RLSA-2025:21020 Important: sssd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for sssd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-x86-64-baseos-rpms libipa_hbac-2.11.1-2.el10_1.1.x86_64.rpm bad001a146f46c9dc8fe08f10792926a1e21b1d32c7e996ceeafa6f92847852e libsss_autofs-2.11.1-2.el10_1.1.x86_64.rpm 2ec7e9a487815c69574d06cf2ee07b19f4fa191c094ed19997b421c434815dde libsss_certmap-2.11.1-2.el10_1.1.x86_64.rpm 54eac306740f3c78836c127e86fa555d35b489f2b76c45c9679ce4f9267d4989 libsss_idmap-2.11.1-2.el10_1.1.x86_64.rpm f8d94fb2d62bd3001a2046f82e8f005c533a86f74b75af4ad527bbe5be5e6003 libsss_nss_idmap-2.11.1-2.el10_1.1.x86_64.rpm 04d33462dd10d608a88cc43c37eefc3d5f379b4ef7d974fae11a6305c0cf4c05 libsss_sudo-2.11.1-2.el10_1.1.x86_64.rpm 37542fb9b44177f308ab3fb81ba50a02b69ed545076bf874dc195561ce15e444 python3-libipa_hbac-2.11.1-2.el10_1.1.x86_64.rpm bf2426a3db93e0f42bcee926799138f821110cc4d8edf8a8b0274b593ab49da7 python3-libsss_nss_idmap-2.11.1-2.el10_1.1.x86_64.rpm 20e8c6b131f9167a69e170129ef17aca288a6c55452f2888c1e5092efb89c64a python3-sss-2.11.1-2.el10_1.1.x86_64.rpm 151dd9683e8d4a72d5465ace307186c0a341123caf70a2c9ec644eb538afd148 python3-sssdconfig-2.11.1-2.el10_1.1.noarch.rpm 036504dffa0918523b3b78d455c0d71feed0cdb451db730df99b6355a3b0c825 python3-sss-murmur-2.11.1-2.el10_1.1.x86_64.rpm 556d1171a17888ee476be668912994cb3b814707b9debc5f4841cd877873b932 sssd-2.11.1-2.el10_1.1.x86_64.rpm 32ca5cf0b49d9b039442b15112407cfa31a256783f6edbb0e8e86e864b8e480d sssd-ad-2.11.1-2.el10_1.1.x86_64.rpm 9f364b807b641ed843dd09bc94c3b3aadb53022301741c15c73c7425aaecc1e8 sssd-client-2.11.1-2.el10_1.1.x86_64.rpm 3da0afdb004952939789b2210e748427314fc81317e5635d170350e447b644fa sssd-common-2.11.1-2.el10_1.1.x86_64.rpm 6d44acd9118801009c5c8518e3d4c7c6d803e95c6df7c327d07077e91846f67d sssd-common-pac-2.11.1-2.el10_1.1.x86_64.rpm f369f2c8a9615cc10ee483cfae94a7303552ddf994ccb8e31cdb398e971d7858 sssd-dbus-2.11.1-2.el10_1.1.x86_64.rpm e08ef54e631b00dfa2df1da0b9829b2292a5bacae488999fefbb25fadf99fce6 sssd-ipa-2.11.1-2.el10_1.1.x86_64.rpm fb92e039ddaf20794ab899b6548cba92ad8ddf780cd2cc6e3b9d6442350b2146 sssd-kcm-2.11.1-2.el10_1.1.x86_64.rpm 5e9173ba3870ba74df9882d25d5bfb0de981abb0729be856250e1ae1ca8f4fb0 sssd-krb5-2.11.1-2.el10_1.1.x86_64.rpm 477de127d125bb4c3837aa7d98d9df1e9b49b12914b3230c92e6a014f3bebc7f sssd-krb5-common-2.11.1-2.el10_1.1.x86_64.rpm f602fa53e2d3a4b6a2cb9d601b083d78d52c888ce712be1e52e441c398eb3d05 sssd-ldap-2.11.1-2.el10_1.1.x86_64.rpm 74e7662fe637e4793fa40a66046234fcddb8887a1bf2e2595526899d4202c12e sssd-nfs-idmap-2.11.1-2.el10_1.1.x86_64.rpm ee908eb3aa05068d151c0354ea67fe3b78a6a52d23d653167bc2a573ab6f466c sssd-passkey-2.11.1-2.el10_1.1.x86_64.rpm c7b90178c33b98029e1932b5d6607e87b1955e8e0876be4b56e27beb29066db6 sssd-proxy-2.11.1-2.el10_1.1.x86_64.rpm f468f2c7e8a5c91374d378eb0c0d3e1b5bcb8434e0edd4681dcf21305e257ab8 sssd-tools-2.11.1-2.el10_1.1.x86_64.rpm a526fd4ab76319a529be5bba801ac0cee6023676586c7da8efed17ee5b13f7e4 sssd-winbind-idmap-2.11.1-2.el10_1.1.x86_64.rpm f801e7133fce40a14849206d73aedb527048d7f093dd6736d40e563525f7340f RLSA-2025:21038 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Invalid characters cause assert (CVE-2025-11232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-x86-64-baseos-rpms kea-3.0.1-2.el10_1.x86_64.rpm b5f4e651c4525c608aae80acc54d49f46370ead7f521035d1ddce8b30f8a9ac9 kea-libs-3.0.1-2.el10_1.x86_64.rpm 80fd323f41516ab4e4dc0941e4f57d782fa8b0bddbf30073fa63f43684b9244a