RLSA-2025:20478 Moderate: zziplib security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Moderate An update is available for zziplib. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The zziplib is a lightweight library to easily extract data from zip files. Security Fix(es): * zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c (CVE-2018-17828) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 10 Release Notes linked from the References section. rocky-linux-10-aarch64-appstream-rpms zziplib-0.13.78-2.el10.aarch64.rpm a5c94c61cf10ae637c65d8100d847d223b104a551e1785dff946626bdf40a39e zziplib-utils-0.13.78-2.el10.aarch64.rpm 9eb2f8f24ed506a762fdc0ade5e4e1f5c9b7ee7df4e48dda54cb88c09d062044 RLSA-2025:21002 Important: squid security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for squid. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Squid is a high-performance proxy caching server for web clients, supporting FTP, and HTTP data objects. Security Fix(es): * squid-cache: Squid vulnerable to information disclosure via authentication credential leakage in error handling (CVE-2025-62168) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms squid-6.10-6.el10_1.1.aarch64.rpm 964726875480bf40cbeb44a6a43cbf6fce34acff4940ad1745f394e341db8b05 RLSA-2025:20994 Important: ipa security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for ipa. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. Security Fix(es): * FreeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-7493) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms ipa-client-4.12.2-24.el10_1.1.aarch64.rpm 9411d624dace98b7a1b3289f847b73712220642596ecdd7bcec9484732d27d33 ipa-client-common-4.12.2-24.el10_1.1.noarch.rpm 1ed48f9ea27e3d51c6938f8e04aa918e384c4163a7cfb53d1b4afa22cf261bd1 ipa-client-encrypted-dns-4.12.2-24.el10_1.1.aarch64.rpm e4d31880f78037ca3082443c5d072499039137433833a8c36c27f571e07ac1b4 ipa-client-epn-4.12.2-24.el10_1.1.aarch64.rpm f520b9b640d9adb4b00d8865f54b8e2045dae180969de72f7d1b9223c5e8fae8 ipa-client-samba-4.12.2-24.el10_1.1.aarch64.rpm 2bd73688be882bd4bdc835f370172e80847b52127cdce0007f8da90599923a3e ipa-common-4.12.2-24.el10_1.1.noarch.rpm c1b9d1f2220bf3eb358abd8e95f7790745255ec3f3b399abaf7aad2953c0e5eb ipa-selinux-4.12.2-24.el10_1.1.noarch.rpm 75744bb5b01ef62b6915e55785bd42a945b325ddb7f123f0a11777702a42f904 ipa-selinux-luna-4.12.2-24.el10_1.1.noarch.rpm 5093abf0e161cee519dc8d2a71d8ede28a212cab1c0cba7f4681439fe58bbc1a ipa-selinux-nfast-4.12.2-24.el10_1.1.noarch.rpm 47ba228ca00a37cc15ccf6a9c4652a6fca96634201e65eb95a4cb354e38eb33c ipa-server-4.12.2-24.el10_1.1.aarch64.rpm 423c13b6e78e69cf4369468cfdc6cc284bba2f456182b7ac5ea666df432d8637 ipa-server-common-4.12.2-24.el10_1.1.noarch.rpm d51abb9a704469c8fcfc1b2a1b4ddb7c26c16a2435b35a61d62cefb5aeebd594 ipa-server-dns-4.12.2-24.el10_1.1.noarch.rpm 1c1d5b78f31b2f73883906d472f58a8ea5e8a54a3a1bbc3cfc84b44f3f514b8c ipa-server-encrypted-dns-4.12.2-24.el10_1.1.aarch64.rpm 59e907f42a11185a8aee72aa07c02345767b57df64b4e56d50a51a9b604bf7c6 ipa-server-trust-ad-4.12.2-24.el10_1.1.aarch64.rpm 61133c1243f672c0c873d46221257f4b99629f4921435b2ce765afeffc83b7f5 python3-ipaclient-4.12.2-24.el10_1.1.noarch.rpm fb3029b088891bad80443ccc23f16928d47e9ed109d7081e2bcb4ef7f6bee08d python3-ipalib-4.12.2-24.el10_1.1.noarch.rpm d0443950c78b0bd4142c09462e1f2bcacabd02835e3afb176e71bd02b62ad86b python3-ipaserver-4.12.2-24.el10_1.1.noarch.rpm 0bd398d681243e4de7c442df874a15304a0cf695e5736b5040399a851b644bf4 RLSA-2025:21020 Important: sssd security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for sssd. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources. Security Fix(es): * sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems (CVE-2025-11561) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms sssd-idp-2.11.1-2.el10_1.1.aarch64.rpm 76e50605e87a34b3078940d9df98c7615bd3921ba3ec017d45189f6af968e860 RLSA-2025:21032 Important: libsoup3 security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for libsoup3. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Libsoup is an HTTP library implementation in C. It was originally part of a SOAP (Simple Object Access Protocol) implementation called Soup, but the SOAP and non-SOAP parts have now been split into separate packages. libsoup uses the Glib main loop and is designed to work well with GTK applications. This enables GNOME applications to access HTTP servers on the network in a completely asynchronous fashion, very similar to the Gtk+ programming model (a synchronous operation mode is also supported for those who want it), but the SOAP parts were removed long ago. Security Fix(es): * libsoup: Integer Overflow in Cookie Expiration Date Handling in libsoup (CVE-2025-4945) * libsoup: Out-of-Bounds Read in Cookie Date Handling of libsoup HTTP Library (CVE-2025-11021) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms libsoup3-3.6.5-3.el10_1.6.aarch64.rpm afbe9a982f4626bc84763baedc63e5b29cf8b5a1c0cb61e6d6b80da8b5a71d47 libsoup3-devel-3.6.5-3.el10_1.6.aarch64.rpm dc47d85945942bf373f5883ee68ca00653da40fc3daac9c95846f3d44d1fc895 RLSA-2025:21037 Important: qt6-qtsvg security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for qt6-qtsvg. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Scalable Vector Graphics (SVG) is an XML-based language for describing two-dimensional vector graphics. Qt provides classes for rendering and displaying SVG drawings in widgets and on other paint devices. Security Fix(es): * qtsvg: Use-after-free vulnerability in Qt SVG (CVE-2025-10729) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms qt6-qtsvg-6.9.1-2.el10_1.1.aarch64.rpm 3ff2cb179c9f265a18f26ab20419e4c5a4fd9b87ccc0287cc5c3a4d823c2aaf0 qt6-qtsvg-devel-6.9.1-2.el10_1.1.aarch64.rpm 501c481eebe8f09b23f581fa7044a4e8a638305ab1588457d10731aefaa4b030 RLSA-2025:21034 Important: bind security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for bind. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * bind: Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) * bind: Cache poisoning due to weak PRNG (CVE-2025-40780) * bind: Resource exhaustion via malformed DNSKEY handling (CVE-2025-8677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms bind-9.18.33-10.el10_1.2.aarch64.rpm 9a2a1d6c52f5d3d9b95dcf5dd958d2582d035e2f5b12cffdf9ebaf703a75c3c9 bind-chroot-9.18.33-10.el10_1.2.aarch64.rpm c33b71ed4823271bfbef945c34209584b4b90cd839cef1050f815c5f50a83fab bind-dnssec-utils-9.18.33-10.el10_1.2.aarch64.rpm c2894d3c9d13f6a54469ca0bc7526ee8724f4f07e49eaafbe67b8250c52d7a85 bind-libs-9.18.33-10.el10_1.2.aarch64.rpm 5add201e2e5ed33099f655fdd378449c7475cf8e8057e414601a4e9ea1d0b8f2 bind-license-9.18.33-10.el10_1.2.noarch.rpm 2c9c63219d146ae32dc4bc03c04bf15a22ceef7fa40fdd33bd8865eac1c33a16 bind-utils-9.18.33-10.el10_1.2.aarch64.rpm 74e1400c6aaee4661ca91c87a9b4ce3ab8fa13dbdb1f354d59fdfff7c3d260d2 RLSA-2025:21038 Important: kea security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for kea. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list DHCP implementation from Internet Systems Consortium, Inc. that features fully functional DHCPv4, DHCPv6 and Dynamic DNS servers. Both DHCP servers fully support server discovery, address assignment, renewal, rebinding and release. The DHCPv6 server supports prefix delegation. Both servers support DNS Update mechanism, using stand-alone DDNS daemon. Security Fix(es): * kea: Invalid characters cause assert (CVE-2025-11232) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms kea-doc-3.0.1-2.el10_1.noarch.rpm 2e06ffd8b769f6354fddbed1c50c648c01d8cae0b1f15327c9ece578f5a48525 kea-hooks-3.0.1-2.el10_1.aarch64.rpm 6d9b86e4062a7cf786c6451d3607d14cc62ce1e77de4787b8766219c4939eb60 RLSA-2025:21142 Important: python-kdcproxy security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for python-kdcproxy. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Security Fix(es): * python-kdcproxy: Unauthenticated SSRF via Realm?Controlled DNS SRV (CVE-2025-59088) * python-kdcproxy: Remote DoS via unbounded TCP upstream buffering (CVE-2025-59089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms python3-kdcproxy-1.0.0-19.el10_1.noarch.rpm 92ae0a11b605fc8a2757c1ea35a49218ca517b019c9804e8a23375aa7aec3b5f RLSA-2025:21220 Important: podman security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for podman. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The podman tool manages pods, container images, and containers. It is part of the libpod library, which is for applications that use container pods. Container pods is a concept in Kubernetes. Security Fix(es): * runc: container escape and denial of service due to arbitrary write gadgets and procfs write redirects (CVE-2025-52881) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms podman-5.6.0-6.el10_1.aarch64.rpm 96e064880f0b1668975c0acc48fac3e2dc6575d003732f6ca42571218b08cef6 podman-docker-5.6.0-6.el10_1.noarch.rpm 6db94e38c5be0caccf548d216622fd7c72e5d8298bdcadd0ce06fcb54934dcdf podman-remote-5.6.0-6.el10_1.aarch64.rpm f7b63269cf30ba5784b142de1b8076f35a579d8a7afd63e2fed66fe13c0a6f9a RLSA-2025:21281 Important: firefox security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for firefox. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms firefox-140.5.0-2.el10_1.aarch64.rpm d71f0851e7dedf3e96757534aef318d45ca8f9a48dc69cd5da9467926af5c751 RLSA-2025:21843 Important: thunderbird security update Copyright 2025 Rocky Enterprise Software Foundation Rocky Linux 10.1 1 Important An update is available for thunderbird. This update affects Rocky Linux 10. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018) * firefox: Use-after-free in the Audio/Video component (CVE-2025-13014) * firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016) * firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019) * firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020) * firefox: Race condition in the Graphics component (CVE-2025-13012) * firefox: Spoofing issue in Firefox (CVE-2025-13015) * firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013) * firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-10-aarch64-appstream-rpms thunderbird-140.5.0-2.el10_1.aarch64.rpm d57b23712cae585fd2a622871bf7a276f8c193cf17ce16a326a30f23c659de59