RLSA-2025:21816 Moderate: delve and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for golang, delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Go Programming Language. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms delve-1.25.2-1.el10_1.aarch64.rpm 474046e009f06b28083d89f6f02929af7cef4ab090d27b937ae60b267632ec20 golang-1.25.3-1.el10_1.aarch64.rpm 7c27557c862ad9d8de91beaebdfc5b427fcc57784efc2c5bdb30b91923f811c0 golang-bin-1.25.3-1.el10_1.aarch64.rpm a11fac4669c56d767161f8663237283c6086629c75943724792539ccf5e9e633 golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-race-1.25.3-1.el10_1.aarch64.rpm d1bca98c25fc87a5180394c791f2c6de376698652dcfda1a16533fffcd55dc7f golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 go-toolset-1.25.3-1.el10_1.aarch64.rpm f73fa3ea149da02599a9c0e4eb882e865f3daca3d4c93ef73af8768d1acddf7b RLSA-2025:21485 Moderate: java-25-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for java-25-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit. Security Fix(es): * JDK: Enhance Path Factories (CVE-2025-53066) * JDK: Enhance Certificate Handling (CVE-2025-53057) * JDK: Enhance String Handling (CVE-2025-61748) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Note that the OpenJDK 25 package does not yet include FIPS support. This is expected to be reinstated in a future update. rocky-linux-10-aarch64-appstream-rpms java-25-openjdk-25.0.1.0.8-2.el10.aarch64.rpm 0ee5f6447f39a9fdd6bcc2c4e23bb7d0c1745c4e70b2a471659892aedcdc6c3e java-25-openjdk-demo-25.0.1.0.8-2.el10.aarch64.rpm 6059fa45ac075452fe8c48b2423fbfa30a2ece987e68620d6a99d6f3f47339fd java-25-openjdk-devel-25.0.1.0.8-2.el10.aarch64.rpm bf7c0f221ee136629c3623ab80dafb7bdfedcf5be4815237a52416b60bc1ca26 java-25-openjdk-headless-25.0.1.0.8-2.el10.aarch64.rpm f19fe2ab9a89851a585023ab5d2ba094325b2f5da23f5de7d23440258885a33e java-25-openjdk-javadoc-25.0.1.0.8-2.el10.aarch64.rpm 91a31ba88bc50010d948990aefc3752030d43452c04468cb1988c52a939435de java-25-openjdk-javadoc-zip-25.0.1.0.8-2.el10.aarch64.rpm 7ad6f0bc211e863aff6979a397a27bb7ced5b3183d4290c7a5416cd46c002252 java-25-openjdk-jmods-25.0.1.0.8-2.el10.aarch64.rpm 8bf144405a7b93d59890fe1af07214b13e8eadf93ad8bd179bb574844f5a3ddf java-25-openjdk-src-25.0.1.0.8-2.el10.aarch64.rpm e363bfbda20e71f6182c8ba7366452d5d493e67a18c87be9304217c8fd768e52 java-25-openjdk-static-libs-25.0.1.0.8-2.el10.aarch64.rpm e4348d6f78e60434d34a4399163126387480bb9861b77af4393248d70940a9c6 RLSA-2025:21691 Important: haproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for haproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Security Fix(es): * haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms haproxy-3.0.5-4.el10_1.1.aarch64.rpm e88222e06a8f6e535c31109692fdaf33b893b30e317a975ab4b4946f74cb963b RLSA-2025:21936 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms valkey-8.0.6-2.el10_1.aarch64.rpm c430f69edf8990a904a926952f23268610e2e5b82bffd25915baac1b822420d5 valkey-devel-8.0.6-2.el10_1.aarch64.rpm 3a5ce90dde7ae12fae7378b2693c859dfe2f1ada32efe20d6270ab64b60fcbfa RLSA-2025:22012 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms buildah-1.41.6-1.el10_1.aarch64.rpm 5d03e8f04d5afd5dfb23366a7dc42079e3ab50100fbcbbb166bd1ca0274003f0 buildah-tests-1.41.6-1.el10_1.aarch64.rpm 20812e0a0ce4026f0ff0385e13683de97e4c67ce6ff50c0461fa3b05e87e2074 RLSA-2025:22361 Moderate: qt6-qtquick3d security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qt6-qtquick3d. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Qt 6 Quick3D library. Security Fix(es): * assimp: Open Asset Import Library Assimp Q3DLoader.cpp InternReadFile heap-based overflow (CVE-2025-11277) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms qt6-qtquick3d-6.9.1-1.el10_1.1.aarch64.rpm 5cfeed0f695030567299e49be4762dd50144ffea9b255a8cf7710493566cf2ea qt6-qtquick3d-devel-6.9.1-1.el10_1.1.aarch64.rpm d92dea864a12be0a4ea168af8598262d7597617bed6bc3a9423dcd2eb2dcfee3 RLSA-2025:22394 Moderate: qt6-qtsvg security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Uncontrolled recursion in Qt SVG module (CVE-2025-10728) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.2.aarch64.rpm 640adf43cbb917a75972a006df9b506ea06601fcbf2f75668c64023a6e3a3011 qt6-qtsvg-devel-6.9.1-2.el10_1.2.aarch64.rpm 83bc81b4b744709945d9447c36a3f607b6b5571a110415b79de8f1e15c7f91f8 RLSA-2025:20478 Moderate: zziplib security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for zziplib. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-aarch64-appstream-rpms zziplib-0.13.78-2.el10.aarch64.rpm a5c94c61cf10ae637c65d8100d847d223b104a551e1785dff946626bdf40a39e zziplib-utils-0.13.78-2.el10.aarch64.rpm 9eb2f8f24ed506a762fdc0ade5e4e1f5c9b7ee7df4e48dda54cb88c09d062044 RLSA-2025:21002 Important: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for squid. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms squid-6.10-6.el10_1.1.aarch64.rpm 964726875480bf40cbeb44a6a43cbf6fce34acff4940ad1745f394e341db8b05 RLSA-2025:20994 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms ipa-client-4.12.2-24.el10_1.1.aarch64.rpm 9411d624dace98b7a1b3289f847b73712220642596ecdd7bcec9484732d27d33 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-encrypted-dns-4.12.2-24.el10_1.1.aarch64.rpm e4d31880f78037ca3082443c5d072499039137433833a8c36c27f571e07ac1b4 ipa-client-epn-4.12.2-24.el10_1.1.aarch64.rpm f520b9b640d9adb4b00d8865f54b8e2045dae180969de72f7d1b9223c5e8fae8 ipa-client-samba-4.12.2-24.el10_1.1.aarch64.rpm 2bd73688be882bd4bdc835f370172e80847b52127cdce0007f8da90599923a3e ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-server-4.12.2-24.el10_1.1.aarch64.rpm 423c13b6e78e69cf4369468cfdc6cc284bba2f456182b7ac5ea666df432d8637 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-encrypted-dns-4.12.2-24.el10_1.1.aarch64.rpm 59e907f42a11185a8aee72aa07c02345767b57df64b4e56d50a51a9b604bf7c6 ipa-server-trust-ad-4.12.2-24.el10_1.1.aarch64.rpm 61133c1243f672c0c873d46221257f4b99629f4921435b2ce765afeffc83b7f5 python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 RLSA-2025:21032 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms libsoup3-3.6.5-3.el10_1.6.aarch64.rpm afbe9a982f4626bc84763baedc63e5b29cf8b5a1c0cb61e6d6b80da8b5a71d47 libsoup3-devel-3.6.5-3.el10_1.6.aarch64.rpm dc47d85945942bf373f5883ee68ca00653da40fc3daac9c95846f3d44d1fc895 RLSA-2025:21037 Important: qt6-qtsvg security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.1.aarch64.rpm 3ff2cb179c9f265a18f26ab20419e4c5a4fd9b87ccc0287cc5c3a4d823c2aaf0 qt6-qtsvg-devel-6.9.1-2.el10_1.1.aarch64.rpm 501c481eebe8f09b23f581fa7044a4e8a638305ab1588457d10731aefaa4b030 RLSA-2025:21034 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for bind. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms bind-9.18.33-10.el10_1.2.aarch64.rpm 9a2a1d6c52f5d3d9b95dcf5dd958d2582d035e2f5b12cffdf9ebaf703a75c3c9 bind-chroot-9.18.33-10.el10_1.2.aarch64.rpm c33b71ed4823271bfbef945c34209584b4b90cd839cef1050f815c5f50a83fab bind-dnssec-utils-9.18.33-10.el10_1.2.aarch64.rpm c2894d3c9d13f6a54469ca0bc7526ee8724f4f07e49eaafbe67b8250c52d7a85 bind-libs-9.18.33-10.el10_1.2.aarch64.rpm 5add201e2e5ed33099f655fdd378449c7475cf8e8057e414601a4e9ea1d0b8f2 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-utils-9.18.33-10.el10_1.2.aarch64.rpm 74e1400c6aaee4661ca91c87a9b4ce3ab8fa13dbdb1f354d59fdfff7c3d260d2 RLSA-2025:21142 Important: python-kdcproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-kdcproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088) * python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f RLSA-2025:21220 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms podman-5.6.0-6.el10_1.aarch64.rpm 96e064880f0b1668975c0acc48fac3e2dc6575d003732f6ca42571218b08cef6 podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-remote-5.6.0-6.el10_1.aarch64.rpm f7b63269cf30ba5784b142de1b8076f35a579d8a7afd63e2fed66fe13c0a6f9a RLSA-2025:21281 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms firefox-140.5.0-2.el10_1.aarch64.rpm d71f0851e7dedf3e96757534aef318d45ca8f9a48dc69cd5da9467926af5c751 RLSA-2025:21843 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms thunderbird-140.5.0-2.el10_1.aarch64.rpm d57b23712cae585fd2a622871bf7a276f8c193cf17ce16a326a30f23c659de59