RLSA-2025:21020
Important: sssd security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for sssd.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
* sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-s390x-baseos-rpms
libipa_hbac-2.11.1-2.el10_1.1.s390x.rpm
4deb8d7f72770c1f520781aafe75080ec275b67b4ac995a7c4d991d8579ef51a
libsss_autofs-2.11.1-2.el10_1.1.s390x.rpm
0f11a0c6580a31ed433963a8282ee6187b8adb5bb83c672fc945e5c50a4c75f3
libsss_certmap-2.11.1-2.el10_1.1.s390x.rpm
fd1f59dfbce1d30fcd58f7ed73519c2bbe4abacc207f896ee201f66819d45fb4
libsss_idmap-2.11.1-2.el10_1.1.s390x.rpm
14d7d0246e6b6e623b9c00d6da19a9be5b5e53c12952a4a4e7d7101ffd7afa3e
libsss_nss_idmap-2.11.1-2.el10_1.1.s390x.rpm
5cdc31e23ea28fee77a12a2d40cc73de53f9cc49f14181d9a529de86d7adc829
libsss_sudo-2.11.1-2.el10_1.1.s390x.rpm
980e9e1b1e374e52800a7724712927634a3c7c443bb15db9f05a91c0e00bca86
python3-libipa_hbac-2.11.1-2.el10_1.1.s390x.rpm
1faa4d707e479b35550a3671c1f34c7d852690bb2d7cad15a08638c7f5d13444
python3-libsss_nss_idmap-2.11.1-2.el10_1.1.s390x.rpm
ac2b1b4b8652794db8e1ec33d5d407a49ac08c36ca857ac2800d87e1a4233351
python3-sss-2.11.1-2.el10_1.1.s390x.rpm
29c5974a466b5a8458e7b3b6275f06c3a264631cba630f5942a3a7a0735201ec
python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm
036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825
python3-sss-murmur-2.11.1-2.el10_1.1.s390x.rpm
e5f75ecd06643c818032e3fb7885bfac973234a2236d7d0b38ac2f99998f2823
sssd-2.11.1-2.el10_1.1.s390x.rpm
0d2bead1d66092cc0c715f774b123c98dfd4e59e96db323dd3400795727fbdc9
sssd-ad-2.11.1-2.el10_1.1.s390x.rpm
97d170338159ac72cc9932cc78507f372edbd9bc5ff20e5c168492abb713672c
sssd-client-2.11.1-2.el10_1.1.s390x.rpm
6709bdd4d6d3f45608e9c7ceffc1e50da90481b48efe12e22b0e837371942eb4
sssd-common-2.11.1-2.el10_1.1.s390x.rpm
feae2b7758e18fab95635b3af75fca4ba2cd6dd13ab86fd43ef6271a79942972
sssd-common-pac-2.11.1-2.el10_1.1.s390x.rpm
37bc36d27624bb55c98367e43452f86679133c3a7e8013ad9228a3f93de0c188
sssd-dbus-2.11.1-2.el10_1.1.s390x.rpm
dd8da8a2791ba447997dde70b0493903131665c6e08e46d9f81c846f34550446
sssd-ipa-2.11.1-2.el10_1.1.s390x.rpm
d7993d06996f7f6482fbbf342fbc2597b42229fbdd2ccf4abf7a8dfb501e44a2
sssd-kcm-2.11.1-2.el10_1.1.s390x.rpm
1c6cd681c744cd1a03c7433a122a5e106eb2d80629e87793f5bf1fa71ae2624b
sssd-krb5-2.11.1-2.el10_1.1.s390x.rpm
f5df1b2daa5309db230b9b4555d59a6e0664de80891735a586d9a00307dd09bc
sssd-krb5-common-2.11.1-2.el10_1.1.s390x.rpm
26f1234ee1d9afa7e5d14e12241a4b31d0098e5cb9dfb969b55a3815c458aa17
sssd-ldap-2.11.1-2.el10_1.1.s390x.rpm
924caa072e8fd3a1a2dd977ea2b5b363a95ea1985d4890fde0c345d5534ae3b3
sssd-nfs-idmap-2.11.1-2.el10_1.1.s390x.rpm
85459fa8676112903c2bebc781e9b6ee9d60f7ac3b349e357af1a6664985598e
sssd-passkey-2.11.1-2.el10_1.1.s390x.rpm
c6165a302c6dc5c6965c550cd549ce7553cda1e1c53da4bb9d26e3cc8ce496bf
sssd-proxy-2.11.1-2.el10_1.1.s390x.rpm
9f83f907deafeb32fa473b1dd6c96d78e80199beacef9b06123b980b28a1746a
sssd-tools-2.11.1-2.el10_1.1.s390x.rpm
e04f28bf097823c343c121f89c41caa2355e18ff0892e7bea505267015bc43b8
sssd-winbind-idmap-2.11.1-2.el10_1.1.s390x.rpm
f1b7917c68b21d358765d464cb4f5188b3716e48e1cdbc736c1c4c300f6598db
RLSA-2025:21038
Important: kea security update
Copyright 2025 Rocky Enterprise Software Foundation
Rocky Linux 10.1
1
Important
An update is available for kea.
This update affects Rocky Linux 10.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon.
Security Fix(es):
* kea: Invalid characters cause assert (CVE-2025-11232)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
rocky-linux-10-s390x-baseos-rpms
kea-3.0.1-2.el10_1.s390x.rpm
224f5d4ffed14563aa758aef5346d45a4d2708d34502507698d20cad8d3b0443
kea-libs-3.0.1-2.el10_1.s390x.rpm
ffe36dff80458d2a929537d8b084c13e6992df271fe6b2b2a2db63bfa5e0ef3d