-251.el8_10.2.aarch64.rpm b1da3f3cb4c8ef61cf2fd4a70d8f3923244b94ac86548460878c86dd758ade90 glibc-langpack-mni-2.28-251.el8_10.2.aarch64.rpm 06decac67589b29b90a964846f7f8c00d0e073ef258eeb239fe2a1878629040c glibc-langpack-mr-2.28-251.el8_10.2.aarch64.rpm 8959e8566eb0132793cbb57b0c182dc192652630d172ccabcf2a4b86edd795d9 glibc-langpack-ms-2.28-251.el8_10.2.aarch64.rpm 7586b78961e4c1b2f29a91353f46a639c8fce3d47252dec281b227312e5049ea glibc-langpack-mt-2.28-251.el8_10.2.aarch64.rpm f31d4d3d5278defad45fc6cb262ce21cbae57df602a4ad95b6cbb8a71cdf9f4b glibc-langpack-my-2.28-251.el8_10.2.aarch64.rpm df05d53dda1efd8797f070411becd587fd936a163f6bde94fbcb336c446e4920 glibc-langpack-nan-2.28-251.el8_10.2.aarch64.rpm e93458e63a427e2cb8e5d91ceb68761622cce95dbf97b6a07275e6ead2ee6806 glibc-langpack-nb-2.28-251.el8_10.2.aarch64.rpm 8328be4603ccb7bc65290c6e1bbc923915463f1f2e8a78c6c98179335bf4673c glibc-langpack-nds-2.28-251.el8_10.2.aarch64.rpm b492154b73a561639bcfe8bb336ac85e7d727bcaaa0f5dc678af641c0abaee06 glibc-langpack-ne-2.28-251.el8_10.2.aarch64.rpm db8b67f409166cdc07c82164fe1adf353f21c28f77c1172eb67282607f8919a2 glibc-langpack-nhn-2.28-251.el8_10.2.aarch64.rpm d0efc9857c917298ddca9af4fac2fb016f60f6107d448abe69d92e9c19419cd6 glibc-langpack-niu-2.28-251.el8_10.2.aarch64.rpm 0c17c6314ad3e641b4e9fe4816a36e1b0a933600b7e5a07ede97f4a87e83642c glibc-langpack-nl-2.28-251.el8_10.2.aarch64.rpm 0d298cfab8c435796470b9e063dae3b2a77d7e98126a7a08544437359ab1d57c glibc-langpack-nn-2.28-251.el8_10.2.aarch64.rpm 89202f7c01d6553724b9b581071fda5e7f38e67a6fea6e4aec1bef3045054ab2 glibc-langpack-nr-2.28-251.el8_10.2.aarch64.rpm 7f15e4b7a369c998b837e782c14ae79ef6f341ef7aece7ddda8f75b57e07b2e6 glibc-langpack-nso-2.28-251.el8_10.2.aarch64.rpm 80f8e57bb9c155669762706af1e1b332e7c77b965da57f2f79931cad6c970845 glibc-langpack-oc-2.28-251.el8_10.2.aarch64.rpm 50cd2e1345c0072052d7f14053256fa9b87161fa8ffaea5aa0f41d59349e3af7 glibc-langpack-om-2.28-251.el8_10.2.aarch64.rpm 4139da0377d453f28b00bfb27835e6524915df48cd609050fa5f83c998513042 glibc-langpack-or-2.28-251.el8_10.2.aarch64.rpm 7c11dbadd1b8e9cf4934217665ecacb130addb57c901c9d9a7bb0ab57533f728 glibc-langpack-os-2.28-251.el8_10.2.aarch64.rpm 03837b9e1beec2bbfb88ef2613a5d58135063de9090154dd300ab39a558c58ee glibc-langpack-pa-2.28-251.el8_10.2.aarch64.rpm 744efc3609951d56cb4beb10fc9cfdecabab0ddd971dcc2e04e16be0a2da2b09 glibc-langpack-pap-2.28-251.el8_10.2.aarch64.rpm bc220743bc79d519a70cc6368129195c99a48906a8f393abf22f39cc295331fd glibc-langpack-pl-2.28-251.el8_10.2.aarch64.rpm 56a06cc77d3e487dae9ab88cd9bcaf66c71aade66f23edc0ffba9c055619f736 glibc-langpack-ps-2.28-251.el8_10.2.aarch64.rpm c6e55032878d3121924949602b61ba58774b163c69f514ed2ee4c21ab634b5a0 glibc-langpack-pt-2.28-251.el8_10.2.aarch64.rpm d8351cb6661f0c258d1e7080db524277633337012323d3bf710a0bb108609e5d glibc-langpack-quz-2.28-251.el8_10.2.aarch64.rpm f9b8bb4f9c974aa338060c60768b24991a93e9d47639e5e19eee8b3373cb6d63 glibc-langpack-raj-2.28-251.el8_10.2.aarch64.rpm 403d5fee68acd1a98a5f564762bba604f7d0400b3a636d6023e6859ecc8f39a4 glibc-langpack-ro-2.28-251.el8_10.2.aarch64.rpm 59d5d7cf94dfa76809b12016bdc1dd0deeaab9141f667330219068af9e485f02 glibc-langpack-ru-2.28-251.el8_10.2.aarch64.rpm 49381e5eb754a5dc117a4898c8b89bce19d0b14c4a5f6fc0ac0be6c07ff28478 glibc-langpack-rw-2.28-251.el8_10.2.aarch64.rpm b5650f27ec25537723af8d94e54117edc230316d3bf22854a126a460b5c700fd glibc-langpack-sa-2.28-251.el8_10.2.aarch64.rpm 4424b0cb6515cbaaeb17683ff7ac377d6cc645832ee2296e269793e10ee43f0a glibc-langpack-sah-2.28-251.el8_10.2.aarch64.rpm 9892a30f78a02e96179226b54cb3d286453a7432fdec7192860a8533c6a0e2a5 glibc-langpack-sat-2.28-251.el8_10.2.aarch64.rpm 9f391db596c3e9ede93e57d7bad6399b38d3cc01296a6f3a66a33baf18923e9e glibc-langpack-sc-2.28-251.el8_10.2.aarch64.rpm 77ea066ca749b2e8a1decffb0bcd56428a8929060e2a8105bec4ef806a1d4f87 glibc-langpack-sd-2.28-251.el8_10.2.aarch64.rpm 47d6d63cb1341d5a5fc37752ca4c43f6a92d77e4f75fcf7a6bebc7d78e4152a0 glibc-langpack-se-2.28-251.el8_10.2.aarch64.rpm a2e041b54772ee75017863980452df0c1e7a5aff38aa33389311ea42b6a48c1f glibc-langpack-sgs-2.28-251.el8_10.2.aarch64.rpm ac4a709b6246adff2ab243c49e8700b4357106a85c5b7c5df8423fd4c107794b glibc-langpack-shn-2.28-251.el8_10.2.aarch64.rpm 74f7c9bcc24c5803840ed2d7035c349b3facc8510ef9dd3da432fa348861a4fa glibc-langpack-shs-2.28-251.el8_10.2.aarch64.rpm 359b71a9e449730df23733f703b8bb270fe7712ce256eb3657f44b842f96f417 glibc-langpack-si-2.28-251.el8_10.2.aarch64.rpm 09ab91f1bd4369d9ee9581e20878951c84433ca29fab90f8e7efdf37ab624209 glibc-langpack-sid-2.28-251.el8_10.2.aarch64.rpm 271648e16236b0f72b6a8f121ae259404368d971cbb6c9ad6162feee40bd301a glibc-langpack-sk-2.28-251.el8_10.2.aarch64.rpm 767ac22d4bf5b1feee0a685b39143ba7223c02ff17b876ba269f9bcde463b902 glibc-langpack-sl-2.28-251.el8_10.2.aarch64.rpm 72b66b33b9be393de4bff05671af84e75bcea1702c26bf527292231fa4a86a8d glibc-langpack-sm-2.28-251.el8_10.2.aarch64.rpm aba916d49424d567ae753cab9512ea7a2411d404557d1cae69822117f7e99973 glibc-langpack-so-2.28-251.el8_10.2.aarch64.rpm 2f83e3480f3ffc7d2d470a5791dd439e8d6ee98b2512efee20f249325d7d5d3b glibc-langpack-sq-2.28-251.el8_10.2.aarch64.rpm fdca1b9118e7f9d1bd61d38c869a00fd3e08f96c2a47a385e6b342fb01f92dee glibc-langpack-sr-2.28-251.el8_10.2.aarch64.rpm cf442e697fcc3c5ac8ee8b81303f74088a8cd38f5f5eb9550f166abc313e7327 glibc-langpack-ss-2.28-251.el8_10.2.aarch64.rpm a4578743534dc3b3255570a902bc069558c5ba78d1d6c8adc7558eecc238bb29 glibc-langpack-st-2.28-251.el8_10.2.aarch64.rpm 119f57eb768493082627d476ae1753c020f20a5581bf5082e4e44c6ac24f7856 glibc-langpack-sv-2.28-251.el8_10.2.aarch64.rpm 4deae2c1d94ee86eedf24b1f83ed70d2b76d0222804615bb75b79ee8b2fb652c glibc-langpack-sw-2.28-251.el8_10.2.aarch64.rpm 98f66c0ecad1639b7efbe52b4009bfcfa0bb5a3c8049a07b2fbe33431239edf9 glibc-langpack-szl-2.28-251.el8_10.2.aarch64.rpm 38e8c98ee77fe7a55ad85cda4358f6d8f2e0a5e2d899614da2cdb4d3e89a6a29 glibc-langpack-ta-2.28-251.el8_10.2.aarch64.rpm 4ec8a9a2a418077208a34bdd0c37cc36eae45af5d91cd403bc32f5cf91a3b477 glibc-langpack-tcy-2.28-251.el8_10.2.aarch64.rpm cbde8ac97f3b47e894847b1f75bb7b65d830bb31b343d3d0a63eee39787fbeaf glibc-langpack-te-2.28-251.el8_10.2.aarch64.rpm 91ef7c62875fe3a2e60f874432b996790567fdeb985c22e84bbbabb99ca14987 glibc-langpack-tg-2.28-251.el8_10.2.aarch64.rpm 6cfcb2ba842958e6af15440909f58278d9120ab9ddc0b93accb8b35671bff5cc glibc-langpack-th-2.28-251.el8_10.2.aarch64.rpm c1fa4edfc79dd8d5c43fc8bd7c0ee7fb1817e0966ca072ddde7bf5feb68c48a2 glibc-langpack-the-2.28-251.el8_10.2.aarch64.rpm fb4ffe73c59365a263c2f5e3824e58cd154bb14007d5ff9aff95a28ae3db5556 glibc-langpack-ti-2.28-251.el8_10.2.aarch64.rpm 10bc1a584d62c739128b56408e959d68a3cd804e456bfe4f98f4578b5e66dec6 glibc-langpack-tig-2.28-251.el8_10.2.aarch64.rpm 8a8ad788e86921f441d2a5447d74db7800aabfeda390f0eddab09fcd8856ac76 glibc-langpack-tk-2.28-251.el8_10.2.aarch64.rpm 7b3f6bb36d3aa06e6af47fb3b1ef77625b19fc2ad0ff19dab5678dd4ebb6d1f0 glibc-langpack-tl-2.28-251.el8_10.2.aarch64.rpm f3c2ec06c717543db7f62737a8cf4f99495314ce963d03d7184fd9ea71aabffa glibc-langpack-tn-2.28-251.el8_10.2.aarch64.rpm faf5e5baff9e695401e8ee2147ac92d0b53a7fb449682e7c06904ee62f3dfbe5 glibc-langpack-to-2.28-251.el8_10.2.aarch64.rpm be2e6f1c52d23ed239c8df1c391ad9de14c7a10e21f2e7fe2670e80105550fb5 glibc-langpack-tpi-2.28-251.el8_10.2.aarch64.rpm 8a8391a3c1dde841182d262cf00837f0284231150d75a08253577b818e1f79fa glibc-langpack-tr-2.28-251.el8_10.2.aarch64.rpm c4ed366308dda16844442368f49af8f5a4b334b53d886e74a9e68c0019dca308 glibc-langpack-ts-2.28-251.el8_10.2.aarch64.rpm dea6bc3a1a78790d3bc4f9329fb724389ea78e69f4fee1bee9fb3ed508225a75 glibc-langpack-tt-2.28-251.el8_10.2.aarch64.rpm 72f0812706b3acbadf0d35561c184827f5db87869918d14531027013a6ad6b0a glibc-langpack-ug-2.28-251.el8_10.2.aarch64.rpm 62f7b56dfe37957bbf342ebb618ab5bf3f3c3b55a6660a2f87d515ec404b45bf glibc-langpack-uk-2.28-251.el8_10.2.aarch64.rpm 1c53e25fb54dc4ab1ab67115f04dd673759855b854dbb0bafbfe03f8d0c25ce9 glibc-langpack-unm-2.28-251.el8_10.2.aarch64.rpm 972c0bd42075b81d360f8d6d4d57e2f55f0ee832e0c8fca929105ea886664ae8 glibc-langpack-ur-2.28-251.el8_10.2.aarch64.rpm 38fe28a53ee1682e664e6331286f03940ed4df9ceaeb08a5571f6cd3eecbc79f glibc-langpack-uz-2.28-251.el8_10.2.aarch64.rpm 3b615a1e9245fde1884aa07d23470b0687eb287d1e981b7f74d60ae30d28529a glibc-langpack-ve-2.28-251.el8_10.2.aarch64.rpm 89aee77d668066fad71f178c59a7288bd2757ac4172259dbef2b412417250e1f glibc-langpack-vi-2.28-251.el8_10.2.aarch64.rpm 213b0ba03ae9acd79c79f28f407e2737f0245a41f06d3467801d94cf366b6e04 glibc-langpack-wa-2.28-251.el8_10.2.aarch64.rpm f211ecc5fb032225ea29c4eb09773f8287a6c303e8882a2a051d702195093571 glibc-langpack-wae-2.28-251.el8_10.2.aarch64.rpm 8fa29d40bb1863f88b032e7ff29b94de76d0a2e7a061564277e29ad51c39a904 glibc-langpack-wal-2.28-251.el8_10.2.aarch64.rpm 5511350e20813e2533d630a539146bc192549dff1e3e8aa2ec7cafde058f7091 glibc-langpack-wo-2.28-251.el8_10.2.aarch64.rpm d7c2dde4aa33e751432c046f9a4f64a081b7211be2e30fafbbe08e93f415fd00 glibc-langpack-xh-2.28-251.el8_10.2.aarch64.rpm d48890498a44b14e4b55cfc404e414fb67f50bc17e1b1b18de5e453f02f12188 glibc-langpack-yi-2.28-251.el8_10.2.aarch64.rpm 6adddda28c63810b4f80d049dba00ed3548c3de685e06792b1975cde1bcd367a glibc-langpack-yo-2.28-251.el8_10.2.aarch64.rpm c3a32cb1dbbffb21f8c74230b35d1361a85b927ebee6540b0abfe13b84849747 glibc-langpack-yue-2.28-251.el8_10.2.aarch64.rpm 875c99501371ddeea4a07d069d2fd67ab51de52615a8dbb8c733233cfb81269d glibc-langpack-yuw-2.28-251.el8_10.2.aarch64.rpm 41037ff0ce13adc5887db53668e458d221b425c4b9bd65ae64d5576e6b8253fe glibc-langpack-zh-2.28-251.el8_10.2.aarch64.rpm 978ce1283eac5d01ff75001472a56eb88dfc10a12ba6980d46d20c22f683a8f7 glibc-langpack-zu-2.28-251.el8_10.2.aarch64.rpm 697140a7f4d7c96ddefd6d028d8d465ba7cebc88c5ed7c21c39b7b5269f2674b glibc-locale-source-2.28-251.el8_10.2.aarch64.rpm 7d899e3728d7c379202abbdafe824d85972ef20783099f9d1e0dde2804c5439d glibc-minimal-langpack-2.28-251.el8_10.2.aarch64.rpm 5906a4b3c4166764a3fb7e9fa09449b625af11a3ecfe0f17d6b0071634f5d632 libnsl-2.28-251.el8_10.2.aarch64.rpm 69119a265e7515f95cdba06747de0448f3f73cc7a9f17c95fd80d62753f0fdcf nscd-2.28-251.el8_10.2.aarch64.rpm ef1b2a7dc6929019735d936e3b70d7492a069a580fbc999aa6eaeb1bd5e9a77f nss_db-2.28-251.el8_10.2.aarch64.rpm fd931e85e0cab317595bbd2a56f8c80ac820ef5e73d58f3750b2e45c958d046a RLSA-2024:3347 Important: python3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Path traversal on tempfile.TemporaryDirectory (CVE-2023-6597) * python: The zipfile module is vulnerable to zip-bombs leading to denial of service (CVE-2024-0450) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-62.el8_10.rocky.0.aarch64.rpm 6e90cc1eb97818f9c555dae822a056da8173ef57889c30d8751ca2fa5d5b9802 python3-libs-3.6.8-62.el8_10.rocky.0.aarch64.rpm 55f98c59f771e1baf7d32d46d58ca2d2553558f5ddfb41c0ac1a2c2115180381 python3-test-3.6.8-62.el8_10.rocky.0.aarch64.rpm 195cd8d6a0892d94bbdb31591e06328dffb3823e40a4198fd20f259526eecb00 RLBA-2024:3358 polkit bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for polkit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The polkit packages provide a component for controlling system-wide privileges. This component provides a uniform and organized way for non-privileged processes to communicate with privileged ones. Bug Fix(es): * polkit woken on every logind-session-monitor, executes pkla-compat every time [rhel-8.10.z] (JIRA:Rocky Linux-34029) none-baseos-rpms polkit-0.115-15.el8_10.2.aarch64.rpm 832e9e46fb6fad79785c5bc2dbda20893efb70c1718564f004a3db99c9e24e32 polkit-devel-0.115-15.el8_10.2.aarch64.rpm c08ae9bb0b5118a5c54821642ee1ee41dddc5a8b1f49a023efd5cec189385a0e polkit-docs-0.115-15.el8_10.2.noarch.rpm 24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc polkit-docs-0.115-15.el8_10.2.noarch.rpm 24198bd5b8ce86b4b06e4f7d605ff3f65ed8d00ee21643881b35af87ee6428dc polkit-libs-0.115-15.el8_10.2.aarch64.rpm c1fa4e34ca24a20bbcfe070fd76855386572f2c7743e17f13943442296068e58 RLBA-2024:3381 tuned bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es): * tuned-profiles-sap needs an update for vm.max_map_count [Rocky Linux 8] (JIRA:Rocky Linux-32124) none-baseos-rpms tuned-2.22.1-4.el8_10.1.noarch.rpm f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13 tuned-2.22.1-4.el8_10.1.noarch.rpm f900b6cd20f9e14d8364dd0dd82db34a638762d469423dd02ab633d238997e13 tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm 9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5 tuned-profiles-atomic-2.22.1-4.el8_10.1.noarch.rpm 9b1b3d5f313c2af1ad180eeaa9e964444e4059a143cea35964fe88319a4b0ad5 tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm 66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201 tuned-profiles-compat-2.22.1-4.el8_10.1.noarch.rpm 66d03ce05980bd92d0890ffbcc1220685127addd1b3e24fd73535313ce362201 tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm 0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403 tuned-profiles-cpu-partitioning-2.22.1-4.el8_10.1.noarch.rpm 0166597a16e1976563c2ee53be27ba16649091e3ab92d4b24160e1c8a841c403 tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777 tuned-profiles-mssql-2.22.1-4.el8_10.1.noarch.rpm e0e075ee3e7fd6c871837aa34482590021f94735cee4a1e8d872dec24fbdb777 tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm 2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02 tuned-profiles-oracle-2.22.1-4.el8_10.1.noarch.rpm 2e949f7758e994826f506e1889ed2caf38be6f24692aa982591be3f15c015c02 RLSA-2024:3618 Moderate: kernel update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340) * kernel: untrusted VMM can trigger int80 syscall handling (CVE-2024-25744) * kernel: i2c: i801: Fix block process call transactions (CVE-2024-26593) * kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445) * kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603) * kernel: use after free in i2c (CVE-2019-25162) * kernel: i2c: validate user data in compat ioctl (CVE-2021-46934) * kernel: media: dvbdev: Fix memory leak in dvb_media_device_free() (CVE-2020-36777) * kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477) * kernel: mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055) * kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump (CVE-2024-26615) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307) * kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565) * kernel: net: bridge: data races indata-races in br_handle_frame_finish() (CVE-2023-52578) * kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528) * kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520) * kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513) * kernel: pid: take a reference when initializing `cad_pid` (CVE-2021-47118) * kernel: net/sched: act_ct: fix skb leak and crash on ooo frags (CVE-2023-52610) * kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643) * kernel: netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642) * kernel: i2c: i801: Don&#39;t generate an interrupt on bus reset (CVE-2021-47153) * kernel: xhci: handle isoc Babble and Buffer Overrun events properly (CVE-2024-26659) * kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664) * kernel: wifi: mac80211: fix race condition on enabling fast-xmit (CVE-2024-26779) * kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744) * kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743) * kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185) * kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901) * kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872) * kernel: usb: ulpi: Fix debugfs directory leak (CVE-2024-26919) * kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964) * kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934) * kernel: USB: core: Fix deadlock in port &#34;disable&#34; sysfs attribute (CVE-2024-26933) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) * kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973) * kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command (CVE-2024-27059) * kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013) * kernel: net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171) * kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669) * kernel: uio: Fix use-after-free in uio_open (CVE-2023-52439) * kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594) * kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595) none-baseos-rpms bpftool-4.18.0-553.5.1.el8_10.aarch64.rpm 1046b7a54e11e2a41b469ac3487352a783b36367804b1511b6df104da4b4aa09 kernel-4.18.0-553.5.1.el8_10.aarch64.rpm 205cf94e3ebde571c66059b1eea24b46504bbe9d81cc8b7ba32f014f44efa14f kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm 90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96 kernel-abi-stablelists-4.18.0-553.5.1.el8_10.noarch.rpm 90980b327ea205a51346967228b957b96581042d62de488c25b7240cfa923a96 kernel-core-4.18.0-553.5.1.el8_10.aarch64.rpm a6e53d6d10f30eeff0b62b4fa3f980a7d4b04f76b9c5bb03c6477b5d9cb4c193 kernel-cross-headers-4.18.0-553.5.1.el8_10.aarch64.rpm efc2f030fddcad77a03c8a43d46fb9fa1e314ccb1836db87eab509662a4afd77 kernel-debug-4.18.0-553.5.1.el8_10.aarch64.rpm 437ef16a1c9fdccc53981350f922ef9de1ebe12c63c800d2a3af44eead7b4621 kernel-debug-core-4.18.0-553.5.1.el8_10.aarch64.rpm 7fe2c8bc3f691f4146fb5686228005e994b7bdd62223654da3361f62a5dfe9ee kernel-debug-devel-4.18.0-553.5.1.el8_10.aarch64.rpm b2ea4f42efe4ee822e855d2e1b463fdae8e179acb0b949b64dab82e93d666829 kernel-debuginfo-common-aarch64-4.18.0-553.5.1.el8_10.aarch64.rpm 0c0d3546474f0aefd21391a32aed4da31651ff27d92350f0598ebe1499160f25 kernel-debug-modules-4.18.0-553.5.1.el8_10.aarch64.rpm ad543c68e1475545507265a2a3a79f2479845b06f7dd8ebc55342a8b3a023007 kernel-debug-modules-extra-4.18.0-553.5.1.el8_10.aarch64.rpm 3c26672bfc70ecf700cedde90a717551f8cc7c04c2f63cec9fd029f419d1a9f0 kernel-devel-4.18.0-553.5.1.el8_10.aarch64.rpm af6ac7e85249e4ee72851128ea7d8099ed1c5cf775d0c35776d625517019117d kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f kernel-doc-4.18.0-553.5.1.el8_10.noarch.rpm cd20284242d611eb16894f2de6b0f29b145993ccfea76de1ace9805be0a1390f kernel-headers-4.18.0-553.5.1.el8_10.aarch64.rpm b72107f3ecd2385bc2822b891c6c430124088af2df5c7c9e046d5f71f57e17c1 kernel-modules-4.18.0-553.5.1.el8_10.aarch64.rpm bf73544ae9fbf7cd8b2f57886369eeaa7e9c58469591bd907bc5163e6fa6ca06 kernel-modules-extra-4.18.0-553.5.1.el8_10.aarch64.rpm bc4370aadd8a9ac60edb70d43f82d911112253281a4d23d74eaa8b068521c06d kernel-tools-4.18.0-553.5.1.el8_10.aarch64.rpm 4096d4d01f74c6262984c20ed4c7ab9a5ef1f076434cdefbb53ff860d201682a kernel-tools-libs-4.18.0-553.5.1.el8_10.aarch64.rpm e59535b82fe5fdd5cdd5a2a2c1879a65c4600709f4571558b0762668d64fd02e perf-4.18.0-553.5.1.el8_10.aarch64.rpm f6bce0e2945e3bd01f4c8e667d829db56be2cd119689793628f80c664dec9626 python3-perf-4.18.0-553.5.1.el8_10.aarch64.rpm 1b6dd39f46f3e8f04f78d072ea41dbee406776bdeff47bd1e2983a6a87270523 RLSA-2024:3626 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: use-after-free in XMLReader (CVE-2024-25062) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-18.el8_10.1.aarch64.rpm 675c79fbf20764842be0361e5a3462e7053b60f069395ad71c534f0765745e3f python3-libxml2-2.9.7-18.el8_10.1.aarch64.rpm e6ccd07f16e53b00bd36d32f2b676ffff9eec7c30e8254ec7893be7693f723ae RLSA-2024:3667 Moderate: cockpit security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cockpit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Cockpit enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, SELinux troubleshooting, interactive command-line sessions, and more. Security Fix(es): * cockpit: command injection when deleting a sosreport with a crafted name (CVE-2024-2947) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cockpit-310.4-1.el8_10.aarch64.rpm 29a84e4438d05a00b0c88f4393a45cf2b7370e3ff0dbfdafb31e3df7ec89bdba cockpit-bridge-310.4-1.el8_10.aarch64.rpm fae84310a3a769a6c25bf7a1f23361276e3b03ac54816d29ed77076bbeabd09a cockpit-doc-310.4-1.el8_10.noarch.rpm 2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393 cockpit-doc-310.4-1.el8_10.noarch.rpm 2fc98216866ffe728743849c8bd1e9e876b32579f57c9b8e172bf2da30594393 cockpit-system-310.4-1.el8_10.noarch.rpm 342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31 cockpit-system-310.4-1.el8_10.noarch.rpm 342a2a051327d592f2fcd641aa4ab0426d1b1fa7bd74297208f5ee64a017fa31 cockpit-ws-310.4-1.el8_10.aarch64.rpm b7361ec5b1ae1d861bbcf61025dc8ad29a0958d99160fb959563ff7a4f0dd762 RLBA-2024:4049 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * rebase sos to 4.7.1 in Rocky Linux8.10 (Rocky Linux-32104) * rebase sos to 4.7.1 in Rocky Linux9.4 (Rocky Linux-32106) * sos clean on an existing archive fails to clean anything (Rocky Linux-35945) none-baseos-rpms sos-4.7.1-3.el9.noarch.rpm 0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3 sos-4.7.1-3.el9.noarch.rpm 0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3 sos-4.7.1-3.el9.noarch.rpm 0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3 sos-4.7.1-3.el9.noarch.rpm 0017839676c619ba81051a15af40cf5bf19915464a6c0b5bf29fa1e1f438d5d3 sos-audit-4.7.1-3.el9.noarch.rpm 5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238 sos-audit-4.7.1-3.el9.noarch.rpm 5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238 sos-audit-4.7.1-3.el9.noarch.rpm 5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238 sos-audit-4.7.1-3.el9.noarch.rpm 5446802a36b18781fb4b298f6a4fab23a1c8484a9ed21f192e70cb93b71b4238 sos-4.7.1-3.el8_10.noarch.rpm 9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4 sos-4.7.1-3.el8_10.noarch.rpm 9f99fa4998fc4a7fd86109cbf7352835dd81177932336ce2ef4083c4b21369d4 sos-audit-4.7.1-3.el8_10.noarch.rpm caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc sos-audit-4.7.1-3.el8_10.noarch.rpm caf87c9a2a6b3179bb70ed0cdc2fe7b38eafd183aa5a37624644c663cf9f1cfc RLSA-2024:4211 Important: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack (CVE-2020-26555) * kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number (CVE-2023-52881,RHV-2024-1001) * kernel: ovl: fix leaked entry (CVE-2021-46972) * kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (CVE-2021-47073) * kernel: gro: fix ownership transfer (CVE-2024-35890) * kernel: tls: (CVE-2024-26584, CVE-2024-26583, CVE-2024-26585) * kernel: wifi: (CVE-2024-35789, CVE-2024-27410, CVE-2024-35838, CVE-2024-35845) * kernel: mlxsw: (CVE-2024-35855, CVE-2024-35854, CVE-2024-35853, CVE-2024-35852, CVE-2024-36007) * kernel: PCI interrupt mapping cause oops [rhel-8] (CVE-2021-46909) * kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry (CVE-2021-47069) * kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng [rhel-8] (CVE-2023-52615) * kernel: net/mlx5e: (CVE-2023-52626, CVE-2024-35835, CVE-2023-52667, CVE-2024-35959) * kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset [rhel-8] (CVE-2024-26801) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout [rhel-8.10] (CVE-2024-27397) * kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560) * kernel: ppp_async: limit MRU to 64K (CVE-2024-26675) * kernel: x86/mm/swap: (CVE-2024-26759, CVE-2024-26906) * kernel: tipc: fix kernel warning when sending SYN message [rhel-8] (CVE-2023-52700) * kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907) * kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head (CVE-2024-35888) * kernel: powerpc/imc-pmu/powernv: (CVE-2023-52675, CVE-2023-52686) * kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs (CVE-2023-5090) * kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464) * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: crypto: (CVE-2024-26974, CVE-2023-52669, CVE-2023-52813) * kernel: net/mlx5/bnx2x/usb: (CVE-2024-35960, CVE-2024-35958, CVE-2021-47310, CVE-2024-26804, CVE-2021-47311, CVE-2024-26859, CVE-2021-47236, CVE-2023-52703) * kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (CVE-2024-36004) * kernel: perf/core: Bail out early if the request AUX area is out of bound (CVE-2023-52835) * kernel: USB/usbnet: (CVE-2023-52781, CVE-2023-52877, CVE-2021-47495) * kernel: can: (CVE-2023-52878, CVE-2021-47456) * kernel: mISDN: fix possible use-after-free in HFC_cleanup() (CVE-2021-47356) * kernel: udf: Fix NULL pointer dereference in udf_symlink function (CVE-2021-47353) Bug Fix(es): * Kernel panic - kernel BUG at mm/slub.c:376! (JIRA:Rocky Linux-29783) * Temporary values in FIPS integrity test should be zeroized [rhel-8.10.z] (JIRA:Rocky Linux-35361) * Rocky Linux8.6 - kernel: s390/cpum_cf: make crypto counters upward compatible (JIRA:Rocky Linux-36048) * [Rocky Linux8] blktests block/024 failed (JIRA:Rocky Linux-8130) * Rocky Linux8.9: EEH injections results Error: Power fault on Port 0 and other call traces(Everest/1050/Shiner) (JIRA:Rocky Linux-14195) * Latency spikes with Matrox G200 graphic cards (JIRA:Rocky Linux-36172) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.8.1.el8_10.aarch64.rpm b19eec2b4be76447569f444ade60100d73a635cc64abcd5407f3735d7b5da9d3 kernel-4.18.0-553.8.1.el8_10.aarch64.rpm aafd71e39ead82a449d52facf742c5fec5e43df7769b900bdb63dc72e241b4d7 kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef kernel-abi-stablelists-4.18.0-553.8.1.el8_10.noarch.rpm ce28a833ec84dd9475cf080053603a0d7ee70408d9b343ecb7798f1d8f45c4ef kernel-core-4.18.0-553.8.1.el8_10.aarch64.rpm 4395669fcd992f3a71c427ef3ec1854b02c482ea51574225e653b3b2bbf59822 kernel-cross-headers-4.18.0-553.8.1.el8_10.aarch64.rpm f929f8103b8cd0dd1f8c71b4fb9d2c3a7b730a99f34314fc785fa3dd0346c471 kernel-debug-4.18.0-553.8.1.el8_10.aarch64.rpm d83c6e8ed6273008bed8eafbb417a484637e819ededc9874945ebd7f0a56f55f kernel-debug-core-4.18.0-553.8.1.el8_10.aarch64.rpm 9eefa107a2671bfd716f38cd884aa6fcb6d8ede941a621ebae70639a7d44551f kernel-debug-devel-4.18.0-553.8.1.el8_10.aarch64.rpm ffde5265320a11835a17930163e5124b6fb5f082a94b3c12669a7f163c19d1ab kernel-debuginfo-common-aarch64-4.18.0-553.8.1.el8_10.aarch64.rpm ab449f3ceace44574235f6384778840f3a6a577fec7ef41eae3eacfd6315469d kernel-debug-modules-4.18.0-553.8.1.el8_10.aarch64.rpm f2f63a1935bc384d3aefc3a3103324146cff08e9bdc056e09a3998beff76b4e7 kernel-debug-modules-extra-4.18.0-553.8.1.el8_10.aarch64.rpm b68ebb6b9fc9ae54634acc46b2164e3ab21c0ad4952e45457c667f8b437e6480 kernel-devel-4.18.0-553.8.1.el8_10.aarch64.rpm 411b71af70e92337e48d2b2423eb17326417d16778cab2f282ce2db2410240ad kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3 kernel-doc-4.18.0-553.8.1.el8_10.noarch.rpm a8717793a235f885bcc55160aa46c8e0b5897f0a3928d19927ceabfefd3b2fb3 kernel-headers-4.18.0-553.8.1.el8_10.aarch64.rpm fc0ca199a62a3e228e3022dfce222f4d1508b29ac7f164c5dddfe1df065274b8 kernel-modules-4.18.0-553.8.1.el8_10.aarch64.rpm 2242cde807c3819ed9cca491e159722506e17728efaa71c87943be7f03925f1c kernel-modules-extra-4.18.0-553.8.1.el8_10.aarch64.rpm 1c7776afbb1430ef5f08a801e1444e54b1c375ac2a44bc379db86cb1d71b170b kernel-tools-4.18.0-553.8.1.el8_10.aarch64.rpm 3514664e537d43ca06e401bd32dbf0d7d099bb5e3bb00d9c6577a06117dc7340 kernel-tools-libs-4.18.0-553.8.1.el8_10.aarch64.rpm c133b45df18e4759f037b880a67df8f3e3bd08570ac96ff53cd0cd92cd2e0317 perf-4.18.0-553.8.1.el8_10.aarch64.rpm c8a55819240971ce459bc627009fefd68ffee9a822d62bff8f13c1411259e2d9 python3-perf-4.18.0-553.8.1.el8_10.aarch64.rpm 7cc8058673d31bd319acdd92e211db56178b3acefeb44f6824716ee88db2b059 RLSA-2024:4620 Important: libndp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libndp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libndp is a library (used by NetworkManager) that provides a wrapper for the IPv6 Neighbor Discovery Protocol. It also provides a tool named ndptool for sending and receiving NDP messages. Security Fix(es): * libndp: buffer overflow in route information length field (CVE-2024-5564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. none-baseos-rpms libndp-1.7-7.el8_10.aarch64.rpm dbbf584d6b0007fbbe8e3fa264f6e786af0184f85901629dbfce83a1df572d5e RLSA-2024:5101 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451) * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: tracing: Restructure trace_clock_global() to never block (CVE-2021-46939) * kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622) * kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669) * kernel: stmmac: Clear variable when destroying workqueue (CVE-2024-26802) * kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843) * kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878) * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: SUNRPC: fix a memleak in gss_import_v2_context (CVE-2023-52653) * kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application (CVE-2024-21823) * kernel: Revert &#34;net/mlx5: Block entering switchdev mode with ns inconsistency&#34; (CVE-2023-52658) * kernel: ext4: fix corruption during on-line resize (CVE-2024-35807) * kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801) * kernel: dyndbg: fix old BUG_ON in &gt;control parser (CVE-2024-35947) * kernel: net/sched: act_skbmod: prevent kernel-infoleak (CVE-2024-35893) * kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876) * kernel: platform/x86: wmi: Fix opening of char device (CVE-2023-52864) * kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (CVE-2023-52845) * (CVE-2023-28746) * (CVE-2023-52847) * (CVE-2021-47548) * (CVE-2024-36921) * (CVE-2024-26921) * (CVE-2021-47579) * (CVE-2024-36927) * (CVE-2024-39276) * (CVE-2024-33621) * (CVE-2024-27010) * (CVE-2024-26960) * (CVE-2024-38596) * (CVE-2022-48743) * (CVE-2024-26733) * (CVE-2024-26586) * (CVE-2024-26698) * (CVE-2023-52619) Bug Fix(es): * Rocky Linux8.6 - Spinlock statistics may show negative elapsed time and incorrectly formatted output (JIRA:Rocky Linux-17678) * [AWS][8.9]There are call traces found when booting debug-kernel for Amazon EC2 r8g.metal-24xl instance (JIRA:Rocky Linux-23841) * [rhel8] gfs2: Fix glock shrinker (JIRA:Rocky Linux-32941) * lan78xx: Microchip LAN7800 never comes up after unplug and replug (JIRA:Rocky Linux-33437) * [Hyper-V][Rocky Linux-8.10.z] Update hv_netvsc driver to TOT (JIRA:Rocky Linux-39074) * Use-after-free on proc inode-i_sb triggered by fsnotify (JIRA:Rocky Linux-40167) * blk-cgroup: Properly propagate the iostat update up the hierarchy [rhel-8.10.z] (JIRA:Rocky Linux-40939) * (JIRA:Rocky Linux-31798) * (JIRA:Rocky Linux-10263) * (JIRA:Rocky Linux-40901) * (JIRA:Rocky Linux-43547) * (JIRA:Rocky Linux-34876) Enhancement(s): * [RFE] Add module parameters 'soft_reboot_cmd' and 'soft_active_on_boot' for customizing softdog configuration (JIRA:Rocky Linux-19723) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.16.1.el8_10.aarch64.rpm 6b3836ba09a71ab666574f17c86c3931ccb5e303df8efe5218d2df10be919fe0 kernel-4.18.0-553.16.1.el8_10.aarch64.rpm 142a29e01123d55fec665cf04bfd6e0c684fa1f003f364398956bdc675e480eb kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm dda1de03cb73fb30ba5e07ebf6e6545abaec396b191e59181a82393c773a5b90 kernel-abi-stablelists-4.18.0-553.16.1.el8_10.noarch.rpm dda1de03cb73fb30ba5e07ebf6e6545abaec396b191e59181a82393c773a5b90 kernel-core-4.18.0-553.16.1.el8_10.aarch64.rpm 5b07e242db12f43a5d49b9476153a9175cc09b49b9a53c846adafb26cc08a15e kernel-cross-headers-4.18.0-553.16.1.el8_10.aarch64.rpm 08bc6f7e81ad03de6d63e4655eaaaa9f46f8c9867349d57ff22490f87a22c9b9 kernel-debug-4.18.0-553.16.1.el8_10.aarch64.rpm 270bcfc7e68cb5519c996fd19c091e97290303157c0e9ff3b957a481ead2e20b kernel-debug-core-4.18.0-553.16.1.el8_10.aarch64.rpm 1494c0e854ba798302953d72e718f3666be54aa089c65fd2cfae6f0bddbc1a39 kernel-debug-devel-4.18.0-553.16.1.el8_10.aarch64.rpm 3d9f786253454dbd1789bfa0d2d16f8053413bebdd3e57b9f547fb67ecc3a138 kernel-debuginfo-common-aarch64-4.18.0-553.16.1.el8_10.aarch64.rpm fe0871d51685db8ba100e0e90a7b9f54ed1b56f0ef1f7f4cd939b48a86401558 kernel-debug-modules-4.18.0-553.16.1.el8_10.aarch64.rpm 10c41d5f5bae863a66646a34a08b350f828ec104fad33b4f4872595937d12a86 kernel-debug-modules-extra-4.18.0-553.16.1.el8_10.aarch64.rpm 54eec3229232000f6e56027fb159ec6b88c6fb1b4b002e5df4627e7e8afd93c9 kernel-devel-4.18.0-553.16.1.el8_10.aarch64.rpm a2ab5e49efd83282c408bc89ccce5db39db56f934c7e4d013bcf9adfc3606496 kernel-doc-4.18.0-553.16.1.el8_10.noarch.rpm 8fb650a74d20d34146b9a685185018288e5afb32478ff15368b5d1336207ce4a kernel-doc-4.18.0-553.16.1.el8_10.noarch.rpm 8fb650a74d20d34146b9a685185018288e5afb32478ff15368b5d1336207ce4a kernel-headers-4.18.0-553.16.1.el8_10.aarch64.rpm b2647fa9fd620e1f7866606471af8661fdfdf1ed94bd6caaaee31d8c7cd56e67 kernel-modules-4.18.0-553.16.1.el8_10.aarch64.rpm fa006f8f9ad60e9383775c5427e96e88c7695379ad09338b72a02a299637a60e kernel-modules-extra-4.18.0-553.16.1.el8_10.aarch64.rpm 2ea551c900e3468d4dc46968a286ff5266e4222ad547c99f74944b4dcf2d8318 kernel-tools-4.18.0-553.16.1.el8_10.aarch64.rpm 1ca29eb9913dd9ac8e3f8334cd4771dd323a24a2d46fe33b617523bd52deccbb kernel-tools-libs-4.18.0-553.16.1.el8_10.aarch64.rpm 6933cd0b74693d1752c7095caf01be0d7517a93f389585ba93781bf51ade9f77 perf-4.18.0-553.16.1.el8_10.aarch64.rpm 10236c8a1524ca7f037b63cae84544c90d2d4a5df3d1c0c9bfab56e782ddc5dc python3-perf-4.18.0-553.16.1.el8_10.aarch64.rpm 24c58ddf46a18ee8abe30912bd855b14ea4f11868b87ba23b10ee5954d3cbcde RLSA-2024:5530 Important: python-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-setuptools package provides a collection of enhancements to Python distribution utilities allowing convenient building and distribution of Python packages. Security Fix(es): * pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools (CVE-2024-6345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-setuptools-39.2.0-8.el8_10.noarch.rpm 1d939bb64adcd70c11c2dba4da66d123036ba303719fab3d2e6b0b1f742efd7e platform-python-setuptools-39.2.0-8.el8_10.noarch.rpm 1d939bb64adcd70c11c2dba4da66d123036ba303719fab3d2e6b0b1f742efd7e python3-setuptools-39.2.0-8.el8_10.noarch.rpm bcb685f02a8d2bfeed90454e42b001cffae87ef80c1572822cbb769fe8092bbc python3-setuptools-39.2.0-8.el8_10.noarch.rpm bcb685f02a8d2bfeed90454e42b001cffae87ef80c1572822cbb769fe8092bbc python3-setuptools-wheel-39.2.0-8.el8_10.noarch.rpm bac06e301b93b49d498016a0cf652ee297826f034db5ddb288df1834b48a5b9a python3-setuptools-wheel-39.2.0-8.el8_10.noarch.rpm bac06e301b93b49d498016a0cf652ee297826f034db5ddb288df1834b48a5b9a RLBA-2024:5915 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * [rebase] rebase sos to 4.7.2 in Rocky Linux8.10 (JIRA:Rocky Linux-49779) * sos report dracut module takes 100s when using rpm-ostree (JIRA:Rocky Linux-33703) * Capture the output of 'tunegfs2' for GFS2 filesystems. (JIRA:Rocky Linux-40871) * [rebase] rebase sos to 4.7.2 in Rocky Linux9.4 (JIRA:Rocky Linux-49781) none-baseos-rpms sos-4.7.2-2.el8_10.noarch.rpm 0526fdfbcaf20373a0925fbe826d750203c0ea7cb6fbdc894a3e519c8f7e20ec sos-4.7.2-2.el8_10.noarch.rpm 0526fdfbcaf20373a0925fbe826d750203c0ea7cb6fbdc894a3e519c8f7e20ec sos-4.7.2-3.el9.noarch.rpm d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f sos-4.7.2-3.el9.noarch.rpm d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f sos-4.7.2-3.el9.noarch.rpm d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f sos-4.7.2-3.el9.noarch.rpm d5a92e0ff408d38efbaeb8c4314eb74794be55bb479ad6b69b7ba3ca9fa5ad1f sos-audit-4.7.2-2.el8_10.noarch.rpm 602d86eca0007b964acc1593de700af8757d63fd018fc37a405d8c5bbb95f69a sos-audit-4.7.2-2.el8_10.noarch.rpm 602d86eca0007b964acc1593de700af8757d63fd018fc37a405d8c5bbb95f69a sos-audit-4.7.2-3.el9.noarch.rpm 978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55 sos-audit-4.7.2-3.el9.noarch.rpm 978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55 sos-audit-4.7.2-3.el9.noarch.rpm 978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55 sos-audit-4.7.2-3.el9.noarch.rpm 978cb330d2b881a280afcae0ffaabd9caa0266ed987a1a3048c7d82b26cd3c55 RLSA-2024:6422 Important: bubblewrap and flatpak security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for flatpak, bubblewrap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Bubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces. Security Fix(es): * flatpak: Access to files outside sandbox for apps using persistent= (--persist) (CVE-2024-42472) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bubblewrap-0.4.0-2.el8_10.aarch64.rpm 53394b2034d43bdb0419d5bfcee776c64937902bf8e1499cfdf9eadb8d2282cb RLBA-2024:6980 kexec-tools bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * The dracut-module-setup.sh interface renaming regex is not accurate (JIRA:Rocky Linux-47130) none-baseos-rpms kexec-tools-2.0.26-14.el8_10.2.aarch64.rpm 4f8fb1b5459e78eb4dcdfd234a161e8ae5925826fa719def58c16f268d200834 RLSA-2024:6975 Moderate: python3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: incorrect IPv4 and IPv6 private ranges (CVE-2024-4032) * cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection (CVE-2024-6923) * python: cpython: tarfile: ReDos via excessive backtracking while parsing header values (CVE-2024-6232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-67.el8_10.rocky.0.aarch64.rpm cea4646859150876bc31f21af5e7c003428720fd7b2d13184d00518e4afa7071 python3-libs-3.6.8-67.el8_10.rocky.0.aarch64.rpm 1e8eace4ae738eb6f5e495066d0ec9ff35397b9ed3a3a21db9d0f6b4f8d5065e python3-test-3.6.8-67.el8_10.rocky.0.aarch64.rpm 28513f9be94885a7150bb024a60b8b126fc1f497556acb0073c87860a4775c2a RLBA-2024:6976 findutils bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for findutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The findutils packages contain programs to locate files on the system. The find utility searches through a hierarchy of directories looking for files that match a certain set of criteria, such as the file name pattern. The xargs utility builds and executes command lines from standard input arguments. Bug Fix(es): * findutils-4.9.0-8.el10: Rocky Linux SAST Automation: address 1 High impact true positive(s) [rhel-8.10.z] (JIRA:Rocky Linux-45720) none-baseos-rpms findutils-4.6.0-23.el8_10.aarch64.rpm f55e81aa1d3994e10fdfdd8c6be02cde0a6b9cf7fad4d43352b5d45647d4ab09 RLBA-2024:6977 systemd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * [spec] do not create symlink /etc/systemd/system/syslog.service (JIRA:Rocky Linux-13179) none-baseos-rpms systemd-239-82.el8_10.2.aarch64.rpm ee4866b4947ecc34ce13cd563a7163b352014dae115e3ccb1e55731ffbc72cb2 systemd-container-239-82.el8_10.2.aarch64.rpm c5e75174250994cfc1f81afbcab7b6d84410b0bb1ceb599b9fb17b774854ae75 systemd-devel-239-82.el8_10.2.aarch64.rpm e42ea185b08b30b7895d9db0e5437da5d97dc624fe329f1f56f3c52e9f8b65c6 systemd-journal-remote-239-82.el8_10.2.aarch64.rpm 26109e665c6765443210376b5e5fc241f5e8dd08dc78d1c59a7e7ad96abcc6a8 systemd-libs-239-82.el8_10.2.aarch64.rpm fa25bf5a8358df8087a4cff54f2731be076a3282cbc8c676ccb2ac801c19ea16 systemd-pam-239-82.el8_10.2.aarch64.rpm 25c33dfe981562aa04220bb519c728bb6755011478efc6af4001db87a3121d33 systemd-tests-239-82.el8_10.2.aarch64.rpm fc605eeacd1cdfa3d7b8157619ab9c2b1e62edb4dc19d20ce0d6bb5b9eb391df systemd-udev-239-82.el8_10.2.aarch64.rpm b3c83fbc1b9752821d3d18294ad601c17d77dbbbffb4f03ed1dd533c5caa5693 RLBA-2024:6981 libldb bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libldb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases. Bug Fix(es): * libldb performance regression with indexes [rhel-8] (JIRA:Rocky Linux-12109) none-baseos-rpms ldb-tools-2.8.0-1.el8_10.aarch64.rpm fe396245e08d5bf4cded8141f05551e7b00cfa4b3e16c715327caf38a9d27d83 libldb-2.8.0-1.el8_10.aarch64.rpm adf179bd6fc6f78c8c911d305b48885701f99382bb42ee31ec22fa8dffa73f41 libldb-devel-2.8.0-1.el8_10.aarch64.rpm c7898402c02e6dda32f8c8eeb84b1013bffdc843f56c51e235d9b015197bdda9 python3-ldb-2.8.0-1.el8_10.aarch64.rpm 4a47274f5a45ee2078829aa670c64e5bcab7e9a1421f7e8800fada6b7d5836a8 RLBA-2024:6982 blktrace bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for blktrace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The blktrace packages contain a number of utilities to record the I/O trace information for the kernel to user space, and utilities to analyze and view the trace information. Bug Fix(es): * Rocky Linux 8.9 - blktrace is still running after duration time exceeded (JIRA:Rocky Linux-17500) none-baseos-rpms blktrace-1.2.0-11.el8_10.aarch64.rpm 5495844d8f01ef918d0a5970317cb874975038370c50ba6df8e56ea42475fa42 RLBA-2024:6983 libuser bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libuser. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libuser library implements a standardized interface for manipulating and administering user and group accounts. The library uses pluggable back-ends to interface to its data sources. Sample applications modeled after those included with the shadow password suite are included. Bug Fix(es) and Enhancement(s): * [libuser] Rocky Linux 8.9 Tier 0 Localization (JIRA:Rocky Linux-12111) * libuser: Fix findings from static application security testing (SAST) (JIRA:Rocky Linux-35578) none-baseos-rpms libuser-0.62-26.el8_10.aarch64.rpm aa346e71adb57bde427acde785dae8baa06a8b477f17111cdb33fd9af35106e4 python3-libuser-0.62-26.el8_10.aarch64.rpm 913394a1665623f0901048c8132159c9d1acbf0b8eea63650981d27a7b8ac627 RLSA-2024:6986 Low: nano security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for nano. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU nano is a small and friendly text editor. Security Fix(es): * nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file (CVE-2024-5742) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms nano-2.9.8-3.el8_10.aarch64.rpm bb8259e4b53d3df1bcf44d3ef5081251ba9375e43d3133de8153615ba273dffe RLSA-2024:6989 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: Negative Length Parsing Vulnerability in libexpat (CVE-2024-45490) * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) * libexpat: integer overflow (CVE-2024-45492) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-15.el8_10.aarch64.rpm e727002516741d5650ed8fedb3ae55569d4fd09da8647d51f3e37958c43a41a6 expat-devel-2.2.5-15.el8_10.aarch64.rpm a090e871cdba8831c33d042806e5a1eebea2d49c629ced896f08bca8ccfe5a85 RLSA-2025:17797 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0 (CVE-2022-50228) * kernel: Bluetooth: L2CAP: Fix use-after-free (CVE-2023-53305) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.79.1.el8_10.aarch64.rpm 47692299447f087add215fc2e76edc679eb8f64e785a83c7381536dae72daa62 kernel-4.18.0-553.79.1.el8_10.aarch64.rpm d67f4634f00bac39a6e5fc8c1684e32fa8c61ca9dd80617f506d09da4e4cfbc0 kernel-abi-stablelists-4.18.0-553.79.1.el8_10.noarch.rpm fc8a24d8e1fb8816cbc9a4d0bd90c55d4511cf1a83615456008dfb938180ef18 kernel-abi-stablelists-4.18.0-553.79.1.el8_10.noarch.rpm fc8a24d8e1fb8816cbc9a4d0bd90c55d4511cf1a83615456008dfb938180ef18 kernel-core-4.18.0-553.79.1.el8_10.aarch64.rpm f7bb949ae9cb3fc462c5b5188b2cf5cb21994816f516f0cff76b63f0a2ba7f8c kernel-debug-4.18.0-553.79.1.el8_10.aarch64.rpm ceb208e33ff53018b582022d7b06df20b8f95f92f73b95ab6303a58be6715815 kernel-debug-core-4.18.0-553.79.1.el8_10.aarch64.rpm bbb43e83eec1306bf792150a1605e18cbf9a9923ee943c0a7f5e014f2cc5ee5f kernel-debug-devel-4.18.0-553.79.1.el8_10.aarch64.rpm dfb83c8f8710473bc36ac86c243c468a8dc8ce0499b9441625ddd432c2beb886 kernel-debuginfo-common-aarch64-4.18.0-553.79.1.el8_10.aarch64.rpm e4e44bb626be0c3f6b7d70177f46c7d67d80ed6f2cda40c23a34a01eb045ae7d kernel-debug-modules-4.18.0-553.79.1.el8_10.aarch64.rpm 95e2f46cd84a0ca20a44cc6b7b227e0c29e163e3f4d595502402b93f9e661cf5 kernel-debug-modules-extra-4.18.0-553.79.1.el8_10.aarch64.rpm 9db44927f17ef2c920c88a00f92c0eb11775d01042bdd467afc7db9a0c79efc0 kernel-devel-4.18.0-553.79.1.el8_10.aarch64.rpm 81905c500736de7b7f338c7b91a997ea662ab4c10a22fccaa46b6fa3fbd5b403 kernel-doc-4.18.0-553.79.1.el8_10.noarch.rpm 8aa38b159176d2cef0142976bdeaafbd824815186a93c6679dcb91ab78d2c296 kernel-doc-4.18.0-553.79.1.el8_10.noarch.rpm 8aa38b159176d2cef0142976bdeaafbd824815186a93c6679dcb91ab78d2c296 kernel-modules-4.18.0-553.79.1.el8_10.aarch64.rpm 0a6611541474ae8d1b0e36dcfd9cde659820cc80d233cf23c6a9d39f17522f1f kernel-modules-extra-4.18.0-553.79.1.el8_10.aarch64.rpm 4dc7c8198fca3dc2778e94708ca049694ba28e0fa5137f4303645c9ca96f3b38 kernel-tools-4.18.0-553.79.1.el8_10.aarch64.rpm 3505a2d934727099b0d066027627fa206ffe20ec64707ac364de7fc89300f877 kernel-tools-libs-4.18.0-553.79.1.el8_10.aarch64.rpm 9d5a5a19be86e6b889c834dbb8f699b9a4dc6bea5777baf4434dc1921977d2c6 perf-4.18.0-553.79.1.el8_10.aarch64.rpm 642a270dd71e40346193067477d9bd9da6df4a54147151eeda3652ce98b8fab1 python3-perf-4.18.0-553.79.1.el8_10.aarch64.rpm d15b4adc1f898aee9d0ac3df67decab562bc347a8faed5faba3649dc85f10066 RLSA-2024:7848 Low: openssl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openssl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssl-1.1.1k-14.el8_10.aarch64.rpm 53eccaf2222240eed709f8390330e0fda0681f4f9a3aafda0bbc8208a6d4f635 openssl-devel-1.1.1k-14.el8_10.aarch64.rpm 860556f9963a6f5ee7275253a285363800c9a934f72c5f026b58f19302db653f openssl-libs-1.1.1k-14.el8_10.aarch64.rpm fe53b5c40868924c56555654c8fef65e3c71006717a75bcba5ddd99c0310bd94 openssl-perl-1.1.1k-14.el8_10.aarch64.rpm 862bbf6c032e482ea639cd7133698d03ab1a984585388b1fca8ba693015bbde3 RLBA-2024:8805 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8, Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. The tzdata packages have been updated to version 2024b, which addresses recent changes. Notably: * This is an optional update. This update does not contain any urgent time zone changes. * Several changes to improve historical data and conformance. * A variety of changes documented in detail in the NEWS file. none-baseos-rpms tzdata-2024b-2.el9.noarch.rpm 0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244 tzdata-2024b-2.el9.noarch.rpm 0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244 tzdata-2024b-2.el9.noarch.rpm 0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244 tzdata-2024b-2.el9.noarch.rpm 0bd4b46ca3ca42d5dc6f03d08cbf3af50c606053942bb610574c8701c9001244 tzdata-2024b-4.el8.noarch.rpm f414a56c04ba79814455084acd08fdb629ec60f262b38536458f70538d870767 tzdata-2024b-4.el8.noarch.rpm f414a56c04ba79814455084acd08fdb629ec60f262b38536458f70538d870767 RLEA-2024:8852 libproxy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libproxy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libproxy packages provide a library that handles all the details of proxy configuration. The libproxy library provides a stable external API, dynamic adjustment to changing network topology, and small core footprint. It does not use external dependencies within the libproxy core, however libproxy plug-ins may have dependencies. Bug Fix(es) and Enhancement(s): * libproxy: sending more than 102400 bytes in PAC without a Content-Length present could result in buffer overflow [rhel-8.10.0] (JIRA:Rocky Linux-30660) none-baseos-rpms libproxy-0.4.15-5.5.el8_10.aarch64.rpm 98abb8856c9d5473ed9d6026b1b88b87e73deafff1aadf27c6237a5a1ab639a8 python3-libproxy-0.4.15-5.5.el8_10.noarch.rpm 8cef7931b27c0f17dff2d75c16d7234fab2334523d64c49271939e4c1f77a7f7 python3-libproxy-0.4.15-5.5.el8_10.noarch.rpm 8cef7931b27c0f17dff2d75c16d7234fab2334523d64c49271939e4c1f77a7f7 RLBA-2024:8854 grub2 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grub2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Bug Fix(es): * BLS snippets in /boot/loader/entries are improperly labeled with "module_object_t" SELinux context (JIRA:Rocky Linux-4395) * [Rocky Linux8.10/Grub/SCAP/Bug] conflicting requirements of permissions on grub2-pc grub.cfg (JIRA:Rocky Linux-58835) none-baseos-rpms grub2-common-2.02-158.el8_10.rocky.0.1.noarch.rpm 7ac05d14c767cf0b47b36e9db8242fbae280a60e47ed42b10940d6b376db1031 grub2-common-2.02-158.el8_10.rocky.0.1.noarch.rpm 7ac05d14c767cf0b47b36e9db8242fbae280a60e47ed42b10940d6b376db1031 grub2-efi-aa64-2.02-158.el8_10.rocky.0.1.aarch64.rpm 153d0cd12f1ccd16039b434c319de2153aa52d48963b299dc031227b1c25bf58 grub2-efi-aa64-cdboot-2.02-158.el8_10.rocky.0.1.aarch64.rpm 82714dda4769d21e5154b6183cb7c52ff24aebbc0f7cf4f541ddcc29f26a53c1 grub2-efi-aa64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 5814cbf5ac6d266f94d1c08f39d4d02fb96cdd3b103709b30cee8dc5796ee555 grub2-efi-aa64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 5814cbf5ac6d266f94d1c08f39d4d02fb96cdd3b103709b30cee8dc5796ee555 grub2-efi-ia32-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 90a64a141a8111b7f4f7f219ff54530a0d5687992f563f77f0125701b265e835 grub2-efi-ia32-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 90a64a141a8111b7f4f7f219ff54530a0d5687992f563f77f0125701b265e835 grub2-efi-x64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 8c01f46d0353c0234a2458f0430e723a1b66ea6c69b047088ceec25e120b11f5 grub2-efi-x64-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 8c01f46d0353c0234a2458f0430e723a1b66ea6c69b047088ceec25e120b11f5 grub2-pc-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 21193ab9db8e8a345171e3737ee71a65e7d506423fbf9062865bca245d3fc8f8 grub2-pc-modules-2.02-158.el8_10.rocky.0.1.noarch.rpm 21193ab9db8e8a345171e3737ee71a65e7d506423fbf9062865bca245d3fc8f8 grub2-tools-2.02-158.el8_10.rocky.0.1.aarch64.rpm df4c149e44c58f51eeba3bb8714c39f5f85965acaea17dd16b25e36b36e9f1d7 grub2-tools-extra-2.02-158.el8_10.rocky.0.1.aarch64.rpm d1497b60b6e35edccc10d3b2f1d818416dbde275f2c94eb4e991f5f8ea781b50 grub2-tools-minimal-2.02-158.el8_10.rocky.0.1.aarch64.rpm c602e4394c6f0e23d408f6ce2126a7817a32fa4ca4cc0abd405ea4b7169cd59d RLBA-2024:8855 chrony bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The chrony suite, chronyd and chronyc, is an advanced implementation of the Network Time Protocol (NTP), specially designed to support systems with intermittent connections. It can synchronize the system clock with NTP servers, hardware reference clocks, and manual input. It can also operate as an NTPv4 (RFC 5905) server or peer to provide a time service to other computers in the network. Bug Fix(es): * Enable support for AES-CMAC into chrony 4.5.z with Rocky Linux 8.10 (JIRA:Rocky Linux-59032) * chronyd crashing [rhel-8.10.z] (JIRA:Rocky Linux-59112) none-baseos-rpms chrony-4.5-2.el8_10.aarch64.rpm 8710913617e08928bdac910ce22baa0e2bb044795c4980773eb7c50cc2eebd25 RLSA-2024:8856 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857) * kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492) * kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range (CVE-2024-26851) * kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924) * kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017) * kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976) * kernel: nouveau: lock the client object tree. (CVE-2024-27062) * kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info (CVE-2024-35839) * kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (CVE-2024-35898) * kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939) * kernel: net/mlx5e: Fix netif state handling (CVE-2024-38608) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: of: module: add buffer overflow check in of_modalias() (CVE-2024-38541) * kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (CVE-2024-38540) * kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503) * kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924) * kernel: ipv6: prevent possible NULL deref in fib6_nh_init() (CVE-2024-40961) * kernel: tipc: force a dst refcount before doing decryption (CVE-2024-40983) * kernel: ACPICA: Revert &#34;ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.&#34; (CVE-2024-40984) * kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create (CVE-2022-48773) * kernel: bpf: Fix overrunning reservations in ringbuf (CVE-2024-41009) * kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042) * kernel: ibmvnic: Add tx check to prevent skb leak (CVE-2024-41066) * kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092) * kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093) * kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: USB: serial: mos7840: fix crash on resume (CVE-2024-42244) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning (CVE-2024-43880) * kernel: gso: do not skip outer ip header in case of ipip and net_failover (CVE-2022-48936) * kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper() (CVE-2024-43889) * kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892) * kernel: sctp: Fix null-ptr-deref in reuseport_add_sock(). (CVE-2024-44935) * kernel: bonding: fix xfrm real_dev null pointer dereference (CVE-2024-44989) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (CVE-2024-47668) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.27.1.el8_10.aarch64.rpm 3f842623c9fea418af49edb245b173c199a6538ccb9b1336b4f723bc0e5ff14e kernel-4.18.0-553.27.1.el8_10.aarch64.rpm 833314cfcfee2fe32383a96e39324363c37813792c6f4b26443909b4a7c76611 kernel-abi-stablelists-4.18.0-553.27.1.el8_10.noarch.rpm d72ee6a6ae36b2d434a126ed68f3d248f2faeaaa0ea8a00b8d86de1b19952d18 kernel-abi-stablelists-4.18.0-553.27.1.el8_10.noarch.rpm d72ee6a6ae36b2d434a126ed68f3d248f2faeaaa0ea8a00b8d86de1b19952d18 kernel-core-4.18.0-553.27.1.el8_10.aarch64.rpm b4727bd88ebc4ce72a1b814428b81299dbcf69787d8a08162eee689c1ff8f8a8 kernel-cross-headers-4.18.0-553.27.1.el8_10.aarch64.rpm 434eeb8c3e4bbb9225319e5a2525095865c5e270817d3c3397e4852fa41c9184 kernel-debug-4.18.0-553.27.1.el8_10.aarch64.rpm 2b06392b7887b9386b2713313631297a768a2502910836468290c28243ac0aa7 kernel-debug-core-4.18.0-553.27.1.el8_10.aarch64.rpm 3b0bd99de9bae2aa5965eb80bab50473fe98ead7a6d7155f68bdf648865fc795 kernel-debug-devel-4.18.0-553.27.1.el8_10.aarch64.rpm b442cbd9e83716479537a47dd002fa184fae890620a06babc195529751a073df kernel-debuginfo-common-aarch64-4.18.0-553.27.1.el8_10.aarch64.rpm bb2062584d4ad25fb1fceffbb12de4dba064f27f73df5d79638e10114a196843 kernel-debug-modules-4.18.0-553.27.1.el8_10.aarch64.rpm 7d7e5f55d53627460a04d2692c1309244d2b2924ec77310f2d5222a58b4c37a9 kernel-debug-modules-extra-4.18.0-553.27.1.el8_10.aarch64.rpm 875b9e0f2c4d239ad885739328817ab928e1f9b9ea5ac98bd5e6fc9dc6c2b545 kernel-devel-4.18.0-553.27.1.el8_10.aarch64.rpm 54c7d6cac3941643796c9772d40788d502ad8d947747a8e1dfb65a9e590f5129 kernel-doc-4.18.0-553.27.1.el8_10.noarch.rpm 5bfcdf6525369d32ddae9a4d73e97f9ede62fd6355513cc0fcae450c3e34d1f0 kernel-doc-4.18.0-553.27.1.el8_10.noarch.rpm 5bfcdf6525369d32ddae9a4d73e97f9ede62fd6355513cc0fcae450c3e34d1f0 kernel-headers-4.18.0-553.27.1.el8_10.aarch64.rpm 81ed01919a1c1d183fda8b0b74ede845ab8a0fcce0982e8646ad9b1518fe63e0 kernel-modules-4.18.0-553.27.1.el8_10.aarch64.rpm e6e3763940e0d698d0cf86814651bc2df5e5f7d2b60e9d41ac88a5245595bb27 kernel-modules-extra-4.18.0-553.27.1.el8_10.aarch64.rpm 3291eaa17265bae844efa80ddb362ea361e8d5efbd14e71d04c0893e378e3fae kernel-tools-4.18.0-553.27.1.el8_10.aarch64.rpm 0498a7e4757d72e668cde778caa1accb4e16c11c75d8c9fb8c33560c4c9e34ac kernel-tools-libs-4.18.0-553.27.1.el8_10.aarch64.rpm 779be7f0e775e8aeb402a30a249c7026c090fcff3cb31e62fb9fc8ac05a55bf0 perf-4.18.0-553.27.1.el8_10.aarch64.rpm 287d3e6aa6176355192e816ea0700c2138e2a8f616d5024834eed7b1f85bf3f3 python3-perf-4.18.0-553.27.1.el8_10.aarch64.rpm 88ebc56fe4e68658b31a132b2637cd2808adff9d8ccd9fb755e9cd202ba20694 RLBA-2024:8858 linux-firmware bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es): * Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-62359) none-baseos-rpms iwl1000-firmware-39.31.5.1-125.el8_10.1.noarch.rpm a66528012cc956ae20d41308e6611bb9f129f51c517cd8b4ef5e34fb276a932f iwl1000-firmware-39.31.5.1-125.el8_10.1.noarch.rpm a66528012cc956ae20d41308e6611bb9f129f51c517cd8b4ef5e34fb276a932f iwl100-firmware-39.31.5.1-125.el8_10.1.noarch.rpm fba5e32e3ae6034543159d5ab4b05d5344f6e8345184bfe925a7f3f3ccdaabba iwl100-firmware-39.31.5.1-125.el8_10.1.noarch.rpm fba5e32e3ae6034543159d5ab4b05d5344f6e8345184bfe925a7f3f3ccdaabba iwl105-firmware-18.168.6.1-125.el8_10.1.noarch.rpm accc10162f0f3697868a1a77055d1f35d380db5613e1b4ae0ffc398fcf7db594 iwl105-firmware-18.168.6.1-125.el8_10.1.noarch.rpm accc10162f0f3697868a1a77055d1f35d380db5613e1b4ae0ffc398fcf7db594 iwl135-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 442ecd6f7e593bca75cb8af3902d0c56eac5821798ef22746a6a3d823d23607d iwl135-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 442ecd6f7e593bca75cb8af3902d0c56eac5821798ef22746a6a3d823d23607d iwl2000-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 9d3dc1710d002797c9373aee7202977f893c5a9947465a7c6357b10ab63eed74 iwl2000-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 9d3dc1710d002797c9373aee7202977f893c5a9947465a7c6357b10ab63eed74 iwl2030-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 133c2cae6c4bdda644980bff538282a18163103f61d20ebf5669e1cbfb5595aa iwl2030-firmware-18.168.6.1-125.el8_10.1.noarch.rpm 133c2cae6c4bdda644980bff538282a18163103f61d20ebf5669e1cbfb5595aa iwl3160-firmware-25.30.13.0-125.el8_10.1.noarch.rpm f8d85082d45d3eb5c54033027965d10f4850210a1665dc5fe032cdbfd67e506a iwl3160-firmware-25.30.13.0-125.el8_10.1.noarch.rpm f8d85082d45d3eb5c54033027965d10f4850210a1665dc5fe032cdbfd67e506a iwl3945-firmware-15.32.2.9-125.el8_10.1.noarch.rpm 2f3da47cda51d118bf88b40085bdd05f11c1d30341e9247c8f1d25bde87c1c33 iwl3945-firmware-15.32.2.9-125.el8_10.1.noarch.rpm 2f3da47cda51d118bf88b40085bdd05f11c1d30341e9247c8f1d25bde87c1c33 iwl4965-firmware-228.61.2.24-125.el8_10.1.noarch.rpm 65688a2a8c2957ca69df1141ba779e89ee91ce22a682245f97a4c133162f6eb5 iwl4965-firmware-228.61.2.24-125.el8_10.1.noarch.rpm 65688a2a8c2957ca69df1141ba779e89ee91ce22a682245f97a4c133162f6eb5 iwl5000-firmware-8.83.5.1_1-125.el8_10.1.noarch.rpm 09b18ab9dcdbf2a718f15297ede7c88b4f280f364aae58c33e03154f9a6997e7 iwl5000-firmware-8.83.5.1_1-125.el8_10.1.noarch.rpm 09b18ab9dcdbf2a718f15297ede7c88b4f280f364aae58c33e03154f9a6997e7 iwl5150-firmware-8.24.2.2-125.el8_10.1.noarch.rpm b39d6682ed74ae05d9fc3e8a82bc894feb6df7c541c9171426b293072afbf091 iwl5150-firmware-8.24.2.2-125.el8_10.1.noarch.rpm b39d6682ed74ae05d9fc3e8a82bc894feb6df7c541c9171426b293072afbf091 iwl6000-firmware-9.221.4.1-125.el8_10.1.noarch.rpm a9718054c9d79f701661b8bfbc610a51f2d05e43ed33676f6d0250399e8e0884 iwl6000-firmware-9.221.4.1-125.el8_10.1.noarch.rpm a9718054c9d79f701661b8bfbc610a51f2d05e43ed33676f6d0250399e8e0884 iwl6000g2a-firmware-18.168.6.1-125.el8_10.1.noarch.rpm d01b1866e8d7b478593ee1767c0354bba6e29a5b2fe7527e4d13a35d747af0b0 iwl6000g2a-firmware-18.168.6.1-125.el8_10.1.noarch.rpm d01b1866e8d7b478593ee1767c0354bba6e29a5b2fe7527e4d13a35d747af0b0 iwl6000g2b-firmware-18.168.6.1-125.el8_10.1.noarch.rpm e566a80fdf6b48d80a14f01c0695600cc4ea074c298faeec311606a11d76fcaa iwl6000g2b-firmware-18.168.6.1-125.el8_10.1.noarch.rpm e566a80fdf6b48d80a14f01c0695600cc4ea074c298faeec311606a11d76fcaa iwl6050-firmware-41.28.5.1-125.el8_10.1.noarch.rpm ad395b814f8c1c21d68ec905e209539214110860e9318f83cca673e07a2b51e1 iwl6050-firmware-41.28.5.1-125.el8_10.1.noarch.rpm ad395b814f8c1c21d68ec905e209539214110860e9318f83cca673e07a2b51e1 iwl7260-firmware-25.30.13.0-125.el8_10.1.noarch.rpm a0af61194dc88b4d645867c9bf346ae4b69c05df70030d33e03aacb75fe89745 iwl7260-firmware-25.30.13.0-125.el8_10.1.noarch.rpm a0af61194dc88b4d645867c9bf346ae4b69c05df70030d33e03aacb75fe89745 libertas-sd8686-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm daa97b1a030ef6c4bcab8cf8a2097d53134eccc133a723d417631bca1f301b4c libertas-sd8686-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm daa97b1a030ef6c4bcab8cf8a2097d53134eccc133a723d417631bca1f301b4c libertas-sd8787-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm a71b4f019ddcadd243b08550a7fb764678b534ea334f5fc6b9dd7afd42aa664a libertas-sd8787-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm a71b4f019ddcadd243b08550a7fb764678b534ea334f5fc6b9dd7afd42aa664a libertas-usb8388-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm 4bab692d7831674103e18bd960b4f5dd2c72cf617b38a0b42d7a82ff49ef4b9f libertas-usb8388-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm 4bab692d7831674103e18bd960b4f5dd2c72cf617b38a0b42d7a82ff49ef4b9f libertas-usb8388-olpc-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm fa3203a938e9560ed0be442a6395e1057ea9990bb1d8cc5afd65ab06197a9dd2 libertas-usb8388-olpc-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm fa3203a938e9560ed0be442a6395e1057ea9990bb1d8cc5afd65ab06197a9dd2 linux-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm 9a7fadb3f747503109a5c263b3762a490f1193c31a9fb7da944c82078df2f4bc linux-firmware-20241014-125.git06bad2f1.el8_10.noarch.rpm 9a7fadb3f747503109a5c263b3762a490f1193c31a9fb7da944c82078df2f4bc RLSA-2024:8859 Moderate: xmlrpc-c security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * libexpat: Integer Overflow or Wraparound (CVE-2024-45491) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms xmlrpc-c-1.51.0-10.el8_10.aarch64.rpm ca650c8eeca7e82e97be4ca929b21c020c1b9b29d5b1dcddaa65785f448603e5 xmlrpc-c-client-1.51.0-10.el8_10.aarch64.rpm b0a9eeeb80953e78b1ba4214f175556ee042b2d7552b8c134148f16293686fc7 RLSA-2024:8860 Important: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * freeradius: forgery attack (CVE-2024-3596) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-30.el8_10.aarch64.rpm 4a3a0265344daff4e39d0da574ac69279d4f83a6ef2ab9eaf43d379474702812 krb5-libs-1.18.2-30.el8_10.aarch64.rpm 041f6a925b1f15fd3dd0903fd39af5736d42b9341cf7c1b966b9c25796d5890b krb5-pkinit-1.18.2-30.el8_10.aarch64.rpm 13a405f28c66f18ccc1688ec5053ab9b3720d9f8dba29a35f01c32002e84a137 krb5-server-1.18.2-30.el8_10.aarch64.rpm 99864bb422f7d1fb8b6a91b3e8912be709c729741709f916d3ba8144db1be75d krb5-server-ldap-1.18.2-30.el8_10.aarch64.rpm 086fed49990edb5afcee87b5f5c51752e98856b4f43cf27922986f785af00c9e krb5-workstation-1.18.2-30.el8_10.aarch64.rpm a1dee3c361c224428d0edda742b15df7faf59903e893104dad3f953003575465 libkadm5-1.18.2-30.el8_10.aarch64.rpm b5d961f9a5b1e78bc5f6265f7f2ac6af5a98822d5b87b5f863bd24508b4e66d9 RLBA-2024:8861 openldap bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es): * LDAPChannel binding enforced on AD with AD cert using EDCSA-SHA384 ( NOT RSA)- sssd kerberos SASL fails with STARTTLS enabled on AD LDAP Port while it works with AD cert using RSA (JIRA:Rocky Linux-35538) none-baseos-rpms openldap-2.4.46-20.el8_10.aarch64.rpm 9d82100cbd460b7c4e232f2d9c8f1c33b4229bd438bc85e73e619f7ea5c59832 openldap-clients-2.4.46-20.el8_10.aarch64.rpm fddee2c439cbd2194a46c508073d088d61043ba65fb0eb22d7e87fd54f13f3f3 openldap-devel-2.4.46-20.el8_10.aarch64.rpm b1663ba02441b7bcb4fd1c3b149d1fdde4a67dfaf5a9dc6c7ba28878a53db7b8 RLBA-2024:8866 glib2 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Bug Fix(es): * Trashing on system internal mounts is not supported (JIRA:Rocky Linux-46828) none-baseos-rpms glib2-2.56.4-165.el8_10.aarch64.rpm e96934904e5f85fe02ee986a7f71fa36694da71e8089932db9aa2e20f4f33246 glib2-devel-2.56.4-165.el8_10.aarch64.rpm ee63a34148d36634a3504684447b8cf3ff5333ebf08872b01afc90032e551d7e glib2-fam-2.56.4-165.el8_10.aarch64.rpm 4f7604610757904b36c8eba37dadfc7c9a0e52bd55eb52abc66776779b2253b1 glib2-tests-2.56.4-165.el8_10.aarch64.rpm 67e1dc6fc2009d86f11acfcac2f72f6ef5680ab965bbddd50677fa56095d2db3 RLSA-2024:8922 Low: bzip2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for bzip2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. Security Fix(es): * bzip2: out-of-bounds write in function BZ2_decompress (CVE-2019-12900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bzip2-1.0.6-27.el8_10.aarch64.rpm 397fce5500333eaaa87766633b3d080148c9fbcd6304bb0784d91ff032da8f04 bzip2-devel-1.0.6-27.el8_10.aarch64.rpm 47f96bdbbaaeacdeb306a8fd294ed0eeb3d619dbd100e9c28ce48675d40a91c1 bzip2-libs-1.0.6-27.el8_10.aarch64.rpm 8fbd668ba51186e5a354fc8bcc202137df47f3adac55e90dae8705135e0c8e58 RLSA-2024:9502 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: DoS via XML_ResumeParser (CVE-2024-50602) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-16.el8_10.aarch64.rpm 7037c7a56176475a86b60c53f3e869b4986e90be8c1d1e768085979d139e57ec expat-devel-2.2.5-16.el8_10.aarch64.rpm cf24481a4922fdd361475c9386c2ff6808b59a6933ee090b083dca700eb7d033 RLSA-2024:9573 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: infinite loop while reading websocket data (CVE-2024-52532) * libsoup: HTTP request smuggling via stripping null bytes from the ends of header names (CVE-2024-52530) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-6.el8_10.aarch64.rpm 2a1fe301ff01bb3d8624a56a099a3e43f2b604013f9440dde82a537bef16556d RLSA-2024:9689 Low: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: heap-based buffer overflow in finish_stab in stabs.c (CVE-2018-12699) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms binutils-2.30-125.el8_10.aarch64.rpm 3043495e89562c2c01a8e8071d49f7fc08ab02b59a69bb6a73c6df7646d6e038 RLBA-2019:3534 libsemanage bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms libsemanage-2.9-10.el8_10.aarch64.rpm ca028198679e8579f0038396b037c4dbec2cfe28ad3d1b68b86fa8ddfe088878 python3-libsemanage-2.9-10.el8_10.aarch64.rpm e741232e67fcf5ac4f38ece49edccf8e217593cbaf46dd3ebe2ba7f01ef7c7e8 RLSA-2024:10281 Moderate: kernel:4.18.0 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: edia: dvbdev: fix a use-after-free (CVE-2024-27043) * kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (CVE-2024-27399) * kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (CVE-2024-38564) * kernel: mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.30.1.el8_10.aarch64.rpm fecc2f5e501a41a3a305f71aa1adc43ecb6874e588069b1bbae2e57f3d747484 kernel-4.18.0-553.30.1.el8_10.aarch64.rpm 2247c4f03ddeccfdc88e4285938571f297a755c724560489092139e568dfbc4b kernel-abi-stablelists-4.18.0-553.30.1.el8_10.noarch.rpm 987a44cd1a13de87d1bab74d90dae7cb192b773b48a381312fd96c937cd7be52 kernel-abi-stablelists-4.18.0-553.30.1.el8_10.noarch.rpm 987a44cd1a13de87d1bab74d90dae7cb192b773b48a381312fd96c937cd7be52 kernel-core-4.18.0-553.30.1.el8_10.aarch64.rpm 4153c4d0754c6804d7a64649c7aa0bfba06ad17ec99e73490a3507fcf0300c01 kernel-cross-headers-4.18.0-553.30.1.el8_10.aarch64.rpm 8fa3e0b7c1da91231a6ec6de701ea8bb571f58155b69ee1eba13143bf500850b kernel-debug-4.18.0-553.30.1.el8_10.aarch64.rpm 5d3bbc09a9a282711086b8d4738bc75b8be372d1d63d73260bb97435fd90760c kernel-debug-core-4.18.0-553.30.1.el8_10.aarch64.rpm d340f4bbd2e2e3ce1ad97c23382f7a900f27734ed4c1e5a668f37fb04f0e6159 kernel-debug-devel-4.18.0-553.30.1.el8_10.aarch64.rpm 93e2908df490e9d7b3bfc49e3539013c48f40e5e3c5dbc4632fcbc3374eb568a kernel-debuginfo-common-aarch64-4.18.0-553.30.1.el8_10.aarch64.rpm 70ae250108fb56b7b198fc1884a1b2842f3e705315241eace36735685a0093d8 kernel-debug-modules-4.18.0-553.30.1.el8_10.aarch64.rpm 17914bf79e3ed39e44299c542559a44d9597ecde1a587bab92c512bc279a69bf kernel-debug-modules-extra-4.18.0-553.30.1.el8_10.aarch64.rpm 8d52f2a3b3c09b9722ae9e599ad440b1a34bf8cc7fb8a55f2a0be62b33f4d581 kernel-devel-4.18.0-553.30.1.el8_10.aarch64.rpm b2be8194c670084430868b4b7a3c5499c7ecc816d9076a407cae7c390bb574a3 kernel-doc-4.18.0-553.30.1.el8_10.noarch.rpm f86c40b31ee92244aa0ac6c4b4d815bb0649440a2df89a12610ea5b6ace3d8bb kernel-doc-4.18.0-553.30.1.el8_10.noarch.rpm f86c40b31ee92244aa0ac6c4b4d815bb0649440a2df89a12610ea5b6ace3d8bb kernel-headers-4.18.0-553.30.1.el8_10.aarch64.rpm d0d137a1da14df1aeef7085acb7afc92cada0c619576332b34fa22767e9a1de0 kernel-modules-4.18.0-553.30.1.el8_10.aarch64.rpm eb10159647f0aea63120111281a637231054cfaef8131f455e4fcff74139c20d kernel-modules-extra-4.18.0-553.30.1.el8_10.aarch64.rpm 38eb33cfa2390fad4e2830a795e6dbb1ebf16b781b819b071275b63e8476429c kernel-tools-4.18.0-553.30.1.el8_10.aarch64.rpm f02f12f3ac5b6ec0ef8bacf8136e4136562764fd6d0d3c69e9edbde681c2b1e0 kernel-tools-libs-4.18.0-553.30.1.el8_10.aarch64.rpm 717f484ba8db278959087f1df71384c12df233a06f140100cd00d0e3da8a3039 perf-4.18.0-553.30.1.el8_10.aarch64.rpm 8688437b0a8f31c1175b9e1db48acf125ce6ebc3de04d933e53856d938aa5bf3 python3-perf-4.18.0-553.30.1.el8_10.aarch64.rpm 78bd0269e7c3640e832b52efdaa07396f3b327ee2b0ff215e6949ae0fd59459c RLSA-2024:10379 Important: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * pam: libpam: Libpam vulnerable to read hashed password (CVE-2024-10041) * pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass (CVE-2024-10963) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms pam-1.3.1-36.el8_10.aarch64.rpm 7f94167ade58c2d8ff1a19169442cab4870db20b5f2a48e81f7da24aca395a25 pam-devel-1.3.1-36.el8_10.aarch64.rpm 1f0350f0e382346e0d6088881c9566c3cf1b2bdcdf6e8ac58acc19aa9ed8eb8c RLBA-2024:10663 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * Prepare new plugin for kea dhcp server (JIRA:Rocky Linux-40285) * [RFE] Sudo plugin is not capturing certain logs. (JIRA:Rocky Linux-56747) * Create bootc plugin (JIRA:Rocky Linux-58177) * [rebase] rebase sos to 4.8.1 into Rocky Linux9 (JIRA:Rocky Linux-64159) * [rebase] rebase sos to 4.8.1 into Rocky Linux8 (JIRA:Rocky Linux-64160) * sos upload does not deal with 1GB limit (JIRA:Rocky Linux-22732) * Requesting sosreport be updated to collect information related to rhc-worker-playbook (JIRA:Rocky Linux-27555) * Include /sys/kernel/debug/sched/debug in sosreport (JIRA:Rocky Linux-44353) * [Hyper-V][Rocky Linux-9][RFE] Capture the Hyper-V balloon debugfs file located at /sys/kernel/debug/hv-balloon in sos report (JIRA:Rocky Linux-45980) * [REF] Capture authselect.conf (JIRA:Rocky Linux-48608) * RFE: lru_gen is required to be included in sos (JIRA:Rocky Linux-50917) * Unexpected formating changes in plugin and presets listing (JIRA:Rocky Linux-57675) * sos upload does not deal with 1GB limit (JIRA:Rocky Linux-58947) * sos report collects credentials in HTTP(S)_PROXY environment (JIRA:Rocky Linux-60130) none-baseos-rpms sos-4.8.1-1.el8_10.noarch.rpm 798f84da4d24032635a4088de2570411bf1ef5c2a039d7ae23c2a2b822a01161 sos-4.8.1-1.el8_10.noarch.rpm 798f84da4d24032635a4088de2570411bf1ef5c2a039d7ae23c2a2b822a01161 sos-audit-4.8.1-1.el8_10.noarch.rpm 1ec3f7ba0687d21e7f1818a2610cbdec6c71b77e0052f295c79b111f5480b70f sos-audit-4.8.1-1.el8_10.noarch.rpm 1ec3f7ba0687d21e7f1818a2610cbdec6c71b77e0052f295c79b111f5480b70f RLBA-2024:10735 autofs bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * Sporadic mount failures with amd program maps on Rocky Linux8 (JIRA:Rocky Linux-52402) * sporadic autofs daemon segfaults (JIRA:Rocky Linux-61670) none-baseos-rpms autofs-5.1.4-114.el8_10.1.aarch64.rpm 650321cf6f80121fffe5e05aa68c067abca82c45d2aea81a5cdf6803454487d3 RLSA-2024:10779 Moderate: python3:3.6.8 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python: Virtual environment (venv) activation scripts don't quote paths (CVE-2024-9287) * python: Improper validation of IPv6 and IPvFuture addresses (CVE-2024-11168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-3.6.8-69.el8_10.rocky.0.aarch64.rpm 46a75dfa860f0c1a085c6cf0182dfd570a52432d6ddf9c3c234cee2545098b89 python3-libs-3.6.8-69.el8_10.rocky.0.aarch64.rpm 6ab04b2b588980c3cc1215845410757c3dcbe0afe36e2bb877804ff83d7da777 python3-test-3.6.8-69.el8_10.rocky.0.aarch64.rpm 77f57cc1198dfae71a188463e66c94993c9f6481ee852473c74e27d66d15d066 RLSA-2024:10943 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695) * kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (CVE-2024-49949) * kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (CVE-2024-50082) * kernel: arm64: probes: Remove broken LDR (literal) uprobe support (CVE-2024-50099) * kernel: xfrm: fix one more kernel-infoleak in algo dumping (CVE-2024-50110) * kernel: xfrm: validate new SA&#39;s prefixlen using SA family when sel.family is unset (CVE-2024-50142) * kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE (CVE-2024-50192) * kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() (CVE-2024-50256) * kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans (CVE-2024-50264) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.32.1.el8_10.aarch64.rpm bdb68dd7b23dee10fc6bad28e5a468e5d1a8bee3edaf5644d7535dd16134e8c7 kernel-4.18.0-553.32.1.el8_10.aarch64.rpm f194bef08371ad21c5d853dddf388056abef01b8362d72b111e54bd213d8afd8 kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm ee3466f0292e8790260c9bc452911cc81836a95b096a75066525db2c31f2219b kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm ee3466f0292e8790260c9bc452911cc81836a95b096a75066525db2c31f2219b kernel-core-4.18.0-553.32.1.el8_10.aarch64.rpm 8ed45f046efa186effc18e3cc75f77da9740d20e0c3076237881f095d6e27356 kernel-cross-headers-4.18.0-553.32.1.el8_10.aarch64.rpm be6ad8cb463b3dc7b18e3daa4aed94abbf5913d989c1dc61f77c84585845236a kernel-debug-4.18.0-553.32.1.el8_10.aarch64.rpm 7aa1f9fa7570ba5a7b17887579171248ec08e163b7015dc1a7f341cba4acd14c kernel-debug-core-4.18.0-553.32.1.el8_10.aarch64.rpm 8ed4a5334fef4315d2ad7705512db695ba5fcfd92a0673eca160b49dd94e275e kernel-debug-devel-4.18.0-553.32.1.el8_10.aarch64.rpm 57eb6c6583cdc95cc347211416b117d308fdec575d1d33556d494e4064a151f1 kernel-debuginfo-common-aarch64-4.18.0-553.32.1.el8_10.aarch64.rpm 9ecd7483fdc39db50c6d3a652ae3372e7ad13f97efb06718d8c719f66628fce2 kernel-debug-modules-4.18.0-553.32.1.el8_10.aarch64.rpm 7424116e6d1ed9c4dad75916e1fe6d51783cb861e2e34e68729bcff8951432f2 kernel-debug-modules-extra-4.18.0-553.32.1.el8_10.aarch64.rpm d4f69cf2b1dfb5e9a7f5bfe85f51607e137f582b9681eb9b300b192a94d40772 kernel-devel-4.18.0-553.32.1.el8_10.aarch64.rpm 2afdbaa459f978b4a9262d0f37b7281cb160e4a9377c763979bf6d439e102173 kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm b5b18a468c2208f1c3ba868ed85b20a953ec09437e07c3ef7ec727eaf4bb8ca4 kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm b5b18a468c2208f1c3ba868ed85b20a953ec09437e07c3ef7ec727eaf4bb8ca4 kernel-headers-4.18.0-553.32.1.el8_10.aarch64.rpm 0ceff30b718b1f7f4de765d4e21414deaf541ab02606a1846bf6af6f7cdc6f39 kernel-modules-4.18.0-553.32.1.el8_10.aarch64.rpm 70d1be0a5e5addac281f883550fe00e45242bc5cc50a3da1bb93dd16242b8fb0 kernel-modules-extra-4.18.0-553.32.1.el8_10.aarch64.rpm 3d5bb03c488fc41a52134da718ed883852c3a3aaa04ddcb7fe67eea64a0bee3c kernel-tools-4.18.0-553.32.1.el8_10.aarch64.rpm 9910661e00dde2159080dc71acec43ae1d81c897c93bb51989781b3a994e1542 kernel-tools-libs-4.18.0-553.32.1.el8_10.aarch64.rpm d399ce63a1c969b350579502db4e4ccfbb4ce5b9a4b644cb86cb8ab4416826cc perf-4.18.0-553.32.1.el8_10.aarch64.rpm 713a755c4aece4068794ae226b1dbf443062c2dda654fd760253e75ff3f7b776 python3-perf-4.18.0-553.32.1.el8_10.aarch64.rpm d5da93259d1139c27d07a1d18d50dd253aef41225a993fcd8ddfbd1cf3166569 RLBA-2024:11151 sssd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * [RfE] SSSD Failover Enhancements [rhel-8.10.z] (JIRA:Rocky Linux-39085) * SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z] (JIRA:Rocky Linux-66267) * sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z] (JIRA:Rocky Linux-66272) * possible regression of rhbz#2196521 [rhel-8.10.z] (JIRA:Rocky Linux-66277) * Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z] (JIRA:Rocky Linux-67128) * Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z] (JIRA:Rocky Linux-67671) * sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z] (JIRA:Rocky Linux-68507) none-baseos-rpms libipa_hbac-2.9.4-5.el8_10.1.aarch64.rpm f82f210be0a12fbb62adfcfe5cd39b29e9e93daf494a0d5b61cc56187c6e61fd libsss_autofs-2.9.4-5.el8_10.1.aarch64.rpm 2952ddbc412ea95062c0930de2722c6988ec10ce5ab91ab46e94c8963c9ec7f5 libsss_certmap-2.9.4-5.el8_10.1.aarch64.rpm 8a3c0d0ea315a3dfc0b10b0b7f4da57890040518649fbc907c850e626c1f0a9f libsss_idmap-2.9.4-5.el8_10.1.aarch64.rpm a7c9f933d4a4763ec4f0b930f2c805737336c7eee9dde291b3403a8eb5ffa91f libsss_nss_idmap-2.9.4-5.el8_10.1.aarch64.rpm b7e02943638258490a2ce1a4fe71e5e613929237daa85511a3221a18ca0c3148 libsss_simpleifp-2.9.4-5.el8_10.1.aarch64.rpm 9509197ff86b2c3f5fedd1593edb1e255dc4a211be25ecb3f8028ddb9ed638d6 libsss_sudo-2.9.4-5.el8_10.1.aarch64.rpm b6f3c6cb75f2f4e3ea19cce9189ffb4626f8a08a5a33edb2e7ac6b0428b3ccc0 python3-libipa_hbac-2.9.4-5.el8_10.1.aarch64.rpm 4b1b8b61792b18ee69f3e8e34f7d90547f6f451dc7978ceafdce635c3b51c540 python3-libsss_nss_idmap-2.9.4-5.el8_10.1.aarch64.rpm 394c2800c8973374c47b2b07986d6e05ddef47af101fc5f5c7cc8cc839dc20f0 python3-sss-2.9.4-5.el8_10.1.aarch64.rpm e7486d6be29a61a49159e47c6434c0775169575cc46870095e6347b88112b54e python3-sssdconfig-2.9.4-5.el8_10.1.noarch.rpm e3a6b585dd61eaa2c7b007ad3e6ea3e25388ba82e0a158e8de6d669eb9359411 python3-sssdconfig-2.9.4-5.el8_10.1.noarch.rpm e3a6b585dd61eaa2c7b007ad3e6ea3e25388ba82e0a158e8de6d669eb9359411 python3-sss-murmur-2.9.4-5.el8_10.1.aarch64.rpm 1337c8e5a9e56593878a1979dd152f58845601a4628e6e2a9cb9013119c2530e sssd-2.9.4-5.el8_10.1.aarch64.rpm 7018e7de52fc9e67e2e49e3b3f05a62c1d43c0d60e150a551de865bf4749931d sssd-ad-2.9.4-5.el8_10.1.aarch64.rpm cc868dc0db3b399c292306d3bb6df5aeb9476e2343644055489646173ccf0778 sssd-client-2.9.4-5.el8_10.1.aarch64.rpm ca03e91ff00ff4d2fd05595ef83d55c269677eb37a9bd05d48d15cc465b550bb sssd-common-2.9.4-5.el8_10.1.aarch64.rpm da781c4c035c7b1261e36ed1bcca8a599be9180379336229d09488af11434991 sssd-common-pac-2.9.4-5.el8_10.1.aarch64.rpm 69f2b6bfb4ca824f2c0f5984b202760691e257f334eb3fe98ce9629b41df3222 sssd-dbus-2.9.4-5.el8_10.1.aarch64.rpm 41ba1b69de02f6f8ac9560a69b5149428390d302b1cb301fa483a690ffaf1bb9 sssd-ipa-2.9.4-5.el8_10.1.aarch64.rpm 1e8807770fb1c0365bb14b3cdbd8cb44ded2b7484ad456525ce30413ebbf321b sssd-kcm-2.9.4-5.el8_10.1.aarch64.rpm 047818fc70ff651d5e71c1037e9ba1b59ff0b0d42b4e9752ab302cce57415f73 sssd-krb5-2.9.4-5.el8_10.1.aarch64.rpm 2a5b4105c313974ebdbb4503277486922400042e585d98dd9dcaac8262bd33d8 sssd-krb5-common-2.9.4-5.el8_10.1.aarch64.rpm 3b92e8c724d5479f293817501c23f4a427040dfc9601dee39d7e7b6f6673a33f sssd-ldap-2.9.4-5.el8_10.1.aarch64.rpm c2704c4756beb440f22ce8bcb1fe8e3eb354a990a2473182fcdef5a1dfdeee9f sssd-nfs-idmap-2.9.4-5.el8_10.1.aarch64.rpm 965f785a4716ed38b75af18365f5af62d81908ec08ff20fab9b1ca27e404574b sssd-polkit-rules-2.9.4-5.el8_10.1.aarch64.rpm 95188a3d42afd17c885f0a8b31bf24d15b9661afac23f2813a2603c784096ae3 sssd-proxy-2.9.4-5.el8_10.1.aarch64.rpm cafd6c291319bc2846af22eb2c1952a209325a26f26ca67010533112bf0aa5e4 sssd-tools-2.9.4-5.el8_10.1.aarch64.rpm 2c399e1bf8a708136effd261401f303d9fbfd10629832693677121b1f3176d9a sssd-winbind-idmap-2.9.4-5.el8_10.1.aarch64.rpm f4bfdde8cef7a8099faee652e883d6da840af6fabf0bf59f192e5e532a4960d0 RLBA-2024:11152 samba bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * smbd-notifyd O(n*n) performance issue ( https://bugzilla.samba.org/show_bug.cgi?id=14430 ) [rhel-8.10.z] (JIRA:Rocky Linux-63770) none-baseos-rpms ctdb-4.19.4-6.el8_10.aarch64.rpm 4356d8baad6aa989a649919d06e6a45379736e5077d86f0936a452886879c59f libnetapi-4.19.4-6.el8_10.aarch64.rpm bfb48993fe78db43b13e951d6b0ead365c70a678407d4670c99ee07a19cf87e5 libsmbclient-4.19.4-6.el8_10.aarch64.rpm 81151013f0f57a2cd3c5a8806abab624af6ee626f7b44d23e2a3bf724bd4f0a8 libwbclient-4.19.4-6.el8_10.aarch64.rpm 4016ebaa8dd6bdaf707623b25a06a78e807bf7843197516ea9b7de4c5f566ac5 python3-samba-4.19.4-6.el8_10.aarch64.rpm ec63985035dda461b8b40a6c29b79edee29a28659dc3736c4919456193abbc59 python3-samba-dc-4.19.4-6.el8_10.aarch64.rpm da1bf5c34f652a09042d1bcaa3a2029b927fe648625f92108998b1b1d64aa562 python3-samba-test-4.19.4-6.el8_10.aarch64.rpm a51e31c4c8c7bd0a0ab0030c81bde75466599db825f6c0560d2680c86dddfd5c samba-4.19.4-6.el8_10.aarch64.rpm e326b3f85c784b47e717cb632a8271fce36c8b00f660773c8b25ebb5ca0298ef samba-client-4.19.4-6.el8_10.aarch64.rpm c7100d1f92122ba7805d1bc7fd301acee227fc7139d86787cc86615198f04615 samba-client-libs-4.19.4-6.el8_10.aarch64.rpm 7bbd308f6c1af15dec79cb106ed6e414ede1dd2209054971f2e43c0266e15e65 samba-common-4.19.4-6.el8_10.noarch.rpm 9a4b9dc986484607e4c649c2418155d41c967a7aec8c811b8ad287bafabeec36 samba-common-4.19.4-6.el8_10.noarch.rpm 9a4b9dc986484607e4c649c2418155d41c967a7aec8c811b8ad287bafabeec36 samba-common-libs-4.19.4-6.el8_10.aarch64.rpm 2158b09ed5cee9ba8d43f22b22869335588808a322fa1fc4eab13278f95b7aa6 samba-common-tools-4.19.4-6.el8_10.aarch64.rpm 524d2226a5b56e3635b2355c8e35249ad528b2fff4a3abca56f286abea47f5c9 samba-dcerpc-4.19.4-6.el8_10.aarch64.rpm de480b19d95d7f5f259e8f748abfbe87d988f46d34790f6926d3beaed52668dd samba-dc-libs-4.19.4-6.el8_10.aarch64.rpm 0ab861630ffaca1e453c97029a6b121c653a28bddbab779945f45c957e910965 samba-krb5-printing-4.19.4-6.el8_10.aarch64.rpm 60cf5057c33ca5389697f81791c5ae1f8863b84a5897a92a61c75dfd4d9efa0d samba-ldb-ldap-modules-4.19.4-6.el8_10.aarch64.rpm 6022183e8911fc7854501b6eb8e35f545f03f32079a323a4b3f625f51fa3509b samba-libs-4.19.4-6.el8_10.aarch64.rpm 93eb35ba2d94599116238206f97d8250eb27f83687459733d45300c244d123f5 samba-pidl-4.19.4-6.el8_10.noarch.rpm 2950ff4fd00e1e3ec495f8f484f8f7bfd16c1efbbeea2fa120a03b69b44fa3e5 samba-pidl-4.19.4-6.el8_10.noarch.rpm 2950ff4fd00e1e3ec495f8f484f8f7bfd16c1efbbeea2fa120a03b69b44fa3e5 samba-test-4.19.4-6.el8_10.aarch64.rpm 4fc83f8369b02e0298ef5acf01c2071daf9436ab4764fc17c50a3738fd47f1d3 samba-test-libs-4.19.4-6.el8_10.aarch64.rpm 5e5f1185c77e9d3de4323792e9a3557100fa127b7cd8d3c52267decce0a4a5d9 samba-tools-4.19.4-6.el8_10.aarch64.rpm 8f5c303c192f0e622af5d194837ccbf257811a857f4ef7d9787bc7e1399f4702 samba-usershares-4.19.4-6.el8_10.aarch64.rpm d1b5f3af14c0dfbd945fe484acc976fdece4a031d3aa2e3b4bf097319c069846 samba-winbind-4.19.4-6.el8_10.aarch64.rpm 88d1f0f34f7fc3e10d277552bc378475c125721361e9d3024ab4b03b704cbaf8 samba-winbind-clients-4.19.4-6.el8_10.aarch64.rpm 78639d9ebdc05a123348830c0ba305b42d609ee36a224bed4eaabca56d4c773d samba-winbind-krb5-locator-4.19.4-6.el8_10.aarch64.rpm 35af858cc3f9c328b885a2449bfc2f5c6945220cecf3e7bc54545e6155b28723 samba-winbind-modules-4.19.4-6.el8_10.aarch64.rpm f639feb2ea2a63cfe7737045c886800a70bf3ecf85bcacbf7e03743dbfd78df4 RLBA-2024:11153 mdadm bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for mdadm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The mdadm packages contain a utility for creating, managing, and monitoring Linux multiple disk (MD) devices. Bug Fix(es): * [INTEL Rocky Linux8.10.z BUG][VROC] Fix update_subarray on active volume - missing patch (JIRA:Rocky Linux-20833) * [Rhel8.10.z] mdadm: After adding entry to /etc/mdadm.conf getting messages "localhost.localdomain:101" cannot be set as name. Reason: Not POSIX compatible. Value ignored" (JIRA:Rocky Linux-45608) none-baseos-rpms mdadm-4.2-16.el8_10.aarch64.rpm b93eaeac81fa40b5843e739e27deb56cdf6c78614472bf99427920709def32d4 RLBA-2024:11157 unzip bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for unzip. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The unzip utility is used to list, test, and extract files from zip archives. Bug Fix(es): * Unzip Fails on Large Zip Files (1TB) - End-of-centdir-64 Signature Error [rhel-8.10.z] (JIRA:Rocky Linux-45997) none-baseos-rpms unzip-6.0-47.el8_10.aarch64.rpm d6cb2267217b2740846db6a6d1b49baed06148e4e68fd4c90347e2c5724cd519 RLBA-2024:11158 systemd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * Idle session setting kills the GDM process (JIRA:Rocky Linux-19215) * User logins are super slow when system has tons of disks attached (JIRA:Rocky Linux-5877) none-baseos-rpms systemd-239-82.el8_10.3.aarch64.rpm 1fe92e1572f31d479cb7b71e93006127ffed578842c4c9436780735113f96c27 systemd-container-239-82.el8_10.3.aarch64.rpm 6ab1872bb4f2e4c7a7ca094c5176c0d0864d5d34303614230b5f0fe7539cb88f systemd-devel-239-82.el8_10.3.aarch64.rpm 5d13cf11f1d92ec8d3fac9cfba257ac1251dd0ec4a6a6f4fcf18a6437d69e9c9 systemd-journal-remote-239-82.el8_10.3.aarch64.rpm 18d21557535a23f06c6c5b77cdb41c70710949cf240fcd972f9d26be5cae3c6a systemd-libs-239-82.el8_10.3.aarch64.rpm ca42d2eb554a03724cc6c419ab645883e830188c0f8681529baada1317a3ab8d systemd-pam-239-82.el8_10.3.aarch64.rpm 8051b4e49eecde3715a0e6f661fe6d9c61a60caf4a173ea7b8bc201de4b20385 systemd-tests-239-82.el8_10.3.aarch64.rpm 1354cf4e6683f0c1d1973aea4f23d824e1219ea9f8c741baac3e88f6ddf7505a systemd-udev-239-82.el8_10.3.aarch64.rpm 3a04c8051fb57e6bc2786a9c416ecb4c46874df7f5b3d001aca040a553dacff5 RLBA-2024:11162 vdo bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for vdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The vdo packages provide Virtual Data Optimizer (VDO), which is a block virtualization technology that enables you to create compressed and deduplicated pools of block storage. Bug Fix(es): * Rocky Linux In-Place Upgrade engagement using LEAPP and am seeing the /usr/libexec/vdoprepareforlvm --check fail on a read-only disk. (JIRA:Rocky Linux-65721) none-baseos-rpms vdo-6.2.11.5-14.el8_10.aarch64.rpm d292acdaf9d13dd7ba7d0683f8de67872f98a97cd8a28e4341a10efa687d6596 vdo-support-6.2.11.5-14.el8_10.aarch64.rpm 3cab49c7a53988d55675f1145ca056f910991c7c10cb8d97b2bff4d3b178e273 RLSA-2025:0012 Moderate: python-requests security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: subsequent requests to the same host ignore cert verification (CVE-2024-35195) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-requests-2.20.0-5.el8_10.noarch.rpm a2aa9a996f107bf060404602ea15831f10aa12417dc027cde6dca0d200cde385 python3-requests-2.20.0-5.el8_10.noarch.rpm a2aa9a996f107bf060404602ea15831f10aa12417dc027cde6dca0d200cde385 RLSA-2025:0065 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: i40e: fix race condition by adding filter's intermediate sync state (CVE-2024-53088) * kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust (CVE-2024-53122) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.34.1.el8_10.aarch64.rpm eb5b47054da49193a6ad22e651f651fd087af3c88ef7584b935253961691f208 kernel-4.18.0-553.34.1.el8_10.aarch64.rpm fb824d88a21764d26827ccd05ed9c112fae7932c6f84366410cd36b34397b021 kernel-abi-stablelists-4.18.0-553.34.1.el8_10.noarch.rpm 3ae7c04c9cb5753adfe3b32eb74aa7eec73935a89fdf6db7efb56283a9f4ab20 kernel-abi-stablelists-4.18.0-553.34.1.el8_10.noarch.rpm 3ae7c04c9cb5753adfe3b32eb74aa7eec73935a89fdf6db7efb56283a9f4ab20 kernel-core-4.18.0-553.34.1.el8_10.aarch64.rpm 815ba9d78d20942fb183cb579622859359e68ed7ea2e802443afe0273727b259 kernel-cross-headers-4.18.0-553.34.1.el8_10.aarch64.rpm ba414687cce61d01be6ac8b40c5b0f38e61cb0f0fad90661b10db501e4b5e53b kernel-debug-4.18.0-553.34.1.el8_10.aarch64.rpm 9f0735ab9beb585032775f991e7c5bc1dc97d95310ca3f4126fb4fe2c426c187 kernel-debug-core-4.18.0-553.34.1.el8_10.aarch64.rpm dfa30dc42c629691157c1fd2d9ae58bf6ef798cdb38650166486559fb39e488a kernel-debug-devel-4.18.0-553.34.1.el8_10.aarch64.rpm 76e697ebb98b6a5550e5d0731ff8681817c961701c51d430dbe423f745516dc3 kernel-debuginfo-common-aarch64-4.18.0-553.34.1.el8_10.aarch64.rpm 3e6c94aa3f647cd99a1f99124d255f8b8cfe5d0020690527ff35d6f4d4dcc6a1 kernel-debug-modules-4.18.0-553.34.1.el8_10.aarch64.rpm 905cd22fd0d525daf80041c8bb61e63271c0f4f6ee1b3f017d67723de7211c3b kernel-debug-modules-extra-4.18.0-553.34.1.el8_10.aarch64.rpm 5b9a01df67eb30b32409ac9fcb234a91538b4a7ba9dbfa34336eff4a76d43670 kernel-devel-4.18.0-553.34.1.el8_10.aarch64.rpm 558da41ebc69a79790426f04720bef22e66f0179a5950ff8d09ec0f7834b4bf5 kernel-doc-4.18.0-553.34.1.el8_10.noarch.rpm 2834db38150c9c5ab8fa2bb647c483fad1df44ae26899a3b97185cd553592b7a kernel-doc-4.18.0-553.34.1.el8_10.noarch.rpm 2834db38150c9c5ab8fa2bb647c483fad1df44ae26899a3b97185cd553592b7a kernel-headers-4.18.0-553.34.1.el8_10.aarch64.rpm be52267339663d30c4479644cc15381be0f349dbb6a0cf4a412bc363289304bf kernel-modules-4.18.0-553.34.1.el8_10.aarch64.rpm cfa3685f25ca17b3feca81f190cc09d71754a152fd6be6a76830b2e1ea8e14c4 kernel-modules-extra-4.18.0-553.34.1.el8_10.aarch64.rpm ff1213f3c9dc5eda8314fb587e259115e83daaed9932301aa493a986fcbb7413 kernel-tools-4.18.0-553.34.1.el8_10.aarch64.rpm 15504230c77fc49b76596e12b2efd2e5a2a9769edfff3da69c60e95f0cf0b870 kernel-tools-libs-4.18.0-553.34.1.el8_10.aarch64.rpm de74406fa2f66be4ec7f13de08edd91ef7f3579cd3013b74bf44f546340686c0 perf-4.18.0-553.34.1.el8_10.aarch64.rpm db965afb8e375b807bb018ded26063d3116c31d00806d5046dd05c2b2788addc python3-perf-4.18.0-553.34.1.el8_10.aarch64.rpm 39be6cbaf414222251be7e0c49e78a2326b5ced58294df583e925771fa061d4c RLSA-2025:0325 Important: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: Info Leak via Uninitialized Stack Contents (CVE-2024-12085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms rsync-3.1.3-20.el8_10.aarch64.rpm 8feb5e94ea32f8b3a2c30e531aa0d92534f1a19a3e83288254cd7d55e6966b10 rsync-daemon-3.1.3-20.el8_10.noarch.rpm 0bcfc271d4ebce5f6096625a78865d7e0d3012fb43fced30b9cb41976c525b0c rsync-daemon-3.1.3-20.el8_10.noarch.rpm 0bcfc271d4ebce5f6096625a78865d7e0d3012fb43fced30b9cb41976c525b0c RLSA-2025:0083 Low: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: libppd: remote command injection via attacker controlled data in PPD file (CVE-2024-47175) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.2.6-62.el8_10.aarch64.rpm a6447a9b49ef073d1b25965cf05ad02be7adb6ecfbdbddd23a50a46dd7f5dc02 RLSA-2024:3269 Important: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: Out of bounds write in iconv may lead to remote code execution (CVE-2024-2961) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-251.el8_10.11.aarch64.rpm 8bf2144b637a7a9a89fc0f2cd82483cb7490c1f13ca05210d84bdccc9dc3026c glibc-all-langpacks-2.28-251.el8_10.11.aarch64.rpm 561332ebe470503e89ca888b4f07fe6c3caa40dfcee8dbd0467efca9660a275a glibc-common-2.28-251.el8_10.11.aarch64.rpm a7d19291b66def2cabbfb1502cf01b475c1e60bbb2128044c1d52c1efb658d7b glibc-devel-2.28-251.el8_10.11.aarch64.rpm a7a5fe42e5c4f152f134ef9af44ca0a451e0ad686915b13d5153240027fa6047 glibc-doc-2.28-251.el8_10.11.noarch.rpm 3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe glibc-doc-2.28-251.el8_10.11.noarch.rpm 3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe glibc-gconv-extra-2.28-251.el8_10.11.aarch64.rpm 3c7ef137e741bcf34fd2ac0285bd5d97d504aeaf0459cf037754e7d979152a90 glibc-headers-2.28-251.el8_10.11.aarch64.rpm 3c8135c5b4bf318a49d889992b90bfde7804cc0bb61a11d5249d4d1d4a4e547a glibc-langpack-aa-2.28-251.el8_10.11.aarch64.rpm c1f5799e3792c627b60c18143003f4578d4f63ab00565d027c9a20d7a4b857dc glibc-langpack-af-2.28-251.el8_10.11.aarch64.rpm 817c1b04995571b9fb7d779f51c36d595e584438ff96d449af72ae2818d22c18 glibc-langpack-agr-2.28-251.el8_10.11.aarch64.rpm 92ef404176642ab94b209d1e9ac17e2fe94818bf98fa25ec6e6821c61e3bd77f glibc-langpack-ak-2.28-251.el8_10.11.aarch64.rpm 4b7083af9ee692aab03e54d8ca50e7c511678f0b7997020932a0b44c2000d8a1 glibc-langpack-am-2.28-251.el8_10.11.aarch64.rpm a1f0562a595b738f1562878012cbadecd396a29676882dbe3809e445feadffe4 glibc-langpack-an-2.28-251.el8_10.11.aarch64.rpm 9c88634dddf40037bcd7353b8af06ff646e79fcca42588644b25f69ae6f0f400 glibc-langpack-anp-2.28-251.el8_10.11.aarch64.rpm 8719fc28bc85824a2cfba84518a8cf74478db16966188243a452bd1638788047 glibc-langpack-ar-2.28-251.el8_10.11.aarch64.rpm 51104b53ebef4691d1debefbc30026f90be5c296500c05cf5ef12d7e1506bd5c glibc-langpack-as-2.28-251.el8_10.11.aarch64.rpm 214a5a36022e1bfbc6ff721e9f6be6b1bf6214d871fa729444f3a133c13320c1 glibc-langpack-ast-2.28-251.el8_10.11.aarch64.rpm 37e122fe6afeb85a2df3a02bd2d18de1f8f70ef1e9f30bc192f810c2598b5a30 glibc-langpack-ayc-2.28-251.el8_10.11.aarch64.rpm 72dcfb5e9518376c3726ef681730d114e7f6ea19bb0052070749b2519d442e8c glibc-langpack-az-2.28-251.el8_10.11.aarch64.rpm d5fd74ae5ee06f47d0d8e70b0f8374cf73875d3d33623aea98637a4f11ac95e7 glibc-langpack-be-2.28-251.el8_10.11.aarch64.rpm 717c2ea768a1971110703c3a82f7f5a6f2426775f27e8dd1c10f94afdff87167 glibc-langpack-bem-2.28-251.el8_10.11.aarch64.rpm 12aca8f3ed67ee060b72f350d6e834ba8c033ca573a7cd31cc404cd911166cd2 glibc-langpack-ber-2.28-251.el8_10.11.aarch64.rpm 55b6685ef58a552174e3fb17c74a79f4c3153a2ad0bb1361cfb3c0b6b31f2d2d glibc-langpack-bg-2.28-251.el8_10.11.aarch64.rpm 4df572be319fcb480c460f3683d4fe4715058b24749dedc37da7b7f95472f6ae glibc-langpack-bhb-2.28-251.el8_10.11.aarch64.rpm b8e8072ea13b6b1ae466733e11dc21ed0394cfbbfe8a27a6ee9e13e50077a5df glibc-langpack-bho-2.28-251.el8_10.11.aarch64.rpm b93539dc77148093aa17194fe300d3643f582d27ab552fbed5a66209cd424187 glibc-langpack-bi-2.28-251.el8_10.11.aarch64.rpm 63f5e3e2a32ba3c4aa5a3892de3c290774ef1384d10b6cb4d234a4957b140d91 glibc-langpack-bn-2.28-251.el8_10.11.aarch64.rpm 5994a723aadc45f87af9ebadbe4f049849948b44b9e59efc759c371689956ece glibc-langpack-bo-2.28-251.el8_10.11.aarch64.rpm 50c6c3eafcf1880e30e8ee190cd16c7b0da509439038f2946943c61b925ed813 glibc-langpack-br-2.28-251.el8_10.11.aarch64.rpm 8ad5a7c9910761e5d57a6640a401569361035b3a302ab404bfefc1de5514b543 glibc-langpack-brx-2.28-251.el8_10.11.aarch64.rpm 9444ac434b03bae428288d554710b8dd0440188360c25fd8aa1732b53421910b glibc-langpack-bs-2.28-251.el8_10.11.aarch64.rpm 3bc2c5220ed560f592c8db608d59791f5b5bda4696376e057d5bb6f4f32bd038 glibc-langpack-byn-2.28-251.el8_10.11.aarch64.rpm 77a145489f8a35be34c591a6d5d9d74a5b078e5e75928b5aa1e0e8fce44d1e6f glibc-langpack-ca-2.28-251.el8_10.11.aarch64.rpm 2497a690ba8d226e9229249359643bdf6ce7b3472d64a1b721e000d152ce6334 glibc-langpack-ce-2.28-251.el8_10.11.aarch64.rpm 399603d96e8a42103dc2202715e40050a6fbec8e9f84eb86c0c6345eae55d957 glibc-langpack-chr-2.28-251.el8_10.11.aarch64.rpm bb896a53acb25f726c3f0008065ad55b8e4f67cc1c6634fb8d734315e5bd7d22 glibc-langpack-cmn-2.28-251.el8_10.11.aarch64.rpm 370583d3056d60e8be21e40031ecb45fe69b3a9c14d1a4f813a4926a59390815 glibc-langpack-crh-2.28-251.el8_10.11.aarch64.rpm bd59fa722d63515bfa5da5003eb34a33e847a37a5e1e26583edd1ac0912be4d8 glibc-langpack-cs-2.28-251.el8_10.11.aarch64.rpm 6d21ecdb413e39c53b4c372d85edb1ced588e3e25dd913aeed564bd57e1fc11c glibc-langpack-csb-2.28-251.el8_10.11.aarch64.rpm 78acaf97e073639069964be82a22387d129073410b99fa51e9a028f517dea83b glibc-langpack-cv-2.28-251.el8_10.11.aarch64.rpm b46230a1697ef529ad357db8b9dcc574aa8bc4c9ac3077c2d6e463ecf0870429 glibc-langpack-cy-2.28-251.el8_10.11.aarch64.rpm 14d90fe7369befb167d3c5aaff4aadb164b805f9db74d18c03debb197e5516ed glibc-langpack-da-2.28-251.el8_10.11.aarch64.rpm 02495b2135bb105d1aa8adb11d4d7ed0f7a493ceeb4f5cd90e93159180989247 glibc-langpack-de-2.28-251.el8_10.11.aarch64.rpm 6868fd57130b7d90e55248d8bde8568f54e276300ef742cfcec2e542433ab4ec glibc-langpack-doi-2.28-251.el8_10.11.aarch64.rpm 1816b8663c366388001a6a8f05f0d22764a65576531f2f4b20c7c4195939d190 glibc-langpack-dsb-2.28-251.el8_10.11.aarch64.rpm 421bcfbdfcf96ae52c9ecffaf244d2a4bddbd7271c80b9d57569d46f19fa4408 glibc-langpack-dv-2.28-251.el8_10.11.aarch64.rpm d13f7c1201965dd841cfb1b32830faaae6d84e34576b96728f97ca26a504b965 glibc-langpack-dz-2.28-251.el8_10.11.aarch64.rpm b1ae543c24aa3574ceb9e6b031cda868e7bf6f775856af54e9a1370535945cbe glibc-langpack-el-2.28-251.el8_10.11.aarch64.rpm d45202778d3752984dd784ceb953389c24b95675f7414e2fd51202a970c87446 glibc-langpack-en-2.28-251.el8_10.11.aarch64.rpm 8b9bee322e0c462ecc058ce8a7f1e89bc3e462c113b133c4b838d83c639cd6c3 glibc-langpack-eo-2.28-251.el8_10.11.aarch64.rpm 594ee29328469731d54b1fbb2ffca7978ab80b65289ecfbb502f69f4cdce9b45 glibc-langpack-es-2.28-251.el8_10.11.aarch64.rpm 6a1fae7668c78813b5b92307f6b42a5f71037356b81e0b048d23fa4ebe846ab1 glibc-langpack-et-2.28-251.el8_10.11.aarch64.rpm bf48f7f2c5120b1d3e1de3c138e2f118e967a04bd7575c2386f13780af9446c4 glibc-langpack-eu-2.28-251.el8_10.11.aarch64.rpm fdd20d933e94d1b46c1360e0bf1f7d0ce42e0bdafdf72b468ae1578d2ab69376 glibc-langpack-fa-2.28-251.el8_10.11.aarch64.rpm 6e2c8d7655155baf95521631391d2bc76668f13bbf15b31ed23bb9b2cbee07e9 glibc-langpack-ff-2.28-251.el8_10.11.aarch64.rpm 6ed8431414814a7c243d606a09c0f2c2fda38fa361532806c64c1f5c60e5aaf1 glibc-langpack-fi-2.28-251.el8_10.11.aarch64.rpm f42806578258983c2c812d9a5792677ca1c49fb964a560f4a8ee4519d17a94b7 glibc-langpack-fil-2.28-251.el8_10.11.aarch64.rpm e3458d5fbccb2b10ce14035073669841d9fb5360421d42e6edb56a54e1257b02 glibc-langpack-fo-2.28-251.el8_10.11.aarch64.rpm 3de7afff4c2ecff20537d93d06b9ec9a2016b348a5872f9951210d17661851cb glibc-langpack-fr-2.28-251.el8_10.11.aarch64.rpm 15b1db73c739535cbfc7af8be5ba0072c08b274aa270f4034ba33951b127ace0 glibc-langpack-fur-2.28-251.el8_10.11.aarch64.rpm 0429c3f3f5c68a56269a96817760ff4fb8808f669d655757113f78e22f2d6f3b glibc-langpack-fy-2.28-251.el8_10.11.aarch64.rpm bcb7f68f8692c1c2d3c1031dfb44608c324463c14beff59422cf052d2c10f8d5 glibc-langpack-ga-2.28-251.el8_10.11.aarch64.rpm b6d1bf7fc8c882f5e5365bb69634c1f6dfca81fc43a4d38c962ad722c2da930a glibc-langpack-gd-2.28-251.el8_10.11.aarch64.rpm c61b4771a24fb9224f4f7b179577107a08a9614f4809a6fc5699cb34e1638ef4 glibc-langpack-gez-2.28-251.el8_10.11.aarch64.rpm e0b5ecbb388c01cf9c6c30640fa96810a1013f449899f7e11dc26b821b13dd60 glibc-langpack-gl-2.28-251.el8_10.11.aarch64.rpm 7c4be01ff7dd0b5762428a1bc4c61e6486982d2c761a0252dbe1c69253d57dba glibc-langpack-gu-2.28-251.el8_10.11.aarch64.rpm 3205a3a8affeb266aeaabefbae199b1b053622c5754178a71815d958f67b6b4d glibc-langpack-gv-2.28-251.el8_10.11.aarch64.rpm 7e2bdc8a38ed2cb29387a99d035ee88ce7c5579c80809c14405856ebd57d3beb glibc-langpack-ha-2.28-251.el8_10.11.aarch64.rpm bf1b07674ad5753da1689277197f133e8f31b4fd3051d2de046bc6f201395d9c glibc-langpack-hak-2.28-251.el8_10.11.aarch64.rpm 36fe080a2ec4490f74f4b70be40f864d2314c21e3def9832458e83b4bc36e1cb glibc-langpack-he-2.28-251.el8_10.11.aarch64.rpm eca3867f776e66a3f11bc7886194fa4681425339c165094314eb1f7c4e71f09a glibc-langpack-hi-2.28-251.el8_10.11.aarch64.rpm 9b6e327e6b1809437ffb816c54afb0b57e2e0c8b72b4a2714af840ae12f9161d glibc-langpack-hif-2.28-251.el8_10.11.aarch64.rpm e67326ae64b8a70d8681aa62128f8684eb4fa42f200c801c84e0c2eb1ec31fad glibc-langpack-hne-2.28-251.el8_10.11.aarch64.rpm 01f613f82d4f366deac05f2694dac68b851a081c3035b7ff5bbbca155ee3afb7 glibc-langpack-hr-2.28-251.el8_10.11.aarch64.rpm f6195606bf175908af0e9bd16a3ba55e3bdfff2c0241dbb584fa7760a8f9c71f glibc-langpack-hsb-2.28-251.el8_10.11.aarch64.rpm c8687fb1d3e5ef29a3965d5718ee5aee8b61e734f54e314c96fd9dfdfbca0ad6 glibc-langpack-ht-2.28-251.el8_10.11.aarch64.rpm 7581f69ed398cbd35313ea7f502019cdba52422d647437a66e4761dc0d03dd05 glibc-langpack-hu-2.28-251.el8_10.11.aarch64.rpm 37b9a33deb9552b222f133fe8199628b51bf2e5f268f370768a1f43803ba8414 glibc-langpack-hy-2.28-251.el8_10.11.aarch64.rpm b324115046c084439e075988aaea43bacdeee7a691a8e837b8a1092a5a45f74c glibc-langpack-ia-2.28-251.el8_10.11.aarch64.rpm 514885b5f7c45c05555f66ce23b210ed85e2c159583d0f4d63b07e0a96c2ffcb glibc-langpack-id-2.28-251.el8_10.11.aarch64.rpm b9c19611a0d02bc33ae55a8eabe19a446f3db84943367f6884edc17b9e5f8e3d glibc-langpack-ig-2.28-251.el8_10.11.aarch64.rpm 8473a031dcaf5545cca49819b9b25e51e3ce90123638cbef507bad89addc2cf8 glibc-langpack-ik-2.28-251.el8_10.11.aarch64.rpm 14f40ff2f8ed6bcf1737b51afb5346b21fc997a8ca87f4d5d8eb5c1e6a50bd1a glibc-langpack-is-2.28-251.el8_10.11.aarch64.rpm 9369985d661a3b517f9bac3ccb4c2c826a1abcae3be7da8f368791801e79fd43 glibc-langpack-it-2.28-251.el8_10.11.aarch64.rpm f016ba71839d868264a2b150374b82bd64da9875cad9a3ca4e627006641fd794 glibc-langpack-iu-2.28-251.el8_10.11.aarch64.rpm 1664c3489a7765f7e69456797118933430b9699280df9b4e2a54eea9c01c513f glibc-langpack-ja-2.28-251.el8_10.11.aarch64.rpm a36a4d0987e974533aef4ae060370289ffe993d968a8f24b0b84b20e0ebdebc0 glibc-langpack-ka-2.28-251.el8_10.11.aarch64.rpm 467cb501682fc87937105064592e2b63b120b75efce84b5adeacdab4e21e1de0 glibc-langpack-kab-2.28-251.el8_10.11.aarch64.rpm 66d03ebf7dce38409b419ddc6c9177aa79c35680c7fca652f32dec561ae48d1e glibc-langpack-kk-2.28-251.el8_10.11.aarch64.rpm 0f6fc872ca1c87e247cb604cd1c5d5f745a75f9e14ea4cd99f396b5f8e6d3d9a glibc-langpack-kl-2.28-251.el8_10.11.aarch64.rpm 0a472cfd403c7ed1a40f351cae26545ded7ae9fada2ed72aa60c897d077b4f4a glibc-langpack-km-2.28-251.el8_10.11.aarch64.rpm ae23d8a0e435d6580129f32e0cad354b36286ab4d327cff15389408c638aaac8 glibc-langpack-kn-2.28-251.el8_10.11.aarch64.rpm 493faf5a09d865f364f4541637700c6f9a3e767a2e5b71186d0382a76e2eb1e2 glibc-langpack-ko-2.28-251.el8_10.11.aarch64.rpm ff5b2f4781de59e193e9acf8a4a15a17030f274d2e8e06463fe346f95a88b29b glibc-langpack-kok-2.28-251.el8_10.11.aarch64.rpm 0ea93e3b3fdedee8e8320ec5d06fec2c1299c0e141794f8a752c766360a4e7f6 glibc-langpack-ks-2.28-251.el8_10.11.aarch64.rpm 82c400926dd1f4440d9131ab017ae7c329155217248982141632cbe414656c82 glibc-langpack-ku-2.28-251.el8_10.11.aarch64.rpm 74df8f814a2a551171ce85dd2f19ec7767151b9e14c72d50c0bd092f040e05e9 glibc-langpack-kw-2.28-251.el8_10.11.aarch64.rpm a06144da26ae59d91a52e6fa33934a22e628b9e551b6b84deed043a2d74c2377 glibc-langpack-ky-2.28-251.el8_10.11.aarch64.rpm 56d755eb7d0e2374ff0732055b18e5fc7b86069095164459a3f79181a2b5008f glibc-langpack-lb-2.28-251.el8_10.11.aarch64.rpm d0743872833849f28e759040c7c7fa043e615f87483c1a0f889d891df9a1cadc glibc-langpack-lg-2.28-251.el8_10.11.aarch64.rpm 05c76090953f93d82b9bf8964986e5c80d37e3245b927783d7d84a6f31b8dc54 glibc-langpack-li-2.28-251.el8_10.11.aarch64.rpm 84ba24727f9d9756009cb23c5290a609fb9f4d4174694b6524a7f3ecaf46b151 glibc-langpack-lij-2.28-251.el8_10.11.aarch64.rpm d4bcf173615131e94e9eafcffd8621ebb751b85025512b421ad2687b6f91ed40 glibc-langpack-ln-2.28-251.el8_10.11.aarch64.rpm fc79e137434c6641bb10c543f299dfffb96dab07d09c30cd1a8d1093b7952e28 glibc-langpack-lo-2.28-251.el8_10.11.aarch64.rpm 553aa714e6a5f39b71fdc21ddb94b9ecd04e36647ee53bdd40045ec5f765d800 glibc-langpack-lt-2.28-251.el8_10.11.aarch64.rpm 0d460e65188cc72e00bef11ff4a8baf905b8298452c1614273614be6ac4c5aa9 glibc-langpack-lv-2.28-251.el8_10.11.aarch64.rpm 9366eef1c3b3072029c8cda0bd0d5a49757c3acb0034573073eceb540e560f23 glibc-langpack-lzh-2.28-251.el8_10.11.aarch64.rpm 3f80a0d01cbc13744d73ba4ee7bfa41c623a481b18e9cae09d58c63da562bd40 glibc-langpack-mag-2.28-251.el8_10.11.aarch64.rpm 2987f3491084574292d312882a9578878558397eb91bfa69f0f2da3aee0fdd3f glibc-langpack-mai-2.28-251.el8_10.11.aarch64.rpm 19abb43a9b6a3c5cc0a225bb48abb4d23f5ebb577f28bb3c17535f85802aa8d4 glibc-langpack-mfe-2.28-251.el8_10.11.aarch64.rpm 81f1b2a037a9e551754d087cf5d1773d7c20013eedd1f114dff931fdd9270270 glibc-langpack-mg-2.28-251.el8_10.11.aarch64.rpm cf2a7faaa273e1e201f619384289899a4ca36bcba26023914c60f8b4a7c5d4aa glibc-langpack-mhr-2.28-251.el8_10.11.aarch64.rpm c1cf109ce2f067893c46b37870a16799bbb9f9eab371a562fba752364102b5d3 glibc-langpack-mi-2.28-251.el8_10.11.aarch64.rpm 3cb40cf917fc3ad2f070038b6c37658f34e46252a033002002d75cdc7bf81697 glibc-langpack-miq-2.28-251.el8_10.11.aarch64.rpm 4da3a2bc3de3e1b53ae6f64704b9da08f76b8f19dc24f5c4199e8c7a20368b13 glibc-langpack-mjw-2.28-251.el8_10.11.aarch64.rpm 6d0c586a908f885e6f548b38604839421164cb222249840a31f589b61c946cdb glibc-langpack-mk-2.28-251.el8_10.11.aarch64.rpm 62cbc7a5f79f739001fe4c23395aa70f77210c1ce2f387c657de8259d00f1b33 glibc-langpack-ml-2.28-251.el8_10.11.aarch64.rpm cd16b1819fe455e82f01c18ec62bb00b75c6ec8c81083eab2418dd86395d09bc glibc-langpack-mn-2.28-251.el8_10.11.aarch64.rpm 3879adb558a7d9ab044f5c59d813411488e844a7b384360d8a24f92abb342158 glibc-langpack-mni-2.28-251.el8_10.11.aarch64.rpm cb6c3d847e526a95e6e6724986312e80eacb82f77d5a0857ec26dbc28a321b23 glibc-langpack-mr-2.28-251.el8_10.11.aarch64.rpm 37d3d81664156984a3cde99212a872b278aaa28473143a94bb166561f04d4dfb glibc-langpack-ms-2.28-251.el8_10.11.aarch64.rpm 0a412df5c13954677276d7bef238cdf62c128ec98c27f0185b25936e5b92a62b glibc-langpack-mt-2.28-251.el8_10.11.aarch64.rpm 6af99ac8a625d30d16424660fb6790f121f2050636b9d275f7d998f9f6f2f002 glibc-langpack-my-2.28-251.el8_10.11.aarch64.rpm e529245316a26ab8935640609e56e55a92cd401cd726c95da6fcb5f516e96cea glibc-langpack-nan-2.28-251.el8_10.11.aarch64.rpm 4e3a44aa247ab464880f8ca21f3a67f1bd3eb2a3c30f18e329982b7da7f36475 glibc-langpack-nb-2.28-251.el8_10.11.aarch64.rpm c8e0f8153954c7503e25e33fcb8281d742829e985d2b25e7a57c55e8af9e70b2 glibc-langpack-nds-2.28-251.el8_10.11.aarch64.rpm 1a0f9fd64bdf621d3268502ccf1f8a02694ce0ee529c6301eb8465deb46ae2d3 glibc-langpack-ne-2.28-251.el8_10.11.aarch64.rpm c29220dc677bb4f58cb53a681b2dec69d6b90cd69b997e25e9c6845df5e9e694 glibc-langpack-nhn-2.28-251.el8_10.11.aarch64.rpm 2aa0c491c32f46357cfeae8275d8e24a062c9a8efcc96dd134fe68f64a21822c glibc-langpack-niu-2.28-251.el8_10.11.aarch64.rpm c1012a675d0d1b491a0163b4c6bb9364f5d8f7ab4e2d4293de6f95d2e61b9938 glibc-langpack-nl-2.28-251.el8_10.11.aarch64.rpm 66cbdcb7dec5621045bc52310bccd76ca4e4a8c4e901f464bd348a7984e92c4d glibc-langpack-nn-2.28-251.el8_10.11.aarch64.rpm d4ca8373087386e351f3c6c6fd02e0de67f029c61dae9a6178fa3b8c43d98b79 glibc-langpack-nr-2.28-251.el8_10.11.aarch64.rpm 8b1e0d1db2c9593250f739263c1798949ce64be6eeb15d16dbadce1f84c1a142 glibc-langpack-nso-2.28-251.el8_10.11.aarch64.rpm 5989b62a7776e0b17566f806cf8b945f7b9c4975445ed9e3297783d22013000f glibc-langpack-oc-2.28-251.el8_10.11.aarch64.rpm c1ad6a3234075b4fad9017ac002ce617d92a93c78f308dc924a4720f34ab602f glibc-langpack-om-2.28-251.el8_10.11.aarch64.rpm 0c41227471555094f3f79e607b9f82cd37cbb66f2110ed6f6d138b3fce7069e7 glibc-langpack-or-2.28-251.el8_10.11.aarch64.rpm 7237a8725e669db5754a3855eb6e2d34e7983395e44198454bd5781723e170dc glibc-langpack-os-2.28-251.el8_10.11.aarch64.rpm 9586b41640b906542c328a843546cfcff31b66d772f82788e1d58d6ae1739317 glibc-langpack-pa-2.28-251.el8_10.11.aarch64.rpm 507aea9b61a916f5e1810acc4970b24f69e63cc47c191935f204076dfc308dfe glibc-langpack-pap-2.28-251.el8_10.11.aarch64.rpm debf57dd29993988efd008f8318fe843c5e554b33076a0156053bee8cfb32552 glibc-langpack-pl-2.28-251.el8_10.11.aarch64.rpm ddaac49c6ed3d3967e811565aa7fd22bdce3c1d21fb85d04dba9eeddf95e66fd glibc-langpack-ps-2.28-251.el8_10.11.aarch64.rpm 357d51e5cdf6239935f96ec7034dbe0950eb844a77a083a9edf034f0edab571b glibc-langpack-pt-2.28-251.el8_10.11.aarch64.rpm adb75cab9ab1d19bfe3379b8321fbb7b234cecb6c9b02f62102db0c3f30e8e9a glibc-langpack-quz-2.28-251.el8_10.11.aarch64.rpm 019be27044525e456289e376fb5beea7dbc2ece3baec5487ba69a9a87eaa6029 glibc-langpack-raj-2.28-251.el8_10.11.aarch64.rpm ea029f4d4e11ecbc974ca42210046b5e417378ed3a0f58f4fe84dfd5e7483b18 glibc-langpack-ro-2.28-251.el8_10.11.aarch64.rpm 9071281e76eeb35e649156a1710c666dfae49d2d72ae83e28988a4cbb67f2f9a glibc-langpack-ru-2.28-251.el8_10.11.aarch64.rpm ac1381cdfebb0242930f629a06da40a601e9895089ae6349f99255f48fb4ed7d glibc-langpack-rw-2.28-251.el8_10.11.aarch64.rpm 2d1096265fa4bcb215d741dc11e854b5811fdf5be44380619f0c8d14fbdddcaa glibc-langpack-sa-2.28-251.el8_10.11.aarch64.rpm 2ca230512237c3b3e623b21f44af5d64e1b36d1ff5662575ef90221d1a2c56bb glibc-langpack-sah-2.28-251.el8_10.11.aarch64.rpm 4ef447023ece09351b91b87bab227df703ae3ec22f1a8398ad6458de7c010237 glibc-langpack-sat-2.28-251.el8_10.11.aarch64.rpm 86b48f47aa6b3f402637e8a14e4047177dbf004f3be6d8c613eb92038c988a75 glibc-langpack-sc-2.28-251.el8_10.11.aarch64.rpm 6321997025d0c55a38b9618cea30bff017713970bef55a30c5e00a658a1ffb59 glibc-langpack-sd-2.28-251.el8_10.11.aarch64.rpm 3809d9caa6b114e74e9cc18fe291fbd5dc452d2996436276a5e379ed48c29a23 glibc-langpack-se-2.28-251.el8_10.11.aarch64.rpm 327c0b47768056e570102d87c926a2e649a411078121a25954b5199fe082bc69 glibc-langpack-sgs-2.28-251.el8_10.11.aarch64.rpm 1dc7e6bdc45a109ba2cab86ad2f82e9b0f402cd9d66062d0b007de366065b6bc glibc-langpack-shn-2.28-251.el8_10.11.aarch64.rpm 97cf525a49d2b03040cc253c980311e7bee97859f8d31fdbdcf36711abf810ec glibc-langpack-shs-2.28-251.el8_10.11.aarch64.rpm 513464bafd04552e6e9e31d6aa69f29c07c95f3320b1cc72bc996d526883d8a2 glibc-langpack-si-2.28-251.el8_10.11.aarch64.rpm b6ec03b9af886ba5bc704bcaa94df6421a8b8d37ec31355c7d02c2f8b98b0ce4 glibc-langpack-sid-2.28-251.el8_10.11.aarch64.rpm 92e9765cdf605b10133b48b337db086e3397940de0ee54e326181907f518a11a glibc-langpack-sk-2.28-251.el8_10.11.aarch64.rpm 934d86b6c195797e50481f7ada7417eeff300d248442ea24fee769a323153ffa glibc-langpack-sl-2.28-251.el8_10.11.aarch64.rpm d6a057426d0f0b542f5a7f7d4c84e7121eb309afb2e0b37d60fcaaea38ac49f0 glibc-langpack-sm-2.28-251.el8_10.11.aarch64.rpm 3471ff7c4a5f7709b58933e7707183f6f59a9b138d15e7032b51e4b5f0b151b4 glibc-langpack-so-2.28-251.el8_10.11.aarch64.rpm b943944c61759a41e7cdd8cefd482e3cfaef868d5cf99d4b1fc7afa7edfcdd58 glibc-langpack-sq-2.28-251.el8_10.11.aarch64.rpm e10ee91c12a8451223b99fce96778a83e5767a19f403fb65034cda3aea7eb524 glibc-langpack-sr-2.28-251.el8_10.11.aarch64.rpm 5af270e5eead76c5e791926d0ea915095c5ae47d3d31ece6f34629ecd60fa9d8 glibc-langpack-ss-2.28-251.el8_10.11.aarch64.rpm 0f77c8b0e0383c1ca187e2bb64276b00e9c6d7d9951d92d4387f9df4fc5f5325 glibc-langpack-st-2.28-251.el8_10.11.aarch64.rpm fca817a05768c8eb5a9458c06645ec0c9e8c1e6bd95d31b2275a4dffe8fb72de glibc-langpack-sv-2.28-251.el8_10.11.aarch64.rpm 285c1dba3d15e981ad32e085c217110dff999e63522030a0682966226d9f0d88 glibc-langpack-sw-2.28-251.el8_10.11.aarch64.rpm 5cd724e6ed1181c40a789d3b087b59602d26eec2bc5626911aaa8ec9cec21c7c glibc-langpack-szl-2.28-251.el8_10.11.aarch64.rpm 2c3ba7a03099e5dbb559a1a937d0fa35d2ca4251d72bddfe515cf3b818030763 glibc-langpack-ta-2.28-251.el8_10.11.aarch64.rpm 584af1a570e2edef2020929b81c547eee4ca4f8ee4df9d63e52a71b037699015 glibc-langpack-tcy-2.28-251.el8_10.11.aarch64.rpm 45b725dcc4fed10f176d57ac8b464e26d467e0cf76dc2a26e05b84374043cac6 glibc-langpack-te-2.28-251.el8_10.11.aarch64.rpm dc336bad8cdd5c84a01837e40f6e0ab3185d39a2d068aeeaab3c4a4244c085f1 glibc-langpack-tg-2.28-251.el8_10.11.aarch64.rpm c3f71ac23183377e56adcd872ccab190b46a2fba220060fc93821b0e97e62dde glibc-langpack-th-2.28-251.el8_10.11.aarch64.rpm ea8f7ae13e6c8466445c5eab6c5e60117470a50947d9f3a9bffd28751388f353 glibc-langpack-the-2.28-251.el8_10.11.aarch64.rpm 98e3d4d84e7ee8064d7ba32d5d6afa8bb42fb111c67cc7a04a76d89b174c0656 glibc-langpack-ti-2.28-251.el8_10.11.aarch64.rpm 47a5d45129d6f94837a1369dd37e267b0fdcd62eef72896412514f65dd08a821 glibc-langpack-tig-2.28-251.el8_10.11.aarch64.rpm 945dd17e6f6df9bb52f3d147b8d7be8efae5fe9f961b3cc33f8e0cd214e0085b glibc-langpack-tk-2.28-251.el8_10.11.aarch64.rpm 766355a7cf9d1f68aeac6759940391591beb058546408e52a1b651a861ef666d glibc-langpack-tl-2.28-251.el8_10.11.aarch64.rpm 06ebb7157162a7e9f383b29f1692f5a46a9f566091590425f0a8f6cd72d8f68c glibc-langpack-tn-2.28-251.el8_10.11.aarch64.rpm 93d269037efcc48286916a029b2283f90da3596b900df8d9bf975bb0edd32a5b glibc-langpack-to-2.28-251.el8_10.11.aarch64.rpm 366e3f36c6810c1c442678cc9d1f0ca58038193026cf81149f93e0b2175feb25 glibc-langpack-tpi-2.28-251.el8_10.11.aarch64.rpm dbec9fedb17a8ff70aa5c6276328b1a046dda4241cb829eeca1aea57f6c5c108 glibc-langpack-tr-2.28-251.el8_10.11.aarch64.rpm 46c32ef6985f6582610fb53836e1b6da4b6adab8bf90a0f846e5e18a61d7a383 glibc-langpack-ts-2.28-251.el8_10.11.aarch64.rpm 3ba9a8cbeb1f6bfcb510de2fec499ca01602b14b52a5149e6c6e3ceaa9e05bd4 glibc-langpack-tt-2.28-251.el8_10.11.aarch64.rpm d934bc921ad306f9af399eea03e09e2166edf8fc6929d26718f4e0074eacef6a glibc-langpack-ug-2.28-251.el8_10.11.aarch64.rpm 9873359d7a1caf2411d45adea614897582e1d03b15ba3fbce115e58a62782fb7 glibc-langpack-uk-2.28-251.el8_10.11.aarch64.rpm 5d2847dcb26cc8e21222a0a0fbf97549bad9358a732b63774af9abae7da2ec4b glibc-langpack-unm-2.28-251.el8_10.11.aarch64.rpm 86eea4d43b3002e4c7b98604c18204fbd11461969b7d1b54c21f266f304ff200 glibc-langpack-ur-2.28-251.el8_10.11.aarch64.rpm a81a961ee850b57b08b4d27f19498e95794fc9ca50de499c67f4b2e6ce5982bb glibc-langpack-uz-2.28-251.el8_10.11.aarch64.rpm ffb3b161ee19110caa57940ee38727e9536f488194fe6e844d3336494070121e glibc-langpack-ve-2.28-251.el8_10.11.aarch64.rpm 62f5c054f81939c65b42bf5778f723f0abb9171e36a94db9d69f0fa7de782f33 glibc-langpack-vi-2.28-251.el8_10.11.aarch64.rpm eaeaaec75e8bb15fb6741b2c165d8b9bfa34b08e3b72f04712a62cd7922538a2 glibc-langpack-wa-2.28-251.el8_10.11.aarch64.rpm af37d51b677e45a8d6ae6b533e0604d4397f210684cf640fd323780532ba307b glibc-langpack-wae-2.28-251.el8_10.11.aarch64.rpm 7f1baa3238dcbf82bc38601f63fed16c3b33acdf0765fd2fc3579a4e32dec34f glibc-langpack-wal-2.28-251.el8_10.11.aarch64.rpm c267f84da2cb15bf64f4f2216d91e578411bacd9510be5cffaaa40b33a7e6f0a glibc-langpack-wo-2.28-251.el8_10.11.aarch64.rpm 8da7aaec3accd1fde87e91223b8d2417640ee3ba061f1ed86d33b14e78130d36 glibc-langpack-xh-2.28-251.el8_10.11.aarch64.rpm 515fe5185fb1d126436917ef62833a7d3b84888a72b44b17400ef78a686f70a4 glibc-langpack-yi-2.28-251.el8_10.11.aarch64.rpm 0c97d2863e6fbddaa0e5f44445e7d3ff758faa5aa24c99ad70780df48d0e3380 glibc-langpack-yo-2.28-251.el8_10.11.aarch64.rpm 59a8a6ee9ee1902369c3a094a03bbb39430b9fea90b86925c5c0ab09653cb7ee glibc-langpack-yue-2.28-251.el8_10.11.aarch64.rpm bc7553a36a1733de22eb85495d9c57d19a263fb013cc31655fc072e1b07de54e glibc-langpack-yuw-2.28-251.el8_10.11.aarch64.rpm 251e51e6a534cefea80b5dd8a40de17a01f53a6b45d17043944d3bf6918318ec glibc-langpack-zh-2.28-251.el8_10.11.aarch64.rpm 3d99637c6f6ddeafa3e176a0bdd3af9044585cebd175ff2090d079f40fc578e0 glibc-langpack-zu-2.28-251.el8_10.11.aarch64.rpm 31954547032a691302e561412c94cb0a77d19bac4e37351464c934b285019f5e glibc-locale-source-2.28-251.el8_10.11.aarch64.rpm ea21d4b21da8ed9877597431d40c722fe3405b0197f228c491ef4266d2dd414f glibc-minimal-langpack-2.28-251.el8_10.11.aarch64.rpm 5796eb5151500ecb6f16796bf407b4bae363b7542989b01d4b691a70fa1366df libnsl-2.28-251.el8_10.11.aarch64.rpm fc39b699425e1d63a7337c6ed505ef6c1d699c7489719ff12d021f77a1aa2fc1 nscd-2.28-251.el8_10.11.aarch64.rpm cbc16581fc6a2e9497b0e907e16fb222a54ba6c5d3101c90cd5b46dee84deffb nss_db-2.28-251.el8_10.11.aarch64.rpm 53538ee52362f4014423e137d4fc280b97f90e235b665b02455a3c48c1c34bd4 RLBA-2025:0572 kernel bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list (Rocky Linux-56480) (Rocky Linux-71396) (Rocky Linux-28790) (Rocky Linux-59649) none-baseos-rpms bpftool-4.18.0-553.36.1.el8_10.aarch64.rpm dc85363e756a53fc52156a7da9a4cadb483d49d339591f9e6b4eda4e1147e272 kernel-4.18.0-553.36.1.el8_10.aarch64.rpm a7b2671e701a3f2e3d945c3cfd53bbfc0bb3b791f4b925e6428a5bd1501503c9 kernel-abi-stablelists-4.18.0-553.36.1.el8_10.noarch.rpm c409c5aa05651cec750c6246d00e80b62628269151818904281554670cda9610 kernel-abi-stablelists-4.18.0-553.36.1.el8_10.noarch.rpm c409c5aa05651cec750c6246d00e80b62628269151818904281554670cda9610 kernel-core-4.18.0-553.36.1.el8_10.aarch64.rpm 2b65bb18696aaa5d71dfcea9e7c950eaddcb498561aacd91805a508b7f8bc18b kernel-cross-headers-4.18.0-553.36.1.el8_10.aarch64.rpm 1fda09bdf483f6291cd1e2626abbbe2427662eba7fae65f0fc92d24ca7246fbb kernel-debug-4.18.0-553.36.1.el8_10.aarch64.rpm 1991942b0c7846315934afbbb0acc6a4489809054062241ccce43f524e283286 kernel-debug-core-4.18.0-553.36.1.el8_10.aarch64.rpm d7449eba9058c73da7cd7300efed4d0740e57ea3a05588f781eb7817289db8a3 kernel-debug-devel-4.18.0-553.36.1.el8_10.aarch64.rpm 38991b50a31f34cdf2e9f59011a3b5e10918a5072399031f623f7663e7488faf kernel-debuginfo-common-aarch64-4.18.0-553.36.1.el8_10.aarch64.rpm 31d2b88577813dd05a0ca23855313d57d52e2f8421d857d209348069e2eb6606 kernel-debug-modules-4.18.0-553.36.1.el8_10.aarch64.rpm de022c398488d22522902fe3a03458ebfce41e1c24f98e2047c18b5dc5c0c9db kernel-debug-modules-extra-4.18.0-553.36.1.el8_10.aarch64.rpm 42cb2f7fc34e3b3641c2e18a07db884a62c2e00bb74baed7e4ca531e6031dca3 kernel-devel-4.18.0-553.36.1.el8_10.aarch64.rpm 25beed504c915d760b3810bbb50da2d91209cf4fa9f83c064059fb1393c0c2a7 kernel-doc-4.18.0-553.36.1.el8_10.noarch.rpm eb8ca9cf1808f792a6ce476049046d5541265fe4ca798d4f3e5d65267aff5a07 kernel-doc-4.18.0-553.36.1.el8_10.noarch.rpm eb8ca9cf1808f792a6ce476049046d5541265fe4ca798d4f3e5d65267aff5a07 kernel-headers-4.18.0-553.36.1.el8_10.aarch64.rpm bd6611011df531541de8fce66c18b5ca5b7f4bc0c8b703ddb95044ae84576b3f kernel-modules-4.18.0-553.36.1.el8_10.aarch64.rpm 1ab1cc277c0b35eaab1e70196bca8997bb9592491771427f4df93b99bd25cb27 kernel-modules-extra-4.18.0-553.36.1.el8_10.aarch64.rpm 8f9daca710544f3a5e5b7b7820c3bdcb758162802746bf27d2250db3ae228100 kernel-tools-4.18.0-553.36.1.el8_10.aarch64.rpm b171809e4713f4c76fe4ee5c78a6682c210af72cb84f5463dcc64f48acf2246a kernel-tools-libs-4.18.0-553.36.1.el8_10.aarch64.rpm 4ea94c3f77f709036f133be8f5c49da05e3256d376da27c86502245d5bb4d904 perf-4.18.0-553.36.1.el8_10.aarch64.rpm 042ab61bf33887495a17d7bf811251b86e399ec294c61b96e7796cf2675dbd77 python3-perf-4.18.0-553.36.1.el8_10.aarch64.rpm f6186a2e6cd94902afa05eb142154e553aa6295ff41c6dd77cda4f7973211be0 RLBA-2025:0727 strace bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for strace. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The strace utility intercepts and records the system calls that are made and received by a running process and prints a record of each system call, its arguments, and its return value to standard error output or a file. It is often used for problem diagnoses, debugging, and for instructional purposes. Bug Fix(es): * [Rocky Linux-8] Incorrect syscall name when using strace and strace printing <... resuming interrupted $syscall_name ...> (JIRA:Rocky Linux-8570) none-baseos-rpms strace-5.18-2.1.el8_10.aarch64.rpm dfcc1b3a015e8d93f4785f3464c591c764e6bd0d2f343982c3f555e8e3eddf6f RLBA-2025:0729 linux-firmware bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es): * Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-68279) * Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-73145) none-baseos-rpms iwl1000-firmware-39.31.5.1-127.el8_10.1.noarch.rpm 3aa81e39b5df0fe98cad2207ec23def62641c5e0d61a5729222a08d6bcf135b2 iwl1000-firmware-39.31.5.1-127.el8_10.1.noarch.rpm 3aa81e39b5df0fe98cad2207ec23def62641c5e0d61a5729222a08d6bcf135b2 iwl100-firmware-39.31.5.1-127.el8_10.1.noarch.rpm 5e5364c47287c435b905fbc91fd6724b65ca1c1b869cd91dd7aa775557aed303 iwl100-firmware-39.31.5.1-127.el8_10.1.noarch.rpm 5e5364c47287c435b905fbc91fd6724b65ca1c1b869cd91dd7aa775557aed303 iwl105-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 2875d6fce4c30fdd93468e371eaffe8a15e21abc5e645bcf5bc4912d2ab91c94 iwl105-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 2875d6fce4c30fdd93468e371eaffe8a15e21abc5e645bcf5bc4912d2ab91c94 iwl135-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 5adf7f9b552dd03e2d6fc1a6d5be7351a350f937189b7e91bcdb1e9e068fe9f6 iwl135-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 5adf7f9b552dd03e2d6fc1a6d5be7351a350f937189b7e91bcdb1e9e068fe9f6 iwl2000-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 3b0276e2c1ce92e8efad54cf35e128448e5d0a1ca6a9a46c9f8b0208c262be81 iwl2000-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 3b0276e2c1ce92e8efad54cf35e128448e5d0a1ca6a9a46c9f8b0208c262be81 iwl2030-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 21bd28fdaa10449cc70544cf52b420d6b7d010c1d0f438e77520857b9aab2fd2 iwl2030-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 21bd28fdaa10449cc70544cf52b420d6b7d010c1d0f438e77520857b9aab2fd2 iwl3160-firmware-25.30.13.0-127.el8_10.1.noarch.rpm 4bdf9f496a4ccbadee5942cb26de31a1b7c7d1e6e7f904cd69111110054133ad iwl3160-firmware-25.30.13.0-127.el8_10.1.noarch.rpm 4bdf9f496a4ccbadee5942cb26de31a1b7c7d1e6e7f904cd69111110054133ad iwl3945-firmware-15.32.2.9-127.el8_10.1.noarch.rpm fbfe7373aa764d99168867d4bfc19a148a2388d21f5fb33ae1c3fa72602fc7e0 iwl3945-firmware-15.32.2.9-127.el8_10.1.noarch.rpm fbfe7373aa764d99168867d4bfc19a148a2388d21f5fb33ae1c3fa72602fc7e0 iwl4965-firmware-228.61.2.24-127.el8_10.1.noarch.rpm 78de39a4d95fd01f69fcce5efc6900715bb2e502779b04c4d092051230f9cf63 iwl4965-firmware-228.61.2.24-127.el8_10.1.noarch.rpm 78de39a4d95fd01f69fcce5efc6900715bb2e502779b04c4d092051230f9cf63 iwl5000-firmware-8.83.5.1_1-127.el8_10.1.noarch.rpm 1b381fcaa06df56ebbe6d6537c5c084ab0c255fec39fbe8571b689032c850762 iwl5000-firmware-8.83.5.1_1-127.el8_10.1.noarch.rpm 1b381fcaa06df56ebbe6d6537c5c084ab0c255fec39fbe8571b689032c850762 iwl5150-firmware-8.24.2.2-127.el8_10.1.noarch.rpm 4f2449e15ed60bceaf7137343f8c7a2c8eaea8638a6c67a46f454a530c9245e7 iwl5150-firmware-8.24.2.2-127.el8_10.1.noarch.rpm 4f2449e15ed60bceaf7137343f8c7a2c8eaea8638a6c67a46f454a530c9245e7 iwl6000-firmware-9.221.4.1-127.el8_10.1.noarch.rpm 4c401b5322e8540fe16e52648a23f2dedeba65043f75866732bf926589b4e1c2 iwl6000-firmware-9.221.4.1-127.el8_10.1.noarch.rpm 4c401b5322e8540fe16e52648a23f2dedeba65043f75866732bf926589b4e1c2 iwl6000g2a-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 527a2ff1ea2a30fcff4a85d3bd71380516cd188dca472b21033e4337f4720cb6 iwl6000g2a-firmware-18.168.6.1-127.el8_10.1.noarch.rpm 527a2ff1ea2a30fcff4a85d3bd71380516cd188dca472b21033e4337f4720cb6 iwl6000g2b-firmware-18.168.6.1-127.el8_10.1.noarch.rpm e3ce7776d91a1f836f8f7bfdccf94910f934165e6567644d29a9453d776d2e26 iwl6000g2b-firmware-18.168.6.1-127.el8_10.1.noarch.rpm e3ce7776d91a1f836f8f7bfdccf94910f934165e6567644d29a9453d776d2e26 iwl6050-firmware-41.28.5.1-127.el8_10.1.noarch.rpm 7c65cb46d02590b4ab3463775e61e837193ff1ecd4ce0d19b614736ad0648ee1 iwl6050-firmware-41.28.5.1-127.el8_10.1.noarch.rpm 7c65cb46d02590b4ab3463775e61e837193ff1ecd4ce0d19b614736ad0648ee1 iwl7260-firmware-25.30.13.0-127.el8_10.1.noarch.rpm dfa58ef498e6ed2e7253f48da44363597bcc04d707b40b48c11499e64ca7b198 iwl7260-firmware-25.30.13.0-127.el8_10.1.noarch.rpm dfa58ef498e6ed2e7253f48da44363597bcc04d707b40b48c11499e64ca7b198 libertas-sd8686-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 47473f7d5588cf86e7d4bcaf7185c7a6684ad428a0cb761727f7ca7306c84ba8 libertas-sd8686-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 47473f7d5588cf86e7d4bcaf7185c7a6684ad428a0cb761727f7ca7306c84ba8 libertas-sd8787-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 409329e511eecda90842ed5cc88e3e00aae598b6444287a8f95e6b7539a088d2 libertas-sd8787-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 409329e511eecda90842ed5cc88e3e00aae598b6444287a8f95e6b7539a088d2 libertas-usb8388-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 0fb0c40d21dd1bcf25412eaf85d6320d3c034c917abbf21a7fd94f04e2c7fce5 libertas-usb8388-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 0fb0c40d21dd1bcf25412eaf85d6320d3c034c917abbf21a7fd94f04e2c7fce5 libertas-usb8388-olpc-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 0042edbe0832513226f445ca90b20bba69359059b1733f3309f87013b2451fcc libertas-usb8388-olpc-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 0042edbe0832513226f445ca90b20bba69359059b1733f3309f87013b2451fcc linux-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 50dc29b613b1926178f8fbb7b95a819bfb0ec89f27add8cf2a5dc88fc8c5592e linux-firmware-20250108-127.gitc0f414a6.el8_10.noarch.rpm 50dc29b613b1926178f8fbb7b95a819bfb0ec89f27add8cf2a5dc88fc8c5592e RLBA-2025:0731 curl bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Bug Fix(es): * libcurl crashes when connecting to RH repo through a NTLM proxy in FIPS mode [rhel-8.10.z] (JIRA:Rocky Linux-32641) * race condition in curl's dns impacting customer's internal tool powerman (JIRA:Rocky Linux-34906) * Eliminate use of obsolete %patchN syntax (JIRA:Rocky Linux-65667) none-baseos-rpms curl-7.61.1-34.el8_10.3.aarch64.rpm aed9c4f6c8a0519418b5af77cbeef7b331fb12d1ca78a9f2b002e8c9399b2e20 libcurl-7.61.1-34.el8_10.3.aarch64.rpm c29c0bdce4c3dab7845569213c55522e739eaaaba9b59d78f8eba62d907cc81b libcurl-devel-7.61.1-34.el8_10.3.aarch64.rpm 0253caa66a57237f083e50c6a89dba98db6faca00aab069a0f087301ee0d14b7 libcurl-minimal-7.61.1-34.el8_10.3.aarch64.rpm a2bb165a79c566e92dcda871815a839742f68193e3eae24885e375537f14a0e6 RLBA-2025:0730 nftables bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for nftables. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list nftables provides a packet-filtering tool, with numerous improvements in convenience, features, and performance. It is the designated successor to iptables, ip6tables, arptables and ebtables. Bug Fix(es): * Actively reject untranslatable compat expressions (JIRA:Rocky Linux-5806) * Unable to set port range/interval in nftables using nft insert command. (JIRA:Rocky Linux-62895) none-baseos-rpms nftables-1.0.4-7.el8_10.aarch64.rpm 568a11182810ea42e6fa77b08a3bc23b4605d7ee624b49650549a90add14d807 python3-nftables-1.0.4-7.el8_10.aarch64.rpm f957dac11af47e45db804c3ec78a047cddde4d03b20890b15563d5d50609ab2f RLBA-2025:0732 libdnf bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A Library providing simplified C and Python API to libsolv. Bug Fix(es): * "dnf history rollback <id>" operates as if it was a "undo" when <id> is not latest [rhel-8.10.z] (JIRA:Rocky Linux-68770) none-baseos-rpms libdnf-0.63.0-21.el8_10.aarch64.rpm 4bc62638df6dab6258063bfac41c7c2132eb813f58fd59ac9d097039c23b0953 python3-hawkey-0.63.0-21.el8_10.aarch64.rpm 5f32da62435e9462fbc7d5ff1e0e2e13b8e190118958bed58b1b4d9281e3e920 python3-libdnf-0.63.0-21.el8_10.aarch64.rpm 5f88f81a1d3a4f0519b1d34bbbe13dfa46e65c25f787f8bd1697d1e42a88de72 RLSA-2025:0733 Moderate: bzip2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bzip2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bzip2 packages contain a freely available, high-quality data compressor. It provides both standalone compression and decompression utilities, as well as a shared library for use with other programs. Security Fix(es): * bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). (CVE-2019-12900) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bzip2-1.0.6-28.el8_10.aarch64.rpm 39187b98f7d4049d388f104219b811b655f4a72298bcb97b4f4978bf1eb8547c bzip2-devel-1.0.6-28.el8_10.aarch64.rpm 4fdfd395aec5050ccdcb8d0affa7fc802784a90c8132d55422225b53e5adf466 bzip2-libs-1.0.6-28.el8_10.aarch64.rpm 717c4f0cacb8e8db90557145fa5252d0c596bd1babcd3aa16c891ed8a04047b0 RLSA-2025:0838 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-7.el8_10.aarch64.rpm f2aa49ec9e912fdb9516463abfb551a1d8b26c25adca7112c61d493f6855a4b3 RLSA-2025:1068 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.37.1.el8_10.aarch64.rpm be9d153f770c7f2cfe300de91d65f0db015f12a4c9b32be3d0e595d7e4a4dbe1 kernel-4.18.0-553.37.1.el8_10.aarch64.rpm 76d5cda814aff4ce00be152721d2e595630e294c26ac88982a2f02abc0fa618d kernel-abi-stablelists-4.18.0-553.37.1.el8_10.noarch.rpm 77c5ce9293e618095ab96866e6bc6c509bc5065a77eb4085273471c8938e29b5 kernel-abi-stablelists-4.18.0-553.37.1.el8_10.noarch.rpm 77c5ce9293e618095ab96866e6bc6c509bc5065a77eb4085273471c8938e29b5 kernel-core-4.18.0-553.37.1.el8_10.aarch64.rpm 62c2acd2084221b985646f82fc7428dbc9efd499e65f30a7341ef6ea67a2da49 kernel-cross-headers-4.18.0-553.37.1.el8_10.aarch64.rpm 9990cca9326aeca4ea07ab91014a80783b8f3c4c92fb930406bff0e1dcb20706 kernel-debug-4.18.0-553.37.1.el8_10.aarch64.rpm 9ad79e585785862c7407fdec7fb04e3571ec842fab48b7816821e05a47219bbc kernel-debug-core-4.18.0-553.37.1.el8_10.aarch64.rpm 87f2446990d7c95012fb0d731cecfb22fe1b0e194a802667fd3a4a82b7baf2ca kernel-debug-devel-4.18.0-553.37.1.el8_10.aarch64.rpm a71d6191e74b277120d4c9270bb8849f15738861bac04715e5ced359fa131cf6 kernel-debuginfo-common-aarch64-4.18.0-553.37.1.el8_10.aarch64.rpm 2c07c47515a49740bf0cb7b9c1bb15e89697ccc760da590d75fa2081ff219f40 kernel-debug-modules-4.18.0-553.37.1.el8_10.aarch64.rpm b108b070c9bd58663eb61c6e51b9fb776916727774cceec23af62fbfe7074a9e kernel-debug-modules-extra-4.18.0-553.37.1.el8_10.aarch64.rpm ecfb0000ff262b10b0b79aca8c06ea69259770ef575a025b228ba3893b1ab7b9 kernel-devel-4.18.0-553.37.1.el8_10.aarch64.rpm 9fa29c36fce5f9c870d4c9cd1e6f9d64b4a5a86b52a52623d7bef061cc059aba kernel-doc-4.18.0-553.37.1.el8_10.noarch.rpm 9ba60997ef996222c9e0e73322a6a716155ce49e6c2fd754edda32ff644ca154 kernel-doc-4.18.0-553.37.1.el8_10.noarch.rpm 9ba60997ef996222c9e0e73322a6a716155ce49e6c2fd754edda32ff644ca154 kernel-headers-4.18.0-553.37.1.el8_10.aarch64.rpm d7cec6783358745f4cd25874f80743d7cefa0ac07ff49a6480d05d22d255a5fd kernel-modules-4.18.0-553.37.1.el8_10.aarch64.rpm d267f8cc7285209d58e029a4cf74961e8c088c13c398f9b526acfd00b0f30383 kernel-modules-extra-4.18.0-553.37.1.el8_10.aarch64.rpm 1cfcc7be7123393fd45f862a0b2b9e915add5d38b8eb7362dc5114c7a2a80d90 kernel-tools-4.18.0-553.37.1.el8_10.aarch64.rpm 0059be840d58cfad031262659a45aecb70a33a089b5c35521d9956613d635525 kernel-tools-libs-4.18.0-553.37.1.el8_10.aarch64.rpm ff7a7468029f64ac9ba830b05c656d10b39c012bcc0593f01f449efe6da95921 perf-4.18.0-553.37.1.el8_10.aarch64.rpm 3437c0f94d9e064837f301f1cba2aea842a6620f94ea2377402e89e65c13d1cd python3-perf-4.18.0-553.37.1.el8_10.aarch64.rpm 501e29f527db026e43c1ae3c5fb469df2dc5a53452fd1cd7be844718b8c52a63 RLBA-2025:1104 tzdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tzdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tzdata packages contain data files with rules for various time zones. Bug Fix(es) and Enhancement(s): * Update to tzdata-2025a [Rocky Linux 8] (JIRA:Rocky Linux-74309) * Update to tzdata-2025a [Rocky Linux 7] (JIRA:Rocky Linux-74311) * Update to tzdata-2025a [rhel-9.5.z] (JIRA:Rocky Linux-76432) none-baseos-rpms tzdata-2025a-1.el8.noarch.rpm 2db0997d9d00c6280031eab80c627f962cc25e82d65baa8bf2146221a673ee24 tzdata-2025a-1.el8.noarch.rpm 2db0997d9d00c6280031eab80c627f962cc25e82d65baa8bf2146221a673ee24 tzdata-2025a-1.el9.noarch.rpm 8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d tzdata-2025a-1.el9.noarch.rpm 8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d tzdata-2025a-1.el9.noarch.rpm 8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d tzdata-2025a-1.el9.noarch.rpm 8e93852cd736a3edcd048f9fe4eac259134ad10bbda6aac96e94d9d8d612043d RLBA-2025:1240 sos bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sos. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sos package contains a set of utilities that gather information from system hardware, logs, and configuration files. The information can then be used for diagnostic purposes and debugging. Bug Fix(es) and Enhancement(s): * sos "ssh" plugin collects user's .ssh files by default, which breaks systems when having automount users (JIRA:Rocky Linux-22389) * Capture information about sched_ext in SoS (JIRA:Rocky Linux-70330) * Capture 'ceph config dump' json output (JIRA:Rocky Linux-70689) * sos report collects http_proxy password in plaintext in /var/log/foreman/production.log (JIRA:Rocky Linux-71193) * sos report collects http_proxy from rhsm.conf in plaintext, via curl command (JIRA:Rocky Linux-71269) * [rebase] rebase sos to 4.8.2 into Rocky Linux8 (JIRA:Rocky Linux-72941) * [rebase] rebase sos to 4.8.2 into Rocky Linux9 (JIRA:Rocky Linux-72942) none-baseos-rpms sos-4.8.2-1.el8_10.noarch.rpm b6954e92e68d2059981bccaf9d3a42bcaeed38424d0a3f61b5016625e219e751 sos-4.8.2-1.el8_10.noarch.rpm b6954e92e68d2059981bccaf9d3a42bcaeed38424d0a3f61b5016625e219e751 sos-audit-4.8.2-1.el8_10.noarch.rpm 1e71919aafd6e987c0af78d4187f10a01b960aa0863b9f2b54aebd997954ee85 sos-audit-4.8.2-1.el8_10.noarch.rpm 1e71919aafd6e987c0af78d4187f10a01b960aa0863b9f2b54aebd997954ee85 RLSA-2025:1301 Moderate: gcc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Security Fix(es): * jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods (CVE-2020-11023) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libasan-8.5.0-23.el8_10.aarch64.rpm 7261e41631757e71d6abc51d9542e1c11ab41f33f825f243eed84e2aba5723b8 libatomic-8.5.0-23.el8_10.aarch64.rpm b4695f19c803cd995880c8bfc70fe30b850dcf4001a5bfc6a65e544902458b11 libatomic-static-8.5.0-23.el8_10.aarch64.rpm 5d78add79b1871ae98a895c5d6ea2a4b590a268547584560459948ab4b8d5da6 libgcc-8.5.0-23.el8_10.aarch64.rpm 89ddb87574fd57a9a00ea08e50f3d73c846fdd7b90e3244aeba26a28bee20ff8 libgfortran-8.5.0-23.el8_10.aarch64.rpm 09b87fffe28e7a3c85b285cf5906700a7f427fb1accf17baae8c2be0adc9f271 libgomp-8.5.0-23.el8_10.aarch64.rpm bec5b2d87919b2506f1d41c430fcc15c5b140f5653ca7fd076182138f3775f35 libitm-8.5.0-23.el8_10.aarch64.rpm 01c2a8dd7f098b0d7754ae763026a192bdbe6b3ac16bc7a0e9c0c30bdcb5bf8e liblsan-8.5.0-23.el8_10.aarch64.rpm 01a8d3d948d254c7bd86969b7edfe9d206821b49570c7fed1398f61828aa41dc libstdc++-8.5.0-23.el8_10.aarch64.rpm 6e224b556db970ac8eac3c3c5826283dc6d1691786fe26e02d2f55b99bce186f libtsan-8.5.0-23.el8_10.aarch64.rpm c6eb1f5dff81b5d60286268a79d6091b4e801987107842755e663ee8d691cfff libubsan-8.5.0-23.el8_10.aarch64.rpm 07be709b8832d96db5ae6e84b40b63e89f0cedef1dff81bea5ac8570b9d59605 RLSA-2025:1266 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CVE-2024-53104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.40.1.el8_10.aarch64.rpm b93db926ca8717310274e17ec47230f3ca4fc916bcc4c63a58e13df9aa1de322 kernel-4.18.0-553.40.1.el8_10.aarch64.rpm 3c901b5786adc7fd073c0d7db03f392bcadcfd5e7b116e258683e899359e5f1c kernel-abi-stablelists-4.18.0-553.40.1.el8_10.noarch.rpm 11b048ba6c7a9ce1ac1e953bee5fc1fab35513f24a65de449bf19bf967f43177 kernel-abi-stablelists-4.18.0-553.40.1.el8_10.noarch.rpm 11b048ba6c7a9ce1ac1e953bee5fc1fab35513f24a65de449bf19bf967f43177 kernel-core-4.18.0-553.40.1.el8_10.aarch64.rpm a3ba2679ae19f8718b9eda594382fff09fe60270ed9e33c693d7a5c89019dbd6 kernel-cross-headers-4.18.0-553.40.1.el8_10.aarch64.rpm fa76859030237b4fd198168d57f3e7faf2c8cd4b5bd10683d386199d444fa8ee kernel-debug-4.18.0-553.40.1.el8_10.aarch64.rpm 2a280be51275c111ce076901972f6706ae4f6693f86ea6a275b2c9af745d419c kernel-debug-core-4.18.0-553.40.1.el8_10.aarch64.rpm 87c97878324458a21b2465c1e505b6345603b2a319a5d1ef471b318dc5f43024 kernel-debug-devel-4.18.0-553.40.1.el8_10.aarch64.rpm a70790923fb1a4a5cebd18b54eea03038f1a4e469ec8c61ed07d56e19945288c kernel-debuginfo-common-aarch64-4.18.0-553.40.1.el8_10.aarch64.rpm c5f43b57a8dae564137ff4421a1099c2aff380ef51f3f31ec524a494eff6cbc4 kernel-debug-modules-4.18.0-553.40.1.el8_10.aarch64.rpm d774e21990baf0f1194516dcc58e1d0177cdc91e07d68a92dabcccb5647fd04d kernel-debug-modules-extra-4.18.0-553.40.1.el8_10.aarch64.rpm 27c6ca10fb928bcbad84c28819290f9bf09d9d036c39bdd1751c311a5dfcb7c7 kernel-devel-4.18.0-553.40.1.el8_10.aarch64.rpm d30d637b36ec56c93054a926e65215bdef8c6010a8829ea525f66ce377fdd277 kernel-doc-4.18.0-553.40.1.el8_10.noarch.rpm 771313783e5c20441d5f0eb72ad1bd14d65ba6329aca536a841b83ada3b1a0d1 kernel-doc-4.18.0-553.40.1.el8_10.noarch.rpm 771313783e5c20441d5f0eb72ad1bd14d65ba6329aca536a841b83ada3b1a0d1 kernel-headers-4.18.0-553.40.1.el8_10.aarch64.rpm ab45570404373fec32b8c28e892b10e449f7d66e36509588373b11af4e9776c0 kernel-modules-4.18.0-553.40.1.el8_10.aarch64.rpm 4e9ff836a962e5d4154c274fc4d5dab0cb325b0db37df2ee921da912e462257f kernel-modules-extra-4.18.0-553.40.1.el8_10.aarch64.rpm be909be31d5e9e9f7843625bc92565618a3c65e52a09c6d8b991eed94be3ebef kernel-tools-4.18.0-553.40.1.el8_10.aarch64.rpm 0dbdc2de9b15670c9380ba263b779277892877ea228c44d526e7448b79f9685b kernel-tools-libs-4.18.0-553.40.1.el8_10.aarch64.rpm ff7955572a6fe22d198fe88fc6f470420f8db0e18d2be4c084b766a8c54d3e43 perf-4.18.0-553.40.1.el8_10.aarch64.rpm 4a74635f8b4939e48ddb90c3b9f4ef95176bfbb7c19d07853e012fc1f408ef01 python3-perf-4.18.0-553.40.1.el8_10.aarch64.rpm 5af199830eba7b3ba746ac49de3b0b39d38b9df531fd41bac87e0962f0072220 RLSA-2025:1517 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: use-after-free in xmlXIncludeAddNode (CVE-2022-49043) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-18.el8_10.2.aarch64.rpm a14e109b13eaf270b0e1c6247b7cda1edc8785810436d18cbfdd469399d2303e python3-libxml2-2.9.7-18.el8_10.2.aarch64.rpm 63268c720aa8481b983633deea6dd20d1bf1a9c657a382b700f6ef0a6287d36c RLBA-2025:1573 glibc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es): * glibc: pthread_cond_wait missed wakeup (swbz#25847) [rhel-8] (JIRA:Rocky Linux-8381) none-baseos-rpms glibc-2.28-251.el8_10.13.aarch64.rpm 13dd90275500247e5b222f9d6c0c4d96721833a4f3e89984ebf6fa7dfc56d74d glibc-all-langpacks-2.28-251.el8_10.13.aarch64.rpm 97a28f2308a6c90675c6b6e9c9d01f64229c694df13c22d94f52815549d9e081 glibc-common-2.28-251.el8_10.13.aarch64.rpm 519919cf157ade7dc23eb2ca8962e44d2858dd9274ac1e99aabc2959a177dfe3 glibc-devel-2.28-251.el8_10.13.aarch64.rpm 9c17a90336966d7234b1bd91a0cf5849bec2eba92386339e9e45de3c6ca532ac glibc-doc-2.28-251.el8_10.13.noarch.rpm 170cd795503edcbba4ee0529bd763a306908f33ded18bbfe86a3959c2ce72bfd glibc-doc-2.28-251.el8_10.13.noarch.rpm 170cd795503edcbba4ee0529bd763a306908f33ded18bbfe86a3959c2ce72bfd glibc-gconv-extra-2.28-251.el8_10.13.aarch64.rpm 80dbd00f6bba9d59b9a341b0ffdeb298522a1e759b75677a0c3e38e070fb11fe glibc-headers-2.28-251.el8_10.13.aarch64.rpm 1131a7743dd2585b91cb9e8d57db0d12afc660f888dec3b4624e06099b9d15e0 glibc-langpack-aa-2.28-251.el8_10.13.aarch64.rpm 7707f4261932ddc53790c8af5b7773b137a7e22be16988f7d863b5b504dfc3e1 glibc-langpack-af-2.28-251.el8_10.13.aarch64.rpm 6f5810b63c68717b58378a11b4877ca8ed2d22d6b26b8a0680ed1d6cb4107a9a glibc-langpack-agr-2.28-251.el8_10.13.aarch64.rpm 41f62783640e22a2bb0fbfb29ae484e2dc7f4c50d4b5358a0864dec1f5403956 glibc-langpack-ak-2.28-251.el8_10.13.aarch64.rpm 835fe45e047c8a4d1fe52df4836608a2572f3898af9bc1dc2e8635804bd0ac25 glibc-langpack-am-2.28-251.el8_10.13.aarch64.rpm 3744045e6f93df86ef82254c6e2990d1a3fcafb7d29103e1b6a173c1d2bf1f29 glibc-langpack-an-2.28-251.el8_10.13.aarch64.rpm b1cb841ee292b313abad53d42909da619e995c575613db3d615b97e3338cbe0f glibc-langpack-anp-2.28-251.el8_10.13.aarch64.rpm 752b290f2aa73ccd6e6b4561c871a2d19695b322162bae047a7e579b7d2fcf95 glibc-langpack-ar-2.28-251.el8_10.13.aarch64.rpm 5e56dec6ae24289b178c05bd9fc82af789c59ea38a47522a13e560cba03b41f3 glibc-langpack-as-2.28-251.el8_10.13.aarch64.rpm f7c8964bbc7a0d1faaa45151667443bf560c6712f47f1340b8188edae5d1e779 glibc-langpack-ast-2.28-251.el8_10.13.aarch64.rpm 1477afc138bb4db29c2d399a0117b32929221325a370a099183222237d735a27 glibc-langpack-ayc-2.28-251.el8_10.13.aarch64.rpm 78524375c0168615976363f4da94fa846016c4dae9236338f4812877560c4a40 glibc-langpack-az-2.28-251.el8_10.13.aarch64.rpm 764d7f21c33859a27b63de0ea0f630ec6acac3cd34743079e424a0ef7974c45f glibc-langpack-be-2.28-251.el8_10.13.aarch64.rpm ac8ea83a0562df9a35003a0cbe3731b34a595eb59f669d0e6c0cb10cf19e2be0 glibc-langpack-bem-2.28-251.el8_10.13.aarch64.rpm d360d05bc493f30d2f9c57ee8afcf224b2e88ee93bf70a2dc566f375a116834f glibc-langpack-ber-2.28-251.el8_10.13.aarch64.rpm acbfd8dfa163b6faedb8eeb488ac8a842f11d2d26b089a96fc1c81952f6378a6 glibc-langpack-bg-2.28-251.el8_10.13.aarch64.rpm f2bbe62ed704f34460d712970dcd521b236aa60b3650e20c7eefb40fe36030d8 glibc-langpack-bhb-2.28-251.el8_10.13.aarch64.rpm 9ac4c500752e04b379c08e7007d1f5013cb5cb112bbf65e1370147807aa4c7f0 glibc-langpack-bho-2.28-251.el8_10.13.aarch64.rpm 6d09931de9af4942b06902999453f2976586f362864b9ce28d74f67004e34012 glibc-langpack-bi-2.28-251.el8_10.13.aarch64.rpm 00f1a255105239299aef3edd0992bd23da4144428e747e3fcc46c3607a93dc3a glibc-langpack-bn-2.28-251.el8_10.13.aarch64.rpm 287fb3f3fc3428c95b8176ccc1f68496facfe390b0cb54888640699e8f67a735 glibc-langpack-bo-2.28-251.el8_10.13.aarch64.rpm edd60e008af2dde1b0218e2fbd507f843ee096426c2a4bd111528d189c657b87 glibc-langpack-br-2.28-251.el8_10.13.aarch64.rpm 100ffe2bc8947f4eccd840aad7a0942ec7436d3932298462f563f5c9da933d46 glibc-langpack-brx-2.28-251.el8_10.13.aarch64.rpm 306a74f006a6e39ec2e46a722b8ce78f5681be850a13087834ef3ea9965cff48 glibc-langpack-bs-2.28-251.el8_10.13.aarch64.rpm c990c33ae67b56fbe959ce9cf5da245a552cae5c7d3574d7c9125619efe9e1f8 glibc-langpack-byn-2.28-251.el8_10.13.aarch64.rpm 72e645add613fa56620bccc61b31f8a43e37c3e59ad7f1818456573cc4094b83 glibc-langpack-ca-2.28-251.el8_10.13.aarch64.rpm e9f8c52784444b63f304b5f37619aa2413a3158ddaa8241a39fd4f8ef994e5d7 glibc-langpack-ce-2.28-251.el8_10.13.aarch64.rpm 3635b9289a4743ed8bd96044de827a0f488c1158414a1243d23c0c36911b9fbd glibc-langpack-chr-2.28-251.el8_10.13.aarch64.rpm 4689f8af8f10e26258f9f337e832b6dcff7d60b1da5a2ae9ead7d6e7c5216f80 glibc-langpack-cmn-2.28-251.el8_10.13.aarch64.rpm a99c6a9368a1f30f0d956a2456825a7a61b6fbf41a6c07348d6a6e9fbd7f1e36 glibc-langpack-crh-2.28-251.el8_10.13.aarch64.rpm 91a674e10d3395b6a464af6dbf9ad6760f941e89f36e60ffcf78ff22088a9552 glibc-langpack-cs-2.28-251.el8_10.13.aarch64.rpm 93d309241a5c37161bc67eef79a9f6374d1a63901ed9959910b79966e3f1429e glibc-langpack-csb-2.28-251.el8_10.13.aarch64.rpm 0d1ee56899f5c79c114743cf641637fe1c85488f7f30c58c49a584df9024f21f glibc-langpack-cv-2.28-251.el8_10.13.aarch64.rpm 1b09ee4471d8e2123dff339697243620b1b70c07458d6b51fa67e6be230bca44 glibc-langpack-cy-2.28-251.el8_10.13.aarch64.rpm 1936b9a611849e8159cbda1a280bdd802ea00b9ad43a295268d61a94aa16f90e glibc-langpack-da-2.28-251.el8_10.13.aarch64.rpm bda58174942357a48e28372dc7e8704f47c1f08b278989c054eead3ff0b422b0 glibc-langpack-de-2.28-251.el8_10.13.aarch64.rpm 80e2b75e79dc04cee5c5e8fe9616a520e28964eafcc472b781902c4fdde12f9f glibc-langpack-doi-2.28-251.el8_10.13.aarch64.rpm b91ae819d6a0e830b621a53e5714b1e125f7246c1cc5286864e1837240efcfb4 glibc-langpack-dsb-2.28-251.el8_10.13.aarch64.rpm a86f3bce2dd8694a639f725e3e876a607427ad5570eec408b33c945ee7a2c6a4 glibc-langpack-dv-2.28-251.el8_10.13.aarch64.rpm f359fb96d65fadfb3f9df002418643a838ebf037c7bd0e8993ba994b012d0914 glibc-langpack-dz-2.28-251.el8_10.13.aarch64.rpm 1c7101a18faf396032c945ab49045fa3eda9dee62bd70c49ad8e679e8274cd60 glibc-langpack-el-2.28-251.el8_10.13.aarch64.rpm 71bf8090a9b9b272c1f209ed02e08c7b3d8f303aeef110d3dabcccffd4479bc7 glibc-langpack-en-2.28-251.el8_10.13.aarch64.rpm d9c89bc9c06845a2e1d7973d6781876a5bd7787000eda131f786c26450a37c04 glibc-langpack-eo-2.28-251.el8_10.13.aarch64.rpm e693147604c879fb37df32b62657eda9eb2e1fe1c067476c8daafa16c41b69e6 glibc-langpack-es-2.28-251.el8_10.13.aarch64.rpm d827d0f976911a26eca276fd9b6870f1b36fae1988859f867d1feddf8bf9494c glibc-langpack-et-2.28-251.el8_10.13.aarch64.rpm 7eecf74d9fc1b47165e7f44312c15927e2c9c62f5899de23a52b68ccc14f5172 glibc-langpack-eu-2.28-251.el8_10.13.aarch64.rpm 3a148fecc8e9dcf4680f41e79d65420da5c0174c97e6a1a05fd962810c6d8d8d glibc-langpack-fa-2.28-251.el8_10.13.aarch64.rpm edc5bcdfd698c2edbe90220825f1d2646ea954185fbcbbb87c95ceb7f8b24acd glibc-langpack-ff-2.28-251.el8_10.13.aarch64.rpm 850c4e9bf73a9848e8c224dcf05a366b796d2038205aa7f1346d3bbcf4c2882e glibc-langpack-fi-2.28-251.el8_10.13.aarch64.rpm 6342b8daac989f1f31b93ca9e3d72e0004270e17ae31413511b6b18e3c337431 glibc-langpack-fil-2.28-251.el8_10.13.aarch64.rpm 9c0b524aa067108b30acf23b9fb0b5e3beedf8da0bc0e2849b7d7ffd10a57505 glibc-langpack-fo-2.28-251.el8_10.13.aarch64.rpm f858bc8ed235e5036cfe7a12b456cc604dfbd7554a9db2866067de2ab2f6f565 glibc-langpack-fr-2.28-251.el8_10.13.aarch64.rpm cbe79bea75437fe3c4f40194fa0a6b06cb5060b34d1879ee57762f29862f4d65 glibc-langpack-fur-2.28-251.el8_10.13.aarch64.rpm 056cf88cddf3cf4e4e552b2e3053bf2df2d6051fe448db72cc828b909a3e8a47 glibc-langpack-fy-2.28-251.el8_10.13.aarch64.rpm 34a15b4cea0435574684df01900f47c8f4705c0380adf7b8393081990d569345 glibc-langpack-ga-2.28-251.el8_10.13.aarch64.rpm f24c53c88e8e1fb4ece92887f154b53efeb96407bccb5aad648c1a83db7cb955 glibc-langpack-gd-2.28-251.el8_10.13.aarch64.rpm 03b2248cd2096363af7fabf21eaf935f5f20963eabbf2d41223d05db46537025 glibc-langpack-gez-2.28-251.el8_10.13.aarch64.rpm 56789368c264b4fb53757f15fa732170db8ed2eaff5090001b072481b00c215c glibc-langpack-gl-2.28-251.el8_10.13.aarch64.rpm 153c4b438b2efec96d425c769486f89a01f3cf85b18bad907c9ebd67b22c00cf glibc-langpack-gu-2.28-251.el8_10.13.aarch64.rpm d9445fd747f108c47b74277dc0a691e407549bdded82ea281582208c02f8c257 glibc-langpack-gv-2.28-251.el8_10.13.aarch64.rpm 6c29c613926a7761bfde20695f8051f02ca8bff00565eb48daa8edc183ac0a70 glibc-langpack-ha-2.28-251.el8_10.13.aarch64.rpm fa7381fb261a2dfa92cd1193553f62e51026cc95df5efee5f3a6710f5fd49807 glibc-langpack-hak-2.28-251.el8_10.13.aarch64.rpm 7ad5290b6112c1b11baa95a16e1ee0831df6e26cb130592d8aad5ff9ec483b31 glibc-langpack-he-2.28-251.el8_10.13.aarch64.rpm 54a6bd94bd4417fb03eea5d15f50dc58a18e76ea21384c236c156732ff091f1e glibc-langpack-hi-2.28-251.el8_10.13.aarch64.rpm df1938493a642f64b2535d440534165bf8c115206de53d3630e0372c844f567b glibc-langpack-hif-2.28-251.el8_10.13.aarch64.rpm b6a790610e93d7f8a489b2fe820bc17fd5704184860149a2a00edf6e667cbf5d glibc-langpack-hne-2.28-251.el8_10.13.aarch64.rpm d64ea066d11b695c93bae849cc5c63844857abdb53a499e29b28b66769a22a4f glibc-langpack-hr-2.28-251.el8_10.13.aarch64.rpm b74aedf1808bc5e24a2c5e03df2baab1b985de1e431fe41b948d221296836205 glibc-langpack-hsb-2.28-251.el8_10.13.aarch64.rpm b69a685829972801f0688f33f947cfb37eb3b6a1a8c741751cb7cf83bb39dd80 glibc-langpack-ht-2.28-251.el8_10.13.aarch64.rpm 72088ba4a41a2d7d677ee627357a21e566280291830ebc30e3749c40b746e44e glibc-langpack-hu-2.28-251.el8_10.13.aarch64.rpm 89dba80175b12d5c1c56e5d3e87f1b8c53f02a26eec100183c4024c0657e7ea9 glibc-langpack-hy-2.28-251.el8_10.13.aarch64.rpm 766a289a66b2ab572d8910b0f13f76a88176de8313da6c7a67fac96fda41130d glibc-langpack-ia-2.28-251.el8_10.13.aarch64.rpm 30d38440337c9278c9caa476d555ed07a93bd396b1ee8b2e0736b35033b47a38 glibc-langpack-id-2.28-251.el8_10.13.aarch64.rpm 2b9fa574fa9c00967b05d67c85aa5221adb9d1c91f1a8a7dc440bc7e654533bf glibc-langpack-ig-2.28-251.el8_10.13.aarch64.rpm e3abcdf8ec1319dae6e9ef055f2ef0acb5700464b902e28ba5a2fcdca5d18327 glibc-langpack-ik-2.28-251.el8_10.13.aarch64.rpm e1046749f601732ccdcde42b6131404ab088e49cd42acb31978047d34f163cba glibc-langpack-is-2.28-251.el8_10.13.aarch64.rpm 7185afa24bce49d5cf5e15731c9cff4f7cd4e5b0b9107c26898d62297cd771f8 glibc-langpack-it-2.28-251.el8_10.13.aarch64.rpm 8b04646244fdbc2ae4a75d73d1bdfa73aca20f19ef47217c84a893097bd48ac3 glibc-langpack-iu-2.28-251.el8_10.13.aarch64.rpm 0cd72360ebb1d37b34563b1b1135732a4c7271ef34a86a0b2bb240cdf0e9e80c glibc-langpack-ja-2.28-251.el8_10.13.aarch64.rpm 64ad99547f4f21e6a483d5e036d8ef9418bb84b982001655e261a3db20ec3f7c glibc-langpack-ka-2.28-251.el8_10.13.aarch64.rpm a928e4e103692c83af5ce3d524a592aa2add4d3ec7f9e3fba02ab2fb31e303bd glibc-langpack-kab-2.28-251.el8_10.13.aarch64.rpm ecec07e585e73d3eb82d93e87a6d3e582850d24bcc15adb6edbc9b9a273588fc glibc-langpack-kk-2.28-251.el8_10.13.aarch64.rpm d5be0b99e38635b72beb0de90d83949753a0f9c0715f0d700e30352d866b6a1b glibc-langpack-kl-2.28-251.el8_10.13.aarch64.rpm 414d24fe64e8a881bbf5a25f3194f5cd49f27ca3d9f39e892d0c4fa9d7137d5d glibc-langpack-km-2.28-251.el8_10.13.aarch64.rpm 60700c301235cd8d266211cc308b672152ea05fad76ccf0daaa015eb4d674534 glibc-langpack-kn-2.28-251.el8_10.13.aarch64.rpm bd3feff03fa98b9482a8791c2b5c5cb8a6561c1de3763cdfa6b6c95c944c9930 glibc-langpack-ko-2.28-251.el8_10.13.aarch64.rpm 84f30b5defeab831e629f4bfd9eda6d57f1af5816e9fa04e5aad851c1cbcc7e2 glibc-langpack-kok-2.28-251.el8_10.13.aarch64.rpm 90f1ce04ec9b2ecb9a25b4f3c56f54271dfce591b21e87a41ca027782d5e9d75 glibc-langpack-ks-2.28-251.el8_10.13.aarch64.rpm 9e187c8337501f8dc3bcbad5fc652869b9ce30d28f9ce2994342acb9a59aa553 glibc-langpack-ku-2.28-251.el8_10.13.aarch64.rpm 99483cce5447fabd9e7295107a6fc862ad6e80f843152be92e545f13b4fae31a glibc-langpack-kw-2.28-251.el8_10.13.aarch64.rpm 533e70fadfd0283073cc72df593597de4e4231fee92582a623b38a408bfc836a glibc-langpack-ky-2.28-251.el8_10.13.aarch64.rpm b12ac241cd50416c5580b1ac1e83bce70b5753d5d9c029b76b4c3cbd5a44c331 glibc-langpack-lb-2.28-251.el8_10.13.aarch64.rpm 29383aff5625906a3575991db0fc270eb4d2a8df4708aff973dcd89ed29dbffe glibc-langpack-lg-2.28-251.el8_10.13.aarch64.rpm f9fa543919289a9a46e7390b527e4b7ee16490057c7fa44c4c9bf7837963a587 glibc-langpack-li-2.28-251.el8_10.13.aarch64.rpm e11c0e01561f8f56b82fdf6d692ed26c5d53d215196a6e9d37d749526dd39b39 glibc-langpack-lij-2.28-251.el8_10.13.aarch64.rpm f79b65ef35e5ca20cf592df13c91fc84e042ebd6f7b7d1f4fa3afe803b68651f glibc-langpack-ln-2.28-251.el8_10.13.aarch64.rpm e1cbf5043b07ca65ca6cb61589b4dfc2257d26e436cdc6688e284c95ccac10c4 glibc-langpack-lo-2.28-251.el8_10.13.aarch64.rpm a645ae562fc8080c148f83b1a31b6ab7871984a14cca09a6200a2aafa1ab6fbc glibc-langpack-lt-2.28-251.el8_10.13.aarch64.rpm 3f7e606ad0265668f2976b46f0f37d0b0b9ddfc1d249f82cbbb182f648aacf06 glibc-langpack-lv-2.28-251.el8_10.13.aarch64.rpm a1741c4ad3b2922bbdfe08695b9c458880035491a5732d423c38a2ca24ad875e glibc-langpack-lzh-2.28-251.el8_10.13.aarch64.rpm 8e28300241590bded6b086fd9999b00c861f77eb3d594ae4343cc99ac41348d0 glibc-langpack-mag-2.28-251.el8_10.13.aarch64.rpm 8941f126881a26d2dd092c6989c2f4fa16880c7ede204e16ea45f1d7ca0dbd86 glibc-langpack-mai-2.28-251.el8_10.13.aarch64.rpm 0e45c4881ee3e391fc790ba2e423877ca4daed26bc2c036d4eca6c9237d0ad43 glibc-langpack-mfe-2.28-251.el8_10.13.aarch64.rpm 0161095a3bf0abe22aca0969d780e53b6a2f375228555a58971ddeb271899d2b glibc-langpack-mg-2.28-251.el8_10.13.aarch64.rpm b758f9864136b760d9f4cb8e820863777c12938a10ecb57466ac043d56b04bf6 glibc-langpack-mhr-2.28-251.el8_10.13.aarch64.rpm 937e42e738985bb6dcd18db60282b76fb7d72e0871dfb95a28cc0fe8f1517ed8 glibc-langpack-mi-2.28-251.el8_10.13.aarch64.rpm f578768ee8e2286da9f99075403344919f72b7be0c92e614b81d0810588cdd0a glibc-langpack-miq-2.28-251.el8_10.13.aarch64.rpm b2181ec474cf56cf3cee065ec672b3b0376c0933fc7ffc5bea670a187e534701 glibc-langpack-mjw-2.28-251.el8_10.13.aarch64.rpm 179483e7f6e65b1b9b6b1b3bafcafc561ba33f73879def417741f120e9a91702 glibc-langpack-mk-2.28-251.el8_10.13.aarch64.rpm b8f9a708d0c0a6ddc9be2d32b84caaa3717b9505b58b47551b5d43732097cf9f glibc-langpack-ml-2.28-251.el8_10.13.aarch64.rpm 9ed07929f592ef68069a45a4447beb278991fa1db2fd6bbed1cba870880c52c5 glibc-langpack-mn-2.28-251.el8_10.13.aarch64.rpm 73e14524971e3bb74b4f5da8f15f8342a03593698f8044070c63de90ab406d17 glibc-langpack-mni-2.28-251.el8_10.13.aarch64.rpm d8d8ee0b8068a544d7b917748cc6ade4f7f324c322a2f7dedc99678ebf8deee5 glibc-langpack-mr-2.28-251.el8_10.13.aarch64.rpm fbfe01d375c8662139a0f04ee738952b607be0abf82ec7b7b46abb603cefb850 glibc-langpack-ms-2.28-251.el8_10.13.aarch64.rpm 3abc8649becd1e52cb8461704b1c8f4b95bdb45df66e61fc8106662f055a031a glibc-langpack-mt-2.28-251.el8_10.13.aarch64.rpm bf293ee7e082bb4be90e08c17a9bbfac54a3c61de0bdeb6a63b906fcdf455d41 glibc-langpack-my-2.28-251.el8_10.13.aarch64.rpm ab514784e6a2c9e3668a7b31f8de091956a9930a56a810a482b3de6544538913 glibc-langpack-nan-2.28-251.el8_10.13.aarch64.rpm 6c08672eea674be915397407c74348892396ec83dc72edf2410dc09d0e5131c3 glibc-langpack-nb-2.28-251.el8_10.13.aarch64.rpm bec4dfe120704f7393809b68cdd93eb455457626b06286b641da135eb915554d glibc-langpack-nds-2.28-251.el8_10.13.aarch64.rpm 528713bfd9b0be54488f14231486017321077447165d27db98ede4a40411aaf0 glibc-langpack-ne-2.28-251.el8_10.13.aarch64.rpm fe65a018c6633a12c11058e26ce96d5c167c2609297f1a86c96ea0d4262d6365 glibc-langpack-nhn-2.28-251.el8_10.13.aarch64.rpm c1fe442a7f4e0c188f5c6662f1139d571bb99008cbd15759055956ff6048efbc glibc-langpack-niu-2.28-251.el8_10.13.aarch64.rpm b74e2e57a67a0be50a969bdc711dba4a1e6dc17f16a6dc01da94e3605a253fb1 glibc-langpack-nl-2.28-251.el8_10.13.aarch64.rpm 08c090e38290035b1806e7709260f6630d5bedb16f97a74f2ae914d69b72d445 glibc-langpack-nn-2.28-251.el8_10.13.aarch64.rpm 4d600559834376f50417bc10b99a4088ec4b87e6f2ecc16f7e38a2b6b29251e5 glibc-langpack-nr-2.28-251.el8_10.13.aarch64.rpm 1245445ff8952a3f057f590851b32a683c1f2b003c78e1230bb64c7abb207fcc glibc-langpack-nso-2.28-251.el8_10.13.aarch64.rpm 17414f21ac36cc3dfc88fc69b4b46553b793e75b6c70a87dd26f6e312c5e61b0 glibc-langpack-oc-2.28-251.el8_10.13.aarch64.rpm e9ac5b8b1e8867f8dc833226d1e9f0521002009a482e7f5dc3fc9243a10e6091 glibc-langpack-om-2.28-251.el8_10.13.aarch64.rpm b9618c19d0ad84b4ec30a5399939d8e43c8288e2a711a6ab48bc6a5500a3b9cc glibc-langpack-or-2.28-251.el8_10.13.aarch64.rpm c6ae1cc2e4804720eeb5bd8a1e1aed939f75cfba9d1859996f4cb69b5d2a080a glibc-langpack-os-2.28-251.el8_10.13.aarch64.rpm f77cce2f4b13355815eed50af57da323d4b5561996c00bbbf80157ff88c0b706 glibc-langpack-pa-2.28-251.el8_10.13.aarch64.rpm 6a67744b08b00e882b3e71425b4c766e9dda8f7c2e371541de6335da78c164ec glibc-langpack-pap-2.28-251.el8_10.13.aarch64.rpm 6ecd451f3bd53289948760e9a413661c734987b0fadd6eba72e1c6a8aa9b067a glibc-langpack-pl-2.28-251.el8_10.13.aarch64.rpm 6f74d6ccd4136d5bc1a332422f28ce739c87bde1fd66898560eaf2c8e6864c6f glibc-langpack-ps-2.28-251.el8_10.13.aarch64.rpm 7b100c3537d5df29fbdc0a1403b1232088e33e05df842a76b38f74f67812d4af glibc-langpack-pt-2.28-251.el8_10.13.aarch64.rpm afa8feaf8c6308b8108d2398e9b521ef8a1029523874b779115a6142d4985d16 glibc-langpack-quz-2.28-251.el8_10.13.aarch64.rpm 128aee45be6af116d9be7f7b22c2d95d819d6d7aa88a493f7d12455ab86f8f82 glibc-langpack-raj-2.28-251.el8_10.13.aarch64.rpm 990d835b41205b30a3094ac4545f9aac5a2c18bdd4191994a331a523cbcdb478 glibc-langpack-ro-2.28-251.el8_10.13.aarch64.rpm c145c4b96b1e72c795404887812c5e35c00d4e25a31fbed25322d687f96da9a5 glibc-langpack-ru-2.28-251.el8_10.13.aarch64.rpm 87e29def7d3d3999c5c5256e6e3b3dd6b888726532235465d1b1c6adb535c807 glibc-langpack-rw-2.28-251.el8_10.13.aarch64.rpm f16f16af8b3359b3b71ba4afbd3a8c0c5facc65bec20afa5d054b3f785a3d4d4 glibc-langpack-sa-2.28-251.el8_10.13.aarch64.rpm 7ad4d2dd27d0e358b37d85f50c671719e743fb7a6cee1c385c26c9c80ab6221c glibc-langpack-sah-2.28-251.el8_10.13.aarch64.rpm 0176727a9c8bad7ff71130b4e8057849dd87eeb847356ad0d11a78b9c7d8fd72 glibc-langpack-sat-2.28-251.el8_10.13.aarch64.rpm a13dec305fc2cb54c28b9aca62de42f8e2e5f3ef7f8aefe9a689cdbc666b8093 glibc-langpack-sc-2.28-251.el8_10.13.aarch64.rpm 25456cd3bd6a6b5ed011e71ece2d908e039cae70d6cf4730b735f37f21e65596 glibc-langpack-sd-2.28-251.el8_10.13.aarch64.rpm 5f7b5292cb533b838afcde177517ba2d8cc24a54f2527df59bf042aa70ab481a glibc-langpack-se-2.28-251.el8_10.13.aarch64.rpm daf5fe349c27ea38d7fef8173477067c38d3ef0015998f7a97933994d391f11a glibc-langpack-sgs-2.28-251.el8_10.13.aarch64.rpm beab31138a18765e5f50b438f8d176358c90e506733c5fdfc3c1f608cce2cde5 glibc-langpack-shn-2.28-251.el8_10.13.aarch64.rpm 0357755de5057e4e2fbf8e77a48bb821a923248a93969883c2d38ebcd941f623 glibc-langpack-shs-2.28-251.el8_10.13.aarch64.rpm 624f6f49b17f14ea1a6e68176c582c4369067d45ce6c8b15e8b67cf8452f438a glibc-langpack-si-2.28-251.el8_10.13.aarch64.rpm 5fa556966d35047b604f9b346559a7a283fc30d1b24ffe87a7b018209edef103 glibc-langpack-sid-2.28-251.el8_10.13.aarch64.rpm ca6e03489980c887918aecbd6c203608adceca2c776a7117e0a4f9d5ad06b470 glibc-langpack-sk-2.28-251.el8_10.13.aarch64.rpm 7c1a227e84e5f1c92f90d12cc842bc5942cc3b736a1cf191ecbd6401fb0af97f glibc-langpack-sl-2.28-251.el8_10.13.aarch64.rpm bca905bd274507932e46948b496b370b45b2b0403013b74419219f9a08d69b3c glibc-langpack-sm-2.28-251.el8_10.13.aarch64.rpm 502c39d8594b78a8f172f1257fa8a07a29be3a83373048358d9a19ea7657d956 glibc-langpack-so-2.28-251.el8_10.13.aarch64.rpm f37d6497568fde1208a1fec60cc053bb4767142ab7b4ad5636efe1174fe487af glibc-langpack-sq-2.28-251.el8_10.13.aarch64.rpm c2585554456fec354d14b198ff1f570f2f799f2ddcf125bf23877a3910d437f6 glibc-langpack-sr-2.28-251.el8_10.13.aarch64.rpm 2c28735aead89fe97d37d5ab2cacfc0b939386cd45bbf3a5bf80705e2f7b818a glibc-langpack-ss-2.28-251.el8_10.13.aarch64.rpm 85e8bfecfacb23c8eb63d240030a0715337d0c0cd3490a09d6bff38d8a3eb334 glibc-langpack-st-2.28-251.el8_10.13.aarch64.rpm f7c6848e2be4a10c8513a59007b5b37db7553d05a6a8d23b042cd7ac217b6650 glibc-langpack-sv-2.28-251.el8_10.13.aarch64.rpm b98875a3133663d6b3600f473625636afbe1eb2b8439984e6b34eabf752fa2d5 glibc-langpack-sw-2.28-251.el8_10.13.aarch64.rpm e4c4396f1cc38615e3764e3a7f224b53ca519028510da7521f78e5c0463fdb7d glibc-langpack-szl-2.28-251.el8_10.13.aarch64.rpm a015b3a5f9a05d9f495be74607a7060d183d8dfa9caf23d593cfd2aa503fcc89 glibc-langpack-ta-2.28-251.el8_10.13.aarch64.rpm 7c0d83d82817a8fb2b313dd13472207cdbee8941fc71a7324ad210dc2f0805af glibc-langpack-tcy-2.28-251.el8_10.13.aarch64.rpm b2ba7c608c570ca21663811fad0c568b5e2c85942a47007797e50937d1ee5d4c glibc-langpack-te-2.28-251.el8_10.13.aarch64.rpm 809db3e561709b527c9492fbffbd522b0476a4e4ecd6f233e189797d1de73bab glibc-langpack-tg-2.28-251.el8_10.13.aarch64.rpm c18ef02d0f5d7839f209a9cfe8fb6799fdc0aca5be7e57c70063b7def7df1590 glibc-langpack-th-2.28-251.el8_10.13.aarch64.rpm de2ba01bd20c83cd8bcd4f44a06315b247c691b0b29f1b6473212599dae6f922 glibc-langpack-the-2.28-251.el8_10.13.aarch64.rpm 9723b6878b134c639b028a6ebd274d32302f3ca7ba37144dcc49353449712dcd glibc-langpack-ti-2.28-251.el8_10.13.aarch64.rpm c2ef0ac149e172a17b35d2070cc97f524e250feeb28c3f5e23bab09fdc00a607 glibc-langpack-tig-2.28-251.el8_10.13.aarch64.rpm 956405193b03b3e8d0ab05de8429341c13da3ddf292751438220ee8a48a8122b glibc-langpack-tk-2.28-251.el8_10.13.aarch64.rpm 8ebbf43811b18193fac5b80c316408b9d4d90674805471bbf9e87cb46aa965e7 glibc-langpack-tl-2.28-251.el8_10.13.aarch64.rpm 160caaf8c20756bc56f62364264aeaef4037dd84f3cfa90982d4b92cd5b22401 glibc-langpack-tn-2.28-251.el8_10.13.aarch64.rpm 7b40e651f21c0cc34161bed675be7ea1b9b7fd508129d4297053f65fcdb2520f glibc-langpack-to-2.28-251.el8_10.13.aarch64.rpm d63b3c14819607d26b5b5dafb88805f656a6ee46881ae8e7bd2ffc619e4361a5 glibc-langpack-tpi-2.28-251.el8_10.13.aarch64.rpm 0b1af9779eb6f87a34ac832e5be2dfaf825351761dbe21a83fad7f5511444879 glibc-langpack-tr-2.28-251.el8_10.13.aarch64.rpm 95c5b749abfd9ca93882908d69b2bf7d2cc7a516f71d1dc98886776624a80f9e glibc-langpack-ts-2.28-251.el8_10.13.aarch64.rpm 75210ec875d9b40eba4385ab7974a166f14b0c13ec328228f8e255aeade1d964 glibc-langpack-tt-2.28-251.el8_10.13.aarch64.rpm 58a278efcdf7d1dd3f8a9c0aa0294075acc44073f3184d96e73bdc51c77f2308 glibc-langpack-ug-2.28-251.el8_10.13.aarch64.rpm e6f268954d0dd892fff7c7e57b99094196134ca5c22d813b8104379575059075 glibc-langpack-uk-2.28-251.el8_10.13.aarch64.rpm ff9b44e171aebd62f9061b6c6932801902a9ecdcdbabbacf7310d023ff53bacf glibc-langpack-unm-2.28-251.el8_10.13.aarch64.rpm 1fc63810b8bd505e2de3a2a4f72c2ff1732399e3520aa14c8b9a66111b2cb9b7 glibc-langpack-ur-2.28-251.el8_10.13.aarch64.rpm 0cb2f6a9e214bbb73389a17b84dcf27374c134f6c54fc0b318ddf310bce6ffee glibc-langpack-uz-2.28-251.el8_10.13.aarch64.rpm b6c5a627349fc1c0f4a5eb9bb026d5afa95887f3972899eedf40f8ddb436afe4 glibc-langpack-ve-2.28-251.el8_10.13.aarch64.rpm 8fd13e5046c9cc83013e71a49c66dd43d4e11c84df112133144655cce5f003ac glibc-langpack-vi-2.28-251.el8_10.13.aarch64.rpm 2ec671aee8f4627f13a70005b5064737e9f39e95cd1aa22afde5d9cce2e140e2 glibc-langpack-wa-2.28-251.el8_10.13.aarch64.rpm 7c3a124979ad5c8367ea3129d6ad51bc9c166252e198a87aa9356f25925087e6 glibc-langpack-wae-2.28-251.el8_10.13.aarch64.rpm a7ded080f5cbce0b4645323dfed4566d14813e2d62794978321acf1451bc3823 glibc-langpack-wal-2.28-251.el8_10.13.aarch64.rpm e8b5467a52bf811e91d1c085c2a90e4558b0684a84b858950d0108e4e34d163b glibc-langpack-wo-2.28-251.el8_10.13.aarch64.rpm ee41f9b0ccd345f4f785e773254c6ab9ffa3a140ddce16b39562d7b83a64a698 glibc-langpack-xh-2.28-251.el8_10.13.aarch64.rpm c47ceab3fa9cb0d67a8f275edc141b84ea501c20b2e273640d063758b0d3ffc0 glibc-langpack-yi-2.28-251.el8_10.13.aarch64.rpm 49876f7f048295108672f476d984072aa0e4ac6abd362cf28e45a00637277990 glibc-langpack-yo-2.28-251.el8_10.13.aarch64.rpm b192e8fc587e19ca7821244b5cd20d565c4e0bf0af342e8e64d30b6e4531dde8 glibc-langpack-yue-2.28-251.el8_10.13.aarch64.rpm 6f46cf56281dddb1d649b535347dcf21bf897333785bec1f78874fa858176aa2 glibc-langpack-yuw-2.28-251.el8_10.13.aarch64.rpm 238b2b4a1897f4b6ac0033a1edde3b712161649b17e5c2ea085848f4327fcaa7 glibc-langpack-zh-2.28-251.el8_10.13.aarch64.rpm 5a7b48f347b3f416a7ceaf422b1f6e16cf1088f2e2e908fdc53f1bdb04089577 glibc-langpack-zu-2.28-251.el8_10.13.aarch64.rpm f65d7db30361069c6fa0961448910bdb0a4f63e18d86ad3d91f5b53d286899fb glibc-locale-source-2.28-251.el8_10.13.aarch64.rpm 90c491cfceb0d2c954b4d2b1424b49dd0ff96def245248d65811c4a4b56418a9 glibc-minimal-langpack-2.28-251.el8_10.13.aarch64.rpm d2c82fe82f5a0e9ce942037bfdf6e3f4268fde25efbc857f2624baa52e08a9c8 libnsl-2.28-251.el8_10.13.aarch64.rpm bcd033be95a0d19f07e462b85881193f50d02ad085b6f6469e0b9932a67f01af nscd-2.28-251.el8_10.13.aarch64.rpm 2b1a3606e0a86a51931dda934b8bbb55974cc64965f48edb3146d0ceb1e21ba7 nss_db-2.28-251.el8_10.13.aarch64.rpm e65661be32affe5c0dfd1919ed37bce87d859f7999be0817731071b97e0b0a50 RLSA-2025:1675 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: Many records in the additional section cause CPU exhaustion (CVE-2024-11187) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.36-16.el8_10.4.aarch64.rpm 6369e3f0ebd4dc88f23fc852d6f1b88392b5f040bab11107594fbc2d72d22dc4 bind-export-libs-9.11.36-16.el8_10.4.aarch64.rpm a1ec7723e0803b2636e6b95bb14c7718aa68e3c25ba8a8b6b7ccb05e911df99b RLBA-2025:2871 glibc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es): * [S3][MC8.6] Multithreaded syslog race condition fix backport request[tools] (JIRA:Rocky Linux-78390) none-baseos-rpms glibc-2.28-251.el8_10.14.aarch64.rpm c3e8b50805672f09b56905df74586386074da44cb866bb7a28ff67ec35a585ae glibc-all-langpacks-2.28-251.el8_10.14.aarch64.rpm 1f93cd79b324f3d65e6bff89e30f8b55db3a1cc4d23818a8225f1ba240c5f467 glibc-common-2.28-251.el8_10.14.aarch64.rpm b9708e081085765ab164361ddcecb814963fb6f3254cacadd2aeaf664bff1d21 glibc-devel-2.28-251.el8_10.14.aarch64.rpm 18abb39962da9695926850433ad63f309d2f28ec4e88aeb3ec0f27aac9b6c1c8 glibc-doc-2.28-251.el8_10.14.noarch.rpm cfd62482ee6d6a17c7d103c209965bb9c02a31af4da44687905589b749291429 glibc-doc-2.28-251.el8_10.14.noarch.rpm cfd62482ee6d6a17c7d103c209965bb9c02a31af4da44687905589b749291429 glibc-gconv-extra-2.28-251.el8_10.14.aarch64.rpm 98fcafae35f5b9d44fa3a1787597bfa43c62a73c20b7e70a3424e0089cd6e58b glibc-headers-2.28-251.el8_10.14.aarch64.rpm c63d1e7470d108d924eb3450642c9d51f02c17e45605aea545c3b3aa42729297 glibc-langpack-aa-2.28-251.el8_10.14.aarch64.rpm 3113d5fa7ae207ca787aff65aad146840e3fcf6862d53ad161b6372192b1f287 glibc-langpack-af-2.28-251.el8_10.14.aarch64.rpm be13ae9e2767971e922bd3a029faa5eac19bcb9122ca15ed71c153368988b735 glibc-langpack-agr-2.28-251.el8_10.14.aarch64.rpm e006e625e99d54ec1db77575ab00653dad91e477a4b218e19a7e62b03ab6efbe glibc-langpack-ak-2.28-251.el8_10.14.aarch64.rpm 47814b0779ca2be17fbf57017b008256a909f2715f3f62f98bcf6c142acc5161 glibc-langpack-am-2.28-251.el8_10.14.aarch64.rpm aa0e0c8fc7ba5e9854923e2e5fb52d1d794c05ee7b767ee79f63d8ea577aaf3d glibc-langpack-an-2.28-251.el8_10.14.aarch64.rpm 80a14a87eae22e00f93387a44a48de2f3b970bc19f74ff2279e5537c82c2bad1 glibc-langpack-anp-2.28-251.el8_10.14.aarch64.rpm 2cafc39e7fcba5a01ad70eceacd1bf1cfeae089cb29d683c8340b2506f068286 glibc-langpack-ar-2.28-251.el8_10.14.aarch64.rpm 272644ed719986f7ae0e27f8c7500c5452a4542bd3cf395cc46f453093f242bf glibc-langpack-as-2.28-251.el8_10.14.aarch64.rpm 9fefe4f0d86991a1a69aab5c43edb48265bda7e2bf3d16e5c3a5724f69bf74c9 glibc-langpack-ast-2.28-251.el8_10.14.aarch64.rpm b9331a8930ae1b645193de6b32118b0a051ae3de14ee1413fb4158536438b0d3 glibc-langpack-ayc-2.28-251.el8_10.14.aarch64.rpm c0d856501ea1a2f857dd0724c37da5ed2f665c7f491c9801271bba588d35ce70 glibc-langpack-az-2.28-251.el8_10.14.aarch64.rpm e1e0506c9eed183288ebfa0c583e5a0dfbbef1f810766586eba392e7a302d801 glibc-langpack-be-2.28-251.el8_10.14.aarch64.rpm d4bb84d37c33712362f66ba4b69644750273cafaa2ccd6bd034424366bec139d glibc-langpack-bem-2.28-251.el8_10.14.aarch64.rpm 4d564aab0c2586e02c5b4d648c2195fd5669437df70c50e6151132647baa4ca0 glibc-langpack-ber-2.28-251.el8_10.14.aarch64.rpm 9c9c685a7c93b901b5715028d0fc3c479c12f36aff61026b963b3fff810e477a glibc-langpack-bg-2.28-251.el8_10.14.aarch64.rpm 876dcd0d523981b4f6ab4a317c7e05d1badf86e8546c41409fd55fd330332281 glibc-langpack-bhb-2.28-251.el8_10.14.aarch64.rpm 9d3db60a616dd45e687dc5a776cee3478bce90a11e381ef9de859ad9a73fa932 glibc-langpack-bho-2.28-251.el8_10.14.aarch64.rpm 6a2feb15e69737875fd3e680d4976c6906d04c51ddf76d0d0846edbe3f5052ed glibc-langpack-bi-2.28-251.el8_10.14.aarch64.rpm cda197e9ab1b72dff57d7ad4625b83f3ec7f3d17608ac092433b49a31fe54611 glibc-langpack-bn-2.28-251.el8_10.14.aarch64.rpm c0d4b3744e98139c728d891a3058228bb8ab89eef683992e1738453c5f6291a4 glibc-langpack-bo-2.28-251.el8_10.14.aarch64.rpm 209df1e656a214a4ae8dbd94e27695ead37b3e93e690fdab9136694bdca28617 glibc-langpack-br-2.28-251.el8_10.14.aarch64.rpm 4d51b0949bddc2c28a5d4fdb449034b99fc3370c5648a36ee2a832368375c0e5 glibc-langpack-brx-2.28-251.el8_10.14.aarch64.rpm fa340441e0fc9f459b8aaffb95bfea1426e14742088239723e5f42f092e6cb44 glibc-langpack-bs-2.28-251.el8_10.14.aarch64.rpm 7f902d63fedf4014c78c26eacf1432fc717f2c352de555b0b67054b0b8850d11 glibc-langpack-byn-2.28-251.el8_10.14.aarch64.rpm e80a2d898f777fff0ea140d384f1ec732efde644ea7f6aab2190d73407402cc0 glibc-langpack-ca-2.28-251.el8_10.14.aarch64.rpm feb3b116ba8a1383a21791e8e3cb4b57d16b054642aec0ca70419ee14215e73c glibc-langpack-ce-2.28-251.el8_10.14.aarch64.rpm 6144841fdc2c23595be8cab0343aa05a7c3efea82aaf124637e7a9f98990cd6f glibc-langpack-chr-2.28-251.el8_10.14.aarch64.rpm 1d243824357055802928177317d5e1ace7ff8c0cd6dcc66a8695f25893378ac6 glibc-langpack-cmn-2.28-251.el8_10.14.aarch64.rpm df5eae90299adf58c6efa221b92717a3697e8918828e874ea04f26e15e3e8276 glibc-langpack-crh-2.28-251.el8_10.14.aarch64.rpm 0a8ae83041f66065472b1b8cdb0db8797dbe64d5370ff96ef5381cef7f265b47 glibc-langpack-cs-2.28-251.el8_10.14.aarch64.rpm 8749575d72d04cacbf922b58cdabb44f342a6ec43aaadc00b8e63f235689da2a glibc-langpack-csb-2.28-251.el8_10.14.aarch64.rpm ecf407cff1df8a3f0089890a839ccd45f484e5376052f13a63b81e2966c048c2 glibc-langpack-cv-2.28-251.el8_10.14.aarch64.rpm 350fd2c36a06290fc0a98ff7ff99f8636d7c9f885e2590f142ab1d8802fc53f1 glibc-langpack-cy-2.28-251.el8_10.14.aarch64.rpm bccb189dbf85c32f64b90fe32af6f2cd63d1a0e41c5d37b0e15f7e8edf4490c9 glibc-langpack-da-2.28-251.el8_10.14.aarch64.rpm b0ef29759de027cc57ca72fd80697e79863d84df2fa39b07487e8e7cb266d8cb glibc-langpack-de-2.28-251.el8_10.14.aarch64.rpm 1e4438523f8224ec8b83e47b66e9d5d271cc35a05de23516f671332fbf003672 glibc-langpack-doi-2.28-251.el8_10.14.aarch64.rpm 52fdd95a4bc5d697bb1ff902dcdbf407d6e44b90bfb591d42468b2f9e8a505af glibc-langpack-dsb-2.28-251.el8_10.14.aarch64.rpm 029c13b9a1edc07c5ff6655ddd8ce2c0c9df6de8422dc7846640e9d5521976ba glibc-langpack-dv-2.28-251.el8_10.14.aarch64.rpm 2bb94fa977dd49a29f4a4e6e910604a1a1b3a484961705e848cec1c84d7de931 glibc-langpack-dz-2.28-251.el8_10.14.aarch64.rpm 2ffb04fa9a50960d8d5ef68186b2b552dcce66cffdfcb7fa9be059e27d96c64e glibc-langpack-el-2.28-251.el8_10.14.aarch64.rpm 010bcbb9952371e2981e0f69f9014f92fd6cf8a494621733b300e69054c6beb1 glibc-langpack-en-2.28-251.el8_10.14.aarch64.rpm 28cd01c999b3417bc836f87b5994c16913811d9cf562cc2db85a917c2db754c1 glibc-langpack-eo-2.28-251.el8_10.14.aarch64.rpm 18a25d868e3cb401ba38b480a2627ae8d010c8ff287e619af72b188f05474693 glibc-langpack-es-2.28-251.el8_10.14.aarch64.rpm 8bd86e1b2e7e16f5f45340b409b26837ccb4843d2e1b3eb5c25e903b4550eafc glibc-langpack-et-2.28-251.el8_10.14.aarch64.rpm 4a4e435e84723509ec80c377d0a744d38fb0f35b408cdc5981d16ed6dd9b8c32 glibc-langpack-eu-2.28-251.el8_10.14.aarch64.rpm c434d50b7252d949a55cee109f35aeda346647ea9404b5080e42e12b4e58cf9f glibc-langpack-fa-2.28-251.el8_10.14.aarch64.rpm 5752bad59f3af70c8a48d71fb647a8b54123cbaef72556f4c6650e005caaefcd glibc-langpack-ff-2.28-251.el8_10.14.aarch64.rpm 0647f8bd21e9938b89e6c2ee395d21ad8ed1c7be4570781dcc7a9f9eb0696667 glibc-langpack-fi-2.28-251.el8_10.14.aarch64.rpm 74c496ffcbcf024abc5cab9bb068049b711eecb7e86ded94947af02fba00ba51 glibc-langpack-fil-2.28-251.el8_10.14.aarch64.rpm ed974ebd9ac43b47f7b6d41cdd5b9c167d4ef2b54b04658593eba2542fa878b3 glibc-langpack-fo-2.28-251.el8_10.14.aarch64.rpm f9eea2b609cbceb0b0c1c2af5077acda48356eba9ff63b9d8f2b238a6d8c91fd glibc-langpack-fr-2.28-251.el8_10.14.aarch64.rpm 14a343d4d385a6f74b84e3b361d832716796e34549e92627600a6f8b837c45b2 glibc-langpack-fur-2.28-251.el8_10.14.aarch64.rpm 1adf08a8608b7cab3a145494e55cfacfa17c598af5a3b9d3e24848cda9d65355 glibc-langpack-fy-2.28-251.el8_10.14.aarch64.rpm ba619032c1ee47a6ce895baa6ebe638581bd7b567b23afd525ef95a3927015b1 glibc-langpack-ga-2.28-251.el8_10.14.aarch64.rpm 28b0a1d25db7cc15086daed3796d872a81036a49021f804308d9bf6bc3a9cf8d glibc-langpack-gd-2.28-251.el8_10.14.aarch64.rpm 95be8c5799ded207b3d77ba14bd94f2a32b1b175caabce0c143825f8b54d857d glibc-langpack-gez-2.28-251.el8_10.14.aarch64.rpm f010c14735e7983956a5a373fb3687723bacfa73745d83763c4c8b020aa07da1 glibc-langpack-gl-2.28-251.el8_10.14.aarch64.rpm 0aee8dc2235945145049025dc75080a962a24d8804e8c263c753befb7a2b755f glibc-langpack-gu-2.28-251.el8_10.14.aarch64.rpm 02635447d4bcc40a641fd27be3a3b010e6d4495c570fe107a8b328413f1417fd glibc-langpack-gv-2.28-251.el8_10.14.aarch64.rpm 745db0fd803471e1bb23a9b8f620e0784492ff27c487df9e0f698f93e5150b7f glibc-langpack-ha-2.28-251.el8_10.14.aarch64.rpm b48d716f97fd015d471bc4ad3ace34ca7b4535ab26d7e13e28aa91aed0256f73 glibc-langpack-hak-2.28-251.el8_10.14.aarch64.rpm d7b472798d396a822e9cdb9340b88cadc2c08a298a204b0d4d5d12f540b18d12 glibc-langpack-he-2.28-251.el8_10.14.aarch64.rpm e6355b1c37d255844ac6483a7021db106ace97095eac80e8f7153a22c555dbc6 glibc-langpack-hi-2.28-251.el8_10.14.aarch64.rpm 3944d62106c6cbfba8cb3dd6e6a7cd0547b6303ceacbf78317246856b5777772 glibc-langpack-hif-2.28-251.el8_10.14.aarch64.rpm 182e1e4af0c504b5643868c75761b52d7dfae73431312c1e5c801eca315bf618 glibc-langpack-hne-2.28-251.el8_10.14.aarch64.rpm 6d70a8e94bc75a9f71038686a10d64071c4cd40e4a2bb7602ba6ce43d806d860 glibc-langpack-hr-2.28-251.el8_10.14.aarch64.rpm 9512dc81e06d984e017808d42539c2a69ea001256aaae5194318a85faa4cc05a glibc-langpack-hsb-2.28-251.el8_10.14.aarch64.rpm a49c90338c8e912eeb6905d4c8b92c12797530162e75d113281704c58b89970c glibc-langpack-ht-2.28-251.el8_10.14.aarch64.rpm 72fc72ad1a12b87d94198139df6ea22af18dc6ff93859422ced8491530681ce0 glibc-langpack-hu-2.28-251.el8_10.14.aarch64.rpm e845dd292c598c0061a9944a844fa5fbe3470ab81017c6be064321acb1fbcd7a glibc-langpack-hy-2.28-251.el8_10.14.aarch64.rpm 4aa300e3403ec1a837184c4a646f6671c7459646d346fabd5737b94956490b7d glibc-langpack-ia-2.28-251.el8_10.14.aarch64.rpm a3be7d0e3f9d8dcc9ce287833ac8ac03ee00128a645372b6a513678846e11cd1 glibc-langpack-id-2.28-251.el8_10.14.aarch64.rpm c9414f06142b6fb81d763193fd0e889b3ebb5102911c77c44d6e13499fc7bdcf glibc-langpack-ig-2.28-251.el8_10.14.aarch64.rpm 2a7d79543380ad54009fe5c00038e4c36d4ea3caffaddbc61b89e47ef90fcbd8 glibc-langpack-ik-2.28-251.el8_10.14.aarch64.rpm 413bfa99f771a10b0b751eb3985ea0cedb2e6b48adfc1e48d1ff1e6e9d1be505 glibc-langpack-is-2.28-251.el8_10.14.aarch64.rpm 60308fdfcb0df8a1a6cdc23e73604855d50bc7e45ec53383597627c41993cf16 glibc-langpack-it-2.28-251.el8_10.14.aarch64.rpm 130fc7b348073e7cac95e8c220c1b2abb79de5f841c5c5141d8a70e6fb3c233e glibc-langpack-iu-2.28-251.el8_10.14.aarch64.rpm 8493924377d2a46e52046030d5027cecdaea70f538b449a574add713741af8d9 glibc-langpack-ja-2.28-251.el8_10.14.aarch64.rpm 1eb8eb7cc77c3a22042f846be17c25b837d7f4c851e3da2c5031cbc053d80693 glibc-langpack-ka-2.28-251.el8_10.14.aarch64.rpm 0744cbaf0011a05352ebfe95e12e7478cbc402c8a0d5b9fb2143f51bae80909b glibc-langpack-kab-2.28-251.el8_10.14.aarch64.rpm 792bc876171f07561dfe2ae2d57a1a77f45a07daacb39d0e51c88975fcd48d77 glibc-langpack-kk-2.28-251.el8_10.14.aarch64.rpm 49279be7137db37dca02d3c029af422dfbe256bbb5bde8128d56ce56b8beaa8e glibc-langpack-kl-2.28-251.el8_10.14.aarch64.rpm 88013a6b85ccbc314e2d37f705ec483ec987c5c6273add0ea56763563b4eda28 glibc-langpack-km-2.28-251.el8_10.14.aarch64.rpm 7dd4018b9a092c10095d97123530f008ddaa7cd0e3d510eb5eb07122add15cce glibc-langpack-kn-2.28-251.el8_10.14.aarch64.rpm 4a4ca9d7755e3b9ede9c7c935c981c943a673fb7ed3bcc35c99726558714904c glibc-langpack-ko-2.28-251.el8_10.14.aarch64.rpm d034b1de179857e08b9db166699f9a285e554f133d235522785317b78e84e45e glibc-langpack-kok-2.28-251.el8_10.14.aarch64.rpm 800398b2b20897d2c9c9538f6fac3d3b62ab4a213e6ffc4149bdbcc7ba087e25 glibc-langpack-ks-2.28-251.el8_10.14.aarch64.rpm 47557db53c2172f5074f89d8f7f778f0322b550cf4134663311dd08a9e663917 glibc-langpack-ku-2.28-251.el8_10.14.aarch64.rpm d206a72e9ce5f4641256cc56975835d1f477b5807c9f82b8174f4845c049e087 glibc-langpack-kw-2.28-251.el8_10.14.aarch64.rpm 4ca6624a29e610900d9668f3e0773562be9e592445db76149644f5894298c71e glibc-langpack-ky-2.28-251.el8_10.14.aarch64.rpm 33e0bbdd4c105d0281ce893c8f26a30f378297a739e485be6874ae6b167eac4d glibc-langpack-lb-2.28-251.el8_10.14.aarch64.rpm f4dad4e9e11f5371c5bd140816bd5a4ad7fc247cfbabccb2df61d6fe07d1b1fc glibc-langpack-lg-2.28-251.el8_10.14.aarch64.rpm 4e1ba79141d1c3a17fd1d8264dfefb19b0d6d6e57821e4f31f1a15aefd63f617 glibc-langpack-li-2.28-251.el8_10.14.aarch64.rpm b26670214be20d54de82f65ea8ab39c1e9f9ef2a1b1319e638ba874b013d6415 glibc-langpack-lij-2.28-251.el8_10.14.aarch64.rpm 49cea339e84fe9f45eb84456c6390d80f62556eb43847be3aeee0b0e2660dee8 glibc-langpack-ln-2.28-251.el8_10.14.aarch64.rpm 3af92729816a42a9afbb5db7549f3117e270b798886527868c2533ab2242ecd1 glibc-langpack-lo-2.28-251.el8_10.14.aarch64.rpm f6081a41a57a3031ab8c0e848286c83ac5354858145095dc92c4bdfcc207fd47 glibc-langpack-lt-2.28-251.el8_10.14.aarch64.rpm a00fdd028a2239841ffbe2213bfe131da0eebf09b17c052d5a1f4f6929594d2d glibc-langpack-lv-2.28-251.el8_10.14.aarch64.rpm 5fda14ade3d3ece73deb21d03e283d0eaa503d373a6272f1ca7457da40d50cf6 glibc-langpack-lzh-2.28-251.el8_10.14.aarch64.rpm 21670b6812c7a6f78729982bc6f5fbf0012e277884a280876aa9285747332bb6 glibc-langpack-mag-2.28-251.el8_10.14.aarch64.rpm 9284238c58d4263613f07dcc9c23c9c4b9ab8f38376117f6413c53d1a44da658 glibc-langpack-mai-2.28-251.el8_10.14.aarch64.rpm 3256ffbd27340cbadcaf56d7ed02dcad7dff530b602dcfd603bf2adb76ef9a2a glibc-langpack-mfe-2.28-251.el8_10.14.aarch64.rpm 1a27ee3cb0d4cefa1066ff25387e67a8896d113bc397f4b2fd12f55067e0dd96 glibc-langpack-mg-2.28-251.el8_10.14.aarch64.rpm c21fcfbe59aafa4f0c24f18449fe6c684f8b674c5e30db54f6778d3c1abdbbf0 glibc-langpack-mhr-2.28-251.el8_10.14.aarch64.rpm 1b7b922329cace6d4a5cc8b2b59cb327d92f65d83298e140164ca8d3a07261cf glibc-langpack-mi-2.28-251.el8_10.14.aarch64.rpm 1f8f87a071f994b5930d6ca56e889c25150b360f9913358e77aba96fe58b14d8 glibc-langpack-miq-2.28-251.el8_10.14.aarch64.rpm f07d2313250e0f709e23244ffbb637b13dfb849f51c71d5e329c9d836bc46431 glibc-langpack-mjw-2.28-251.el8_10.14.aarch64.rpm 44b6d3ab7f4ddd8242d2fb6ebb723eae37eb3b1bb7f71430a1c6a232852b0d3d glibc-langpack-mk-2.28-251.el8_10.14.aarch64.rpm be92f027b6c4b18792499e0ac3a742fb925d2e23c36223440265fe4707131725 glibc-langpack-ml-2.28-251.el8_10.14.aarch64.rpm ee6b53db67e2008e353be70fb3dfb0a0c1d1be1976c88242feb907c2da02a46a glibc-langpack-mn-2.28-251.el8_10.14.aarch64.rpm 3d7f2b6d18595be4921c6061406097c26381bd33f29910331adc3c0990c80475 glibc-langpack-mni-2.28-251.el8_10.14.aarch64.rpm 79bf14e98f5f27fa1df7a487fb06b8b1807db6aa350415488249fdf3f3b19a50 glibc-langpack-mr-2.28-251.el8_10.14.aarch64.rpm 678abd7f1e1feceb1b4fb99fa882f2ce6992174e04d999d1caa418621bb8e128 glibc-langpack-ms-2.28-251.el8_10.14.aarch64.rpm b19f426a94c9b0631747808658448033055e182913520836c9d30f80d37cd5d0 glibc-langpack-mt-2.28-251.el8_10.14.aarch64.rpm 8e126d248a40cba422938ec008e9574cb09db8c405d994919f577a2583647657 glibc-langpack-my-2.28-251.el8_10.14.aarch64.rpm 96314ec05eb0c4ac06b000c9c14cd050d35b30c8ecb43bff255ffba5c10dba98 glibc-langpack-nan-2.28-251.el8_10.14.aarch64.rpm 8470222808bdca4096789e88eeb80aabb525b0fe7e1771716812ff2092ccb20c glibc-langpack-nb-2.28-251.el8_10.14.aarch64.rpm ec7da58cf14c42547ca6da4340c4c50fcc6f278e5de5dcb4f046f80b2b68e385 glibc-langpack-nds-2.28-251.el8_10.14.aarch64.rpm 530880a0ac084b4557d6fdbb5fa0e0772255db55fd83ddbab659ad9ce3ba6edd glibc-langpack-ne-2.28-251.el8_10.14.aarch64.rpm 1b643a7e4a2b0213aea1bb57b097f01ee5d1c50307d4eba514631051e61e772b glibc-langpack-nhn-2.28-251.el8_10.14.aarch64.rpm 2514bfa741e4ae4d2a72cfd1f4e5054bb7977b727edbd6c9ad0e1aa1dd2c29b0 glibc-langpack-niu-2.28-251.el8_10.14.aarch64.rpm a5516dd0b9c6f5573ed2bcc9d25b3a389cb508783b81a6788e37e7fda55ac5ef glibc-langpack-nl-2.28-251.el8_10.14.aarch64.rpm 429756ff9ffb8dd011320126e895a97acd7fc0dd80d6c126eb8d2579934ecd73 glibc-langpack-nn-2.28-251.el8_10.14.aarch64.rpm 47a2ee41926694aa35de1c98e21081097c0eb7282c830dcfd0d431ff9c33df86 glibc-langpack-nr-2.28-251.el8_10.14.aarch64.rpm 4b2f023e33c2cfdd4a69c0e3bdfb1fbe6adc23977c97a4c6d33c00f5de8e64e8 glibc-langpack-nso-2.28-251.el8_10.14.aarch64.rpm d2ce104b4044e430a7c2c789e8b09b495fac01a0e1dd397deba723784821e8a9 glibc-langpack-oc-2.28-251.el8_10.14.aarch64.rpm 5bd6f62a4bf17b9704032f8a82c9a420c5f63af48b26695dc57dc6b51a31deea glibc-langpack-om-2.28-251.el8_10.14.aarch64.rpm 9fe26ba23952ed7149088ef7ccfce549744761e957c6810c67a68b32e0278154 glibc-langpack-or-2.28-251.el8_10.14.aarch64.rpm 6e493c82b51ee256b6a1e3f461700bd59102a4b79b04e6ea4421bf1b055d13ad glibc-langpack-os-2.28-251.el8_10.14.aarch64.rpm f6e30d56e57b29073debca34f1d728ba1f9f4eba200d1005eab3452603867a8e glibc-langpack-pa-2.28-251.el8_10.14.aarch64.rpm 37e42ce5b93c95b9d50efb220bf51fb810ec9c735be9aeb7062b89a1970bb426 glibc-langpack-pap-2.28-251.el8_10.14.aarch64.rpm 9404691a3c571c24502872990e959be8f2b846cb2c7153c91a97f6a812ddf84a glibc-langpack-pl-2.28-251.el8_10.14.aarch64.rpm a439cb4a98b4ab2798d4219ccf630564229feec07319c8e9f07ce1f17a59affb glibc-langpack-ps-2.28-251.el8_10.14.aarch64.rpm e69f626ae2f6a48c23c8a59ce44719c8aa8c2b6cc847c1bafb7eb1e02b386940 glibc-langpack-pt-2.28-251.el8_10.14.aarch64.rpm d34f7942e5316e35c127cd866e55c18bb546cfdb13eb36cc9867e8eacf9efe43 glibc-langpack-quz-2.28-251.el8_10.14.aarch64.rpm c94de7fb12c9cde70e99de1bcdb8ee0bc13611c834877ca1dfeabdba049c1600 glibc-langpack-raj-2.28-251.el8_10.14.aarch64.rpm fde165177c1a95248620f83127269dcd4e21b9818479238b60192161c71e1bd2 glibc-langpack-ro-2.28-251.el8_10.14.aarch64.rpm bcea964d3f914e5cad8f83e431ae1ce13c23451293acc0d30063468175381186 glibc-langpack-ru-2.28-251.el8_10.14.aarch64.rpm 434f1b109e5bdb38741dcdcf7ecfb66f9c1666c6de963c5a9a99c6e88c68425e glibc-langpack-rw-2.28-251.el8_10.14.aarch64.rpm f32359a0a3c35fd2b7dea646acb4d27cf96a31e661d9649a28564bbcc1fbcfdb glibc-langpack-sa-2.28-251.el8_10.14.aarch64.rpm 38193f67ca0114b59f8e4912c4a40a7fbc7f0e0cd7fb2bcdf3134a39e67d5835 glibc-langpack-sah-2.28-251.el8_10.14.aarch64.rpm afffa802f2857357d0a3b8c0fa01a687aefdecdb98f3e0cbd7a6c0070bf3d7e9 glibc-langpack-sat-2.28-251.el8_10.14.aarch64.rpm bcea4f12c5a9d239650f8f716c1654638ea145fb26292bf423cedf1091ce0544 glibc-langpack-sc-2.28-251.el8_10.14.aarch64.rpm 04257dbc8a3a7f7ec5f357583a5b7e15f1107091c292583feea28a1c4f75d0b8 glibc-langpack-sd-2.28-251.el8_10.14.aarch64.rpm 6e62f1a81a3dc99deab4c0659c03e74982b4494fbbf8d0a7d59ed0f44804964b glibc-langpack-se-2.28-251.el8_10.14.aarch64.rpm 897fdcd5cea3481cd593e341d10fde9b51852748b45e8273498397d9349a7dee glibc-langpack-sgs-2.28-251.el8_10.14.aarch64.rpm fa5040af12347736a0387a0cd69ff0d848f3ca94052a5ac260a45c762e604cfc glibc-langpack-shn-2.28-251.el8_10.14.aarch64.rpm 19b3cb6c43f9b982825f807b899ffaced9ae3bd7d846b9b11c240f00b553cdc4 glibc-langpack-shs-2.28-251.el8_10.14.aarch64.rpm b98be15ab3d45a7f552575d05e309ab0fa22d9c1e5c531297c928167495d7ae3 glibc-langpack-si-2.28-251.el8_10.14.aarch64.rpm e62edf5a0f891cdae8e605c90fc9086ddfef11481be0994ba265b90920f7ec7b glibc-langpack-sid-2.28-251.el8_10.14.aarch64.rpm 0e2816c383285398e44c5a2f64475b5a77e0b1d21421c1f6dd21492ac1358fa0 glibc-langpack-sk-2.28-251.el8_10.14.aarch64.rpm 3e5e72f854ca6d5cca4d031fce1ee86e7d80da04820a9fd461e55ec8b8b068ce glibc-langpack-sl-2.28-251.el8_10.14.aarch64.rpm ea53ed982662cf4909a792897a075b62944c2a3c916f148918f5cd97fef0dc56 glibc-langpack-sm-2.28-251.el8_10.14.aarch64.rpm 1a069094755333d424aa53520ed298b93681809312ef40ca8e762e957e17a008 glibc-langpack-so-2.28-251.el8_10.14.aarch64.rpm 2a20eddf51dee379652f7e08c30dda1c662260d28107882bed5c5e6b1b80c4ca glibc-langpack-sq-2.28-251.el8_10.14.aarch64.rpm a815582ecefd3865d7a3d4dce501075295c4c20de90bc5b74695fd229421ec64 glibc-langpack-sr-2.28-251.el8_10.14.aarch64.rpm be51c4bc613e43a99b48b0c587a1b54cb81f57918ee4c05f859753e3480f593c glibc-langpack-ss-2.28-251.el8_10.14.aarch64.rpm e9ae518ce7ed1faf3035dc6b420aa4f1ad19a57904ca9dd1098b8d12bf792b97 glibc-langpack-st-2.28-251.el8_10.14.aarch64.rpm 7fddeb04424f64f39a258feccd77685212aae95214bf362a4ed99d19e437f73f glibc-langpack-sv-2.28-251.el8_10.14.aarch64.rpm c9a7ec9a1247dc40a22c3c9dccf9f5d98c49d8591a7febcd1dadf2f884db8a91 glibc-langpack-sw-2.28-251.el8_10.14.aarch64.rpm 40eb53ef7d7c68916c46ed4c78e84d5fb8ba7e112197a2e3e3dfb63890fce0e3 glibc-langpack-szl-2.28-251.el8_10.14.aarch64.rpm 40c7232d34e8553c12aa137d084e59b5c2f8cd9576cb6d2f9f3f539ad9f1a682 glibc-langpack-ta-2.28-251.el8_10.14.aarch64.rpm dbca1f0beeab76ad4d8d6aac7c7b9b6188dd9e08b244c60b137e5c11d527f9a1 glibc-langpack-tcy-2.28-251.el8_10.14.aarch64.rpm 966ba4659bc019f49401904902523e6e23685b07853666b5278996f23f10af31 glibc-langpack-te-2.28-251.el8_10.14.aarch64.rpm 7d094be178e6ae3f2d4834fd1c35140717abef85dddbacf0fc09b8bbced42bf3 glibc-langpack-tg-2.28-251.el8_10.14.aarch64.rpm 0ddb4eec654b7c85ad64d0d52ee2c4403ba6166b3e0ae159f19d45f4bdd62bca glibc-langpack-th-2.28-251.el8_10.14.aarch64.rpm 19d8b75e9c93680fa00ae16069778218323d1b42707094c0cad32c7170252772 glibc-langpack-the-2.28-251.el8_10.14.aarch64.rpm a50411794a64fbd82f1c7afdbfe886684fe49fd759f89674f9d8f043c68754fb glibc-langpack-ti-2.28-251.el8_10.14.aarch64.rpm 84c94545f2b2863eebd8d19e50a61d19a358529ecb0add69e931b57cd60d7930 glibc-langpack-tig-2.28-251.el8_10.14.aarch64.rpm bc1d127a83bef093dde1d01a87bb1cdce688187b417735bd174dd832d1cccb94 glibc-langpack-tk-2.28-251.el8_10.14.aarch64.rpm a0318fd614f81de7ef98377581ac33b813fc80952c06a181090f2539ad23bfb5 glibc-langpack-tl-2.28-251.el8_10.14.aarch64.rpm 22b634df01152993aa32dbc26cd3250eecf7a29d902befac924f0a10d6a9a105 glibc-langpack-tn-2.28-251.el8_10.14.aarch64.rpm 67cc8697d340947448cb074496d34a182d96be89df3e3dd902d4cfedebb46712 glibc-langpack-to-2.28-251.el8_10.14.aarch64.rpm 89d95481a7cef5a2b55f0fa06d6f5aa7f16e201d40eba8ab850f9ae475aa6d5d glibc-langpack-tpi-2.28-251.el8_10.14.aarch64.rpm f848ff39edeaac623ad53020bc7a5a8e8526053c8e9bbc2ed5e5d9758ebfa382 glibc-langpack-tr-2.28-251.el8_10.14.aarch64.rpm 1fd1e0033b6cc8fc5d2093f45378c0f427f488658ce374f18c923653c0b6488e glibc-langpack-ts-2.28-251.el8_10.14.aarch64.rpm c8349b20a6bb893f0ff3134e0ed094c42e0dad364bdb92005382d00e50d5a913 glibc-langpack-tt-2.28-251.el8_10.14.aarch64.rpm 1b87eed5d49e1ff2b99067e211501a5c0b669ec251a6b4625dbb9889e6ed48a8 glibc-langpack-ug-2.28-251.el8_10.14.aarch64.rpm 58e5ce49d5c0a9314e9568563ea60fc132a0d3123942d73eea46c7421571052f glibc-langpack-uk-2.28-251.el8_10.14.aarch64.rpm 315abeffa7860df2e83eed84550b46f3584f89aec2a275e4726b6d5e1888b40c glibc-langpack-unm-2.28-251.el8_10.14.aarch64.rpm 936bb71b80500df2be8fe9178f18d838aeb23e9940759f9fc87fcd59591bf324 glibc-langpack-ur-2.28-251.el8_10.14.aarch64.rpm 17b54c066642910fc991b6a997d3b2dc71163f17b4b68b2c3a48f8671d8f1ded glibc-langpack-uz-2.28-251.el8_10.14.aarch64.rpm 04a8a9a2057d691cb9522939ef14535ec9c6348a452b2ecfa44699a495c80616 glibc-langpack-ve-2.28-251.el8_10.14.aarch64.rpm a018d7f56077cc48da3fd4d522951f9309ddbd4d9d0195709883b8b67b2ffc9b glibc-langpack-vi-2.28-251.el8_10.14.aarch64.rpm 3e9d77ec9072f9ea1d132f585bb2c5ea791aa63acdc7c8f87ddf6e51083744d6 glibc-langpack-wa-2.28-251.el8_10.14.aarch64.rpm 3a739290ef5532ef7796e2b5998d4a98b2e9f9dcca8d2ac24ffed53d89893efc glibc-langpack-wae-2.28-251.el8_10.14.aarch64.rpm 28a705a4af712a59196de0bb61d71ec8f8aa71c74efc94dadc01e6949381e986 glibc-langpack-wal-2.28-251.el8_10.14.aarch64.rpm bcf8a12368be51cb8949dae3544e3e0aecd2b33d3db8ec5480ee27801cce4eaf glibc-langpack-wo-2.28-251.el8_10.14.aarch64.rpm 77f7604ccb79d81220e9c372631f0f30b2ccf7c5a5158dc995b0cbec3aa41d27 glibc-langpack-xh-2.28-251.el8_10.14.aarch64.rpm e0391a6d6d7c6688dfafa05d221aa76bfaf9d0c443c53a66171cea6d2a79ed40 glibc-langpack-yi-2.28-251.el8_10.14.aarch64.rpm 7f8749250a0b4490cb2002ab8a87813ca431aac0fb72bd39b77e14357a9bd873 glibc-langpack-yo-2.28-251.el8_10.14.aarch64.rpm c2c90f6b1b6a72fbbae65253de3254bbe7824dec3b8604eb17eb508d04570818 glibc-langpack-yue-2.28-251.el8_10.14.aarch64.rpm 09e3a846b2c0565de89382820c4628a599022574dd3f75d04781bdee0f866bb9 glibc-langpack-yuw-2.28-251.el8_10.14.aarch64.rpm 983ded63f0fd81d0f04bd1a35500d52da6389508f5c329eef2e81ec7b6f9f12d glibc-langpack-zh-2.28-251.el8_10.14.aarch64.rpm b7b47cd250eb068bc13a3cd2e22ba2498228fc38ed1fb34a5087231e1c531b70 glibc-langpack-zu-2.28-251.el8_10.14.aarch64.rpm 8e3c596daeb224cbf14541923e619e0d52da7706233968f5e9f1f11e46ed0538 glibc-locale-source-2.28-251.el8_10.14.aarch64.rpm 63d1e405c1375d0fc1215c4b64fabc4bd66f101414a8b167fa008dc1dc807861 glibc-minimal-langpack-2.28-251.el8_10.14.aarch64.rpm 3c5a0f40c878d1142d703310f3b6f9329f1d1655ab2c13cce900367ac524ea0a libnsl-2.28-251.el8_10.14.aarch64.rpm f6c74349219d208ab1740642df4f66b5405dae22a487c042f8d9a395b8f3787f nscd-2.28-251.el8_10.14.aarch64.rpm 54b87fef1ad53354e811af35debcc4cd3ae355c83dce3fae9be832f6b758ece1 nss_db-2.28-251.el8_10.14.aarch64.rpm 6262a427e0d3649bf7d0054148715951d77942b6838d0a2f1c11570659e4f469 RLSA-2024:0119 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: crafted xml can cause global buffer overflow (CVE-2023-39615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-18.el8.aarch64.rpm 4daa47a9f515052429f29dce44a373c205e4dc8ba0946c4c6520f7fa8d6050a7 libxml2-2.9.7-18.el8_9.aarch64.rpm cefba31450fde91597d48beec18ce40e671b4ae9b25f437e34a5542f9bb0e38d python3-libxml2-2.9.7-18.el8_9.aarch64.rpm 5760a269918ead545802b7d3396f8c9ab6c6bc4f14dfd692820977b231822496 python3-libxml2-2.9.7-18.el8.aarch64.rpm 23fa565dec3ba0c055bb0ae86e91ecb31e5efbe539386919831dfed7becb214a RLBA-2024:0896 librabbitmq bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librabbitmq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The librabbitmq package provides a C-language AMQP client library for use with AMQP servers. Bug Fix(es) and Enhancement(s): * librabbitmq-tools for Rocky Linux8 (JIRA:Rocky Linux-17851) none-baseos-rpms librabbitmq-0.9.0-5.el8_9.aarch64.rpm 4b3c722da5b03504225bbcd843821d05cf3449b61cb99fce3784720588ed0263 RLSA-2024:0967 Moderate: opensc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for opensc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenSC set of libraries and utilities provides support for working with smart cards. OpenSC focuses on cards that support cryptographic operations and enables their use for authentication, mail encryption, or digital signatures. Security Fix(es): * OpenSC: Side-channel leaks while stripping encryption PKCS#1 padding (CVE-2023-5992) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms opensc-0.20.0-8.el8_9.aarch64.rpm 5ccc455746ca276013afb72f0cf61a56773aba429d974163634b227376b7cfe2 RLBA-2024:3143 selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for selinux-policy. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms selinux-policy-3.14.3-139.el8_10.noarch.rpm f5a434557cbb77b74e3ce3bd2dabdaed6487ea4e8f2eac8bd7303526ce277a0d selinux-policy-3.14.3-139.el8_10.noarch.rpm f5a434557cbb77b74e3ce3bd2dabdaed6487ea4e8f2eac8bd7303526ce277a0d selinux-policy-devel-3.14.3-139.el8_10.noarch.rpm eda07ad80c7b4b1b60ec4cf071ff4cfb0d4083d138dfb982d9c02bfb3363be31 selinux-policy-devel-3.14.3-139.el8_10.noarch.rpm eda07ad80c7b4b1b60ec4cf071ff4cfb0d4083d138dfb982d9c02bfb3363be31 selinux-policy-doc-3.14.3-139.el8_10.noarch.rpm d801e8888b845570c724d7b9ce61bd4231a541f7a56415a0a6ec685ad39731bd selinux-policy-doc-3.14.3-139.el8_10.noarch.rpm d801e8888b845570c724d7b9ce61bd4231a541f7a56415a0a6ec685ad39731bd selinux-policy-minimum-3.14.3-139.el8_10.noarch.rpm 360b4e5685021ab1eea108b7fbfaed5a304e79e14dc2cb56b6ec63f840a9b7c4 selinux-policy-minimum-3.14.3-139.el8_10.noarch.rpm 360b4e5685021ab1eea108b7fbfaed5a304e79e14dc2cb56b6ec63f840a9b7c4 selinux-policy-mls-3.14.3-139.el8_10.noarch.rpm f96ecb8b70b2bc456eeca0c0b881b43f12dccc46d28f4ef606f4bec5120f1d76 selinux-policy-mls-3.14.3-139.el8_10.noarch.rpm f96ecb8b70b2bc456eeca0c0b881b43f12dccc46d28f4ef606f4bec5120f1d76 selinux-policy-sandbox-3.14.3-139.el8_10.noarch.rpm e9fc3744909b80a91ce8c6174cf80e28ba0337cdd9986bf94b7b22b918c8edf0 selinux-policy-sandbox-3.14.3-139.el8_10.noarch.rpm e9fc3744909b80a91ce8c6174cf80e28ba0337cdd9986bf94b7b22b918c8edf0 selinux-policy-targeted-3.14.3-139.el8_10.noarch.rpm 96bc877506d2a47d170c7b4e08ccecbdf53f5e88a831a2854a611f1963a93eb3 selinux-policy-targeted-3.14.3-139.el8_10.noarch.rpm 96bc877506d2a47d170c7b4e08ccecbdf53f5e88a831a2854a611f1963a93eb3 RLBA-2024:3145 stunnel bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for stunnel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms stunnel-5.71-2.el8.aarch64.rpm 0a0fa814ea5fe12d75193650b0e88e228bef79b1069aa97d8223981c17fd4c8d RLBA-2024:3146 kmod-kvdo bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod-kvdo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms kmod-kvdo-6.2.8.7-94.el8.aarch64.rpm ca2013caf042fac2723c536f4d527635c9396b82eb51877d19dacf000aa9f38d RLBA-2024:3147 xfsdump bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for xfsdump. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms xfsdump-3.1.8-7.el8_9.aarch64.rpm f1dc8f7799cb34a51e9a028d4e39b3d3bc95b7eaa753a9fc286d515495df0b38 RLBA-2024:3153 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms NetworkManager-1.40.16-15.el8_9.aarch64.rpm 60e70b26d8c4eb9ac83158551f0d2018f385eece0318b5703d7959b48ede21a0 NetworkManager-adsl-1.40.16-15.el8_9.aarch64.rpm e17e6bbf5ef810ea87530dce899cfbb59d9ec2aa2b3bd63c6ac3002c7a07142b NetworkManager-bluetooth-1.40.16-15.el8_9.aarch64.rpm 80d7d80b62da7d985472f62c0b2bae626cc6af2beb07d341d0b755e137cd3805 NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm 7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44 NetworkManager-config-connectivity-redhat-1.40.16-15.el8_9.noarch.rpm 7ac9bbf96fe85c11d10ac87ad758fda7885087baddf81b90da725e8e65328c44 NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f NetworkManager-config-server-1.40.16-15.el8_9.noarch.rpm b26e0005c9d531475054b58986d486e101a30402da9f166e695eeac2942e779f NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm 705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30 NetworkManager-dispatcher-routing-rules-1.40.16-15.el8_9.noarch.rpm 705d3c5dcbb36de685193196bee39b496e73018f854ac23e54e9f9a5e8d7da30 NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm 6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93 NetworkManager-initscripts-updown-1.40.16-15.el8_9.noarch.rpm 6f421022366ead60a2c7b0f923666d647e5976dbc133d454da7ed81f829f0d93 NetworkManager-libnm-1.40.16-15.el8_9.aarch64.rpm 776c187874f857d3a49992f57762fb62979d261d2cfe822429ebe8c04af19813 NetworkManager-ovs-1.40.16-15.el8_9.aarch64.rpm b35cd21f424556dcf1096db197c5e1bdabe9ddabaefa1423bf8909ce1c77aea0 NetworkManager-ppp-1.40.16-15.el8_9.aarch64.rpm 6cabda9799361e0eeedc797f1f64c8f777321ee9e6c0bce990bc78f793eca20b NetworkManager-team-1.40.16-15.el8_9.aarch64.rpm 87dd75a1096b0831c3a5cffe15de668b0b9ce73ad42ef61fc7965489c5999193 NetworkManager-tui-1.40.16-15.el8_9.aarch64.rpm b742298e3ba8d04be06fe0ca650cca9d5636b2c7e9c6bbb1957d71c11789fd2f NetworkManager-wifi-1.40.16-15.el8_9.aarch64.rpm 75a3335aa89cd2eafa244d83f010fa574af5c38d1036fba1e2c2e2ac5df53206 NetworkManager-wwan-1.40.16-15.el8_9.aarch64.rpm acdd2c83ae2da3462b8ae04a3d63bbf36a2f82c6e783fbb559fc833a835a2edb RLBA-2024:3154 curl bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms curl-7.61.1-34.el8.aarch64.rpm c84f94579f72ca8d75020653251427f8989de348548d9f00d98650ebe547c832 libcurl-7.61.1-34.el8.aarch64.rpm f029783bcd5c839e8e005e968f90559036dfdc4fd776ec249798badd846e34de libcurl-devel-7.61.1-34.el8.aarch64.rpm 4846ca6cef4c8f5b562b2fa07ff4617d0c4d6a3fb5d2dc3ebfa2e6ee7ad67ecd libcurl-minimal-7.61.1-34.el8.aarch64.rpm 7a1a8c6f88634bfa294a74504331010294077ef04e3f0bcdde73bee64ed45fe6 RLBA-2024:3156 rpm bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms python3-rpm-4.14.3-31.el8.aarch64.rpm a9ed0abca9f8d5374e8863bfad5e678e2c9fb3013d62f9adfe5cc925be4af5c9 rpm-4.14.3-31.el8.aarch64.rpm 54e7208e0868b6dc40da75c6851fe7381dd9333950925e5ee48109060ec768e7 rpm-apidocs-4.14.3-31.el8.noarch.rpm 6281d0ad9bec4754052e07f41ba3cffd7ea524f61ab9006e6b0456ad7fa55ab6 rpm-apidocs-4.14.3-31.el8.noarch.rpm 6281d0ad9bec4754052e07f41ba3cffd7ea524f61ab9006e6b0456ad7fa55ab6 rpm-build-libs-4.14.3-31.el8.aarch64.rpm 3e7f9677fa21c2b58e41362c244cfc542b1db24809c21eabd990caf2c6f4d4c6 rpm-cron-4.14.3-31.el8.noarch.rpm 8b748ae549a4a9f81557df069ef430f41adc845883caa62e387c0a6e9467cd7f rpm-cron-4.14.3-31.el8.noarch.rpm 8b748ae549a4a9f81557df069ef430f41adc845883caa62e387c0a6e9467cd7f rpm-devel-4.14.3-31.el8.aarch64.rpm aa026b735c284323494a50617025eb6b0b38387ae4341767440ec98bbc20e4e0 rpm-libs-4.14.3-31.el8.aarch64.rpm 027869a0c295c88fb417efb0ef4a4bbb67c8a3edc026e5f26b4148537f111316 rpm-plugin-ima-4.14.3-31.el8.aarch64.rpm 60905048c8ffe056e2b463fdd03bffc7816714923461bfd74d0d7627a6d6d8a1 rpm-plugin-prioreset-4.14.3-31.el8.aarch64.rpm 5b3c1f081b4a9d0daefe460402162946a452f5653dafdfb9e479807947ad8be3 rpm-plugin-selinux-4.14.3-31.el8.aarch64.rpm d8d7c88f3a8d9dc839a419e0bc98dd3666cc8b9ec71e86e814cf1c0e9839a278 rpm-plugin-syslog-4.14.3-31.el8.aarch64.rpm fe7fb56be0535a36a536d503f0ad17d881a9dd2f901a100767586f1627bc12a9 rpm-plugin-systemd-inhibit-4.14.3-31.el8.aarch64.rpm 9cfe77d4f12cc13e5f3ec4bcc7bcf3aac987251f7c696ab3d0d9bebe911a81df rpm-sign-4.14.3-31.el8.aarch64.rpm 01502dcfeb5fad661b92b3e17ea680f6508a2e21dcbadc58a8b16782b360df46 RLBA-2024:3155 kmod bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kmod. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms kmod-25-20.el8.aarch64.rpm 4e75b1a251dbccb11204a3ebe8d48c09d4631383839ba0c35be37f712ad93c02 kmod-libs-25-20.el8.aarch64.rpm 70667e477eec83fd85d1a6ea2a69fc562335b6e2ee4fb720c5a103c4e93069d6 RLBA-2024:3161 libdnf bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libdnf-0.63.0-19.el8.aarch64.rpm 94af8867d912c571ae48c131a68eb27ea903e09418bcf129a3ac3c857dab3223 python3-hawkey-0.63.0-19.el8.aarch64.rpm a86b5f2feff3dd63488fabc8a30ead64f916da200ba168155ded5f4e505df371 python3-libdnf-0.63.0-19.el8.aarch64.rpm a2060d9dd3882957e54b38cebffd2c35a12a2383ad7ae5f7f842d953a84f2fb4 RLBA-2024:3162 shadow-utils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for shadow-utils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms shadow-utils-4.6-22.el8.aarch64.rpm 0af092bb8b24c0de1dac27f80f4c092d936b5d7dfbb91f0aca83ec705535be6a shadow-utils-subid-4.6-22.el8.aarch64.rpm 690fd377e3eb0c955e9548bb41fa3fba26e7d4280455316b9b820f17dce1efbd RLBA-2024:3160 tuna bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms tuna-0.18-9.el8.noarch.rpm 7406a7de42eab91721f6f49b6ba27668cf0491424b8890ea0fd5ad6bb5c8a19b tuna-0.18-9.el8.noarch.rpm 7406a7de42eab91721f6f49b6ba27668cf0491424b8890ea0fd5ad6bb5c8a19b RLSA-2024:3166 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: scp allows command injection when using backtick characters in the destination argument (CVE-2020-15778) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms openssh-8.0p1-24.el8.aarch64.rpm 79dea2b4acebcbca22210231f3c203321ccc02fc8fffe9d519c01c66c58cedbe openssh-cavs-8.0p1-24.el8.aarch64.rpm 0f05b739b8f363df34f532a3e4cf9b52fc8344022458154035106039abc11333 openssh-clients-8.0p1-24.el8.aarch64.rpm 512e9a282c8d79d12f83de4f2a9653c1524da515942a99e40c2f4d39fccb96bc openssh-keycat-8.0p1-24.el8.aarch64.rpm 71225b2dfd276c32f3a870b1b267e2237a3cba7e50e76c9e0151900e0ccec52e openssh-ldap-8.0p1-24.el8.aarch64.rpm 41f1797ad866717aa34315bd369a6ba3a773b50830fc716786c8bf15300d4426 openssh-server-8.0p1-24.el8.aarch64.rpm 907b90f33203b37a3f3b175771ad23fbc1cbd5379c1b85a45bea96d0f9b0e8e8 pam_ssh_agent_auth-0.10.3-7.24.el8.aarch64.rpm 6d5438b6af42efaadba079095b4990fa3f8c9a688bdb7d718872cfb2c3858631 RLBA-2024:3172 elfutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for elfutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms elfutils-0.190-2.el8.aarch64.rpm 7b7811f897fa160e27cd66e42e339ef2f174f63006b67dddc00d6adcf2a214d9 elfutils-debuginfod-0.190-2.el8.aarch64.rpm 32b41dbbdc20ca00ed76609a4409a86ed628119e633733da905606bd40954be9 elfutils-debuginfod-client-0.190-2.el8.aarch64.rpm 4c22c7360a9649d18bc790118a28f17da1e4fc2ab7bb2ac19064ef0c1f9d146e elfutils-debuginfod-client-devel-0.190-2.el8.aarch64.rpm e0c3e2ac1fcbbd78ce952feef68d589f01601937d4cfd4a2b7b28fdbbfdfef36 elfutils-default-yama-scope-0.190-2.el8.noarch.rpm f5e46bf54b40eb7feb74b42b4ea28f5dbe0e160199f35cf0e6d0e2c5a29f88d3 elfutils-default-yama-scope-0.190-2.el8.noarch.rpm f5e46bf54b40eb7feb74b42b4ea28f5dbe0e160199f35cf0e6d0e2c5a29f88d3 elfutils-devel-0.190-2.el8.aarch64.rpm 7fb4d8fb7979ad973581107cd838254c95e5c393316f8cbbaee124bac93e8aa1 elfutils-libelf-0.190-2.el8.aarch64.rpm 99e237fd0357b574c0f8ff4805a9b9a3a64cdfe87c49be34b97f3164e63ef817 elfutils-libelf-devel-0.190-2.el8.aarch64.rpm cb6a6eb6e59f60a1aa41e09e7f05dbe15c5e5dae8ce4669e7c5a18dcc1e5f18a elfutils-libs-0.190-2.el8.aarch64.rpm 0329d8c9a12a6fa524b168c34f4c1cf4d1b3b05d2156c9a984380c3eab25b8ae RLBA-2024:3170 perftest bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for perftest. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.1 Release Notes linked from the References section. none-baseos-rpms perftest-23.07.0.0.27-1.el8.aarch64.rpm f26f6cac526ef6aa24533d6bf52d1727fffe3569d02ed39438169065709f9015 RLSA-2024:3178 Important: linux-firmware security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329) * hw: amd: INVD instruction may lead to a loss of SEV-ES guest machine memory integrity problem (CVE-2023-20592) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-121.el8.1.noarch.rpm 6de93489b1fd0f055c1810893bb268ab3159094541d442d00f144c2914916d0b iwl1000-firmware-39.31.5.1-121.el8.1.noarch.rpm 6de93489b1fd0f055c1810893bb268ab3159094541d442d00f144c2914916d0b iwl100-firmware-39.31.5.1-121.el8.1.noarch.rpm edfdb8dcd290e73a1de9227c15dc5e4888441a767ebe39b8dacd43dbdc097214 iwl100-firmware-39.31.5.1-121.el8.1.noarch.rpm edfdb8dcd290e73a1de9227c15dc5e4888441a767ebe39b8dacd43dbdc097214 iwl105-firmware-18.168.6.1-121.el8.1.noarch.rpm fd7fb01cdac1b4f2b27bf31252fa837eea95ae50b481d06fb96f3576894212ee iwl105-firmware-18.168.6.1-121.el8.1.noarch.rpm fd7fb01cdac1b4f2b27bf31252fa837eea95ae50b481d06fb96f3576894212ee iwl135-firmware-18.168.6.1-121.el8.1.noarch.rpm 5361b28d72ad43e7638d65574f352606622d69794800626d03775277bef9b6ac iwl135-firmware-18.168.6.1-121.el8.1.noarch.rpm 5361b28d72ad43e7638d65574f352606622d69794800626d03775277bef9b6ac iwl2000-firmware-18.168.6.1-121.el8.1.noarch.rpm 0ec79b37ee5e219ddf5b9b2c4c2d95fb3581ba3d48b2a1c8fec7f925414ce182 iwl2000-firmware-18.168.6.1-121.el8.1.noarch.rpm 0ec79b37ee5e219ddf5b9b2c4c2d95fb3581ba3d48b2a1c8fec7f925414ce182 iwl2030-firmware-18.168.6.1-121.el8.1.noarch.rpm 30260c57784d7266dea64ed945f65393709bf11863958de003697750a61ea9aa iwl2030-firmware-18.168.6.1-121.el8.1.noarch.rpm 30260c57784d7266dea64ed945f65393709bf11863958de003697750a61ea9aa iwl3160-firmware-25.30.13.0-121.el8.1.noarch.rpm b4524d6f1bda87df0c6eec1ce00ded83751509cb21f7586af7911a53db38c07f iwl3160-firmware-25.30.13.0-121.el8.1.noarch.rpm b4524d6f1bda87df0c6eec1ce00ded83751509cb21f7586af7911a53db38c07f iwl3945-firmware-15.32.2.9-121.el8.1.noarch.rpm 3f5edbf1d24a56366bb9475abc104e27bebad0a5fcbbabacb055211069bceced iwl3945-firmware-15.32.2.9-121.el8.1.noarch.rpm 3f5edbf1d24a56366bb9475abc104e27bebad0a5fcbbabacb055211069bceced iwl4965-firmware-228.61.2.24-121.el8.1.noarch.rpm 90b5ffab6f64dca7fa2e70773c295b57cf5f8860575a91577dae15f0e63ae9ff iwl4965-firmware-228.61.2.24-121.el8.1.noarch.rpm 90b5ffab6f64dca7fa2e70773c295b57cf5f8860575a91577dae15f0e63ae9ff iwl5000-firmware-8.83.5.1_1-121.el8.1.noarch.rpm b147a83ba023ed76767e5bff4640aceb313dc0ee7a078998f770cb11432c91a4 iwl5000-firmware-8.83.5.1_1-121.el8.1.noarch.rpm b147a83ba023ed76767e5bff4640aceb313dc0ee7a078998f770cb11432c91a4 iwl5150-firmware-8.24.2.2-121.el8.1.noarch.rpm e590d20109c5bca9c2fb9a4dc796570686b54a23cdec300d9f87f78e1360008a iwl5150-firmware-8.24.2.2-121.el8.1.noarch.rpm e590d20109c5bca9c2fb9a4dc796570686b54a23cdec300d9f87f78e1360008a iwl6000-firmware-9.221.4.1-121.el8.1.noarch.rpm 284c238d2f1a3dbecd4c0b5b2d89030961891f0730c5803767a553679a05ca65 iwl6000-firmware-9.221.4.1-121.el8.1.noarch.rpm 284c238d2f1a3dbecd4c0b5b2d89030961891f0730c5803767a553679a05ca65 iwl6000g2a-firmware-18.168.6.1-121.el8.1.noarch.rpm 24b205f1fd362cc0e5cdaf18e3895a0463844b5b3b2c5687ce0524e070de505b iwl6000g2a-firmware-18.168.6.1-121.el8.1.noarch.rpm 24b205f1fd362cc0e5cdaf18e3895a0463844b5b3b2c5687ce0524e070de505b iwl6000g2b-firmware-18.168.6.1-121.el8.1.noarch.rpm 145ee6a3f02112daa3c903a28ccbd9aec65dab7e069b91db2e7cc588c0754115 iwl6000g2b-firmware-18.168.6.1-121.el8.1.noarch.rpm 145ee6a3f02112daa3c903a28ccbd9aec65dab7e069b91db2e7cc588c0754115 iwl6050-firmware-41.28.5.1-121.el8.1.noarch.rpm 8e8a71b03f8e351eccdc475c0bc9c838f9093203f3763a5a596e946de027b07b iwl6050-firmware-41.28.5.1-121.el8.1.noarch.rpm 8e8a71b03f8e351eccdc475c0bc9c838f9093203f3763a5a596e946de027b07b iwl7260-firmware-25.30.13.0-121.el8.1.noarch.rpm eea59a4cd43ca4f198e6061fa41682428ea084f805b123cc4e554e757802ab97 iwl7260-firmware-25.30.13.0-121.el8.1.noarch.rpm eea59a4cd43ca4f198e6061fa41682428ea084f805b123cc4e554e757802ab97 libertas-sd8686-firmware-20240111-121.gitb3132c18.el8.noarch.rpm 704386eebc33c79233fb13055961da9aacb18096294da8ea2a19710c0f72b0eb libertas-sd8686-firmware-20240111-121.gitb3132c18.el8.noarch.rpm 704386eebc33c79233fb13055961da9aacb18096294da8ea2a19710c0f72b0eb libertas-sd8787-firmware-20240111-121.gitb3132c18.el8.noarch.rpm 07575b21882086d777401cc2410b62c3eafd16b85e7e981bbd4ced246445e70f libertas-sd8787-firmware-20240111-121.gitb3132c18.el8.noarch.rpm 07575b21882086d777401cc2410b62c3eafd16b85e7e981bbd4ced246445e70f libertas-usb8388-firmware-20240111-121.gitb3132c18.el8.noarch.rpm cbbc09c0b13fe8bb3ae2398bd279124024b0f78f655a0d6709315aa601b5c5ca libertas-usb8388-firmware-20240111-121.gitb3132c18.el8.noarch.rpm cbbc09c0b13fe8bb3ae2398bd279124024b0f78f655a0d6709315aa601b5c5ca libertas-usb8388-olpc-firmware-20240111-121.gitb3132c18.el8.noarch.rpm f723a31519a8ca920453a8fbec40d74072119e324ffba0640b9a40b1397a948c libertas-usb8388-olpc-firmware-20240111-121.gitb3132c18.el8.noarch.rpm f723a31519a8ca920453a8fbec40d74072119e324ffba0640b9a40b1397a948c linux-firmware-20240111-121.gitb3132c18.el8.noarch.rpm 36f714b39bc3fa48132cb2ea04f1cc3392c7920960980d11aca841bcf2cf6c6b linux-firmware-20240111-121.gitb3132c18.el8.noarch.rpm 36f714b39bc3fa48132cb2ea04f1cc3392c7920960980d11aca841bcf2cf6c6b RLBA-2024:3183 device-mapper-multipath bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for device-mapper-multipath. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms device-mapper-multipath-0.8.4-41.el8.aarch64.rpm 644b1247cb77d6b608d137d5c697064ca010cb6cff941c8eced77073fb996672 device-mapper-multipath-libs-0.8.4-41.el8.aarch64.rpm 90c19f8c10d01fa270a7c416788218958973ce5f0932d386e194a5a1c104df8e kpartx-0.8.4-41.el8.aarch64.rpm 860aa593c091e0d1296070a3cb144b670e29682c6d89afcc4ab6d2aeaddb798c libdmmp-0.8.4-41.el8.aarch64.rpm a3170d7a43aad368c857a5f3f9f8194b4496382c1dc606beb6b124f09901a148 RLBA-2024:3185 samba bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms ctdb-4.19.4-3.el8.aarch64.rpm e11e4f0d82666681cde3d8d54eee7b9c81a2b3e4a81d1bc7f3b8eae1fd407221 libnetapi-4.19.4-3.el8.aarch64.rpm 0bb421852a135b78e6d99d84f1119487a591b2a8cace9e0080e9c4252100f82e libsmbclient-4.19.4-3.el8.aarch64.rpm 17ace0263ec8afd43b0b16db6dd98840061d7043fd56213cb35df2bc2927253b libwbclient-4.19.4-3.el8.aarch64.rpm e4020edc860a471c22b7174a3d61068822771fff132eb101b149fbfd045cbb21 python3-samba-4.19.4-3.el8.aarch64.rpm 14b013c1d9f161469aa7d469125d3498100cde5cc12d41ab6b63b475cb46b0da python3-samba-dc-4.19.4-3.el8.aarch64.rpm 66f87b293f4991325f41edb6dd8de47ef4fc103190226fb6143674f53e2f32fa python3-samba-test-4.19.4-3.el8.aarch64.rpm 2ad41c65fc805b7f1ddee3020561c2b324cb27d5c32b309bb315328aad720193 samba-4.19.4-3.el8.aarch64.rpm f3b4839e77654a88e170008ad978aefd85b38b9e5ef25a0b27333a8b37ad1a1e samba-client-4.19.4-3.el8.aarch64.rpm 3d3dedafb9e3e2b0f9c4b536aed42409782b828aa72256e7e77122f0d88948c0 samba-client-libs-4.19.4-3.el8.aarch64.rpm 35493374964938137ae415c0fb9128f7818516903a7ce68914c9efb069694bca samba-common-4.19.4-3.el8.noarch.rpm 893433aa34c69971b27c5336ef12c8543e38995851f94178431ae8b4fa2f5a2a samba-common-4.19.4-3.el8.noarch.rpm 893433aa34c69971b27c5336ef12c8543e38995851f94178431ae8b4fa2f5a2a samba-common-libs-4.19.4-3.el8.aarch64.rpm 76d71af5d6258a17ef1fca6a3ca7b69f85bfcabd17529aca9d2e66b3e6411d09 samba-common-tools-4.19.4-3.el8.aarch64.rpm 9758dee19cf888762fa24b3568b5bbba63a185eb3741ae1af3ebbe43bebdda4a samba-dcerpc-4.19.4-3.el8.aarch64.rpm 7e382c506276237ea157216725192495073999e55d61834a38f411678033c9ab samba-dc-libs-4.19.4-3.el8.aarch64.rpm 9ca7a9b15e99c286455dacc014c3dfb0e80614a57e9eb534ae7618b6fe34b112 samba-krb5-printing-4.19.4-3.el8.aarch64.rpm 24833a943b31c5fa0e1058c5c1e9f923c4d060ce1e4af6dc8de461ec309d284e samba-ldb-ldap-modules-4.19.4-3.el8.aarch64.rpm abd17062b463709da6448631f6e9fc46d69772c575fd7611bdf94afc6cf41b96 samba-libs-4.19.4-3.el8.aarch64.rpm 146e78adab08549567b24a1e55a19418e71fed96b0c4702cc2540e6c8e2ec12f samba-pidl-4.19.4-3.el8.noarch.rpm f9e79e9279d0bda7e2195cc8b3a248cc084ec3ab48d09bf81449cbad40a1d1f2 samba-pidl-4.19.4-3.el8.noarch.rpm f9e79e9279d0bda7e2195cc8b3a248cc084ec3ab48d09bf81449cbad40a1d1f2 samba-test-4.19.4-3.el8.aarch64.rpm 7f8966cd9a7ee0c3677ad5b228f1d1afd9824a2918625ca798859c9081e14158 samba-test-libs-4.19.4-3.el8.aarch64.rpm e38144fe6e6590df995baae4f85c84b38665bf5a4234b1b38c4dd3b4457e7795 samba-tools-4.19.4-3.el8.aarch64.rpm d2f7588a1c9ac382fde96b07cf1fbe23ed3199592d49c29bc8f0cb032cc1e335 samba-usershares-4.19.4-3.el8.aarch64.rpm 971eab7b12111c576673ba028791330ac099fea77e2659bd2ccf725b1dcd1ed8 samba-winbind-4.19.4-3.el8.aarch64.rpm d1e750467548bdad44f71450cc1537d686de89cdc3a94ecb26462576eeb96b9d samba-winbind-clients-4.19.4-3.el8.aarch64.rpm da3242eb312a20c79dd6e60414b3d3af1ce3f4e9ddf4116e8853b654690d1109 samba-winbind-krb5-locator-4.19.4-3.el8.aarch64.rpm 79a302a3da58c4af33c8799b92f2e5c2cc56720b84e99910189e555515ebb1d0 samba-winbind-modules-4.19.4-3.el8.aarch64.rpm 7b694bf18a59f11a326348b52556de63f1b9ca0761f76391f672d5ba986b8b25 RLBA-2024:3188 libtdb bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtdb. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libtdb-1.4.9-0.el8.aarch64.rpm 35e7f3234894837c8f8d17c550806784f6e1b411a329bc8dfd6ec6c82e8be25d libtdb-devel-1.4.9-0.el8.aarch64.rpm 1d4b3cd263f9d4c3cea3be03a239cbc282186565e3b159484ba1a69f97326f93 python3-tdb-1.4.9-0.el8.aarch64.rpm 18b11e614192348b0991f151eed09514a451a13225ac417f69d622f4afed7143 tdb-tools-1.4.9-0.el8.aarch64.rpm f31a003a616ccac0cbd846f987c6d4ee6ddcfa6bdda6282891de998ea607aefb RLBA-2024:3189 libtalloc bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtalloc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libtalloc-2.4.1-0.el8.aarch64.rpm 4cbe8467e24ab5923c832492944990edb76b209557eb4ef49b13333ba21d8458 libtalloc-devel-2.4.1-0.el8.aarch64.rpm 6e6bc4fa965ebefbbb03f4ba5f392b48826fc748bd3524e96b2654fd64082e91 python3-talloc-2.4.1-0.el8.aarch64.rpm 74f614e90ecf55c48085b0cb2a275a78a523506c089610b836c18482ec55c9cb RLBA-2024:3191 p11-kit bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for p11-kit. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms p11-kit-0.23.22-2.el8.aarch64.rpm b8e63efa3d10d30a54454885d7ade63eca35edcaf0c15eee78f1d64fd87dad66 p11-kit-devel-0.23.22-2.el8.aarch64.rpm 757e14a9594c72b853dafa5565dd9dfab1ae0db1c9c7e4ebd1aa56dd48374c3c p11-kit-server-0.23.22-2.el8.aarch64.rpm a2694686560ae3c14aa6d9bc90985325b9d954e9c7f74581d69d912f8dc92e6b p11-kit-trust-0.23.22-2.el8.aarch64.rpm e27b99af3f02a025a3db9fae4afc9d09980f5e17f974c405874a4ca57adf3243 RLBA-2024:3193 librabbitmq bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for librabbitmq. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms librabbitmq-0.9.0-5.el8_9.aarch64.rpm 4b3c722da5b03504225bbcd843821d05cf3449b61cb99fce3784720588ed0263 RLBA-2024:3194 cronie bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cronie. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms cronie-1.5.2-10.el8.aarch64.rpm 568d64f643f083ee60662298af7d343d9c4d3565021735c03ba081a5aac20a2d cronie-anacron-1.5.2-10.el8.aarch64.rpm 7a489ca23acd0f18e625aa0b9bde6f8049828f17930d940d109d134a3c2ccd3e cronie-noanacron-1.5.2-10.el8.aarch64.rpm 9498eb956004200aeb9a923789f2e88e60e18651cd3e79734ea1f187d4a3a31b RLSA-2024:3203 Moderate: systemd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes (CVE-2023-7008) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms systemd-239-82.el8.aarch64.rpm 2961798d0cdd35cc8a2498fcaeb87f63f499052ab58872ffd013d2714c58992f systemd-container-239-82.el8.aarch64.rpm 7aa9a2cf8e0fb4a8f44e632f345750c7ee6b20b01c59d84c734656f8bbeafd2b systemd-devel-239-82.el8.aarch64.rpm 5a729f74c1b0ed473af29adf4aab06c89f7d16dd319973d47197be6e57846b58 systemd-journal-remote-239-82.el8.aarch64.rpm 91497daf7a1b3646684e1a498b927774f0d0d9435e959878b73f4cf998b586c8 systemd-libs-239-82.el8.aarch64.rpm 2844ad57bd920c72ba260425803162030605ccf72df324d4d46f9df9f9ae0d5a systemd-pam-239-82.el8.aarch64.rpm ae62f3a0db1cdb9cfb70f14e73b8cd80c32c1851cdf6a58148f553f4945c3007 systemd-tests-239-82.el8.aarch64.rpm 1b9a72e040d488019cbd4fe623f798bb2b385e7e7008cbc8338369de2bbc4ea6 systemd-udev-239-82.el8.aarch64.rpm 817980d65ddab280212d138c5be392720b6154a4776c0bc922af5dd3db9a7021 RLBA-2024:3204 grubby bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for grubby. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms grubby-8.40-49.el8.aarch64.rpm a9daaa1a26f18790cad1e49761288c0af22c143dbb51d04ca04be31183756536 RLBA-2024:3212 chrony bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for chrony. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms chrony-4.5-1.el8.aarch64.rpm 7e5fc6e04ac31036bea0831a2e8aa93aaa3c30fd97ff03c3d21957c80527c942 RLBA-2024:3210 dmidecode bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dmidecode. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms dmidecode-3.5-1.el8.aarch64.rpm 4671e112cf809347cb155707b6c36c23c9e024ab18b5a5c36d01427b4ebbabe7 RLBA-2024:3213 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms firewalld-0.9.11-4.el8.noarch.rpm 4fd194e7195e1b259fb1ca25e121dd099d5622645a6e6623da7e8287c1271f35 firewalld-0.9.11-4.el8.noarch.rpm 4fd194e7195e1b259fb1ca25e121dd099d5622645a6e6623da7e8287c1271f35 firewalld-filesystem-0.9.11-4.el8.noarch.rpm 43ae0e016d75b77afca908c12abed321e2f384f7a00184f7c4b46784a5da8163 firewalld-filesystem-0.9.11-4.el8.noarch.rpm 43ae0e016d75b77afca908c12abed321e2f384f7a00184f7c4b46784a5da8163 python3-firewall-0.9.11-4.el8.noarch.rpm ea433ed8ef9c47e06effef3709bafc59376907e7f5ccc29f361644f70d196c5a python3-firewall-0.9.11-4.el8.noarch.rpm ea433ed8ef9c47e06effef3709bafc59376907e7f5ccc29f361644f70d196c5a RLBA-2024:3217 arpwatch bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for arpwatch. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms arpwatch-2.1a15-46.el8.aarch64.rpm 154f84a32a1c66e0a2ab08da35d4b094298c5a38c7d16a940c93f95bc46eae44 RLBA-2024:3219 gpgme bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gpgme. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms gpgme-1.13.1-12.el8.aarch64.rpm 5f36bde1b0ef5a9820c3a53959991c7b053346a7d33fdb0102e5271376989ce1 gpgmepp-1.13.1-12.el8.aarch64.rpm 5783d064ab48776c239b84abd98c2d3112a955d6359b51506b3430a3fe967551 python3-gpg-1.13.1-12.el8.aarch64.rpm c0cbf02186c92d52c9fac372d8291f0019e2696038783ac80187cfec2c8ecdc4 RLBA-2024:3218 policycoreutils bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms policycoreutils-2.9-25.el8.aarch64.rpm fbb0f42afd6d512c8331825a90cb55e3944b9bb7a0dcebf1edc30fe4acefe542 policycoreutils-dbus-2.9-25.el8.noarch.rpm 8107ddb47e7b5f920a3e7fa27c1193866e05c8cdcdffd24ba118bfef8a5303b3 policycoreutils-dbus-2.9-25.el8.noarch.rpm 8107ddb47e7b5f920a3e7fa27c1193866e05c8cdcdffd24ba118bfef8a5303b3 policycoreutils-devel-2.9-25.el8.aarch64.rpm f33cc6a4dc9868d466a03e1d327490458875d5df9bc74625f76abfaccf07e95a policycoreutils-newrole-2.9-25.el8.aarch64.rpm 22e6a4027b4aaba58294d8ccc006dcdef062cd977b2149b1a77377739c5e5c67 policycoreutils-python-utils-2.9-25.el8.noarch.rpm f11fee096925adb2efdf9139732e8b9e02f2dc1c6a363b8570057ace870fae12 policycoreutils-python-utils-2.9-25.el8.noarch.rpm f11fee096925adb2efdf9139732e8b9e02f2dc1c6a363b8570057ace870fae12 policycoreutils-restorecond-2.9-25.el8.aarch64.rpm 4a5e86e969e5cf613e692be4295857c80976ee70f112f01a1548b8c3c0911f25 python3-policycoreutils-2.9-25.el8.noarch.rpm 61a4f7b59d6126101aa05bc37eefd46724f4f05bddcb6707cf6f28141ff19cd3 python3-policycoreutils-2.9-25.el8.noarch.rpm 61a4f7b59d6126101aa05bc37eefd46724f4f05bddcb6707cf6f28141ff19cd3 RLBA-2024:3224 util-linux bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms libblkid-2.32.1-46.el8.aarch64.rpm 535c32ac663b86db5de9c0bb99b49a3169f10bd5be6a3e7e6becf970a9b58b5a libblkid-devel-2.32.1-46.el8.aarch64.rpm c5912a194fafd1b148ae4b8c6817897de3f8924eded41f85dc2b0dfb6c65ec99 libfdisk-2.32.1-46.el8.aarch64.rpm 7d963a68f9d7c658d14c6ea0742bb7ddcefac6d4f331f65d265d9dd1b83ad483 libfdisk-devel-2.32.1-46.el8.aarch64.rpm 8e86f3372fe62436ea213c3b97a78162198359ca0cd38ba7c4f7f5b978e8472a libmount-2.32.1-46.el8.aarch64.rpm 51aad615f25ced72a2f52d00ee45a3719871ca99ff2f9f1466cb56ecc185f031 libsmartcols-2.32.1-46.el8.aarch64.rpm 02107f81e7ba1e94ab77bb3962194593a5aa5cb29504172a88f93864709bc579 libsmartcols-devel-2.32.1-46.el8.aarch64.rpm 3adf084c33f079465e8a721fe1b592329a5dd6f80685be15425e16362134aa95 libuuid-2.32.1-46.el8.aarch64.rpm df70bb7b02c4871b635a5b9655762cfb0e2006cdc88dbe6516d89bbca9bdd411 libuuid-devel-2.32.1-46.el8.aarch64.rpm 2752feff230b242909465bf90b610df175d323ed84c20335c1a6946377e0c461 util-linux-2.32.1-46.el8.aarch64.rpm aa00b4f1c791a2486574eee13ccecc76de93c2d72205383099a69ee92afbbd6e util-linux-user-2.32.1-46.el8.aarch64.rpm 80223c594f0e3404c3d17d0bf3e2ec913bb885622f13d492dcbabce7882ba10e uuidd-2.32.1-46.el8.aarch64.rpm 66c35453467b181c3d6fa181b797fcfab7bbc1fe94cd047297121d00b9d10529 RLBA-2024:3222 hwdata bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for hwdata. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms hwdata-0.314-8.22.el8.noarch.rpm 08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69 hwdata-0.314-8.22.el8.noarch.rpm 08f63531506cc8b97fc047cdd99a378d7ac8e10ebf594dbd7c4dcdb81b2dde69 RLBA-2024:3228 lvm2 bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms device-mapper-1.02.181-14.el8.aarch64.rpm 2397b6b0e8bbe98f3c6f959a3b1e99a5cfee78f9ca6facc4cfa5afa7daff490c device-mapper-event-1.02.181-14.el8.aarch64.rpm 1b744b15cdd6276e2436df231261f992e186a3932417952af69fd7be018bb5bc device-mapper-event-libs-1.02.181-14.el8.aarch64.rpm 716c37efd3d1c7219de1d9918035511673e796e97f139393eeebe0e1126d65d9 device-mapper-libs-1.02.181-14.el8.aarch64.rpm 62b38aa8d4395b6c166e78ee9fad22cdb3ae6cfadc5e9d843588ae4c50e02787 lvm2-2.03.14-14.el8.aarch64.rpm 726b82b24cd244160cc7905b8caeff5c945c9192426470ed9984c75729d7c309 lvm2-dbusd-2.03.14-14.el8.noarch.rpm 5ec527c8c70e517fb9de5210ecfd8f2f5b16b40fd6418fb34add3cc0082c8592 lvm2-dbusd-2.03.14-14.el8.noarch.rpm 5ec527c8c70e517fb9de5210ecfd8f2f5b16b40fd6418fb34add3cc0082c8592 lvm2-libs-2.03.14-14.el8.aarch64.rpm 486f74b9e257295a151eb1b0b6701f874e5c8bf85e1b06af69e5b36f6d03cc56 lvm2-lockd-2.03.14-14.el8.aarch64.rpm 6fa1ee32df748ed2e378ee8bfd4f79c5b848282f1350a13e5caf87cf6cd08ef8 RLBA-2024:3229 sanlock bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sanlock. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section. none-baseos-rpms sanlock-lib-3.8.4-5.el8.aarch64.rpm ff3e1790d16211aad8a4bf4060a52cd921b1573c73adb827a28f3e23d8a1bf1a RLSA-2024:4249 Low: c-ares security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for c-ares. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The c-ares C library defines asynchronous DNS (Domain Name System) requests and provides name resolving API. Security Fix(es): * c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms c-ares-1.13.0-11.el8_10.aarch64.rpm dafdad265e53b1c7d7f3786eabe0c51cdbce53b0dd0ce3b3528a378e4aea0216 c-ares-devel-1.13.0-11.el8_10.aarch64.rpm 7c5a52789222f418a72b753da64cde7748775839270b096902651342438ded5a RLBA-2024:4250 libtirpc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libtirpc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call (TI-RPC) documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Bug Fix(es): * RPC servers binding to ports outside ip_local_port_range (JIRA:Rocky Linux-27005) none-baseos-rpms libtirpc-1.1.4-12.el8_10.aarch64.rpm a963cafad28e91b64cf08450114b39b85d7905496b2f8869f1c947b5a8fd1ec4 libtirpc-devel-1.1.4-12.el8_10.aarch64.rpm bfaa7b9238874e5288cbe88402ba1584ba93a350ac22c3ee596dae357166cbfa RLBA-2024:4251 pam bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Bug Fix(es): * [Rocky Linux8 0day] pam_faillock audit events duplicate uid (JIRA:Rocky Linux-28620) none-baseos-rpms pam-1.3.1-34.el8_10.aarch64.rpm c909d93c38e28439b2260da7ccbe7c0609cf561ec9080857bd5cc90912dc4d6d pam-devel-1.3.1-34.el8_10.aarch64.rpm 27515ceb589036462503a9edba9aeed78e4920fff45fc4a3739c4f306ef13b14 RLSA-2024:4252 Moderate: nghttp2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for nghttp2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: CONTINUATION frames DoS (CVE-2024-28182) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libnghttp2-1.33.0-6.el8_10.1.aarch64.rpm 4d9aa0813607c841dc812b4e3cf0dba9506347d052d7aef784873528eb29af2a RLBA-2024:4253 policycoreutils bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for policycoreutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The policycoreutils packages contain the core policy utilities required to manage a SELinux environment. Bug Fix(es): * Semanage fcontext command doesn't list contexts in order of processing in Rocky Linux8 (JIRA:Rocky Linux-24461) * Semanage export does not distinguish between --modify and --add (JIRA:Rocky Linux-28167) none-baseos-rpms policycoreutils-2.9-26.el8_10.aarch64.rpm f8aac526abafb96c6c3f3aaa465b53592c6bf5dcd5b51f894ba4e5c37be131b6 policycoreutils-dbus-2.9-26.el8_10.noarch.rpm 70fa16415e4f8cdea690ab77a68a820bc0408953543e19df5dbf32c688760c28 policycoreutils-dbus-2.9-26.el8_10.noarch.rpm 70fa16415e4f8cdea690ab77a68a820bc0408953543e19df5dbf32c688760c28 policycoreutils-devel-2.9-26.el8_10.aarch64.rpm 1e701eb0e8996a48c64f99927d5ef6598f40fed17f3fdfe1f9cfa04bb95c1d10 policycoreutils-newrole-2.9-26.el8_10.aarch64.rpm 1310efced6650210b9dbe2920c9fa549f9bc5de5bc755375badafbd85feceb75 policycoreutils-python-utils-2.9-26.el8_10.noarch.rpm 577785eb952f28c76f6030da12f02d5d7baa50cb9f0b28ae9418fe631bab244f policycoreutils-python-utils-2.9-26.el8_10.noarch.rpm 577785eb952f28c76f6030da12f02d5d7baa50cb9f0b28ae9418fe631bab244f policycoreutils-restorecond-2.9-26.el8_10.aarch64.rpm a648e31066549ebe0ca43d8fe732ad39fbb9660dd2d779241866ede130516a91 python3-policycoreutils-2.9-26.el8_10.noarch.rpm 308d52bb26f2ee3993cd0b8c766351b9ff7d7609d9e873fb531e4e6197f6bba6 python3-policycoreutils-2.9-26.el8_10.noarch.rpm 308d52bb26f2ee3993cd0b8c766351b9ff7d7609d9e873fb531e4e6197f6bba6 RLBA-2024:4255 systemd update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * Nautilus does not observe umask when creating files (Rocky Linux-28048) * systemd CI fixes [rhel-8.10.z] (Rocky Linux-32494) none-baseos-rpms systemd-239-82.el8_10.1.aarch64.rpm 966685013fe00f80acef855960e3fc46a347e54096e490fa40198b7486d724af systemd-container-239-82.el8_10.1.aarch64.rpm 5bac0c59a43a37571a1eb0957b8aeab96df5a66c7537851caf5ee2ed1805033b systemd-devel-239-82.el8_10.1.aarch64.rpm 0ee4b588e6ee5b14ad2fabc8772fc5ddeac26f94d9de0e72312f92bd85e07ef7 systemd-journal-remote-239-82.el8_10.1.aarch64.rpm c7762ce4110fb73ea8477f48ff7dee279fe985852ff0eb29f435ce863589c85e systemd-libs-239-82.el8_10.1.aarch64.rpm fd6cf2e2b9d1ed35510e284605dcca6e2398e8e6bbd0daf50ff687c68ec7e355 systemd-pam-239-82.el8_10.1.aarch64.rpm 4a847a9f19f40248eea313c343d79e8849d7d85ad2b0deafdade759c6bdb5c41 systemd-tests-239-82.el8_10.1.aarch64.rpm 329ebee0693326a9574bc199753d23048153b879cc08be43acbec2c9e13feeb2 systemd-udev-239-82.el8_10.1.aarch64.rpm 30fe594df4aa33762c688dbc534e49376ca0e7d68e3dd93242d7922597580ff9 RLSA-2024:4256 Important: less security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for less. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors. Security Fix(es): * less: OS command injection (CVE-2024-32487) * less: missing quoting of shell metacharacters in LESSCLOSE handling (CVE-2022-48624) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms less-530-3.el8_10.aarch64.rpm f81a325a3c23187499018e272075deca617489c49acb800b2a7245432931e6ad RLSA-2024:4259 Moderate: xmlrpc-c security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * expat: parsing large tokens can trigger a denial of service (CVE-2023-52425) none-baseos-rpms xmlrpc-c-1.51.0-9.el8_10.aarch64.rpm 477b8da95c75e1f01bc5789d6bbe6f866a99111c3a707db6c9a70d1e164aa508 xmlrpc-c-client-1.51.0-9.el8_10.aarch64.rpm cb5122d673c4e9675b46f8878c3463bd27f097232ff8cdce7465df5a34538144 RLSA-2024:4260 Moderate: python-idna security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-idna. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The hsakmt packages include a thunk library for AMD's Heterogeneous System Architecture (HSA) Linux kernel driver (amdkfd). Security Fix(es): * python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode() (CVE-2024-3651) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-idna-2.5-7.el8_10.noarch.rpm 92163b2acbc3d543483bc824d4fedc60aa1cf11114659ae5042a40bd03348262 python3-idna-2.5-7.el8_10.noarch.rpm 92163b2acbc3d543483bc824d4fedc60aa1cf11114659ae5042a40bd03348262 RLBA-2024:4261 samba bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * [RFE] idmap_ad : add option to request only POSIX groups from AD [rhel-8.10.z] (JIRA:Rocky Linux-33813) none-baseos-rpms ctdb-4.19.4-4.el8_10.aarch64.rpm 023192dd960f55dde1db77b02debd0c9e90566ac51c955fc6ca893826883f1d7 libnetapi-4.19.4-4.el8_10.aarch64.rpm 86315c4b43c7ad30893cf7cc7b14772a32b7f5279949db4ae2a94d1d06e0d2c6 libsmbclient-4.19.4-4.el8_10.aarch64.rpm b44d5c887775f53ec92eb2fb0fd1ef03c02651a11a8cc1be9b6b1fb77b61a7f7 libwbclient-4.19.4-4.el8_10.aarch64.rpm e55d1b6ac0c7a2d0a58fa013b1ed3940adb1215357d2366871de5cb6e7c8d217 python3-samba-4.19.4-4.el8_10.aarch64.rpm 7c83adc1e6944f9dea9e43a7bb16759433167e7031aab1c218975e8e70fbb45d python3-samba-dc-4.19.4-4.el8_10.aarch64.rpm 1b358af5fcca02a7a8b34be50083b666680bb7d3ec46503c63ff0b7a2a19a6be python3-samba-test-4.19.4-4.el8_10.aarch64.rpm 808defe4c8eb4860cb3925817513168870dc7fc709a13d72785ef56defb981f7 samba-4.19.4-4.el8_10.aarch64.rpm 800292eeae2f8c6e0c6d3e63d6227ed0eefd1e783d7d849785e16d5e81e1c5d5 samba-client-4.19.4-4.el8_10.aarch64.rpm f5404b4a6a084c4087778e4e2bff43096f0f7f785c3e124bf1b3fda598b09bbd samba-client-libs-4.19.4-4.el8_10.aarch64.rpm a99ba9886bf1097c6e887cecfcc9eaa0c6909175d1ae73526d1924fc3e05e46d samba-common-4.19.4-4.el8_10.noarch.rpm 74ab5c85a5cba13b670a8dc678dbd38c410e878e47901a497b4fbe2497afe4da samba-common-4.19.4-4.el8_10.noarch.rpm 74ab5c85a5cba13b670a8dc678dbd38c410e878e47901a497b4fbe2497afe4da samba-common-libs-4.19.4-4.el8_10.aarch64.rpm d904af410f9650672b5e1b326a2a55b9849701012c8691352657e9c37aab9949 samba-common-tools-4.19.4-4.el8_10.aarch64.rpm 7d95a20e18df813a57ffba47e647ff324f05de716babc4fd0b1aec35d8ba2a91 samba-dcerpc-4.19.4-4.el8_10.aarch64.rpm 8c0a57ca2b398ee92f24d38560206c83b36659e49a2c6d26b522c6170a085950 samba-dc-libs-4.19.4-4.el8_10.aarch64.rpm 628ab4e7768ce02635c0627d5ff4ab9d65091bb17b9c81a890e57f42f68aca15 samba-krb5-printing-4.19.4-4.el8_10.aarch64.rpm 1d53ab82f7200774e9f25e264762520fbd0399e8498706350e1b541b91151cce samba-ldb-ldap-modules-4.19.4-4.el8_10.aarch64.rpm ae86b80192925f358bdb6d65d8557677081058151629852eaf86c98ce1064846 samba-libs-4.19.4-4.el8_10.aarch64.rpm 204b45c9d7a7f5f60b35c8f2dc9b48880ff76d131833400365682790ee16f05b samba-pidl-4.19.4-4.el8_10.noarch.rpm 2b33ec58e9dc3430cf1a737d86d7c7de0bf48a2ae3bee0239e602a5a993cd013 samba-pidl-4.19.4-4.el8_10.noarch.rpm 2b33ec58e9dc3430cf1a737d86d7c7de0bf48a2ae3bee0239e602a5a993cd013 samba-test-4.19.4-4.el8_10.aarch64.rpm 62b5d6f6db2304c6d6e52f62efdd70b4815b56d7ba615a6b9da6eda4003d031e samba-test-libs-4.19.4-4.el8_10.aarch64.rpm ef5caa176a4e8e532ad0856eb092f140ed178c710f0e312e53066ddd1400218a samba-tools-4.19.4-4.el8_10.aarch64.rpm 31024497cd763591bbd45b245cd8ef2a055dc0a6a1d7c4dcce9b64ee1e4fba78 samba-usershares-4.19.4-4.el8_10.aarch64.rpm 5aeb35735f2297115cbc02b6a0998f26a7b17c7824539bed249c9b9f21728537 samba-winbind-4.19.4-4.el8_10.aarch64.rpm 3049705faa952619d630524a901a12989549b2d40de0cae94a0aea2f9d3bebc7 samba-winbind-clients-4.19.4-4.el8_10.aarch64.rpm 967c276fa6374ec29ab204b408999bf40db5fa57fef798b6c3c933f933e5e28e samba-winbind-krb5-locator-4.19.4-4.el8_10.aarch64.rpm ed6b8220147c4253c87c2afde77227c2259420c0069a5a9a779aabfd06fe5cdf samba-winbind-modules-4.19.4-4.el8_10.aarch64.rpm 386d255faeb6cbe6111462e7a5c3884c0ec7d1d267500c5a9c722b9bb98d82e4 RLSA-2024:4262 Moderate: linux-firmware security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * kernel: Reserved fields in guest message responses may not be zero initialized (CVE-2023-31346) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-122.el8_10.1.noarch.rpm f5540d798e420578f47295790023468cfa231ac7a1482210568b62371263efa0 iwl1000-firmware-39.31.5.1-122.el8_10.1.noarch.rpm f5540d798e420578f47295790023468cfa231ac7a1482210568b62371263efa0 iwl100-firmware-39.31.5.1-122.el8_10.1.noarch.rpm bf61a337f67337e420fe98b7a24622899a957d44065ff230da3420d78ccf9a1a iwl100-firmware-39.31.5.1-122.el8_10.1.noarch.rpm bf61a337f67337e420fe98b7a24622899a957d44065ff230da3420d78ccf9a1a iwl105-firmware-18.168.6.1-122.el8_10.1.noarch.rpm cc075f290cc1f08ec60f77aba5c69e6a10f735a1d267f30721320fd4c0277b34 iwl105-firmware-18.168.6.1-122.el8_10.1.noarch.rpm cc075f290cc1f08ec60f77aba5c69e6a10f735a1d267f30721320fd4c0277b34 iwl135-firmware-18.168.6.1-122.el8_10.1.noarch.rpm fca85c1113a8ad6b2fe73fac6952ede51b265bbf6ecb899726ca232f5988e0dc iwl135-firmware-18.168.6.1-122.el8_10.1.noarch.rpm fca85c1113a8ad6b2fe73fac6952ede51b265bbf6ecb899726ca232f5988e0dc iwl2000-firmware-18.168.6.1-122.el8_10.1.noarch.rpm 39f5b49b74b3a3c03e15f2e72b7953e592f7f4de0338eb0812fae204da2f689d iwl2000-firmware-18.168.6.1-122.el8_10.1.noarch.rpm 39f5b49b74b3a3c03e15f2e72b7953e592f7f4de0338eb0812fae204da2f689d iwl2030-firmware-18.168.6.1-122.el8_10.1.noarch.rpm db2852c1efd96f3333dedfa87ed44324ceff2a7e7a6afc8565df320b664024c0 iwl2030-firmware-18.168.6.1-122.el8_10.1.noarch.rpm db2852c1efd96f3333dedfa87ed44324ceff2a7e7a6afc8565df320b664024c0 iwl3160-firmware-25.30.13.0-122.el8_10.1.noarch.rpm 15f96638b4077b874e083b7556dfed5f4dcd4ea42ebd086defbce7725c1bde1a iwl3160-firmware-25.30.13.0-122.el8_10.1.noarch.rpm 15f96638b4077b874e083b7556dfed5f4dcd4ea42ebd086defbce7725c1bde1a iwl3945-firmware-15.32.2.9-122.el8_10.1.noarch.rpm d6bc5669a1a8015ff0caeee6c29f45532cafe3545fedb12da104e4d966fd2732 iwl3945-firmware-15.32.2.9-122.el8_10.1.noarch.rpm d6bc5669a1a8015ff0caeee6c29f45532cafe3545fedb12da104e4d966fd2732 iwl4965-firmware-228.61.2.24-122.el8_10.1.noarch.rpm a00d5b209317fd60cd5f92928806108888ee2b5629ca395f8f4e6f9b70cb390a iwl4965-firmware-228.61.2.24-122.el8_10.1.noarch.rpm a00d5b209317fd60cd5f92928806108888ee2b5629ca395f8f4e6f9b70cb390a iwl5000-firmware-8.83.5.1_1-122.el8_10.1.noarch.rpm 6744b2c347cfc0d0a9e749c6f06d59ec31de76bfe10162ac1d9ad2749be34d9d iwl5000-firmware-8.83.5.1_1-122.el8_10.1.noarch.rpm 6744b2c347cfc0d0a9e749c6f06d59ec31de76bfe10162ac1d9ad2749be34d9d iwl5150-firmware-8.24.2.2-122.el8_10.1.noarch.rpm c600b76163d2a82a1cf06fecce4f0f933c91daf91a12fde2a185f9faa238fe41 iwl5150-firmware-8.24.2.2-122.el8_10.1.noarch.rpm c600b76163d2a82a1cf06fecce4f0f933c91daf91a12fde2a185f9faa238fe41 iwl6000-firmware-9.221.4.1-122.el8_10.1.noarch.rpm abea97f96527fde4453157330c1e0cafbf7751d1f0eb92691701a998527e749c iwl6000-firmware-9.221.4.1-122.el8_10.1.noarch.rpm abea97f96527fde4453157330c1e0cafbf7751d1f0eb92691701a998527e749c iwl6000g2a-firmware-18.168.6.1-122.el8_10.1.noarch.rpm 3241d41a4dcb44e953335fd97241072058363ab30dd45349610c10e5a3789dcc iwl6000g2a-firmware-18.168.6.1-122.el8_10.1.noarch.rpm 3241d41a4dcb44e953335fd97241072058363ab30dd45349610c10e5a3789dcc iwl6000g2b-firmware-18.168.6.1-122.el8_10.1.noarch.rpm 5275c69e023389e0493bbb07907454180a606769ba5a1b5650340c9411a44f26 iwl6000g2b-firmware-18.168.6.1-122.el8_10.1.noarch.rpm 5275c69e023389e0493bbb07907454180a606769ba5a1b5650340c9411a44f26 iwl6050-firmware-41.28.5.1-122.el8_10.1.noarch.rpm 4faf31fd7e1c1ffee20a4ef6df4c576a1cc389ff79d3444e08fccfef53a63694 iwl6050-firmware-41.28.5.1-122.el8_10.1.noarch.rpm 4faf31fd7e1c1ffee20a4ef6df4c576a1cc389ff79d3444e08fccfef53a63694 iwl7260-firmware-25.30.13.0-122.el8_10.1.noarch.rpm 4f36938f1030739f4f468898ad65782751c7dd61f61f1c7ecff08462e7b8c9b3 iwl7260-firmware-25.30.13.0-122.el8_10.1.noarch.rpm 4f36938f1030739f4f468898ad65782751c7dd61f61f1c7ecff08462e7b8c9b3 libertas-sd8686-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm ed6a1e73a46c37c8c203668de808e7cac25de4b5bece14e6b94a967f3417946b libertas-sd8686-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm ed6a1e73a46c37c8c203668de808e7cac25de4b5bece14e6b94a967f3417946b libertas-sd8787-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 5fe04df06f0c6851ee15915e96830f61372587f578dcd08f359e09b9b2a036da libertas-sd8787-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 5fe04df06f0c6851ee15915e96830f61372587f578dcd08f359e09b9b2a036da libertas-usb8388-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 5e37c810fd631c891a48fef337ef64e9a7a6b37845f9919363061f66c459d0bc libertas-usb8388-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 5e37c810fd631c891a48fef337ef64e9a7a6b37845f9919363061f66c459d0bc libertas-usb8388-olpc-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 7a4d9717fe13d4845ae354d3c51bd5fb060f7b040533468ecbd4bd0615ed49c2 libertas-usb8388-olpc-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 7a4d9717fe13d4845ae354d3c51bd5fb060f7b040533468ecbd4bd0615ed49c2 linux-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 2b0c8e8902c5591f7a2b61c6ab935d9b7e43cfa19c98273ac6b8ecc9dfe33aa3 linux-firmware-20240610-122.git90df68d2.el8_10.noarch.rpm 2b0c8e8902c5591f7a2b61c6ab935d9b7e43cfa19c98273ac6b8ecc9dfe33aa3 RLBA-2024:4263 krb5 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Bug Fix(es): * Backport of defcred leak in krb5 gss_inquire_cred() to Rocky Linux 8 [rhel-8.10] (JIRA:Rocky Linux-32258) none-baseos-rpms krb5-devel-1.18.2-28.el8_10.aarch64.rpm f94afe5f65e6566e766828fa2a66343a5c8de8adf9f1df7670c6c182a8b98410 krb5-libs-1.18.2-28.el8_10.aarch64.rpm beb20e9cbac7fcd5457da90f7256f77349fd920d3bfd21c228f5b0dda5a30b36 krb5-pkinit-1.18.2-28.el8_10.aarch64.rpm 7538ca96bead9e818c33416131a7532a093312b04486f7527af2ea87f2fcc283 krb5-server-1.18.2-28.el8_10.aarch64.rpm 903649105d86e3da694d80669d85b8e3fb051e9a5010ae358b32b500437f58e0 krb5-server-ldap-1.18.2-28.el8_10.aarch64.rpm 1c5ce26b5da35f60c273fb9c39c9ea9bc29429f3226f4a97093dc05ac33c4e48 krb5-workstation-1.18.2-28.el8_10.aarch64.rpm 6e71ab4d4a259bd3491bd2332ebb8c1b4140028efbf5066ac8248f701215ab53 libkadm5-1.18.2-28.el8_10.aarch64.rpm 0ef5f25181bbb28514c04b83a05bb98deb76325eb2354454babd9f8ef1235a9c RLSA-2024:4264 Low: openldap security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Security Fix(es): * openldap: null pointer dereference in ber_memalloc_x function (CVE-2023-2953) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openldap-2.4.46-19.el8_10.aarch64.rpm 274f1451bf060f1fd78a55323372ed379d71bd5224be7fd8370241376d13c259 openldap-clients-2.4.46-19.el8_10.aarch64.rpm cc6bb44207ec5db7ca944e68456c202c5eb813d12c4cad078b43afc7f8806668 openldap-devel-2.4.46-19.el8_10.aarch64.rpm e579356e660e4a2e55680847b7166e635cd377a3b1603e58eb362cd8a6043672 RLSA-2024:4265 Moderate: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Cupsd Listen arbitrary chmod 0140777 (CVE-2024-35235) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.2.6-60.el8_10.aarch64.rpm 3a4bf6d497a76581876e1207340666b28504cfccb4d94eb2f33d5c003c7edbfa RLBA-2024:4266 kexec-tools bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kexec-tools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel's kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. Bug Fix(es): * [Rocky Linux-8]mkdumprd fails to generate kdump initrd when /etc/kdump.conf contains "core_collector makedumpfile" without options. [rhel-8.10.z] (JIRA:Rocky Linux-38358) none-baseos-rpms kexec-tools-2.0.26-14.el8_10.1.aarch64.rpm 7fd27e39f50a1c1d364f01206ada13c62f4843af68ea6cd975faa32b4bd25663 RLBA-2024:5307 sssd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Bug Fix(es): * SSSD fails to process AD groups with 'Global Scope' correctly causing incomplete group-membership on Rocky Linux if cache is empty [rhel-8.10.z] (JIRA:Rocky Linux-33957) none-baseos-rpms libipa_hbac-2.9.4-4.el8_10.aarch64.rpm 926da6c5262d72c7cf24153b89f664709d891f33b118ec37e5501cd572b29644 libsss_autofs-2.9.4-4.el8_10.aarch64.rpm f245085d6f4b8bb8ba3227a9c78de3885e35a49cbf5a9c5db635cdf8a103776c libsss_certmap-2.9.4-4.el8_10.aarch64.rpm 6c1e59db9f5ef564fb12ec9e726124f077d77a4b3eb5323f7bc4ca6b3029af76 libsss_idmap-2.9.4-4.el8_10.aarch64.rpm 5cccdf2f01d9852617f80b3660600b51112a05fde5a9b6f4b3376165fb73bf29 libsss_nss_idmap-2.9.4-4.el8_10.aarch64.rpm ee61035d8565f0dc3440f81a4046fee1a2d34aaa79a1455bbff26db469e8d8c9 libsss_simpleifp-2.9.4-4.el8_10.aarch64.rpm 2d70e6415282c7594f771d7e28112e2c8049f70b7b8452139c8a70c771ea3004 libsss_sudo-2.9.4-4.el8_10.aarch64.rpm a709dab6ccb82a7afe8c4ac51448a248d57b98826105235ea07bac25838eb932 python3-libipa_hbac-2.9.4-4.el8_10.aarch64.rpm 6b093cde007aa073eae4465cddcd4c6c2e2538ce7ba2decec1466bf06f42dfa1 python3-libsss_nss_idmap-2.9.4-4.el8_10.aarch64.rpm aeec451847de7c9703e0a37afd5a26fcf9f62d7675a08f4e7707cb43dff8449d python3-sss-2.9.4-4.el8_10.aarch64.rpm 63e75811c4946c5f405b94ac232169347f16f9650ebe2b8844417ac28ba6e378 python3-sssdconfig-2.9.4-4.el8_10.noarch.rpm 1615fa38bc777ecb903a35dcb0542e43707487a146a402bd7b87a40585838f53 python3-sssdconfig-2.9.4-4.el8_10.noarch.rpm 1615fa38bc777ecb903a35dcb0542e43707487a146a402bd7b87a40585838f53 python3-sss-murmur-2.9.4-4.el8_10.aarch64.rpm 6f0c4253172bb9e8c0329703be22e5809f0a9284ce7fa1cc2b1ff6e026240bbc sssd-2.9.4-4.el8_10.aarch64.rpm 479679f84410e5e71ef00ec75d2cde7b87c97b3aab833ba68b256e29f056d964 sssd-ad-2.9.4-4.el8_10.aarch64.rpm 4221a4b29ef4aa82321b66ffca38a1fbe185917a1e54e45b3d54d4dabfb20626 sssd-client-2.9.4-4.el8_10.aarch64.rpm 1f68cf62705874ddd78a7ff90948a0116e4bab25e5f4117eca994b1b3fc51cc9 sssd-common-2.9.4-4.el8_10.aarch64.rpm 1a3e57d8074fa5b439ffbe879d1637278cbea8d98e2d769879e8d636421684b9 sssd-common-pac-2.9.4-4.el8_10.aarch64.rpm 4caad267b8852c3b4e3659dd7ea0d3cf2fae369886f615cbd9985fd8e210d696 sssd-dbus-2.9.4-4.el8_10.aarch64.rpm 9eb018086f0ebb890f8f54ad20a65259224676877c9d079fcbd5c86ae17aa37b sssd-ipa-2.9.4-4.el8_10.aarch64.rpm 72fdf2bbb16250ff420944babb2e4f7e9fc900baa22dcb061f595ef543a990ea sssd-kcm-2.9.4-4.el8_10.aarch64.rpm 83446e3995c0e3eae5cea000eb4f99204877c006cf65d62e6d3f3adc72230a4f sssd-krb5-2.9.4-4.el8_10.aarch64.rpm b5d1d50e2b12e1ce9e4c5463505a3ca6dce9077428eb3f807b5538f0069d5f4c sssd-krb5-common-2.9.4-4.el8_10.aarch64.rpm a3d70eedbd606af51cbc5aedc70d9765d6cd341745c068fb495d3151de83fcc3 sssd-ldap-2.9.4-4.el8_10.aarch64.rpm be31bdc6cd041e85941983dc41741023bdb2fe4ef9ce50c762582b509d1267f0 sssd-nfs-idmap-2.9.4-4.el8_10.aarch64.rpm 7a8acee466adbf6fa46ab5f0cbc5d03f8e6b69bb68d135afb370ccac986b7aa1 sssd-polkit-rules-2.9.4-4.el8_10.aarch64.rpm 7bd56f3e459b16eb12e2086199b9eb73980e0050e448443d4ae290a3a799c3f0 sssd-proxy-2.9.4-4.el8_10.aarch64.rpm 02ef5503be9ec6242cc9b5d6ec9e0d5d4288f84bfe8025c45c8922eeb9f5beaa sssd-tools-2.9.4-4.el8_10.aarch64.rpm ed2efb1a8b2e9b6b2e984637a7ebae8bc35595e46d49d8ca687121c47bae1ba2 sssd-winbind-idmap-2.9.4-4.el8_10.aarch64.rpm 5b8bf8402c3f80711242c91fe82bdae345446819120ae494fc17bbafed132435 RLBA-2024:5310 openssh bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Bug Fix(es): * ssh with multiplexing can fail to connect to remote system when connection just timed out (JIRA:Rocky Linux-37743) none-baseos-rpms openssh-8.0p1-25.el8_10.aarch64.rpm 92bb615b1b3c172800362edd6714bb9cb6d6e2baf5a628a559f0ee3f0fdd08eb openssh-cavs-8.0p1-25.el8_10.aarch64.rpm 8e7087de81d1d3dbd165accd6b4e336a100741028f86917dafdac64a7ed3e851 openssh-clients-8.0p1-25.el8_10.aarch64.rpm 9fcacf182ebb3a7b1aa440e53fcbbe6ad2bde057a3f75b662b68e3bb814a61ab openssh-keycat-8.0p1-25.el8_10.aarch64.rpm 6bfd9d4e42cfae065c4c19a81a61efcf0267fdc9ea0737707d844081f58bffe7 openssh-ldap-8.0p1-25.el8_10.aarch64.rpm 28c84b5233b1d46a59e6212750508a9e67c5e6efb24431a2cf06e654a6de4169 openssh-server-8.0p1-25.el8_10.aarch64.rpm 3c6cb103bbb91f7b6416eb068113551b0e1950be1f0c704a6072afeda07ccfd1 pam_ssh_agent_auth-0.10.3-7.25.el8_10.aarch64.rpm 4e2e7000cef01abf2f60ae5d569fd1455e9085ee067f8d27e61087848370bbb3 RLBA-2024:5311 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. Bug Fix(es): * regression: undefined service causes firewalld load failure in Rocky Linux8.5 (JIRA:Rocky Linux-5790) Enhancement(s): * Add nftables icmptypes mld*-listener-* types to firewalld (JIRA:Rocky Linux-13252) * [RFE] firewalld feat: add support for rich language using ipset in destination (JIRA:Rocky Linux-29875) * RFE: firewall-cmd should be able to deal with nft-rules with "burst" (JIRA:Rocky Linux-9316) none-baseos-rpms firewalld-0.9.11-8.el8_10.noarch.rpm 5a85ce615eaa8c1586c7fdf6dfab364e4f2accee4b11a6587b628a32c2cbe83a firewalld-0.9.11-8.el8_10.noarch.rpm 5a85ce615eaa8c1586c7fdf6dfab364e4f2accee4b11a6587b628a32c2cbe83a firewalld-filesystem-0.9.11-8.el8_10.noarch.rpm 04c8257f7998a5fcdc0e7da8a5327432253af258fd6f7d9e0068feb1a5d39d3f firewalld-filesystem-0.9.11-8.el8_10.noarch.rpm 04c8257f7998a5fcdc0e7da8a5327432253af258fd6f7d9e0068feb1a5d39d3f python3-firewall-0.9.11-8.el8_10.noarch.rpm baa8b24656a50c1992c50bf0796033b88215232106723a975acadd9dfefebc2e python3-firewall-0.9.11-8.el8_10.noarch.rpm baa8b24656a50c1992c50bf0796033b88215232106723a975acadd9dfefebc2e RLSA-2024:5309 Moderate: python-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. Security Fix(es): * urllib3: proxy-authorization request header is not stripped during cross-origin redirects (CVE-2024-37891) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-urllib3-1.24.2-8.el8_10.noarch.rpm 497e7da6a1ee90dfdcddc99daa96565936fd2c6b99f503b8fa7eca822c14ab5f python3-urllib3-1.24.2-8.el8_10.noarch.rpm 497e7da6a1ee90dfdcddc99daa96565936fd2c6b99f503b8fa7eca822c14ab5f RLBA-2024:5308 libdnf bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libdnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A Library providing simplified C and Python API to libsolv. Bug Fix(es): * error: Cannot create repo temporary directory "/tmp/libdnf.3fecxz": Permission denied [rhel-8.10.z] (JIRA:Rocky Linux-43231) none-baseos-rpms libdnf-0.63.0-20.el8_10.aarch64.rpm e85665d2d9039ad6f133d4546fdc3afba561a8dccf211e06214b9d5ceedf5200 python3-hawkey-0.63.0-20.el8_10.aarch64.rpm 8012f1880366693ea57fa6e6071413f8047a9be7bd8fd5749e920fee784145c9 python3-libdnf-0.63.0-20.el8_10.aarch64.rpm cabef51b6e5e3acf44cd386290e0d64e7eb017963edad0ff3d8b1118ed43e3b8 RLSA-2024:5312 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: GSS message token handling (CVE-2024-37371) * krb5: GSS message token handling (CVE-2024-37370) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-29.el8_10.aarch64.rpm a9edccc42f602131645f81b8b60cf0e75374f685bda3c0e803bc021b52f3815f krb5-libs-1.18.2-29.el8_10.aarch64.rpm 09f85e85860ff745baec89f3480fd6846f85c11e01f0d1daf66836aae1233fbb krb5-pkinit-1.18.2-29.el8_10.aarch64.rpm 002b66a34e2e7af24fedf79db9cc43523a3551fb4f4e44ad8a9946b83668197a krb5-server-1.18.2-29.el8_10.aarch64.rpm a01ae438fe30748eaab58686ccbedd654d64dc3384e04a564b2b97c690707c1b krb5-server-ldap-1.18.2-29.el8_10.aarch64.rpm f8017986b2cb434772461f88ed896e750a9ef7fa08ce5b6843f2865515b196b1 krb5-workstation-1.18.2-29.el8_10.aarch64.rpm 8e9a769fcc2462ef9d48f78181d200a50b1e05517aeff17627f3f7b376efcc6d libkadm5-1.18.2-29.el8_10.aarch64.rpm dc39fe03c37c8add0f353942ad30c29c3505231ba9f0f5d3a2db40c2396eea5a RLSA-2024:5524 Important: bind security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam (CVE-2024-1737) * bind9: bind: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bind-export-devel-9.11.36-16.el8_10.2.aarch64.rpm 36efdff0eafc23d9e12b67aef8d97ea7727cedb13e5c7c7b121973da0845b6f8 bind-export-libs-9.11.36-16.el8_10.2.aarch64.rpm 3b7caaf834a54d4b9e4a1146992d6811a8c72353b528586d22ae54aa40259f1d RLSA-2024:5654 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: HTTP/2 push headers memory-leak (CVE-2024-2398) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-34.el8_10.2.aarch64.rpm 86eb8c3719efde30f125b0a301381922bc3fb74c6ca90b75961abe14b67bb1ad libcurl-7.61.1-34.el8_10.2.aarch64.rpm 749ffdf85aa5aa6013264250f6862c7cb765cb2d7675d9691c243606092ed4a5 libcurl-devel-7.61.1-34.el8_10.2.aarch64.rpm 28db5e32c486119bde78d90ac964e19a68fab429d0b477049a6a559a840ac874 libcurl-minimal-7.61.1-34.el8_10.2.aarch64.rpm d1075d4f116b6b248df1fd1094256ac8995d1a1b83362f446ecf8a79904e7f6e RLBA-2024:5736 ca-certificates bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for ca-certificates. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI). Bug Fix(es) and Enhancement(s): * Annual 2024 ca-certificates update version 2.69 from NSS 3.101.1 for Firefox 128 [rhel-8.10] (JIRA:Rocky Linux-44949) * ca-certificates: python-certifi: Removal of e-Tugra root certificate [rhel-8.10.0.z] (JIRA:Rocky Linux-16194) none-baseos-rpms ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch.rpm 439054192070117cbd18855897f977b7e660338ec686fa112721129ba4b3282b ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch.rpm 439054192070117cbd18855897f977b7e660338ec686fa112721129ba4b3282b RLBA-2024:5834 glibc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es): * glibc: Add workaround for certain dynamic TLS usage in interposed malloc [rhel-8.10.z] (JIRA:Rocky Linux-39994) * glibc: Fix ulp related test failures on x86-64 EPYC Rome (JIRA:Rocky Linux-52428) none-baseos-rpms glibc-2.28-251.el8_10.4.aarch64.rpm 58bddc1b9b7195037fb935681a86648eded8de94e902c49cfefcc65210e9f977 glibc-all-langpacks-2.28-251.el8_10.4.aarch64.rpm 6ab9a0f4e38c3a15355b310cd3cc9c58c78356cf0774cf0e2d77868c42d65f91 glibc-common-2.28-251.el8_10.4.aarch64.rpm 517c95bcec89ca72f5424e57b9bd9544ade6f1717f076d2e73f1ec4dea46cb70 glibc-devel-2.28-251.el8_10.4.aarch64.rpm dc93fd0393c680a782e355637556bdc92f3221b74ee117fc5b0b2039c185d75c glibc-doc-2.28-251.el8_10.4.noarch.rpm 788456842d9b1c52385707c335966ff416dc965bc675509a70d32ddd8df761da glibc-doc-2.28-251.el8_10.4.noarch.rpm 788456842d9b1c52385707c335966ff416dc965bc675509a70d32ddd8df761da glibc-gconv-extra-2.28-251.el8_10.4.aarch64.rpm ea2f441e76ebf1108a3c5b022ca753527e39b6cbd834b4afec65109afd725769 glibc-headers-2.28-251.el8_10.4.aarch64.rpm 6cda50f91d8eb94424b1f60c96c0bb511d461082c0280c948eac3e2f1f62dc0c glibc-langpack-aa-2.28-251.el8_10.4.aarch64.rpm ed1d7c4fbf45090e0b53cad486a4dbc727d02f0858bd2196d72e936401ab25b0 glibc-langpack-af-2.28-251.el8_10.4.aarch64.rpm 4862627a38553fbe5ac9e5e6c5d64b1d71ab8202e33a4c9553cf085c137a8f0f glibc-langpack-agr-2.28-251.el8_10.4.aarch64.rpm 2610f3912fb1a23cb4c9b523d3cac0c70ebe1ce352761eb6a9e971b552966d57 glibc-langpack-ak-2.28-251.el8_10.4.aarch64.rpm df8b70ef76ebc3d4259d39bc41b2113b0c3aedf65115b53765c27938913bfd6f glibc-langpack-am-2.28-251.el8_10.4.aarch64.rpm cbf91ca66fd74dfcd1058d7890a59436b104c22fe1927410748369886684766b glibc-langpack-an-2.28-251.el8_10.4.aarch64.rpm 8c72278789d71585ab4d311ce6e2de3f1549c62d1e786d3395060db0ab03c9c1 glibc-langpack-anp-2.28-251.el8_10.4.aarch64.rpm c98449e8f1ef2916d28ce749ea032fe815b8890c208d31dc086a6d1a44968009 glibc-langpack-ar-2.28-251.el8_10.4.aarch64.rpm 73155b91de16644f4e780ee74383049f53277c622c34338f13f7630d6ea3de4f glibc-langpack-as-2.28-251.el8_10.4.aarch64.rpm 427e2cf05cd943dd67a57d3420977366ba18dd8675c33897fa82bda80592f91d glibc-langpack-ast-2.28-251.el8_10.4.aarch64.rpm aa330a198d03e90d4ba9100289fea56b2690328a1075a2e554eb2ecdeb7d2ebe glibc-langpack-ayc-2.28-251.el8_10.4.aarch64.rpm 7604297424c64c10fd18b9b4a75e575ad96a5e82ed009e6b60e759fc101c1a21 glibc-langpack-az-2.28-251.el8_10.4.aarch64.rpm bd8425ac55123a4e954ef064c1203a1612e4cbea3135d8992f8587f57155fa65 glibc-langpack-be-2.28-251.el8_10.4.aarch64.rpm 2bdf6ab212717d6710dc8e30beb19508357f2ae8681c753fb77e6437c968c60b glibc-langpack-bem-2.28-251.el8_10.4.aarch64.rpm 78bfdd601afa8e52ac3bcda50013f5dd4fc8a6299bcc08e9a6372df0a8789f56 glibc-langpack-ber-2.28-251.el8_10.4.aarch64.rpm 7dd3b91dc1b0864359209f3465d1331ed164d81d282ed40f1b0176d0d54a7ae8 glibc-langpack-bg-2.28-251.el8_10.4.aarch64.rpm aa8f4a03883687fcb541ed86858eec5c6f290ba3cef6daa5134a284d0a843b50 glibc-langpack-bhb-2.28-251.el8_10.4.aarch64.rpm 26c4fefa4f336e06f53b4449da45d445825545bf0322c8a2a2b824735d7bd262 glibc-langpack-bho-2.28-251.el8_10.4.aarch64.rpm bdd2da4600120a993c7f9554f0e32b9267fb0ec046c0b9c74079980d168b1414 glibc-langpack-bi-2.28-251.el8_10.4.aarch64.rpm 67f63e909014f105f7e8fbd430936918005165a4364fb2c80048a1ca9f1ec69c glibc-langpack-bn-2.28-251.el8_10.4.aarch64.rpm b75906ac59bfa590f90de75ada3aece27c6e2765c3bb17badcc362db9921aa91 glibc-langpack-bo-2.28-251.el8_10.4.aarch64.rpm 6a4e8649f18501838bd34683e886e6c1dc7a39b377c50254e4d649205819183f glibc-langpack-br-2.28-251.el8_10.4.aarch64.rpm 9844e76ff5c055922543e83f9cd760d4f15d0693b76a0e4e606aae8b35463fca glibc-langpack-brx-2.28-251.el8_10.4.aarch64.rpm 5bfe13ee21ea77e377b9e4d6fb96d512cb1cbde485e729f8c6a109efb914e5d3 glibc-langpack-bs-2.28-251.el8_10.4.aarch64.rpm c72d3fd7bb1056fb4c42c13d7f374bf3acd52074643b7736e29cc8b8a1acbd48 glibc-langpack-byn-2.28-251.el8_10.4.aarch64.rpm 743a3c44c4badfab5c22aac69084e3531dbdeb40f50d0e05730253cfe9fa4a57 glibc-langpack-ca-2.28-251.el8_10.4.aarch64.rpm 3aeb4909293599abb0b43a009892b9ad8f208d70ff68949ca881600f79583a4a glibc-langpack-ce-2.28-251.el8_10.4.aarch64.rpm b63028038c9a162ef969a3ff7c6b71ec3ee6b8d1800a19d37be1017732799f45 glibc-langpack-chr-2.28-251.el8_10.4.aarch64.rpm 26ff7aff29b05ffdbdd42327ab9f4999d3962b404c0a8f3ff990c0d28f21c30a glibc-langpack-cmn-2.28-251.el8_10.4.aarch64.rpm 8cfbafe17f3ac21dbebd75e4d1c20d1359492d86f526213a5a927a2f64b460f7 glibc-langpack-crh-2.28-251.el8_10.4.aarch64.rpm 3330f5808b36901871ab1d4593562cc4bfd726b7e0f2d1472513fae122425c86 glibc-langpack-cs-2.28-251.el8_10.4.aarch64.rpm 32dcd101a56088a9b0f953e3b966c1efdecfaae14f9c77558408d961e27250af glibc-langpack-csb-2.28-251.el8_10.4.aarch64.rpm f75c158375980972e880badd998a18c0636df2dd1cf041439a09dd72ae69eabb glibc-langpack-cv-2.28-251.el8_10.4.aarch64.rpm ee922f7351526b976bbc6621be95ac52e51a1552d6a55dee7cdefa7b64b8dccd glibc-langpack-cy-2.28-251.el8_10.4.aarch64.rpm a9d8e9e3df0d979b290d76960334739e38ca09654f5426e398cc69e2b33eb35a glibc-langpack-da-2.28-251.el8_10.4.aarch64.rpm 33a02e7e10a695289712caad6bdc2c0436c2896d35a937278c034468192a35c3 glibc-langpack-de-2.28-251.el8_10.4.aarch64.rpm 186508f39d76f0fc0079eaff781a37bde28ca8736a4c0d47c9649d0da49691d4 glibc-langpack-doi-2.28-251.el8_10.4.aarch64.rpm d7b6312c8210f6ec21c1b80751a986692b4aa9d49df4094198a2e07be062bc85 glibc-langpack-dsb-2.28-251.el8_10.4.aarch64.rpm 9ce524cd4c4188b1343e6feedd81ea606edb7c7ff906568d69cca3db842161b3 glibc-langpack-dv-2.28-251.el8_10.4.aarch64.rpm 717e80a500d6a47d741e5ef099bf4257e48650551d414462ee8e2569741b5200 glibc-langpack-dz-2.28-251.el8_10.4.aarch64.rpm 247f2685488e9420dba831136e284d28b156269965dede7b84aaa364d781438f glibc-langpack-el-2.28-251.el8_10.4.aarch64.rpm ba5f42ca5e6d137e728dbd4457c0e0066e7299fe669fe6f96c8b1762f1a44fca glibc-langpack-en-2.28-251.el8_10.4.aarch64.rpm 1a58752c92217c1e9516b81932e06a9ccd39c7f4e1457fba87ff93091e821f63 glibc-langpack-eo-2.28-251.el8_10.4.aarch64.rpm ebcff15f6675f3be359e9ef5023375f2a5039286c0574d0acc7917c8f7362e88 glibc-langpack-es-2.28-251.el8_10.4.aarch64.rpm 4d47c24a9f0d3e8b70bf09e6d6ca128447a6d970264cf1fed2ee86d02d613f80 glibc-langpack-et-2.28-251.el8_10.4.aarch64.rpm d61e60746b5dc1832fe4934b24ca71c6a49a427732d48424a52262a03aa9f700 glibc-langpack-eu-2.28-251.el8_10.4.aarch64.rpm 6d62bb2a123a39910ae2fd8d8ae0d3a58cd0b8fbe39cd14bbdbb20c0cf44cbc3 glibc-langpack-fa-2.28-251.el8_10.4.aarch64.rpm c21db34725d3a0c50488b54338903ee760dd7002ac6a1244e3d83868f9c300af glibc-langpack-ff-2.28-251.el8_10.4.aarch64.rpm 8734bfa05fe8607d48b4d877f324a4e2db219f369fc35404086ffda5bceeb917 glibc-langpack-fi-2.28-251.el8_10.4.aarch64.rpm 5ba3cfbdf8b4711fa616670538510e50b13c9451d33cebbdaf01e2b8286489e7 glibc-langpack-fil-2.28-251.el8_10.4.aarch64.rpm 64b1a555000f94ee3a8f4647ce4b74689949cce665f22484441189bf61947046 glibc-langpack-fo-2.28-251.el8_10.4.aarch64.rpm 6e519ef2a40957cd4293b52cfff67b9642cf96e609cfebb8eff42180828cee63 glibc-langpack-fr-2.28-251.el8_10.4.aarch64.rpm 200af76914c0cc85e3d0973a15b0088170ece77ebde4a3ad460b9a19464dec39 glibc-langpack-fur-2.28-251.el8_10.4.aarch64.rpm b71ebc0076ab6e4345d77ac10519801aaf68c1e20dd1a814713fa84d8e9cfa33 glibc-langpack-fy-2.28-251.el8_10.4.aarch64.rpm 9c0f2477d347967152061bdde8f43a01d7ce69a9ac16f96df33745dbdeb81fa9 glibc-langpack-ga-2.28-251.el8_10.4.aarch64.rpm 1171d774257b5b647c95bfb7bbe6c619a9302346b93fd23e3674b164cb458836 glibc-langpack-gd-2.28-251.el8_10.4.aarch64.rpm 50e38187a477858147fad3e960beffc91700b968034e6b32845fdf93c02b0cad glibc-langpack-gez-2.28-251.el8_10.4.aarch64.rpm 5fb604b21f321c226727031872d6af74732ad6dbf0765bd1364e4497d7d7c42e glibc-langpack-gl-2.28-251.el8_10.4.aarch64.rpm 15bfd61610158584eedd0848fb79071d4e61e45c21ce0aff88b8a988436a2833 glibc-langpack-gu-2.28-251.el8_10.4.aarch64.rpm f098b301169bd514d307f881b575b999b22b3b05fbcc6d3fb5323b2b7d957600 glibc-langpack-gv-2.28-251.el8_10.4.aarch64.rpm 051eff4cd7dda6953e9bfaa637249c074e23056e4ad90a68b9ec775a398cf112 glibc-langpack-ha-2.28-251.el8_10.4.aarch64.rpm da47b262b8037d5e2f2ffc06d6d1c8377926906d453d5c63dbfa4d5b285d5f7b glibc-langpack-hak-2.28-251.el8_10.4.aarch64.rpm 43b03c297824a6725630d75d7b25ba812b70aa4151ab4efca279b9fe394e6b01 glibc-langpack-he-2.28-251.el8_10.4.aarch64.rpm db2708d207ecca0186ed3a84ccc1bc5735b57d7add2ef299c80d854430684923 glibc-langpack-hi-2.28-251.el8_10.4.aarch64.rpm e8a29dfde82473537ef2de7012942d50beca8b99a224dfaf3b0d458d052faaee glibc-langpack-hif-2.28-251.el8_10.4.aarch64.rpm c99a15a780ba19910ba0af92d27eda1e6f6ce973df3323515b2801d77cb02338 glibc-langpack-hne-2.28-251.el8_10.4.aarch64.rpm 9c519d7479adf5c161d84c38174dadee63c6a86d9273c0c5de934ed73c5b59bb glibc-langpack-hr-2.28-251.el8_10.4.aarch64.rpm bfd3b4600da5a60d38d192176d56f7e06f1d6f5b33624d0887b926ed43764601 glibc-langpack-hsb-2.28-251.el8_10.4.aarch64.rpm 9ab48721a5646ec7b6948f007cab2ab7e9a914beb4d50679e36b5a4b6bee8467 glibc-langpack-ht-2.28-251.el8_10.4.aarch64.rpm 80d2828e1f0339f89c5e67122ab7dc5fd1d2b2895a25666ad10b0381ad98409c glibc-langpack-hu-2.28-251.el8_10.4.aarch64.rpm 8c4a7e0cfeec0a82106a3d3d64e112e31ff022153ccb0b463779f16b546485e7 glibc-langpack-hy-2.28-251.el8_10.4.aarch64.rpm 74a4aa828ea5d35440b7a6fa4cc228bdb72145977295a48963e53340f62517b5 glibc-langpack-ia-2.28-251.el8_10.4.aarch64.rpm dad539641701abca9e22bf0fadd75408d3130bc43900b3614adacfdb4c8585f5 glibc-langpack-id-2.28-251.el8_10.4.aarch64.rpm 078a4fc6b80d05940b863bc4b921d2fb0bfc6d96dab3fdfa1aa876bd38978da4 glibc-langpack-ig-2.28-251.el8_10.4.aarch64.rpm 441effd9bfc65bb3fd451bf45eab69128b35947884debb4d396b1f30716cde00 glibc-langpack-ik-2.28-251.el8_10.4.aarch64.rpm cd9dd5e336683246f296e95813d6f2b6904f300d8e56326e31c9454a1e7633ca glibc-langpack-is-2.28-251.el8_10.4.aarch64.rpm 520e2f61bb4d54d53c94f669a8f018d43cc1246da13ef1e00eefa3b818e46791 glibc-langpack-it-2.28-251.el8_10.4.aarch64.rpm 4e1b1c13aa1dc56b4f0c82eed7ef6115ae1f58c7829b5e66c29d1bbfc5bad0da glibc-langpack-iu-2.28-251.el8_10.4.aarch64.rpm f65d2138cdfa86afd2d9dd0de7b2d2446da054cdc3cd929aa7813e5585e292ce glibc-langpack-ja-2.28-251.el8_10.4.aarch64.rpm 36f4c05fe9baa5ac597425d7b628c6b4514a6eba69e55eae696e71e2edd1d220 glibc-langpack-ka-2.28-251.el8_10.4.aarch64.rpm cc00bbddd34ece2dc0e69c7749abf1faca313da962eb7001e66abd0a0414b4ee glibc-langpack-kab-2.28-251.el8_10.4.aarch64.rpm ed76bffdb81ef9afef5aad4ef8edf401bba407c20b2200f00d522ed8515afc2e glibc-langpack-kk-2.28-251.el8_10.4.aarch64.rpm b8fd31c02ff8ca13e5c0a5623ca6d59b4ca125caa5a8ce38753a1b6d6e527921 glibc-langpack-kl-2.28-251.el8_10.4.aarch64.rpm a37d14945c621a1ef271c6a91c0c34ebfbd4acba0aa4113e7ec5e04ae53e3d8a glibc-langpack-km-2.28-251.el8_10.4.aarch64.rpm 850b1b07cdbb3bb2872fed9b31d0d6fd7c3df89e1e8589ce54b46e1dc8e4b7c1 glibc-langpack-kn-2.28-251.el8_10.4.aarch64.rpm c3ae475f618b4cdc4719d487a7052bd02e268a0c840a60ac4e347eea81648e54 glibc-langpack-ko-2.28-251.el8_10.4.aarch64.rpm 9e25926595e0bbbf09417468c6cb01ee573b777ee726a8ac5ed994017adfe70c glibc-langpack-kok-2.28-251.el8_10.4.aarch64.rpm 58f5c375e3cec5254f02cfdfb54481e2fb48f7514cb47390ea64ec87ff6d0138 glibc-langpack-ks-2.28-251.el8_10.4.aarch64.rpm 6d926ba3b024cdbbbe59fc58084cd8d5bc9e2f9a6059dd29d9321ec456f1c328 glibc-langpack-ku-2.28-251.el8_10.4.aarch64.rpm 708f405c0ce344e464abeb88ac333479cd674f20526bb07ca76f9b9c54be3aad glibc-langpack-kw-2.28-251.el8_10.4.aarch64.rpm 3648b945a6c602eab9390df33c4b4837c4433e3b28bdb71541ac3083579501a3 glibc-langpack-ky-2.28-251.el8_10.4.aarch64.rpm 29f88f7434dd67bdb6441fb244cc040e1e699f9f6e69e2ccd085d8e55af1828f glibc-langpack-lb-2.28-251.el8_10.4.aarch64.rpm 1d8fda919c1dfbe27600ff368a1aded8d008ce2e1d2bf5ffc2e0c4c05cafae98 glibc-langpack-lg-2.28-251.el8_10.4.aarch64.rpm 096d32fe59f0565c6cdffd1deddfa07f3eec969735d53e8d7c4c4dbe48ce6a14 glibc-langpack-li-2.28-251.el8_10.4.aarch64.rpm 9b11d250b1b8abbc3ce0004dd7efd3ffe140f11c44fb998efc7d23de1f8d8f6a glibc-langpack-lij-2.28-251.el8_10.4.aarch64.rpm 4ef6c07a51cd6465d38fb09d0031b5cfaf2416b37b9053fa3461f59665a1d7ae glibc-langpack-ln-2.28-251.el8_10.4.aarch64.rpm ecac7174bfa48a74566d5da0e343aeae69374b459a16a76c55d124c9c24231ca glibc-langpack-lo-2.28-251.el8_10.4.aarch64.rpm 6f74ce75829738331e189bfc82e80deceacaa3de9d832adcfa9a2a1a1611ba20 glibc-langpack-lt-2.28-251.el8_10.4.aarch64.rpm 7a063311af83dcf0c3004b65ca0ad4b38aa0b5ca34e2c54f1fd5e672f0292c87 glibc-langpack-lv-2.28-251.el8_10.4.aarch64.rpm bdf70e3e7757fa7460d2d29455874d0372f2243a64b97e8fe856c9565797bbb7 glibc-langpack-lzh-2.28-251.el8_10.4.aarch64.rpm 20b1da28384a5e12b6892a9e4d20dc706521f5f5d426e928a96e4902345d0c53 glibc-langpack-mag-2.28-251.el8_10.4.aarch64.rpm 5efe8857706d3196c7f83ec59774d437d6f428630ba062643312ec2595addf88 glibc-langpack-mai-2.28-251.el8_10.4.aarch64.rpm d6b08d14a4aeea5cebb54635e6583fea4b60ee806716da4ced736d68e8166632 glibc-langpack-mfe-2.28-251.el8_10.4.aarch64.rpm 8f4db9a63b03cb7f20fc9fde31181ebc778c5007f094dcbab68adbd8c12a1dcc glibc-langpack-mg-2.28-251.el8_10.4.aarch64.rpm db5307b14788be27fab83c528f32becefd083aa90e8571d9db70b3c3b355ba6e glibc-langpack-mhr-2.28-251.el8_10.4.aarch64.rpm f79087a442fc23d2e6b1475636b61e5814209b5cccacd1a6fd88765024c4146b glibc-langpack-mi-2.28-251.el8_10.4.aarch64.rpm 63326aac47a3c0298f3be53b23968008a66b313e3dab0805d382b582fdefe66a glibc-langpack-miq-2.28-251.el8_10.4.aarch64.rpm ed14df6f0699deb93154e57358c6cdedb483a65261e90fdd8304c52f028c6462 glibc-langpack-mjw-2.28-251.el8_10.4.aarch64.rpm 4b1672ac9b4c453553b3c039afbc5c18a9e73e6d0eadf29c80cd24c9421c2658 glibc-langpack-mk-2.28-251.el8_10.4.aarch64.rpm 76bad888d45cfa3d1bf822e71dd294a6b756dacd102bec28a68484f6cfa01064 glibc-langpack-ml-2.28-251.el8_10.4.aarch64.rpm 4ae16613d67e1c25d2525f8453d319bb697d6184e9e42f1a2d42dccd9743a62c glibc-langpack-mn-2.28-251.el8_10.4.aarch64.rpm 806045c6326de25531eb729904ff3fac915da6f13a200a87ff48f30a0d1aa29f glibc-langpack-mni-2.28-251.el8_10.4.aarch64.rpm 68b8b40111addac0f5e750a02cb90cb4f577b42c4107f9f509fc1339a86994fe glibc-langpack-mr-2.28-251.el8_10.4.aarch64.rpm 27ed2e0ce77a2c74bac9de5bf5e1e98178343b1bfd3db288e15ce4c27c98fea3 glibc-langpack-ms-2.28-251.el8_10.4.aarch64.rpm 80aab799d3a82c6c24149f562c0b197b14889e18652fd3fb6246c26d25911b41 glibc-langpack-mt-2.28-251.el8_10.4.aarch64.rpm b5bb95ba5ef6c429389d0f490ffac3bd0bd587549e5735065dfae7313ebca623 glibc-langpack-my-2.28-251.el8_10.4.aarch64.rpm cd51664c581b8bf6f4e1e45292503f83782083cea8250b81059b9dbd326bd784 glibc-langpack-nan-2.28-251.el8_10.4.aarch64.rpm 532850864ed1928c7478b269ebd2f6d571168f6c4d7de87f87477786485f6c0b glibc-langpack-nb-2.28-251.el8_10.4.aarch64.rpm a31ca58e397f0728acdd857c347e66995e4caab1544493e1d04fc936f8874ede glibc-langpack-nds-2.28-251.el8_10.4.aarch64.rpm ef72ae23b65a39009a4686c6a704d6aba573069660e8fdfe09a532e0d112fe72 glibc-langpack-ne-2.28-251.el8_10.4.aarch64.rpm 63ec6e70adf2703cc7678dc2754232220dfd2171132e51989d19658fc12a8c05 glibc-langpack-nhn-2.28-251.el8_10.4.aarch64.rpm 93ad7cf258117ad37240eddef5351acbb9c8caa63aadf2a238dbace9a995ed73 glibc-langpack-niu-2.28-251.el8_10.4.aarch64.rpm af3623f6677b18e6ab2a17788055965bfa4daad5badc57c997e0cfe6dadd7f2e glibc-langpack-nl-2.28-251.el8_10.4.aarch64.rpm 347414e0e64007dd96e8394309d2747becd45fb4fe87646fa628c1da3cb96b21 glibc-langpack-nn-2.28-251.el8_10.4.aarch64.rpm c124a99dfe1ba1511e2b519279ffa72ca3ce3b69b0f0a2ee35dec26a63e517a3 glibc-langpack-nr-2.28-251.el8_10.4.aarch64.rpm cdf2ff39cce75e167061b02b25cbe540a8daf7ec369038e6f038c3fcfa0aec02 glibc-langpack-nso-2.28-251.el8_10.4.aarch64.rpm d93c5eb7a25be9027e80f722607562d3d23df7dbd787678cf17a089b64972fa0 glibc-langpack-oc-2.28-251.el8_10.4.aarch64.rpm 5b0124e38a20128ce5945ac2d5188be3f724f864530d5b8bf3d0b8bf8141d9a9 glibc-langpack-om-2.28-251.el8_10.4.aarch64.rpm 9b38cba67149011d1acdaecb14e74b085e0c3face2b46709cd2b479925fc58f9 glibc-langpack-or-2.28-251.el8_10.4.aarch64.rpm af93e2f684d3707442d55432e86367093a3820c4fc3b1314e5a08368329e87a5 glibc-langpack-os-2.28-251.el8_10.4.aarch64.rpm 84b9c906a301e2d7f422bd404df0f4a016f6cacac824a9f4f5e0d519dbcb7880 glibc-langpack-pa-2.28-251.el8_10.4.aarch64.rpm e9c578a4c5832d1a2a5670e698fa3cebe6b1c996363be54b90c8a2809996b769 glibc-langpack-pap-2.28-251.el8_10.4.aarch64.rpm afa24825bb633d75fed03a12f881d97d071002fdf39980d05e04e200e9db8e1a glibc-langpack-pl-2.28-251.el8_10.4.aarch64.rpm 778a3e3ac70f5ab26701b973710dd32edeec21116d1f3b7f90a4dae01d000ff1 glibc-langpack-ps-2.28-251.el8_10.4.aarch64.rpm 2e8ca8b1e4b2d90652ec0c65dd9d99c82972aec73f0e9b5df06b14a876d8b5dd glibc-langpack-pt-2.28-251.el8_10.4.aarch64.rpm 50f921d5f9c48beadaa796fab53f04aba11e7f832b35b77957e06024398c8f7f glibc-langpack-quz-2.28-251.el8_10.4.aarch64.rpm 006395203f8a848f558d88477e07ae0b0347954b5e4ef67ccf762688d31f7008 glibc-langpack-raj-2.28-251.el8_10.4.aarch64.rpm cda26b1b22a53133887226781d986ce612169f0e8989e6f4b391b32147ccc2df glibc-langpack-ro-2.28-251.el8_10.4.aarch64.rpm 20cb3ee07443758e2cf2b301a3ddf9f0cdd983131b361d2bad347d64a7b7522e glibc-langpack-ru-2.28-251.el8_10.4.aarch64.rpm 4ceb95af95870c1ed4526f0698cf72670e62eaf0808ae5f3679f92ccefa0682c glibc-langpack-rw-2.28-251.el8_10.4.aarch64.rpm d4e02cf4f49e6c09070588dc99e459e79ff220bfcc91848fd168560872d0e8fa glibc-langpack-sa-2.28-251.el8_10.4.aarch64.rpm 86be03f004438d00bdfe4740d2c779c5cd6f82f7ceaca8aea0ac3f82ed40fa54 glibc-langpack-sah-2.28-251.el8_10.4.aarch64.rpm 6b04bb91d7124d7305890d1547e9ab074b3a41c0f12a183c2de1eebfab14dd46 glibc-langpack-sat-2.28-251.el8_10.4.aarch64.rpm 4685f7cd8a6122359a72430dad5b50e94076c1eccbc40c09b40cfae3292c2d5c glibc-langpack-sc-2.28-251.el8_10.4.aarch64.rpm 924469eec5705b98d9561c24650aa72efd4380a39d8e234d459f36fafb3df2fa glibc-langpack-sd-2.28-251.el8_10.4.aarch64.rpm c4945d2c91f8b313b9fdd94c9cd8feca5e1d5025824fa3bdc2b1fc12330290ea glibc-langpack-se-2.28-251.el8_10.4.aarch64.rpm 37957cd85ae4c93e8270b9f4c77d07d809d94be050102619b6f58bebe85c090f glibc-langpack-sgs-2.28-251.el8_10.4.aarch64.rpm bee80560d3de5a8383352205566ed213af5b3071a18849fac964d66be88bf265 glibc-langpack-shn-2.28-251.el8_10.4.aarch64.rpm 6a29f63e196fd6a6c72dc25498cacbc1c7b0da67f4464d53b6f712344440eedb glibc-langpack-shs-2.28-251.el8_10.4.aarch64.rpm 740e5bcee203c8ca20431fe5f77c7217350bedd62bd8235d37b2865c9e4e732e glibc-langpack-si-2.28-251.el8_10.4.aarch64.rpm 2a4471a4ef0c60100791c2e1d7fb3ef828cf355f91b5152a206cf99319301c81 glibc-langpack-sid-2.28-251.el8_10.4.aarch64.rpm 3ae4f007c5a5265b9dc215903b9e80774fa8ec50f2b4d1454257d91cc94a5398 glibc-langpack-sk-2.28-251.el8_10.4.aarch64.rpm 87ffe74e20a71b5491ab775af51ecd4200d30867dcb109562d7aedd8e8cc7dff glibc-langpack-sl-2.28-251.el8_10.4.aarch64.rpm e3785542ed2b3afa2bac12627b6b701681318d533ceefc51e7bb58c22c1eece2 glibc-langpack-sm-2.28-251.el8_10.4.aarch64.rpm 89262ea8ba135e944701ff8289bb880fa2947bfa733cca73536b8aa2d7eb5dbf glibc-langpack-so-2.28-251.el8_10.4.aarch64.rpm 0a575f3f805b81761ff4667db48b098c9d8ed046dfe02dddd035401fea3b51da glibc-langpack-sq-2.28-251.el8_10.4.aarch64.rpm da4611275e3000d7f72c576f23d9e621d63de525c4a8d4028c9073cc442ea7b3 glibc-langpack-sr-2.28-251.el8_10.4.aarch64.rpm 6fd0fafd2e66dbad652aa50c9027573b6693d6919b8e8235b5fbcf3bc0e39719 glibc-langpack-ss-2.28-251.el8_10.4.aarch64.rpm 366a102d3338200133abbe374d93707b4fa665faab7ed5c3e167a2a7805421de glibc-langpack-st-2.28-251.el8_10.4.aarch64.rpm 5a522b48849540e1dc833f9cbbfcc019dda3b53c5bf570c0f07eab77eeb37b49 glibc-langpack-sv-2.28-251.el8_10.4.aarch64.rpm f7d5c12250e75db7554c03a3f139eb250694663f23c578d7f335393b69df0fd4 glibc-langpack-sw-2.28-251.el8_10.4.aarch64.rpm 7aae28945fc8d8bbd304cc3c3c20091bc6913b9bd5fcdda386cf83e845ba4b7b glibc-langpack-szl-2.28-251.el8_10.4.aarch64.rpm 4002207d33be41bbe3fa8220369b3a1d3e94a4fb886da798836ba5823b531855 glibc-langpack-ta-2.28-251.el8_10.4.aarch64.rpm 59f43ee25562b0dd5500cbee5a2de6821613be49bc5b0e2ed664e00ce11a2d64 glibc-langpack-tcy-2.28-251.el8_10.4.aarch64.rpm 376caecddc12496f7c842192e6109be7565cf3941c2494d97a2e70dbc15599b1 glibc-langpack-te-2.28-251.el8_10.4.aarch64.rpm f4065218a8d9fb43ded759491f06cea05484296b3a453787a1b4565a1932afcc glibc-langpack-tg-2.28-251.el8_10.4.aarch64.rpm 9ca3e39df34ea36829e1b4d48e51fff341be2d5b6c809bdff0c985b0f351c1db glibc-langpack-th-2.28-251.el8_10.4.aarch64.rpm 8caa73d076483979e66789ac81b6b6cca525d9b3d3436fe77936fdbbd48bf848 glibc-langpack-the-2.28-251.el8_10.4.aarch64.rpm 6ac7171ab514a6855c5968770af0e9067b54005e338a1d475a0c56f61ad6b1d4 glibc-langpack-ti-2.28-251.el8_10.4.aarch64.rpm 0996b0d38811f19d8f1e7d77c3fec58db65a02a6dc4ad2b4d77891169edc3cd9 glibc-langpack-tig-2.28-251.el8_10.4.aarch64.rpm 1aecebb3e8c9fcd4acf0c038d28ae643830a32b9c9d1535a475f989cc2207429 glibc-langpack-tk-2.28-251.el8_10.4.aarch64.rpm f9742b531f47f8350ada3b686c4da02bc0c0a1c972848ca5c1a3b3a02d234ba2 glibc-langpack-tl-2.28-251.el8_10.4.aarch64.rpm 04ecc5a76489a1b8d867561fe5d828b2c711ada20b62f3888491c4589d531eea glibc-langpack-tn-2.28-251.el8_10.4.aarch64.rpm be48f3748b1b609386d2fa342a36803319ca39312aa6482cb6c204d8c026fcbe glibc-langpack-to-2.28-251.el8_10.4.aarch64.rpm 4b64f4c6aadafab5c10767e6899a595b2e3df441d3cb01c7127508cd249de310 glibc-langpack-tpi-2.28-251.el8_10.4.aarch64.rpm e3fe89627fa292e2809e006eb61772813c3c5f62af6299442d85ee062ba1b6fb glibc-langpack-tr-2.28-251.el8_10.4.aarch64.rpm 2848fd3e8c4ea55b2f561ba1af122bbf8b186258154fb1b009c10ecf303a4131 glibc-langpack-ts-2.28-251.el8_10.4.aarch64.rpm 5de71c4fb7c15889bfee7916eb6dd0b72b14118bd1c9b91ac9ce2002905c3fa1 glibc-langpack-tt-2.28-251.el8_10.4.aarch64.rpm e92686645638f397321dc4e32d993801f51f64593e7f0fc865ae2895e3ec46e4 glibc-langpack-ug-2.28-251.el8_10.4.aarch64.rpm 499c23126ea02fa0b0609d0842be99cefd314e02c99dd95b3a9d641d3d27f87f glibc-langpack-uk-2.28-251.el8_10.4.aarch64.rpm 51f840d2429c8872f8ac678cc3da2b27e06fac34b15916d7b8e4c401d92b5dec glibc-langpack-unm-2.28-251.el8_10.4.aarch64.rpm e48142413cc4a457110c32da4bd84929aff48e717e4fdf71074281f1a8fbd51a glibc-langpack-ur-2.28-251.el8_10.4.aarch64.rpm a872bfac7572719514427567cc602967eaf3bdf5ba7955214055866e2b53206e glibc-langpack-uz-2.28-251.el8_10.4.aarch64.rpm eb8a67eb56719504bad6c44cfc0da3829a4add3c884c2e2293d79f74268402a9 glibc-langpack-ve-2.28-251.el8_10.4.aarch64.rpm 621966c085734da1f95b274f0ecd68a89fa3fc7b0e46624e5d63a605aaaa2e3c glibc-langpack-vi-2.28-251.el8_10.4.aarch64.rpm 2ef02e0c44fa9b391951215119b4f7c1a9834ca0c53293897151ca849c239827 glibc-langpack-wa-2.28-251.el8_10.4.aarch64.rpm 1a097d92682e6e5a092fa79f782dfbd576e17ca30a6630285ba4775be8a4caa0 glibc-langpack-wae-2.28-251.el8_10.4.aarch64.rpm 7a8f9d08670c375662acda0b2154f8b90d5ce8a3fe37003a35ab09bff5cdbc88 glibc-langpack-wal-2.28-251.el8_10.4.aarch64.rpm 53ce1e6864be66f7799373de2e0e858dc7a5c988cd136cbd9a62593cafb389f0 glibc-langpack-wo-2.28-251.el8_10.4.aarch64.rpm 9deb8a2637ab8352d14a1accb1e93f34d40a70f17f4a6b2757c930caf6da40c6 glibc-langpack-xh-2.28-251.el8_10.4.aarch64.rpm 18431dd912d1e4964a52514f0f1b7cd62dd7983b643981fd86615a027651cea9 glibc-langpack-yi-2.28-251.el8_10.4.aarch64.rpm 25a841975db074f1c83123adf51903a1d508efa36299ae3f6370b4172e0c466c glibc-langpack-yo-2.28-251.el8_10.4.aarch64.rpm d4196e316e7499f17a449589d3fd0b287ab1292c0f5f7039b0ad6b35e34afb06 glibc-langpack-yue-2.28-251.el8_10.4.aarch64.rpm e8537d58b09b940a43d60014355be95b7939b817da9f38804cbc2c37e61aefbd glibc-langpack-yuw-2.28-251.el8_10.4.aarch64.rpm 58621f6ba8c27f20511f80157445ab077fd634f4c8fa13c4255cf396a4787db3 glibc-langpack-zh-2.28-251.el8_10.4.aarch64.rpm 3ce51ae4f37552675ea477f7ea0a308cc4455f476f2eb74dd03bcb683223d80f glibc-langpack-zu-2.28-251.el8_10.4.aarch64.rpm 856d997021ff6cc73a6c7d70870805a222b457f47a0abd9b51fe3eebe5b495ec glibc-locale-source-2.28-251.el8_10.4.aarch64.rpm 5a9a8f943505203309f868181315212951581e841b6732d62fed5ffde6780dc7 glibc-minimal-langpack-2.28-251.el8_10.4.aarch64.rpm 392d84dc8751a924072029fdf498afcbdf01767e3a054e9678e6f9aa05104e34 libnsl-2.28-251.el8_10.4.aarch64.rpm cd6383b95bb37ca6469b388beafcda3453ba1fb7ca6ee8a62bc66ca59c788117 nscd-2.28-251.el8_10.4.aarch64.rpm 2280d86d1708477c1e75320aa4aeb1b08613492e1ef2cfa61435f951e54fa076 nss_db-2.28-251.el8_10.4.aarch64.rpm c09d0f58c9155e4d96c278a610fbc803381eabde2cf27ea1da6b49f1d5f6160c RLBA-2024:6978 samba bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for samba. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information. Bug Fix(es): * idmap_ad creates an incorrect local krb5.conf in case of trusted domain lookups [rhel-8.10.z] (JIRA:Rocky Linux-45842) none-baseos-rpms ctdb-4.19.4-5.el8_10.aarch64.rpm 52165ef04fa25ac48e47886ddd14f43d36d93781dc0472785f77eab6a8938651 libnetapi-4.19.4-5.el8_10.aarch64.rpm 01a41b1a84bb58dbde813f2d6c47d6816884e2940ad1555e8463033d95bcb741 libsmbclient-4.19.4-5.el8_10.aarch64.rpm 2e9dd0ec57dfa809d888807c6777fd63ee60f4ed1fc6e63baedc3030407974e7 libwbclient-4.19.4-5.el8_10.aarch64.rpm fd2c9f62bb2aee1016e6f183a0a69370b7a58c98cba3318cd843ebefaf71b62b python3-samba-4.19.4-5.el8_10.aarch64.rpm bdaf147f15ffe054377b26d8288c96cb0bf3f1ee1722dc248e9e909d1e2de53b python3-samba-dc-4.19.4-5.el8_10.aarch64.rpm c1c87222d30675e0a89911ce177347f48fa091b5cf68068aa52e9db9c03c09df python3-samba-test-4.19.4-5.el8_10.aarch64.rpm b5b3747eda5ea32f7ae29a0418e127381fd0965964ba02200ef86e9af7114667 samba-4.19.4-5.el8_10.aarch64.rpm e2155692b20932b58190de8547103c0a97b5cbf33682358402fd31027563d9ad samba-client-4.19.4-5.el8_10.aarch64.rpm fa5d43bda5e5e54d22192f6252d5164ea2df4e450ffe04fb5c2580ef347dcfda samba-client-libs-4.19.4-5.el8_10.aarch64.rpm 5a89b32d7253a7c198fd47444fdce4fd03732ce78f9bab4402de5e4bf959f0af samba-common-4.19.4-5.el8_10.noarch.rpm 39346c6fc4aeba3aede20d6352de6c17d98f6025659042fef4d15d3e0163bfae samba-common-4.19.4-5.el8_10.noarch.rpm 39346c6fc4aeba3aede20d6352de6c17d98f6025659042fef4d15d3e0163bfae samba-common-libs-4.19.4-5.el8_10.aarch64.rpm 921c34660040500f524befc2427cb6fb51fe439ffb416f5212ceb1cc0bb9d4af samba-common-tools-4.19.4-5.el8_10.aarch64.rpm 43bc7947de97d9cc0d588ca840b3f2a4375bcc6505a0797917fc2b502694c0b0 samba-dcerpc-4.19.4-5.el8_10.aarch64.rpm b4df3ec63a8575eac2efe1614f8f25be4f08241dd7a3ad89e45e1fc2276d519c samba-dc-libs-4.19.4-5.el8_10.aarch64.rpm 866d713daffb79a1b77c00d5c10cc6709f8653a3407c751adc429bcb535f6e27 samba-krb5-printing-4.19.4-5.el8_10.aarch64.rpm 556f90d19cd6723ca55438e54f3dd961deb2f871a7a638c4eb8107e8418760a7 samba-ldb-ldap-modules-4.19.4-5.el8_10.aarch64.rpm 4fa5fef5ce065e4e5b8e95818bfe92724f80daac8287c68b9428d230081fb1fd samba-libs-4.19.4-5.el8_10.aarch64.rpm eaa82b3739902d396cec8b048c343aaf0be53ba0ea2ec6f463199a03b7535a72 samba-pidl-4.19.4-5.el8_10.noarch.rpm 2f3c646ad48300e2d89cdd2131a387eef9eaf5b845cab13548de1e41875f2c41 samba-pidl-4.19.4-5.el8_10.noarch.rpm 2f3c646ad48300e2d89cdd2131a387eef9eaf5b845cab13548de1e41875f2c41 samba-test-4.19.4-5.el8_10.aarch64.rpm b4794841a49a7930ad8ec8a99371e3c9689dbba9fb78083d4fcf816ece7bd286 samba-test-libs-4.19.4-5.el8_10.aarch64.rpm 862f4fc2dd8a4f7c62f3a8205f1255ecb8b0c3210abf60bd1fc2266d09fa7c97 samba-tools-4.19.4-5.el8_10.aarch64.rpm 0bcbece111580c6144843004250da096cae62ca70d7db557466ee11facc29026 samba-usershares-4.19.4-5.el8_10.aarch64.rpm ce7d9d7c189ebb979d18bd5a925b4a03d3095163fd4063039751b02d922036f6 samba-winbind-4.19.4-5.el8_10.aarch64.rpm 08ba2a6c61c3fc7121a5b48796f4a16d4ff2ce867731f12e27b0f405521466ed samba-winbind-clients-4.19.4-5.el8_10.aarch64.rpm a7ba3ffb727a642368781435a3913ee3f62be99bac17a8a16b16c0eedbe8690c samba-winbind-krb5-locator-4.19.4-5.el8_10.aarch64.rpm 476a680f2a1d94b6ddbad10722c792116fa7c3e5623f80d3ae53791130140de2 samba-winbind-modules-4.19.4-5.el8_10.aarch64.rpm 9b33241ce101c23369daa1decd1a1f2285902587ef417e74e75456e2c09e9fec RLBA-2024:6984 firewalld bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. Bug Fix(es) and Enhancement(s): * avoid iptables flush if using nftables backend [rhel-8.10.z] (JIRA:Rocky Linux-47595) none-baseos-rpms firewalld-0.9.11-9.el8_10.noarch.rpm f99c077b8db11ee113421265c119737192fdcf6f9d0ba66616b3d5bc9c903986 firewalld-0.9.11-9.el8_10.noarch.rpm f99c077b8db11ee113421265c119737192fdcf6f9d0ba66616b3d5bc9c903986 firewalld-filesystem-0.9.11-9.el8_10.noarch.rpm 3d96ababef2d8d9295f10545f7630cee1ab2437cc3bfa21c81a88d8996259bac firewalld-filesystem-0.9.11-9.el8_10.noarch.rpm 3d96ababef2d8d9295f10545f7630cee1ab2437cc3bfa21c81a88d8996259bac python3-firewall-0.9.11-9.el8_10.noarch.rpm 93942d0851600d2a4f41eb6849090c411f93a8dd6a5b58bfa1301a7fc576c74d python3-firewall-0.9.11-9.el8_10.noarch.rpm 93942d0851600d2a4f41eb6849090c411f93a8dd6a5b58bfa1301a7fc576c74d RLBA-2024:6985 avahi bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for avahi. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Avahi is an implementation of the DNS Service Discovery and Multicast DNS specifications for Zero Configuration Networking. It facilitates service discovery on a local network. Avahi and Avahi-aware applications allow you to plug your computer into a network and, with no configuration, view other people to chat with, view printers to print with, and find shared files on other computers. Bug Fix(es): * Rocky Linux 8: avahi-daemon memory leaks (JIRA:Rocky Linux-43458) * avahi package has incorrect owner:group defined in payload for /var/run/avahi-daemon (JIRA:Rocky Linux-5631) none-baseos-rpms avahi-0.7-27.el8_10.1.aarch64.rpm f6bbe6711958203954e83d2675e38647b29f79f3598e61d0c9002e4b0dc8524b avahi-autoipd-0.7-27.el8_10.1.aarch64.rpm e1b0bdb29be91f0ad6b9bb9276b8a6881284e65e391f2da2a4e9612ad3fe5962 avahi-glib-0.7-27.el8_10.1.aarch64.rpm 361a27cdc740266136e669b0a5cb6e08b42447dedb715500312033e9d26537e8 avahi-gobject-0.7-27.el8_10.1.aarch64.rpm 2a3ef241a6129f89b83f33d373bc92ca0d2aedc71bd17887c5868afa4cbb011f avahi-libs-0.7-27.el8_10.1.aarch64.rpm bbe19406e78b900ef1243febbe82683d55de89db574adf8c22bd59faf21255af python3-avahi-0.7-27.el8_10.1.aarch64.rpm 2de290724f37599d7957284f799b6a3db782c26e932be32c6dae71deedff8d07 RLSA-2024:6987 Moderate: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Gnus treats inline MIME contents as trusted (CVE-2024-30203) * emacs: Org mode considers contents of remote files to be trusted (CVE-2024-30205) * emacs: org-link-expand-abbrev: Do not evaluate arbitrary unsafe Elisp code (CVE-2024-39331) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms emacs-filesystem-26.1-12.el8_10.noarch.rpm f839be43ed7822fc0f831750105d996ac1f42179f45607cefcc9810bbaaa344d emacs-filesystem-26.1-12.el8_10.noarch.rpm f839be43ed7822fc0f831750105d996ac1f42179f45607cefcc9810bbaaa344d RLBA-2024:6988 glibc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es): * glibc: Previously used TLS sometimes incorrectly reverted to initial state after dlopen [rhel-8.10] (JIRA:Rocky Linux-36147) none-baseos-rpms glibc-2.28-251.el8_10.5.aarch64.rpm 909f3761e8a5b81ca95885bf2e786586e284bd8b5494df1d837273e7f632cbef glibc-all-langpacks-2.28-251.el8_10.5.aarch64.rpm 300b8997fdacb26d2fc37c97638416c2b0eef42a0c1a4c9129b2f09a5aa0952a glibc-common-2.28-251.el8_10.5.aarch64.rpm 2e4c3290071a97b8588eedd04f0d7845db23d84221060d305e2e5eb1dc8ca1f9 glibc-devel-2.28-251.el8_10.5.aarch64.rpm 12ad6344e42f58021de10e0cbb3eed26ea92ee8f74e6482a9c2954dcca7b9ac4 glibc-doc-2.28-251.el8_10.5.noarch.rpm f41cc8b11191d7eec03d7f84dc8dfcbce6de66745f56373f989ce38988d38ad8 glibc-doc-2.28-251.el8_10.5.noarch.rpm f41cc8b11191d7eec03d7f84dc8dfcbce6de66745f56373f989ce38988d38ad8 glibc-gconv-extra-2.28-251.el8_10.5.aarch64.rpm bfdb2c744e55aabe97f72ff9aa9f7b13ddb4081c5eb8f922d87d880f34a03466 glibc-headers-2.28-251.el8_10.5.aarch64.rpm 1dba310baf8f8564032b1c36e17bad45f2ebabc2b3b867ecb94d0685a047999a glibc-langpack-aa-2.28-251.el8_10.5.aarch64.rpm 6b5c3960d6c45d6bbeb737e6483b8420a7ab4c3caa944a8305bf3fc0efdb1dea glibc-langpack-af-2.28-251.el8_10.5.aarch64.rpm 75a818524145765d565679ddfde66296f08c7744a987a1917f6bc2e8cbc1d201 glibc-langpack-agr-2.28-251.el8_10.5.aarch64.rpm 7638f8d14adf888c13b6556671d9334c94a06a182e493992b8496b6ece5db6f5 glibc-langpack-ak-2.28-251.el8_10.5.aarch64.rpm 7ff2c949cfbe73a6b19278d6f5bf0dddc2225125b302c627c9d79436817e06e0 glibc-langpack-am-2.28-251.el8_10.5.aarch64.rpm fe12bdc154222bd6e6b60adb704dacc8011a289fe1a0502f48121322796e6d87 glibc-langpack-an-2.28-251.el8_10.5.aarch64.rpm d4c04b7e9d0302fbec9291575c92a3fd8bffc7f5479c5883e16a19983f3224a1 glibc-langpack-anp-2.28-251.el8_10.5.aarch64.rpm 2fda8f502c172b6c03f08ce63ebb21a36faa8f50ef5d3eb81255316b5bb1188e glibc-langpack-ar-2.28-251.el8_10.5.aarch64.rpm 1ac80f08af64522e2c2f93c5d7c87e6cd294d344432481894b9f86f804fc25d0 glibc-langpack-as-2.28-251.el8_10.5.aarch64.rpm a089f47a7b518376860f1897097cdf673de9779a0ca2a11f19eafcb67a62a8d3 glibc-langpack-ast-2.28-251.el8_10.5.aarch64.rpm 62d587e607b725c988cfbc7f297ff7ad6744ec5feb7bd6b52411d1a2031dcfc4 glibc-langpack-ayc-2.28-251.el8_10.5.aarch64.rpm 810c324e5f717b1b670fc087fbe4b5013265f1d5f76ab7615df774c300d94dea glibc-langpack-az-2.28-251.el8_10.5.aarch64.rpm 6e5f470868712786e249b0bc1b3a4d3b5bb0883eabf34a0e33a2bdd3f68043ea glibc-langpack-be-2.28-251.el8_10.5.aarch64.rpm e51d7d2c9e31631bc97eae0cb0afc12932bc907291609802fcd5b6939bb63d46 glibc-langpack-bem-2.28-251.el8_10.5.aarch64.rpm 78b444d15a10d42a4808b07f258f067413dfb5267f6ac3f03144e872cdc9b571 glibc-langpack-ber-2.28-251.el8_10.5.aarch64.rpm 2a43d0677645dc37a46db73a9ac4753d2791f0214594b0facb05cbee2c05c324 glibc-langpack-bg-2.28-251.el8_10.5.aarch64.rpm 3bf9994c91bcddd3056b01e35c713f6c79030b65fb607376375cbc08f21437e8 glibc-langpack-bhb-2.28-251.el8_10.5.aarch64.rpm f48698ec28cdf8f2cc7d70a4cd1e3bb54eb12e2fbd724b55310756fb56f5ed33 glibc-langpack-bho-2.28-251.el8_10.5.aarch64.rpm f88ba07fe2e7951d420b3235dbc33c48ebcc677577351bc075ec0162935e7806 glibc-langpack-bi-2.28-251.el8_10.5.aarch64.rpm 94c428e16766991eafd37516ee8fe0ae210856a1489b9a457c1cd411efb23129 glibc-langpack-bn-2.28-251.el8_10.5.aarch64.rpm 77638104e7c3aca26a76cb44f840a365549da0be1323ca745084f225067344fa glibc-langpack-bo-2.28-251.el8_10.5.aarch64.rpm 31e37f37accb3f30bcc49637199bea22a0fd43559c37520578d855b7eae984ec glibc-langpack-br-2.28-251.el8_10.5.aarch64.rpm 3bfa301676d2d70b4a252d4bc0c7810d5bb89a420533fd485b8ccd7526a470e4 glibc-langpack-brx-2.28-251.el8_10.5.aarch64.rpm bb216e46c96565c1bb3c2b0110fe12409316e0b3fd6c8766b6dbfd39199b42ed glibc-langpack-bs-2.28-251.el8_10.5.aarch64.rpm 928cb9937b4a7af5cdf189ece536af54452c7869a648aa03df287368be63702a glibc-langpack-byn-2.28-251.el8_10.5.aarch64.rpm 77c3644a016d8caa765a4d0d254386fe1febffb496db61c5e02df55629c947a7 glibc-langpack-ca-2.28-251.el8_10.5.aarch64.rpm 10395163a3a21f0ffd5579529afa7211336d6d8a19d15511a6e9fae0fa6647ca glibc-langpack-ce-2.28-251.el8_10.5.aarch64.rpm d9f028e7732c21041dfb879b5e63b1a5c4ec23579ec9995f837bf2a7cc6baf18 glibc-langpack-chr-2.28-251.el8_10.5.aarch64.rpm a64863fcd5ec64676614009c3edd6a604137fa70f373bdfe02bd52a910e76a53 glibc-langpack-cmn-2.28-251.el8_10.5.aarch64.rpm 1a85940d67708101c0ea650446c525e6dcd6e19e2a394c76211213326d8995d1 glibc-langpack-crh-2.28-251.el8_10.5.aarch64.rpm 6a3195d1ffa6dcc2ad525e87e2715e6b5a46e580efc5c038ab8b42c980657d63 glibc-langpack-cs-2.28-251.el8_10.5.aarch64.rpm cc76106de64f16d1044792ba316b09d0829eec894e9d56d03596b26219d31ffc glibc-langpack-csb-2.28-251.el8_10.5.aarch64.rpm 48f00e4b0d58900541731b606aee0b411ea8b94015046b19edb1c269bf25e651 glibc-langpack-cv-2.28-251.el8_10.5.aarch64.rpm 86d9a39d612aa9c96bf448c366ac1b2bc407868e2b6cb9eac8d6831875d1ae12 glibc-langpack-cy-2.28-251.el8_10.5.aarch64.rpm 37c17363b0a39ba47a8125694785673e6b28b9fb081e674b7eed47ae4f1a02c4 glibc-langpack-da-2.28-251.el8_10.5.aarch64.rpm 241964e4b4a7412aa6986389c808ed7f638d2f8cd8e662d6f9a2d65a6fe94ba7 glibc-langpack-de-2.28-251.el8_10.5.aarch64.rpm b31985be173f978bd9a16de0d7dfe293709c64487887ec07a2246d186bc8167e glibc-langpack-doi-2.28-251.el8_10.5.aarch64.rpm 49fa7b687d3eb96b36d4664b163ea733812da5bba1231ce0f07dbed36420729e glibc-langpack-dsb-2.28-251.el8_10.5.aarch64.rpm 0a38b40ff3316609728848620ee7ba40455c81d9c667ab9845c3a9b496e29adc glibc-langpack-dv-2.28-251.el8_10.5.aarch64.rpm 49994d4bdeb839fe38b150944345631c08ce07feb7d68a30c063ae6f8a9f818a glibc-langpack-dz-2.28-251.el8_10.5.aarch64.rpm 7ef46fed4ae8455337defc92b786747b6d369a9373d77ea7b2f713ae88d2bf96 glibc-langpack-el-2.28-251.el8_10.5.aarch64.rpm 1885433bd42ec9dbd18327c51a3dcb08b8bad9e112409693e17dfc843bc8f1da glibc-langpack-en-2.28-251.el8_10.5.aarch64.rpm 5eb0ddf7764e65dbd857e4b2d517259853d99c46fe9541b588e224a7bd6839cc glibc-langpack-eo-2.28-251.el8_10.5.aarch64.rpm 3bde0e8ecf96cc746f47b8afac73c4818723a138ee5db6d85ae4f89d3e551931 glibc-langpack-es-2.28-251.el8_10.5.aarch64.rpm 39cecf378b276c8667222d2b8fc5014a6310022fe2cd96871d3e1aaa480fea19 glibc-langpack-et-2.28-251.el8_10.5.aarch64.rpm 6020e9de6e1823476f2f78de5c2980d55cac871d87f6581d334facbc05ebbc7e glibc-langpack-eu-2.28-251.el8_10.5.aarch64.rpm b35476d8e5f9e24bdc72f25da65fe60ad8d5a17412c289042972813346793ac3 glibc-langpack-fa-2.28-251.el8_10.5.aarch64.rpm cf6d17f6eedb45d52b5611d735a5774257bef045157a085b92fa2de80cee447e glibc-langpack-ff-2.28-251.el8_10.5.aarch64.rpm 6b07b86b263164ed7762a8defecebf9d88df0a52bcf4a73453f0d70bb212a405 glibc-langpack-fi-2.28-251.el8_10.5.aarch64.rpm c8fdcf1b7837264e78b3609b7ae31113755bd2b9761df7188e9b2544ea73f4f4 glibc-langpack-fil-2.28-251.el8_10.5.aarch64.rpm e459584a0f515bb8e1765c40746e84b8d90bee8dea6cf142d36dbf64d5673f29 glibc-langpack-fo-2.28-251.el8_10.5.aarch64.rpm 7e235d42f51f29d270f1ced676dc74260518215d5734218a77fa4d6323883e06 glibc-langpack-fr-2.28-251.el8_10.5.aarch64.rpm fd89b2da91841c35d267d69badaffe5eec645f5c298ec8d85adb6bcaa8dfa025 glibc-langpack-fur-2.28-251.el8_10.5.aarch64.rpm 960e504756b15d1bf5791de2513ff3112cc9746673728ffa55403adacb1b81e1 glibc-langpack-fy-2.28-251.el8_10.5.aarch64.rpm d101d007296b7fb2f0e2bfb3ae9564dee8781bb3b7441e2e5aeb5b95600b6fbd glibc-langpack-ga-2.28-251.el8_10.5.aarch64.rpm 7068508006424a1a80382e45171258e0279a0074fd3e5ee369d6b3978babe939 glibc-langpack-gd-2.28-251.el8_10.5.aarch64.rpm 957bedba9c7cbe5050d813879ebf38e790d480993100309bd37350f12b5a741d glibc-langpack-gez-2.28-251.el8_10.5.aarch64.rpm 7002c12dab5d167a3696666da784b679c59060474627739c17e9dcea5b13f899 glibc-langpack-gl-2.28-251.el8_10.5.aarch64.rpm d646529f18856224d30e59ed1498ad611fada183830fdba215baf9f53d36bf32 glibc-langpack-gu-2.28-251.el8_10.5.aarch64.rpm 62876f8970da9e6cc94b0b1ad5ebf10017ef2ac9bbdc4d4dd1da484270867cb3 glibc-langpack-gv-2.28-251.el8_10.5.aarch64.rpm 753039b150f4a45dc99837a367afc0cd8b5fdf07c5f5911846c25e9d0914477b glibc-langpack-ha-2.28-251.el8_10.5.aarch64.rpm a86fc93347ea759bec2417ce16c712cc3b5fad2adb2e3d7c0811a2fe707c8097 glibc-langpack-hak-2.28-251.el8_10.5.aarch64.rpm f7b8dc832e9e8a41cbfda2d4ebcdfb0ed2ecbf058ff765ea1a1dc4a4bf1c59df glibc-langpack-he-2.28-251.el8_10.5.aarch64.rpm f69a4e591fb8b266a26951cbe64429a17907c37f583c0a5e3972c15927385c98 glibc-langpack-hi-2.28-251.el8_10.5.aarch64.rpm b624771b82c47e35ccee20d051289dd68d9735f38d1780c8ea061aab23b104d6 glibc-langpack-hif-2.28-251.el8_10.5.aarch64.rpm 789792e59ae51e49d77ade48ea9f8eb73a3aecd2d1a7091d7694115ae196f507 glibc-langpack-hne-2.28-251.el8_10.5.aarch64.rpm c2416066dec9b5ee4123c4e515c277a479cd475d8cd2b9402f741ac3ae02f7f6 glibc-langpack-hr-2.28-251.el8_10.5.aarch64.rpm 7baeb99d949d78f763e209c5ea6fde6eac38f739f646db54fc881ff8f611f447 glibc-langpack-hsb-2.28-251.el8_10.5.aarch64.rpm da2842eaad5679276f4e7ef5df4c7f686012136cb60d22a3c7784c8ebb800d51 glibc-langpack-ht-2.28-251.el8_10.5.aarch64.rpm 457de14a7ec0250cb84b277c8013a909c765024d6119e29c3f527652c186edbe glibc-langpack-hu-2.28-251.el8_10.5.aarch64.rpm f30d0560330776632b965c175b5a0eec32b0fe9e4dfed70de06d1ff86f98dc6d glibc-langpack-hy-2.28-251.el8_10.5.aarch64.rpm 52484699222db0892f3521206daca547c9f86ddd0227fde1b5f336f37438ec03 glibc-langpack-ia-2.28-251.el8_10.5.aarch64.rpm 0629e1c59b2edcc4ae54a43501ffbed2d22c76754424e31a67d663a3b26dd9ae glibc-langpack-id-2.28-251.el8_10.5.aarch64.rpm 8ae2097729a2b36cda3fb5a992e8d7d8aa7276ebd20764cf4509109a2d54ee85 glibc-langpack-ig-2.28-251.el8_10.5.aarch64.rpm d8f435a98904cd52a2726195e7feec66bcf6b4afca3362e14483c07bf25c8624 glibc-langpack-ik-2.28-251.el8_10.5.aarch64.rpm 0d0762d6dcd22335b2bf4889eca21bde0cc1fa5026f5ddf54874f63779622563 glibc-langpack-is-2.28-251.el8_10.5.aarch64.rpm 333824dc38e10e06824c6b4566f91463ecdd310dde097eab46d75a24ec3d7626 glibc-langpack-it-2.28-251.el8_10.5.aarch64.rpm 071c7cbb21444682795e79c5551db83779b5bb35f01fd7f66bed3d4da6553ff0 glibc-langpack-iu-2.28-251.el8_10.5.aarch64.rpm d0defed14881df4529ffc8c1456e36fce98db69147e794cba70c9959f0ba283b glibc-langpack-ja-2.28-251.el8_10.5.aarch64.rpm 0e784650c328502ac009b3edfc65f467668a5bc51a1fdd37f45c341897b67660 glibc-langpack-ka-2.28-251.el8_10.5.aarch64.rpm 5bc92b78f4d628dd266c8e6c9b320f9d6d92634006a4de844c71c6bc7067bad7 glibc-langpack-kab-2.28-251.el8_10.5.aarch64.rpm 1c437d8d387aaf06ba2f9a51febac52055a511af470823aaeaaff3cb638285d1 glibc-langpack-kk-2.28-251.el8_10.5.aarch64.rpm b6af98db9c8262a98ef581bb2ed8fb81899b648be478ae484c081848bed94615 glibc-langpack-kl-2.28-251.el8_10.5.aarch64.rpm 6f5b8f6f109316b19dbfbb9851a5eeacf57c47082c165ded7d0165b0d7ca7e73 glibc-langpack-km-2.28-251.el8_10.5.aarch64.rpm 6e5e97203667c5e6c78fd547760441c46137f5af5232c31c57c76d626ec0dfd8 glibc-langpack-kn-2.28-251.el8_10.5.aarch64.rpm 104066e4e3e72a6458d9c988fd98d3e22435fb37aa057308080b881c7badbcd8 glibc-langpack-ko-2.28-251.el8_10.5.aarch64.rpm fad8f8e6c9485148902359a1d4dc0130fd70d64335e3326a7e9687cd57c1c8cd glibc-langpack-kok-2.28-251.el8_10.5.aarch64.rpm 2550747a7aa344a0337ffc0286a1368e6cac1c601a4990d738dec25ba1b506fe glibc-langpack-ks-2.28-251.el8_10.5.aarch64.rpm a45accb38fe500dc9a162355b1b9a8f3ebe096e473d17cc51e9bf232752861d4 glibc-langpack-ku-2.28-251.el8_10.5.aarch64.rpm 042d57640a7da853d8b2ea826e6a839eba935926c440465489a424c8ce763715 glibc-langpack-kw-2.28-251.el8_10.5.aarch64.rpm e106b37e27c8f55f2edd9a8af6ec8d99c45addfbb6eab2988c19afef0483db89 glibc-langpack-ky-2.28-251.el8_10.5.aarch64.rpm 32036a5121c4ebf5433defc16c083c4a97c78ecb3d7f0d7175a9b4720e80a16f glibc-langpack-lb-2.28-251.el8_10.5.aarch64.rpm ff00fbe6f041314b018925af1bf4e9a3dfb5580bb17a19dd480224dbfc95d338 glibc-langpack-lg-2.28-251.el8_10.5.aarch64.rpm 9eeef364d91e8e5c8d449df5dea503c9067b87da25a245d083fcb08ba8a4da7d glibc-langpack-li-2.28-251.el8_10.5.aarch64.rpm d8d51691d4472dbacdda49f343ef50aebc66891100369f5f4cf6ffee69c917df glibc-langpack-lij-2.28-251.el8_10.5.aarch64.rpm 2984ec01f76420ae185f3547f5ed2deee8f3f91068810516663cd8d850eee389 glibc-langpack-ln-2.28-251.el8_10.5.aarch64.rpm 397f80f8b36117703a126a97580118eabf2d02dccff408e9e4e6697b9d25e64e glibc-langpack-lo-2.28-251.el8_10.5.aarch64.rpm 3bccebe4f7b01bce59d2fb8d36249dc7c438433a3bf2cf169a1fbb7b09dda0b2 glibc-langpack-lt-2.28-251.el8_10.5.aarch64.rpm 46b64bbbab3bfea17dcc0b2d66fe41d15546e4d5e66bd035f9e4b2629fde2c4b glibc-langpack-lv-2.28-251.el8_10.5.aarch64.rpm 769ac23f6d883f2ed76e02f5b008556e14b193ebe709b86069c31e0e594a1505 glibc-langpack-lzh-2.28-251.el8_10.5.aarch64.rpm 1f8292df82dde411aa835a13e4b071b102e23f103d065364c669f6527eeca7d0 glibc-langpack-mag-2.28-251.el8_10.5.aarch64.rpm 088baf6cf1b43db0e3c14b7a88cbab91cfd683777356dfe9df28b551963312ad glibc-langpack-mai-2.28-251.el8_10.5.aarch64.rpm 5f9a575116bf1959386bc6cef077e30361a569edc438d3350e3c0338875272ee glibc-langpack-mfe-2.28-251.el8_10.5.aarch64.rpm cabcc15b8c3c30951dd214c524b67c4400d205e1995434ca79a50261d646feed glibc-langpack-mg-2.28-251.el8_10.5.aarch64.rpm 21bfe28706e6256bf803da23b6fe6c7da95e9138fb5e2f77c83f64c48eb73578 glibc-langpack-mhr-2.28-251.el8_10.5.aarch64.rpm 4ba68cd1c05ff13c54ffb7684ece2b482808b6bd5dc8065e455660ea1d4c3267 glibc-langpack-mi-2.28-251.el8_10.5.aarch64.rpm 2af008f23458c52b0a8725e0b31eb43e60b7f2f64b363e290f65faab31f768cd glibc-langpack-miq-2.28-251.el8_10.5.aarch64.rpm 53c09dfdf5e0eb50c60a339475ce27d45a089f4634f06a8c0d056869d81d7a0e glibc-langpack-mjw-2.28-251.el8_10.5.aarch64.rpm f06c81471db52046ba40084c3eb2e32d2d3d8fc17c2dfe7160767558629921be glibc-langpack-mk-2.28-251.el8_10.5.aarch64.rpm 842a88bf661ee0a7e4aea4c52b7c1d8a7fe8937f25bae10c0ce2ed872d9d7845 glibc-langpack-ml-2.28-251.el8_10.5.aarch64.rpm 8a3159cf6ed2508a17e3a0cf7f47b0ed295853ae5987bdc3e7d70b0f558f1438 glibc-langpack-mn-2.28-251.el8_10.5.aarch64.rpm 3dda22c4f745dce3d6b3f021994ce6c459c5a3f360a16141b18ef31229df750e glibc-langpack-mni-2.28-251.el8_10.5.aarch64.rpm f96f63687704de47db99d2161c38f81c71ab3fd55e3f0b44ae8965ea118b7e34 glibc-langpack-mr-2.28-251.el8_10.5.aarch64.rpm 8ebddfe53b182abbf67b1f5989c6f580de420b8b0aa9ba94f834e5f6de171f3f glibc-langpack-ms-2.28-251.el8_10.5.aarch64.rpm 58964d12bdc5a3386069f7a85bea6eeffedf7c9f4bd0cee7b683bdae935e1773 glibc-langpack-mt-2.28-251.el8_10.5.aarch64.rpm 58b3fe226a333ca6ae2a11a2604056177fba3da97b0b41ca16ea2a7067c7ac4b glibc-langpack-my-2.28-251.el8_10.5.aarch64.rpm 0edad9312c2857cde048937532e00306c2d3ef67c957108bac1e086502bafaf1 glibc-langpack-nan-2.28-251.el8_10.5.aarch64.rpm ba7c4be518dbb358005bd3dc6a1216e54787876e074ac873d3d3ac751373b663 glibc-langpack-nb-2.28-251.el8_10.5.aarch64.rpm cf89b1ae28df4c7b09e364776eafc64664e8bd9e2f6d9406d0d78dc5b452f080 glibc-langpack-nds-2.28-251.el8_10.5.aarch64.rpm 62a1014ebc486b698fc2d1144490bcf29e14b5f3ea452a189937f3d4b81ca021 glibc-langpack-ne-2.28-251.el8_10.5.aarch64.rpm 5ea2dc6630310508ac2f697d050c4501d80bd6075106c4c58474fc78dec1b70e glibc-langpack-nhn-2.28-251.el8_10.5.aarch64.rpm f836187238fa7c1cd4e5d5ef558c8c6974d9ce920a3828d5eeacb9967027489b glibc-langpack-niu-2.28-251.el8_10.5.aarch64.rpm 1b81654f40acb3c704ae43b9040eb5a9ffcadb3dc8e06badccdfc4c8a119aaf7 glibc-langpack-nl-2.28-251.el8_10.5.aarch64.rpm a2c598bbf8230211dc9c3f1247086e70f4d2655d9ba2a04eaff1e180dcc486dd glibc-langpack-nn-2.28-251.el8_10.5.aarch64.rpm 1d309afb5acea170f28f6556e16331c6c0e7e9e4b9b89157e3a229df16ad14be glibc-langpack-nr-2.28-251.el8_10.5.aarch64.rpm 6f77289253aafa6266f64b2d44ecbd5020390685063a9d732c531871d5ef3c47 glibc-langpack-nso-2.28-251.el8_10.5.aarch64.rpm 716e24b6db2c54287eb54970ee52860dbc046d5930f72db55fba1ab694a0902d glibc-langpack-oc-2.28-251.el8_10.5.aarch64.rpm bac06c8a5a74c0d1b64d00bb6aae9063b4b2a40e28ccab5dabc06b198c6fde0d glibc-langpack-om-2.28-251.el8_10.5.aarch64.rpm ec3afe7a7cf1b47995f931133671127e824a14c7c4ca276c4e5332c4e6088e39 glibc-langpack-or-2.28-251.el8_10.5.aarch64.rpm 6fff555c17327565ad3d3b91185b303bb7b549e9b92acf3e1aaf9ca6ea063035 glibc-langpack-os-2.28-251.el8_10.5.aarch64.rpm f9724eb9bb63b2ccbb634acedfbfd4794444a1be9d8aa3739df18be26808395e glibc-langpack-pa-2.28-251.el8_10.5.aarch64.rpm 840ce87cd4970605c7afb7be37a5eae05624cefb8716dfcdfc40a4b9197a47d1 glibc-langpack-pap-2.28-251.el8_10.5.aarch64.rpm d3ae61ba5cafc0c20bc338ae4cb24ada65e2c5b0a3c70072ecb8f7f41bbcebd6 glibc-langpack-pl-2.28-251.el8_10.5.aarch64.rpm 7625aa928353ef1e8dc4f48b81c32681231c464427fc8a1fb41abcde772ca5b2 glibc-langpack-ps-2.28-251.el8_10.5.aarch64.rpm dcbb07af6fa3fecb11e6831e836036dda04e041c07fc02567f9b454cf84e9762 glibc-langpack-pt-2.28-251.el8_10.5.aarch64.rpm 888399ff5683d9d89161cf4dff044fd0e67859cf9557586516b496a9e5c0ef1e glibc-langpack-quz-2.28-251.el8_10.5.aarch64.rpm a97dd30b617e6b937feaf18e5547bbafcb2b4388646740f184d262cfd5812e60 glibc-langpack-raj-2.28-251.el8_10.5.aarch64.rpm 9a98e355f1f3dbde13ce0a61c4b76c98e5a36a1c6780be038c50dd9e4c076920 glibc-langpack-ro-2.28-251.el8_10.5.aarch64.rpm a118206f0ee6b0b695242a87493382277e7d5cfe52d7fd2ef2e57c855c3f4f13 glibc-langpack-ru-2.28-251.el8_10.5.aarch64.rpm 787f9d792a659faec801356bcfae26bb96ce7058a4abe2c5dc002324bb790bab glibc-langpack-rw-2.28-251.el8_10.5.aarch64.rpm 07c89e6b90cdc26808cf0f0d9050fab7e7fb254e78d4e357ddb2b4bde01da718 glibc-langpack-sa-2.28-251.el8_10.5.aarch64.rpm bbc618dc2d2474a180c1aae0998c390fdf2b61acf3f4f9781727744d6dc953c0 glibc-langpack-sah-2.28-251.el8_10.5.aarch64.rpm 13074d6596b608337ee15e952e8c7841afdd85d8290f38a93d73ba363de4b719 glibc-langpack-sat-2.28-251.el8_10.5.aarch64.rpm d3a7c956c8338639e7fd2a74fd87147f7ae82ab55db43c4a181d79999c4ef462 glibc-langpack-sc-2.28-251.el8_10.5.aarch64.rpm b5138abe3c7a5d4c8089e7593532ac108ea3bfbb6b3390d966e5319dae2d3979 glibc-langpack-sd-2.28-251.el8_10.5.aarch64.rpm ee2cdd8b3f6ff7776b9b8df6b6a2338f3dea226ff3c43457fac478a02560dcca glibc-langpack-se-2.28-251.el8_10.5.aarch64.rpm 42d1c225905c50f8be416ba711642148259a2344a0abd95d02bd8f58b967f5b3 glibc-langpack-sgs-2.28-251.el8_10.5.aarch64.rpm d8d0ff18ed14796e85fea5ddc0f99fd78a05daf4dab2298c9bb71f8f1dd9d735 glibc-langpack-shn-2.28-251.el8_10.5.aarch64.rpm 73a84b4055c33f5578818dcd7b9444473b839bdc9ff4f341a6297e2185015379 glibc-langpack-shs-2.28-251.el8_10.5.aarch64.rpm 092dee600c9a1f4b08fcd43a194f37dccab842d0974cc375c768db727386f29f glibc-langpack-si-2.28-251.el8_10.5.aarch64.rpm 4d7d56ad740254c0715ecf66d4a1f85b7795f7db64bab8389fcedae50c613f2f glibc-langpack-sid-2.28-251.el8_10.5.aarch64.rpm 94277a743e4e5422a94771f79f2406c68fa63c76a8e1139cdbf1bd4d4e6e39da glibc-langpack-sk-2.28-251.el8_10.5.aarch64.rpm c5207967f5569f2fddc67045d5fee6354bb2c9ce13ac1b98f591cfd8fa843a30 glibc-langpack-sl-2.28-251.el8_10.5.aarch64.rpm 49a297297fb474430d5735f06030bd520ecd47268a73c6df179986d790693abc glibc-langpack-sm-2.28-251.el8_10.5.aarch64.rpm 0af13da43d277ecc0090e1479a07d773f24a16fc642b582a4d50766f4a778370 glibc-langpack-so-2.28-251.el8_10.5.aarch64.rpm b37098f2405fa889214ee9a3bb01a33cf1f9bac1bacc72b8756de9b3c8267e5b glibc-langpack-sq-2.28-251.el8_10.5.aarch64.rpm 5f24a4110b599cbe34798935f6fcf382a62de195410d3dcd2be65fb674556385 glibc-langpack-sr-2.28-251.el8_10.5.aarch64.rpm a1063232c4298e444fec9f095d4fbe99cdd4078ee609a61e93d77c6c95aa6c6d glibc-langpack-ss-2.28-251.el8_10.5.aarch64.rpm 69a0e32d1fd6954b7a29f1d7bf73f8a684a5dcd6b071470086d9598f3a5d5bcc glibc-langpack-st-2.28-251.el8_10.5.aarch64.rpm 05c3e4aa0ff086f69628a57e1f258388f763eecbef68b467ca498f0d9a7c2964 glibc-langpack-sv-2.28-251.el8_10.5.aarch64.rpm 94605c9588aa0bb80b412c8f1eaa407bddf67932dad90e288b86e70cf4955441 glibc-langpack-sw-2.28-251.el8_10.5.aarch64.rpm 9d11be08afd4671000ddff9f41a0d377de251b4371b7551c94a808c9a251a070 glibc-langpack-szl-2.28-251.el8_10.5.aarch64.rpm f42689009fa523ea64176db5e2e17e0fd163b7bba6003f13b0a2b0e0ada054f3 glibc-langpack-ta-2.28-251.el8_10.5.aarch64.rpm 38154b7b4302b7bdeb93cba88178d0982d3a0ee6f93d912a8d9abd9915114890 glibc-langpack-tcy-2.28-251.el8_10.5.aarch64.rpm 7aa62e8f35f5366e012d8ee9061b200d40a575b79f325c7d96217f85f123bc6e glibc-langpack-te-2.28-251.el8_10.5.aarch64.rpm 7ddd49df8f09a9241fe2e692f857d67e3ac80d716d622fbe71f16f42d4a9a20f glibc-langpack-tg-2.28-251.el8_10.5.aarch64.rpm e17c016ac2357694bdb47b1f285901b5ad9737728170a9ae137abb65ca8c123d glibc-langpack-th-2.28-251.el8_10.5.aarch64.rpm 7f62245783de22f3c63c72c58aa966be31b23150d4220d50e60d3e70fe750ca2 glibc-langpack-the-2.28-251.el8_10.5.aarch64.rpm 0610a116a155f2875daa3951430efd7d0f50af22c84377f7880a8af386a4fda3 glibc-langpack-ti-2.28-251.el8_10.5.aarch64.rpm b033dc43881c9f70f299df99436952dd17d251c92e0dcc38f43e6cba8415455f glibc-langpack-tig-2.28-251.el8_10.5.aarch64.rpm 955af724a4f2284d9be66074f8212d6bc9008ec3183ef206f294af45576fd199 glibc-langpack-tk-2.28-251.el8_10.5.aarch64.rpm f84e128902e5244a5d862a9ba709ddf6e3922cddd025f2a2914861c508b80948 glibc-langpack-tl-2.28-251.el8_10.5.aarch64.rpm 4e7d0dea15afd2e7607efef042790f11d2b4c92e6cf90ecdf24f0b151945b6e9 glibc-langpack-tn-2.28-251.el8_10.5.aarch64.rpm bf91d2cdaa204399534caf01024b7b19ff623900292ee0b432c03ac6d6f29f30 glibc-langpack-to-2.28-251.el8_10.5.aarch64.rpm 1ba937219f1d028bc53992eb7c4817e0402578f1813c59e1d8523cf578e6ea4a glibc-langpack-tpi-2.28-251.el8_10.5.aarch64.rpm cf6bc092053606eab813eba36063e26c139393824290060f4e6cf788b5a09ce8 glibc-langpack-tr-2.28-251.el8_10.5.aarch64.rpm f1428c16e6166d663c4139f6e1b027c152e3b95eff1efd2c9183396d94ccbea8 glibc-langpack-ts-2.28-251.el8_10.5.aarch64.rpm deb94850dc3ec16eacaf1d94f2c94c3e1a7f922c28bcceeb7947d4bb2f6fa490 glibc-langpack-tt-2.28-251.el8_10.5.aarch64.rpm 11d1adc28df333ffe8554c1056c50269555e552944b032082c1814128499e005 glibc-langpack-ug-2.28-251.el8_10.5.aarch64.rpm 6cbfc81125c1d22a0d8cce6dc1d6364305ac700e38f0ca890cfd70f7c98a475a glibc-langpack-uk-2.28-251.el8_10.5.aarch64.rpm 358ee8546e1ab7082b56a33178ead08ec29cae85737fc781dccdeadb3cb13db0 glibc-langpack-unm-2.28-251.el8_10.5.aarch64.rpm 94041293a59e238b43b3e60057fa038d35e3010e7bca5d97ff008cfb3af93552 glibc-langpack-ur-2.28-251.el8_10.5.aarch64.rpm b61f1e7e194aa4291fe137117db094f339c69bece134f4d6f8fc857206da89b6 glibc-langpack-uz-2.28-251.el8_10.5.aarch64.rpm 9adb4d09859a2b8a456f534194322cff21dd1226ef4fec9f39ed0393def62650 glibc-langpack-ve-2.28-251.el8_10.5.aarch64.rpm 43e5838ddc51328e8902e5f46b0dbe14e1c4d0e04e6ca15fe86953087c572317 glibc-langpack-vi-2.28-251.el8_10.5.aarch64.rpm d737ca76bfbe422ab618569e04efbff6b351906f5e4b4a775595845eee1f09d6 glibc-langpack-wa-2.28-251.el8_10.5.aarch64.rpm ecea520cfa924895618435ebf7d40db721316fb92386461cddf9564edd208b58 glibc-langpack-wae-2.28-251.el8_10.5.aarch64.rpm bbe6d5df1c27f0ec629d59c9eec32d182f165379fd94de87269eaf0dbb941f62 glibc-langpack-wal-2.28-251.el8_10.5.aarch64.rpm bd696cb9bbe54d454569cf32634e03fdb67427743a71d3635529f02b451b0b9c glibc-langpack-wo-2.28-251.el8_10.5.aarch64.rpm 9269031f937f8767a234c39f85b13412823f3ded038af1b463451ccf06d99f16 glibc-langpack-xh-2.28-251.el8_10.5.aarch64.rpm e403708a598eca7643583e81b1d42e3bf8a4d7460c7a04d1d4ffba12cba9a852 glibc-langpack-yi-2.28-251.el8_10.5.aarch64.rpm 76614a90b96fe8df72bae766ad164a62c638116f3367fda50636f1f642cc285f glibc-langpack-yo-2.28-251.el8_10.5.aarch64.rpm 57c325dab2d7e33a2af6b4ba7214dc6594497629dfda89fa841c030ea05ef3cb glibc-langpack-yue-2.28-251.el8_10.5.aarch64.rpm ef945214cd8af0cca7d0d156b9353dff53742fbc8ead0d0d091c3950578974b8 glibc-langpack-yuw-2.28-251.el8_10.5.aarch64.rpm 6505f91fe8029a13dc8bd49214644e6f5bc0025797529d24c8f253120f37586d glibc-langpack-zh-2.28-251.el8_10.5.aarch64.rpm 4333a5d49a1dc25482fac40f112659509a582d51def914cabb0377a3b02d5982 glibc-langpack-zu-2.28-251.el8_10.5.aarch64.rpm a5dcff1e6ec8187d47497de5c303c6efaf8ce3d4152a9dcccbc9952601fc41b8 glibc-locale-source-2.28-251.el8_10.5.aarch64.rpm e9d9310abb873d91da6b0b84b3ff3bafb2611bf98d58d658730b6840b5f0a384 glibc-minimal-langpack-2.28-251.el8_10.5.aarch64.rpm 23e6df63f9a7caa39b8773c7d35b623600dd81938d9bc08e44fb30f549643f13 libnsl-2.28-251.el8_10.5.aarch64.rpm c1559f41469700599749955f897c6a69a3ed79c79b40f958107272c52850156d nscd-2.28-251.el8_10.5.aarch64.rpm dee39da09279aee12d63a257b2bca100a43bd06f623e64f94fbdc63062068952 nss_db-2.28-251.el8_10.5.aarch64.rpm 30abf7ff8b74d427fef5ecb91b9aa77792d879266d8d88721bbad120049368a9 RLSA-2024:7000 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): CVE-2023-6040 CVE-2024-26595 CVE-2024-26600 CVE-2021-46984 CVE-2023-52478 CVE-2023-52476 CVE-2023-52522 CVE-2021-47101 CVE-2021-47097 CVE-2023-52605 CVE-2024-26638 CVE-2024-26645 CVE-2024-26665 CVE-2024-26720 CVE-2024-26717 CVE-2024-26769 CVE-2024-26846 CVE-2024-26894 CVE-2024-26880 CVE-2024-26855 CVE-2024-26923 CVE-2024-26939 CVE-2024-27013 CVE-2024-27042 CVE-2024-35809 CVE-2023-52683 CVE-2024-35884 CVE-2024-35877 CVE-2024-35944 CVE-2024-35989 CVE-2021-47412 CVE-2021-47393 CVE-2021-47386 CVE-2021-47385 CVE-2021-47384 CVE-2021-47383 CVE-2021-47432 CVE-2021-47352 CVE-2021-47338 CVE-2021-47321 CVE-2021-47289 CVE-2021-47287 CVE-2023-52798 CVE-2023-52809 CVE-2023-52817 CVE-2023-52840 CVE-2023-52800 CVE-2021-47441 CVE-2021-47466 CVE-2021-47455 CVE-2021-47497 CVE-2021-47560 CVE-2021-47527 CVE-2024-36883 CVE-2024-36922 CVE-2024-36920 CVE-2024-36902 CVE-2024-36953 CVE-2024-36939 CVE-2024-36919 CVE-2024-36901 CVE-2021-47582 CVE-2021-47609 CVE-2024-38619 CVE-2022-48754 CVE-2022-48760 CVE-2024-38581 CVE-2024-38579 CVE-2024-38570 CVE-2024-38559 CVE-2024-38558 CVE-2024-37356 CVE-2024-39471 CVE-2024-39499 CVE-2024-39501 CVE-2024-39506 CVE-2024-40904 CVE-2024-40911 CVE-2024-40912 CVE-2024-40929 CVE-2024-40931 CVE-2024-40941 CVE-2024-40954 CVE-2024-40958 CVE-2024-40959 CVE-2024-40960 CVE-2024-40972 CVE-2024-40977 CVE-2024-40978 CVE-2024-40988 CVE-2024-40989 CVE-2024-40995 CVE-2024-40997 CVE-2024-40998 CVE-2024-41005 CVE-2024-40901 CVE-2024-41007 CVE-2024-41008 CVE-2022-48804 CVE-2022-48836 CVE-2022-48866 CVE-2024-41090 CVE-2024-41091 CVE-2024-41012 CVE-2024-41013 CVE-2024-41014 CVE-2024-41023 CVE-2024-41035 CVE-2024-41038 CVE-2024-41039 CVE-2024-41040 CVE-2024-41041 CVE-2024-41044 CVE-2024-41055 CVE-2024-41056 CVE-2024-41060 CVE-2024-41064 CVE-2024-41065 CVE-2024-41071 CVE-2024-41076 CVE-2024-41097 CVE-2024-42084 CVE-2024-42090 CVE-2024-42094 CVE-2024-42096 CVE-2024-42114 CVE-2024-42124 CVE-2024-42131 CVE-2024-42152 CVE-2024-42154 CVE-2024-42225 CVE-2024-42226 CVE-2024-42228 CVE-2024-42237 CVE-2024-42238 CVE-2024-42240 CVE-2024-42246 CVE-2024-42322 CVE-2024-43830 CVE-2024-43871 For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.22.1.el8_10.aarch64.rpm 2b07ee8ddc1246df508ed7e338061a1c3c2865639f64c6ea70fd729c4d4a6b25 kernel-4.18.0-553.22.1.el8_10.aarch64.rpm cd1b9acca917cf4e43f81de2333a3aa2c5fbe8cfc5af0155f8e2ae4fcf510e77 kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm 37868b1396369a301016915962c9bd00511ab563e2a72497f075079ee385d74e kernel-abi-stablelists-4.18.0-553.22.1.el8_10.noarch.rpm 37868b1396369a301016915962c9bd00511ab563e2a72497f075079ee385d74e kernel-core-4.18.0-553.22.1.el8_10.aarch64.rpm 6fa33d516eb20bbcc7f3bc2d5b6f343b934e0cda27b67e83b10c313405cd906c kernel-cross-headers-4.18.0-553.22.1.el8_10.aarch64.rpm fb69e60319ecd1abc99e2b59ed110d4517441b38eab3db2c72f4c0a3194b37aa kernel-debug-4.18.0-553.22.1.el8_10.aarch64.rpm 1b85d000976cb56f59df9df30a9fe731c1ca165fff6b4bb3d40138f7e9a25fff kernel-debug-core-4.18.0-553.22.1.el8_10.aarch64.rpm a50e0b5f50bacdb37eb31e3cabb3d80da312409f8d844b0bc63a20d85e63fc26 kernel-debug-devel-4.18.0-553.22.1.el8_10.aarch64.rpm 9617602f20f263f27ac93098eecf58046faa435852780dfb1dbcd5f8ca9d9b33 kernel-debuginfo-common-aarch64-4.18.0-553.22.1.el8_10.aarch64.rpm 76b7536a1565f41673049cd1d360f977bc56fb612f9231994cf376d211f8104a kernel-debug-modules-4.18.0-553.22.1.el8_10.aarch64.rpm 8f34c414c8c01c6385b9a08fdebabea2febba8b632f30160472e67da8d739fe8 kernel-debug-modules-extra-4.18.0-553.22.1.el8_10.aarch64.rpm ccd8c1020cf377303d93daab38a186a0193312d985e86cd798866edcf1836261 kernel-devel-4.18.0-553.22.1.el8_10.aarch64.rpm 806eba728d58a5db31b58f8e7d7af24dcb26e6cb7fd1c32389679494a45676f1 kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm 26974777e1dd5ef418e19ba439d59bb59de3947a9a58e163cfda8d2ad9c96228 kernel-doc-4.18.0-553.22.1.el8_10.noarch.rpm 26974777e1dd5ef418e19ba439d59bb59de3947a9a58e163cfda8d2ad9c96228 kernel-headers-4.18.0-553.22.1.el8_10.aarch64.rpm 3cb477b0d30d63db1c9b6daa6d15bca098b38aae1a74dc400a2d33dea61a0729 kernel-modules-4.18.0-553.22.1.el8_10.aarch64.rpm 4a4204b77144d69d5159c3f51c541d20fee8047c643cc95546b0a3676ba2587a kernel-modules-extra-4.18.0-553.22.1.el8_10.aarch64.rpm 5dccb4db400e609b30105e1c7129a574c310e6d8a1e48b824303e632af8041cd kernel-tools-4.18.0-553.22.1.el8_10.aarch64.rpm f9ed952b89c5f7606d3974fbb57f30eb59fb2e5b517163da3c1ae4438ff3f703 kernel-tools-libs-4.18.0-553.22.1.el8_10.aarch64.rpm 4a931e903d0d1f864b8858e6b1785508c5210df401c50707557da258d995add8 perf-4.18.0-553.22.1.el8_10.aarch64.rpm 1e47ef2c1324e3953b9f5be9a38b7b77f8529de123e4a22b1bb4ecb3e744e8f2 python3-perf-4.18.0-553.22.1.el8_10.aarch64.rpm 13fc7a9a63c4758a2879552f98cc5cdd8211e9866f922abcad1e0819adbd972e RLSA-2024:7481 Important: linux-firmware security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Security Fix(es): * kernel: hw:amd:IOMMU improperly handles certain special address leading to a loss of guest integrity (CVE-2023-20584) * kernel: hw: amd:Incomplete system memory cleanup in SEV firmware corrupt guest private memory (CVE-2023-31356) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms iwl1000-firmware-39.31.5.1-124.el8_10.1.noarch.rpm ec268dfa1053d5d1a842485637c8bb3411fb016fa3208992a20ed7459388ee12 iwl1000-firmware-39.31.5.1-124.el8_10.1.noarch.rpm ec268dfa1053d5d1a842485637c8bb3411fb016fa3208992a20ed7459388ee12 iwl100-firmware-39.31.5.1-124.el8_10.1.noarch.rpm 3f7185a8b325f6402d01817e7465b4aecbf5ca285337d14dcebe7ddd49bc4175 iwl100-firmware-39.31.5.1-124.el8_10.1.noarch.rpm 3f7185a8b325f6402d01817e7465b4aecbf5ca285337d14dcebe7ddd49bc4175 iwl105-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 356fa5d82f2f00471f78566050294a30440c167cf83eed39ec458c8505c97e0a iwl105-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 356fa5d82f2f00471f78566050294a30440c167cf83eed39ec458c8505c97e0a iwl135-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 9e93a37d5b40a79005d360ad6661bcf3601539ee8167be9be24469c908c974b7 iwl135-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 9e93a37d5b40a79005d360ad6661bcf3601539ee8167be9be24469c908c974b7 iwl2000-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 2cbf28d04db06d04a954df44d12f9d9004ece220f57b34c4f1371ba74d0dd758 iwl2000-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 2cbf28d04db06d04a954df44d12f9d9004ece220f57b34c4f1371ba74d0dd758 iwl2030-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 4bd90f328534fa8922004b231d77725c15c86da0b9a6e3e14a68843817f99491 iwl2030-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 4bd90f328534fa8922004b231d77725c15c86da0b9a6e3e14a68843817f99491 iwl3160-firmware-25.30.13.0-124.el8_10.1.noarch.rpm 4dae7296307dc5f05be89af1576bb3d23e2aa07a82e5db9557c557f62674ac74 iwl3160-firmware-25.30.13.0-124.el8_10.1.noarch.rpm 4dae7296307dc5f05be89af1576bb3d23e2aa07a82e5db9557c557f62674ac74 iwl3945-firmware-15.32.2.9-124.el8_10.1.noarch.rpm 9b2ed7f1c8a8633a455fb65bf7dc747540f52ad68a82537f96cc8e70f0ffc992 iwl3945-firmware-15.32.2.9-124.el8_10.1.noarch.rpm 9b2ed7f1c8a8633a455fb65bf7dc747540f52ad68a82537f96cc8e70f0ffc992 iwl4965-firmware-228.61.2.24-124.el8_10.1.noarch.rpm d1421386b76e3a09e3a378d5a329d193a2b8bb69a588d66c425d2fca65843eb4 iwl4965-firmware-228.61.2.24-124.el8_10.1.noarch.rpm d1421386b76e3a09e3a378d5a329d193a2b8bb69a588d66c425d2fca65843eb4 iwl5000-firmware-8.83.5.1_1-124.el8_10.1.noarch.rpm 7659f75285578accc5a0686700c8803c159c5fdf2cc53e0eb1a9403ba712dbce iwl5000-firmware-8.83.5.1_1-124.el8_10.1.noarch.rpm 7659f75285578accc5a0686700c8803c159c5fdf2cc53e0eb1a9403ba712dbce iwl5150-firmware-8.24.2.2-124.el8_10.1.noarch.rpm abd695129be3c73cc717c7bde0a0dc677bce6ddf53ce0bd00602c6df05956263 iwl5150-firmware-8.24.2.2-124.el8_10.1.noarch.rpm abd695129be3c73cc717c7bde0a0dc677bce6ddf53ce0bd00602c6df05956263 iwl6000-firmware-9.221.4.1-124.el8_10.1.noarch.rpm 31b42eb8eeb5602044cf7743b90fbdbd78665645bf16130ad483ae569258eba2 iwl6000-firmware-9.221.4.1-124.el8_10.1.noarch.rpm 31b42eb8eeb5602044cf7743b90fbdbd78665645bf16130ad483ae569258eba2 iwl6000g2a-firmware-18.168.6.1-124.el8_10.1.noarch.rpm bc99ca43c3f3eb838a0000f79110281d313d1d7dd4b596bddc4d0845d9bfe202 iwl6000g2a-firmware-18.168.6.1-124.el8_10.1.noarch.rpm bc99ca43c3f3eb838a0000f79110281d313d1d7dd4b596bddc4d0845d9bfe202 iwl6000g2b-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 0abfc9e1c2236590f4258785d2400f709fe532506c53d66a523438c9b90bb431 iwl6000g2b-firmware-18.168.6.1-124.el8_10.1.noarch.rpm 0abfc9e1c2236590f4258785d2400f709fe532506c53d66a523438c9b90bb431 iwl6050-firmware-41.28.5.1-124.el8_10.1.noarch.rpm f7ae4f830067f32a5490cacbdebd0f022811b68d698287ab5dcf588bb48e167e iwl6050-firmware-41.28.5.1-124.el8_10.1.noarch.rpm f7ae4f830067f32a5490cacbdebd0f022811b68d698287ab5dcf588bb48e167e iwl7260-firmware-25.30.13.0-124.el8_10.1.noarch.rpm 57928a2dee13f480975971155fd8ccf6c2aa682906c2faddf384be76e523d5b4 iwl7260-firmware-25.30.13.0-124.el8_10.1.noarch.rpm 57928a2dee13f480975971155fd8ccf6c2aa682906c2faddf384be76e523d5b4 libertas-sd8686-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 64c6ce25731f3d460be0d2261259cc3d44318a1092b423e2c1ca00f961aa92ba libertas-sd8686-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 64c6ce25731f3d460be0d2261259cc3d44318a1092b423e2c1ca00f961aa92ba libertas-sd8787-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 8d507dc671d066f2a9d87ba3bdab29875b794a6c8b6b5bf10d30f16a6872db0b libertas-sd8787-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 8d507dc671d066f2a9d87ba3bdab29875b794a6c8b6b5bf10d30f16a6872db0b libertas-usb8388-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 53226c3a3b9d3d43e14399998f200a1cd134e3f6a17744b12432fe6eedaf5f87 libertas-usb8388-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 53226c3a3b9d3d43e14399998f200a1cd134e3f6a17744b12432fe6eedaf5f87 libertas-usb8388-olpc-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 249e72e6887ab991f1b15b06c9824ad2cb5842fbd18a52924ef943ebc7bd024d libertas-usb8388-olpc-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm 249e72e6887ab991f1b15b06c9824ad2cb5842fbd18a52924ef943ebc7bd024d linux-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm b0a1f7bc562bbc16fa8815e94f816e479f64758128ac1e3e85ac224d871457bd linux-firmware-20240827-124.git3cff7109.el8_10.noarch.rpm b0a1f7bc562bbc16fa8815e94f816e479f64758128ac1e3e85ac224d871457bd RLBA-2024:8853 cups bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Bug Fix(es): * cups source rpm doesn't actually build lspp support on Rocky Linux 8 (JIRA:Rocky Linux-54038) none-baseos-rpms cups-libs-2.2.6-61.el8_10.aarch64.rpm c719c60a1780cfff65543f69f40c2d7a8437bc1b1808617b6bd8e33cd373a659 RLBA-2024:11156 rpm bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for rpm. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Bug Fix(es): * librpm crashes when applying the upgrade transaction from Rocky Linux7 to Rocky Linux8 [rhel-8.10.z] (JIRA:Rocky Linux-39894) * intermittent core dump in hex2bin (librpm.so.8) [rhel-8.10.z] (JIRA:Rocky Linux-39896) * dnf fails with misleading "cpio: open failed - Not a directory" error message [rhel-8.10.z] (JIRA:Rocky Linux-39897) * Harden removal code of relocatable packages [rhel-8.10.z] (JIRA:Rocky Linux-49494) * Unpack failure during update can cause unmodified %config file removal [rhel-8.10.z] (JIRA:Rocky Linux-63069) none-baseos-rpms python3-rpm-4.14.3-32.el8_10.aarch64.rpm f99da4154a197cc2007fe9bc2f71e34cda644e81a375af24335bc7bb9c347458 rpm-4.14.3-32.el8_10.aarch64.rpm c41b6a4edd873a566c2a31be6a1819ac401a3a8658823c671601423b984db4ee rpm-apidocs-4.14.3-32.el8_10.noarch.rpm 9f4435e9683f32421b40f6b4be125c5b6601ec2125cac85b8ae9e80ba58eed37 rpm-apidocs-4.14.3-32.el8_10.noarch.rpm 9f4435e9683f32421b40f6b4be125c5b6601ec2125cac85b8ae9e80ba58eed37 rpm-build-libs-4.14.3-32.el8_10.aarch64.rpm 2cd23955fbdff1b04fe6bd2932b4a4f1db9b139fa068e15e749b568876e16ed9 rpm-cron-4.14.3-32.el8_10.noarch.rpm 448282582cf9e29235c9c87a686e07c37c8660c93cfa2d527236eec97c5c5850 rpm-cron-4.14.3-32.el8_10.noarch.rpm 448282582cf9e29235c9c87a686e07c37c8660c93cfa2d527236eec97c5c5850 rpm-devel-4.14.3-32.el8_10.aarch64.rpm 2b0b08c65c1e5729e4f11e8df73cf5168030fb96732090dcf3e0a3c6eedbfc14 rpm-libs-4.14.3-32.el8_10.aarch64.rpm db28dac831e80cc5cdeeac4f5b17270f8dcae08b3e6cf7360885527812c65aa3 rpm-plugin-ima-4.14.3-32.el8_10.aarch64.rpm d2d067388d702f278bb9a9e38e34629598353ea6eeff3bef778a94c28b543859 rpm-plugin-prioreset-4.14.3-32.el8_10.aarch64.rpm 4885cd3907863ba0ac1a7d64402afece3a131cb2c73009eca87056da03e3386c rpm-plugin-selinux-4.14.3-32.el8_10.aarch64.rpm caaa4634d03dff7535d28c6d5ee4af91c8140990d802f5dadb3b561213f2fffa rpm-plugin-syslog-4.14.3-32.el8_10.aarch64.rpm c6c791eea4c6f19132b7a404850c56c42ae147e15520c0f58464fd60eb585fd9 rpm-plugin-systemd-inhibit-4.14.3-32.el8_10.aarch64.rpm 71e3fbe7893decbec787777fa7599a317b15cdb4cc589ff3e24a38011c1aa182 rpm-sign-4.14.3-32.el8_10.aarch64.rpm 10cdfba956fa0ed71c53fd4041c6b96728397c0b1481f827b554497b3f066f76 RLBA-2024:11159 libselinux, libsemanage, and selinux-policy bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for libsemanage, selinux-policy, libselinux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libselinux packages contain the core library of an SELinux system. The libselinux library provides an API for SELinux applications to get and set process and file security contexts, and to obtain security policy decisions. It is required for any applications that use the SELinux API, and is used by all applications that are SELinux-aware. Bug Fix(es) and Enhancement(s): * Allow dirsrv_snmp_t to manage dirsrv_var_run_t files (JIRA:Rocky Linux-32441) * SELinux prevents setsebool from doing relabelfrom+relabelto on the policy store [rhel-8] (JIRA:Rocky Linux-55432) * Semodule changes SELinux labels in /etc/selinux/targeted/contexts/files (JIRA:Rocky Linux-17509) * Semodule changes SELinux labels in /etc/selinux/targeted/contexts/files [rhel-8.10.z] (JIRA:Rocky Linux-50830) none-baseos-rpms libselinux-2.9-9.el8_10.aarch64.rpm faa288d2b06a0179d489a4bdf128841c832637b25edb1449fad9f3ab9b5be1d2 libselinux-devel-2.9-9.el8_10.aarch64.rpm b6311a988ade18aa40938581a584ee37b41c0d8b4381516d338b11edcd9d85e2 libselinux-utils-2.9-9.el8_10.aarch64.rpm acbab88297ef3dd3c3004ade85fcf3e348c6cd457f3719f521f0e46c689b94c2 libsemanage-2.9-10.el8_10.aarch64.rpm ca028198679e8579f0038396b037c4dbec2cfe28ad3d1b68b86fa8ddfe088878 python3-libselinux-2.9-9.el8_10.aarch64.rpm 804d8b0862bdcfe19a18d9b397334a146d4d599ff77039633026494bb22eee72 python3-libsemanage-2.9-10.el8_10.aarch64.rpm e741232e67fcf5ac4f38ece49edccf8e217593cbaf46dd3ebe2ba7f01ef7c7e8 selinux-policy-3.14.3-139.el8_10.1.noarch.rpm fce729c43955b50150d81e71d5eaa236264180e4c55adff6707a3f427bdcfecc selinux-policy-3.14.3-139.el8_10.1.noarch.rpm fce729c43955b50150d81e71d5eaa236264180e4c55adff6707a3f427bdcfecc selinux-policy-devel-3.14.3-139.el8_10.1.noarch.rpm 8b9ed618521b95f075f3506b7c01c125b5f6f6c5eca28500b85a50e315b00c8a selinux-policy-devel-3.14.3-139.el8_10.1.noarch.rpm 8b9ed618521b95f075f3506b7c01c125b5f6f6c5eca28500b85a50e315b00c8a selinux-policy-doc-3.14.3-139.el8_10.1.noarch.rpm b9ed1283a6f9e5ef1605e801ba034be52175d1bb8f0c150d24699825593bc443 selinux-policy-doc-3.14.3-139.el8_10.1.noarch.rpm b9ed1283a6f9e5ef1605e801ba034be52175d1bb8f0c150d24699825593bc443 selinux-policy-minimum-3.14.3-139.el8_10.1.noarch.rpm 8b2898ca8fe1248c1d977063dce40028bddb2225b77595a2390868fee5cdbd4a selinux-policy-minimum-3.14.3-139.el8_10.1.noarch.rpm 8b2898ca8fe1248c1d977063dce40028bddb2225b77595a2390868fee5cdbd4a selinux-policy-mls-3.14.3-139.el8_10.1.noarch.rpm 518ecb3a323defa00ba39adcd1f21051700ab2c060cbd8ac5b3048d878f5b00d selinux-policy-mls-3.14.3-139.el8_10.1.noarch.rpm 518ecb3a323defa00ba39adcd1f21051700ab2c060cbd8ac5b3048d878f5b00d selinux-policy-sandbox-3.14.3-139.el8_10.1.noarch.rpm 41a879af3a0fde61333278b46fd5dcf896f1fe229931762bc4b7e80c511614a5 selinux-policy-sandbox-3.14.3-139.el8_10.1.noarch.rpm 41a879af3a0fde61333278b46fd5dcf896f1fe229931762bc4b7e80c511614a5 selinux-policy-targeted-3.14.3-139.el8_10.1.noarch.rpm dfc228c719e46e2edcec3427483585477d321b84302c27d01c705b56e2faa3b4 selinux-policy-targeted-3.14.3-139.el8_10.1.noarch.rpm dfc228c719e46e2edcec3427483585477d321b84302c27d01c705b56e2faa3b4 RLSA-2024:11161 Moderate: tuned security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Security Fix(es): * tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms tuned-2.22.1-5.el8_10.noarch.rpm 6e53b35ca46aa33a189aa41cb93123c741fa9c28831cdd9f841b03f4e6d3b303 tuned-2.22.1-5.el8_10.noarch.rpm 6e53b35ca46aa33a189aa41cb93123c741fa9c28831cdd9f841b03f4e6d3b303 tuned-profiles-atomic-2.22.1-5.el8_10.noarch.rpm 48819ccae7edfe2b971114be4671e1f4b10f7bada45b1b1aed4bebef05303248 tuned-profiles-atomic-2.22.1-5.el8_10.noarch.rpm 48819ccae7edfe2b971114be4671e1f4b10f7bada45b1b1aed4bebef05303248 tuned-profiles-compat-2.22.1-5.el8_10.noarch.rpm 1867a23e46a28d7260715d8c61718805e4d1a2fba688f503be62f25fd7375f73 tuned-profiles-compat-2.22.1-5.el8_10.noarch.rpm 1867a23e46a28d7260715d8c61718805e4d1a2fba688f503be62f25fd7375f73 tuned-profiles-cpu-partitioning-2.22.1-5.el8_10.noarch.rpm 88b35806ff08946a36935e0cc93f2999043c1651af1718eb95fc57d18b5795c0 tuned-profiles-cpu-partitioning-2.22.1-5.el8_10.noarch.rpm 88b35806ff08946a36935e0cc93f2999043c1651af1718eb95fc57d18b5795c0 tuned-profiles-mssql-2.22.1-5.el8_10.noarch.rpm 69e79c642f0ff489e3ca77131ceb3879681ef63805452934d4077e236bf57a3c tuned-profiles-mssql-2.22.1-5.el8_10.noarch.rpm 69e79c642f0ff489e3ca77131ceb3879681ef63805452934d4077e236bf57a3c tuned-profiles-oracle-2.22.1-5.el8_10.noarch.rpm ecf802f60c557c3ea3ea398b06646ca010be75c5dbc9bc9d14a2092fa932867e tuned-profiles-oracle-2.22.1-5.el8_10.noarch.rpm ecf802f60c557c3ea3ea398b06646ca010be75c5dbc9bc9d14a2092fa932867e RLBA-2024:11481 kernel bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list (Rocky Linux-62796) (Rocky Linux-64073) none-baseos-rpms bpftool-4.18.0-553.33.1.el8_10.aarch64.rpm e891a55a102bb24b30c0fac4a81dcc074b2d59976dc2c4099e1a2e3f669df9b3 kernel-4.18.0-553.33.1.el8_10.aarch64.rpm 54d6a8eb71159cb27a34998615b0d3a7068f3ff13ce8f6197957dd37bb0af7f5 kernel-abi-stablelists-4.18.0-553.33.1.el8_10.noarch.rpm efb8d6f0fa4e7d9b4e1d9c9d4641a63bdf262c58a04a34925c00a41ea94fe125 kernel-abi-stablelists-4.18.0-553.33.1.el8_10.noarch.rpm efb8d6f0fa4e7d9b4e1d9c9d4641a63bdf262c58a04a34925c00a41ea94fe125 kernel-core-4.18.0-553.33.1.el8_10.aarch64.rpm 517aa10ad36b287a3ecc30d6a98b53333ece23bb100a2e81763a6ff7678d63e0 kernel-cross-headers-4.18.0-553.33.1.el8_10.aarch64.rpm 2f307cf7e1afbbc8e8e42198bf04323fd3c2bc429827dfb323fd5813c485530f kernel-debug-4.18.0-553.33.1.el8_10.aarch64.rpm f875ac0aa1e9ad0dc4b0da4edc1d307534cc168b6b42e48feb944c57d4f11e3d kernel-debug-core-4.18.0-553.33.1.el8_10.aarch64.rpm e5ee63b06d4d0b14470d2aaa7de425d21f35f6a72022d31433d9d4c5976c2dd0 kernel-debug-devel-4.18.0-553.33.1.el8_10.aarch64.rpm a5631ec92091ebb71cbbc7258d4083d0b0549acdd0450e0674d7ccd0f847f726 kernel-debuginfo-common-aarch64-4.18.0-553.33.1.el8_10.aarch64.rpm eec2ca990510c3a2b77d1cc0784c63e9ae54d863ebed606714d63211ea32b1da kernel-debug-modules-4.18.0-553.33.1.el8_10.aarch64.rpm 2640374a850896acc38dde838df9e0a0080f233c55f1f2cc9302f919345ec6c9 kernel-debug-modules-extra-4.18.0-553.33.1.el8_10.aarch64.rpm 7e22cadeaa8dfbefafd1330c4c53e6419646bdfa6c44cc828fabbe0e416f8b9a kernel-devel-4.18.0-553.33.1.el8_10.aarch64.rpm d1d4f18adcf57733b37ffe6c8b1188a7df29a7d2b7f74d9cec720657c157e185 kernel-doc-4.18.0-553.33.1.el8_10.noarch.rpm f47fc3d1dffa950c2c7a14e3fdee33145ad32ab69b0e0093ee8c5d417c3251ae kernel-doc-4.18.0-553.33.1.el8_10.noarch.rpm f47fc3d1dffa950c2c7a14e3fdee33145ad32ab69b0e0093ee8c5d417c3251ae kernel-headers-4.18.0-553.33.1.el8_10.aarch64.rpm 15dc6217a6491a5353615f06f4ce482c74762051d72847a445b4967d62bfa9da kernel-modules-4.18.0-553.33.1.el8_10.aarch64.rpm 0be0505d7b8ee1db37210927d06f25c8858e274df07915ea30b18cc75024249f kernel-modules-extra-4.18.0-553.33.1.el8_10.aarch64.rpm 7a5f8ccf2b3b3a465c3f3c9d7873b147c39b9c3d089d7db7e2f5715b64614e25 kernel-tools-4.18.0-553.33.1.el8_10.aarch64.rpm 135da35f4dd80cc5175cbfdc4d923c964533cc6f3fedd5d4c7b7b73bdba471b7 kernel-tools-libs-4.18.0-553.33.1.el8_10.aarch64.rpm 7117adb1409c1d04b26244f96cfdab8719c5f608b342f3a887ffb6845ba37a67 perf-4.18.0-553.33.1.el8_10.aarch64.rpm b52454558ebfe575a3a25437c1742a9b08f3667109df539a519309c99ce6ada1 python3-perf-4.18.0-553.33.1.el8_10.aarch64.rpm ebbb59b40e0077608c4b5b1120b2fe3bdf9f0818f8c9645e7aca0bb2f874d353 RLSA-2026:2720 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (CVE-2025-40168) * kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling (CVE-2023-53762) * kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service. (CVE-2025-40304) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.105.1.el8_10.aarch64.rpm 08a367cbf657b54f2f987702bc8bc1e477bed2e17ed729d16a75b6962d78c0c7 kernel-4.18.0-553.105.1.el8_10.aarch64.rpm 5abd2614c5ae973102e62f3067d8185e12656a9f8063908635ba3e1eb4c792d2 kernel-abi-stablelists-4.18.0-553.105.1.el8_10.noarch.rpm cc01c45660f3b2233c9a9f0afc15d6e708063d6a4c77db72d48f7e0aa121203b kernel-abi-stablelists-4.18.0-553.105.1.el8_10.noarch.rpm cc01c45660f3b2233c9a9f0afc15d6e708063d6a4c77db72d48f7e0aa121203b kernel-core-4.18.0-553.105.1.el8_10.aarch64.rpm 359e5a0efb91d7529b5639127747c7cb9a13a36dc0b17bb3117a73fb39149a77 kernel-debug-4.18.0-553.105.1.el8_10.aarch64.rpm acd34e69bb1f361cf90fa3318be22a82c10e2f514fdc5d7fd3fb77fdf4da1b11 kernel-debug-core-4.18.0-553.105.1.el8_10.aarch64.rpm 615a784249f611a3d72ecf970cdb3eda8a65751c68b42aa0deb9a86678e8f2d6 kernel-debug-devel-4.18.0-553.105.1.el8_10.aarch64.rpm 4abab3adefc9e781406526b7bfd6b19a671448c8a07b2762cd9de626c7659b79 kernel-debuginfo-common-aarch64-4.18.0-553.105.1.el8_10.aarch64.rpm e9084a64ca43d698c7c38aa7d458e3f0b5e8819de3ea63f549eb551ffe0a91d2 kernel-debug-modules-4.18.0-553.105.1.el8_10.aarch64.rpm da1b9e3c9de4eedd6f5a6a9f8b7ff101efbe7bd4853986bfccf55d364177af00 kernel-debug-modules-extra-4.18.0-553.105.1.el8_10.aarch64.rpm dd7af133f206bdcbbdeb067e31102185f9b19bb8ff79905f71dd87d92650fb53 kernel-devel-4.18.0-553.105.1.el8_10.aarch64.rpm 55a38bed518aa27846530ab2cd61d46d337dd8ff6d8674523a16e4aadef8ab01 kernel-doc-4.18.0-553.105.1.el8_10.noarch.rpm b429e3fd7e13e178ca5b2c5753174f922f12123231a4e77543b784a174e21549 kernel-doc-4.18.0-553.105.1.el8_10.noarch.rpm b429e3fd7e13e178ca5b2c5753174f922f12123231a4e77543b784a174e21549 kernel-modules-4.18.0-553.105.1.el8_10.aarch64.rpm 8432e39443f86eb176b993285514cae6e59b23bb7e2399e6f0bce5cff23a4d1b kernel-modules-extra-4.18.0-553.105.1.el8_10.aarch64.rpm 24ca1840832a4b390c70d9b2c7d20346f1a717ac95dc18c9f4a6582cccb14afd kernel-tools-4.18.0-553.105.1.el8_10.aarch64.rpm d1cd5cd85ec034d5d6378e913869c61a5a67e553b30ea7918d114f5694c5eac8 kernel-tools-libs-4.18.0-553.105.1.el8_10.aarch64.rpm 84610210e929f8fec656ec35dcb3fd09e0b8f297892447053255990956722c3d perf-4.18.0-553.105.1.el8_10.aarch64.rpm d940281c910227fece716e14edc2a0feefab7c5eae8e2267f24340a0f20af92a python3-perf-4.18.0-553.105.1.el8_10.aarch64.rpm 9e17666275cb00be4b50a66e1c0435d048409786ddc28b6b5b45208fad3889f0 RLSA-2025:0288 Moderate: Bug fix of NetworkManager Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Security and Bug Fix(es): * NetworkManager: DHCP routing options can manipulate interface-based VPN traffic (CVE-2024-3661) * Route to VPN server not stored in routing table that is specified by ipv4.route-table (JIRA:Rocky Linux-73051) * VPN connections do not support ipv4.routing-rules settings (JIRA:Rocky Linux-73052) none-baseos-rpms NetworkManager-1.40.16-18.el8_10.aarch64.rpm 2af6dc86778e712da87f6bf65b5bd5b6118a764d205a379ea845e2d71bb476e6 NetworkManager-adsl-1.40.16-18.el8_10.aarch64.rpm e5ea6eee11ff9d12af85988417e4fe994db5d36b3a9c155ca8fe32fda495abc9 NetworkManager-bluetooth-1.40.16-18.el8_10.aarch64.rpm b2bae4a4708f165c6c2f886d29f3dabd98ac7da1de6e01d354ff47c80ecd93f7 NetworkManager-config-connectivity-redhat-1.40.16-18.el8_10.noarch.rpm b105a59a11f8ea1c2a48d584db2a1eae8c6d84c1cf7b81a394e29ea9410cc796 NetworkManager-config-connectivity-redhat-1.40.16-18.el8_10.noarch.rpm b105a59a11f8ea1c2a48d584db2a1eae8c6d84c1cf7b81a394e29ea9410cc796 NetworkManager-config-server-1.40.16-18.el8_10.noarch.rpm cedc05d41da491789a9ee832214ee3aa3bcd54adcd4382d8f4b8944f826532e2 NetworkManager-config-server-1.40.16-18.el8_10.noarch.rpm cedc05d41da491789a9ee832214ee3aa3bcd54adcd4382d8f4b8944f826532e2 NetworkManager-dispatcher-routing-rules-1.40.16-18.el8_10.noarch.rpm 4aa41b7051d041cbb85f08011ca5037f0ec7547c41ce4a3502553102aab4f76e NetworkManager-dispatcher-routing-rules-1.40.16-18.el8_10.noarch.rpm 4aa41b7051d041cbb85f08011ca5037f0ec7547c41ce4a3502553102aab4f76e NetworkManager-initscripts-updown-1.40.16-18.el8_10.noarch.rpm 00794fede7b74228b81a9d5d8f85fce5081862cf3fe10c13b974f3f37c13dd48 NetworkManager-initscripts-updown-1.40.16-18.el8_10.noarch.rpm 00794fede7b74228b81a9d5d8f85fce5081862cf3fe10c13b974f3f37c13dd48 NetworkManager-libnm-1.40.16-18.el8_10.aarch64.rpm e9978297c9fa04353c095f39b7cb313637d79bf6efb236e4d31439135a966e2f NetworkManager-ovs-1.40.16-18.el8_10.aarch64.rpm c7bb34977ca6fa5b6475a25a4339f0c4afa21b68085b4783ccb511f051e7fd63 NetworkManager-ppp-1.40.16-18.el8_10.aarch64.rpm 0e77396dab6f5cd95b072360c8a528ae7be09148958d8dc01720d6a8435ecf41 NetworkManager-team-1.40.16-18.el8_10.aarch64.rpm a934e2deac6ce38f6fca13972ce6668227c0964c0fdff1301f824cc82e7f7d66 NetworkManager-tui-1.40.16-18.el8_10.aarch64.rpm 394275254c0b583a6784cfbb3cdcd91295d46a856fc3f8cd313e03f750fe6b9d NetworkManager-wifi-1.40.16-18.el8_10.aarch64.rpm bac2ae169e042dad248d55c8da6ea367c3c4f906d8980f665b5bcc1464f57ab8 NetworkManager-wwan-1.40.16-18.el8_10.aarch64.rpm 7df65859c4793553c5472db1561e869183bdf17d9c9657877ef1e4c6c72b4414 RLBA-2025:0728 glibc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Bug Fix(es): * glibc: Incorrect relative paths in glibc-debuginfo [rhel-8] (JIRA:Rocky Linux-63048) * glibc: string/test-strncmp-nonarray segfaults on aarch64 [rhel-8.10.z] (JIRA:Rocky Linux-61255) * glibc: string/test-strncmp-nonarray segfaults on ppc64le [rhel-8.10.z] (JIRA:Rocky Linux-61259) * glibc: z13 wcsncmp implementation segfaults if n=1[rhel-8.10.z] (JIRA:Rocky Linux-49490) * Some issues with iconv in glibc for GB18030-2022 encoding [rhel-8.10.z] (JIRA:Rocky Linux-67806) none-baseos-rpms glibc-2.28-251.el8_10.11.aarch64.rpm 8bf2144b637a7a9a89fc0f2cd82483cb7490c1f13ca05210d84bdccc9dc3026c glibc-all-langpacks-2.28-251.el8_10.11.aarch64.rpm 561332ebe470503e89ca888b4f07fe6c3caa40dfcee8dbd0467efca9660a275a glibc-common-2.28-251.el8_10.11.aarch64.rpm a7d19291b66def2cabbfb1502cf01b475c1e60bbb2128044c1d52c1efb658d7b glibc-devel-2.28-251.el8_10.11.aarch64.rpm a7a5fe42e5c4f152f134ef9af44ca0a451e0ad686915b13d5153240027fa6047 glibc-doc-2.28-251.el8_10.11.noarch.rpm 3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe glibc-doc-2.28-251.el8_10.11.noarch.rpm 3a7120c1d53cf98ed6bcb9510604c821d067896637d36a1a39cfdf1de3cf7ffe glibc-gconv-extra-2.28-251.el8_10.11.aarch64.rpm 3c7ef137e741bcf34fd2ac0285bd5d97d504aeaf0459cf037754e7d979152a90 glibc-headers-2.28-251.el8_10.11.aarch64.rpm 3c8135c5b4bf318a49d889992b90bfde7804cc0bb61a11d5249d4d1d4a4e547a glibc-langpack-aa-2.28-251.el8_10.11.aarch64.rpm c1f5799e3792c627b60c18143003f4578d4f63ab00565d027c9a20d7a4b857dc glibc-langpack-af-2.28-251.el8_10.11.aarch64.rpm 817c1b04995571b9fb7d779f51c36d595e584438ff96d449af72ae2818d22c18 glibc-langpack-agr-2.28-251.el8_10.11.aarch64.rpm 92ef404176642ab94b209d1e9ac17e2fe94818bf98fa25ec6e6821c61e3bd77f glibc-langpack-ak-2.28-251.el8_10.11.aarch64.rpm 4b7083af9ee692aab03e54d8ca50e7c511678f0b7997020932a0b44c2000d8a1 glibc-langpack-am-2.28-251.el8_10.11.aarch64.rpm a1f0562a595b738f1562878012cbadecd396a29676882dbe3809e445feadffe4 glibc-langpack-an-2.28-251.el8_10.11.aarch64.rpm 9c88634dddf40037bcd7353b8af06ff646e79fcca42588644b25f69ae6f0f400 glibc-langpack-anp-2.28-251.el8_10.11.aarch64.rpm 8719fc28bc85824a2cfba84518a8cf74478db16966188243a452bd1638788047 glibc-langpack-ar-2.28-251.el8_10.11.aarch64.rpm 51104b53ebef4691d1debefbc30026f90be5c296500c05cf5ef12d7e1506bd5c glibc-langpack-as-2.28-251.el8_10.11.aarch64.rpm 214a5a36022e1bfbc6ff721e9f6be6b1bf6214d871fa729444f3a133c13320c1 glibc-langpack-ast-2.28-251.el8_10.11.aarch64.rpm 37e122fe6afeb85a2df3a02bd2d18de1f8f70ef1e9f30bc192f810c2598b5a30 glibc-langpack-ayc-2.28-251.el8_10.11.aarch64.rpm 72dcfb5e9518376c3726ef681730d114e7f6ea19bb0052070749b2519d442e8c glibc-langpack-az-2.28-251.el8_10.11.aarch64.rpm d5fd74ae5ee06f47d0d8e70b0f8374cf73875d3d33623aea98637a4f11ac95e7 glibc-langpack-be-2.28-251.el8_10.11.aarch64.rpm 717c2ea768a1971110703c3a82f7f5a6f2426775f27e8dd1c10f94afdff87167 glibc-langpack-bem-2.28-251.el8_10.11.aarch64.rpm 12aca8f3ed67ee060b72f350d6e834ba8c033ca573a7cd31cc404cd911166cd2 glibc-langpack-ber-2.28-251.el8_10.11.aarch64.rpm 55b6685ef58a552174e3fb17c74a79f4c3153a2ad0bb1361cfb3c0b6b31f2d2d glibc-langpack-bg-2.28-251.el8_10.11.aarch64.rpm 4df572be319fcb480c460f3683d4fe4715058b24749dedc37da7b7f95472f6ae glibc-langpack-bhb-2.28-251.el8_10.11.aarch64.rpm b8e8072ea13b6b1ae466733e11dc21ed0394cfbbfe8a27a6ee9e13e50077a5df glibc-langpack-bho-2.28-251.el8_10.11.aarch64.rpm b93539dc77148093aa17194fe300d3643f582d27ab552fbed5a66209cd424187 glibc-langpack-bi-2.28-251.el8_10.11.aarch64.rpm 63f5e3e2a32ba3c4aa5a3892de3c290774ef1384d10b6cb4d234a4957b140d91 glibc-langpack-bn-2.28-251.el8_10.11.aarch64.rpm 5994a723aadc45f87af9ebadbe4f049849948b44b9e59efc759c371689956ece glibc-langpack-bo-2.28-251.el8_10.11.aarch64.rpm 50c6c3eafcf1880e30e8ee190cd16c7b0da509439038f2946943c61b925ed813 glibc-langpack-br-2.28-251.el8_10.11.aarch64.rpm 8ad5a7c9910761e5d57a6640a401569361035b3a302ab404bfefc1de5514b543 glibc-langpack-brx-2.28-251.el8_10.11.aarch64.rpm 9444ac434b03bae428288d554710b8dd0440188360c25fd8aa1732b53421910b glibc-langpack-bs-2.28-251.el8_10.11.aarch64.rpm 3bc2c5220ed560f592c8db608d59791f5b5bda4696376e057d5bb6f4f32bd038 glibc-langpack-byn-2.28-251.el8_10.11.aarch64.rpm 77a145489f8a35be34c591a6d5d9d74a5b078e5e75928b5aa1e0e8fce44d1e6f glibc-langpack-ca-2.28-251.el8_10.11.aarch64.rpm 2497a690ba8d226e9229249359643bdf6ce7b3472d64a1b721e000d152ce6334 glibc-langpack-ce-2.28-251.el8_10.11.aarch64.rpm 399603d96e8a42103dc2202715e40050a6fbec8e9f84eb86c0c6345eae55d957 glibc-langpack-chr-2.28-251.el8_10.11.aarch64.rpm bb896a53acb25f726c3f0008065ad55b8e4f67cc1c6634fb8d734315e5bd7d22 glibc-langpack-cmn-2.28-251.el8_10.11.aarch64.rpm 370583d3056d60e8be21e40031ecb45fe69b3a9c14d1a4f813a4926a59390815 glibc-langpack-crh-2.28-251.el8_10.11.aarch64.rpm bd59fa722d63515bfa5da5003eb34a33e847a37a5e1e26583edd1ac0912be4d8 glibc-langpack-cs-2.28-251.el8_10.11.aarch64.rpm 6d21ecdb413e39c53b4c372d85edb1ced588e3e25dd913aeed564bd57e1fc11c glibc-langpack-csb-2.28-251.el8_10.11.aarch64.rpm 78acaf97e073639069964be82a22387d129073410b99fa51e9a028f517dea83b glibc-langpack-cv-2.28-251.el8_10.11.aarch64.rpm b46230a1697ef529ad357db8b9dcc574aa8bc4c9ac3077c2d6e463ecf0870429 glibc-langpack-cy-2.28-251.el8_10.11.aarch64.rpm 14d90fe7369befb167d3c5aaff4aadb164b805f9db74d18c03debb197e5516ed glibc-langpack-da-2.28-251.el8_10.11.aarch64.rpm 02495b2135bb105d1aa8adb11d4d7ed0f7a493ceeb4f5cd90e93159180989247 glibc-langpack-de-2.28-251.el8_10.11.aarch64.rpm 6868fd57130b7d90e55248d8bde8568f54e276300ef742cfcec2e542433ab4ec glibc-langpack-doi-2.28-251.el8_10.11.aarch64.rpm 1816b8663c366388001a6a8f05f0d22764a65576531f2f4b20c7c4195939d190 glibc-langpack-dsb-2.28-251.el8_10.11.aarch64.rpm 421bcfbdfcf96ae52c9ecffaf244d2a4bddbd7271c80b9d57569d46f19fa4408 glibc-langpack-dv-2.28-251.el8_10.11.aarch64.rpm d13f7c1201965dd841cfb1b32830faaae6d84e34576b96728f97ca26a504b965 glibc-langpack-dz-2.28-251.el8_10.11.aarch64.rpm b1ae543c24aa3574ceb9e6b031cda868e7bf6f775856af54e9a1370535945cbe glibc-langpack-el-2.28-251.el8_10.11.aarch64.rpm d45202778d3752984dd784ceb953389c24b95675f7414e2fd51202a970c87446 glibc-langpack-en-2.28-251.el8_10.11.aarch64.rpm 8b9bee322e0c462ecc058ce8a7f1e89bc3e462c113b133c4b838d83c639cd6c3 glibc-langpack-eo-2.28-251.el8_10.11.aarch64.rpm 594ee29328469731d54b1fbb2ffca7978ab80b65289ecfbb502f69f4cdce9b45 glibc-langpack-es-2.28-251.el8_10.11.aarch64.rpm 6a1fae7668c78813b5b92307f6b42a5f71037356b81e0b048d23fa4ebe846ab1 glibc-langpack-et-2.28-251.el8_10.11.aarch64.rpm bf48f7f2c5120b1d3e1de3c138e2f118e967a04bd7575c2386f13780af9446c4 glibc-langpack-eu-2.28-251.el8_10.11.aarch64.rpm fdd20d933e94d1b46c1360e0bf1f7d0ce42e0bdafdf72b468ae1578d2ab69376 glibc-langpack-fa-2.28-251.el8_10.11.aarch64.rpm 6e2c8d7655155baf95521631391d2bc76668f13bbf15b31ed23bb9b2cbee07e9 glibc-langpack-ff-2.28-251.el8_10.11.aarch64.rpm 6ed8431414814a7c243d606a09c0f2c2fda38fa361532806c64c1f5c60e5aaf1 glibc-langpack-fi-2.28-251.el8_10.11.aarch64.rpm f42806578258983c2c812d9a5792677ca1c49fb964a560f4a8ee4519d17a94b7 glibc-langpack-fil-2.28-251.el8_10.11.aarch64.rpm e3458d5fbccb2b10ce14035073669841d9fb5360421d42e6edb56a54e1257b02 glibc-langpack-fo-2.28-251.el8_10.11.aarch64.rpm 3de7afff4c2ecff20537d93d06b9ec9a2016b348a5872f9951210d17661851cb glibc-langpack-fr-2.28-251.el8_10.11.aarch64.rpm 15b1db73c739535cbfc7af8be5ba0072c08b274aa270f4034ba33951b127ace0 glibc-langpack-fur-2.28-251.el8_10.11.aarch64.rpm 0429c3f3f5c68a56269a96817760ff4fb8808f669d655757113f78e22f2d6f3b glibc-langpack-fy-2.28-251.el8_10.11.aarch64.rpm bcb7f68f8692c1c2d3c1031dfb44608c324463c14beff59422cf052d2c10f8d5 glibc-langpack-ga-2.28-251.el8_10.11.aarch64.rpm b6d1bf7fc8c882f5e5365bb69634c1f6dfca81fc43a4d38c962ad722c2da930a glibc-langpack-gd-2.28-251.el8_10.11.aarch64.rpm c61b4771a24fb9224f4f7b179577107a08a9614f4809a6fc5699cb34e1638ef4 glibc-langpack-gez-2.28-251.el8_10.11.aarch64.rpm e0b5ecbb388c01cf9c6c30640fa96810a1013f449899f7e11dc26b821b13dd60 glibc-langpack-gl-2.28-251.el8_10.11.aarch64.rpm 7c4be01ff7dd0b5762428a1bc4c61e6486982d2c761a0252dbe1c69253d57dba glibc-langpack-gu-2.28-251.el8_10.11.aarch64.rpm 3205a3a8affeb266aeaabefbae199b1b053622c5754178a71815d958f67b6b4d glibc-langpack-gv-2.28-251.el8_10.11.aarch64.rpm 7e2bdc8a38ed2cb29387a99d035ee88ce7c5579c80809c14405856ebd57d3beb glibc-langpack-ha-2.28-251.el8_10.11.aarch64.rpm bf1b07674ad5753da1689277197f133e8f31b4fd3051d2de046bc6f201395d9c glibc-langpack-hak-2.28-251.el8_10.11.aarch64.rpm 36fe080a2ec4490f74f4b70be40f864d2314c21e3def9832458e83b4bc36e1cb glibc-langpack-he-2.28-251.el8_10.11.aarch64.rpm eca3867f776e66a3f11bc7886194fa4681425339c165094314eb1f7c4e71f09a glibc-langpack-hi-2.28-251.el8_10.11.aarch64.rpm 9b6e327e6b1809437ffb816c54afb0b57e2e0c8b72b4a2714af840ae12f9161d glibc-langpack-hif-2.28-251.el8_10.11.aarch64.rpm e67326ae64b8a70d8681aa62128f8684eb4fa42f200c801c84e0c2eb1ec31fad glibc-langpack-hne-2.28-251.el8_10.11.aarch64.rpm 01f613f82d4f366deac05f2694dac68b851a081c3035b7ff5bbbca155ee3afb7 glibc-langpack-hr-2.28-251.el8_10.11.aarch64.rpm f6195606bf175908af0e9bd16a3ba55e3bdfff2c0241dbb584fa7760a8f9c71f glibc-langpack-hsb-2.28-251.el8_10.11.aarch64.rpm c8687fb1d3e5ef29a3965d5718ee5aee8b61e734f54e314c96fd9dfdfbca0ad6 glibc-langpack-ht-2.28-251.el8_10.11.aarch64.rpm 7581f69ed398cbd35313ea7f502019cdba52422d647437a66e4761dc0d03dd05 glibc-langpack-hu-2.28-251.el8_10.11.aarch64.rpm 37b9a33deb9552b222f133fe8199628b51bf2e5f268f370768a1f43803ba8414 glibc-langpack-hy-2.28-251.el8_10.11.aarch64.rpm b324115046c084439e075988aaea43bacdeee7a691a8e837b8a1092a5a45f74c glibc-langpack-ia-2.28-251.el8_10.11.aarch64.rpm 514885b5f7c45c05555f66ce23b210ed85e2c159583d0f4d63b07e0a96c2ffcb glibc-langpack-id-2.28-251.el8_10.11.aarch64.rpm b9c19611a0d02bc33ae55a8eabe19a446f3db84943367f6884edc17b9e5f8e3d glibc-langpack-ig-2.28-251.el8_10.11.aarch64.rpm 8473a031dcaf5545cca49819b9b25e51e3ce90123638cbef507bad89addc2cf8 glibc-langpack-ik-2.28-251.el8_10.11.aarch64.rpm 14f40ff2f8ed6bcf1737b51afb5346b21fc997a8ca87f4d5d8eb5c1e6a50bd1a glibc-langpack-is-2.28-251.el8_10.11.aarch64.rpm 9369985d661a3b517f9bac3ccb4c2c826a1abcae3be7da8f368791801e79fd43 glibc-langpack-it-2.28-251.el8_10.11.aarch64.rpm f016ba71839d868264a2b150374b82bd64da9875cad9a3ca4e627006641fd794 glibc-langpack-iu-2.28-251.el8_10.11.aarch64.rpm 1664c3489a7765f7e69456797118933430b9699280df9b4e2a54eea9c01c513f glibc-langpack-ja-2.28-251.el8_10.11.aarch64.rpm a36a4d0987e974533aef4ae060370289ffe993d968a8f24b0b84b20e0ebdebc0 glibc-langpack-ka-2.28-251.el8_10.11.aarch64.rpm 467cb501682fc87937105064592e2b63b120b75efce84b5adeacdab4e21e1de0 glibc-langpack-kab-2.28-251.el8_10.11.aarch64.rpm 66d03ebf7dce38409b419ddc6c9177aa79c35680c7fca652f32dec561ae48d1e glibc-langpack-kk-2.28-251.el8_10.11.aarch64.rpm 0f6fc872ca1c87e247cb604cd1c5d5f745a75f9e14ea4cd99f396b5f8e6d3d9a glibc-langpack-kl-2.28-251.el8_10.11.aarch64.rpm 0a472cfd403c7ed1a40f351cae26545ded7ae9fada2ed72aa60c897d077b4f4a glibc-langpack-km-2.28-251.el8_10.11.aarch64.rpm ae23d8a0e435d6580129f32e0cad354b36286ab4d327cff15389408c638aaac8 glibc-langpack-kn-2.28-251.el8_10.11.aarch64.rpm 493faf5a09d865f364f4541637700c6f9a3e767a2e5b71186d0382a76e2eb1e2 glibc-langpack-ko-2.28-251.el8_10.11.aarch64.rpm ff5b2f4781de59e193e9acf8a4a15a17030f274d2e8e06463fe346f95a88b29b glibc-langpack-kok-2.28-251.el8_10.11.aarch64.rpm 0ea93e3b3fdedee8e8320ec5d06fec2c1299c0e141794f8a752c766360a4e7f6 glibc-langpack-ks-2.28-251.el8_10.11.aarch64.rpm 82c400926dd1f4440d9131ab017ae7c329155217248982141632cbe414656c82 glibc-langpack-ku-2.28-251.el8_10.11.aarch64.rpm 74df8f814a2a551171ce85dd2f19ec7767151b9e14c72d50c0bd092f040e05e9 glibc-langpack-kw-2.28-251.el8_10.11.aarch64.rpm a06144da26ae59d91a52e6fa33934a22e628b9e551b6b84deed043a2d74c2377 glibc-langpack-ky-2.28-251.el8_10.11.aarch64.rpm 56d755eb7d0e2374ff0732055b18e5fc7b86069095164459a3f79181a2b5008f glibc-langpack-lb-2.28-251.el8_10.11.aarch64.rpm d0743872833849f28e759040c7c7fa043e615f87483c1a0f889d891df9a1cadc glibc-langpack-lg-2.28-251.el8_10.11.aarch64.rpm 05c76090953f93d82b9bf8964986e5c80d37e3245b927783d7d84a6f31b8dc54 glibc-langpack-li-2.28-251.el8_10.11.aarch64.rpm 84ba24727f9d9756009cb23c5290a609fb9f4d4174694b6524a7f3ecaf46b151 glibc-langpack-lij-2.28-251.el8_10.11.aarch64.rpm d4bcf173615131e94e9eafcffd8621ebb751b85025512b421ad2687b6f91ed40 glibc-langpack-ln-2.28-251.el8_10.11.aarch64.rpm fc79e137434c6641bb10c543f299dfffb96dab07d09c30cd1a8d1093b7952e28 glibc-langpack-lo-2.28-251.el8_10.11.aarch64.rpm 553aa714e6a5f39b71fdc21ddb94b9ecd04e36647ee53bdd40045ec5f765d800 glibc-langpack-lt-2.28-251.el8_10.11.aarch64.rpm 0d460e65188cc72e00bef11ff4a8baf905b8298452c1614273614be6ac4c5aa9 glibc-langpack-lv-2.28-251.el8_10.11.aarch64.rpm 9366eef1c3b3072029c8cda0bd0d5a49757c3acb0034573073eceb540e560f23 glibc-langpack-lzh-2.28-251.el8_10.11.aarch64.rpm 3f80a0d01cbc13744d73ba4ee7bfa41c623a481b18e9cae09d58c63da562bd40 glibc-langpack-mag-2.28-251.el8_10.11.aarch64.rpm 2987f3491084574292d312882a9578878558397eb91bfa69f0f2da3aee0fdd3f glibc-langpack-mai-2.28-251.el8_10.11.aarch64.rpm 19abb43a9b6a3c5cc0a225bb48abb4d23f5ebb577f28bb3c17535f85802aa8d4 glibc-langpack-mfe-2.28-251.el8_10.11.aarch64.rpm 81f1b2a037a9e551754d087cf5d1773d7c20013eedd1f114dff931fdd9270270 glibc-langpack-mg-2.28-251.el8_10.11.aarch64.rpm cf2a7faaa273e1e201f619384289899a4ca36bcba26023914c60f8b4a7c5d4aa glibc-langpack-mhr-2.28-251.el8_10.11.aarch64.rpm c1cf109ce2f067893c46b37870a16799bbb9f9eab371a562fba752364102b5d3 glibc-langpack-mi-2.28-251.el8_10.11.aarch64.rpm 3cb40cf917fc3ad2f070038b6c37658f34e46252a033002002d75cdc7bf81697 glibc-langpack-miq-2.28-251.el8_10.11.aarch64.rpm 4da3a2bc3de3e1b53ae6f64704b9da08f76b8f19dc24f5c4199e8c7a20368b13 glibc-langpack-mjw-2.28-251.el8_10.11.aarch64.rpm 6d0c586a908f885e6f548b38604839421164cb222249840a31f589b61c946cdb glibc-langpack-mk-2.28-251.el8_10.11.aarch64.rpm 62cbc7a5f79f739001fe4c23395aa70f77210c1ce2f387c657de8259d00f1b33 glibc-langpack-ml-2.28-251.el8_10.11.aarch64.rpm cd16b1819fe455e82f01c18ec62bb00b75c6ec8c81083eab2418dd86395d09bc glibc-langpack-mn-2.28-251.el8_10.11.aarch64.rpm 3879adb558a7d9ab044f5c59d813411488e844a7b384360d8a24f92abb342158 glibc-langpack-mni-2.28-251.el8_10.11.aarch64.rpm cb6c3d847e526a95e6e6724986312e80eacb82f77d5a0857ec26dbc28a321b23 glibc-langpack-mr-2.28-251.el8_10.11.aarch64.rpm 37d3d81664156984a3cde99212a872b278aaa28473143a94bb166561f04d4dfb glibc-langpack-ms-2.28-251.el8_10.11.aarch64.rpm 0a412df5c13954677276d7bef238cdf62c128ec98c27f0185b25936e5b92a62b glibc-langpack-mt-2.28-251.el8_10.11.aarch64.rpm 6af99ac8a625d30d16424660fb6790f121f2050636b9d275f7d998f9f6f2f002 glibc-langpack-my-2.28-251.el8_10.11.aarch64.rpm e529245316a26ab8935640609e56e55a92cd401cd726c95da6fcb5f516e96cea glibc-langpack-nan-2.28-251.el8_10.11.aarch64.rpm 4e3a44aa247ab464880f8ca21f3a67f1bd3eb2a3c30f18e329982b7da7f36475 glibc-langpack-nb-2.28-251.el8_10.11.aarch64.rpm c8e0f8153954c7503e25e33fcb8281d742829e985d2b25e7a57c55e8af9e70b2 glibc-langpack-nds-2.28-251.el8_10.11.aarch64.rpm 1a0f9fd64bdf621d3268502ccf1f8a02694ce0ee529c6301eb8465deb46ae2d3 glibc-langpack-ne-2.28-251.el8_10.11.aarch64.rpm c29220dc677bb4f58cb53a681b2dec69d6b90cd69b997e25e9c6845df5e9e694 glibc-langpack-nhn-2.28-251.el8_10.11.aarch64.rpm 2aa0c491c32f46357cfeae8275d8e24a062c9a8efcc96dd134fe68f64a21822c glibc-langpack-niu-2.28-251.el8_10.11.aarch64.rpm c1012a675d0d1b491a0163b4c6bb9364f5d8f7ab4e2d4293de6f95d2e61b9938 glibc-langpack-nl-2.28-251.el8_10.11.aarch64.rpm 66cbdcb7dec5621045bc52310bccd76ca4e4a8c4e901f464bd348a7984e92c4d glibc-langpack-nn-2.28-251.el8_10.11.aarch64.rpm d4ca8373087386e351f3c6c6fd02e0de67f029c61dae9a6178fa3b8c43d98b79 glibc-langpack-nr-2.28-251.el8_10.11.aarch64.rpm 8b1e0d1db2c9593250f739263c1798949ce64be6eeb15d16dbadce1f84c1a142 glibc-langpack-nso-2.28-251.el8_10.11.aarch64.rpm 5989b62a7776e0b17566f806cf8b945f7b9c4975445ed9e3297783d22013000f glibc-langpack-oc-2.28-251.el8_10.11.aarch64.rpm c1ad6a3234075b4fad9017ac002ce617d92a93c78f308dc924a4720f34ab602f glibc-langpack-om-2.28-251.el8_10.11.aarch64.rpm 0c41227471555094f3f79e607b9f82cd37cbb66f2110ed6f6d138b3fce7069e7 glibc-langpack-or-2.28-251.el8_10.11.aarch64.rpm 7237a8725e669db5754a3855eb6e2d34e7983395e44198454bd5781723e170dc glibc-langpack-os-2.28-251.el8_10.11.aarch64.rpm 9586b41640b906542c328a843546cfcff31b66d772f82788e1d58d6ae1739317 glibc-langpack-pa-2.28-251.el8_10.11.aarch64.rpm 507aea9b61a916f5e1810acc4970b24f69e63cc47c191935f204076dfc308dfe glibc-langpack-pap-2.28-251.el8_10.11.aarch64.rpm debf57dd29993988efd008f8318fe843c5e554b33076a0156053bee8cfb32552 glibc-langpack-pl-2.28-251.el8_10.11.aarch64.rpm ddaac49c6ed3d3967e811565aa7fd22bdce3c1d21fb85d04dba9eeddf95e66fd glibc-langpack-ps-2.28-251.el8_10.11.aarch64.rpm 357d51e5cdf6239935f96ec7034dbe0950eb844a77a083a9edf034f0edab571b glibc-langpack-pt-2.28-251.el8_10.11.aarch64.rpm adb75cab9ab1d19bfe3379b8321fbb7b234cecb6c9b02f62102db0c3f30e8e9a glibc-langpack-quz-2.28-251.el8_10.11.aarch64.rpm 019be27044525e456289e376fb5beea7dbc2ece3baec5487ba69a9a87eaa6029 glibc-langpack-raj-2.28-251.el8_10.11.aarch64.rpm ea029f4d4e11ecbc974ca42210046b5e417378ed3a0f58f4fe84dfd5e7483b18 glibc-langpack-ro-2.28-251.el8_10.11.aarch64.rpm 9071281e76eeb35e649156a1710c666dfae49d2d72ae83e28988a4cbb67f2f9a glibc-langpack-ru-2.28-251.el8_10.11.aarch64.rpm ac1381cdfebb0242930f629a06da40a601e9895089ae6349f99255f48fb4ed7d glibc-langpack-rw-2.28-251.el8_10.11.aarch64.rpm 2d1096265fa4bcb215d741dc11e854b5811fdf5be44380619f0c8d14fbdddcaa glibc-langpack-sa-2.28-251.el8_10.11.aarch64.rpm 2ca230512237c3b3e623b21f44af5d64e1b36d1ff5662575ef90221d1a2c56bb glibc-langpack-sah-2.28-251.el8_10.11.aarch64.rpm 4ef447023ece09351b91b87bab227df703ae3ec22f1a8398ad6458de7c010237 glibc-langpack-sat-2.28-251.el8_10.11.aarch64.rpm 86b48f47aa6b3f402637e8a14e4047177dbf004f3be6d8c613eb92038c988a75 glibc-langpack-sc-2.28-251.el8_10.11.aarch64.rpm 6321997025d0c55a38b9618cea30bff017713970bef55a30c5e00a658a1ffb59 glibc-langpack-sd-2.28-251.el8_10.11.aarch64.rpm 3809d9caa6b114e74e9cc18fe291fbd5dc452d2996436276a5e379ed48c29a23 glibc-langpack-se-2.28-251.el8_10.11.aarch64.rpm 327c0b47768056e570102d87c926a2e649a411078121a25954b5199fe082bc69 glibc-langpack-sgs-2.28-251.el8_10.11.aarch64.rpm 1dc7e6bdc45a109ba2cab86ad2f82e9b0f402cd9d66062d0b007de366065b6bc glibc-langpack-shn-2.28-251.el8_10.11.aarch64.rpm 97cf525a49d2b03040cc253c980311e7bee97859f8d31fdbdcf36711abf810ec glibc-langpack-shs-2.28-251.el8_10.11.aarch64.rpm 513464bafd04552e6e9e31d6aa69f29c07c95f3320b1cc72bc996d526883d8a2 glibc-langpack-si-2.28-251.el8_10.11.aarch64.rpm b6ec03b9af886ba5bc704bcaa94df6421a8b8d37ec31355c7d02c2f8b98b0ce4 glibc-langpack-sid-2.28-251.el8_10.11.aarch64.rpm 92e9765cdf605b10133b48b337db086e3397940de0ee54e326181907f518a11a glibc-langpack-sk-2.28-251.el8_10.11.aarch64.rpm 934d86b6c195797e50481f7ada7417eeff300d248442ea24fee769a323153ffa glibc-langpack-sl-2.28-251.el8_10.11.aarch64.rpm d6a057426d0f0b542f5a7f7d4c84e7121eb309afb2e0b37d60fcaaea38ac49f0 glibc-langpack-sm-2.28-251.el8_10.11.aarch64.rpm 3471ff7c4a5f7709b58933e7707183f6f59a9b138d15e7032b51e4b5f0b151b4 glibc-langpack-so-2.28-251.el8_10.11.aarch64.rpm b943944c61759a41e7cdd8cefd482e3cfaef868d5cf99d4b1fc7afa7edfcdd58 glibc-langpack-sq-2.28-251.el8_10.11.aarch64.rpm e10ee91c12a8451223b99fce96778a83e5767a19f403fb65034cda3aea7eb524 glibc-langpack-sr-2.28-251.el8_10.11.aarch64.rpm 5af270e5eead76c5e791926d0ea915095c5ae47d3d31ece6f34629ecd60fa9d8 glibc-langpack-ss-2.28-251.el8_10.11.aarch64.rpm 0f77c8b0e0383c1ca187e2bb64276b00e9c6d7d9951d92d4387f9df4fc5f5325 glibc-langpack-st-2.28-251.el8_10.11.aarch64.rpm fca817a05768c8eb5a9458c06645ec0c9e8c1e6bd95d31b2275a4dffe8fb72de glibc-langpack-sv-2.28-251.el8_10.11.aarch64.rpm 285c1dba3d15e981ad32e085c217110dff999e63522030a0682966226d9f0d88 glibc-langpack-sw-2.28-251.el8_10.11.aarch64.rpm 5cd724e6ed1181c40a789d3b087b59602d26eec2bc5626911aaa8ec9cec21c7c glibc-langpack-szl-2.28-251.el8_10.11.aarch64.rpm 2c3ba7a03099e5dbb559a1a937d0fa35d2ca4251d72bddfe515cf3b818030763 glibc-langpack-ta-2.28-251.el8_10.11.aarch64.rpm 584af1a570e2edef2020929b81c547eee4ca4f8ee4df9d63e52a71b037699015 glibc-langpack-tcy-2.28-251.el8_10.11.aarch64.rpm 45b725dcc4fed10f176d57ac8b464e26d467e0cf76dc2a26e05b84374043cac6 glibc-langpack-te-2.28-251.el8_10.11.aarch64.rpm dc336bad8cdd5c84a01837e40f6e0ab3185d39a2d068aeeaab3c4a4244c085f1 glibc-langpack-tg-2.28-251.el8_10.11.aarch64.rpm c3f71ac23183377e56adcd872ccab190b46a2fba220060fc93821b0e97e62dde glibc-langpack-th-2.28-251.el8_10.11.aarch64.rpm ea8f7ae13e6c8466445c5eab6c5e60117470a50947d9f3a9bffd28751388f353 glibc-langpack-the-2.28-251.el8_10.11.aarch64.rpm 98e3d4d84e7ee8064d7ba32d5d6afa8bb42fb111c67cc7a04a76d89b174c0656 glibc-langpack-ti-2.28-251.el8_10.11.aarch64.rpm 47a5d45129d6f94837a1369dd37e267b0fdcd62eef72896412514f65dd08a821 glibc-langpack-tig-2.28-251.el8_10.11.aarch64.rpm 945dd17e6f6df9bb52f3d147b8d7be8efae5fe9f961b3cc33f8e0cd214e0085b glibc-langpack-tk-2.28-251.el8_10.11.aarch64.rpm 766355a7cf9d1f68aeac6759940391591beb058546408e52a1b651a861ef666d glibc-langpack-tl-2.28-251.el8_10.11.aarch64.rpm 06ebb7157162a7e9f383b29f1692f5a46a9f566091590425f0a8f6cd72d8f68c glibc-langpack-tn-2.28-251.el8_10.11.aarch64.rpm 93d269037efcc48286916a029b2283f90da3596b900df8d9bf975bb0edd32a5b glibc-langpack-to-2.28-251.el8_10.11.aarch64.rpm 366e3f36c6810c1c442678cc9d1f0ca58038193026cf81149f93e0b2175feb25 glibc-langpack-tpi-2.28-251.el8_10.11.aarch64.rpm dbec9fedb17a8ff70aa5c6276328b1a046dda4241cb829eeca1aea57f6c5c108 glibc-langpack-tr-2.28-251.el8_10.11.aarch64.rpm 46c32ef6985f6582610fb53836e1b6da4b6adab8bf90a0f846e5e18a61d7a383 glibc-langpack-ts-2.28-251.el8_10.11.aarch64.rpm 3ba9a8cbeb1f6bfcb510de2fec499ca01602b14b52a5149e6c6e3ceaa9e05bd4 glibc-langpack-tt-2.28-251.el8_10.11.aarch64.rpm d934bc921ad306f9af399eea03e09e2166edf8fc6929d26718f4e0074eacef6a glibc-langpack-ug-2.28-251.el8_10.11.aarch64.rpm 9873359d7a1caf2411d45adea614897582e1d03b15ba3fbce115e58a62782fb7 glibc-langpack-uk-2.28-251.el8_10.11.aarch64.rpm 5d2847dcb26cc8e21222a0a0fbf97549bad9358a732b63774af9abae7da2ec4b glibc-langpack-unm-2.28-251.el8_10.11.aarch64.rpm 86eea4d43b3002e4c7b98604c18204fbd11461969b7d1b54c21f266f304ff200 glibc-langpack-ur-2.28-251.el8_10.11.aarch64.rpm a81a961ee850b57b08b4d27f19498e95794fc9ca50de499c67f4b2e6ce5982bb glibc-langpack-uz-2.28-251.el8_10.11.aarch64.rpm ffb3b161ee19110caa57940ee38727e9536f488194fe6e844d3336494070121e glibc-langpack-ve-2.28-251.el8_10.11.aarch64.rpm 62f5c054f81939c65b42bf5778f723f0abb9171e36a94db9d69f0fa7de782f33 glibc-langpack-vi-2.28-251.el8_10.11.aarch64.rpm eaeaaec75e8bb15fb6741b2c165d8b9bfa34b08e3b72f04712a62cd7922538a2 glibc-langpack-wa-2.28-251.el8_10.11.aarch64.rpm af37d51b677e45a8d6ae6b533e0604d4397f210684cf640fd323780532ba307b glibc-langpack-wae-2.28-251.el8_10.11.aarch64.rpm 7f1baa3238dcbf82bc38601f63fed16c3b33acdf0765fd2fc3579a4e32dec34f glibc-langpack-wal-2.28-251.el8_10.11.aarch64.rpm c267f84da2cb15bf64f4f2216d91e578411bacd9510be5cffaaa40b33a7e6f0a glibc-langpack-wo-2.28-251.el8_10.11.aarch64.rpm 8da7aaec3accd1fde87e91223b8d2417640ee3ba061f1ed86d33b14e78130d36 glibc-langpack-xh-2.28-251.el8_10.11.aarch64.rpm 515fe5185fb1d126436917ef62833a7d3b84888a72b44b17400ef78a686f70a4 glibc-langpack-yi-2.28-251.el8_10.11.aarch64.rpm 0c97d2863e6fbddaa0e5f44445e7d3ff758faa5aa24c99ad70780df48d0e3380 glibc-langpack-yo-2.28-251.el8_10.11.aarch64.rpm 59a8a6ee9ee1902369c3a094a03bbb39430b9fea90b86925c5c0ab09653cb7ee glibc-langpack-yue-2.28-251.el8_10.11.aarch64.rpm bc7553a36a1733de22eb85495d9c57d19a263fb013cc31655fc072e1b07de54e glibc-langpack-yuw-2.28-251.el8_10.11.aarch64.rpm 251e51e6a534cefea80b5dd8a40de17a01f53a6b45d17043944d3bf6918318ec glibc-langpack-zh-2.28-251.el8_10.11.aarch64.rpm 3d99637c6f6ddeafa3e176a0bdd3af9044585cebd175ff2090d079f40fc578e0 glibc-langpack-zu-2.28-251.el8_10.11.aarch64.rpm 31954547032a691302e561412c94cb0a77d19bac4e37351464c934b285019f5e glibc-locale-source-2.28-251.el8_10.11.aarch64.rpm ea21d4b21da8ed9877597431d40c722fe3405b0197f228c491ef4266d2dd414f glibc-minimal-langpack-2.28-251.el8_10.11.aarch64.rpm 5796eb5151500ecb6f16796bf407b4bae363b7542989b01d4b691a70fa1366df libnsl-2.28-251.el8_10.11.aarch64.rpm fc39b699425e1d63a7337c6ed505ef6c1d699c7489719ff12d021f77a1aa2fc1 nscd-2.28-251.el8_10.11.aarch64.rpm cbc16581fc6a2e9497b0e907e16fb222a54ba6c5d3101c90cd5b46dee84deffb nss_db-2.28-251.el8_10.11.aarch64.rpm 53538ee52362f4014423e137d4fc280b97f90e235b665b02455a3c48c1c34bd4 RLSA-2025:1917 Important: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme (CVE-2025-1244) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms emacs-filesystem-26.1-13.el8_10.noarch.rpm f50e8e13e6f8829a6621cd2055322c7d5e978d14b09f97aef2d5460a7a7fa99a emacs-filesystem-26.1-13.el8_10.noarch.rpm f50e8e13e6f8829a6621cd2055322c7d5e978d14b09f97aef2d5460a7a7fa99a RLBA-2025:2352 kernel bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Bug Fix(es) and Enhancement(s): * virtio-net virtqueue causing stalled socket (JIRA:Rocky Linux-72886) * System hang due to soft lockup during snapshot removal with large hash list traversal in dm_exception_table_exit() [rhel-8.10.z] (JIRA:Rocky Linux-76230) * [Rocky Linux-8] Lots of tasks are getting stuck in rwsem wait where the rwsem owner is calling throttle_direct_reclaim() and waiting (JIRA:Rocky Linux-64950) * [Alibaba] Network PPS(Package Per Second) fails to meet the declared value in Spec against Gen8 AMD instance families on Rocky Linux8.10 (JIRA:Rocky Linux-66261) * [Rocky Linux-8.10z] rping loopback test over vlan fails to run (JIRA:Rocky Linux-75826) * kernel panic in ovl_dentry_upper() due to null pointer dereference (JIRA:Rocky Linux-76161) * Rocky Linux8.10 : Tapes are broken again on newest Rocky Linux8.10 kernels - kernel-4.18.0-553.36.1.el8_10, Rocky Linux9.5+ affected too (JIRA:Rocky Linux-78415) * NFS server thread blocked in flush_workqueue() (JIRA:Rocky Linux-79458) none-baseos-rpms bpftool-4.18.0-553.42.1.el8_10.aarch64.rpm 52c3818db8e44bc29dc39c87b8dd9e85f2ef6ab1eb12351ec88efcb3508d3708 kernel-4.18.0-553.42.1.el8_10.aarch64.rpm 6049045e8d4a0f87238d299f9f5c38d796343da94183fb7a25c5eae4afd36f5a kernel-abi-stablelists-4.18.0-553.42.1.el8_10.noarch.rpm 5c1c13ae9894a9e10150d590e9b985be41a79eb555042f8e0ccc5b51e5f40b92 kernel-abi-stablelists-4.18.0-553.42.1.el8_10.noarch.rpm 5c1c13ae9894a9e10150d590e9b985be41a79eb555042f8e0ccc5b51e5f40b92 kernel-core-4.18.0-553.42.1.el8_10.aarch64.rpm 4d341e06a26ff67eab7518522d61ea3f915125b591528cb82732d0b8abba661b kernel-cross-headers-4.18.0-553.42.1.el8_10.aarch64.rpm defdd200063498ccdb125e09d248d098703d7b1b11401c5929d986d35d1ec7d6 kernel-debug-4.18.0-553.42.1.el8_10.aarch64.rpm fc9a40bc4911a2f1de337bdb7932fa3ebb785311a74288c1c26d40a4d3281708 kernel-debug-core-4.18.0-553.42.1.el8_10.aarch64.rpm 761f701bb30aa2c8b2639332dfc2d330bc5ccc0df68e24dd098e858c80cc36a1 kernel-debug-devel-4.18.0-553.42.1.el8_10.aarch64.rpm c0c1623e1fac8e8801f43e930dca98b0cfddf10e154d233ccd47309acbceb4d2 kernel-debuginfo-common-aarch64-4.18.0-553.42.1.el8_10.aarch64.rpm a31ac9a417712877ac7d1c273f5ea8329ed737d87b2c03cf89473bd151f2a6bc kernel-debug-modules-4.18.0-553.42.1.el8_10.aarch64.rpm e7ae94c29be5f2cf5aced53fc8211f488f75e5e868d3dc5c368b9a47d745b665 kernel-debug-modules-extra-4.18.0-553.42.1.el8_10.aarch64.rpm 59e633e3f35edda6599c100a07501b3c9b56122f9c666412b6f9c1e183b9162e kernel-devel-4.18.0-553.42.1.el8_10.aarch64.rpm d963b76b03863b331c7e06bf6b34f2b1ba0943ad78e467f5a8c8324e8de4298f kernel-doc-4.18.0-553.42.1.el8_10.noarch.rpm 67b90d74fde1aecd967b3bfacea52d07693ac96de234bf2e693a2c695bd986f0 kernel-doc-4.18.0-553.42.1.el8_10.noarch.rpm 67b90d74fde1aecd967b3bfacea52d07693ac96de234bf2e693a2c695bd986f0 kernel-headers-4.18.0-553.42.1.el8_10.aarch64.rpm b02fcd0126ce4f4602f4b26d169a7a5ed0deee997d6c2d49ae8b18ff3ee979a7 kernel-modules-4.18.0-553.42.1.el8_10.aarch64.rpm bc0b1e055917b9e53eb56283b7144a92c552e79bc99424d1ba11dcc956b0123d kernel-modules-extra-4.18.0-553.42.1.el8_10.aarch64.rpm f760b618260b8b110e1b38255fd35562409d9cef565ea9cd7f54be3628561373 kernel-tools-4.18.0-553.42.1.el8_10.aarch64.rpm 8a41be32c7326cbb76b77bad8ffb3610b9173d33ac836f0030b0b2b547837398 kernel-tools-libs-4.18.0-553.42.1.el8_10.aarch64.rpm ca92ebc072e153c22fba78264e0257ea5d26d6650a34b82ebf23b832c7e64bb3 perf-4.18.0-553.42.1.el8_10.aarch64.rpm 3f42ad34bac6c2055bf400222280f8a2a89863ea213f424adf5c3dc8cb6c21f5 python3-perf-4.18.0-553.42.1.el8_10.aarch64.rpm c318569249e3940c72e00751a69d377ed3632507b7b452430fddb871e6e6167e RLBA-2025:2590 tuned bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for tuned. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Bug Fix(es): * Tuned on AMD cpu: "sched_migration_cost_ns" overwritten on "postgresql" profile (JIRA:Rocky Linux-70470) * Tuned strartup after a long delay causes long reboot times (JIRA:Rocky Linux-71457) none-baseos-rpms tuned-2.22.1-6.el8_10.noarch.rpm 0343c745556dbcd17bc876dfbdd0c7957a1adb93c3fc32fa508e00b67bab7199 tuned-2.22.1-6.el8_10.noarch.rpm 0343c745556dbcd17bc876dfbdd0c7957a1adb93c3fc32fa508e00b67bab7199 tuned-profiles-atomic-2.22.1-6.el8_10.noarch.rpm 87beb780e771409eb661b8bd1e2174f2243ff6b4d432ff4c00c06412f09c5b99 tuned-profiles-atomic-2.22.1-6.el8_10.noarch.rpm 87beb780e771409eb661b8bd1e2174f2243ff6b4d432ff4c00c06412f09c5b99 tuned-profiles-compat-2.22.1-6.el8_10.noarch.rpm ff44aff353487b973e42232ebab39678318f62534c9ef1408ed9f582d074acce tuned-profiles-compat-2.22.1-6.el8_10.noarch.rpm ff44aff353487b973e42232ebab39678318f62534c9ef1408ed9f582d074acce tuned-profiles-cpu-partitioning-2.22.1-6.el8_10.noarch.rpm e7c3f6a7ebba37d454cdcbda0797baf697d7583767da04940f96f0aecdde8d47 tuned-profiles-cpu-partitioning-2.22.1-6.el8_10.noarch.rpm e7c3f6a7ebba37d454cdcbda0797baf697d7583767da04940f96f0aecdde8d47 tuned-profiles-mssql-2.22.1-6.el8_10.noarch.rpm 7754a43580724b4435eab7918241166332bdb6e7d67565cf9199fa13362054ed tuned-profiles-mssql-2.22.1-6.el8_10.noarch.rpm 7754a43580724b4435eab7918241166332bdb6e7d67565cf9199fa13362054ed tuned-profiles-oracle-2.22.1-6.el8_10.noarch.rpm 69c195e2f6ad2f30a378d014ab8d5a683f3bf4bf3a037a82def74e15532ca23b tuned-profiles-oracle-2.22.1-6.el8_10.noarch.rpm 69c195e2f6ad2f30a378d014ab8d5a683f3bf4bf3a037a82def74e15532ca23b RLBA-2025:2591 autofs bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for autofs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The autofs utility controls the operation of the automount daemon. The daemon automatically mounts file systems when in use and unmounts them when they are not busy. Bug Fix(es): * autofs: deadlock between mnts_lookup_mount and mnts_remove_mount (JIRA:Rocky Linux-72524) none-baseos-rpms autofs-5.1.4-114.el8_10.2.aarch64.rpm dd768cd0d7738ce75612dbf6a14ff57491f185aabed986174f59d1f81c5ebae6 RLBA-2025:2592 NetworkManager bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for NetworkManager. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list NetworkManager is a system network service that manages network devices and connections, attempting to keep active network connectivity when available. Its capabilities include managing Ethernet, wireless, mobile broadband (WWAN), and PPPoE devices, as well as providing VPN integration with a variety of different VPN services. Bug Fix(es) and Enhancement(s): * Primary and secondary IP's are swapped using nm-cloud-setup on Azure over random reboots [rhel-8.10.z] (JIRA:Rocky Linux-69462) none-baseos-rpms NetworkManager-1.40.16-19.el8_10.aarch64.rpm 9724f2b5048652e398dd059eaa38eb94e2e694255a6b05760564c497ce854548 NetworkManager-adsl-1.40.16-19.el8_10.aarch64.rpm 7639b9ae080ca206db28eb301c1441cae3efa8109e6c62d4352dda73cd1aa958 NetworkManager-bluetooth-1.40.16-19.el8_10.aarch64.rpm 619ad0edfa9430b500d3468a4cc080ee1809ad1d531aef64eed0d6bd7999ff43 NetworkManager-config-connectivity-redhat-1.40.16-19.el8_10.noarch.rpm 6f565e0c04c027db1a22da2eb68b91f53c0cc8e1c225d9117890d9196a2f80e7 NetworkManager-config-connectivity-redhat-1.40.16-19.el8_10.noarch.rpm 6f565e0c04c027db1a22da2eb68b91f53c0cc8e1c225d9117890d9196a2f80e7 NetworkManager-config-server-1.40.16-19.el8_10.noarch.rpm 43ec06f498fdcb6a3e2f2988ec5e0f394f9263bd42d58c05b017ad2a604413eb NetworkManager-config-server-1.40.16-19.el8_10.noarch.rpm 43ec06f498fdcb6a3e2f2988ec5e0f394f9263bd42d58c05b017ad2a604413eb NetworkManager-dispatcher-routing-rules-1.40.16-19.el8_10.noarch.rpm b4b044a52b4cd507fedea41b524733b8960e9958ffadacdff28493c0d1f4dd3d NetworkManager-dispatcher-routing-rules-1.40.16-19.el8_10.noarch.rpm b4b044a52b4cd507fedea41b524733b8960e9958ffadacdff28493c0d1f4dd3d NetworkManager-initscripts-updown-1.40.16-19.el8_10.noarch.rpm d70962d2d7e355c2fe14daa6d707983c0508995e8ca1abf266c137d81e53869a NetworkManager-initscripts-updown-1.40.16-19.el8_10.noarch.rpm d70962d2d7e355c2fe14daa6d707983c0508995e8ca1abf266c137d81e53869a NetworkManager-libnm-1.40.16-19.el8_10.aarch64.rpm bb54b31cfe3ae765b232657802a6a8f1171ea1431b609d71bbfb4ca96c30cb80 NetworkManager-ovs-1.40.16-19.el8_10.aarch64.rpm c675046fe807b571c8cc3de9e676424de3ae35a211d1ebcaf0c88af20be52585 NetworkManager-ppp-1.40.16-19.el8_10.aarch64.rpm 6da4aa085d4c762fffb0bdc79caf43f56f23fa9f59c69fd183675b4d7faca5a4 NetworkManager-team-1.40.16-19.el8_10.aarch64.rpm aa8758b8e4df446e01044f7e2f5bbc924d35c18effdf3d24cb57a67b2170f5c3 NetworkManager-tui-1.40.16-19.el8_10.aarch64.rpm 481fb4b348dfd3211017a2b48012030bb05b03e5b69964dd7818ff92107e72be NetworkManager-wifi-1.40.16-19.el8_10.aarch64.rpm 8f646117dda34819e8e115dcf2b6ddd88db1a852d65c3730a037169cbf8c1d33 NetworkManager-wwan-1.40.16-19.el8_10.aarch64.rpm 3a07db184627db2056bfc224356ac3a682fa4ca4255989dbf4981f1bd77e74a4 RLBA-2025:2593 openldap bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for openldap. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenLDAP is an open-source suite of Lightweight Directory Access Protocol (LDAP) applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. Bug Fix(es): * Fix double file close when first TLS connection fails (JIRA:Rocky Linux-75823) none-baseos-rpms openldap-2.4.46-21.el8_10.aarch64.rpm cbd71f9b14565f5e21b5691d3a40c05c347271cae68b9f0cdd126234e2f00ff1 openldap-clients-2.4.46-21.el8_10.aarch64.rpm 3c5e55e37d7b3d891265c5e1b7d0fefc8cce6333318db1983ed0764c0a21fe8a openldap-devel-2.4.46-21.el8_10.aarch64.rpm 8dad39a262c7dfc2deedea0af2fff5360e1f883940c2a99d7e2abc48796106b2 RLBA-2025:2594 systemd bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for systemd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * systemd crashes due to a segmentation fault, leading to a cant-boot issue. (JIRA:Rocky Linux-76308) none-baseos-rpms systemd-239-82.el8_10.4.aarch64.rpm 3e4cdb9391813820929e69c40e8744f53efdfc3d06fbb73a4e60778ae1b03884 systemd-container-239-82.el8_10.4.aarch64.rpm 4c3b43fb76cad336c00a47b2f521dde1beedae0212fa68832f3bfefdc5f6cbc9 systemd-devel-239-82.el8_10.4.aarch64.rpm 3ea8bfcec88d240aae8f953a384a81fc240673f8ae0998e20d9f328f1d40c1b7 systemd-journal-remote-239-82.el8_10.4.aarch64.rpm e8a2116c4edaddf5da1acd67dad69623cef1beb3f5ce1c118ee3aab33aa0d947 systemd-libs-239-82.el8_10.4.aarch64.rpm 2c6d3ef8c3fdf5e0bbf6b3d6176ad5bb281a8976e6ee64cd22ff39aded6166b7 systemd-pam-239-82.el8_10.4.aarch64.rpm 7a6da510dd5719232e86fc4def3f10ff17709e065733541f194947e024ddc3ce systemd-tests-239-82.el8_10.4.aarch64.rpm d58cbaf275ec05da011718449e22f5d8b7fd16b80e11c542323dafd0a6ae6755 systemd-udev-239-82.el8_10.4.aarch64.rpm 2664c2b9b0e35d779c134799c37280f054a6bcbc2a3b428821fba72e888cfea8 RLBA-2025:2595 dnf bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for dnf. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list dnf is a package manager that allows users to manage packages on their systems. It supports RPMs, modules and comps groups & environments. Bug Fix(es): * dnf-automatic crashes with traceback for Network issue. [rhel-8.10.z] (JIRA:Rocky Linux-71545) none-baseos-rpms dnf-4.7.0-21.el8_10.noarch.rpm 12a3452adb0764a5193e3f07aa74791479ffbc4ca2a67eb7a0f2ee23329e1afa dnf-4.7.0-21.el8_10.noarch.rpm 12a3452adb0764a5193e3f07aa74791479ffbc4ca2a67eb7a0f2ee23329e1afa dnf-automatic-4.7.0-21.el8_10.noarch.rpm 75375f592b9cb8dcb68d1bdb2e1fe87eda5d3304376e218cee077b392ba1bf69 dnf-automatic-4.7.0-21.el8_10.noarch.rpm 75375f592b9cb8dcb68d1bdb2e1fe87eda5d3304376e218cee077b392ba1bf69 dnf-data-4.7.0-21.el8_10.noarch.rpm b83967cb5a3d140ba28e505406c215e56932308343f9e90fdbf2daafb6afa0cd dnf-data-4.7.0-21.el8_10.noarch.rpm b83967cb5a3d140ba28e505406c215e56932308343f9e90fdbf2daafb6afa0cd python3-dnf-4.7.0-21.el8_10.noarch.rpm 115d7df2b9ad7b762091b872a4800ff64580bb3c69370ddf9ddfb57d61700de0 python3-dnf-4.7.0-21.el8_10.noarch.rpm 115d7df2b9ad7b762091b872a4800ff64580bb3c69370ddf9ddfb57d61700de0 yum-4.7.0-21.el8_10.noarch.rpm fac6c9bc54140b8c6657f60d8722f271ef9b473be808c785db47f8401d4fbbbd yum-4.7.0-21.el8_10.noarch.rpm fac6c9bc54140b8c6657f60d8722f271ef9b473be808c785db47f8401d4fbbbd RLBA-2025:2596 lvm2 bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for lvm2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups. Bug Fix(es): * dmeventd needs to quit upon receiving SIGTERM (JIRA:Rocky Linux-8288) none-baseos-rpms device-mapper-1.02.181-15.el8_10.aarch64.rpm ea54495f6b42d1a4d09633fbfc3a5b34ed0f01202de822ce216c380b90233139 device-mapper-event-1.02.181-15.el8_10.aarch64.rpm f4dbb904c2fc555939da035ab6de063aa932c7fd4948406161bd643c1d9e7d7f device-mapper-event-libs-1.02.181-15.el8_10.aarch64.rpm 5565a14b47d31ef50c8fc47ca5c5fc0c79b517867c5cc6368854d4826cd30916 device-mapper-libs-1.02.181-15.el8_10.aarch64.rpm e7fd6dc8379c14e7cf6770899dbb88b29de61541b8ecd47d8672338507aeec10 lvm2-2.03.14-15.el8_10.aarch64.rpm c3290cdbd5f0222cc7191e0e5e0918b4a3a4167f5c4f426a5cf47a5263684a46 lvm2-dbusd-2.03.14-15.el8_10.noarch.rpm 4652826b127b06b71dd5a6a80b4bda48451f27f56dd60a09ac2974fb63b1b88d lvm2-dbusd-2.03.14-15.el8_10.noarch.rpm 4652826b127b06b71dd5a6a80b4bda48451f27f56dd60a09ac2974fb63b1b88d lvm2-libs-2.03.14-15.el8_10.aarch64.rpm 1a39256bdf512983f174d888825f4616615a05168482b778ee7b4dee1efeb4a6 lvm2-lockd-2.03.14-15.el8_10.aarch64.rpm 7ad354321cfa2acbaf9f55770a84f26a20d6d5ba92b917a3924da5b16cc5fd53 RLBA-2025:2597 traceroute bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for traceroute. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Bug Fix(es): * traceroute is consuming 100% of CPUs [rhel-8.10.z] (JIRA:Rocky Linux-71510) none-baseos-rpms traceroute-2.1.0-9.el8_10.aarch64.rpm f81c348e03ce8ce79a417b5d9349bda2b603fc259bdfbed236d97aaebd489725 RLBA-2025:2598 firewalld bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for firewalld. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list firewalld is a firewall service daemon that provides a dynamic customizable firewall with a D-Bus interface. Bug Fix(es): * Raise port range for ceph service to be inline with new ceph defaults [rhel-8.10.z] (JIRA:Rocky Linux-66207) none-baseos-rpms firewalld-0.9.11-10.el8_10.noarch.rpm e5ef296e7c79cf6e1fae6fb0c3f1bc4faffa385bf3f1c64beaeebac67f437849 firewalld-0.9.11-10.el8_10.noarch.rpm e5ef296e7c79cf6e1fae6fb0c3f1bc4faffa385bf3f1c64beaeebac67f437849 firewalld-filesystem-0.9.11-10.el8_10.noarch.rpm 73357ad4fc565f6ed493c5c506097b62c1cc255175d69bfcc4f660c9d32de1d4 firewalld-filesystem-0.9.11-10.el8_10.noarch.rpm 73357ad4fc565f6ed493c5c506097b62c1cc255175d69bfcc4f660c9d32de1d4 python3-firewall-0.9.11-10.el8_10.noarch.rpm 545c9ebc0d8313404851571e7f119b11b7d90bd80c99f27d65d16ba2a3f3540c python3-firewall-0.9.11-10.el8_10.noarch.rpm 545c9ebc0d8313404851571e7f119b11b7d90bd80c99f27d65d16ba2a3f3540c RLBA-2025:2599 linux-firmware bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for linux-firmware. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The linux-firmware packages contain all of the firmware files that are required by various devices to operate. Bug Fix(es): * Update linux-firmware to latest upstream [rhel-8.10.z] (JIRA:Rocky Linux-79835) none-baseos-rpms iwl1000-firmware-39.31.5.1-128.el8_10.1.noarch.rpm 9a853af66ed27b927aad445a169f0b27e7c374989a8d2866a30f85e1b8f0d040 iwl1000-firmware-39.31.5.1-128.el8_10.1.noarch.rpm 9a853af66ed27b927aad445a169f0b27e7c374989a8d2866a30f85e1b8f0d040 iwl100-firmware-39.31.5.1-128.el8_10.1.noarch.rpm 493137723c01a73470889dddff772f59a8b6eb98a68aece1e926c747488a3e61 iwl100-firmware-39.31.5.1-128.el8_10.1.noarch.rpm 493137723c01a73470889dddff772f59a8b6eb98a68aece1e926c747488a3e61 iwl105-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 4567341113764f0ec3b5dcb5f6e2115886860ab201592bba07bd4e95f498cb95 iwl105-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 4567341113764f0ec3b5dcb5f6e2115886860ab201592bba07bd4e95f498cb95 iwl135-firmware-18.168.6.1-128.el8_10.1.noarch.rpm fde496610b572ce632fcdc090b44fa191c3ac552432af6d13996f70f526d4440 iwl135-firmware-18.168.6.1-128.el8_10.1.noarch.rpm fde496610b572ce632fcdc090b44fa191c3ac552432af6d13996f70f526d4440 iwl2000-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 2226b27d0fc7373ac8f32809baa47fe72bb1bdc0841c97bf5347afc0d0ccc29e iwl2000-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 2226b27d0fc7373ac8f32809baa47fe72bb1bdc0841c97bf5347afc0d0ccc29e iwl2030-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 83fd4fdb1d1f579e5bad792f7d4ccf55b0681f1c56106f3d2f164524b8563044 iwl2030-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 83fd4fdb1d1f579e5bad792f7d4ccf55b0681f1c56106f3d2f164524b8563044 iwl3160-firmware-25.30.13.0-128.el8_10.1.noarch.rpm 42df9c933faa11ba89f3fa07b2155fb6934287696d90383d86c228feafb3beae iwl3160-firmware-25.30.13.0-128.el8_10.1.noarch.rpm 42df9c933faa11ba89f3fa07b2155fb6934287696d90383d86c228feafb3beae iwl3945-firmware-15.32.2.9-128.el8_10.1.noarch.rpm 4bcaf559635bf8348c1c0e2aa9b6f0e0a3ca18ba251c2fe64ce49c50e01d72c8 iwl3945-firmware-15.32.2.9-128.el8_10.1.noarch.rpm 4bcaf559635bf8348c1c0e2aa9b6f0e0a3ca18ba251c2fe64ce49c50e01d72c8 iwl4965-firmware-228.61.2.24-128.el8_10.1.noarch.rpm c21cbd19c094f4a2fc879910f11ff7716ad4022eafdd975232355b5bba9884c7 iwl4965-firmware-228.61.2.24-128.el8_10.1.noarch.rpm c21cbd19c094f4a2fc879910f11ff7716ad4022eafdd975232355b5bba9884c7 iwl5000-firmware-8.83.5.1_1-128.el8_10.1.noarch.rpm 424765a1713c1a763041c6d77658399dab07c3b088a119f93b3eac7265bc0d56 iwl5000-firmware-8.83.5.1_1-128.el8_10.1.noarch.rpm 424765a1713c1a763041c6d77658399dab07c3b088a119f93b3eac7265bc0d56 iwl5150-firmware-8.24.2.2-128.el8_10.1.noarch.rpm 061f708533fe8a2f032a2781626a8ee80c2d6292c8b6a8dbe2727d87f57a5663 iwl5150-firmware-8.24.2.2-128.el8_10.1.noarch.rpm 061f708533fe8a2f032a2781626a8ee80c2d6292c8b6a8dbe2727d87f57a5663 iwl6000-firmware-9.221.4.1-128.el8_10.1.noarch.rpm 8667288c134589efa30d940be8d6892dedbd545428ec538f039a54e7f8409ed3 iwl6000-firmware-9.221.4.1-128.el8_10.1.noarch.rpm 8667288c134589efa30d940be8d6892dedbd545428ec538f039a54e7f8409ed3 iwl6000g2a-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 78ba6e6e1651d8993f226bee80c5caaabbc65975df6c5554414505d01b0d15b2 iwl6000g2a-firmware-18.168.6.1-128.el8_10.1.noarch.rpm 78ba6e6e1651d8993f226bee80c5caaabbc65975df6c5554414505d01b0d15b2 iwl6000g2b-firmware-18.168.6.1-128.el8_10.1.noarch.rpm caaaa510afa6859d6d417badf422680b59314a73438b160ffce907c977e2bb17 iwl6000g2b-firmware-18.168.6.1-128.el8_10.1.noarch.rpm caaaa510afa6859d6d417badf422680b59314a73438b160ffce907c977e2bb17 iwl6050-firmware-41.28.5.1-128.el8_10.1.noarch.rpm cf34d8186c443330b78cc427f3496fac228a5f700a147f195520cd708ccde4b5 iwl6050-firmware-41.28.5.1-128.el8_10.1.noarch.rpm cf34d8186c443330b78cc427f3496fac228a5f700a147f195520cd708ccde4b5 iwl7260-firmware-25.30.13.0-128.el8_10.1.noarch.rpm 89090e4468ac3ab7ee20c9828051527de4df3ded54ed54bb19c7fd7227189f8c iwl7260-firmware-25.30.13.0-128.el8_10.1.noarch.rpm 89090e4468ac3ab7ee20c9828051527de4df3ded54ed54bb19c7fd7227189f8c libertas-sd8686-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm e22b4e51aefd2f0edf0b31a83aec6797bf32ff2ba4633f6eb6bc65a89ae4b80c libertas-sd8686-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm e22b4e51aefd2f0edf0b31a83aec6797bf32ff2ba4633f6eb6bc65a89ae4b80c libertas-sd8787-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm cc8c3010e454a8c6ee4704f9ac7ee60304ae1458d0f6d7dbad1f6dd2492d8ac1 libertas-sd8787-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm cc8c3010e454a8c6ee4704f9ac7ee60304ae1458d0f6d7dbad1f6dd2492d8ac1 libertas-usb8388-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm 934199d094c5fe61d11cd09f2c2dbeccb3d0c122579586fec31ba6c1c1939c85 libertas-usb8388-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm 934199d094c5fe61d11cd09f2c2dbeccb3d0c122579586fec31ba6c1c1939c85 libertas-usb8388-olpc-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm 14d381c2c08f07094551b49708c7f5eecbb01d837ce020c4b7be9c878be1a9d2 libertas-usb8388-olpc-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm 14d381c2c08f07094551b49708c7f5eecbb01d837ce020c4b7be9c878be1a9d2 linux-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm fc1e6aaef4204a9c580c46a5c33d3c979c611df78e64e95b57915c5fb21197b9 linux-firmware-20250217-128.git5bc5868b.el8_10.noarch.rpm fc1e6aaef4204a9c580c46a5c33d3c979c611df78e64e95b57915c5fb21197b9 RLSA-2025:2600 Moderate: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * rsync: Path traversal vulnerability in rsync (CVE-2024-12087) * rsync: --safe-links option bypass leads to path traversal (CVE-2024-12088) * rsync: Race Condition in rsync Handling Symbolic Links (CVE-2024-12747) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms rsync-3.1.3-21.el8_10.aarch64.rpm 45e16b892b6e5db2c622caf5a5ec99004f47c0fac89c992311a3aee71d1a6681 rsync-daemon-3.1.3-21.el8_10.noarch.rpm 5357362858d5407e417dc542cd76f1f5b71a4161f20d072c986159fbbe55a2b2 rsync-daemon-3.1.3-21.el8_10.noarch.rpm 5357362858d5407e417dc542cd76f1f5b71a4161f20d072c986159fbbe55a2b2 RLBA-2025:2601 portreserve bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for portreserve. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The portreserve package helps services with well-known ports that lie in the portmap range. It prevents portmap from occupying a real service's port by occupying it itself, until the real service tells it to release the port, generally in the init script. Bug Fix(es) and Enhancement(s): * Creating tmp files for systemd on behalf of portreserve references legacy directory /var/run/ instead of /run (JIRA:Rocky Linux-2863) none-baseos-rpms portreserve-0.0.5-20.el8_10.aarch64.rpm ca1efcd6ee620a0e591d58d3977b894e97f29db4c0f7e65371a5ad9e3d117031 RLBA-2025:2602 gcc bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 None An update is available for gcc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. Bug Fix(es): * gcc: ICE in expand_debug_locations, at cfgexpand.c:5410 (JIRA:Rocky Linux-79501) none-baseos-rpms libasan-8.5.0-24.el8_10.aarch64.rpm d4139784cc0cbee1fed2dfdae70b45c697fbfaa91285dd8befb1b4605113ca54 libatomic-8.5.0-24.el8_10.aarch64.rpm d2a753819d8ae5d8e8c5167184e19d2574380e71e46f4c41c60847942bb227de libatomic-static-8.5.0-24.el8_10.aarch64.rpm f6b0756444ef4b6a599a702aa66c9a64489e783837a19f942e45f35c43261eed libgcc-8.5.0-24.el8_10.aarch64.rpm d829fd6e831880b6c4dcfa2a8a82a2cdb7ae241ca69371fd01fe3aaa7bfa8df0 libgfortran-8.5.0-24.el8_10.aarch64.rpm db0fed050a54203915d1c64e931fbec710fe5d78c861d16990836303b8b0b532 libgomp-8.5.0-24.el8_10.aarch64.rpm 509ad6a51629716f589828778ac68f2f795558a643704c985038ee3bb29cfe57 libitm-8.5.0-24.el8_10.aarch64.rpm f34270b5cb5e335c647fb9257e59a038f39741671e5af8e2a29df9dead626fb4 liblsan-8.5.0-24.el8_10.aarch64.rpm bae79756e8b6b0008732253c82aaa09e8568fc8d386215b4319a8fdb5e85418b libstdc++-8.5.0-24.el8_10.aarch64.rpm 0da74c193f3d20feda5d5922bc62a8c525871fec8d6d3a5b39cb275b95f2952a libtsan-8.5.0-24.el8_10.aarch64.rpm 7205dd6302881aa7edb198d2dee054ed8eacb8ea0bdd4c733a92ef174397db27 libubsan-8.5.0-24.el8_10.aarch64.rpm e3809e1a40da6c54304d1aeda8db0ea33ed396db45fcb227353a8f8d468ab37d RLSA-2025:2686 Important: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use-After-Free in libxml2 (CVE-2024-56171) * libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2 (CVE-2025-24928) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-19.el8_10.aarch64.rpm ed832d629a5d49eb5e70f2aa362795ef889d06d19651bdc70b4f88af7848f9c9 python3-libxml2-2.9.7-19.el8_10.aarch64.rpm c616948814197a178ead4514c38df9768a156c0e411d7faf1d8132c271cacbd9 RLSA-2025:2722 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix: * CVE-2025-24528 krb5: overflow when calculating ulog block size Bug fix: * kdb5_util: fix DB entry flags on modification For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-31.el8_10.aarch64.rpm 220bb97669d2a6b9e6f16ae1a5534b2dceb1fe8432feecdc9b650ef5d427d9b6 krb5-libs-1.18.2-31.el8_10.aarch64.rpm 14f17f63a4fc43ab8d0ef642d922ae8dc1572c375ee60df33205171441870eea krb5-pkinit-1.18.2-31.el8_10.aarch64.rpm b37f16268cb93548d0a5d6bcbba8322a0162f657b388ee33aaa6dfcd07965528 krb5-server-1.18.2-31.el8_10.aarch64.rpm a1e4d8e6fafeb885fb513516fcb678973b1ddda97d9dce9c5f7e06b4392c4be2 krb5-server-ldap-1.18.2-31.el8_10.aarch64.rpm 9a63765290a5e5cf93512f14dc3db04d10d8bcface2050bfc41979d44e85b6d5 krb5-workstation-1.18.2-31.el8_10.aarch64.rpm c4205744e6d4e56004b0221ff961bef6f106882787ec69eb6f014c1828e723d7 libkadm5-1.18.2-31.el8_10.aarch64.rpm 5fc643b76c7c35a31981d561d299a04cce119bfbedcfb4addef6d680aab4df94 RLSA-2025:18286 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: out-of-bounds read in sftp_handle() (CVE-2025-5318) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libssh-0.9.6-15.el8_10.aarch64.rpm f9a4b4368d2da9fb4e737d8f1a9ef3e049baa6e3d21b9c26f58806d606586a9d libssh-config-0.9.6-15.el8_10.noarch.rpm 804aff23eb4d762b5b05b4fbf98a6cc974620e6ff1b0ab755737487f58b713c8 libssh-config-0.9.6-15.el8_10.noarch.rpm 804aff23eb4d762b5b05b4fbf98a6cc974620e6ff1b0ab755737487f58b713c8 RLSA-2025:19102 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp (CVE-2023-53297) * kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817) * kernel: Bluetooth: Fix potential use-after-free when clear keys (CVE-2023-53386) * kernel: Bluetooth: L2CAP: Fix user-after-free (CVE-2022-50386) * kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CVE-2025-39849) * kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path (CVE-2025-39841) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.81.1.el8_10.aarch64.rpm 858e72f0e468c67c8c7a220260bd80d0f7080857567d8cb879b9e1d9dac4ecf5 kernel-4.18.0-553.81.1.el8_10.aarch64.rpm 9901b46321edfe1c46b3a930f8ec01c7cf4ac252f94d3df66615a52189360ed5 kernel-abi-stablelists-4.18.0-553.81.1.el8_10.noarch.rpm a39ead3890b1ce4b9263f53cc4a8a5f3e5b93aee26bf23fe48672ed54383c7a0 kernel-abi-stablelists-4.18.0-553.81.1.el8_10.noarch.rpm a39ead3890b1ce4b9263f53cc4a8a5f3e5b93aee26bf23fe48672ed54383c7a0 kernel-core-4.18.0-553.81.1.el8_10.aarch64.rpm dd2fcb2ebfcc94ea13c048fdbcaba8f7f6556071ecc1b1202551080bdc9a6670 kernel-debug-4.18.0-553.81.1.el8_10.aarch64.rpm a950861260cdd04c42d5b262817016f4d198a53b309b9a4e4874ebe1dae2f278 kernel-debug-core-4.18.0-553.81.1.el8_10.aarch64.rpm bfa2d355fcc4fba4c25e9909dd1ac840dcf2ecb899968bf8ab384380390480da kernel-debug-devel-4.18.0-553.81.1.el8_10.aarch64.rpm 571bdca1eb9e411e1d121a55853753597aa098a62daac6b4f6c70dcff6ef4271 kernel-debuginfo-common-aarch64-4.18.0-553.81.1.el8_10.aarch64.rpm abce3145503d03dcba51f4a0e50340fe25cba597f52838b676a8237dbd13c1c7 kernel-debug-modules-4.18.0-553.81.1.el8_10.aarch64.rpm 61e17c49ba62d2956d3375e841f421541fa58d76df81699603973a3332ce0f73 kernel-debug-modules-extra-4.18.0-553.81.1.el8_10.aarch64.rpm e7bf4a5cd52e589c3dba96c3b7b2e3b4ba2513fa6c140e5f190acbb5234e8ac4 kernel-devel-4.18.0-553.81.1.el8_10.aarch64.rpm 83b89d09b77dac0bf02ce562b380a79c14407074b2c5412add907284a9942d76 kernel-doc-4.18.0-553.81.1.el8_10.noarch.rpm 9c8c66c44fc334d11a2cecd604a0e05276a0829943b4f9194fefe88bf7fe6a27 kernel-doc-4.18.0-553.81.1.el8_10.noarch.rpm 9c8c66c44fc334d11a2cecd604a0e05276a0829943b4f9194fefe88bf7fe6a27 kernel-modules-4.18.0-553.81.1.el8_10.aarch64.rpm d891b9bf9b4c79e010d33c4fe071b04c5bcfcc51d455d1332bdd5bf402c5a5e6 kernel-modules-extra-4.18.0-553.81.1.el8_10.aarch64.rpm 0a95773af4e1d5d0346c201e3a5f0c147eab4cfdf98c0f2ccd5cbc1020c83e22 kernel-tools-4.18.0-553.81.1.el8_10.aarch64.rpm 10501cbc01f7b71ec6b9a127421ad29b6a6271c00c71a07eed737f42186dfdc0 kernel-tools-libs-4.18.0-553.81.1.el8_10.aarch64.rpm 264e26dc7ec539c2f01d874e365c98e0a806408786ac21494f0384d5828ac566 perf-4.18.0-553.81.1.el8_10.aarch64.rpm d7da441b6316385ca65219e78c63736d4b8236690c1dcbc52afa3623a533550e python3-perf-4.18.0-553.81.1.el8_10.aarch64.rpm 697f7cd8fca76441aaec04021b7695c5eb1126542ebde9bda6b476143efd4051 RLSA-2025:2473 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: zero-initialize the report buffer (CVE-2024-50302) * kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (CVE-2024-53197) * kernel: scsi: megaraid_sas: Fix for a potential deadlock (CVE-2024-57807) * kernel: pps: Fix a use-after-free (CVE-2024-57979) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.44.1.el8_10.aarch64.rpm ab605343dd74624c7f14b1fa1e4116b0d6afab8578c5b24360a7b63524ac2a93 kernel-4.18.0-553.44.1.el8_10.aarch64.rpm 115516a24a85857848cb47d07897f4b226fdba5422abafdc38d6e258aebed168 kernel-abi-stablelists-4.18.0-553.44.1.el8_10.noarch.rpm 13318d11bf1b149e880cea82700c0a287c074744c6ce854f3a090d5a12842e3a kernel-abi-stablelists-4.18.0-553.44.1.el8_10.noarch.rpm 13318d11bf1b149e880cea82700c0a287c074744c6ce854f3a090d5a12842e3a kernel-core-4.18.0-553.44.1.el8_10.aarch64.rpm 33f4dc25cfcd724780b7b71ce7635ac2c00e88540529896ab449e38be2b80da6 kernel-cross-headers-4.18.0-553.44.1.el8_10.aarch64.rpm dc81e9fb94d23aa2a7a3721b655219d15bfd96a579e060518502f7c6cd1e2a7d kernel-debug-4.18.0-553.44.1.el8_10.aarch64.rpm 7214669ecc902af2a6aa1a66bbd2d10f18f4e7e490b2843aadd237a505855a0a kernel-debug-core-4.18.0-553.44.1.el8_10.aarch64.rpm 657146a0010c4d03de2e2ba566f8c5da10b542dc29dce5e8cd1031be013334b1 kernel-debug-devel-4.18.0-553.44.1.el8_10.aarch64.rpm 3419352709849a3c67e5d3b1eb22f170fe3a67d07a01be9876425d91acea7bc3 kernel-debuginfo-common-aarch64-4.18.0-553.44.1.el8_10.aarch64.rpm 22098c954ba31843cd3c967ddc4f96b9b92f2379f372aad1b5bb7915f39c098d kernel-debug-modules-4.18.0-553.44.1.el8_10.aarch64.rpm 385d65123b067b0dcdbe25f0c73ceb4f74b421372f7c56398fcfc1faa8670e23 kernel-debug-modules-extra-4.18.0-553.44.1.el8_10.aarch64.rpm dc09707da99005e673f6a07d981a84b392d6a8582874739b2c40e178f7436a1e kernel-devel-4.18.0-553.44.1.el8_10.aarch64.rpm 7f339fd4b2fcc9e33aade1c234ebb02a5f14e28542cb7eb9ddbbaae6417ea770 kernel-doc-4.18.0-553.44.1.el8_10.noarch.rpm d1358366ee2588087c7eb46b6dc7bb731574101fefa0d3ad2f3591b45fa52bd5 kernel-doc-4.18.0-553.44.1.el8_10.noarch.rpm d1358366ee2588087c7eb46b6dc7bb731574101fefa0d3ad2f3591b45fa52bd5 kernel-headers-4.18.0-553.44.1.el8_10.aarch64.rpm a8fc27d0c392ddfc2da8bbf2ea6c9494cb4e8970b1357241457b129d575876a1 kernel-modules-4.18.0-553.44.1.el8_10.aarch64.rpm 22476b56d288e08dc6a00d66abe2f58f9345536c7b9ba721f72eba8baeec0689 kernel-modules-extra-4.18.0-553.44.1.el8_10.aarch64.rpm eb5cd8069cc62a6b70248ae27a732ba6ee30ead8c035961fc2d3901ade524794 kernel-tools-4.18.0-553.44.1.el8_10.aarch64.rpm a76cc952ad02d144ede706fecf8f8a1a907f881cdc9f1d34b5995c32326d3b2b kernel-tools-libs-4.18.0-553.44.1.el8_10.aarch64.rpm ff6e5c7a8238d788ceddb2d64f91e4bc2b00ceb20084cf0d6df5aadb7321ac49 perf-4.18.0-553.44.1.el8_10.aarch64.rpm 73474ff8a6dbe06083e6fe1b4760b9a7708ca39c2d271b675ab4cd27db555746 python3-perf-4.18.0-553.44.1.el8_10.aarch64.rpm ea24254ff82c7f325a58b04cd759f9d66b6f1f0991569d3d253aae09f71ee3a8 RLSA-2025:3026 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: can: bcm: Fix UAF in bcm_proc_show() (CVE-2023-52922) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.45.1.el8_10.aarch64.rpm 6e9a11284a8d6c817e402858f3e6e6766ed394420ca6ea918c8499d34142e5bc kernel-4.18.0-553.45.1.el8_10.aarch64.rpm f1928fa18160b55201a25571f871d5e861eab603fdf474e09bb46b4a6943b861 kernel-abi-stablelists-4.18.0-553.45.1.el8_10.noarch.rpm fa12f68b999482de73456fa1ca3a02e0ae975892423669986ace2a0a480831ba kernel-abi-stablelists-4.18.0-553.45.1.el8_10.noarch.rpm fa12f68b999482de73456fa1ca3a02e0ae975892423669986ace2a0a480831ba kernel-core-4.18.0-553.45.1.el8_10.aarch64.rpm 19ed5a3e4b8659e3a2c46b4425d1ff21c636566812c33e0d59c7f3deb97f3223 kernel-cross-headers-4.18.0-553.45.1.el8_10.aarch64.rpm 66ff6ead3e5bee164ffed73bd9e0dfd33431b7c60b5ff71799784ff2272a5164 kernel-debug-4.18.0-553.45.1.el8_10.aarch64.rpm c74f01623659a91cbd560bdc8843d53a0d12843be8485ec43744c888e9584e47 kernel-debug-core-4.18.0-553.45.1.el8_10.aarch64.rpm 6ca0648398a3926e657db9220bb6bc20d0466f75a9252bc79691c32e95a0f925 kernel-debug-devel-4.18.0-553.45.1.el8_10.aarch64.rpm 6b9e13076dd8dc20752a57a7d24312254904b319bb2f226036f65bc33c19b15e kernel-debuginfo-common-aarch64-4.18.0-553.45.1.el8_10.aarch64.rpm 2bd0d1b28773303827ea7e8658cdaa33100bedf8d7fd6498c301ad9e8ca08418 kernel-debug-modules-4.18.0-553.45.1.el8_10.aarch64.rpm 70d9fdb2520a508d00dd371dbc6105ec28fbc32a8f4571f9dfd1708311e6b819 kernel-debug-modules-extra-4.18.0-553.45.1.el8_10.aarch64.rpm 2fb341726cc304ad31a9c0885dcca19e81b75180b6ae0ca6daedd0d827cbbe84 kernel-devel-4.18.0-553.45.1.el8_10.aarch64.rpm c58ed4ba5aa8a5a3de2f9168522474b92a4e1b34c57f112ee158140156ccabd4 kernel-doc-4.18.0-553.45.1.el8_10.noarch.rpm 6821d0990141917bf1bc4dc2941c2612ba53609191e39b438ab00341e237126e kernel-doc-4.18.0-553.45.1.el8_10.noarch.rpm 6821d0990141917bf1bc4dc2941c2612ba53609191e39b438ab00341e237126e kernel-headers-4.18.0-553.45.1.el8_10.aarch64.rpm b7e94cac1992718a976cbde74f605a056f581e0eb5fe1571fdac7f773eba052d kernel-modules-4.18.0-553.45.1.el8_10.aarch64.rpm 5b5835e58e56d88b59cd418227c52db3d0e892bd40fda8402eaa0655bd7fabf2 kernel-modules-extra-4.18.0-553.45.1.el8_10.aarch64.rpm cce9f3c1b4af1775135e79ce01a499ed01c8ba95dd982ffaa5aa8be6aa2126a5 kernel-tools-4.18.0-553.45.1.el8_10.aarch64.rpm 528101194ed3b43a21b444cadddf8f7b817fba1b85b60bdae1782b0a37a08b30 kernel-tools-libs-4.18.0-553.45.1.el8_10.aarch64.rpm 9b7bf3ca2e6c3a4f5f62b23a3bb13525f8b232baf4c6a78987c26a270ceaf212 perf-4.18.0-553.45.1.el8_10.aarch64.rpm fcd5b4d383b8b6e2e7c571ee97f6235b23176e16c817470bf3bd4a9006b48b88 python3-perf-4.18.0-553.45.1.el8_10.aarch64.rpm de42b10b60d8eba86c7ff17869c9f5a5194934c72b51450424f7fb9fd068fa19 RLSA-2025:3260 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (CVE-2025-21785) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.46.1.el8_10.aarch64.rpm 4e2e4ddadf25913346cc9595105889dd67856d8316428f438d5ee91e3198b0b6 kernel-4.18.0-553.46.1.el8_10.aarch64.rpm 697ae70cb1878ae52db3af0d288a0e7a5b270ed93b769b30412cae66dbee0b34 kernel-abi-stablelists-4.18.0-553.46.1.el8_10.noarch.rpm 77e144599a53116de2fba85681774edc86a58462d0b51f48abcf91d20b7d36bd kernel-abi-stablelists-4.18.0-553.46.1.el8_10.noarch.rpm 77e144599a53116de2fba85681774edc86a58462d0b51f48abcf91d20b7d36bd kernel-core-4.18.0-553.46.1.el8_10.aarch64.rpm 7256a2778f2ad63c2a0ff59630bce8bcff766d0865c81046b5ed1a3da1210751 kernel-cross-headers-4.18.0-553.46.1.el8_10.aarch64.rpm 5993e53f6fa46aaa39214406a6636b059c262575a5b2373fb0f6b31a76f03b7b kernel-debug-4.18.0-553.46.1.el8_10.aarch64.rpm 6dcd10df2b1b38d7fe547881d24aa98616bae294ee3713c1e0ef5757766725ef kernel-debug-core-4.18.0-553.46.1.el8_10.aarch64.rpm ce811d4968af602489b65e4bee38fd89a734b4cec874579d537add6f05624f80 kernel-debug-devel-4.18.0-553.46.1.el8_10.aarch64.rpm 359137a676f51be42e422e159476dbcb04627e35451e68fa63bb5b373b30f60b kernel-debuginfo-common-aarch64-4.18.0-553.46.1.el8_10.aarch64.rpm 8e8d9c0af6f3e2555be01aee36ea5cdf2c2b3488b9afb586003838e9111b4edf kernel-debug-modules-4.18.0-553.46.1.el8_10.aarch64.rpm f96376277ea5d55f2b9db4f98365a59e0b769bfcff75b43f77b9916174ac9a4f kernel-debug-modules-extra-4.18.0-553.46.1.el8_10.aarch64.rpm 3d5cd5ecc06d604ba96b9a3edc621717728b95e0204a7990d21021c42ce45783 kernel-devel-4.18.0-553.46.1.el8_10.aarch64.rpm 7da13b0ce0c8802ad4c479c7f905e90d9180a1df1c275d86e6933d7ecbd90451 kernel-doc-4.18.0-553.46.1.el8_10.noarch.rpm d11c7602b91a83a9a9501164f0f42f107c867807f32291b0d8fa761d2dc791f4 kernel-doc-4.18.0-553.46.1.el8_10.noarch.rpm d11c7602b91a83a9a9501164f0f42f107c867807f32291b0d8fa761d2dc791f4 kernel-headers-4.18.0-553.46.1.el8_10.aarch64.rpm 1f9371f96d23866ea1ba6c65c2ed5cc391487ccc02bcda67ea24583d77f2dcc7 kernel-modules-4.18.0-553.46.1.el8_10.aarch64.rpm 3682e6e709f16dd8299b5d38efab20dd63bf2d67ae2988482e7d86cd9167d81e kernel-modules-extra-4.18.0-553.46.1.el8_10.aarch64.rpm e8287a555d94322b88fb59fca28821daf07732649daed14cd1827580044c7a1f kernel-tools-4.18.0-553.46.1.el8_10.aarch64.rpm 37e0bdfcebeabaa2a16906cbadc44cb2fa20f4d588f25ee02965511a21c472c9 kernel-tools-libs-4.18.0-553.46.1.el8_10.aarch64.rpm 0c1cb1c55e348cc39614c7d67e551cb33cd5bfd6f80487da47287a5b08c3e01f perf-4.18.0-553.46.1.el8_10.aarch64.rpm dacc52a7eafe9d4a6a67eae1455a3626572c19e2e7e0ec349cb14f84be4a388a python3-perf-4.18.0-553.46.1.el8_10.aarch64.rpm 8cb1475ccfffaa5a956f21af2e0676fd5a6042369dc76866e60ce742197c29ff RLSA-2025:3421 Important: freetype security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for freetype. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list FreeType is a free, high-quality, portable font engine that can open and manage font files. FreeType loads, hints, and renders individual glyphs efficiently. Security Fix(es): * freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files (CVE-2025-27363) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms freetype-2.9.1-10.el8_10.aarch64.rpm 867f6909ef1fb9e7726904d3669c6318d303cab6392f32fcb6f255aba02bc505 freetype-devel-2.9.1-10.el8_10.aarch64.rpm 717fafc7a3959cf08257bfc2429da638ac92e6ea0cb46919c8a4e2b0fa906d58 RLSA-2025:3615 Important: libxslt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Use-After-Free in libxslt numbers.c (CVE-2025-24855) * libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList) (CVE-2024-55549) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxslt-1.1.32-6.1.el8_10.aarch64.rpm 0ca7ce3c8236a96886ff353af164d14ef61fef100fdc861d719ec41f381fafd0 RLSA-2025:3828 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: buffer overflow in the GNU C Library's assert() (CVE-2025-0395) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-251.el8_10.16.aarch64.rpm a1fc24d418b172a4f58dd14582727c9f204ecd50e3e58105de5e5c61700bffe5 glibc-all-langpacks-2.28-251.el8_10.16.aarch64.rpm afe8631e0c330ad5aacb60775c3f8b394d563166f60aaf5aca3ae8b10e54872e glibc-common-2.28-251.el8_10.16.aarch64.rpm 6146f76e2115b3c7016f50bd4ecb36dc52e3bc809f930ae0d864dddc0d63fe0d glibc-devel-2.28-251.el8_10.16.aarch64.rpm 8b1c390ec865fc1b53f1ccaa3a2cccf089367803514ba69cb4babbca13d70319 glibc-doc-2.28-251.el8_10.16.noarch.rpm 2b65349f6b090b667de4758f7f84c48b5ff3d2eaf87df98f778fa0a46609d763 glibc-doc-2.28-251.el8_10.16.noarch.rpm 2b65349f6b090b667de4758f7f84c48b5ff3d2eaf87df98f778fa0a46609d763 glibc-gconv-extra-2.28-251.el8_10.16.aarch64.rpm f16063444644d5634bbc9a02da18e5c5c7fe16db4d242b11b82a8f00fbd2a412 glibc-headers-2.28-251.el8_10.16.aarch64.rpm bc06589e22c158bebb4433d5afcd2092b3f41e4b01f17235535ead2022a6c784 glibc-langpack-aa-2.28-251.el8_10.16.aarch64.rpm 84e6d4afd1e60262b2b82cfe3445f62849cd1b921c5652bc6289b1aad746f273 glibc-langpack-af-2.28-251.el8_10.16.aarch64.rpm a1afc817494a751c1177c907683ee78ed2bf3daf6b3105d5cab6b095872f5dfe glibc-langpack-agr-2.28-251.el8_10.16.aarch64.rpm d226cb731f0dd643c57b386194ba27da020c1934df08c9f5cfcd8c23f3697ed8 glibc-langpack-ak-2.28-251.el8_10.16.aarch64.rpm 07f6d70527fa3c028055f15795a7c9eb1676df32642ed6ef105d7d14d984891c glibc-langpack-am-2.28-251.el8_10.16.aarch64.rpm 830d5b5ed38c81f60d0e78188ab0fc3f58bf028434eef84dc626597d53faa713 glibc-langpack-an-2.28-251.el8_10.16.aarch64.rpm 998736ed9061ccc4c3c65ff70f564bfc7e5b4f91942dbb936f5e97c113fea0a0 glibc-langpack-anp-2.28-251.el8_10.16.aarch64.rpm ceb62bcb8421906d8d06fc7c6cf44c00d78f10752c9269b3d4090008d2f54572 glibc-langpack-ar-2.28-251.el8_10.16.aarch64.rpm 63a60eb1f3834f531833b0881978224d29ded3cb64d105629407f4aeead1c288 glibc-langpack-as-2.28-251.el8_10.16.aarch64.rpm f7af3b62d3a4f9afc0ce397d8adcd902ea447488eedc7f878c89915f74e85aea glibc-langpack-ast-2.28-251.el8_10.16.aarch64.rpm e603480aa5d163a535394a9cef3537f2cd37f44ce607be94393496997aaabc6a glibc-langpack-ayc-2.28-251.el8_10.16.aarch64.rpm 137ef340af7d9dcd574921a840f8ed83d86556220289d4a4ed830f72d2f9476f glibc-langpack-az-2.28-251.el8_10.16.aarch64.rpm d023fa908d60f78bb3967d58aed734ec33fd348496a48e5186dc90c260639379 glibc-langpack-be-2.28-251.el8_10.16.aarch64.rpm b00ea5dcced785ad43f07b917b841e59d11571e506adc8ca44cd007d76c1a03e glibc-langpack-bem-2.28-251.el8_10.16.aarch64.rpm 52e2a028bfd70f6f0a5a1e259b017ae176e5b7a6b92cca94dd92c9bd42011c4d glibc-langpack-ber-2.28-251.el8_10.16.aarch64.rpm 71d4ba53d12342e21d6182ec159f5de0b7d6c9f8f1ef4e5ce357f3dab9108aaf glibc-langpack-bg-2.28-251.el8_10.16.aarch64.rpm 66989f8ba8fdbcdb7ddcd4ee6e03aa64c37e686af84abc79fb16c7229ec41e6f glibc-langpack-bhb-2.28-251.el8_10.16.aarch64.rpm d5836f58af961834e6ea1732988f387da02eb74134e0f01df32a291a38d63f93 glibc-langpack-bho-2.28-251.el8_10.16.aarch64.rpm eaeca7712fb2a61990f2e5bee63869abc48d1bf3d1164f6378da8f8719302d1e glibc-langpack-bi-2.28-251.el8_10.16.aarch64.rpm 7c78ec14aaedb94ca102df3a36f10e32fe08e5783b933f8067810b66e0f0f71a glibc-langpack-bn-2.28-251.el8_10.16.aarch64.rpm a47cf44faa22a8d3479b8f261a62ad74ffff3e07463a3aa974fa52c3324e2e5b glibc-langpack-bo-2.28-251.el8_10.16.aarch64.rpm d2a4299d73bba67dca3718aa30f9e540a1daae98aa978d6f9ee7a861bebb4866 glibc-langpack-br-2.28-251.el8_10.16.aarch64.rpm 3a2e29205d46ec0a65df4557f01ad850a729016c956fd16c6d15a4536d9705ac glibc-langpack-brx-2.28-251.el8_10.16.aarch64.rpm 1a966a576177c79b0da0443a71b34a2e3bf3e3e1b65d2f5b591d6a8f4fd2fe85 glibc-langpack-bs-2.28-251.el8_10.16.aarch64.rpm 69a299ed95e442e5a38ac48b025c6ff83f2ca70f1caf15e0d1e641bd302b8539 glibc-langpack-byn-2.28-251.el8_10.16.aarch64.rpm c19992741fd1950d9f7f9a51d156a90220fb3111cf729ec40fa4965bc0776faa glibc-langpack-ca-2.28-251.el8_10.16.aarch64.rpm ab14e2e0437b9669aa75fae70e6013b36a4b802df4b1d115247ec605caf2da61 glibc-langpack-ce-2.28-251.el8_10.16.aarch64.rpm 56d4e425645baffa45c4544176e322d04fdb6a17b75e793c4d598b8fd7794676 glibc-langpack-chr-2.28-251.el8_10.16.aarch64.rpm 76793cbb7b98a97bdef2ac396f07e13e18b777c0c29a53150197ee235ed3cb90 glibc-langpack-cmn-2.28-251.el8_10.16.aarch64.rpm 8af709a0f5faf3d22ddc3345273dd507d44c9c453f964d87ceee3bd000ef1723 glibc-langpack-crh-2.28-251.el8_10.16.aarch64.rpm 343f6f7b630227fed8e14200ad77bd501b620f5076eb72bfe64f98266c838d5c glibc-langpack-cs-2.28-251.el8_10.16.aarch64.rpm 4eb1653a370886aeba4c850169f0600c31b53a1f28f68f06cd728f749587e107 glibc-langpack-csb-2.28-251.el8_10.16.aarch64.rpm 49dfba7fe8b8411a63673b7468cdf014bf47c8b4cbfb8c9670c346c4fee2d64f glibc-langpack-cv-2.28-251.el8_10.16.aarch64.rpm fd40be86fa3b71f654d598949bbda1eb9f2c104f4d9268e2c82549af697a962d glibc-langpack-cy-2.28-251.el8_10.16.aarch64.rpm fbc30fa4c5f08c64b2da6a51df3a1e56d859939100cef448376f39d9bc049a87 glibc-langpack-da-2.28-251.el8_10.16.aarch64.rpm 2d598288eabc4ba84c1be5ebebaaf1f6de7b44ca226f00913f0b44ceb7d279a2 glibc-langpack-de-2.28-251.el8_10.16.aarch64.rpm 5d54cde0a056fa62b31a1d038e3f53bd90fa69a01da590e909b34aa9f4756ef4 glibc-langpack-doi-2.28-251.el8_10.16.aarch64.rpm 197b8662190878ca557c5413eb96184d7c2abf53fec70baa1d9b12f2aa7a4072 glibc-langpack-dsb-2.28-251.el8_10.16.aarch64.rpm 0f20cb4018c319d1d7b91bfd8bd7fba8e1ae276f7de94e1a32cade8253ca25a6 glibc-langpack-dv-2.28-251.el8_10.16.aarch64.rpm 652b30fb79e96d666c6899ce88514886c8d779934ab03f40b6af34f5584d568e glibc-langpack-dz-2.28-251.el8_10.16.aarch64.rpm 540c104f16c374e05cac4a0598846169a7a124f9f9e89712ddeb2a3c03732289 glibc-langpack-el-2.28-251.el8_10.16.aarch64.rpm 4362d1cb5e0bfbbac86afc414e3afd254d2f7ad31f4f302953ede7cca00e0477 glibc-langpack-en-2.28-251.el8_10.16.aarch64.rpm c4a31c1a6436bd52216371aa41cc735e83d784af39fe53d5a384475fa061531b glibc-langpack-eo-2.28-251.el8_10.16.aarch64.rpm 332b20e116e81eb111120c824eb5c2be5382c426146f39a788ebbd5d64f00923 glibc-langpack-es-2.28-251.el8_10.16.aarch64.rpm e1f6accac4245fa7a33f50c23e5752b39553d1b09c11fd0e5df6a02dcad90e0a glibc-langpack-et-2.28-251.el8_10.16.aarch64.rpm 865d23c462ffcf639a6e4bd538a86948a8a5f404ef7ca8c4d8124f338ac648d1 glibc-langpack-eu-2.28-251.el8_10.16.aarch64.rpm 877b8ec183fc5f7eeba2f1fad98c10306e3659b5024e98f9fe2d528dd79383b6 glibc-langpack-fa-2.28-251.el8_10.16.aarch64.rpm e4429df09c8232fafab4f8d7281c0d1f0cf790e000c5b7751e0aad98f9655363 glibc-langpack-ff-2.28-251.el8_10.16.aarch64.rpm 842f4794430f0228dc63d10b8ee550b084d35bceb5e4cf108723eabbe24028f5 glibc-langpack-fi-2.28-251.el8_10.16.aarch64.rpm 03a931e63bb0fe7f29c52b2075640c9f9ee9b382dc44eff877f12b72cf6a68a3 glibc-langpack-fil-2.28-251.el8_10.16.aarch64.rpm 88a9b58380d14c8731275e8280e1974ed933842e871f83d5c8c55582794c17c8 glibc-langpack-fo-2.28-251.el8_10.16.aarch64.rpm 2962da078e3edfa32f53d668dfd18ede5a46bb37b2f9e748da02e7fe95708af5 glibc-langpack-fr-2.28-251.el8_10.16.aarch64.rpm 4af14470fd39599e33284112ad85f4666729f28520e2beb5cff807e3de4213ab glibc-langpack-fur-2.28-251.el8_10.16.aarch64.rpm 97a7a37c9360a7573c1ada340a551f8a2694dba2719d696e0810d41150923289 glibc-langpack-fy-2.28-251.el8_10.16.aarch64.rpm 6fb0bc597b12d91d84b40726b738d770c025af435b64de9a07a752c2a0a1eb77 glibc-langpack-ga-2.28-251.el8_10.16.aarch64.rpm 4e70334ae36ffe67521ed23a9d22cd9928eee364eb620ac528463b79763f0862 glibc-langpack-gd-2.28-251.el8_10.16.aarch64.rpm 9fc533223ecbdc7f3fd224e5f5901b1cfa704dbcd78978e9151e6364bb4a9696 glibc-langpack-gez-2.28-251.el8_10.16.aarch64.rpm 43c354cfb19d1add28d9f2f9f912ef73279ec37a96ec654eaecc352c300daee3 glibc-langpack-gl-2.28-251.el8_10.16.aarch64.rpm 64441d9d5504816487a292582f307c50f0bdc76f2632161aed44c32569f7dac7 glibc-langpack-gu-2.28-251.el8_10.16.aarch64.rpm 7e529914caade03760f2870ef60df63547b3188a16ea3e50c53ec63e07929015 glibc-langpack-gv-2.28-251.el8_10.16.aarch64.rpm 6deabef191f8ae7ced76c5f9daefd8131752e173802bf78db1237f6667c6b2ea glibc-langpack-ha-2.28-251.el8_10.16.aarch64.rpm cfbcc88dd0fa24b5f9925b03e64a13b2ce42ffc18aa55ae2282539767326983c glibc-langpack-hak-2.28-251.el8_10.16.aarch64.rpm b6c9179d2c5f03b22de519364107cecc236997a697574806709a4bd6441ce193 glibc-langpack-he-2.28-251.el8_10.16.aarch64.rpm 70a32fa6a0ee3aded3ea0eb984b20f6e44920fb6a174bb08b7a1a26474b859fd glibc-langpack-hi-2.28-251.el8_10.16.aarch64.rpm e607c816def846ff47e13169db6d14b379c062e351104a11ee3a3a27788b85fe glibc-langpack-hif-2.28-251.el8_10.16.aarch64.rpm 7dc1865038c1e0bb1a1d0860b3876373ff01e8d50352a950bcc085655a8da7e9 glibc-langpack-hne-2.28-251.el8_10.16.aarch64.rpm bbbe0d10262370477c7f0bc7ff7a1b1f7b357ca73d9b4a88d85c3c563669ba05 glibc-langpack-hr-2.28-251.el8_10.16.aarch64.rpm b0ddf05a2ddaab6e588fdcae96ff0fcf81e0049f949f7428539b82015cfba9e6 glibc-langpack-hsb-2.28-251.el8_10.16.aarch64.rpm a4d4f9c0492b9cfda884c6d070eb9461188bf017e1e7481ecfec9e7eb39a427c glibc-langpack-ht-2.28-251.el8_10.16.aarch64.rpm af75b3c01fd75810d6c7dcb366bf01318fcbaade59ae812152531819e5764a9f glibc-langpack-hu-2.28-251.el8_10.16.aarch64.rpm 9dd9a6e19789767a619afc27fb587fe523fac592d34f0789deb62e7e3a02ab1f glibc-langpack-hy-2.28-251.el8_10.16.aarch64.rpm 0f747ab2e6c3ecb99152977b94c2e1a35c5c363584463d8eb825703913173fdb glibc-langpack-ia-2.28-251.el8_10.16.aarch64.rpm 1be2f0a850ac4a099ecd5db038f271ed938d44e7041ceb8f620484a98e0beaf8 glibc-langpack-id-2.28-251.el8_10.16.aarch64.rpm 3856a667a0433f50ce4f63493efff11377599c50a78743abd5f46f9a3d657175 glibc-langpack-ig-2.28-251.el8_10.16.aarch64.rpm 7c4ca5df6a2a0a5faf649e2bfce6cb1ffb6afd61f5a93acb5f1d84141daf43fd glibc-langpack-ik-2.28-251.el8_10.16.aarch64.rpm a7b58a3f7d52420cebf977e4f08fa6f8180088f82ca49bf44cbbcc28e24a6646 glibc-langpack-is-2.28-251.el8_10.16.aarch64.rpm 2995b8cdaf1371655e3121a3e86b5e2c808a3599709d3583ba16273c36103602 glibc-langpack-it-2.28-251.el8_10.16.aarch64.rpm ea8954a4c61dbb8251cde7a9f153bb5d34685ae11bae95dd99a41677454c7ea3 glibc-langpack-iu-2.28-251.el8_10.16.aarch64.rpm bfe4d542d85986f30e55d1e31652ef5855e2a9ca490f96dc1b00be85dcca6a8e glibc-langpack-ja-2.28-251.el8_10.16.aarch64.rpm ee631955a29682606f3c5ea398604f33621a16e1a4b9d5e53d4d4daa7576a943 glibc-langpack-ka-2.28-251.el8_10.16.aarch64.rpm 96cd4185985f7a9c459966d7a7da51ce1bdc703fad542d45dd119c45b10c94e4 glibc-langpack-kab-2.28-251.el8_10.16.aarch64.rpm 34c211e44b0ba28cdb6ba140bd6bb7a9d5cebb9dc54d2aa95645a00a48b9dceb glibc-langpack-kk-2.28-251.el8_10.16.aarch64.rpm 816b41cf0f952f77f44578d509394067ab8164fb71dcf0e053eacedeecfff6ab glibc-langpack-kl-2.28-251.el8_10.16.aarch64.rpm 17f3f415a6df42345d79b0753d573155d6706b4e8d71c32beb01cb7949b9c883 glibc-langpack-km-2.28-251.el8_10.16.aarch64.rpm 3361c5c3552e693528e0d9f3315119bc8e5de97fa0cf347b960ded0eef229cd0 glibc-langpack-kn-2.28-251.el8_10.16.aarch64.rpm ff2eb7f4d55b816ae2bab36eb2332777bd9b26f38b6b0a936640a5d7be0081c4 glibc-langpack-ko-2.28-251.el8_10.16.aarch64.rpm d1dd2f8aa774b55ff0eb404dbd6a0419090911680074ef845c6c8a7d1ca2c412 glibc-langpack-kok-2.28-251.el8_10.16.aarch64.rpm 83565672103d1499533ccec709d8e220a5358b34fa6be9b6ae871d36ab652236 glibc-langpack-ks-2.28-251.el8_10.16.aarch64.rpm 38d3a6d3db9e04691ada02152fe44eec59af23c08a65237bf3da946be2be01a7 glibc-langpack-ku-2.28-251.el8_10.16.aarch64.rpm 153da0c17e79da33e196f7658833648253038dc81b1c18d1eef815abe2351902 glibc-langpack-kw-2.28-251.el8_10.16.aarch64.rpm 947907ada02fda299c28d06728e031a6c8f155f046d9e8dbd26a10fea7e7bd69 glibc-langpack-ky-2.28-251.el8_10.16.aarch64.rpm fe3368ac2dfe78e0fda3b4bcf35a1431e87aecbe3e544ed4ef65f3ae79711ecf glibc-langpack-lb-2.28-251.el8_10.16.aarch64.rpm e210f9eb27e3924320360dcffc6a7011484463f65a86212181f7fc0b1c34dc60 glibc-langpack-lg-2.28-251.el8_10.16.aarch64.rpm 6ec69ae3eb4a75ee3d5ad4244c68904d75500ddd3cbae8bda9377b92861f6706 glibc-langpack-li-2.28-251.el8_10.16.aarch64.rpm ed219ff0431fabd776b4a007cad7646ad823a8420f14f8f4d21ea1917b3dc06c glibc-langpack-lij-2.28-251.el8_10.16.aarch64.rpm 09bfdd9bf405d864d3993ae04f960a7e76c4bf489b801d38773ce47d50d00af0 glibc-langpack-ln-2.28-251.el8_10.16.aarch64.rpm a637e5639280c9e59dc7ed33b636743c8ea7464523fe5502500659b0f7e97e48 glibc-langpack-lo-2.28-251.el8_10.16.aarch64.rpm 055a72a321aa033c29e89ff47cf7726b4314fce14848fe03a4a309803b802054 glibc-langpack-lt-2.28-251.el8_10.16.aarch64.rpm ae650e98e0f805dd96a43c483cbd145ee6fd8f5ad916f7a12155ba3833deb2ed glibc-langpack-lv-2.28-251.el8_10.16.aarch64.rpm 2b8427794403f38711c40078333487e715b5f17bb553d1b8cc605f4ecd38f070 glibc-langpack-lzh-2.28-251.el8_10.16.aarch64.rpm 084bc7863417942da456a9668792dba2671ed3008c2d32641de2bcc83f78733b glibc-langpack-mag-2.28-251.el8_10.16.aarch64.rpm 84dd6c37eb50927bbf3955d20bf2efca150bba78b55b45e2820066e862c2d397 glibc-langpack-mai-2.28-251.el8_10.16.aarch64.rpm 1ae57656ed89a20894fdc5bfeae1a17711a1b331e6f91697ca58e331bed10c43 glibc-langpack-mfe-2.28-251.el8_10.16.aarch64.rpm 3d4365f8582cefa758e9ddb0262dafe69ab014cb7a89200a8e9fd0548925dc13 glibc-langpack-mg-2.28-251.el8_10.16.aarch64.rpm f43799828dcfa49763ddeb2688f2eb10a38abd67b72adc826401cc0d7ab646ef glibc-langpack-mhr-2.28-251.el8_10.16.aarch64.rpm 66706f03dd5b14d89043fea6023f481ddd54502c4c66d4fcad4581fa3e77bdec glibc-langpack-mi-2.28-251.el8_10.16.aarch64.rpm 04753d6001082c43a79070daf47eeb7bb5a1c2d487bd3af2701597c828ececa2 glibc-langpack-miq-2.28-251.el8_10.16.aarch64.rpm 5bf9bd555d4e008c0de50db5b8c28914aebf804aef0dc1972a8a74591a14aeb1 glibc-langpack-mjw-2.28-251.el8_10.16.aarch64.rpm b5f056638c915c3bc2c909a4b4995a3af8b7dffeab5ce5d64375b3621550915a glibc-langpack-mk-2.28-251.el8_10.16.aarch64.rpm b7ea43d8601c387bcaae14346e7a7787d27ede73217b7a85f9ddcddc164e759a glibc-langpack-ml-2.28-251.el8_10.16.aarch64.rpm cbb280bd88c05e835e798e9a03b9770950dc8b5e9edd40e86817e5362f243c3e glibc-langpack-mn-2.28-251.el8_10.16.aarch64.rpm c91091706441e97150c70d80ff3ff26b86e8953e47bb656ca8e452238dd8e07d glibc-langpack-mni-2.28-251.el8_10.16.aarch64.rpm 6624105205251eff835c8d002c22e42f372af464b999057f844b6397a0b57de7 glibc-langpack-mr-2.28-251.el8_10.16.aarch64.rpm 86403622e358ead2cd256f394c85dee755604373b3d7dd2d4e554ae62c09040a glibc-langpack-ms-2.28-251.el8_10.16.aarch64.rpm e4592d9f5acc8e53faa620d360fe0a2ab22b463cf103fbf2f8232bdace24d939 glibc-langpack-mt-2.28-251.el8_10.16.aarch64.rpm c62f5a48180a1c83e6da449e71b31e528cef27ca5785ee58331d6af6c98ec37c glibc-langpack-my-2.28-251.el8_10.16.aarch64.rpm 7e6bc196366c98fbcc3d24905ff8546c46217f8bcf3c87cffe57225d80e84ab5 glibc-langpack-nan-2.28-251.el8_10.16.aarch64.rpm f3313533210a11332aa79787b48c99f28c8983ad816c688b067728efb54561ba glibc-langpack-nb-2.28-251.el8_10.16.aarch64.rpm b2b74daa134feecb72df9f3e44089e8e515f6874ab02c0069bf8895feae1b750 glibc-langpack-nds-2.28-251.el8_10.16.aarch64.rpm 18341e5f4122f8eae0995fa302ed3b749b4a44b4e2507a841288eccfd01bbc28 glibc-langpack-ne-2.28-251.el8_10.16.aarch64.rpm 026952a6edce7a1e80e588c418794d554ced0ea9693538033c2d5adc4052b316 glibc-langpack-nhn-2.28-251.el8_10.16.aarch64.rpm ac00440847ab9eaa082ebe9912fbc518847c24d10430d01fe774b6cab2aeff05 glibc-langpack-niu-2.28-251.el8_10.16.aarch64.rpm be5e1ba38ecfab53128ad69c50c480710d851e72f90d00591e3589dfad21ff74 glibc-langpack-nl-2.28-251.el8_10.16.aarch64.rpm 23363cf15168a3edb61f1b584553f110a11bf4667ef7bd1a7a0693bfe6650fad glibc-langpack-nn-2.28-251.el8_10.16.aarch64.rpm 6e8a6604975a1483bee25754227978c78db59f23ddd935d58015a140a23a1ea1 glibc-langpack-nr-2.28-251.el8_10.16.aarch64.rpm f60c6fb66a4fe6b2a796b54256ce9d675353f639585275d96d8702a317f8a88c glibc-langpack-nso-2.28-251.el8_10.16.aarch64.rpm 74bc8bc2f9bb1d7b5408ca8af222f320c92cae4618aaf5b61a29dca989750ec3 glibc-langpack-oc-2.28-251.el8_10.16.aarch64.rpm 569757b6dec367e188b9a307c0108026a812c58c8163e6fbfc553522b7619046 glibc-langpack-om-2.28-251.el8_10.16.aarch64.rpm 6e97bdcd8f5dcc1d870cc22cf9d7318c0b3eea173f67f3e274db83876ac85c2b glibc-langpack-or-2.28-251.el8_10.16.aarch64.rpm dc8fc49cb2a449eecb247496f0ae5f33b115f855e4e9d36cfa7a11c3a3f36e51 glibc-langpack-os-2.28-251.el8_10.16.aarch64.rpm 127d55fe3317b9fdfcbd2dc243731a1378be9eb3868b045e3bd4990b169c0706 glibc-langpack-pa-2.28-251.el8_10.16.aarch64.rpm e4822f3185ceb66957fb2633e1c17500dfbeeb049d5decc6d99bde4a4b85ba75 glibc-langpack-pap-2.28-251.el8_10.16.aarch64.rpm 4cd10f05050d91afcbed27e20cd41c98f02e0105c134bc8e1786be9a77188703 glibc-langpack-pl-2.28-251.el8_10.16.aarch64.rpm 35103f03c41b0cd1434ee0123878eecb2b4b61d884c15b41b2a4b99db2b1ad1c glibc-langpack-ps-2.28-251.el8_10.16.aarch64.rpm d4a5e5ae27f6fe2f8a19a949bb869e80b128b920c2693746da2701369adb8251 glibc-langpack-pt-2.28-251.el8_10.16.aarch64.rpm 66cab539ca72606001d0b4d57c170edd6299d0af4de79c2493df4bf3cbcfdd22 glibc-langpack-quz-2.28-251.el8_10.16.aarch64.rpm 1e35178c12848cd5623b7a61d3de18729bc0e166ac83ca47c6711d49d5e4b567 glibc-langpack-raj-2.28-251.el8_10.16.aarch64.rpm 73ab0cf58a402c4ec07722a6696cb41b3a145affec5a2018f9035056c1cc382c glibc-langpack-ro-2.28-251.el8_10.16.aarch64.rpm 0c1fc028f47d6ac0eda5ba157b1087b654e6372ef4c5af32a914a16c9d7cb940 glibc-langpack-ru-2.28-251.el8_10.16.aarch64.rpm 41d08cd4dcc5164032f025ce455381d692af6b31cf8a2f499ee1006f62e346ef glibc-langpack-rw-2.28-251.el8_10.16.aarch64.rpm 4c51f3fa8485c79b0c5c88b0bb8f580300526c456c61ad9c2b7464f6c6749d92 glibc-langpack-sa-2.28-251.el8_10.16.aarch64.rpm c64c76ef67d068cb03a021e20440cd3bdf85928faf2572b30fa9e26ad017e17b glibc-langpack-sah-2.28-251.el8_10.16.aarch64.rpm a0590138bb1d00b0ccfc2a42a48579fd0dff5659bd467af6a259643a72787138 glibc-langpack-sat-2.28-251.el8_10.16.aarch64.rpm 747a7606c633770521e6f6cdacd2727153c1a8371c57f54472d3a30bd1ba6387 glibc-langpack-sc-2.28-251.el8_10.16.aarch64.rpm 39e4d05a42d64d7bd8543f6935316907329e1bb4156d9bd9fb86c5f3e51c989f glibc-langpack-sd-2.28-251.el8_10.16.aarch64.rpm 3c936602c3b9600f98bd8958e0eeb702847145d63bb08de569bb392b80796a67 glibc-langpack-se-2.28-251.el8_10.16.aarch64.rpm cdf078f3f39aeb8beb13dfe500002455090feba0cf625020d8ffd1a8b9a2853f glibc-langpack-sgs-2.28-251.el8_10.16.aarch64.rpm 855f6ff90cc519b9b11011ee7cdd50f75a115bc3e3cc1a41f06779fd8919f381 glibc-langpack-shn-2.28-251.el8_10.16.aarch64.rpm ba662cb63f3f56aa296d59e1e1d9376ecb9f7df44a967f50d289a6a50ce469c8 glibc-langpack-shs-2.28-251.el8_10.16.aarch64.rpm 5c781bc6544775d5c6f673a57496cdd825221221b052056fd657e3e10c362c26 glibc-langpack-si-2.28-251.el8_10.16.aarch64.rpm 2f88e33352f8619b0a13f142d6823178a4f142134a91af9a276f65c975cf3196 glibc-langpack-sid-2.28-251.el8_10.16.aarch64.rpm e1b16555aa4296828447d8fcdc16326e6857a1b847b93bfa74094f9380e8752e glibc-langpack-sk-2.28-251.el8_10.16.aarch64.rpm 27838feddb46f755c7934e95d8729dd6288c634a0d470bdecfeba7269379bb3b glibc-langpack-sl-2.28-251.el8_10.16.aarch64.rpm 3b9ebb66f2fc5a3e15b631fa806e79a7b79e580bf669477dc2bfcab174cab1c6 glibc-langpack-sm-2.28-251.el8_10.16.aarch64.rpm 14f59625b498901338d92021df5b9ecd3f8c076786d3bada7a82e65dc0a34efb glibc-langpack-so-2.28-251.el8_10.16.aarch64.rpm 31112ca46d13e78b03e89ca8c98b8de9ee9964d3614d956abcb3f3cbe84dea71 glibc-langpack-sq-2.28-251.el8_10.16.aarch64.rpm 64491a9e991530750dc2ed8b9e8453445955d6520efa0bf261d6caae5e95c688 glibc-langpack-sr-2.28-251.el8_10.16.aarch64.rpm 5b41fcf521e684bfcf59238b1e3336eeb9ade630ba137e0e3a5b14771e7af16b glibc-langpack-ss-2.28-251.el8_10.16.aarch64.rpm 175dd4582a88a277008dc9f65b3d6041d6186fcaaa2ca0c972637fdfd04fffc2 glibc-langpack-st-2.28-251.el8_10.16.aarch64.rpm 78784e13f130facbd39a85d2842faac3f7e4a8b200f96b52e30368cb7482e6a7 glibc-langpack-sv-2.28-251.el8_10.16.aarch64.rpm 7e8c5a56d4f611b0ff460aaf0507d764a6f1d5bb0f285a7041cf9aefc12ee5c9 glibc-langpack-sw-2.28-251.el8_10.16.aarch64.rpm b58c84f738d7e13023694f3373ac332470c5cdacb1466b1562bd5194d91314c9 glibc-langpack-szl-2.28-251.el8_10.16.aarch64.rpm 012ecc6c229ca9587aeb4dab75e9dffe70ff8ff29eed7d049d23189886b57e8a glibc-langpack-ta-2.28-251.el8_10.16.aarch64.rpm a1507c227b5a194044a5b07b0939fc722f58e700272f27e62c4c8d81a56f376a glibc-langpack-tcy-2.28-251.el8_10.16.aarch64.rpm 14118271924895fd68ff151af1cdc8e4d7e799b4fca0ed901476d5b302ede600 glibc-langpack-te-2.28-251.el8_10.16.aarch64.rpm 1a5040fe9a2a8abf7c4f05c1e1226c071f6f9f06bc02cf5bdf969d84ab4a9c44 glibc-langpack-tg-2.28-251.el8_10.16.aarch64.rpm acd113c319947f6837b626aebfe632586365c67d6892298bce2f94f1206ccff2 glibc-langpack-th-2.28-251.el8_10.16.aarch64.rpm eecb83d0ec1dd7004c79167952f375855bc83df290a21be59ddb7a6e46c883e6 glibc-langpack-the-2.28-251.el8_10.16.aarch64.rpm 3b91f36c5533239ccf8c2abf397946017b2679b690056383ef9cf707c89c153f glibc-langpack-ti-2.28-251.el8_10.16.aarch64.rpm 07722e5bdb0a7aea829c7d7c34ca6004b338e14d057602fb640775fd86dc2f09 glibc-langpack-tig-2.28-251.el8_10.16.aarch64.rpm 9d5095e49f36c2ff977257d0bc76b7ca45f722e92385bb987214a877ca7828c4 glibc-langpack-tk-2.28-251.el8_10.16.aarch64.rpm 66e023e731be46b670b40b051d45469a26563a2c77c2c6cc091f6c3ba82637ef glibc-langpack-tl-2.28-251.el8_10.16.aarch64.rpm f0b07c1319a43e0403690af20efaadfa829527771f1930048f24477b05f8141a glibc-langpack-tn-2.28-251.el8_10.16.aarch64.rpm c7b8a6764785a1dce1a3ff23198a9295900a14df4193b6ecc900b360b0868b8f glibc-langpack-to-2.28-251.el8_10.16.aarch64.rpm 1fbddb97276a91e35cfcc5127b2988b2e4649543cb9f37883ab99e7dd78c4490 glibc-langpack-tpi-2.28-251.el8_10.16.aarch64.rpm 104892f92d9a1b10e6899261d7cb6a389f1b692c606bae599834cbfe800392b8 glibc-langpack-tr-2.28-251.el8_10.16.aarch64.rpm dacd9e48906eff1617463bcc3b6429082baf746985f659a345f2aa6dc8ed6580 glibc-langpack-ts-2.28-251.el8_10.16.aarch64.rpm 656a803d61a2def1bde7ba4c076b373025c5b0c90fa10ccbb214e3500da56b66 glibc-langpack-tt-2.28-251.el8_10.16.aarch64.rpm 745b5a38650af10c28d9667d2217415b38facda9ecd4992760a696209244345e glibc-langpack-ug-2.28-251.el8_10.16.aarch64.rpm b26f77a655f16ade389fa756a1f14ad3a09ff6ccddcd76da9d6b7d5681791f60 glibc-langpack-uk-2.28-251.el8_10.16.aarch64.rpm cb41a3f884c05e7e23601dc88edd28feaa25468fe295b2c772db1c1981562771 glibc-langpack-unm-2.28-251.el8_10.16.aarch64.rpm 750b5cc124d6aa1fdcb49b00cf960ca28880f70adb86f3b74daa3029917d36b9 glibc-langpack-ur-2.28-251.el8_10.16.aarch64.rpm a5ecd3b2edf149063d2c20a4f2ed9ac725f12f2bc70d09b23ee5de8961edbcdf glibc-langpack-uz-2.28-251.el8_10.16.aarch64.rpm 426af7496e57fd6c56df4213a397095e0e22beaee75e423fec46af238db5bc6d glibc-langpack-ve-2.28-251.el8_10.16.aarch64.rpm fad92227ed71ea2c81c43bf4ec087a336a87695fbd8e978fc672ef81d5bcea68 glibc-langpack-vi-2.28-251.el8_10.16.aarch64.rpm 7fef62b27db9c78ca5cf6f5fec8969fa48de277cc63ee43d3f7a7d13dd731e54 glibc-langpack-wa-2.28-251.el8_10.16.aarch64.rpm d4a4ff78983468c450a7e45f8553bbc13ccd43205fd480a8323ee9336d942b93 glibc-langpack-wae-2.28-251.el8_10.16.aarch64.rpm 9e9727d5820bfb9eb36f8346adf2fbd3a5e2516b9b97cfd460c72e39653084ad glibc-langpack-wal-2.28-251.el8_10.16.aarch64.rpm 05e32c80329b2bef7557d8b4ae37876a42d158668fb965f552875307850dc757 glibc-langpack-wo-2.28-251.el8_10.16.aarch64.rpm 088b903dc9b56d690f1aca5c82e97562e5b819a3501664af5769b6a3a124da72 glibc-langpack-xh-2.28-251.el8_10.16.aarch64.rpm 40d30d36380c3afac09b24e1ff780b1e996c9f696a078e7d4e9590ad27fcd8ac glibc-langpack-yi-2.28-251.el8_10.16.aarch64.rpm c899dcc0e89fd7ec1c1e7defdb5ecdcbae1fccfa212acdf0ba0facfbcfb385f4 glibc-langpack-yo-2.28-251.el8_10.16.aarch64.rpm 374bfd77ee62eee1f305b1ef5706e7df7ede33e44d218023e2e131e8510c5314 glibc-langpack-yue-2.28-251.el8_10.16.aarch64.rpm 92a21344a7c7125f26804de4893ee64a1f4bb9d876dc6ff553a3acd7cf3f560e glibc-langpack-yuw-2.28-251.el8_10.16.aarch64.rpm 6eb3e5f1d22c49583982b11b071fbc8c779e1be9819acc039394c26da7a04122 glibc-langpack-zh-2.28-251.el8_10.16.aarch64.rpm 119f2ec4fab0c2d88178aa4dbdb992a88cd077be2d782740455574e7019295de glibc-langpack-zu-2.28-251.el8_10.16.aarch64.rpm 2e0068b3c5893447bcb6796175d2d8ac70f74f5b40db2cb4dbd363cca56837eb glibc-locale-source-2.28-251.el8_10.16.aarch64.rpm 70123e4238482d43eaad3e382914a9a401938d50d9fd5efd9fd5492fd0503ef6 glibc-minimal-langpack-2.28-251.el8_10.16.aarch64.rpm 75cf56bbc600eff1d46b37435b45815a72effff275fc3336ca52b6ec7b3d7118 libnsl-2.28-251.el8_10.16.aarch64.rpm c62ecb65443e62f4b4495ceb4395f26af2b660069c6567e31f0fcac5034306c6 nscd-2.28-251.el8_10.16.aarch64.rpm 9e5508e8e4a97a5040e5af7e7e1045834f0914ade2fdd51b038209c9b7977248 nss_db-2.28-251.el8_10.16.aarch64.rpm 06b85f81b75ae97ea57af934e58222877aaf8efe56172274f1284036c375d0c0 RLSA-2025:3893 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241) * kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources (CVE-2024-53150) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.50.1.el8_10.aarch64.rpm 94ffcc3ec30af708baa2fcdd6d6ce651330621a03e8e8af4feaee1c8e807de74 kernel-4.18.0-553.50.1.el8_10.aarch64.rpm 532e1ef882559930d43e57a1c47ad4de294fcab6f47e882ef44664ee330a81fc kernel-abi-stablelists-4.18.0-553.50.1.el8_10.noarch.rpm a5834b406e403f149cee35152bc57f52efcab9668493676cb0e8a83d879ae2ea kernel-abi-stablelists-4.18.0-553.50.1.el8_10.noarch.rpm a5834b406e403f149cee35152bc57f52efcab9668493676cb0e8a83d879ae2ea kernel-core-4.18.0-553.50.1.el8_10.aarch64.rpm e434a61bcf2d0bb1f2c9874172a9defc0c8df4609e1a54671fc302ede0ce49ce kernel-cross-headers-4.18.0-553.50.1.el8_10.aarch64.rpm bd6475d7cf737d70eeb40a6b1cd30d561f5ebe718ee7c4a30a9f0b0c97c0a4a3 kernel-debug-4.18.0-553.50.1.el8_10.aarch64.rpm 86890255716d2effb0103186b36a54fda96d5b32b0ec1d8b6e386e5d75ee66cd kernel-debug-core-4.18.0-553.50.1.el8_10.aarch64.rpm 1cf288884dd56ed4fcd66a64cd2d7234c8d9261997c64c3c134958a44268bdc6 kernel-debug-devel-4.18.0-553.50.1.el8_10.aarch64.rpm 1ac67f0f1df323e87f325619863dbd65b869e8506ddd0c9cf8bb945401b72267 kernel-debuginfo-common-aarch64-4.18.0-553.50.1.el8_10.aarch64.rpm 40ed9a82db64f82b38c61f01eddc8956d2db7cd124781e7451431a74da5edeae kernel-debug-modules-4.18.0-553.50.1.el8_10.aarch64.rpm 5f7561972d99b169ae96d4697d2d039ac38e1d106d1c2713aeab81b56dc271a8 kernel-debug-modules-extra-4.18.0-553.50.1.el8_10.aarch64.rpm 540e0f0d64aad897518381aa53d9ccfb32d5a3f8bdba162c710b92af0a7b78c6 kernel-devel-4.18.0-553.50.1.el8_10.aarch64.rpm 1f6cfbb8af8babd9139e691986bdc868d303747ff4e90b8cdac03547d3bcf49e kernel-doc-4.18.0-553.50.1.el8_10.noarch.rpm 8bff62618cb23496d9b3624a85b3b5ff90d716ab49fcf835a97e249a767720b9 kernel-doc-4.18.0-553.50.1.el8_10.noarch.rpm 8bff62618cb23496d9b3624a85b3b5ff90d716ab49fcf835a97e249a767720b9 kernel-headers-4.18.0-553.50.1.el8_10.aarch64.rpm 5d8a520562b87560238d3e35d9fa77597aa4b46923dc5a523803549176ba04b1 kernel-modules-4.18.0-553.50.1.el8_10.aarch64.rpm 62cba2a0ab932d43a9678c6c9c525dccc75c04b7f8095036f173bdd73854b444 kernel-modules-extra-4.18.0-553.50.1.el8_10.aarch64.rpm c23bc2a57ba68420101549ecbea8cb8dd96bac1987a2b3a6df1a2cc14c8e0f5d kernel-tools-4.18.0-553.50.1.el8_10.aarch64.rpm ceb50ba06e5a1bd0f846e2508a3abce68f7ab34eea0cab77305702f5ff9044a6 kernel-tools-libs-4.18.0-553.50.1.el8_10.aarch64.rpm 76468dc0ca31197d360f2c10bee61f285cdc8ee8ca69f7fce8f31385158ab102 perf-4.18.0-553.50.1.el8_10.aarch64.rpm ce88bbd776280a4944c90f8027b5d37aa1a764bb8d8875459b1998c4c0421919 python3-perf-4.18.0-553.50.1.el8_10.aarch64.rpm 9cbc7a349b369c32e561dfdce26c66f7a4c6fd4d24dc9ca96ab234ad62a07957 RLSA-2025:3913 Moderate: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.2.5-17.el8_10.aarch64.rpm 90d3edd605ad5e40e8a9fb7cb765e567a33cd775894ecc16a9a9e5305aa61a51 expat-devel-2.2.5-17.el8_10.aarch64.rpm b1e7c0a2fcd1d3c15a6785a9587cddcb1927de012c46bdd714267645a333972b RLSA-2025:4051 Moderate: gnutls security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gnutls. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS. Security Fix(es): * gnutls: GnuTLS Impacted by Inefficient DER Decoding in libtasn1 Leading to Remote DoS (CVE-2024-12243) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnutls-3.6.16-8.el8_10.3.aarch64.rpm 99ab440b144e42fdbaac96cf15a461f1a5aa2c8c91c5c239284215f5ca9d4eb9 RLSA-2025:4043 Moderate: bluez security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for bluez. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The bluez packages contain the following utilities for use in Bluetooth applications: hcitool, hciattach, hciconfig, bluetoothd, l2ping, start scripts (Rocky Enterprise Software Foundation), and pcmcia configuration files. Security Fix(es): * BlueZ: Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability (CVE-2023-27349) * bluez: audio profile avrcp parse_media_element out-of-bounds read information disclosure vulnerability (CVE-2023-51589) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bluez-5.63-5.el8_10.aarch64.rpm c461c6589deaeda19c17d63db2c9ac9be2e0f9eac66e199cf74be75010fa544d bluez-hid2hci-5.63-5.el8_10.aarch64.rpm 7290cb47b2aeb773c502ddcc899f1fad377027213f4d494c5efb7fb6325c370c bluez-libs-5.63-5.el8_10.aarch64.rpm 751f1ced69bce22f11f7f8c5e2bb79f7349b79fc08af6ccfd15b9981c4bb6f66 bluez-obexd-5.63-5.el8_10.aarch64.rpm b6b648df3252150e1996297cf28cbf260d59e7d9f8eb44cae2bbd30e934b4922 RLSA-2025:4048 Moderate: xmlrpc-c security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for xmlrpc-c. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list XML-RPC is a remote procedure call (RPC) protocol that uses XML to encode its calls and HTTP as a transport mechanism. The xmlrpc-c packages provide a network protocol to allow a client program to make a simple RPC (remote procedure call) over the Internet. It converts an RPC into an XML document, sends it to a remote server using HTTP, and gets back the response in XML. Security Fix(es): * libexpat: expat: Improper Restriction of XML Entity Expansion Depth in libexpat (CVE-2024-8176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms xmlrpc-c-1.51.0-11.el8_10.aarch64.rpm 80cb48cec260c512d3c90adb65eadd29889077f3d9f331aa059fe468077297ab xmlrpc-c-client-1.51.0-11.el8_10.aarch64.rpm 7593d5eadda1a23777de27f68d89cb89f444ca00954f2b0fb134b69d49dabbb1 RLSA-2025:4049 Moderate: libtasn1 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libtasn1. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list A library that provides Abstract Syntax Notation One (ASN.1, as specified by the X.680 ITU-T recommendation) parsing and structures management, and Distinguished Encoding Rules (DER, as per X.690) encoding and decoding functions. Security Fix(es): * libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS (CVE-2024-12133) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libtasn1-4.13-5.el8_10.aarch64.rpm c9fe249150e0dfd4b0ecea23f0e1b71451203b18987c38454a3b56a8bdb6d0c1 RLSA-2025:4560 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Integer overflow in append_param_quoted (CVE-2025-32050) * libsoup: Heap buffer overflow in sniff_unknown() (CVE-2025-32052) * libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() (CVE-2025-32053) * libsoup: Out of bounds reads in soup_headers_parse_request() (CVE-2025-32906) * libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value (CVE-2025-32911) * libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header (CVE-2025-32913) * libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server (CVE-2025-46421) * libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c (CVE-2025-46420) * libsoup: Integer overflow in append_param_quoted [rhel-8.10.z] (CVE-2025-32050) * libsoup: Heap buffer overflow in sniff_unknown() [rhel-8.10.z] (CVE-2025-32052) * libsoup: Heap buffer overflows in sniff_feed_or_html() and skip_insignificant_space() [rhel-8.10.z] (CVE-2025-32053) * libsoup: Out of bounds reads in soup_headers_parse_request() [rhel-8.10.z] (CVE-2025-32906) * libsoup: Double free on soup_message_headers_get_content_disposition() through "soup-message-headers.c" via "params" GHashTable value [rhel-8.10.z] (CVE-2025-32911) * libsoup: NULL pointer dereference in soup_message_headers_get_content_disposition when "filename" parameter is present, but has no value in Content-Disposition header [rhel-8.10.z] (CVE-2025-32913) * libsoup: Memory leak on soup_header_parse_quality_list() via soup-headers.c [rhel-8.10.z] (CVE-2025-46420) * libsoup: Information disclosure may leads libsoup client sends Authorization header to a different host when being redirected by a server [rhel-8.10.z] (CVE-2025-46421) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-8.el8_10.aarch64.rpm cb9b1102cae098e8adfcb1e192b3a39c729702d57ed48374ab60fe43a8501798 RLSA-2025:8056 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906) * kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970) * kernel: vsock: Keep the binding until socket destruction (CVE-2025-21756) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.53.1.el8_10.aarch64.rpm e19afc7a4fcb8155a24ebf82590f96985711da06b03c6f86bed4e4ce07d1d2a6 kernel-4.18.0-553.53.1.el8_10.aarch64.rpm eb8acada0ef4fb89b4149ef6fdd80d277a847bde2b5265487a6ee24058dea95c kernel-abi-stablelists-4.18.0-553.53.1.el8_10.noarch.rpm 2eb2f94461dc54dc22508d3aa5bbccab8fb4b933712b9e01ae471d69a78f3e3f kernel-abi-stablelists-4.18.0-553.53.1.el8_10.noarch.rpm 2eb2f94461dc54dc22508d3aa5bbccab8fb4b933712b9e01ae471d69a78f3e3f kernel-core-4.18.0-553.53.1.el8_10.aarch64.rpm 485ba3c046d178fde0aadfcb9c1fc5827e2be88caf735693edac4db186346147 kernel-cross-headers-4.18.0-553.53.1.el8_10.aarch64.rpm ac7a1aae3e3430ec83f385beaf0bcdc7e792d5fcf9b56809dfdd69b1770c4f66 kernel-debug-4.18.0-553.53.1.el8_10.aarch64.rpm 48d0ab01531611e38b806b700d7e9b94ad679aa3c15a89e98e8d26b39f609f13 kernel-debug-core-4.18.0-553.53.1.el8_10.aarch64.rpm 6ae06a75834721443154fe6e45f69caed7a8d380d5712b207dcd49e5cb877649 kernel-debug-devel-4.18.0-553.53.1.el8_10.aarch64.rpm 8a0f79b8dfe45435c30e152d58a802faf8c5b3653b7bb9d4cd77118dd6d7a99a kernel-debuginfo-common-aarch64-4.18.0-553.53.1.el8_10.aarch64.rpm b185cf936c49541a78e58f9f99987503897686467ba404a57f1c2fe168cf96c5 kernel-debug-modules-4.18.0-553.53.1.el8_10.aarch64.rpm c3c7ae330bbd8c746cc5352820941ad44b373b9699b5372699a637c3353b9fec kernel-debug-modules-extra-4.18.0-553.53.1.el8_10.aarch64.rpm 9740d0b03a7b0749bfd96b53bcf460db7b00333a1544f9bf34f2926bf97cd18c kernel-devel-4.18.0-553.53.1.el8_10.aarch64.rpm 92a17e8908963f7fa77ccffee09f3f11e937dfe90a16dfedee0c8c7315a7ccad kernel-doc-4.18.0-553.53.1.el8_10.noarch.rpm 89dce0380879c136cb50a2f385ea6767750dbda775923dc7dee5afc328d07cf6 kernel-doc-4.18.0-553.53.1.el8_10.noarch.rpm 89dce0380879c136cb50a2f385ea6767750dbda775923dc7dee5afc328d07cf6 kernel-headers-4.18.0-553.53.1.el8_10.aarch64.rpm f4db1e2dd4c2f34be6412e6f7f3088a15765d2894fda7b6c2079ff700b3a5703 kernel-modules-4.18.0-553.53.1.el8_10.aarch64.rpm 7a5681dfd14c5059db3cbf0952b6f6edd2f60cbad0acd093cc593533bbc82964 kernel-modules-extra-4.18.0-553.53.1.el8_10.aarch64.rpm 1956e28660a16a80ce5aa941c8c381000b54aff5ca671101ba0532d4809d7da8 kernel-tools-4.18.0-553.53.1.el8_10.aarch64.rpm 7a14fa252ed531f2441f19ddeb41617b2981cde7cfa7a5f5cc6160e34df2ae83 kernel-tools-libs-4.18.0-553.53.1.el8_10.aarch64.rpm fe400f4e6ce947c8d0762f1e04edb8c33b35a7c3b496d80bb7aaf4a9b8229005 perf-4.18.0-553.53.1.el8_10.aarch64.rpm bab9cb2ce85824694bb6abac0bb78c1b47a81a617737d3f34dd755d05c0f76b5 python3-perf-4.18.0-553.53.1.el8_10.aarch64.rpm e2d0b0e18cc9ec7d17f80b55edfc5ce877c21db5b07856220e07dd2f5ae44af9 RLSA-2025:8132 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Heap buffer over-read in `skip_insignificant_space` when sniffing content (CVE-2025-2784) * libsoup: Denial of Service attack to websocket server (CVE-2025-32049) * libsoup: OOB Read on libsoup through function "soup_multipart_new_from_message" in soup-multipart.c leads to crash or exit of process (CVE-2025-32914) * libsoup: Integer Underflow in soup_multipart_new_from_message() Leading to Denial of Service in libsoup (CVE-2025-4948) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-9.el8_10.aarch64.rpm 8e747fe19796bfe4fa78a6577927b512476b7a4ff7b751160ad62e611adff1fd RLSA-2025:8246 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CVE-2024-43842) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.54.1.el8_10.aarch64.rpm 25247136e6d1cd038d32f6153eab53b2a1a43f3b43d62e80a31e691c86d9c5d2 kernel-4.18.0-553.54.1.el8_10.aarch64.rpm 99ed77d407ce527ed693a04c9051631db6d4297e00c3f12155f2a8cc298e1970 kernel-abi-stablelists-4.18.0-553.54.1.el8_10.noarch.rpm e943777d96be15a2f733c26a82ac31da1de9ec367d3bba230b148c3e68a470e8 kernel-abi-stablelists-4.18.0-553.54.1.el8_10.noarch.rpm e943777d96be15a2f733c26a82ac31da1de9ec367d3bba230b148c3e68a470e8 kernel-core-4.18.0-553.54.1.el8_10.aarch64.rpm 5947cd2c95356b7aab055f873f2700444a7f872a140813b7221a4e2f6b325fb9 kernel-cross-headers-4.18.0-553.54.1.el8_10.aarch64.rpm 7f33659414c90338e89939a0947cf845357767f2e2a2d19fbcb9e051eb66ab7e kernel-debug-4.18.0-553.54.1.el8_10.aarch64.rpm 8e9a7d320fc61542fe64c7bbb7addf3753ba3ad6ac96f354a8a688568e6502d6 kernel-debug-core-4.18.0-553.54.1.el8_10.aarch64.rpm 75b7b2c60e86537f7529daaed2939eb7e0abe9450d3bd10c9a9c9fa0153f264c kernel-debug-devel-4.18.0-553.54.1.el8_10.aarch64.rpm 339507aafe5dddbe5839ea3ccf9335e9e903cc9088282483786d8bcf1cfcaa37 kernel-debuginfo-common-aarch64-4.18.0-553.54.1.el8_10.aarch64.rpm 00574738580bb918cce77d8fd3d13ee58c371c95453e87525fdf2fdb61f8405d kernel-debug-modules-4.18.0-553.54.1.el8_10.aarch64.rpm 09cac49f5312e54721895ee8a1a300e140efbe64ec474d5e1433be993c6ca2c7 kernel-debug-modules-extra-4.18.0-553.54.1.el8_10.aarch64.rpm d05fdec14ad01dd92551d7e641715c1d3aaccede02ca693d9f7a51b271c160b0 kernel-devel-4.18.0-553.54.1.el8_10.aarch64.rpm 480b90d7bc8b673410a8d04e52bd32f1a5b30ae1a6eb17103cf0bf4d2899190c kernel-doc-4.18.0-553.54.1.el8_10.noarch.rpm 5a58eacd593ebd9938b90cfde46f9ddb611ddfe68b87dc058f1f974085d9da46 kernel-doc-4.18.0-553.54.1.el8_10.noarch.rpm 5a58eacd593ebd9938b90cfde46f9ddb611ddfe68b87dc058f1f974085d9da46 kernel-headers-4.18.0-553.54.1.el8_10.aarch64.rpm d7334b9556b7e934314a88febcb6494a04130fab524625ed65699ab423638019 kernel-modules-4.18.0-553.54.1.el8_10.aarch64.rpm 94b381468c311ba972f9cd9dde576f0b9d2d96ccdf84f9c1fdd717c5b5b24081 kernel-modules-extra-4.18.0-553.54.1.el8_10.aarch64.rpm 8dc71ea96137363ad4900d3548ea46137a283db1f5f758663e7955bd917d91a4 kernel-tools-4.18.0-553.54.1.el8_10.aarch64.rpm 29748df6b55cbf930b3ba9d067956b07fec1bfec9f0506c0dfc7982a307ee108 kernel-tools-libs-4.18.0-553.54.1.el8_10.aarch64.rpm f8c34f9c8b949ab78419648af190591681bde8231951ecad45d9c068a846a750 perf-4.18.0-553.54.1.el8_10.aarch64.rpm 7a25125234ab61f7165a38c7c26f31a2ede365ebe075f31c26770bce90438a72 python3-perf-4.18.0-553.54.1.el8_10.aarch64.rpm 66f40d8a498f1e259c0416f013b71c9532294b76ac69df28a4cc1cc40e35c0ff RLSA-2025:8395 Low: rsync security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Low An update is available for rsync. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rsync utility enables the users to copy and synchronize files locally or across a network. Synchronization with rsync is fast because rsync only sends the differences in files over the network instead of sending whole files. The rsync utility is also used as a mirroring tool. Security Fix(es): * zlib: Out-of-bounds pointer arithmetic in inftrees.c (CVE-2016-9840) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms rsync-3.1.3-23.el8_10.aarch64.rpm d17447cab2710efb3598bf15f582ad7de73497eabf64e098aebfaf1c4a0395e6 rsync-daemon-3.1.3-23.el8_10.noarch.rpm ffac7441365c409e96cc4fe0208b912b5740da1aee4dce43e4a6cb8a9b83afe5 rsync-daemon-3.1.3-23.el8_10.noarch.rpm ffac7441365c409e96cc4fe0208b912b5740da1aee4dce43e4a6cb8a9b83afe5 RLSA-2025:8411 Moderate: krb5 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for krb5. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Kerberos is a network authentication system, which can improve the security of your network by eliminating the insecure practice of sending passwords over the network in unencrypted form. It allows clients and servers to authenticate to each other with the help of a trusted third party, the Kerberos key distribution center (KDC). Security Fix(es): * krb5: Kerberos RC4-HMAC-MD5 Checksum Vulnerability Enabling Message Spoofing via MD5 Collisions (CVE-2025-3576) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms krb5-devel-1.18.2-32.el8_10.aarch64.rpm 334353e3f67d7b200747c7fd4826265bbc89073643c05f4e46520dfa265d7055 krb5-libs-1.18.2-32.el8_10.aarch64.rpm 59a25a1cfd22084306a8a9fd9ae5cc42efea451b7f27f379d5d0fdfbb0ec5421 krb5-pkinit-1.18.2-32.el8_10.aarch64.rpm 55d5bc555274bc8ee7a740e1053b4c82dfa502a09bb33e8d917ca9ec811b1451 krb5-server-1.18.2-32.el8_10.aarch64.rpm 95bd88276774bf082c6e71e9253c4b293c4de31f8a970f50ffbe6ac1d6a52076 krb5-server-ldap-1.18.2-32.el8_10.aarch64.rpm ee2440901807a5cc96fee74f7c33065b29bfb68ccfd723e667d2bcafc5056c68 krb5-workstation-1.18.2-32.el8_10.aarch64.rpm e05af16ef8219b2b7dcbd17ef93ded03c93942fb037399fb8692c5a414244338 libkadm5-1.18.2-32.el8_10.aarch64.rpm cdccd6259d6a49efdb3d86046db5e5ee1f67d94e0093835159ef185e98b004a5 RLSA-2025:8676 Moderate: libxslt security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxslt. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. Security Fix(es): * libxslt: Processing web content may disclose sensitive information (CVE-2023-40403) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxslt-1.1.32-6.2.el8_10.aarch64.rpm 1176a4ba42ebbaaffbd0fd012be7043eb7e3266d53be2e086c303149e03d13c3 RLSA-2025:8686 Moderate: glibc security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glibc. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix(es): * glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH (CVE-2025-4802) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glibc-2.28-251.el8_10.22.aarch64.rpm cdffccc69ecc97d60e2835902bfec4f9e5475b31dcb1ff9bad801e8c182bc159 glibc-all-langpacks-2.28-251.el8_10.22.aarch64.rpm 8eef2ed843e93dea388f53ed28a4fb3c2d790985ae0f51f5485047ca60414f6a glibc-common-2.28-251.el8_10.22.aarch64.rpm 383e84d49cc299e9d5b9c99799e59fc0c262a57961376d36dc02a75b102658d5 glibc-devel-2.28-251.el8_10.22.aarch64.rpm 7624321fd2ecc114a07bee8c24a17e5b4ad57dd21f9c7a30e3cba83eea37223c glibc-doc-2.28-251.el8_10.22.noarch.rpm 821d85e079773f3043956c0cdb1186ceba913a3bdaaed0cf04cbf44107a6cfb6 glibc-doc-2.28-251.el8_10.22.noarch.rpm 821d85e079773f3043956c0cdb1186ceba913a3bdaaed0cf04cbf44107a6cfb6 glibc-gconv-extra-2.28-251.el8_10.22.aarch64.rpm c4d14bb9199dfb15c76886fcc05c0472fb9facadec9976c8cb388815e78d42e5 glibc-headers-2.28-251.el8_10.22.aarch64.rpm 1f39700fda840bb9564ec62f7ee7ed938d279ea10213d115264721857d75b4b7 glibc-langpack-aa-2.28-251.el8_10.22.aarch64.rpm 662aa0940e8bad31d545e1aee67357ef337a17a6c16da80021c32b90c21aa241 glibc-langpack-af-2.28-251.el8_10.22.aarch64.rpm 851fdb0339d64a22b29224aa520cbd25382c8aa40fe51ed217c3fe0f249ea832 glibc-langpack-agr-2.28-251.el8_10.22.aarch64.rpm 052d0449e1ba50e29bbab325a43876bb3b97fde0eea5535904187a245b610ef3 glibc-langpack-ak-2.28-251.el8_10.22.aarch64.rpm de76056f00ee41032b923d135139da16761a87fce433ce3b0af4bf6a8a382a88 glibc-langpack-am-2.28-251.el8_10.22.aarch64.rpm f8ed063587ba52c1df8a1a9609619456cc61ac1e2cb3dd021c2cd237a6cf7dce glibc-langpack-an-2.28-251.el8_10.22.aarch64.rpm 2410a98ff50e4af8206f8cc83acffc0b947e711fbe9db817a4b212c50098cd34 glibc-langpack-anp-2.28-251.el8_10.22.aarch64.rpm 2518cf236c46426c49297e0eaa181aeb6c85c06e8c7fcd28f48ca12da2daadcb glibc-langpack-ar-2.28-251.el8_10.22.aarch64.rpm 1ba2a35550dd415c8fc9de982165e2fb5b160ae6874d31d5b9cb8b42b197bc44 glibc-langpack-as-2.28-251.el8_10.22.aarch64.rpm 26cb7e38d5f23405256d78e73d49ed4eaff35bae09df1c5bf16508b88da82b9a glibc-langpack-ast-2.28-251.el8_10.22.aarch64.rpm 89108d4182834eec98bab385bc5d490d533cc4a98d3bad332c0dc087ae12147b glibc-langpack-ayc-2.28-251.el8_10.22.aarch64.rpm 4544d9cd1d7946f2c15474938f801b26ab17b669ef5eafc496c3fc69ef3356ba glibc-langpack-az-2.28-251.el8_10.22.aarch64.rpm 9731808df8180307d616416afd56423a574f6b8bd7cc8c28b9fea505a392b392 glibc-langpack-be-2.28-251.el8_10.22.aarch64.rpm 8028cbd758b8c803f265254a1d019fdd6ba15c48b3fc92a9deb42da3e65a48e0 glibc-langpack-bem-2.28-251.el8_10.22.aarch64.rpm 56a1b85ebb846af4529e456a2552eb830bd337dcddcbd0fd526cafeee9c9c868 glibc-langpack-ber-2.28-251.el8_10.22.aarch64.rpm 4ac9a0e8370f28f7917e9081baf47bbf995005a42c2ee886da8ca85f76e0b04e glibc-langpack-bg-2.28-251.el8_10.22.aarch64.rpm 19ffc5212a7a70dd8e4e75f66149f6f343f74a9d986ca8a51f4173bf95f5d49e glibc-langpack-bhb-2.28-251.el8_10.22.aarch64.rpm bd62d4bd3fc5ab5483b55b32a535307159044be388d24e10e7a2b43d05df5a99 glibc-langpack-bho-2.28-251.el8_10.22.aarch64.rpm faa2d34e5978efeee6f5bec67ad5b2df5969376dfd95ee15c7cd5370e01e31c2 glibc-langpack-bi-2.28-251.el8_10.22.aarch64.rpm 51192aba2c3ddfcd74996d4bbc96d19e01de0f0923c6aa15446ef5db10cddec9 glibc-langpack-bn-2.28-251.el8_10.22.aarch64.rpm 2f977bbdf035234df6658d73dba9182863ac569fb2cc10fed18d85be578e9973 glibc-langpack-bo-2.28-251.el8_10.22.aarch64.rpm b2135815a110ad22c893708aae024542cbeae577d9d304b526d6650a96b67fa1 glibc-langpack-br-2.28-251.el8_10.22.aarch64.rpm 672f21590518af4bc76b94098dbd649f1508af621c1f315164ebd70a0626f2c4 glibc-langpack-brx-2.28-251.el8_10.22.aarch64.rpm 1ad3a7f332024ec131acc6df9500ffa15d7e299526115b15fbb433be5f2bda58 glibc-langpack-bs-2.28-251.el8_10.22.aarch64.rpm 503d72d88eeebea6cea832b18a5e33926eb420096bc77fb9fb7a04be9619aefc glibc-langpack-byn-2.28-251.el8_10.22.aarch64.rpm 88baea6d50580e20732d054e4b828951c1a0cbd9bed52b20ebd970cec5923596 glibc-langpack-ca-2.28-251.el8_10.22.aarch64.rpm fa7f91bccdf909185b7147818b5a901c3d64c1c4eb08dfc455d73778b4f62070 glibc-langpack-ce-2.28-251.el8_10.22.aarch64.rpm 8bea373b48c27f0718fb90d1c2fca0671a942e602d50a2d4caf1e7b7f411f93b glibc-langpack-chr-2.28-251.el8_10.22.aarch64.rpm d5c24291cba099258b8eba9502b31c093b78834ef2953f2053f24289537845e0 glibc-langpack-cmn-2.28-251.el8_10.22.aarch64.rpm 9a0bbbb913b2faf089e901eab0243db421fc52a23092e740b042d37e3078083b glibc-langpack-crh-2.28-251.el8_10.22.aarch64.rpm 7a5b10e18b3de7ad51e6578777d42209bc074343885a13de9a4af03658b4acd9 glibc-langpack-cs-2.28-251.el8_10.22.aarch64.rpm 64f4567236ecf992a746dc48497d231e046196ef86ec5a86ce671182c263ab2a glibc-langpack-csb-2.28-251.el8_10.22.aarch64.rpm 08ff5fb0729e768ee8df091021d1bf90309fedc79f29c2aac8a859ff75a1586a glibc-langpack-cv-2.28-251.el8_10.22.aarch64.rpm 5ea8d6bf7810f17afbb6da80a458be434298a893832362b8bf85ccc7770bf645 glibc-langpack-cy-2.28-251.el8_10.22.aarch64.rpm 0c6fac2bc3ce7040b775b6ab7be67b3fa11ca1ff7213c039e5cf4803b5c8cbd7 glibc-langpack-da-2.28-251.el8_10.22.aarch64.rpm 6ad39ab98e753b283ea6533f5856338857462feafb220749f0e4253db1191292 glibc-langpack-de-2.28-251.el8_10.22.aarch64.rpm fdcee950af3a98f39e5f52be04f532a05ec9eb3f772c02debd2431a6a2340223 glibc-langpack-doi-2.28-251.el8_10.22.aarch64.rpm d0a6002c450c5fd80773343ae2569d55a44d7ec44972897068f376c2e6d6a5f8 glibc-langpack-dsb-2.28-251.el8_10.22.aarch64.rpm 3de2df042556a5c943d1d46b9903acad415bcdcebe1bc8492b8c358858ed9ea3 glibc-langpack-dv-2.28-251.el8_10.22.aarch64.rpm e0ab6382847da32994047d4e54df01e326ea5d62eb87b94d4859c3bdc9a12f98 glibc-langpack-dz-2.28-251.el8_10.22.aarch64.rpm 4b6193c7709b63de1946b5f2e4b9b7eec2b7432ff8f8331bb4eb011b9e1cefa6 glibc-langpack-el-2.28-251.el8_10.22.aarch64.rpm 676ae1355e31576bc687885a41c0e0a416faafe07b429e67c4b2243ecd0d58d1 glibc-langpack-en-2.28-251.el8_10.22.aarch64.rpm fdb8adaf2f8e25bef6b41827ac1646b9686a6ae2269ef16439158663f89def33 glibc-langpack-eo-2.28-251.el8_10.22.aarch64.rpm ddb5cfeb5d088a2a3095b344207be728a53e6b19e0a9cb304bc24090d74b2b49 glibc-langpack-es-2.28-251.el8_10.22.aarch64.rpm b07c8735b3e6486567e30d6db24d1b9d015c5cf54c78b0dade0247249f5d34c2 glibc-langpack-et-2.28-251.el8_10.22.aarch64.rpm fc89e2578d439a66d649e9a3583635a87808d351397ed9f60ae748bf286af876 glibc-langpack-eu-2.28-251.el8_10.22.aarch64.rpm 45a10651be5a6401cf264b170bf25219807a230da70d3f5c870e280620b1c8dd glibc-langpack-fa-2.28-251.el8_10.22.aarch64.rpm 31eab054bdafeb45c0dd583343f3dca1cd24b246806cfb44c5b46f23e87b2140 glibc-langpack-ff-2.28-251.el8_10.22.aarch64.rpm e236118914010717c89295c75ee9f6ebd410957f0b22bc0b131e463f222480fb glibc-langpack-fi-2.28-251.el8_10.22.aarch64.rpm a54a56b6421f4a6765fe0973f1d8cd6387a4a313d67a032fbfb460e87db3b062 glibc-langpack-fil-2.28-251.el8_10.22.aarch64.rpm cfdf84c0c7b1788fe6362fc1b93b01ed88709515ef7f5086d565ac0b052f8eb1 glibc-langpack-fo-2.28-251.el8_10.22.aarch64.rpm 6a506e2ad287c349185904dd4ea08f9b60c09f030306c80722cb7e04de84c448 glibc-langpack-fr-2.28-251.el8_10.22.aarch64.rpm 9765715d4c43114c9131e13d7e985a5f37c0d51857806285e0e491468e5823e0 glibc-langpack-fur-2.28-251.el8_10.22.aarch64.rpm 150c8df7d421917a6b3f5436b5616a7c7d76efc2506fc17c6558bfe9adefc621 glibc-langpack-fy-2.28-251.el8_10.22.aarch64.rpm fd30d947ac3d7c8b3c4d92864e79f401e38194a0d0f4b74af51f028f8d4cd6a1 glibc-langpack-ga-2.28-251.el8_10.22.aarch64.rpm 9805bfdeeaecd84a5ea84b674d084d6537ef91632ad2b5076d53317788b6c801 glibc-langpack-gd-2.28-251.el8_10.22.aarch64.rpm 8d01f5614bf1829b4b0fc2633772765b8e64c0720bc23e3c031e43b35b33c3aa glibc-langpack-gez-2.28-251.el8_10.22.aarch64.rpm 532e312f592cf852834d5570711addf42e2058e312c7b431147c79243e3dde1c glibc-langpack-gl-2.28-251.el8_10.22.aarch64.rpm e5f2783d2abf59ea61919d18e16a17274337f3e1956c99f5deb5c4af689e9c04 glibc-langpack-gu-2.28-251.el8_10.22.aarch64.rpm 24134ddb80bdc3644fdcfbfa33557670011b037355be95baa45e1d9e33150767 glibc-langpack-gv-2.28-251.el8_10.22.aarch64.rpm 885663e009b6ae4301269061bb173b486b3108932a2e814a6d6ca929e5d1a28c glibc-langpack-ha-2.28-251.el8_10.22.aarch64.rpm adb65f37b7af11c0e933922259fadd5fb2de1ddcbd98af266005f922e9a0d45d glibc-langpack-hak-2.28-251.el8_10.22.aarch64.rpm 9e89df2e8fc8580eb1dc7cf2a26e457aa274c7ed493aff9d30019f795c3e7086 glibc-langpack-he-2.28-251.el8_10.22.aarch64.rpm 4fa3a3d514342fcd8820a632af95b87273c9ed28a57f360b9ba837dde4e2f15f glibc-langpack-hi-2.28-251.el8_10.22.aarch64.rpm 846a18748d0df3fc0bb2d681b8b9adf9365e3e3199d830678eaf5679088e21c6 glibc-langpack-hif-2.28-251.el8_10.22.aarch64.rpm 08673f03ca4736c60a9095ff0931093a6cf46cdf2dcbf2d5d32ffc549a3678f7 glibc-langpack-hne-2.28-251.el8_10.22.aarch64.rpm 8113c2eaaf2b8aae435f1e1df5db7f072e0d7af194a87038eeaecf23a72f8506 glibc-langpack-hr-2.28-251.el8_10.22.aarch64.rpm 178b8784f98bc0b6891cb30730455ceeb8b69578fed53213c6dee33096da308a glibc-langpack-hsb-2.28-251.el8_10.22.aarch64.rpm f030518012359bc38ea5b7ccfe4e67500d67cc7c832afe1374af647c3dfcb0ac glibc-langpack-ht-2.28-251.el8_10.22.aarch64.rpm 55b92c7a54c3e73229bbfca8e98c73d788d3a3ea4771441771d118cd63429986 glibc-langpack-hu-2.28-251.el8_10.22.aarch64.rpm dba32709aad81fcc24064cd4b5f78c9264256347a1db9619df113d530204ca74 glibc-langpack-hy-2.28-251.el8_10.22.aarch64.rpm 3542df29ab88b9cfc53bcff7c93cb8ec819c4ebca113d1e69251343c3e5bcedf glibc-langpack-ia-2.28-251.el8_10.22.aarch64.rpm c3ace8217ffd078137cc2c08ba71b25cb8d057244e8052edbd7a69ef4aa2ca3e glibc-langpack-id-2.28-251.el8_10.22.aarch64.rpm b08288a691ef7b43dd3b5fcefd49f409c79a390438554860ee2a57c143aea36e glibc-langpack-ig-2.28-251.el8_10.22.aarch64.rpm 414a6844e9425b7a34597b4e3a931eaab0aecd38b3d71e3397cdc03de2a1f202 glibc-langpack-ik-2.28-251.el8_10.22.aarch64.rpm 90fb3f27b4b240cb109de40c123e1f83cb334d422f2dbccc25570ad2a474014c glibc-langpack-is-2.28-251.el8_10.22.aarch64.rpm 2471e1c35e06099be1ad2ab5b0abe5bce47f40dfc5dd8b05cb489fbea09badea glibc-langpack-it-2.28-251.el8_10.22.aarch64.rpm 05082c20be0f28c2428fe93bb97e745da77b275a896a4d02a6c0b8a5ea56e7ac glibc-langpack-iu-2.28-251.el8_10.22.aarch64.rpm 7c2f2db6edd11552b223971b85649175f4f033ca3fdefa73a2a9d5ec41642303 glibc-langpack-ja-2.28-251.el8_10.22.aarch64.rpm 5133e0934bd6b2dd181fece6ce136de8a5fbdacddfeddf9ac3d5fc876b48c01c glibc-langpack-ka-2.28-251.el8_10.22.aarch64.rpm b9b29dbc38bd1743c19c8b274f507c3229ae8ce3a70c75043505ef57547380f4 glibc-langpack-kab-2.28-251.el8_10.22.aarch64.rpm 614caddf8221bb03008e9b3384c72d1264f0cc4f936baf2f1b2c87082b49c902 glibc-langpack-kk-2.28-251.el8_10.22.aarch64.rpm 9fea5ff9af2f10766c8d19e8d67d48eff8825eeae11a86b6023c3b577f6309ba glibc-langpack-kl-2.28-251.el8_10.22.aarch64.rpm 072e4d61a3140a15a1e40acce3845928ea780e923be0cd7012d3500672f54502 glibc-langpack-km-2.28-251.el8_10.22.aarch64.rpm 8166b0a758535164e378698179554d2a8223826a07ce5132b2def56465ddac67 glibc-langpack-kn-2.28-251.el8_10.22.aarch64.rpm 52ff3d24db81c45b26d51b0a2b4dda11d1ef9525ee57f8382b24969901caa963 glibc-langpack-ko-2.28-251.el8_10.22.aarch64.rpm e5ade5a6825dfc182eff98ee86ab7cfd5412514bd304f8c1a48aebbe0f50cffc glibc-langpack-kok-2.28-251.el8_10.22.aarch64.rpm b4e047241fcbab7f9c878498958ac38ae9681ea420a2bf047d52de8ba6e0f39d glibc-langpack-ks-2.28-251.el8_10.22.aarch64.rpm 832a42383b50652c1af2ae2f579f7034d8e7f2c008bdfb3e60eaafc3f411ba68 glibc-langpack-ku-2.28-251.el8_10.22.aarch64.rpm 2889069ec114881e15f572d3d95d5609e569ca9a715e70c9a8ef574c8ac21297 glibc-langpack-kw-2.28-251.el8_10.22.aarch64.rpm f4bdc5e67f5f73b12ef9f3347dda425b39c4e8901cd264e240b89cdf89660a77 glibc-langpack-ky-2.28-251.el8_10.22.aarch64.rpm c97de5b3acbc5e422bbb00497657026a6417d519a37acd0f770cfc20e635ddea glibc-langpack-lb-2.28-251.el8_10.22.aarch64.rpm 25bd1022ac69af730e394808d19ba552f504b7e2f45f6724808d8cc735fc026e glibc-langpack-lg-2.28-251.el8_10.22.aarch64.rpm cc4a0ecb10a7d224b06c5424b26354a42de2e03a89210dce5463ebbc0ae9b9b2 glibc-langpack-li-2.28-251.el8_10.22.aarch64.rpm 490a4563e937f365cddac2e20048bd761e37b6354af0fbe2bd58d2ca91f7aad8 glibc-langpack-lij-2.28-251.el8_10.22.aarch64.rpm 973984d2c8c9b676c8e5a73f8a870ce219c440ccad9c6fa9521e62b648f3fec8 glibc-langpack-ln-2.28-251.el8_10.22.aarch64.rpm 32a93893940a48e4f2e306ed9ec86c32d60a8e548059a1bbee9822b75554108d glibc-langpack-lo-2.28-251.el8_10.22.aarch64.rpm 65eaf06dcd74fea27beaa9fbc8794ac9f92903400624770da47d8a5f480c22ab glibc-langpack-lt-2.28-251.el8_10.22.aarch64.rpm 371577d9d2c1977afb039a4ca7e74a91ca68a7db86c6f81dd061df3ac612c590 glibc-langpack-lv-2.28-251.el8_10.22.aarch64.rpm f258a4cc811cc33f3e668157bd6710f6de83e913002a9f89309a32902b67d001 glibc-langpack-lzh-2.28-251.el8_10.22.aarch64.rpm 97eae839defdc0c4c3866ef3e24ef579b7add392765d04ab91bbda9e114060da glibc-langpack-mag-2.28-251.el8_10.22.aarch64.rpm 3b5d5b13bf33fbcd7e2a21a4a18e8c8a5b1008825a9bb3bb933474d6b13e4ac7 glibc-langpack-mai-2.28-251.el8_10.22.aarch64.rpm 149a66087ea6177727df59fa71730a5580ecb5a93c99d9e48139ccb44c64d48e glibc-langpack-mfe-2.28-251.el8_10.22.aarch64.rpm f90b0144260b02a98af44bd691244ed27ae9924561dc1e5c76748ff2648b290b glibc-langpack-mg-2.28-251.el8_10.22.aarch64.rpm 50e2d33b2fc69bc29da0990bf32ec1df0e58a8cb311eb22bd5e86668bbdc2cb3 glibc-langpack-mhr-2.28-251.el8_10.22.aarch64.rpm f8c2bf5dade079b2b300d4045740da1fe2d934dae0f956b2c94f51474e453e38 glibc-langpack-mi-2.28-251.el8_10.22.aarch64.rpm e9d171250ff27c489952f1c39b128ea1824b9c527f1f0ad7307c128e20ea8809 glibc-langpack-miq-2.28-251.el8_10.22.aarch64.rpm c5839b5ebcd0c84880378a07e03a50e8229db6829c668c139a06c18ba73f3345 glibc-langpack-mjw-2.28-251.el8_10.22.aarch64.rpm 45f3f883ea2078d3ddc35db1a7adb5da4b047f0383e58ab56163b1fac1a6d0f2 glibc-langpack-mk-2.28-251.el8_10.22.aarch64.rpm 9dc95a274a2965bd9c47544b032e5dcd3499a3016ac9abeb9e86b86489866d9b glibc-langpack-ml-2.28-251.el8_10.22.aarch64.rpm 83baa4682617e987730805dfa2cb1147e3788416aea11e8284acc2277830fe78 glibc-langpack-mn-2.28-251.el8_10.22.aarch64.rpm 7b67435142970b8af83cfaf0437504127ba1b468fed64ccd690fb39a8b51fb7a glibc-langpack-mni-2.28-251.el8_10.22.aarch64.rpm f20ce69e08b268148e8d422e9128f586d8d06e05bc52e4c05c22352c57526a12 glibc-langpack-mr-2.28-251.el8_10.22.aarch64.rpm 4acc6031e64042ca085efe8edb540657862ad5b76864c72c82ce1c089934a317 glibc-langpack-ms-2.28-251.el8_10.22.aarch64.rpm 3733a108e6426643a22f63c633d317a51860075ad6e34505d9fba472efe0fde8 glibc-langpack-mt-2.28-251.el8_10.22.aarch64.rpm 5962c4803088cf899047f09ecaa7eb1448656e9b52f3f4a1305dac469279b1ed glibc-langpack-my-2.28-251.el8_10.22.aarch64.rpm fab73b205cbc2c511cf3cc874665e9f9f8aaa3f496acf1b42fd7e179ad024042 glibc-langpack-nan-2.28-251.el8_10.22.aarch64.rpm 5bcee2eb97f93cc8bb33994d0fd574926014e1627396c47a4191bc78f2e0f42f glibc-langpack-nb-2.28-251.el8_10.22.aarch64.rpm 1fd54cb8a6ebdadb5b824b640c31bdb820b8cd5fe570073a6ca034c35286231c glibc-langpack-nds-2.28-251.el8_10.22.aarch64.rpm 60b382bf0679271e3173a1c10f7c5448187477d3e4ed63f68438692584508c9c glibc-langpack-ne-2.28-251.el8_10.22.aarch64.rpm 9bd8266c17df490a0305182caf7fe01f369922c807169b37401791c08642e9e1 glibc-langpack-nhn-2.28-251.el8_10.22.aarch64.rpm a37d2bce9192eade03a355e198a0d476986cf1d0946b6d4c99a9300b659ec5f9 glibc-langpack-niu-2.28-251.el8_10.22.aarch64.rpm d8a2bb54cacbc1f133be6c11603c8cd2a9cb1f861abcf597aa2556fdae13bd60 glibc-langpack-nl-2.28-251.el8_10.22.aarch64.rpm 13dc9a4b3db51c6be450f21d6b5002105b5a6ebcffa3c8f78ccff984fa86a59e glibc-langpack-nn-2.28-251.el8_10.22.aarch64.rpm b000c821bcf61e5c0a3bf89c3ef46594ae6e00d0cfe106090b0854f281d727b6 glibc-langpack-nr-2.28-251.el8_10.22.aarch64.rpm dfb9743f26e09b965d3a874304c6dd48a5f8379777d1ac18917f40d061c3566d glibc-langpack-nso-2.28-251.el8_10.22.aarch64.rpm 443b9fe29bb461b0315f059f535ccd6906b4edbd93a49386c37a2e1f053e73bf glibc-langpack-oc-2.28-251.el8_10.22.aarch64.rpm 0d0488a0bf4c0dd50d5d76ff4f664960638f2b58d976e2e339ad50cc5f3084b7 glibc-langpack-om-2.28-251.el8_10.22.aarch64.rpm e79cc5c2e7851de49d62431743e797e8a2f4216cc9245585d0804b60c6096959 glibc-langpack-or-2.28-251.el8_10.22.aarch64.rpm a4c420a3023a8fbc95ca46ec6516829a466cc5146e0bc41f6ad40f3e3fd385b1 glibc-langpack-os-2.28-251.el8_10.22.aarch64.rpm 471b3f095302c14eae5a3f2195d63957af09181ab0fea26ee1f027865db0c2a3 glibc-langpack-pa-2.28-251.el8_10.22.aarch64.rpm e98062b1b4c784ed19beb23c1238f9b9c3ec8953e728f2ee2dd93c8f782e806a glibc-langpack-pap-2.28-251.el8_10.22.aarch64.rpm 3ff99286e9cce441906e242a8e0b5ac61f5902056f0db7c648a6707c75a486a8 glibc-langpack-pl-2.28-251.el8_10.22.aarch64.rpm 2e28227473dffc1fbb266504ef7010baeca47aeccc95767dc7622235006028d6 glibc-langpack-ps-2.28-251.el8_10.22.aarch64.rpm 6ba6f2aa38e3f507367b0ee76049be6067c5299df941ed43d1e32191d1948c5e glibc-langpack-pt-2.28-251.el8_10.22.aarch64.rpm 61bd1a8cd592ddf32b03824f8d4303c179ffe3b0d37d490a9ac59ca083f7d0f6 glibc-langpack-quz-2.28-251.el8_10.22.aarch64.rpm 6ae825cbce7571373ec1b38a22551ac8292d4fb402c6380f91a6768bb47102dc glibc-langpack-raj-2.28-251.el8_10.22.aarch64.rpm b98ed3e4e86bd9debcfb4c2290e7a561550fae4ba972d3c6d5c0c060c12aa753 glibc-langpack-ro-2.28-251.el8_10.22.aarch64.rpm 4e00845b4952d9b84b8d9f0b2190032b80f7e21c430596003b4cc1ed34aea138 glibc-langpack-ru-2.28-251.el8_10.22.aarch64.rpm 742ddf68f84207c03fcf89a4b18dff22182b082e3a6582bbb562ae34899d125a glibc-langpack-rw-2.28-251.el8_10.22.aarch64.rpm a5286dd3e753505d5c65dc729cf09162b25b917317befef4c64011a0336ade67 glibc-langpack-sa-2.28-251.el8_10.22.aarch64.rpm 625a229c700b7b272c570e1a7476c2eeddf90476b932393e6914a98a55a5ab48 glibc-langpack-sah-2.28-251.el8_10.22.aarch64.rpm 9f8060fd7e6f183a24666d96415eb3189f7bd8a22d22bbc6af44db7263445fe4 glibc-langpack-sat-2.28-251.el8_10.22.aarch64.rpm 1b1a414a1da3eebec264acc718c80e59670998d90962fe1199c8ce624c3c2bdc glibc-langpack-sc-2.28-251.el8_10.22.aarch64.rpm 7befcb987f85db10648f289df6690c4b5f6c945a4af643e57c8605ee651cb7fa glibc-langpack-sd-2.28-251.el8_10.22.aarch64.rpm 8da076701b33d53fa156c4419223348280ee86258b175fd6a2783824f92116e8 glibc-langpack-se-2.28-251.el8_10.22.aarch64.rpm 7a76c49e93368804c41594120176bcb549b577cdfbe38de2362d4b94e684ce39 glibc-langpack-sgs-2.28-251.el8_10.22.aarch64.rpm cce74b88c1aafd24a95be2693916d659693e210eb738d6c26dc78775eba31155 glibc-langpack-shn-2.28-251.el8_10.22.aarch64.rpm 9a63118c9dab7e72a9b2402831f1939d5e3eb4b2cc5533af2689f8fb608b799f glibc-langpack-shs-2.28-251.el8_10.22.aarch64.rpm 561a1f384af9461835e7dc1f36f646dce9ab6a9a49e8fa0ea93a1916d973d2a7 glibc-langpack-si-2.28-251.el8_10.22.aarch64.rpm f4c5b41c4194d332d0cee2746d0b154a3920623b0dbc0510d70b5d23dce5bec7 glibc-langpack-sid-2.28-251.el8_10.22.aarch64.rpm 224ef6efddd65906af2ac58fed6825be57444208dddc12c570b09c21be0572e3 glibc-langpack-sk-2.28-251.el8_10.22.aarch64.rpm 4202e5f2ab374ecdd8b3614cf6699c3419db016f7bd88d7a6d73820a74dbac49 glibc-langpack-sl-2.28-251.el8_10.22.aarch64.rpm f3542ea37ba26864bfd17bc76748e6e23f0a31e0e0109e19ec74dc8dac6a496d glibc-langpack-sm-2.28-251.el8_10.22.aarch64.rpm 46389b6899f6c4585f625e83478730aa10df4c2ba682d92209a95cb6ec459605 glibc-langpack-so-2.28-251.el8_10.22.aarch64.rpm 09e3d9ca0dc1bcd7fdc796bcdaca8fd1ef4d9ea91a9c661cc7cdc64141bb317e glibc-langpack-sq-2.28-251.el8_10.22.aarch64.rpm ac7c6a81e4802c84e0668dc5484e32447b6eda9c97ff3fd6833d966728b50334 glibc-langpack-sr-2.28-251.el8_10.22.aarch64.rpm aa52f79c3a4a21644c1f1e1988d71632b3686e4f58f483fce44a81e8ffaff8af glibc-langpack-ss-2.28-251.el8_10.22.aarch64.rpm 9a237ec7d4602b5087e3a7fb3d67249495a522249783bcc003f156ff2b6cc2fb glibc-langpack-st-2.28-251.el8_10.22.aarch64.rpm 5ac50cbb8689bf289e9c265d01b1969db7dd88a77f7ecc959b585e4f11c4b6c5 glibc-langpack-sv-2.28-251.el8_10.22.aarch64.rpm 38d13ec4cbf370826af4eb4b077b74cc6f3cb117b8450d1f8ed277204cf543e1 glibc-langpack-sw-2.28-251.el8_10.22.aarch64.rpm 8920c328024fa9f3f2ba8e26608556afb624c077096ea2c427c141936f5f4756 glibc-langpack-szl-2.28-251.el8_10.22.aarch64.rpm e389855340961a8ed498ca14f51b794d5228878cde9d12cb5d8889402f82ddec glibc-langpack-ta-2.28-251.el8_10.22.aarch64.rpm 10d03544d28c6f91069537e58bcfe319fb9f9bab2ba81c0132b0abc286c89041 glibc-langpack-tcy-2.28-251.el8_10.22.aarch64.rpm f56c61360b78fa077cba0cd6f97c8532752eacd3c5a43be2acbb8453101f77e9 glibc-langpack-te-2.28-251.el8_10.22.aarch64.rpm af668814643f383ea53b56ad0187b750f391c002fc57af78a1e3d14835b2d514 glibc-langpack-tg-2.28-251.el8_10.22.aarch64.rpm 28396b7d4a0438bcafd96672d43e0e66048ab515571dffde556120ece01d4919 glibc-langpack-th-2.28-251.el8_10.22.aarch64.rpm 157191ba3b23d084d96f45ee653183603aa845eac8b73559fc44fde9d63dc16d glibc-langpack-the-2.28-251.el8_10.22.aarch64.rpm a90077cb87728c2380304c4681045ca070f4c2f787b32e423f4263b6f0c20aeb glibc-langpack-ti-2.28-251.el8_10.22.aarch64.rpm a4766828ade413adac2ef958e36a134bf3aff3052a96286ab2462c277c50eb70 glibc-langpack-tig-2.28-251.el8_10.22.aarch64.rpm 6ac12aad1e7df4843584960031079c15820028ee09a8fb2762dbf91dbe56870e glibc-langpack-tk-2.28-251.el8_10.22.aarch64.rpm 81d18309d0a70304bfaab87a741da4cf0079698ca4578fd4cdc7673b5908b8d2 glibc-langpack-tl-2.28-251.el8_10.22.aarch64.rpm 3ddb1d6e48cd800dad820db30c97e076d2f9534cb8421eb070f26c5651b8ffa6 glibc-langpack-tn-2.28-251.el8_10.22.aarch64.rpm 9504c6433700c04a5f48ff0860c5c97c9fd95980e4d9a64ea1a1f7ab082f9f4c glibc-langpack-to-2.28-251.el8_10.22.aarch64.rpm cb062aa43d238cbe899b0abc049ea3b09c749f73e349b1f701adbefee4f44fc8 glibc-langpack-tpi-2.28-251.el8_10.22.aarch64.rpm 336575de2ff7d12f93e983bbcdabacdb4419c250f12a5c182261145f72edfc93 glibc-langpack-tr-2.28-251.el8_10.22.aarch64.rpm f0c785ff968b8617c1e4dc30cf2ff3866c783e18f605c0ab3d4413d10dabc653 glibc-langpack-ts-2.28-251.el8_10.22.aarch64.rpm 9e7d6ea209f5d4dcc43bb148e8d68478ec5e4d1de9b5c89eaac01dda70cd6a3f glibc-langpack-tt-2.28-251.el8_10.22.aarch64.rpm e84093e9e5dce505632e23b341fa0002ec1682490f5862eb901c4ec8565ae357 glibc-langpack-ug-2.28-251.el8_10.22.aarch64.rpm 1947bc4f5cfc179a7c70bd11157f7a3faf640965d568aa9b540549bf662a78e4 glibc-langpack-uk-2.28-251.el8_10.22.aarch64.rpm 8165ecfdfed5b19559d1256edf1e88747fe1b50fffe7efe42d9165d33e92c56f glibc-langpack-unm-2.28-251.el8_10.22.aarch64.rpm 72f0b1d7c8d9d216d4fb2e65774671d8cdbf63bc7efe4d4a9b5bad276bf8092f glibc-langpack-ur-2.28-251.el8_10.22.aarch64.rpm 14289cfb88ae6091912fc53cafcee485c6cce5363fa93ba9b55737288fcd8f1d glibc-langpack-uz-2.28-251.el8_10.22.aarch64.rpm 1e47c4fdb44009e5dc6d314ab106204383ef59a2392d24b7e62ef45ae2d26ce2 glibc-langpack-ve-2.28-251.el8_10.22.aarch64.rpm 8ef9099b7f0914b36531961482f616ab7c14ce58b86e6b63b7904967e934c127 glibc-langpack-vi-2.28-251.el8_10.22.aarch64.rpm 80b9faef94f9d58ce409a313dca949be764ef56cae7c3f83627d0fe5ca14f2e1 glibc-langpack-wa-2.28-251.el8_10.22.aarch64.rpm 83f5a78c16844e8df906842572a48e91b2fb177bf16c3426ad161a0b7ed343b9 glibc-langpack-wae-2.28-251.el8_10.22.aarch64.rpm e70af25aa35d48b115482dbb9499e253afc3389edccf30c98bfaf19574b01952 glibc-langpack-wal-2.28-251.el8_10.22.aarch64.rpm 05b3169243139d87b18fb7394258be520bef43589d6ec6c788bc029c8298bfe2 glibc-langpack-wo-2.28-251.el8_10.22.aarch64.rpm 4aa50110691157075d1615191a76952c5e4ba6a8c6663243b47eb419bf4f66b7 glibc-langpack-xh-2.28-251.el8_10.22.aarch64.rpm e427d952db80c31df886c48afc7b947f26c799c9ac19301846ee4a53a48a0bd3 glibc-langpack-yi-2.28-251.el8_10.22.aarch64.rpm e2eb844066892b80e2c0b6cfee67cab8a5ad6519a70f4790c63b5e6b2fd24366 glibc-langpack-yo-2.28-251.el8_10.22.aarch64.rpm 834b53c63f7f22c7caadbe4b1a8ad4ad136970d75ab87d5af45ccdffae1650df glibc-langpack-yue-2.28-251.el8_10.22.aarch64.rpm 205e14be67af0fe82676ed31b03476908d1b23ef5bd11f8ce453f079cfc0d6ad glibc-langpack-yuw-2.28-251.el8_10.22.aarch64.rpm 8479ca76e0d1e6ef77d536c8dcc91d10b4911a71cce8680b9b417fa5a241481b glibc-langpack-zh-2.28-251.el8_10.22.aarch64.rpm a2741b34d05524a2675e02e0d2bd3e041fd9efe03a3549f0e39da5445ee7fa1d glibc-langpack-zu-2.28-251.el8_10.22.aarch64.rpm eeeafcb923416c294c7ae8b9e5db581cac01ce393981438fe0b4794dadddefdb glibc-locale-source-2.28-251.el8_10.22.aarch64.rpm 6ef0a44da43ae6fe70f12125e370ca5eae83284e24b970247a43975929138160 glibc-minimal-langpack-2.28-251.el8_10.22.aarch64.rpm 8951278cec930d9b715c54c2ec2a014ceb78ef5f1c09db2dbc57e2f6fc954e1a libnsl-2.28-251.el8_10.22.aarch64.rpm 76ef7a666e05ce8bb34a5c315fc673f64baadcf9f35e735c44b7ed8cf9dde84d nscd-2.28-251.el8_10.22.aarch64.rpm a9fa0c28b44407638e20565c0caf2758354b2c20c363eab58bf6ee2ddd84723e nss_db-2.28-251.el8_10.22.aarch64.rpm 1ace996eea925a4579ee974de3e9ce86217647aa784a31989e40d8eb6433474d RLSA-2025:8743 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: um: Fix out-of-bounds read in LDT setup (CVE-2022-49395) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.56.1.el8_10.aarch64.rpm 161dadebd2e75050bbf53c3aae54316a0b856eb48f5ac07a477545178de40b61 kernel-4.18.0-553.56.1.el8_10.aarch64.rpm b8dcb9a63969014f4a2eeff84f359fcf73adf6c355339728c7c87c076c8027fc kernel-abi-stablelists-4.18.0-553.56.1.el8_10.noarch.rpm baee2ec5ee37fe233dbf3f3345079bcf2b419b92c002913e9c4ecfea462bbcc1 kernel-abi-stablelists-4.18.0-553.56.1.el8_10.noarch.rpm baee2ec5ee37fe233dbf3f3345079bcf2b419b92c002913e9c4ecfea462bbcc1 kernel-core-4.18.0-553.56.1.el8_10.aarch64.rpm 5f0c36461343cdeb27c0b51e762a6619d99fce04ba3f22a529799f46d6296345 kernel-cross-headers-4.18.0-553.56.1.el8_10.aarch64.rpm 915a81e0533f3cc755dfda8798cd4283dedecec1eb0434828fe70ff9e31e1d1f kernel-debug-4.18.0-553.56.1.el8_10.aarch64.rpm 7f1e6102f38e800fed4146dc76ddf865bed43fb5f80cd22fa23083e75493cb7e kernel-debug-core-4.18.0-553.56.1.el8_10.aarch64.rpm 9fb1a5468355257b2be83b481fff6942f8cbeb19923daaeb57215ca7a11bd932 kernel-debug-devel-4.18.0-553.56.1.el8_10.aarch64.rpm 7c313d986a247cef5dab47ede24e3c516ebf32b7f8aa82b3d4ffe1bac1ef50e6 kernel-debuginfo-common-aarch64-4.18.0-553.56.1.el8_10.aarch64.rpm ea41a740d237e3244b2d7acc481973396ab1f355cf8f159eb0db3894a9bce787 kernel-debug-modules-4.18.0-553.56.1.el8_10.aarch64.rpm 1b9e11cdc3a81840dfe41a88fa5790e8655d732de25b4ffbe4c858027e723335 kernel-debug-modules-extra-4.18.0-553.56.1.el8_10.aarch64.rpm c29094a3fecbf21c5ec50e5d203734ad7b91be129f2843d7c0b5c94bf1f9b22f kernel-devel-4.18.0-553.56.1.el8_10.aarch64.rpm 3f2ae2f95d056d449e3e75c4dff3e532fa02330bca36b956463c79dbb87b123e kernel-doc-4.18.0-553.56.1.el8_10.noarch.rpm d9df3a0d389de1108e11227cad7ebf1c15bc481c121d267e1e40618e2d037c1f kernel-doc-4.18.0-553.56.1.el8_10.noarch.rpm d9df3a0d389de1108e11227cad7ebf1c15bc481c121d267e1e40618e2d037c1f kernel-headers-4.18.0-553.56.1.el8_10.aarch64.rpm 6345f4eae727c86139a97002fff360a988dc1f7f27d09c68b9676bad054947eb kernel-modules-4.18.0-553.56.1.el8_10.aarch64.rpm 1bac2f12317af939b28ec459eb2204be3017c400d8e7f2ae2de8b9d14a5fcdc4 kernel-modules-extra-4.18.0-553.56.1.el8_10.aarch64.rpm c04dca7e6e235dade5aa01957c079b5971f12df3dae9a744ca3f8d2c4e6c6322 kernel-tools-4.18.0-553.56.1.el8_10.aarch64.rpm 749c392cbe0b548e14e4b1cfd69a7b7c852d787a39d9a1a18af2f75e69050310 kernel-tools-libs-4.18.0-553.56.1.el8_10.aarch64.rpm bd2372295e579bcbc6884e6643387a144d5a94a9d17ef3593a2f3ce94d6b1b67 perf-4.18.0-553.56.1.el8_10.aarch64.rpm 3090ff8683392108005ebc85306de40fbba58b517dcaff72367302aca01c8433 python3-perf-4.18.0-553.56.1.el8_10.aarch64.rpm c63775a57ecbd4cf193a3bcd16b4ef29436623429c7005a1f643aca884d6a3af RLSA-2025:8958 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-20.el8_10.aarch64.rpm 5b13ff1fcd9a53548e4147abe1611abcba8e2fdaff08970de2bb262b8e3e4a14 python3-libxml2-2.9.7-20.el8_10.aarch64.rpm 73b92e5bf5bc3e44598107a8eb652c520ba1ffd7c314c45ff726bd47a996431a RLSA-2025:9580 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cifs: fix double free race when mount fails in cifs_get_root() (CVE-2022-48919) * kernel: security/keys: fix slab-out-of-bounds in key_task_permission (CVE-2024-50301) * kernel: idpf: fix idpf_vc_core_init error path (CVE-2024-53064) * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.58.1.el8_10.aarch64.rpm 77c4ca2bd606c7311b1eb544c7121ab060c9e656a1173b85ae2b62ba3c0016b9 kernel-4.18.0-553.58.1.el8_10.aarch64.rpm 0c7b030b209b373d8199115bdd16c7c47c1798b703fd6313149628aad51bcb0e kernel-abi-stablelists-4.18.0-553.58.1.el8_10.noarch.rpm 9d1d22ecfbac61f90e927582450756d4034d60b301eaf0cffeba07182b809d2a kernel-abi-stablelists-4.18.0-553.58.1.el8_10.noarch.rpm 9d1d22ecfbac61f90e927582450756d4034d60b301eaf0cffeba07182b809d2a kernel-core-4.18.0-553.58.1.el8_10.aarch64.rpm d9dc009a51c970a95ff57f67e4df0c058bf1793d83036b8f2ef5892936a37197 kernel-cross-headers-4.18.0-553.58.1.el8_10.aarch64.rpm 93e944def59d864bd6d0123793fc4628331283379e21f38686a9714413d192ab kernel-debug-4.18.0-553.58.1.el8_10.aarch64.rpm cb8f7aa20834bfd265af405a285f12c9b726d8154cde6a3f3e36be4f0c140767 kernel-debug-core-4.18.0-553.58.1.el8_10.aarch64.rpm 16731045cb67228ce3918186d8d748cd2efb6b2ca6f1041a8c621b62eb65fd88 kernel-debug-devel-4.18.0-553.58.1.el8_10.aarch64.rpm d48d8a66990f5d33e39944c6b271924b750247e4372c9a8ec531c07bc5857d09 kernel-debuginfo-common-aarch64-4.18.0-553.58.1.el8_10.aarch64.rpm 8d23915d559ebd6dcb7a3e9bbd057f5b851a7673a1994d2645f498c961fb34e1 kernel-debug-modules-4.18.0-553.58.1.el8_10.aarch64.rpm 4147a328ea705548e851ada90e22b9332d46d1c70066a7a352cdd342b6360a41 kernel-debug-modules-extra-4.18.0-553.58.1.el8_10.aarch64.rpm f01fc1f9fcc463c90754545a01636355d874a6bdea62abcf9d99bb0d557cac55 kernel-devel-4.18.0-553.58.1.el8_10.aarch64.rpm 8e66bc493988fab003ab692c3e99e7471da771f6486c2fb974391f9cc874ccbb kernel-doc-4.18.0-553.58.1.el8_10.noarch.rpm 58014ac9df298cd5c32c548a196f4cc9c0ca08e823a5098cc0ac688db639660b kernel-doc-4.18.0-553.58.1.el8_10.noarch.rpm 58014ac9df298cd5c32c548a196f4cc9c0ca08e823a5098cc0ac688db639660b kernel-headers-4.18.0-553.58.1.el8_10.aarch64.rpm 736454f4154081b4ae54057764e0e1bdb8e06556a3c643e51f5463ece54ec0b3 kernel-modules-4.18.0-553.58.1.el8_10.aarch64.rpm 8be955b0acb58c24a3e8c4478378bf15fd50f95c4801d4be69c9fcb6f1bf9eb3 kernel-modules-extra-4.18.0-553.58.1.el8_10.aarch64.rpm eb2312433196d4d1430577ad29bda845deb9ce6d8d90072f474400962331a4eb kernel-tools-4.18.0-553.58.1.el8_10.aarch64.rpm 40dc39f0dca30f6854a9ad062c6682819d9a1cd21cc676facf2c2688a78845c9 kernel-tools-libs-4.18.0-553.58.1.el8_10.aarch64.rpm 79c33fb539f29d5ada3af4dba602d013280e7c039f70cb03246756d489c973ad perf-4.18.0-553.58.1.el8_10.aarch64.rpm 1dd6ab1f85887987272eff2b3c1ca0df4a5a671e6ef925bd2b853bdc2403f026 python3-perf-4.18.0-553.58.1.el8_10.aarch64.rpm def8946941332c96f27ae816f4f346e994ba66a00f9fa61094d725a4325febf6 RLSA-2025:10027 Important: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * linux-pam: Linux-pam directory Traversal (CVE-2025-6020) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms pam-1.3.1-37.el8_10.aarch64.rpm 45f7f6bba5c67955c44f1a62070ae5d1f995b59610658a53e783a0c398e97672 pam-devel-1.3.1-37.el8_10.aarch64.rpm b4311918a54b013672f5333ac5c193464281bc4d2e4347e4bc371bec32496103 RLSA-2025:10110 Important: sudo security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sudo. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: LPE via host option (CVE-2025-32462) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sudo-1.9.5p2-1.el8_10.1.aarch64.rpm 75ba56c4c94169f8ab7a6d71d9ebf29770b162b7ce3bd8a764fee6eaee2be319 RLSA-2025:10698 Important: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794) * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796) * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-21.el8_10.1.aarch64.rpm df83fb6e2af17eb551fd322d91d23342b736549c0464a7e3ed6360b042b4c792 python3-libxml2-2.9.7-21.el8_10.1.aarch64.rpm 1b9fad844bb17503df1d9624675e1741608538aafbcc68c7ee4ead852facd86d RLSA-2025:11036 Moderate: python-setuptools security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-setuptools. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * setuptools: Path Traversal Vulnerability in setuptools PackageIndex (CVE-2025-47273) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms platform-python-setuptools-39.2.0-9.el8_10.noarch.rpm 1f0a67a8989bc1028d717d701af6d7f2b79ab26534454739f728c04e158cd956 platform-python-setuptools-39.2.0-9.el8_10.noarch.rpm 1f0a67a8989bc1028d717d701af6d7f2b79ab26534454739f728c04e158cd956 python3-setuptools-39.2.0-9.el8_10.noarch.rpm 94ff8297900c1d7b6904f46b839ddb3892eeca7b28897419facfc06a9fd03ae1 python3-setuptools-39.2.0-9.el8_10.noarch.rpm 94ff8297900c1d7b6904f46b839ddb3892eeca7b28897419facfc06a9fd03ae1 python3-setuptools-wheel-39.2.0-9.el8_10.noarch.rpm 32b9fcb95afa24fbd24c5cc653847d2c235acade1423d1441f1658a83c8725f9 python3-setuptools-wheel-39.2.0-9.el8_10.noarch.rpm 32b9fcb95afa24fbd24c5cc653847d2c235acade1423d1441f1658a83c8725f9 RLSA-2025:11030 Moderate: emacs security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for emacs. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GNU Emacs is a powerful, customizable, self-documenting text editor. It provides special code editing features, a scripting language (elisp), and the capability to read e-mail and news. Security Fix(es): * emacs: arbitrary code execution via Lisp macro expansion (CVE-2024-53920) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms emacs-filesystem-26.1-15.el8_10.noarch.rpm 206c53ad11e5c2d26e959af4af07ba78fd4f67a6dbc8624ba90d1030f41aaf23 emacs-filesystem-26.1-15.el8_10.noarch.rpm 206c53ad11e5c2d26e959af4af07ba78fd4f67a6dbc8624ba90d1030f41aaf23 RLSA-2025:11035 Moderate: lz4 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for lz4. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The lz4 packages provide support for LZ4, a very fast, lossless compression algorithm that provides compression speeds of 400 MB/s per core and scales with multicore CPUs. It also features an extremely fast decoder that reaches speeds of multiple GB/s per core and typically reaches RAM speed limits on multicore systems. Security Fix(es): * lz4: heap-based buffer overflow in LZ4_write32 (CVE-2019-17543) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms lz4-1.8.3-5.el8_10.aarch64.rpm f0162670d550979f3f3adf41d3b2f5858d9414ddf8978f159eeb045aca518e1f lz4-devel-1.8.3-5.el8_10.aarch64.rpm 00d5a290b5693fb5760592beeeb6876ea511a762ada90736001f863be16aa85f lz4-libs-1.8.3-5.el8_10.aarch64.rpm d5241a1d2801500e949b2fdd6b5092be78dcda8da354ed0c9fd900bd39f6d369 RLSA-2025:11298 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cifs: potential buffer overflow in handling symlinks (CVE-2022-49058) * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) * kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) * kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.62.1.el8_10.aarch64.rpm 6e394e18354b6d6b6a2a3723a89482bcc71126df4db4e04d3a37fad5b33e4945 kernel-4.18.0-553.62.1.el8_10.aarch64.rpm f0cb97a8373ede9568e885da719ba45d6c639b478df47dd8d46250a8a7bc47e3 kernel-abi-stablelists-4.18.0-553.62.1.el8_10.noarch.rpm 2d3a3752e49cb9af2f7957199ef966829269fbeccb81027267edf53d3327b06d kernel-abi-stablelists-4.18.0-553.62.1.el8_10.noarch.rpm 2d3a3752e49cb9af2f7957199ef966829269fbeccb81027267edf53d3327b06d kernel-core-4.18.0-553.62.1.el8_10.aarch64.rpm 839355c4c1697546c49911ad8c67711c47e86b402faba35550ef029b5b513681 kernel-cross-headers-4.18.0-553.62.1.el8_10.aarch64.rpm 7f49e45628b025ca0e08cdbe797706e20794ad6fe2c4ee4009368b0fe6d99541 kernel-debug-4.18.0-553.62.1.el8_10.aarch64.rpm 580180edce6009744be65e36b39911a6ae70475341b7a87e628706ae0417485a kernel-debug-core-4.18.0-553.62.1.el8_10.aarch64.rpm 6209ce6ff87c7ffd2e1d31d791d60db4e61798ddad345d12984e8eb943dea9c1 kernel-debug-devel-4.18.0-553.62.1.el8_10.aarch64.rpm 6ca9b9b50b0c2452dc0243b1d4cea3eb91229208de47251bff2010609ca62d93 kernel-debuginfo-common-aarch64-4.18.0-553.62.1.el8_10.aarch64.rpm 71b25c93b7b004314840df95803511f926a1eab7ac16eb255393ecfe59bc49b6 kernel-debug-modules-4.18.0-553.62.1.el8_10.aarch64.rpm 5660a95b742f5e84dd91c9fd5f1abb67292402bfdb742512196f6c5da71e7469 kernel-debug-modules-extra-4.18.0-553.62.1.el8_10.aarch64.rpm 763c2dc514fea454d59b72d06f395d5f51a6c188323cbb94fbd9345476792633 kernel-devel-4.18.0-553.62.1.el8_10.aarch64.rpm 62a4020777ce778bfe5af674304381d485ad37281abb1cf979bfb80975abe896 kernel-doc-4.18.0-553.62.1.el8_10.noarch.rpm 7bb183971b8c53b8cfc6481bb5d062aad23a327dbfe37df5d988aa7f7ab608a7 kernel-doc-4.18.0-553.62.1.el8_10.noarch.rpm 7bb183971b8c53b8cfc6481bb5d062aad23a327dbfe37df5d988aa7f7ab608a7 kernel-headers-4.18.0-553.62.1.el8_10.aarch64.rpm 715d07950f4697a84ab621cf929e2c48e00ae2405951f84d6e77c3f08a2ba5eb kernel-modules-4.18.0-553.62.1.el8_10.aarch64.rpm c7861f58f6419b105e3c3d2f4dfd1e180fb6d2b5136876ade1f827c044f7a2e8 kernel-modules-extra-4.18.0-553.62.1.el8_10.aarch64.rpm a2a0ad1113fe69802ea843d59664e393dd03a5e3ddfe6743761b919891481e58 kernel-tools-4.18.0-553.62.1.el8_10.aarch64.rpm 43480636c3062ec232b304bde03ad758df2e7a1156c6cf022f4e4573072b5d2b kernel-tools-libs-4.18.0-553.62.1.el8_10.aarch64.rpm 92d80b239a5b288ad4a0bed35d4a76c191f41d7235b7503050627d324c828de1 perf-4.18.0-553.62.1.el8_10.aarch64.rpm e37172979282c5b51ec8bdc79bca697b183ebca30ce6f21306fa9ed853a0e384 python3-perf-4.18.0-553.62.1.el8_10.aarch64.rpm 18620347ff78917e4810d33277dc4de9ab8e414695664b3cc8a0398fd115094c RLSA-2025:11327 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib2: Signal subscription vulnerabilities (CVE-2024-34397) * glib: buffer overflow in set_connect_msg() (CVE-2024-52533) * glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar (CVE-2025-4373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glib2-2.56.4-166.el8_10.aarch64.rpm 0ff1902e8d78f43a82efc8a8763c2147a5263c5413766811c1c7eaad1fe285f5 glib2-devel-2.56.4-166.el8_10.aarch64.rpm 78ca3fad85d6e9a353c8ca2a8b9760f7bc7908707c9ec9ae598fa269bdae1b66 glib2-fam-2.56.4-166.el8_10.aarch64.rpm 361ae5c0e731c5c60699d8f64b63cbb3335b842ab193c6f3815d55d3c3976582 glib2-tests-2.56.4-166.el8_10.aarch64.rpm 3095526ae7bcb408d49a3382e13aada6896c0b0bb8fc9df129a803e3be31894f RLSA-2025:11455 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: tcp/dccp: Don&#39;t use timer_pending() in reqsk_queue_unlink(). (CVE-2024-50154) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms kernel-doc-4.18.0-553.63.1.el8_10.noarch.rpm 5ebc564fe4daa2da2fc9a358c51b594e7f4ebf11a4274c4adc5b45a170913216 bpftool-4.18.0-553.63.1.el8_10.aarch64.rpm 067fab7be3c2c092fa39d3f9daf521e73b69f7bade70fe73fea5b48ca222752d kernel-4.18.0-553.63.1.el8_10.aarch64.rpm d188e363a1edc531c795706a91a6417e5cbcf22ec37b9ff1ada79e32eabc77e6 kernel-abi-stablelists-4.18.0-553.63.1.el8_10.noarch.rpm 58b98a071a1c2cf9f151700169425ca5a6ccfe6ee537450bc67653ad1c462102 kernel-abi-stablelists-4.18.0-553.63.1.el8_10.noarch.rpm 58b98a071a1c2cf9f151700169425ca5a6ccfe6ee537450bc67653ad1c462102 kernel-core-4.18.0-553.63.1.el8_10.aarch64.rpm d723d049bbd721bc72ec96b4d3f731a2bc614f0e44265ccd36027e523bfa9836 kernel-cross-headers-4.18.0-553.63.1.el8_10.aarch64.rpm 25c9e79a163de26926461992615f4abf11fb92d37f302fc379358b126c238285 kernel-debug-4.18.0-553.63.1.el8_10.aarch64.rpm bce9262d13b6ab8647c7802817cfda0e0472696a7074518bfc934b4cb24c4900 kernel-debug-core-4.18.0-553.63.1.el8_10.aarch64.rpm 12aeb29eee11c9129ba3caae11ca83ff7b47cbc8b1500b899be9d5d5d5361938 kernel-debug-devel-4.18.0-553.63.1.el8_10.aarch64.rpm c6d0c5d94001ca98878ce7b4775c6f9f19d5e1eed28cd03cc900985589ded590 kernel-debuginfo-common-aarch64-4.18.0-553.63.1.el8_10.aarch64.rpm 4ab68a166c56d85ee2aecdd69a705b6a7df92a73a7d91fb6f9ac5d3334aeb2e2 kernel-debug-modules-4.18.0-553.63.1.el8_10.aarch64.rpm 2513b5e1f5ec18301e4c9890267209ccd0ddfd01c4e5e3a7248c1c73414246af kernel-debug-modules-extra-4.18.0-553.63.1.el8_10.aarch64.rpm 4f97e46e4aeb70a1b0282456a14cf289fbdb73543aab5b91403e87fc3657c685 kernel-devel-4.18.0-553.63.1.el8_10.aarch64.rpm 1a8c257843c380dfe9b93bd77ccb4d5a8f2635194636de85805db217d29c2db6 kernel-doc-4.18.0-553.63.1.el8_10.noarch.rpm 5ebc564fe4daa2da2fc9a358c51b594e7f4ebf11a4274c4adc5b45a170913216 kernel-headers-4.18.0-553.63.1.el8_10.aarch64.rpm 5bd7b12fbc56288ee50688aaab889304dbc828cc895ea7522cbab08b60a082d8 kernel-modules-4.18.0-553.63.1.el8_10.aarch64.rpm 0f59fa6c1e2e4e1afa0c096d7fee4b671732eb1547e5ab92d0a6134276ec1d35 kernel-modules-extra-4.18.0-553.63.1.el8_10.aarch64.rpm f7e42065447859ec3bae607c1019875d7ce73940e25574d4798586fb69a8d093 kernel-tools-4.18.0-553.63.1.el8_10.aarch64.rpm 22999834f82ccd2c822aad0e2cf29a4e6c9050cc45c439203a167ca6b9ee2760 kernel-tools-libs-4.18.0-553.63.1.el8_10.aarch64.rpm 227d9e85e18afcd99d3974026ed1d8fda6b451f59cd754c66f657546829ba03d perf-4.18.0-553.63.1.el8_10.aarch64.rpm 7ca6bcd73c7ca6369932665147b5f7ba1fed29d612cd203ec1d9fcf38b3c1c1f python3-perf-4.18.0-553.63.1.el8_10.aarch64.rpm 7da3f4ec9b6a28d8de18ffb0ba8a663b2bb2c8dd49aa37aae2e15b62217b4b4f RLSA-2025:11805 Moderate: perl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for perl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Security Fix(es): * perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms perl-Errno-1.28-423.el8_10.aarch64.rpm 501b278bf05f3bd69fd10d47cae8be745893fcf49588d80f123fc4215cf33742 perl-interpreter-5.26.3-423.el8_10.aarch64.rpm 026992242819f4600b0742834c4cffeff7668411828a05febdd7c1cbad1468e8 perl-IO-1.38-423.el8_10.aarch64.rpm e54ac89e2155264b584100603e7c8dd1c31c9d8ab286de6da8e02c00f5b5f20a perl-IO-Zlib-1.10-423.el8_10.noarch.rpm 97105f2df8b7d3d26b05101aef650b47cecb873bdb7a5b410f9cfad7d1239b1e perl-IO-Zlib-1.10-423.el8_10.noarch.rpm 97105f2df8b7d3d26b05101aef650b47cecb873bdb7a5b410f9cfad7d1239b1e perl-libs-5.26.3-423.el8_10.aarch64.rpm b9efde59ddee58da3adde3269e3f07cbeca3e920090a4d70358a36f8deb487e9 perl-macros-5.26.3-423.el8_10.aarch64.rpm 8e95399f6715c15145c5314b6b58df139c9cea5969fbd8c26eb74e03c0b58541 perl-Math-Complex-1.59-423.el8_10.noarch.rpm 7bf723ed6ef8d5e6019169111eda75d32d5e4613a9b4ad57d6342a23fc30bd66 perl-Math-Complex-1.59-423.el8_10.noarch.rpm 7bf723ed6ef8d5e6019169111eda75d32d5e4613a9b4ad57d6342a23fc30bd66 RLSA-2025:12010 Important: sqlite security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sqlite. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list SQLite is a C library that implements an SQL database engine. A large subset of SQL92 is supported. A complete database is stored in a single disk file. The API is designed for convenience and ease of use. Applications that link against SQLite can enjoy the power and flexibility of an SQL database without the administrative hassles of supporting a separate database server. Security Fix(es): * sqlite: Integer Truncation in SQLite (CVE-2025-6965) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms sqlite-3.26.0-20.el8_10.aarch64.rpm 8afb9fd3fe349cc7a159d8841426f7b03a41d99d7d993eaee31cd8b40fa2ed3c sqlite-devel-3.26.0-20.el8_10.aarch64.rpm bdb754bf289508ebcb24f0019c669c714e94e82318a423a886c031f9378660e5 sqlite-doc-3.26.0-20.el8_10.noarch.rpm 517f519ae4de356e0cbceb4fa62a56072d682f8e7853c5eb4942492301c55850 sqlite-doc-3.26.0-20.el8_10.noarch.rpm 517f519ae4de356e0cbceb4fa62a56072d682f8e7853c5eb4942492301c55850 sqlite-libs-3.26.0-20.el8_10.aarch64.rpm 00e926b8f116ea1e46a3a08c439e3e40796dfc8fe0132d630ed4f1040517b960 RLSA-2025:21917 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: NFS: Fix a race when updating an existing write (CVE-2025-39697) * kernel: i40e: fix idx validation in config queues msg (CVE-2025-39971) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.85.1.el8_10.aarch64.rpm f081a06059e6965fdf681d8316c539688398abc9fd165232abc906e67b5e1452 kernel-4.18.0-553.85.1.el8_10.aarch64.rpm 1b1497173f0fcbc9685554b34df8d60b44906fa1a1a948e702ecb22ea2857e7f kernel-abi-stablelists-4.18.0-553.85.1.el8_10.noarch.rpm 39d431868a55a595d177fcfeacb49eca56a3034aa68e8bfa60ced65206333871 kernel-abi-stablelists-4.18.0-553.85.1.el8_10.noarch.rpm 39d431868a55a595d177fcfeacb49eca56a3034aa68e8bfa60ced65206333871 kernel-core-4.18.0-553.85.1.el8_10.aarch64.rpm 102eff421c22891d8c0031de66159973c5247e0fbe87ca5bdafffad5507a5b8a kernel-debug-4.18.0-553.85.1.el8_10.aarch64.rpm 37fed6693af5b146402e2117b01f0cb0d92437e626526254fd07a562e4c82727 kernel-debug-core-4.18.0-553.85.1.el8_10.aarch64.rpm 0416a49a5059bf44d077a0ce22b8839e54f2239835e597b5b71b8808c30b4aea kernel-debug-devel-4.18.0-553.85.1.el8_10.aarch64.rpm b74638bee8039d038fd3fea22679678d66c0ba0ee6d689071f9ad427d49e8923 kernel-debuginfo-common-aarch64-4.18.0-553.85.1.el8_10.aarch64.rpm 2f5a5161a3018567996f5ae03dea6f900f00619559d2592fcf4c9384dcddb7d7 kernel-debug-modules-4.18.0-553.85.1.el8_10.aarch64.rpm 0816fffc4d97e1bad3172b966163ede158080b4d2298f07074a2dae0aeaa61a4 kernel-debug-modules-extra-4.18.0-553.85.1.el8_10.aarch64.rpm 03fcdf194525deb1552913045ff66f8c0a300f3a2c6487ea1e21dfd1a1acefb7 kernel-devel-4.18.0-553.85.1.el8_10.aarch64.rpm 32c1d40710b940bd7a9249dd00627b2af9f46bf01ccc8a9fc76b2f87ed64553a kernel-doc-4.18.0-553.85.1.el8_10.noarch.rpm 317f8eeab45491f4bcf390dbaf959ae4075874e856dd9255a819f409cf418270 kernel-doc-4.18.0-553.85.1.el8_10.noarch.rpm 317f8eeab45491f4bcf390dbaf959ae4075874e856dd9255a819f409cf418270 kernel-modules-4.18.0-553.85.1.el8_10.aarch64.rpm 98458c528d67a3fa3745fa46412784e01b637001f63064da756bd985c52ff344 kernel-modules-extra-4.18.0-553.85.1.el8_10.aarch64.rpm 31c445afdb43a4effa5b6b196d1f063f2a6f7c5bacdac2db8c48fb6edd0ddad5 kernel-tools-4.18.0-553.85.1.el8_10.aarch64.rpm 96011322275813b5af2cec024a494dcdc0d1062822d59b03e509d9de429c34bf kernel-tools-libs-4.18.0-553.85.1.el8_10.aarch64.rpm 0f652ff204b24e290f86932a7152f496715324b632b9525017b3f26b01582581 perf-4.18.0-553.85.1.el8_10.aarch64.rpm baa1640c1c9346c4e6df0a6e7f85e43a94265a87ea2f3c27fa1c6384a7f0b24a python3-perf-4.18.0-553.85.1.el8_10.aarch64.rpm 781f8b5170f785ca11fcd52e674c9d15fa4bafbef3b81dc46d97dbfcc0f2b1d9 RLSA-2025:19610 Important: sssd security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for sssd. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libipa_hbac-2.9.4-5.el8_10.3.aarch64.rpm 187a31abadb87980db13229f27b9777abcdcff990bcf2c0efe3ef69eaa295e6a libsss_autofs-2.9.4-5.el8_10.3.aarch64.rpm 1cd99a04e15434c8dae59aade84d3d569adce63d22c12a46e8b4b70ff6c2aefc libsss_certmap-2.9.4-5.el8_10.3.aarch64.rpm f134a5b69ef8112af9180d2bf778364ac7dd7d1711513c1a4831608de1f851e9 libsss_idmap-2.9.4-5.el8_10.3.aarch64.rpm 927cd6233d7501bb2129907771c4d60775420d4d3a4c01ac3adcadfff4b2f522 libsss_nss_idmap-2.9.4-5.el8_10.3.aarch64.rpm f9464aa9580b14a60535ca05d64adeec3c7072f251830ebd33c6944ca8eb979f libsss_simpleifp-2.9.4-5.el8_10.3.aarch64.rpm d80f84ab43084ddc56ec098b03b0959d85ea08ee11f47b3a5af1e3026d869c3d libsss_sudo-2.9.4-5.el8_10.3.aarch64.rpm da6d2da762fcb1a44472b15a2867739a41a8d97623dbf1ba128ddcc801d7ed60 python3-libipa_hbac-2.9.4-5.el8_10.3.aarch64.rpm 70ca110af8612eb0e3aaaeb15df242740ecaea1806b6f50bc9dbc96cb986680e python3-libsss_nss_idmap-2.9.4-5.el8_10.3.aarch64.rpm 63be57d81c352541b11a75e7126d39f09a9bca6f13a5c322f7bbfbe6ec6c6599 python3-sss-2.9.4-5.el8_10.3.aarch64.rpm 9189be82909ac50ce1a8dec2d51f30cc31541c84a039ce9501c6afc172789052 python3-sssdconfig-2.9.4-5.el8_10.3.noarch.rpm 085d93d407bba2486045998698cfde5f80905572d1c3fd7792f6d8125cd7d35a python3-sssdconfig-2.9.4-5.el8_10.3.noarch.rpm 085d93d407bba2486045998698cfde5f80905572d1c3fd7792f6d8125cd7d35a python3-sss-murmur-2.9.4-5.el8_10.3.aarch64.rpm 603051727462abd61030a9475b1600594faa8fe81002252d6b50ee4d7c308e4e sssd-2.9.4-5.el8_10.3.aarch64.rpm dd79784499ec12342db953adf3f2f0ba41cf414b5335abf18b33ac3504702f40 sssd-ad-2.9.4-5.el8_10.3.aarch64.rpm 59ec0d999c23f85d400ae683580f1044c37e3125c674ed8ce09ee046f681265f sssd-client-2.9.4-5.el8_10.3.aarch64.rpm cddcae1dddd15de636ece4b127739bb7c9f83b0c4c72ad8fc444a80af2b50d88 sssd-common-2.9.4-5.el8_10.3.aarch64.rpm 24cf5be88fbcdd4abb02def591d6688ebaf6fd45e8091e810fe16f4d0a326ec4 sssd-common-pac-2.9.4-5.el8_10.3.aarch64.rpm 1a9123a17e664d966a3615c6a2c12dd1ea6bc9ce933dbf6c2cbe5dced9400107 sssd-dbus-2.9.4-5.el8_10.3.aarch64.rpm 2e20e00c710471e5295bef0dba0ac95e55b2cbb463920562980b7a5c80dd4dca sssd-ipa-2.9.4-5.el8_10.3.aarch64.rpm bafd1035f0dafb4a89adec300826d993a1e0d74e8b631f38d57dd3a75dea6807 sssd-kcm-2.9.4-5.el8_10.3.aarch64.rpm 1e268e959cd689d7eab84c6959a09e7bff5d3924482b50df5e7875154469273c sssd-krb5-2.9.4-5.el8_10.3.aarch64.rpm a9657782a5de902fa2fabbc1ee40dea482642d810476763112ac6160474dfe30 sssd-krb5-common-2.9.4-5.el8_10.3.aarch64.rpm 63fbe1a7327ec092a32f51fa35102d28c849af917beaffc361d1ee0bc12b7478 sssd-ldap-2.9.4-5.el8_10.3.aarch64.rpm 61ac559d7c10d642b0b9959dd6de83a26d34ff2ab2e5d985319eed3b3d2eceaf sssd-nfs-idmap-2.9.4-5.el8_10.3.aarch64.rpm 6c0fdd71eecd327f8deaf30d1a329eb2e60eef636c21870b0722a33fbaeb1eb9 sssd-polkit-rules-2.9.4-5.el8_10.3.aarch64.rpm 9561ed342af185abf98e483c4e57a75334bf06aeac3a51b41e01bd890e5b9442 sssd-proxy-2.9.4-5.el8_10.3.aarch64.rpm 6ae147a301c57f5142b284765298c77f9dc7ab55b12b09d4d51bfcd54e0ec8e8 sssd-tools-2.9.4-5.el8_10.3.aarch64.rpm 733c7db5aa2cc3c8b6bbbb020def8707c6d4a272d40f84cf312f8c632b0a70cc sssd-winbind-idmap-2.9.4-5.el8_10.3.aarch64.rpm 2a758f963939d5cccd733c281f4565cda9be940da23c2079301d5f5ab3c672f2 RLSA-2025:19714 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-10.el8_10.aarch64.rpm c43586b9033fd12dc977a3585e3ff448c60a5fc9ea068b5eda0bed846487b4c1 RLSA-2025:23383 Moderate: curl security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for curl. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Security Fix(es): * curl: libcurl: Curl out of bounds read for cookie path (CVE-2025-9086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms curl-7.61.1-34.el8_10.9.aarch64.rpm 77a3a5e09859e22155211db17a23600f9d56f88adcf1366c055794a37ac49063 libcurl-7.61.1-34.el8_10.9.aarch64.rpm 1616364107b4c1fd61896eece0cb8fbacc8e741434442a33cebf704f3e5fda4c libcurl-devel-7.61.1-34.el8_10.9.aarch64.rpm 5ccdb243347f5ff970c85b1a842b1b42cb849b54203ac11c3b2f33ec80249848 libcurl-minimal-7.61.1-34.el8_10.9.aarch64.rpm cc6e2a3159df285aec408586599307f90780a6974a4bcd3ea28fc6ace1b2a054 RLSA-2025:21977 Moderate: libssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list libssh is a library which implements the SSH protocol. It can be used to implement client and server applications. Security Fix(es): * libssh: Incorrect Return Code Handling in ssh_kdf() in libssh (CVE-2025-5372) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libssh-0.9.6-16.el8_10.aarch64.rpm 515fc7fd1bff7171bb4617b1ef3084df80dc24af2a6cdce062026c5c59f2b691 libssh-config-0.9.6-16.el8_10.noarch.rpm 309e16b9330a518cee8c9df1ecde89c8d784a47d89d077c10e6c24472de59fd8 libssh-config-0.9.6-16.el8_10.noarch.rpm 309e16b9330a518cee8c9df1ecde89c8d784a47d89d077c10e6c24472de59fd8 RLSA-2025:21776 Important: expat security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for expat. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Expat is a C library for parsing XML documents. Security Fix(es): * expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing (CVE-2025-59375) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms expat-2.5.0-1.el8_10.aarch64.rpm 3c8363166911763ecd778040b6c3a99bc36ceac814c57d14a1030f7854268243 expat-devel-2.5.0-1.el8_10.aarch64.rpm 1b99c1c0ee744a6aa8525a09b2b8dedc9a03c5fa6d977afc21694b8bf9375272 RLSA-2025:13203 Moderate: libxml2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for libxml2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables (CVE-2025-32415) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libxml2-2.9.7-21.el8_10.3.aarch64.rpm e372400395c0830ce5cb8ffc89272049413668771a0dc02ce700c41227d0d711 python3-libxml2-2.9.7-21.el8_10.3.aarch64.rpm bc6bc32fdc9bd1001a6aa03e6f44767dfa8bcfdc94b68fcfd62522ea4dbc1ab7 RLSA-2025:13234 Moderate: python-requests security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-requests. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-requests-2.20.0-6.el8_10.noarch.rpm 49b1777749e84a626a98ab655426d19824cc20437e34d00378247df9e5ae8d4c python3-requests-2.20.0-6.el8_10.noarch.rpm 49b1777749e84a626a98ab655426d19824cc20437e34d00378247df9e5ae8d4c RLSA-2025:13315 Moderate: gdk-pixbuf2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for gdk-pixbuf2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The gdk-pixbuf2 packages provide an image loading library that can be extended by loadable modules for new image formats. It is used by toolkits such as GTK+ or clutter. Security Fix(es): * gdk?pixbuf: Heap?buffer?overflow in gdk?pixbuf (CVE-2025-7345) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gdk-pixbuf2-2.36.12-7.el8_10.aarch64.rpm 79264c18c406d54118f32cc65cb9454182626e3b5c52e5b5e684ad4a3edd54fc RLSA-2025:13589 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: can: peak_usb: fix use after free bugs (CVE-2021-47670) * kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (CVE-2025-38085) * kernel: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (CVE-2025-38159) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.69.1.el8_10.aarch64.rpm eff52b1523ab92b1d1ac8d518a7aab0b8eb614cd15a09c76c0117b5384128412 kernel-4.18.0-553.69.1.el8_10.aarch64.rpm 0a10ca1773995a8c03b89e1faa76011a304560622ad647b7a03b6d25fe5275f9 kernel-abi-stablelists-4.18.0-553.69.1.el8_10.noarch.rpm 10d0d2ef8e66b7d1887b221ed725cc6b9c64ede67c4a4c2893a45d23313979a6 kernel-abi-stablelists-4.18.0-553.69.1.el8_10.noarch.rpm 10d0d2ef8e66b7d1887b221ed725cc6b9c64ede67c4a4c2893a45d23313979a6 kernel-core-4.18.0-553.69.1.el8_10.aarch64.rpm b8fa2faa0071603891deaa8ba2435a9d0872e5c43960b1e39f998b3ba80de7a5 kernel-cross-headers-4.18.0-553.69.1.el8_10.aarch64.rpm 68976001d7dfa181f9a10b916c89fafe5b6998b1deb9aa97bcd2a71eae3d94ee kernel-debug-4.18.0-553.69.1.el8_10.aarch64.rpm db9c041fd9bda08f37d13f83d7e5ea04e130fe29a156c941e8a574e634244551 kernel-debug-core-4.18.0-553.69.1.el8_10.aarch64.rpm 3deb9580b587690e6a763a8757c09bd7f4370d48a504662c656d13148982e617 kernel-debug-devel-4.18.0-553.69.1.el8_10.aarch64.rpm 3be1b9e2d674251261a617eff9c8da5f6ac5de2a29d5cc5f3412f7d36ae7036d kernel-debuginfo-common-aarch64-4.18.0-553.69.1.el8_10.aarch64.rpm 9cf28092cfcdf5fab6c647aefec6c4044f7b889b4615b3214a8626a3eb14c3c5 kernel-debug-modules-4.18.0-553.69.1.el8_10.aarch64.rpm 2585df2dc78f6b92d6e6dfbd66ed2c2846cefcb63ef093a17f0904005043eac6 kernel-debug-modules-extra-4.18.0-553.69.1.el8_10.aarch64.rpm 1afbd0f1a82888efb277562c7cb6821a75d61b1e08b662f7950046d1e3ea258c kernel-devel-4.18.0-553.69.1.el8_10.aarch64.rpm 0ef9ae924cd04e82e847ab231d3bf0dc3c2935b7003d0886cc1e77a5bae3932e kernel-doc-4.18.0-553.69.1.el8_10.noarch.rpm bd61043ae7342adc5fc62ca83a5792d239f2e9bf9756964fe12162774d0f40f2 kernel-doc-4.18.0-553.69.1.el8_10.noarch.rpm bd61043ae7342adc5fc62ca83a5792d239f2e9bf9756964fe12162774d0f40f2 kernel-headers-4.18.0-553.69.1.el8_10.aarch64.rpm 607dd3b55c9a3dea7a34bae8436915c36b28ad0667a69fba40de578f3d26c6dc kernel-modules-4.18.0-553.69.1.el8_10.aarch64.rpm 6d695eea1ba774f8c8027b62dc64bedbfbd45a4f901e8215560a056df202d0f0 kernel-modules-extra-4.18.0-553.69.1.el8_10.aarch64.rpm 0297e85ad6e4facb696b513290745aa60f12dc1e868d2a28005bb93edb7d4b7c kernel-tools-4.18.0-553.69.1.el8_10.aarch64.rpm 4310c2b5bea60d576f2761fad83504c9b3351f352c02d8d74b0051581e9da1cb kernel-tools-libs-4.18.0-553.69.1.el8_10.aarch64.rpm 62fb9d4ae3e19f0e4bed58bc9c1c577b408b812d16037d99cec06ed0462e4802 perf-4.18.0-553.69.1.el8_10.aarch64.rpm d4c4da4f50ca8916772749e70b7d5f674bec8aaeb14faaf8e6e96fd01f20403b python3-perf-4.18.0-553.69.1.el8_10.aarch64.rpm 2647e911ec71e6e729d2ec6e45c6f3b5dfbda757bfc103ffd93ee3412d243d96 RLSA-2025:14135 Important: libarchive security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libarchive. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libarchive programming library can create and read several different streaming archive formats, including GNU tar, cpio, and ISO 9660 CD-ROM images. Libarchive is used notably in the bsdtar utility, scripting language bindings such as python-libarchive, and several popular desktop file managers. Security Fix(es): * libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bsdtar-3.3.3-6.el8_10.aarch64.rpm 3835066eb47ef6784d5c419d50dca9355992ea4b260fdf33ff064601d6ca7401 libarchive-3.3.3-6.el8_10.aarch64.rpm 888628cb51be068f7469a7697fb58b8bccfa9441cd42c239ede3960b71142b3b RLSA-2025:14553 Moderate: python-cryptography security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for python-cryptography. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-cryptography: NULL-dereference when loading PKCS7 certificates (CVE-2023-49083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-cryptography-3.2.1-8.el8_10.aarch64.rpm d6560846c123506a50250b486180075faa6c44e35591e2039e3b7fd72025744c RLSA-2025:14557 Important: pam security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for pam. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Pluggable Authentication Modules (PAM) provide a system to set up authentication policies without the need to recompile programs to handle authentication. Security Fix(es): * linux-pam: Linux-pam directory Traversal (CVE-2025-6020) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms pam-1.3.1-38.el8_10.aarch64.rpm 45239a842a4300b8a6307142571cfef86a87da11122ef4d1c80f3a8645376d20 pam-devel-1.3.1-38.el8_10.aarch64.rpm 83e83bce9629983157638fd51231d4b830b8561f55b882fb88167806d2bc258f RLSA-2025:15008 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate (CVE-2025-38477) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.72.1.el8_10.aarch64.rpm 218894b8e1812553a20737b0c3d5bbd1f2388282ff5f4c1e4180049df529bb30 kernel-4.18.0-553.72.1.el8_10.aarch64.rpm e231fff860a341b10aa4f3a62f06d8b0a1cd353f69e90cb9276a62cc84898a24 kernel-abi-stablelists-4.18.0-553.72.1.el8_10.noarch.rpm c16150610cc3b1c4853b89e952c6864f11c6e92ce9f4511793471b09ee4eb6b9 kernel-abi-stablelists-4.18.0-553.72.1.el8_10.noarch.rpm c16150610cc3b1c4853b89e952c6864f11c6e92ce9f4511793471b09ee4eb6b9 kernel-core-4.18.0-553.72.1.el8_10.aarch64.rpm f343ae6052c3b44ee93fc8b6877ebd67872ec7f9d227f9d6ad1e54a8bd22e189 kernel-debug-4.18.0-553.72.1.el8_10.aarch64.rpm 72c793921be5d7a1993120f64b4aea8727cbfa693732b4b97786845591f6acb4 kernel-debug-core-4.18.0-553.72.1.el8_10.aarch64.rpm 57a60a33e709dc9b9ad874f65e482dd2121fc7f2725a9990ac4d81810187e908 kernel-debug-devel-4.18.0-553.72.1.el8_10.aarch64.rpm 0e0da3f906a809d0194ff617f97273c734405df64d7dfdd3378dadf41b957c8c kernel-debuginfo-common-aarch64-4.18.0-553.72.1.el8_10.aarch64.rpm cf0a0ce6ce84f5206f0b89f9b00fc77855f5b0c7f0a801e47b07e8568729e604 kernel-debug-modules-4.18.0-553.72.1.el8_10.aarch64.rpm 9a7c55a8a466949e777a03854f2607b80ff37a96f175ae5b2c0a347d92c4098c kernel-debug-modules-extra-4.18.0-553.72.1.el8_10.aarch64.rpm d9c032bb1694c3d8647ad806c8aa69d3963f85cc8e24cbc08e3593a4ec319bda kernel-devel-4.18.0-553.72.1.el8_10.aarch64.rpm 0f742370f963e2ad0a175a81cc9dc223c9a726f540bdd2b7f1ecbaca55628406 kernel-doc-4.18.0-553.72.1.el8_10.noarch.rpm 292231efaddf13cb349b6b781ef8ec14f8126b035f2f87181dd2b2bd60247eb9 kernel-doc-4.18.0-553.72.1.el8_10.noarch.rpm 292231efaddf13cb349b6b781ef8ec14f8126b035f2f87181dd2b2bd60247eb9 kernel-modules-4.18.0-553.72.1.el8_10.aarch64.rpm 4a6204efc705da85bbd2c901a0dd92f58e7d9f6e0943bb48995aa9572903cea2 kernel-modules-extra-4.18.0-553.72.1.el8_10.aarch64.rpm e079282f599a077207dc824cfa1d75bea28c3db384b6c8ce43ac9fe70648a475 kernel-tools-4.18.0-553.72.1.el8_10.aarch64.rpm bd5769aa20fb52b465c760847082dedff608ef16fc97b5284f07a5b0d15c6b5a kernel-tools-libs-4.18.0-553.72.1.el8_10.aarch64.rpm 81b9a42200c3d5681560b01982d2930cc58cf3611ad10172727beb4dac1794bb perf-4.18.0-553.72.1.el8_10.aarch64.rpm 6b8853d5e88a5616f5ba0af7aa81454e5dc2f91b57804e786e0b7e6b065d9b73 python3-perf-4.18.0-553.72.1.el8_10.aarch64.rpm 671b5ad4889a1b57f7148f8017215ee00d064687b0c2d1012237894389d000cf RLSA-2025:15471 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: bpf: Don't use tnum_range on array range checking for poke descriptors (CVE-2022-49985) * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.74.1.el8_10.aarch64.rpm ac2cf0f7f2172d17ab9cd365b2e2a91dd953408fddfda31405677dbeb95285fe kernel-4.18.0-553.74.1.el8_10.aarch64.rpm cb850d31e2a4712344d4a9dc067f020d77aa829e5ad4ed9b0fc85394472baa31 kernel-abi-stablelists-4.18.0-553.74.1.el8_10.noarch.rpm a3a22e0867a850c2b184770b5a2ee3810fe54550c28e621ad8e580008c9c560c kernel-abi-stablelists-4.18.0-553.74.1.el8_10.noarch.rpm a3a22e0867a850c2b184770b5a2ee3810fe54550c28e621ad8e580008c9c560c kernel-core-4.18.0-553.74.1.el8_10.aarch64.rpm bd37f462c10973e85a56cddbee947f23abdf9a2899cc635006e2c7a087d44814 kernel-debug-4.18.0-553.74.1.el8_10.aarch64.rpm 8a3b41135c9e3c5ffd41efebc71edb02ab2eb689ad4f5c14304ba9caedd550da kernel-debug-core-4.18.0-553.74.1.el8_10.aarch64.rpm 2ab662a6c34c8e1573723f8700121ac49ae2820b094e74682da01eb9fd0d4e79 kernel-debug-devel-4.18.0-553.74.1.el8_10.aarch64.rpm ee1edd050c22cf8f8ce60fe54b576cdc8db6e759a8904df65183e6febdfe0153 kernel-debuginfo-common-aarch64-4.18.0-553.74.1.el8_10.aarch64.rpm 1a9d60b624cfb062ccd84594d70bad7b54b9b434f57abacc8c4a59bf850c42e2 kernel-debug-modules-4.18.0-553.74.1.el8_10.aarch64.rpm 916b62c788201b55079e7e81eff346c72aaa63d8a6119ed2e2b3cf42e69ba62c kernel-debug-modules-extra-4.18.0-553.74.1.el8_10.aarch64.rpm c691c00e00c5bcf3da644a840b3f1863059c60afc3c8d6de312a12344cf4525e kernel-devel-4.18.0-553.74.1.el8_10.aarch64.rpm 6593fbc113e3d8216fbb70a2ec7858a7cb676233c7a898f1106e043ff79cc1d5 kernel-doc-4.18.0-553.74.1.el8_10.noarch.rpm 47fc846d9ea867588d7b2501fc1f6f001f91d6923ac540455a28291f2b651cdf kernel-doc-4.18.0-553.74.1.el8_10.noarch.rpm 47fc846d9ea867588d7b2501fc1f6f001f91d6923ac540455a28291f2b651cdf kernel-modules-4.18.0-553.74.1.el8_10.aarch64.rpm f4ef27ed83ca71ea88ca0df36e0f74d1cc1b0bcb692fb2b181ae6807b7e6f911 kernel-modules-extra-4.18.0-553.74.1.el8_10.aarch64.rpm 5022a39297647f1dabc943f76de2c84514aef25eb250b4124058c6332afdc9bc kernel-tools-4.18.0-553.74.1.el8_10.aarch64.rpm 220bbdcf390763cabbfd0769325ec741eac69d5c182fd3ec7c3feb3dc92a5fb5 kernel-tools-libs-4.18.0-553.74.1.el8_10.aarch64.rpm 170c9b23053b4690c124e315c0a64bc2f864389993db906aba5f5837e66374fe perf-4.18.0-553.74.1.el8_10.aarch64.rpm 6f117e7fa057b256a524151fa6afb579452f0b5b4f3e4c50e86373f46666c18d python3-perf-4.18.0-553.74.1.el8_10.aarch64.rpm 39b4a6e6c960c0b3d6c6b11aa5f2f01d7009968c8f38edf86473f27f2134f381 RLSA-2025:15702 Important: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Authentication Bypass in CUPS Authorization Handling (CVE-2025-58060) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.2.6-63.el8_10.aarch64.rpm 9eaf37f6e1d521fd90c6917be3f05f96b2a3a7d6edee44a1e4ca8bd23683d417 RLSA-2025:16372 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: do_change_type(): refuse to operate on unmounted/not ours mounts (CVE-2025-38498) * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.76.1.el8_10.aarch64.rpm c637058490aad0b939e08b3b9e7a5e011df4707fbf2aa1c33bbf30d96d186c8d kernel-4.18.0-553.76.1.el8_10.aarch64.rpm e938c58feba01ac368ebee01d85cf9846d393532301c6faef7e0c10f68d1e988 kernel-abi-stablelists-4.18.0-553.76.1.el8_10.noarch.rpm a0d37578f050e3a792106308c88c730383cd4b6729ecc6c7a64dca5d84a6ac90 kernel-abi-stablelists-4.18.0-553.76.1.el8_10.noarch.rpm a0d37578f050e3a792106308c88c730383cd4b6729ecc6c7a64dca5d84a6ac90 kernel-core-4.18.0-553.76.1.el8_10.aarch64.rpm 6d0c142cc5d39b8edf7ebbd7d9b05619cfedc9e2f65342b5a9efe179d930d299 kernel-debug-4.18.0-553.76.1.el8_10.aarch64.rpm a637d17dca27bccc09746cf84fd7ebaececf0466282361de951240d40c120983 kernel-debug-core-4.18.0-553.76.1.el8_10.aarch64.rpm ff90c2974b93fc9a0f61588c9012467ac7cecbc9f0b9ddfc4c0fd0543064c857 kernel-debug-devel-4.18.0-553.76.1.el8_10.aarch64.rpm 2a4de83877ee724cc5ee5128c4cfa64d45e908f2f0e128419886e89632408405 kernel-debuginfo-common-aarch64-4.18.0-553.76.1.el8_10.aarch64.rpm 078929e6184b8c55cf08875aebbaabf46e8f144ac11daa4bd85bad797bd20a15 kernel-debug-modules-4.18.0-553.76.1.el8_10.aarch64.rpm 269761289375818fdd77941a7b70cea799bf28f030ffaf472951a9f0c072c890 kernel-debug-modules-extra-4.18.0-553.76.1.el8_10.aarch64.rpm 6bd765a2a0ada0874ea92c678e3baf5ad44853fdbecd0d2023af62a82a8fc61a kernel-devel-4.18.0-553.76.1.el8_10.aarch64.rpm 0ded5ed561706ce91496ff9d00b3da9f6161b541f5c7832c8f9f0d7c6e5f02ee kernel-doc-4.18.0-553.76.1.el8_10.noarch.rpm d82c21b6930b6108cfb2153806a1a3a30a2fa44a94c91dab9889d540ef6574eb kernel-doc-4.18.0-553.76.1.el8_10.noarch.rpm d82c21b6930b6108cfb2153806a1a3a30a2fa44a94c91dab9889d540ef6574eb kernel-modules-4.18.0-553.76.1.el8_10.aarch64.rpm 350fa540fe70e342ab4ad9cd017638de7c43389707a467879712547a945059e5 kernel-modules-extra-4.18.0-553.76.1.el8_10.aarch64.rpm e9e6858c69a3e80407ddb433287accb8cc6bfb7495a8af292a8f19b272c5fee5 kernel-tools-4.18.0-553.76.1.el8_10.aarch64.rpm 0590057847a4a1530d30b56758820824eb111a7e6213ddda4aee9d0dd1a488fe kernel-tools-libs-4.18.0-553.76.1.el8_10.aarch64.rpm 48fef68cd777499ba91ad34cad9cbfd6831e3fa0ba0d4726a85aa95620b8d31d perf-4.18.0-553.76.1.el8_10.aarch64.rpm edcf2b55bfbb6facb1b0d1368199fbb623bc81665aedce4f5334c6ca44a4ca57 python3-perf-4.18.0-553.76.1.el8_10.aarch64.rpm 53ebb8b90e1d08275c6a45716a275e7b30b6ed50e6f0d1c4c4358d6ffc79effc RLSA-2025:16823 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled (CVE-2025-26465) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssh-8.0p1-26.el8_10.aarch64.rpm 5937640c393694e8a294cc0fe872f45195e85588b2555b4fb97b527d19b773d3 openssh-cavs-8.0p1-26.el8_10.aarch64.rpm 55f29048499beb949a882a95d1b59f0a833d88f4a5ed4a9634213788373de7df openssh-clients-8.0p1-26.el8_10.aarch64.rpm 0555f5e3635224bec31201bb6d55b99bc474cf3ed153b882c20d22424001868e openssh-keycat-8.0p1-26.el8_10.aarch64.rpm c94d4a4ae69e3a30fed8a3e37cd8325aebc2d7357f732678981d0dd4f1f2679c openssh-ldap-8.0p1-26.el8_10.aarch64.rpm 87737d91428c239ce8b945afa856f73fb4c48fd284366a6555aa2ef138d225a9 openssh-server-8.0p1-26.el8_10.aarch64.rpm 42d76e3b4b646d30315d9dcc26644f15fd7872db7dfeba048c7031c5ebe63082 pam_ssh_agent_auth-0.10.3-7.26.el8_10.aarch64.rpm 0cb9fd1afe3b91e897beb731e63215b9eadf21d062001ef85a3ecfc9e571ffce RLSA-2025:23481 Moderate: openssh security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for openssh. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Security Fix(es): * openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand (CVE-2025-61984) * openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand (CVE-2025-61985) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms openssh-8.0p1-27.el8_10.aarch64.rpm f2ab63166a28a6df03d92ac5e478cff45c8075539787de9afe2bc1bde42d8324 openssh-cavs-8.0p1-27.el8_10.aarch64.rpm 73658ff9fd69a7bdb7a22aa76d26faa2086a93f2f73b831c05dbdda58278875b openssh-clients-8.0p1-27.el8_10.aarch64.rpm 3211e7730f033666770c47d84c9c9e4f7cc02a781c89fc1a75516b87d20e0922 openssh-keycat-8.0p1-27.el8_10.aarch64.rpm ddb35537ac08b33c3c27c0571fcf818295f4a9863b890587175af789a2d718ff openssh-ldap-8.0p1-27.el8_10.aarch64.rpm 811bb9554c3da504ed7236f36c40fed32af8e3b715bc5042a9169bba57a6da6c openssh-server-8.0p1-27.el8_10.aarch64.rpm 6e26843bca3595f356f0a4ecfa11754d368c485881297867dac32578edeb06c7 pam_ssh_agent_auth-0.10.3-7.27.el8_10.aarch64.rpm 3a3cc57756170273203d0fb91f1071d38e0b80b7df97eeee981a5fa5fefc9739 RLSA-2025:22063 Moderate: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS (CVE-2025-58364) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.2.6-64.el8_10.aarch64.rpm 96603bf3fe92425c053cc93a76556638226822c13117081db6fbec4887dec2a4 RLSA-2025:22801 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required() (CVE-2023-53401) * kernel: RDMA/rxe: Fix incomplete state save in rxe_requester (CVE-2023-53539) * kernel: RDMA/rxe: Fix mr->map double free (CVE-2022-50543) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.89.1.el8_10.aarch64.rpm 6ac7c8592d4aec552ff334fc02dec9e60e4110ffd4d6c6f33808e04e2b2ac098 kernel-4.18.0-553.89.1.el8_10.aarch64.rpm 4ceb36e21ced98af577400a03e40a37e70b6e40fe4f799616b0420f60e930425 kernel-abi-stablelists-4.18.0-553.89.1.el8_10.noarch.rpm d2713b0805bef9c348da4a50eb846db158c130ecf54fe4972968d430dee6a29a kernel-abi-stablelists-4.18.0-553.89.1.el8_10.noarch.rpm d2713b0805bef9c348da4a50eb846db158c130ecf54fe4972968d430dee6a29a kernel-core-4.18.0-553.89.1.el8_10.aarch64.rpm abd9952f5c97c140d64cfd28fd31cad2ab133a87ed13468010887c12f2c63f6a kernel-debug-4.18.0-553.89.1.el8_10.aarch64.rpm 38dc2b6d1fef4707f35d2a8d5933a08289eaf9c6d8a81e60341e58055398ac02 kernel-debug-core-4.18.0-553.89.1.el8_10.aarch64.rpm a16ba754e426ae453515b48c00067f0c00aa362398dd0bcdca98aecdc962027c kernel-debug-devel-4.18.0-553.89.1.el8_10.aarch64.rpm 55210f031faaef3760a0ca0353b6c8366ea1f9eb909be4f18ce82e8aa953b9b7 kernel-debuginfo-common-aarch64-4.18.0-553.89.1.el8_10.aarch64.rpm 1851ba8f3547dfbffe9dfb43a6ea0adeee39f67632331752427229e759e9133e kernel-debug-modules-4.18.0-553.89.1.el8_10.aarch64.rpm ba11e394adff8897f4150c8a23f7e950d14b3282c46aad2ab406b25ddc702ad5 kernel-debug-modules-extra-4.18.0-553.89.1.el8_10.aarch64.rpm 2472aa2933c64b8f908119a3bff1263a91499137b6fbbd90bfc8536dca877244 kernel-devel-4.18.0-553.89.1.el8_10.aarch64.rpm 1ed3be47aacf5c82ed808b6cdb9fd36fc41b4d5853a5efbd3b31fee19fb15023 kernel-doc-4.18.0-553.89.1.el8_10.noarch.rpm 59b4b94d3b05e996c3bdda4434cc1b5fbfe07e04773a18134b26452716fbb466 kernel-doc-4.18.0-553.89.1.el8_10.noarch.rpm 59b4b94d3b05e996c3bdda4434cc1b5fbfe07e04773a18134b26452716fbb466 kernel-modules-4.18.0-553.89.1.el8_10.aarch64.rpm 39afadc687d80d9a52113684a52912f6ebfed7aac486d218973d884c3c2c2c7b kernel-modules-extra-4.18.0-553.89.1.el8_10.aarch64.rpm 372b8f7aa8f8e68c612b3f9d6339382f76bcbb658826aec6b7e2a253f2087ae1 kernel-tools-4.18.0-553.89.1.el8_10.aarch64.rpm 41e9706d9a1f4d9856e538a0257f4e9ba5c540f71376ec8db4d7e61828c44f12 kernel-tools-libs-4.18.0-553.89.1.el8_10.aarch64.rpm 508126a7e8c12a24c9798f672e526f21c9ed1703c6b2ff437dd067fcbd53fed7 perf-4.18.0-553.89.1.el8_10.aarch64.rpm 9017564e617bdcffcd076c16a6d2de88346260ae73e39f14212c4b507def3b3a python3-perf-4.18.0-553.89.1.el8_10.aarch64.rpm 0dc8f990530cfad0c3f369de41b6fcb0190500eae14f2d5cc7e3ab010aa51aa4 RLSA-2025:23382 Moderate: binutils security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for binutils. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Security Fix(es): * binutils: GNU Binutils Linker heap-based overflow (CVE-2025-11083) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms binutils-2.30-128.el8_10.aarch64.rpm c86317d8c47852acdce90a7d04350cb2d2b9615502191558ad4ac44b159f122d RLSA-2026:0444 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: rc: fix races with imon_disconnect() (CVE-2025-39993) * kernel: sctp: avoid NULL dereference when chunk data buffer is missing (CVE-2025-40240) * kernel: libceph: fix potential use-after-free in have_mon_and_osd_map() (CVE-2025-68285) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.92.1.el8_10.aarch64.rpm d662f030830b317ee96f4ca89fdee55ebe50144dca8a3480816aab7310cec9db kernel-4.18.0-553.92.1.el8_10.aarch64.rpm e2828c749daa1d8ea1ff491720130ed89016690057fdca2a5c784ea3e4beef73 kernel-abi-stablelists-4.18.0-553.92.1.el8_10.noarch.rpm 5c0f9572ee4ea7e8aa5bb18ca14bf504fb078372d316e1f4b91b697e3a0e31e4 kernel-abi-stablelists-4.18.0-553.92.1.el8_10.noarch.rpm 5c0f9572ee4ea7e8aa5bb18ca14bf504fb078372d316e1f4b91b697e3a0e31e4 kernel-core-4.18.0-553.92.1.el8_10.aarch64.rpm b778a521eb01dd75d60c4fa3d5da290691c5cf9ab50f54c79983b46285ff8b90 kernel-debug-4.18.0-553.92.1.el8_10.aarch64.rpm 7e934f1e391095cb34eda045e3d5e2014da8136f96d18bb1fbd42cc4cc00d3f9 kernel-debug-core-4.18.0-553.92.1.el8_10.aarch64.rpm 0b571643cc8d0eca70d45cfcfbc3c4eb476b016d73c0c28755de9518795017f7 kernel-debug-devel-4.18.0-553.92.1.el8_10.aarch64.rpm 06d11bdd692a56d243b2b4b590bc5f5508445e623264b1cdf4e120e6fb683275 kernel-debuginfo-common-aarch64-4.18.0-553.92.1.el8_10.aarch64.rpm 4095e1ade2146ae99e40fc68a89adeef6d2f213d660e932c5e736b1382a0b558 kernel-debug-modules-4.18.0-553.92.1.el8_10.aarch64.rpm 3edf50217a1ef7787bcdd537ae7fc8185d7ce48d2293a202170f328f28631394 kernel-debug-modules-extra-4.18.0-553.92.1.el8_10.aarch64.rpm 16fc59afa8a1a8a9c761d21c671692c588e828f18e96c7693ec06673e547097e kernel-devel-4.18.0-553.92.1.el8_10.aarch64.rpm 20fed0d764579d512512db47702653e5bd9fc933f10737b562008e6cd7307c60 kernel-doc-4.18.0-553.92.1.el8_10.noarch.rpm 8f58b4542b0b68840d043ccecbc2376e04e46eaf46f2893931158186f586c615 kernel-doc-4.18.0-553.92.1.el8_10.noarch.rpm 8f58b4542b0b68840d043ccecbc2376e04e46eaf46f2893931158186f586c615 kernel-modules-4.18.0-553.92.1.el8_10.aarch64.rpm f187fc9d4db9cce9fcef1eff78175c669fc79f0baf958cd6f1627c5268617850 kernel-modules-extra-4.18.0-553.92.1.el8_10.aarch64.rpm f1ab163159d5042917941ff36f3182eab3b9d4f6541d05592de8c1515d6698f9 kernel-tools-4.18.0-553.92.1.el8_10.aarch64.rpm 19b2c7c009111438192bb73006e9e736405677a04a24f8e992879ca8f38a3f1a kernel-tools-libs-4.18.0-553.92.1.el8_10.aarch64.rpm 14d5458470e852fbbd341c7be1cda0e31818811e394bbf7e199f8cae055e83e2 perf-4.18.0-553.92.1.el8_10.aarch64.rpm 9be5d07be3dfabba5d3e40ea4e90f16b69ce348960aa04aed592100fe48d92d8 python3-perf-4.18.0-553.92.1.el8_10.aarch64.rpm 2022847a07cef06ac2e80a171d8c77bb9c6f6a7bb3cc5849f2c33a30f1447998 RLSA-2026:0759 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: smb: client: Fix use-after-free in cifs_fill_dirent (CVE-2025-38051) * kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length (CVE-2025-39933) * kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free (CVE-2023-53552) * kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (CVE-2025-40096) * kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.94.1.el8_10.aarch64.rpm f8c549f68ef225aa641834858a79009217c934b483df4bbd64fc9ef2ad89a701 kernel-4.18.0-553.94.1.el8_10.aarch64.rpm e9bc71e285c59956e656dd3a0d50e2bb8d5e751470980537faa68fc0a73ace43 kernel-abi-stablelists-4.18.0-553.94.1.el8_10.noarch.rpm 1066218655b111ca5f3b637b2e60f156d3b4b1bd4b99027f98ef1bf4a50fac0a kernel-abi-stablelists-4.18.0-553.94.1.el8_10.noarch.rpm 1066218655b111ca5f3b637b2e60f156d3b4b1bd4b99027f98ef1bf4a50fac0a kernel-core-4.18.0-553.94.1.el8_10.aarch64.rpm eda9ea78e3f7017b27b0d4ad70e4eec325e606a84d15f6362f920b230c993cc9 kernel-debug-4.18.0-553.94.1.el8_10.aarch64.rpm 6d85a2685b8979cbca943df0f70e31136567c88f9686bab6e3dc9ac0e42c27a3 kernel-debug-core-4.18.0-553.94.1.el8_10.aarch64.rpm ec99bdc220da7ffcab53d25585997ef5ffef8d7b179cfa8330e342564cb18563 kernel-debug-devel-4.18.0-553.94.1.el8_10.aarch64.rpm 884c53136ae8aebfdd758654a22784b5ee82cd4039feef3515194631fe59fd71 kernel-debuginfo-common-aarch64-4.18.0-553.94.1.el8_10.aarch64.rpm 4082fc2fe3dc6fd442894a6792d96499d12c5e815d449b56f3a248039a516992 kernel-debug-modules-4.18.0-553.94.1.el8_10.aarch64.rpm 6daf1bc2aebc380d2c363e641bd89836b609ce675d47b16e9cdccc3e7c43a8ed kernel-debug-modules-extra-4.18.0-553.94.1.el8_10.aarch64.rpm aac4b0b382f651e90d1e9ed214fd578f577dcc8565b5dda7b8914a089ee6e51c kernel-devel-4.18.0-553.94.1.el8_10.aarch64.rpm 4dcdc793e40cbd9f9177e0093be723b9168d6a3ed9273c6022d9bfda00be7486 kernel-doc-4.18.0-553.94.1.el8_10.noarch.rpm ef54512f1cf7d199ec3eec4d97a684a70da8158ee92e3e257d0c2dcd713a5738 kernel-doc-4.18.0-553.94.1.el8_10.noarch.rpm ef54512f1cf7d199ec3eec4d97a684a70da8158ee92e3e257d0c2dcd713a5738 kernel-modules-4.18.0-553.94.1.el8_10.aarch64.rpm abe326bc3a45a88b5a2fcfdc055f587f02555692936e80fded6fdf9e35f173e7 kernel-modules-extra-4.18.0-553.94.1.el8_10.aarch64.rpm 226137afe9a66f070f023c3b26fce17f924c038f27bf92b5719268cf286120d7 kernel-tools-4.18.0-553.94.1.el8_10.aarch64.rpm 03b600d5fc022048af9d1416c2992f20b67accaaa49073ebef5e3adf168df931 kernel-tools-libs-4.18.0-553.94.1.el8_10.aarch64.rpm cade4d4058489777dee400cf7f63447fedf45486139a90c0fae43bbff0ee3790 perf-4.18.0-553.94.1.el8_10.aarch64.rpm 4ada0d5c7c44042ed4a42433e0c376d10554512a8e4686c3906d5ecd412feb23 python3-perf-4.18.0-553.94.1.el8_10.aarch64.rpm 0557daaea6624ffde9985e9a914eda40faf68ec4929b27098724b750604a10b3 RLSA-2026:0241 Important: libpng security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libpng. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libpng packages contain a library of functions for creating and manipulating Portable Network Graphics (PNG) image format files. Security Fix(es): * libpng: LIBPNG buffer overflow (CVE-2025-64720) * libpng: LIBPNG heap buffer overflow (CVE-2025-65018) * libpng: LIBPNG out-of-bounds read in png_image_read_composite (CVE-2025-66293) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libpng-1.6.34-9.el8_10.aarch64.rpm 5d8d995f02dd22c7143c9d377089024b2adab8de9ca1ebe7741bfd12f6a692b4 libpng-devel-1.6.34-9.el8_10.aarch64.rpm 34896273242026f864b8bb709c0734a54a07df9bd00d292645088071859b9baa RLSA-2026:0991 Moderate: glib2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for glib2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures. Security Fix(es): * glib: Integer overflow in in g_escape_uri_string() (CVE-2025-13601) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms glib2-2.56.4-168.el8_10.aarch64.rpm af17fab97ea535077b8d6f15cb40f9bda028c020a32d1c9d55a0255411aab5f5 glib2-devel-2.56.4-168.el8_10.aarch64.rpm 28aba27e562e7819bc40bb6d06950b1b55f346e66b016c040f2518dd0d43c539 glib2-fam-2.56.4-168.el8_10.aarch64.rpm e86cc1bae79369cbc661e1c1a5215d82ce5d69f887023c29d4e3ac9368a89acb glib2-tests-2.56.4-168.el8_10.aarch64.rpm 2d81f2dd114c66e8710c1e0d9c15a4d2dab07055bf730804620b08a55919f53e RLSA-2026:0421 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: libsoup: Duplicate Host Header Handling Causes Host-Parsing Discrepancy (First- vs Last-Value Wins) (CVE-2025-14523) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-11.el8_10.aarch64.rpm 93da90f2c97a26d6da6ac7801e55c06490faf65350a1f00396cf698e56b5889a RLSA-2026:0596 Moderate: cups security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for cups. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Common UNIX Printing System (CUPS) provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix(es): * CUPS: Local denial-of-service via cupsd.conf update and related issues (CVE-2025-61915) * cups: Slow client communication leads to a possible DoS attack (CVE-2025-58436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms cups-libs-2.2.6-66.el8_10.aarch64.rpm 4314d9da8629d3c8d13d6322a35df6bd634957ebd633e5e752858caf873c1c30 RLSA-2026:0728 Important: gnupg2 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for gnupg2. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The GNU Privacy Guard (GnuPG or GPG) is a tool for encrypting data and creating digital signatures, compliant with OpenPGP and S/MIME standards. Security Fix(es): * GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write (CVE-2025-68973) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms gnupg2-2.2.20-4.el8_10.aarch64.rpm 2e296ee5c310b7e6731a2e2b3ef0aa5e5a3090bb2fb0560e3ffdf583c55b5aa3 gnupg2-smime-2.2.20-4.el8_10.aarch64.rpm 4072dbb6f2e703496508bf85b2a70f35cde9087e8b556d95e806daf46fa68c47 RLSA-2026:0750 Important: net-snmp security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for net-snmp. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. Security Fix(es): * net-snmp: buffer overflow via a specially crafted packet can cause a crash in snmptrapd (CVE-2025-68615) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms net-snmp-libs-5.8-33.el8_10.aarch64.rpm e78a5839bd91e2b02d8c7a2538483989282896d270363049142d0db53e1843db RLSA-2026:1852 Moderate: util-linux security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for util-linux. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The util-linux packages contain a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, these include the fdisk configuration tool and the login program. Security Fix(es): * util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames (CVE-2025-14104) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libblkid-2.32.1-48.el8_10.aarch64.rpm d3f610520255252288711f4e2b6cb962adde23a472f2c1f99f374aa0a889fc65 libblkid-devel-2.32.1-48.el8_10.aarch64.rpm e4e27fa6e332837fb1443a82f11d00255fc33963ba2d4599ca5de4bf0e36949d libfdisk-2.32.1-48.el8_10.aarch64.rpm f751887b98fb88413d61771b5549e1f50407efcd6aba3c03a6c9ec8cb59ad34b libfdisk-devel-2.32.1-48.el8_10.aarch64.rpm 77cff6856da366260d37e45b6001fbd8d088a089e0cfcac36bfa07674f4e63d8 libmount-2.32.1-48.el8_10.aarch64.rpm 22b0a67000bba9c24670bc10e30963bb0b48c3da90e134f3aed7e1d46c3106e3 libsmartcols-2.32.1-48.el8_10.aarch64.rpm 225171e0f9307e2004af4e55e420422dc0569adaaf75b4804a2f673f18213f8d libsmartcols-devel-2.32.1-48.el8_10.aarch64.rpm f5d47ffd565d10f334ae6319599b0a3b15a5c4058e1d25661190157fb2c93d73 libuuid-2.32.1-48.el8_10.aarch64.rpm b1d139a5519ba83e6f333ea70a09bdc71cff588443f735b81e743d4c2fb09ad4 libuuid-devel-2.32.1-48.el8_10.aarch64.rpm 1f1b2fe18fcb55c51615923ccc5bb9945a795fcfaec27af0bc71e13af604bba6 util-linux-2.32.1-48.el8_10.aarch64.rpm 8dba662364ecfd096d05fcf228f9c36c04a9ed93492ce9319aecd337ea4dc8d3 util-linux-user-2.32.1-48.el8_10.aarch64.rpm a7d39e98dda05a1f404da9438231e69c734bd179a93ee93880105cebb5f135e6 uuidd-2.32.1-48.el8_10.aarch64.rpm 520b8146689c6dd53c912b5780b5ab7e525682230b8ce9b1d58b1596d4a5545f RLSA-2026:1254 Important: python-urllib3 security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for python-urllib3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion (CVE-2025-66418) * urllib3: urllib3 Streaming API improperly handles highly compressed data (CVE-2025-66471) * urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) (CVE-2026-21441) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms python3-urllib3-1.24.2-9.el8_10.noarch.rpm 9dd6495e887db8db4953a7fdc4df5a84917f944bdf88987b917889b3ca197477 python3-urllib3-1.24.2-9.el8_10.noarch.rpm 9dd6495e887db8db4953a7fdc4df5a84917f944bdf88987b917889b3ca197477 RLSA-2026:2215 Important: libsoup security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for libsoup. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The libsoup packages provide an HTTP client and server library for GNOME. Security Fix(es): * libsoup: Signed to Unsigned Conversion Error Leading to Stack-Based Buffer Overflow in libsoup NTLM Authentication (CVE-2026-0719) * libsoup: Stack-Based Buffer Overflow in libsoup Multipart Response Parsingmultipart HTTP response (CVE-2026-1761) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms libsoup-2.62.3-13.el8_10.aarch64.rpm 649ce6394b9f05d0ffe8b9cc96c515a36fdc36c22b2f7a34d8d68cad94469286 RLSA-2026:2389 Important: brotli security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Important An update is available for brotli. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Brotli is a generic-purpose lossless compression algorithm that compresses data using a combination of a modern variant of the LZ77 algorithm, Huffman coding and 2nd order context modeling, with a compression ratio comparable to the best currently available general-purpose compression methods. It is similar in speed with deflate but offers more dense compression. Security Fix(es): * Scrapy: python-scrapy: brotli: Python brotli decompression bomb DoS (CVE-2025-6176) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms brotli-1.0.6-4.el8_10.aarch64.rpm ef26ddb475734280a40a05d1deafff503be399547dbb225b46b2ab47a856b304 RLSA-2026:2264 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 8 1 Moderate An update is available for kernel. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/vmci: Clear the vmci transport packet properly when initializing it (CVE-2025-38403) * kernel: net: use dst_dev_rcu() in sk_setup_caps() (CVE-2025-40170) * kernel: ipv6: use RCU in ip6_xmit() (CVE-2025-40135) * kernel: ipv6: use RCU in ip6_output() (CVE-2025-40158) * kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service (CVE-2025-40269) * kernel: ext4: fix use-after-free in ext4_orphan_cleanup (CVE-2022-50673) * kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (CVE-2025-68349) * kernel: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (CVE-2026-22998) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-baseos-rpms bpftool-4.18.0-553.104.1.el8_10.aarch64.rpm 72d1f23f4d0eeca55f5054f2d5cc46f4835d775a0a2a0a4c2aeb3a5b17ffc2de kernel-4.18.0-553.104.1.el8_10.aarch64.rpm c5943cbad195fd88a0abe8867ff11e7ed46dafc61f048fdd5009a53bea21190e kernel-abi-stablelists-4.18.0-553.104.1.el8_10.noarch.rpm 3a5c9547e9c54a25eb61020d51125d87429fe555011a33979a2cf4afdfbd0dbb kernel-abi-stablelists-4.18.0-553.104.1.el8_10.noarch.rpm 3a5c9547e9c54a25eb61020d51125d87429fe555011a33979a2cf4afdfbd0dbb kernel-core-4.18.0-553.104.1.el8_10.aarch64.rpm 87cc498860664be172ffc6e819a3b5173fccf93ffbaab0fd012ac50d1836c935 kernel-debug-4.18.0-553.104.1.el8_10.aarch64.rpm d0e3cc6d09928d5832b6c5c7b1e11e2152033141385f86304b204789390429bf kernel-debug-core-4.18.0-553.104.1.el8_10.aarch64.rpm 3fbbf12d0a5be36ce8d4c986ea070933e9b2dd8cdb684b1e11d607249e278318 kernel-debug-devel-4.18.0-553.104.1.el8_10.aarch64.rpm 0b3bef38d6f10425183f63ad7c394285aabc0384ad07b28feab58e43ccfa204d kernel-debuginfo-common-aarch64-4.18.0-553.104.1.el8_10.aarch64.rpm a04f3b23c0e11c60d6c592382dded43cca9b4d4c77ad70f01a6f6f1f5b3086a4 kernel-debug-modules-4.18.0-553.104.1.el8_10.aarch64.rpm 1ed97e5cf4af2eb8d635850f0fa2a880483ce34d175c4c51d330e040b938290f kernel-debug-modules-extra-4.18.0-553.104.1.el8_10.aarch64.rpm f8094b66919fea8922b389b60d829de971bee0c9ff7aac8cf6256846aa7aabbf kernel-devel-4.18.0-553.104.1.el8_10.aarch64.rpm 980e7971a6c13f4f4a5e2d8c311208fde4aba20dbd31119d675b3fc1282215d2 kernel-doc-4.18.0-553.104.1.el8_10.noarch.rpm f0472d352d1fd9ced0d1207d530ea7010832ee3e20e23eecc9f7ab30d05b1024 kernel-doc-4.18.0-553.104.1.el8_10.noarch.rpm f0472d352d1fd9ced0d1207d530ea7010832ee3e20e23eecc9f7ab30d05b1024 kernel-modules-4.18.0-553.104.1.el8_10.aarch64.rpm 8b8ee0df94200aca001b8882ba4ca57af58938e38d6e0346680c7a2c154a883a kernel-modules-extra-4.18.0-553.104.1.el8_10.aarch64.rpm 3e717f35f3126b29a7e6af93dfc2ae1afd63d0d282bc6684b5ca9afd2a473937 kernel-tools-4.18.0-553.104.1.el8_10.aarch64.rpm 6bdebfa0014faf531a49a57c3231be700062126ca0e17b17987932f505b22244 kernel-tools-libs-4.18.0-553.104.1.el8_10.aarch64.rpm 31c41c781df3181c00c7039438fb04cfb7ca8562c6550b80df4fd43859dd51b5 perf-4.18.0-553.104.1.el8_10.aarch64.rpm 4ae797e78c3b0ce32000c163732a91ee87bf52b6c652b5581dcffc7a1e1d0141 python3-perf-4.18.0-553.104.1.el8_10.aarch64.rpm dbb98242c900ef5715651e149cda7ff8e027a2817509935fc88bf9aec58c94ff