RLSA-2025:21485 Moderate: java-25-openjdk security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for java-25-openjdk. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The OpenJDK 25 packages provide the OpenJDK 25 Java Runtime Environment and the OpenJDK 25 Java Software Development Kit. Security Fix(es): * JDK: Enhance Path Factories (CVE-2025-53066) * JDK: Enhance Certificate Handling (CVE-2025-53057) * JDK: Enhance String Handling (CVE-2025-61748) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Note that the OpenJDK 25 package does not yet include FIPS support. This is expected to be reinstated in a future update. rocky-linux-10-ppc64le-appstream-rpms java-25-openjdk-25.0.1.0.8-2.el10.ppc64le.rpm d62ebbf88ae78b97b6f5e21b322bfd24732f31acd84b8820da0b25428a1c24fa java-25-openjdk-demo-25.0.1.0.8-2.el10.ppc64le.rpm 063454f32caedad445f45d498a466ad89a3e2fc5ed5da3426392ab5b1697e903 java-25-openjdk-devel-25.0.1.0.8-2.el10.ppc64le.rpm 8c431709d013835f4ea5ef8bd6fc391caadb223f7a6c7a297bf5de2eea5181b0 java-25-openjdk-headless-25.0.1.0.8-2.el10.ppc64le.rpm 068b7e906d3d3a4155cbe6a018507dfdeb0be653c142eaa4b53a9d90c1a61f00 java-25-openjdk-javadoc-25.0.1.0.8-2.el10.ppc64le.rpm af3e66de1ea9a23b8caecd29e9ceae693413bd71e5b3782bf0d1084c0a652448 java-25-openjdk-javadoc-zip-25.0.1.0.8-2.el10.ppc64le.rpm 66cbcc435a93b5b20d928f077b043e14773f60cc62b39d71ad3797d17014277b java-25-openjdk-jmods-25.0.1.0.8-2.el10.ppc64le.rpm a4f1c115accd7b91f486909f6e95abe5a9cea23590dd65be2b7472a6d532c432 java-25-openjdk-src-25.0.1.0.8-2.el10.ppc64le.rpm e3deeccca165c0948bb0c6ffd5ddf17105a3bb7406635da0b7bbe1ca9aad0950 java-25-openjdk-static-libs-25.0.1.0.8-2.el10.ppc64le.rpm 736917bf0c0a78e1bf7eb0b8e1077708b657f2a273d421b4592502818359a96f RLSA-2025:21691 Important: haproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for haproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Security Fix(es): * haproxy: denial of service vulnerability in HAProxy mjson library (CVE-2025-11230) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms haproxy-3.0.5-4.el10_1.1.ppc64le.rpm a1e85fca01fb0bd262b7f4dd9d49d23cfa71fd16690f9c7022c57c8247d4f95d RLSA-2025:21936 Important: valkey security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for valkey. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also. Security Fix(es): * redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817) * Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818) * Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819) * Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms valkey-8.0.6-2.el10_1.ppc64le.rpm ceab16b2e95e558d4b3d1f0172a05ca00bdae1bf967115b64b127f3b20b85b86 valkey-devel-8.0.6-2.el10_1.ppc64le.rpm bd75f6ed6b26e3c5dcebb4d587e57109cacaf33000ea9d89035a1efbdd43f3d3 RLSA-2025:21816 Moderate: delve and golang security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for golang, delve. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Go Programming Language. Security Fix(es): * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms delve-1.25.2-1.el10_1.ppc64le.rpm 975ca5f2e8d588be7c220db733f28fd09a36c42dad5eb31e322e939b1016465a golang-1.25.3-1.el10_1.ppc64le.rpm 82036eedb2c1c5259cb7ec7dcc7b891071d259a13a0a771d112c7d1147cf80c0 golang-bin-1.25.3-1.el10_1.ppc64le.rpm bd324fef5973bb496a8607e52218fbeb2e5331b324820e072565a0bbb5a0bf1d golang-docs-1.25.3-1.el10_1.noarch.rpm 9e7dbd3039937982d0083ea4030a03960311db7aeb1ae99d25a440a2991a2fa8 golang-misc-1.25.3-1.el10_1.noarch.rpm e6fb8d50f403ed9b6bc1c92db1313138fe48b005ee3b4e36a7572176e99ced2a golang-race-1.25.3-1.el10_1.ppc64le.rpm e3ad8f83b44266cb00b53d32f2361e13dd8c4a15ea493c3d366a582a0d8017ff golang-src-1.25.3-1.el10_1.noarch.rpm fcab9736bf045d0b8c60b64b37f6a5b541dc262e34b835d0d69e0d519e1c7f3f golang-tests-1.25.3-1.el10_1.noarch.rpm ba530d6269e26f0abab9df12cb744896239302378e95e398f111e917ace9c370 go-toolset-1.25.3-1.el10_1.ppc64le.rpm df6b078dddc06b8fc7a281ffe69ef4cd4ed10399001cdc634968149443cd42ea RLSA-2025:22012 Important: buildah security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for buildah. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The buildah package provides a tool for facilitating building OCI container images. Among other things, buildah enables you to: Create a working container, either from scratch or using an image as a starting point; Create an image, either from a working container or using the instructions in a Dockerfile; Build both Docker and OCI images. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) * golang: archive/tar: Unbounded allocation when parsing GNU sparse map (CVE-2025-58183) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms buildah-1.41.6-1.el10_1.ppc64le.rpm e6f9acf0b9d45ba46c4a0251c8a2ee64d4e5e593a79902e8c765a82c17435238 buildah-tests-1.41.6-1.el10_1.ppc64le.rpm 603ca29733b3007d9749ac0e0f2000144e3db2f2dbcacbf7ee1374a2b923c363 RLSA-2025:20478 Moderate: zziplib security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for zziplib. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-ppc64le-appstream-rpms zziplib-0.13.78-2.el10.ppc64le.rpm ae4b0c4e9d7ffa903372f0755f8df8d9ad8f57361c8d0612ab851dbc9bab57b9 zziplib-utils-0.13.78-2.el10.ppc64le.rpm 43b6a725c316cf3cfc67c58948cb6295b269109f08e759126f6406165aebc93d RLSA-2025:21002 Important: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for squid. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms squid-6.10-6.el10_1.1.ppc64le.rpm 85569c6b2ba707749477b641af6de5c5362c7a1f9786cf210aab0eb1fd75f3e1 RLSA-2025:20994 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms ipa-client-4.12.2-24.el10_1.1.ppc64le.rpm 6346095123843e74477f6b08922469b821de146467e8c5ffbc1b7f1c04e4eeac ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-encrypted-dns-4.12.2-24.el10_1.1.ppc64le.rpm 27c8448584cb735b96bc4eccd86b39616d0fdfc9c477bf7a93160386a73daeda ipa-client-epn-4.12.2-24.el10_1.1.ppc64le.rpm 6771e9bdd068f4c9de6ced1fb63bc21df5dd0e622092f5e9aa0e8801c8f5b53a ipa-client-samba-4.12.2-24.el10_1.1.ppc64le.rpm ff1b0bf5552f662744790fc5a7531ee3ca081ddcfabb01dcc05c4e702490b5fe ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-server-4.12.2-24.el10_1.1.ppc64le.rpm 3b2bcaeab3cd9b6f3fc931bef45aa7c1cf99b90af92ce123d52a8d2714e10f89 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-encrypted-dns-4.12.2-24.el10_1.1.ppc64le.rpm f647c79d7a9d04c10b6f000da3d29c3ef5aff1639cd288a8fa63295dfe0c7916 ipa-server-trust-ad-4.12.2-24.el10_1.1.ppc64le.rpm 31381af8ccff3dda7b8333e52f5df4bc10e10d5d17a05f7e52e7b47cc974da64 python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 RLSA-2025:21032 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms libsoup3-3.6.5-3.el10_1.6.ppc64le.rpm 3c1fe612f2a763f0234356f11e266b2d1c421cd041c2c77dfc782c453a84b624 libsoup3-devel-3.6.5-3.el10_1.6.ppc64le.rpm 149979228fb76e9ec6e4ebd2d195413637a64fa8372c1ef64732e28102aff67b RLSA-2025:21037 Important: qt6-qtsvg security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.1.ppc64le.rpm 2b54c002ee4dd00e5e80218455261fa5d3070a819b3be3ddf5c4da7641b98e24 qt6-qtsvg-devel-6.9.1-2.el10_1.1.ppc64le.rpm a0d426a1694d4a498285be6c3270d35c490313188179ab344d3ab502bce5b20d RLSA-2025:21034 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for bind. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms bind-9.18.33-10.el10_1.2.ppc64le.rpm 0fe6e2fe8433782a73f330463006dd435e92152a146b54e46045547118c81bb6 bind-chroot-9.18.33-10.el10_1.2.ppc64le.rpm e5ead56377ff39b69cf395ff7155f96f9d649a07e89efee5c2e26732a0c1a544 bind-dnssec-utils-9.18.33-10.el10_1.2.ppc64le.rpm 2cf17d703d351248d073888c5043ef73d40b991ed89d5e399c674f8b29b812ea bind-libs-9.18.33-10.el10_1.2.ppc64le.rpm 6fa80861b617252fcef5872aa7cb99426eb195859462cdff3ff55bce7afa88c6 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-utils-9.18.33-10.el10_1.2.ppc64le.rpm 66933bfd91251a33164169680b26a086541e6c6812aebae4c677a045ded6b224 RLSA-2025:21142 Important: python-kdcproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-kdcproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088) * python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f RLSA-2025:21220 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms podman-5.6.0-6.el10_1.ppc64le.rpm 4d7bff57d5cdc50ec0496a7e31e6715e475b6d52389d883e654dabde5bb5344f podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-remote-5.6.0-6.el10_1.ppc64le.rpm 28b7832871e7ac4ae6c0b71b10b3ca6f835c6e04fc3ef041f58cd148fb749aec RLSA-2025:21281 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms firefox-140.5.0-2.el10_1.ppc64le.rpm 729856097fdfa98b3ac94726df16914614859f97ece54d7889da8d97954f8e49 RLSA-2025:21843 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-ppc64le-appstream-rpms thunderbird-140.5.0-2.el10_1.ppc64le.rpm 4492eca6a39e55e4a221ce8085153604a3d1f18776437933556cc9765a95f25f