- Issued:
- 2025-11-11
- Updated:
- 2025-11-11
RHEA-2025:20348 - Product Enhancement Advisory
Synopsis
rhel-system-roles bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Lightspeed patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for rhel-system-roles is now available for Red Hat Enterprise Linux 10.
Description
For detailed information on changes in this release, see the Red Hat Enterprise Linux 10 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 10 x86_64
- Red Hat Enterprise Linux for IBM z Systems 10 s390x
- Red Hat Enterprise Linux for Power, little endian 10 ppc64le
- Red Hat Enterprise Linux for ARM 64 10 aarch64
Fixes
- RHEL-46224 - [RFE] rhel_system_roles.ha_cluster - export pcsd and OS configuration
- RHEL-81918 - ha_cluster: 404 on removing qnetd certificate on rhel9.4 client vm
- RHEL-88249 - fix: restart qdevice when its certificates have been regenerated
- RHEL-88297 - fix: add default seccomp filters for el9/10
- RHEL-88312 - Introduced option to skip package installation
- RHEL-89118 - [storage] LVM grow_to_fill feature doesn't work with latest blivet
- RHEL-90078 - rhel_system_roles.ha_cluster - adapt node attributes and node utilization tests to new pcs
- RHEL-71246 - [RHEL10 storage role] 'DiskDevice' object has no attribute 'free_space'
- RHEL-94046 - ansible-core and rhel-system-roles incompatible
- RHEL-93294 - fix: Set the kernel command line selinux parameter correctly when changing selinux state
- RHEL-99087 - feat: control sssd domain/realm section name to use; merge settings into chosen name
- RHEL-95846 - feat: Add support for SystemKeepFree journald.conf option
- RHEL-95883 - fix: Fix getting PVs from raid_disks for RAID LVs
- RHEL-101676 - fix: Fix removing kernel options with values
- RHEL-46225 - [RFE] rhel_system_roles.ha_cluster - export resources configuration
- RHEL-102635 - feat: Add MaxRetention configuration
- RHEL-103887 - fix: configure postfix to listen only to IPv4 if IPv6 is disabled
- RHEL-103573 - fix: tempdir path not defined in check mode; __selinux_item.path may be undefined
- RHEL-95729 - [RHEL10] Incorrect key file in crypttab entry for volume encrypted_vol
- RHEL-105093 - specifying multiple users causes resources to be associated with wrong user
- RHEL-95757 - Improve error reporting when invalid or unsupported RAID configuration is given
- RHEL-101724 - [RFE] Allow defining enabled PCP PMDAs with the metrics role
- RHEL-107047 - fix: New configuration option in RHEL 10
- RHEL-107013 - fix: boolean values and null values are not allowed
CVEs
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Enterprise Linux for x86_64 10
| SRPM | |
|---|---|
| rhel-system-roles-1.108.6-0.1.el10.src.rpm | SHA-256: 837683d1ccbc165b5f523a7c78cb320de704fceecbbfe8d30d3639473cfc1e60 |
| x86_64 | |
| rhel-system-roles-1.108.6-0.1.el10.noarch.rpm | SHA-256: e19ebe1fb4f6ebb1e1c2a56296a6f26031e443242975d4d265522ef56a3402cf |
Red Hat Enterprise Linux for IBM z Systems 10
| SRPM | |
|---|---|
| rhel-system-roles-1.108.6-0.1.el10.src.rpm | SHA-256: 837683d1ccbc165b5f523a7c78cb320de704fceecbbfe8d30d3639473cfc1e60 |
| s390x | |
| rhel-system-roles-1.108.6-0.1.el10.noarch.rpm | SHA-256: e19ebe1fb4f6ebb1e1c2a56296a6f26031e443242975d4d265522ef56a3402cf |
Red Hat Enterprise Linux for Power, little endian 10
| SRPM | |
|---|---|
| rhel-system-roles-1.108.6-0.1.el10.src.rpm | SHA-256: 837683d1ccbc165b5f523a7c78cb320de704fceecbbfe8d30d3639473cfc1e60 |
| ppc64le | |
| rhel-system-roles-1.108.6-0.1.el10.noarch.rpm | SHA-256: e19ebe1fb4f6ebb1e1c2a56296a6f26031e443242975d4d265522ef56a3402cf |
Red Hat Enterprise Linux for ARM 64 10
| SRPM | |
|---|---|
| rhel-system-roles-1.108.6-0.1.el10.src.rpm | SHA-256: 837683d1ccbc165b5f523a7c78cb320de704fceecbbfe8d30d3639473cfc1e60 |
| aarch64 | |
| rhel-system-roles-1.108.6-0.1.el10.noarch.rpm | SHA-256: e19ebe1fb4f6ebb1e1c2a56296a6f26031e443242975d4d265522ef56a3402cf |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.