RLBA-2022:8321 tuned bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. none-nfv-rpms tuned-profiles-nfv-2.19.0-1.el9.noarch.rpm 3ecae7bb81855cbfde7b8bc61d7018728daa12b6f260f72a4cfbafc3c742cdb2 tuned-profiles-nfv-guest-2.19.0-1.el9.noarch.rpm ea7e4c351656b476345596fd2e439bbd8e7a37671a8f0b28782df60b4f9fd61d tuned-profiles-nfv-host-2.19.0-1.el9.noarch.rpm 86cf21b89db1f3afe156b2d4a9ad0cf0a4123f47748dfd320544dbe671652e6e tuned-profiles-realtime-2.19.0-1.el9.noarch.rpm fb0dbba6e33e15cead237638bb3ba2217f1f97dad6d226fbf28ddc5b6f256016 RLSA-2023:0300 Important: kernel-rt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863) * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z1 Batch (BZ#2141817) none-nfv-rpms kernel-rt-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm a7e1f3a73355138f0b833a118d6b89658f74d299cfa39c77f8a259395a7330c3 kernel-rt-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 5b68b98ea60d1532352676df69dd5f01bb4091a19159f80b4987be94ad3f9d5e kernel-rt-debug-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm b3a01fa3e91d415b63e0da93758d281b8f25a549dc982bb9cad82a17be557220 kernel-rt-debug-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 46b42686c27706db3766e029fe5b849642652dd85ca7f4c7e8ccffb8ee5ad4c4 kernel-rt-debug-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 3f1d53fb45a4edb3c5a2ae633202b7d9637faa9fb0c6d6cc8f4247124264c836 kernel-rt-debug-kvm-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm ec4beff42c43ffadd5ce03dc91887ae6f758a0544a6c19cceb92fe07792d3ec0 kernel-rt-debug-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 1090f4e8d8356909d3e656f774eb05ac4b44af0bc3e9bb37ed084eb42bd15f79 kernel-rt-debug-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 9988382bde8954cac0c0b91da17ce38b528b25465fb25b642aa9a029fd577d49 kernel-rt-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 1c5864022ae27f7f2f238959bbf5eb754d939c3064c782c20e02325a514c68c5 kernel-rt-kvm-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 54d9f42d4f2158df3bd3f8f490d8aae6da119aa2788c1df95a76558a77e0a723 kernel-rt-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm c8fcbfdcf00d9e0b594bb22083bcfea58004e2009c316e66b776657e9bd58831 kernel-rt-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm faa845cb72002e6899eee20b282e5859dfb66fd9180e99f0287e3a39a914bb30 RLBA-2022:7934 rteval bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. none-nfv-rpms rteval-3.4-1.el9.noarch.rpm 779ef99730b0722c8085dd7bfeb5caa7c3fc469c860fe8070cc6f73ba2ae964c RLBA-2022:7936 realtime-setup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. none-nfv-rpms realtime-setup-2.2-6.el9.x86_64.rpm 09d1e8c58237d226f48dcd7ea1859255908739b2bd44891cb9c2200a7737ac18 RLBA-2022:4000 new packages: tuned Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. none-nfv-rpms tuned-profiles-nfv-2.18.0-1.el9.noarch.rpm b3cc859b133c7a3e074d8dbaa1b1af996724b0507f6393b022649e2d33123462 tuned-profiles-nfv-guest-2.18.0-1.el9.noarch.rpm 258b675b95d50f76b9782e9d09f43d8c9057400499de2ad83408a49244a0cd08 tuned-profiles-nfv-host-2.18.0-1.el9.noarch.rpm 40899c41dbc37fb69e837d8e34a9b768f067de825d8c4fcb332506670b5473c2 tuned-profiles-realtime-2.18.0-1.el9.noarch.rpm ed91e68f132251d7141dc5bfc1e2dce751baa2c78e5bdc056f5bb94c87a0c243 RLBA-2022:7939 rteval-loads bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval-loads. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. none-nfv-rpms rteval-loads-1.6-1.el9.noarch.rpm d90521c5eadf3f090373ef007bc30c919b714cf597c400efd189542cc7de73bb RLBA-2022:2289 new packages: rteval Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. none-nfv-rpms rteval-3.3-4.el9_0.noarch.rpm 019729970d7bac6e9b27d4ff0ef6c06cafce8fb43a87d71ea684d81b00c55de0 RLSA-2022:7319 Important: kernel-rt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585) * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Update RT source tree to the latest Rocky Linux-9.0.z4 Batch (BZ#2123498) none-nfv-rpms kernel-rt-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 1570608c147f1bceb30c12dd70e1bed9986a9771583b13abc7dee921e7e321b3 kernel-rt-core-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 94f9765002871587cca51495c1807768f1d234a29c66990956100da4e383bfc5 kernel-rt-debug-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 9a99253366eb8a45a022e8083f6808c7ab4c0de9ecb8e395e236dedd226b6c9b kernel-rt-debug-core-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 9df5272ef01d3ffe7d928bf002166b87675d6f0615403e2953e32349e1ca9349 kernel-rt-debug-devel-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 6c6524ca49db45ea02ff061d078fbd347016287c4836586c3f8a6a8887ba8c66 kernel-rt-debug-kvm-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 0e33d3b68db075b4b4c176f2666a7a007d4f1ce19341a29a961fcfcd03f3b1f7 kernel-rt-debug-modules-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 9019fce735ca80632f4a2d67bbb38b7107d6e274f38ce95dd1c48294e5c32c1e kernel-rt-debug-modules-extra-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 29ad53dabb2a64afecd622ede67d40dbb923af53cd25ba74feec37499879ecd9 kernel-rt-devel-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 76db4e4e8a1adb606c23a2d2b11b2d9d78dbc94065190c04f99edaeeccd0ecc0 kernel-rt-kvm-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 577d20af797b1bb84537a50f78d88c9190394b072a249144a86baaa660e82986 kernel-rt-modules-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm b22cdb879491b78106f353d901e84198a7230517a9f1bc48b43fd4f35d513cc7 kernel-rt-modules-extra-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm 8d1a0adcd9f9957f835b585877859b64d40456bea25a02861633f8498173c163 RLBA-2022:2295 new packages: realtime-setup Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. none-nfv-rpms realtime-setup-2.2-5.el9.x86_64.rpm 493ce016ae51a35e2c801ee946b7f1a3d50cf12400b5331464bcda19c90d7e93 RLBA-2022:2296 new packages: rteval-loads Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval-loads. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section. none-nfv-rpms rteval-loads-1.5-1.el9.noarch.rpm 5cee27bbfdba57b9dab2488c3dd4e6d11bc7fe811e8b52b5d5d19b04fe0554d1 RLSA-2023:0979 Important: kernel-rt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463) none-nfv-rpms kernel-rt-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 7b3306e40d0eb276b81736e5b4d0a090b32e7428669108e3a9b5e9e6aaad5464 kernel-rt-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm d982083ee4ad4d679065f00f97454fe4d98fa099b0c48fe7b43f336383a843f1 kernel-rt-debug-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 604d8762e724e8a645b855749d0e0e9356fece859c97bf6465dfb24c4bc2ef00 kernel-rt-debug-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 2bae5de2733341e8ae12f4f0ee969fac2d108d977898196276c97acef486a544 kernel-rt-debug-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 0659314a6f21c051ddc70aaac21c744c84bbd3ee79324d9cd8f63d68b43a90d1 kernel-rt-debug-kvm-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm d36e8f2d118d803b571207e3354f2ecbbe1be262943615f87cab8ccfa205b1ec kernel-rt-debug-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 7a2333a7b531b60da3f5bccf06897798f67f859911183f627c994ca49d0d74f0 kernel-rt-debug-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm c3011279e4e4898e4cfc91e5c0dda8b355f934a49d40275bd757e97faa2c87e8 kernel-rt-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 2a65d0b572d8b1c5d785424854a314aa0106e65d52e57f327be144ceb1fb955c kernel-rt-kvm-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm eb384f7c5b48aa33121ce2715ff3993ea7f926c65cb3eb4f7ec41c362ae05e1e kernel-rt-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm c785118454a0725cad5b48f0163e8f67e6015d1fe8b75d4ee0000473779c8810 kernel-rt-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 1f580e31f2eabb98c9c86eaa7afd295e34d4c2b9ae448672fb17633b7bac9cfa RLSA-2023:1469 Important: kernel-rt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460) none-nfv-rpms kernel-rt-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 568dd09bab56394023fe0306b75bd37ea022a6d953d67a0a684d0e3c09a062eb kernel-rt-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm dfabf38ea0e692f2e9e79032718f856947f6c79322302ba7b3e71da432b89a43 kernel-rt-debug-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm e1262ce076bfef2e64439348d0994b007be9dca1826f412e41ef1ae0ad9a65be kernel-rt-debug-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 68994eab42c1b61e40fb586c0db25b9e1e0120c20ef4cda336eed835530e3750 kernel-rt-debug-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm feeb3cbbbb86b394efd4f1c725cf5196c615e5d95da7d65ac35df62e428f9c09 kernel-rt-debug-kvm-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 6e915ef0375935ddbb6a22d786520dc3ade628dffaefba0f69a7ad163d4dbc57 kernel-rt-debug-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 16b5584dc7bfa322f30bb2365392e97001f24356dd5550f329c994c5e13157d4 kernel-rt-debug-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 7ee7488f2e287486a29fef3c09b5ee84f602f58a61cea14ced64f4c07483bb99 kernel-rt-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 557f3f925cb9019b8d559ef7d0c76d910b62d338d424a57306781e6985118e7d kernel-rt-kvm-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 17c5d4216b724aec4fcb1b6dd52ff60045cbfd1ad7371c67f12a676c2e6bda11 kernel-rt-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 2825674e7d7e26a5e1d90766a5094258be1f1cfb5e3ff2360f0786df2c25c919 kernel-rt-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 5df494c468c21ba95a1e5d4330dfcf63dbcbb2d36f140cba6541b812c3f7ab5b RLSA-2023:4378 Important: kernel-rt security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: KVM: x86/mmu: race condition in direct_page_fault() (CVE-2022-45869) * kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c (CVE-2023-0458) * kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux9 rt: blktests block/024 failed (BZ#2209920) * Backport pinned timers RT specific behavior for FIFO tasks (BZ#2210071) * kernel-rt: update RT source tree to the Rocky Linux-9.2z2 source tree (BZ#2215122) * kernel-rt: update RT source tree to the Rocky Linux-9.2z2b source tree (BZ#2222796) none-nfv-rpms kernel-rt-debug-modules-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 07e68a8d61796b63fa3a08eca1b8568a1db32ab531f5e50c9e6ab5b78371dff2 kernel-rt-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm d5d3e0ee745dfcbb9dbc6a773cfafbfd49c4e4c06db98f3b1cc381bffe7b5547 kernel-rt-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 5f413a505a29ea03c4792323b3c27ac9fbafdfd0b1e2669909109b64b76c8660 kernel-rt-debug-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm a0c3bb9c922ec87c324c4df02011fabb0b8eaf2b8b4a324073c27d5fe278ab36 kernel-rt-debug-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 8779a970a4895eac8324a6af97baa666e9d65db219632a3bc390017e03317bd0 kernel-rt-debug-devel-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 0984051db85dcd3f4d9f079cf27fcbec7c44c9058880bde94d32ada3dc352243 kernel-rt-debug-kvm-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm a137f7f47e4ddcc4d0774f13232f35ff83e8f1af63df82141f95b0abb8fd4976 kernel-rt-debug-modules-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 68e66d8eb309b91153bbbbbef50355d764a918699f3ab8d54036f1bb7558e7b8 kernel-rt-debug-modules-extra-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 1a0ca2666a8da6628db0d92f25a4a15e38c4c4550ca1fc7b1360b3c14203a4fe kernel-rt-devel-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 29942eecd8c51d51404ef8b5da0374f4eaaa48cd7e3768aea3b3a540a1bd8e05 kernel-rt-kvm-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm bea8b249eba43de55166ae5b3966626a657ca3d6c5062ea9d3e8d72e009ceaf6 kernel-rt-modules-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm e0715d8df24665fba635bb39c814e94e065d3cabdff39ee50a1eb060cb62d028 kernel-rt-modules-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm 34d09150036730776d065f2d8ca52183df1499d4f22388d6c638b335ec00c3d7 kernel-rt-modules-extra-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm fc759ca2882b77c70138837d16791c0c4c023136c041173400214819488c57fa RLBA-2023:2149 rteval bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. none-nfv-rpms rteval-3.5-7.el9.noarch.rpm 04313b632c9cadc83f364224fade45c1340ef4995001f1f943d2be4b1ec5819f RLBA-2024:2111 rteval bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. none-nfv-rpms rteval-3.7-7.el9.noarch.rpm 18d4e61ed3779f3bd43d908cd4e6619ee94ca8b8acd15d1e69e6f27ef97c47e5 RLSA-2024:2758 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240) * CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743) Bug Fix(es): * ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009) * mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235) * [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673) * system hangs completely - NMI not possible (JIRA:Rocky Linux-30678) * ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110) none-nfv-rpms kernel-rt-5.14.0-427.16.1.el9_4.x86_64.rpm 70d80881dded2b5c0c29b2e275198e56d7d90778a29d6e8e80c3a1f9d49baa78 kernel-rt-core-5.14.0-427.16.1.el9_4.x86_64.rpm 4d3229f8d3cda4d33fdca9db011aecb1d98188cfff90c67c3033b24583476944 kernel-rt-debug-5.14.0-427.16.1.el9_4.x86_64.rpm 4e359e17e5c1504dd9b3636da82becf748bb9547a4337ed965ba34d89f2ef516 kernel-rt-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm 6f6ed98c2a4d659ecdf3828b67596bc25738554244eecaa46be4e6eb919fd335 kernel-rt-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm 7e654bdc342f15d6b2d2010b9b7cbf4f518f7dfbdfecf676a817a1cfe9e01120 kernel-rt-debug-kvm-5.14.0-427.16.1.el9_4.x86_64.rpm f7f1a45840605248b5b88d330bff2980efe26e099d281124a1f1c240b05d524c kernel-rt-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm d3a47c7ea53e2f560bd4edff5197731dbd09f5b06044e82ccb88a7f0b8544bde kernel-rt-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm 222c5f116b1d0ffd47ca4ed99cb52d3f25627d0f65a9d795413de86ebce3cd57 kernel-rt-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm c5052c437baec8ccf49155185727ef2e31a44da27c02d685a18aa42459cdd3fb kernel-rt-devel-5.14.0-427.16.1.el9_4.x86_64.rpm 34a2d319e68ce70e54bc4466c59604838c32ca2350ce2a5fc9afbdb0e1f6cfab kernel-rt-kvm-5.14.0-427.16.1.el9_4.x86_64.rpm 0fba96c874efc3d651bf8979545c5229de8f93482a6078c3012eb5376abe4091 kernel-rt-modules-5.14.0-427.16.1.el9_4.x86_64.rpm d29393987377e172a291c42585d37a322efa398bcccf6becc18a9a11a617ec3c kernel-rt-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm 67e01bf2fbb18eccb8074dc1f56b414b9b474be3cb5a0ae9954020bfe71ced46 kernel-rt-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm 94e8a947c96bdbe305e9a2cb815e0e3b6c9ae777872a0f1c26ab4313d7115c0c RLSA-2025:15011 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823) * kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200) * kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211) * kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350) * kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464) * kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461) * kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.39.1.el9_6.x86_64.rpm 4114f16336f06e2579257afd1068497ce86f9037a537175e45c4640bbdd7dab3 kernel-rt-core-5.14.0-570.39.1.el9_6.x86_64.rpm f20ae937819251c8dcdf1fd645ce7bad5b4a0443ecb5cf6d6093c7197bc09025 kernel-rt-debug-5.14.0-570.39.1.el9_6.x86_64.rpm 94580ad1f752c102c5603920e01da71798bd3b80a39569a665487db9a26800b5 kernel-rt-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm d26672ea5b5a353792513c20193e16d46e86dbb6932b30a29a13a0dafee86e71 kernel-rt-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm 447eff72bd37253399f07997cca075799d068f90fa6c6b309dfd8efb02ed9266 kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6.x86_64.rpm ab1360b1fb0eb8fdd2273965bd2d7a8df8b706cced66dee6ac2cd246ba65153f kernel-rt-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm 4c0aece14389c8fb7cbcc40811a8bed03dd1295f235da7b93bedfa2f85390b66 kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm 8f39f412ab7280dadefac979d10f579d253afdb26254d1082b50bea4ff5b81c4 kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm a8d1b2e19fc70704d7bcd7070b909bc45f144a908833843ebdcf6a1aab90861f kernel-rt-devel-5.14.0-570.39.1.el9_6.x86_64.rpm 4f5d5bedf5b9d5a0858937c25e1bf65592a6e40adf34119a6a2f7d9c0ec1d2a6 kernel-rt-kvm-5.14.0-570.39.1.el9_6.x86_64.rpm 098122ab274648a5b49afa3b456994610b3a48c3eceed0239aa40d20f36d2164 kernel-rt-modules-5.14.0-570.39.1.el9_6.x86_64.rpm a19e5f8b7f2bc5d45d228528d6302b2bca2b669bad84adb6ac3b75aca09a9a50 kernel-rt-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm 96eb4b43eaeeec6a160308eefad3a4adf6e591d30b163d5025f347869b886384 kernel-rt-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm 15edf65baa612a806cd09241a3f5a776fe08df82e50b5322e59bb146b12d27dc RLSA-2024:3619 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735) * kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.20.1.el9_4.x86_64.rpm d92231ce316aeb6bdf33786809b6bcecfe8c3699a2a45be24845e72b17e62390 kernel-rt-core-5.14.0-427.20.1.el9_4.x86_64.rpm 90be14197200f67342e8a922cc648f98e879d5534644d620c4f3eb09bbbd063a kernel-rt-debug-5.14.0-427.20.1.el9_4.x86_64.rpm 0b52e1dd9e8ae3bd2f22e7d91c32363beac455ecf9c9d9b58cb94407c9e6f88f kernel-rt-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm 9d9eb3ae53f5600a27d9ffbf7ff96a085a754432afbc9adc844986e5c171e0a0 kernel-rt-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm c755d28b0edff995e62a5c512d669bad1f1357767d7d4e125069648520424610 kernel-rt-debug-kvm-5.14.0-427.20.1.el9_4.x86_64.rpm c30d6df09146b16d844a5a44bfc1c8b7b4ba9519b794d0304dcef434adc74316 kernel-rt-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm 37dfa3970d6b6c842798864c48b8faa9b078d538882aff16514045e161c016af kernel-rt-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm ff4e281020412bbcb919fc44fb75b5a30458938279238d4315bd49755fcada85 kernel-rt-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm 079b63845682699ca37cd6147b7b4aae2fd15820c0aa470f576363f6bf03f7bd kernel-rt-devel-5.14.0-427.20.1.el9_4.x86_64.rpm dba23feb84368132ec94a1a021a8ca0c068dda334c67c366a50cd5bd1306260c kernel-rt-kvm-5.14.0-427.20.1.el9_4.x86_64.rpm ae936c67e5a8124f016e4708c17aff8b2b2a3558a480fdc33909f2848e7d81ce kernel-rt-modules-5.14.0-427.20.1.el9_4.x86_64.rpm d7d2c81c0a721b09cb8c07d0449ea6e2bb77ef08ca603c69a73781f5709483c0 kernel-rt-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm 06143ab57e8f4302ea5cb196debf9433e65801613115cc4106c2c22fd423c691 kernel-rt-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm ed6954567202825fb678edeeec58675575320efcf6172c9ea98ad09d2bbc75cb RLSA-2025:15661 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097) * kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332) * kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352) * kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.42.2.el9_6.x86_64.rpm 4ed50a4a15aa570e3b4ac96e278d42855089b05c0659802c89b5bbf9371100cb kernel-rt-core-5.14.0-570.42.2.el9_6.x86_64.rpm d4532d1613173888120cdfb42a460d6206d776470eb23e165258601b18781001 kernel-rt-debug-5.14.0-570.42.2.el9_6.x86_64.rpm b30d2808dfdb74dfa69ce091facf1f64b52e86e1be7a604cd35129ef008529da kernel-rt-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm a01ed106b60ab60dd64f13629d2ad0a4962e91a6e40de530d19a4a1017c8e26d kernel-rt-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm 579a9058479d06d4fcb27a12b6f35c8be7320a437b51b47803db7a51f0184b18 kernel-rt-debug-kvm-5.14.0-570.42.2.el9_6.x86_64.rpm fdafe45055bb9b0d9dd5b6677d39a92a3ce39313719b35c919885a6cb458fef9 kernel-rt-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpm a59f9e35ed7a46dac5785efdf4d35494ec6ee99a5ef24f70a9ef984509808e5a kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm b40800c5d015c1783a69b7bdcae260432223cded2fd6544c056c02f84ae5d96e kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm 4b5833c9d597a72ab1b9db4e72fad588f2fd2e7ad4536b96f577b61d470e7af9 kernel-rt-devel-5.14.0-570.42.2.el9_6.x86_64.rpm 89fbbe5507820f0e5db406deebaf11f1fb1982f6d705ecff678134dbe3a4f75e kernel-rt-kvm-5.14.0-570.42.2.el9_6.x86_64.rpm cb3b816c2dd69db622b5c902bd82d02a7e0d588d92dff06a36aa60bac9911346 kernel-rt-modules-5.14.0-570.42.2.el9_6.x86_64.rpm ef5064d7f7544151b3021087c6a63306addcbedda4cd653201b39ea4bf89bf7b kernel-rt-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm d30e56aed8d31cc19c72537687fb17d7266e0d6bfc2fb3e0a18de8ceff303139 kernel-rt-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm f49fafac1202e42f9040b87776e4fd7dfacdbe5cbe630421250ac3153247ff54 RLSA-2025:16880 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472) * kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527) * kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718) * kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682) * kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.49.1.el9_6.x86_64.rpm 683bdd29433b53e8012e4060061a01ac0eba6bc1865694df59e10e81437da0fd kernel-rt-core-5.14.0-570.49.1.el9_6.x86_64.rpm 9a6c0df56cf5092b3ec95b9b8e2131fc9b0ea7879d754bb0e091f4a9b10442d9 kernel-rt-debug-5.14.0-570.49.1.el9_6.x86_64.rpm 4812e5f799b917cb73341aff50dc1f69d87439675f59d7808dce4fa48caa0cc9 kernel-rt-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpm 405af1bc8a6f1a5b95d41e60b8fc7ce9566798f4beaf248407a6019b4ca74547 kernel-rt-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm 54a0d7151958ca075a31f97c525afef5e5241ded61b4a213a255a93ee18de07c kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6.x86_64.rpm efc6c72ef269c214ccc73af915e7a82708872f903ea684b03ad6d73cd7905c1a kernel-rt-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm 0dfde1173da3dc631b128c063dd14f0f9f2d3980e69b42e42a87bc74a7802d54 kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm 436c2e86b5043cd468c5870e1899ed2a130ad716f9429a305def2cc2a9801984 kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm f8d2243331488cdacbb060cf996e0d4d55537bc249e88ca0289d67f9e2a3c39b kernel-rt-devel-5.14.0-570.49.1.el9_6.x86_64.rpm 98946a5a23de4a9a935bce346bd14c083bae68f0803b6ad116b61762fbf57386 kernel-rt-kvm-5.14.0-570.49.1.el9_6.x86_64.rpm a1648c85e8847d26d0986a7462de5af612af3ad29e8df8ad41c7376c5e25629e kernel-rt-modules-5.14.0-570.49.1.el9_6.x86_64.rpm deed9e612d46560214ce98279ca0673c8c4d8a1a2eeedad500e0f1a1c62dc848 kernel-rt-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm 8efc5cb09647e9d653b12c1de01efb1fdb9aa9d5488f086c0d71bbec796687a8 kernel-rt-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm 39d543d130b3f7eaf1d86699d262d551161f6d76ae78257920527870e75ffdf1 RLBA-2024:3983 kernel bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Bug Fix(es): * [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534) * cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743) * [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622) * selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991) * [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447) * CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572) * ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512) * Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524) * deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904) * [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933) * [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296) none-nfv-rpms kernel-rt-5.14.0-427.22.1.el9_4.x86_64.rpm 25ca006830a2a4c84206093b7091c98e3139ac4007c51ca139d1c0189a60bf5d kernel-rt-core-5.14.0-427.22.1.el9_4.x86_64.rpm 301e65823f8caf28c89022205f76e0e5de20f0f9161123bbd8a3d46f9c0c46c2 kernel-rt-debug-5.14.0-427.22.1.el9_4.x86_64.rpm fefe6204602302f82f04ab3b999e7ec17c02a660f3e6dc1c3dd0370763791278 kernel-rt-debug-core-5.14.0-427.22.1.el9_4.x86_64.rpm 93a62e9eb1f66b2627941d81ac8cde4e9d58f4d8b8bb4824cd26ce4edf8d9c11 kernel-rt-debug-devel-5.14.0-427.22.1.el9_4.x86_64.rpm 1e2d275a9409cb676f2d4a1f4680d40c3b7ac21fe05066688586b46801d789f3 kernel-rt-debug-kvm-5.14.0-427.22.1.el9_4.x86_64.rpm 0751c5b85bbd887bb46094c4e808b1a78033c4d8b359ea285be7ddfd6f825dc1 kernel-rt-debug-modules-5.14.0-427.22.1.el9_4.x86_64.rpm f00769dca2f72ddcc8bf793c4f56942f014d78615e899274d69b858c0b1ffeb9 kernel-rt-debug-modules-core-5.14.0-427.22.1.el9_4.x86_64.rpm b00fdec7a57dc8223d3d4994b030f19fa62579c25e285a91e83d929577f96e7b kernel-rt-debug-modules-extra-5.14.0-427.22.1.el9_4.x86_64.rpm 7b0ce75125b0ebcc0833b45e19f868e5ad05b9a6e978b8f71f982f31ba3deade kernel-rt-devel-5.14.0-427.22.1.el9_4.x86_64.rpm 0d2a7e5c3af56d3dc075b376e7a6a7b33b8a261349f85af6e6d0b73b23bcddb9 kernel-rt-kvm-5.14.0-427.22.1.el9_4.x86_64.rpm fcafa3b70c97323ef55c63b3c218ce92d64378f2872e6ade07bdbab748b15495 kernel-rt-modules-5.14.0-427.22.1.el9_4.x86_64.rpm 7f3cc86c2d07d077c1e660b1ec6db7a717a89a57ae1003dcfe6390e7160af58c kernel-rt-modules-core-5.14.0-427.22.1.el9_4.x86_64.rpm 786950035b982c0328b13f9f37a349ad6dee64727e175aa795d32767aeedc464 kernel-rt-modules-extra-5.14.0-427.22.1.el9_4.x86_64.rpm f1a2842ba043c2b75ae455330f684e421bf4a99040e6a17c04219bda29622a69 RLSA-2024:4349 Moderate: kernel security and bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801) * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974) * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870) * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960) * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400) Bug Fix(es): * cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943) * BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672) * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220) * [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687) * ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716) * CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641) * IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669) * [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252) * Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595) * [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083) * [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953) * bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.24.1.el9_4.x86_64.rpm a9174a0f528eb4d45aae21e8c8631b8694d0392b741d53015f2f69c3b709bbb7 kernel-rt-core-5.14.0-427.24.1.el9_4.x86_64.rpm 07e28e228ca42da8399586b0311b5b5744c0c33abd5f4ec49fd6f3472ba6a198 kernel-rt-debug-5.14.0-427.24.1.el9_4.x86_64.rpm 8d6f0caec0b845254c495dd7da16f18b5bdeeaab1c84c311c89062a941ec83ac kernel-rt-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm 58ca93f2f3f4c92055b5fcdab990c9b3a96c76eca1c985005157bf0258ec7e02 kernel-rt-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm 99ed36d3a9d033ac86a0c63c067b53df69eb858d73bb47a24086ce4113765118 kernel-rt-debug-kvm-5.14.0-427.24.1.el9_4.x86_64.rpm fa559c66e87460f20156ca2250808b5567499ab35a2375f31637962470a2cc8e kernel-rt-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm d75fcac15419efd90b5e41cc502067b853b832dc2eb9f8203636babf2f0d70a7 kernel-rt-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm 29441c63826412ac7c8d5c569fbe17a73fbbf35792e4f63d9b57f6354272d66d kernel-rt-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm 40e6f1559547f31ce75a05a97a0996c8a05628b5ee2b5150486511819c281605 kernel-rt-devel-5.14.0-427.24.1.el9_4.x86_64.rpm 2a34f5676003bacbf326e669bf3c5c579b5f7bbe40a304da574dea7017cba57f kernel-rt-kvm-5.14.0-427.24.1.el9_4.x86_64.rpm 006987a21643e9bac6a99c55131ffa7f57cbf0104aac00b425bb66e99bbbd5ce kernel-rt-modules-5.14.0-427.24.1.el9_4.x86_64.rpm b0f0d1e53845396a45e98864ff722034a6a857b5db2524f8314ea2c3146838d2 kernel-rt-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm ba9979ae8abb1c2f4048d30ad50666ac51015dd9b63b5805d91b3a86b81abd36 kernel-rt-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm 758d52ffd3762996472a39ab40d9397f5acf21b108448d19497b59c3f1baec67 RLSA-2024:4583 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886) * kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548) * kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596) * kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627) * kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638) * kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783) * kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858) * kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397) * kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435) * kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958) * kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904) * kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543) * kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586) * kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593) * kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270) * kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957) * kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.26.1.el9_4.x86_64.rpm 7f5d3c036e428cbb445de91afe41f0bcfa45fb61821355a30ba3c292dbbf4992 kernel-rt-core-5.14.0-427.26.1.el9_4.x86_64.rpm a95d4186fe85a446e33d2c2929b2a00e56a2a4eea7f71f112180fd47c44f3f08 kernel-rt-debug-5.14.0-427.26.1.el9_4.x86_64.rpm baacfb7ff8489abb8f778f2d3a387946074de99a51dee6a090b09ef00ed515c5 kernel-rt-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm b351d7ec491186a56aa51d343cdb755de7db3e54497ba80a9b8c178d8777b5b6 kernel-rt-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm c943b88caf09a37adec94a93e2ff293de4e877685304d06ba6136f16355c9bcd kernel-rt-debug-kvm-5.14.0-427.26.1.el9_4.x86_64.rpm 73bc15ee8d1519ad2a68253538f11fa497af8eb72ca1551f76110af908c036a6 kernel-rt-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm 066321f33eff9258cf91ed85d693603f0115e3141f592921b7c844a0fb7fc580 kernel-rt-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm 6629049e182ffd091d78fb74524be611b4cf765393e2685329bace66e8ebd4bd kernel-rt-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm 7a6f3b77e207a7e4b2e6987e5aab06f2eed7fa396d2769369a56cd88c96bc8cf kernel-rt-devel-5.14.0-427.26.1.el9_4.x86_64.rpm 5f71ee5057542ffe26d8fa134c8cb95b4f77db5b9fff1873bed2b4d6c3eb207e kernel-rt-kvm-5.14.0-427.26.1.el9_4.x86_64.rpm 8ac8fa309784e466382144d5b70ea9168874539d72e1367b14cbedd33d12452e kernel-rt-modules-5.14.0-427.26.1.el9_4.x86_64.rpm 7676dbc7c56850d375bd4e59980e4889c183b87b1f7fa47d4f421e000fa4cd15 kernel-rt-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm 2eb4fa76976b5a6d7b530a59ce31b02cc226072e134b78dd95c860ab5b7489e1 kernel-rt-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm b0524367e74887607d0b320457511d16794e0266dabf3d35c5bbe95479e4630b RLSA-2024:4928 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773) * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737) * kernel: dm: call the resume method on internal suspend (CVE-2024-26880) * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046) * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030) * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857) * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907) * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885) * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809) * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459) * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924) * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952) * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743) * kernel: epoll: be better about file lifetimes (CVE-2024-38580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.28.1.el9_4.x86_64.rpm 6597acd529559ff0318c853933258424ef2c933ca4197c94b22d8db9a801a363 kernel-rt-core-5.14.0-427.28.1.el9_4.x86_64.rpm ee6d901d13863dfafe077c5813ce838d54fd63508c15350899b6dfb680567795 kernel-rt-debug-5.14.0-427.28.1.el9_4.x86_64.rpm 8347e4d55ee37bd50a6438b5f5670fd416428274616383497a70886228585642 kernel-rt-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm e85a0fdc620ce0b82d5df2063d2897814df1c3ac395b617e1b246d40a9637c11 kernel-rt-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm bfcd78e3c238120fee226ad73f592d6edbadfb2476e7379ba42be1a45684a48d kernel-rt-debug-kvm-5.14.0-427.28.1.el9_4.x86_64.rpm ac56e9a60a8f460ebf253068a7a34573f725b943ad624c621e838aaafb20ccfb kernel-rt-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm 468feeafd0791f035ec84788abd77ddfb0591f722a7b747c38f18746e8725b0e kernel-rt-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm ceec0fe7ba5b8a9f6f1c1f0bd5cba2743d404f046c8b49d1257a9f41d98e0a11 kernel-rt-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm de5b73afe196f9df850867f536713e679290f1e75e731aa063a86444d42beeb0 kernel-rt-devel-5.14.0-427.28.1.el9_4.x86_64.rpm 305c377f41a7bb3d8830c302c9e2b786d7cb2a8ff72d772ba2a272f42ff7170b kernel-rt-kvm-5.14.0-427.28.1.el9_4.x86_64.rpm 264b91d7ea73b9a5937e1c9d1a5b5943466b850697f82cfc65ba1e0ec9888ce9 kernel-rt-modules-5.14.0-427.28.1.el9_4.x86_64.rpm ad4f43f652945d46557581000c331e2075f6a3215d39860be3deda5bd00c6b3a kernel-rt-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm fb0fec46408b828767322aefb4026da26bd8fd7a3d9d190dca6feb208f5f13d8 kernel-rt-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm 80e5f9b471c0dd173d060a69a59de1ab5597d0fc54f1a232a5e9a68c1a04b9ac RLSA-2024:5363 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058) Please update the description manually. none-nfv-rpms kernel-rt-5.14.0-427.31.1.el9_4.x86_64.rpm 442c4e26f463b2d68f164c61bc39904edd9eefe6a41c497af86815ec5482b80b kernel-rt-core-5.14.0-427.31.1.el9_4.x86_64.rpm 42c9794f26351c47cc4b1e9dd139e2d8e894f2da06b9b1d978a0772b5f1962db kernel-rt-debug-5.14.0-427.31.1.el9_4.x86_64.rpm 7559f699bb154d6e25d07741d8b1638dcfb740e048a2547c38d0a97da6701f38 kernel-rt-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm 96e0bc3a76f35296bc3a97af4e942b13a69e72c9616aae0ca2fe3cfe0e98b8b3 kernel-rt-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm 851859408cddc6523d7bf9ae93832bbaf4ce8fb139678c24fd6941e56b0c5f44 kernel-rt-debug-kvm-5.14.0-427.31.1.el9_4.x86_64.rpm a9d68a9d571e5225d8a4810bb03464481f0f9fe7d70fe1ea96796c725a78088a kernel-rt-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm a02653173845bd7cbd3b90c5fc082f3fe8fdbfafecedaaf22a52309215cf400c kernel-rt-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm ab16ba57529b003f7023fa7a853817f36e35d8ac9e3088cbb0a845bba140c27b kernel-rt-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm 2a309e1484f05559555407d1a411d677eda78c5701ab67767c1233d5d78d2634 kernel-rt-devel-5.14.0-427.31.1.el9_4.x86_64.rpm db08c3f2518d78ff1e31e271424fbdae70afea806413f2e158c3c705edceb87b kernel-rt-kvm-5.14.0-427.31.1.el9_4.x86_64.rpm 64f240137e097703b486b2f9a82a1aea9f3fa261f3f2471ddfa7d54edda0dd52 kernel-rt-modules-5.14.0-427.31.1.el9_4.x86_64.rpm cdf7758dd5be74827a29201dfc06fdacfae32fa366b0cb808089fe30f86f1141 kernel-rt-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm b041df683c25879d32a9137873f57601061f3aabf2997ea9ab10ed4e0a3f0936 kernel-rt-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm f40f3771cf1cd53e47619c6ca37ec0ca599014d51f9682b6c49daea70750dc0f RLSA-2024:6567 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629) * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630) * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720) * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886) * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946) * kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791) * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797) * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875) * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000) * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801) * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883) * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019) * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619) * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979) * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559) * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927) * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936) * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040) * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044) * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055) * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096) * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082) * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096) * kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102) * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131) * kernel: nvme: avoid double free special payload (CVE-2024-41073) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.35.1.el9_4.x86_64.rpm b0441d7dc998954f317e58d19a27a8aa0efea08eefe38f23b038b2b974c318f0 kernel-rt-core-5.14.0-427.35.1.el9_4.x86_64.rpm 1bb45a638c3a0ffc46b55c4b49230a74effa9a8c8e752a39dd69da2e31a9ed6a kernel-rt-debug-5.14.0-427.35.1.el9_4.x86_64.rpm 17674faa9f5ff9e8def916fb99c6eb3497321dfec7dd577699cfe8ffde16c9d0 kernel-rt-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm e6a1cdba584ee66646a5911a11e33bfbde715c49b078b019a6e4179e008b672e kernel-rt-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm 8d289ca94947d14cc4627c108f5897eb74d31c2093e66ed8211a5b257241dfda kernel-rt-debug-kvm-5.14.0-427.35.1.el9_4.x86_64.rpm 3c348354d72b9f5fb75f75b91cc8e89ad6e41056bf3d8ea55ba3176feb2b5dc5 kernel-rt-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm 16cdf89927dabbd96d551fa9a20a8710fce54100805e9a38d0ad3635d1172d82 kernel-rt-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm 83b5a6c881ff642b5953fcd8be1d111fe5d8937d7d939c5c14295d3adc8ffc24 kernel-rt-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm 47ac6c8cba80583aee0d0720f4d3b855c1a99685b7126eb892ef465b2ab6bb4c kernel-rt-devel-5.14.0-427.35.1.el9_4.x86_64.rpm 40b552d119a369972427fa4322f1a1266594b75f541ee2ade42a4b6b8310103f kernel-rt-kvm-5.14.0-427.35.1.el9_4.x86_64.rpm 57edbeca8967ac5af37c22ff9c249f2097def12ff7917a93d7c5b85c3911609e kernel-rt-modules-5.14.0-427.35.1.el9_4.x86_64.rpm 1e330f442cfbc1b4dd9edcb6739c28fdcd1eb8beaf0e7bdd9c6df865d436cc10 kernel-rt-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm 7d4f015e3b30fcb488e410da55ae8298818cad711f0d2c9be87b3e3ccf62ec83 kernel-rt-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm 2edfa706cf36ba7262bdc7f905dc43147a7581744841ecc41830d9df236ce3b9 RLBA-2024:6133 rteval bug fix update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The rteval packages contain a utility for measuring realtime scheduler latency while under a heavy system load. Bug Fix(es): * Replace dmi information with info from execing dmidecode [rhel-9.4.z] (JIRA:Rocky Linux-34566) * rteval cyclictest command line arguments broken when called as a module [rhel-9.4.z] (JIRA:Rocky Linux-47154) * Replace deprecated optparse with argparse for rteval [rhel-9.4.z] (JIRA:Rocky Linux-47209) * Examine how to change rteval to automatically make use of isolcpus [rhel-9.4.z] (JIRA:Rocky Linux-47211) * Update rteval [rhel-9.4.0] to latest version upstream [rhel-9.4.z] (JIRA:Rocky Linux-47212) * Upgrade rteval to use linux-6.6.1 as the default kernel for loads [rhel-9.4.z] (JIRA:Rocky Linux-47213) * Remove upstream spec files from rteval [rhel-9.4.z] (JIRA:Rocky Linux-47214) * Add rpminspect.yaml file to rteval to omit permissions inspections [rhel-9.4.z] (JIRA:Rocky Linux-47215) * Remove dependency on python-dmidecode [rhel-9.4.z] (JIRA:Rocky Linux-47216) * Refine the user interface on rteval for isolcpus [rhel-9.4.z] (JIRA:Rocky Linux-47217) * rteval missing procps-ng dependency when installed in minimal environments [rhel-9.4.z] (JIRA:Rocky Linux-47240) none-nfv-rpms rteval-3.7-10.el9_4.noarch.rpm 2d73209c70ca13b28731e4560c5eec02cc73d4625281774e7274f25266545c0f RLSA-2024:8162 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746) * kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403) * kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658) * kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989) * kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385) * kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889) * kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978) * kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556) * kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483) * kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502) * kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959) * kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079) * kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272) * kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.40.1.el9_4.x86_64.rpm 753c5e51a16cb572a8402ad3c63de2dd7b43f7dedc46c02311d56bfff3fc5af6 kernel-rt-core-5.14.0-427.40.1.el9_4.x86_64.rpm 2aabd8b3521aa7c632a9eb71c6ab07015732dffef22c6a7537b11506c86044b3 kernel-rt-debug-5.14.0-427.40.1.el9_4.x86_64.rpm 02eba91b9bd50b32f70d7cc3565557e082f538bf3a3ddac3f0287e69334c4e43 kernel-rt-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm 62cbb68cf3a28a7928e220494d0e59ee44b743d7f8af9f6ec8e22e585fb1cb80 kernel-rt-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm 7083cbf3a13838eba37947f06c50c9479610e2c671eba6974e2374cb5e3f8aa8 kernel-rt-debug-kvm-5.14.0-427.40.1.el9_4.x86_64.rpm 142be596e59560b730691547f186073cbfde6f50940d815449cba795e514946a kernel-rt-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm 7fd43301b06f2fcffb76db2e43c37cef9766f930587ad205b30478e77e93036c kernel-rt-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 702dd7b8aaad74ce888716521f0e7f7c48d3e27e3224d22b93fffb8571c134dd kernel-rt-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm 732675e3ea735bf2b8419c854fa462dccdae78d119fd4711a0cf48adb37bf31a kernel-rt-devel-5.14.0-427.40.1.el9_4.x86_64.rpm 405e0081bddb7c83be73737a929ad354e62541a9965eeb859075ab8747b9250a kernel-rt-kvm-5.14.0-427.40.1.el9_4.x86_64.rpm 80bb6ff63f8749d6dabbbc2f826e53d77dfb5bf50815e21b0d4ad2a330140c01 kernel-rt-modules-5.14.0-427.40.1.el9_4.x86_64.rpm 5d9e328b5ea7d271c7ae16feead7d1eba3080ff81708e0c388c8a0922d4b70fe kernel-rt-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm 85279efe779dfb13535f9967fc692d3c8464c72a2e3395f4d1236e5187269cda kernel-rt-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm c27a417d61eafd2f3a74929edeae7d9afd699953f12c880fa0ff2775ab2dadaf RLSA-2024:8617 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201) * kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640) * kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826) * kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923) * kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961) * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383) * kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244) * kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472) * kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504) * kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904) * kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931) * kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960) * kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972) * kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977) * kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995) * kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (CVE-2024-40998) * kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005) * kernel: xfs: don't walk off the end of a directory data block (CVE-2024-41013) * kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014) * kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854) * kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-427.42.1.el9_4.x86_64.rpm 67fe35cde20c4f205005a5845d7a54ed9f52111c5dd09fbe534af861e842c717 kernel-rt-core-5.14.0-427.42.1.el9_4.x86_64.rpm f01426aebaa39a17841dcf2719fe82f20c1b844a934a199c5edb390aa48e4727 kernel-rt-debug-5.14.0-427.42.1.el9_4.x86_64.rpm 921256d9da44d29690febe431782aa8b911037bd31fb4c4b2ddb93e41dccd3bd kernel-rt-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm bc4d2b8eb31a4d26aa22120b797dc8e472ab612f08497c46e93ed36dbfef2ed6 kernel-rt-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm 5814483e6caacb2175228953f29468f1c6fada67e66bd6a23f4a96dd541f6cba kernel-rt-debug-kvm-5.14.0-427.42.1.el9_4.x86_64.rpm f7318194905f6aef0e99a85f2203955543a2c5e21f07e361c8515cff4bd9b1ff kernel-rt-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm c83ed5a40c532f78040356d6b848ab5a64df0350e71e606a3058acbf115514e9 kernel-rt-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm 0d583d28493d0eeb1a1f6dc9c10e4fd205e299dcf0930492e72ea548cdeeba7c kernel-rt-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm ac421de9c7d8eb3201e840cdf74a3c636aa62b34b064b21d0ab9400fe300d14c kernel-rt-devel-5.14.0-427.42.1.el9_4.x86_64.rpm 168cf240ef0f01394965afb8f06ff9fbbf4fbd97c4c4bf8b6ca7eaa525b38569 kernel-rt-kvm-5.14.0-427.42.1.el9_4.x86_64.rpm dde8cb01eb861526f205274c08e860ee65fa64c89380a691c87c5f62aeedbf12 kernel-rt-modules-5.14.0-427.42.1.el9_4.x86_64.rpm 971f507ab8b39063d0a724f6d56b01be76498acfe4203ef8cd49c78438428af2 kernel-rt-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm ee11f03fa8dc892f7c94058220c14582e07d8e1fee27a1286d61f3e685bfcd90 kernel-rt-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm d43667ae8e716193d6fa48803780a5b77bdfb3366493fbe1aff2f0ea31e79177 RLSA-2025:17760 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556) * kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614) * kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757) * kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.52.1.el9_6.x86_64.rpm ea74e566271a6557138acf6180034ba010719e7a4269c266c83e67c8514ecacc kernel-rt-core-5.14.0-570.52.1.el9_6.x86_64.rpm 2849b05bd9c5b75c0eabb34d8b568f15aea62c0df4a382554d1b09e14ba5c31f kernel-rt-debug-5.14.0-570.52.1.el9_6.x86_64.rpm 3599170b88799efb65f2acb04fb22783e9338d9ad01debd3165cc36b482e18c4 kernel-rt-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm 4d0a52513c78d165503f40de25be7a6a1b7c3fcf579c30f893d9bc432b0d930b kernel-rt-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm 5857041bec890afb4cdacc3eb26da7a0138a54b6b52aa385a9ad766a08f2703d kernel-rt-debug-kvm-5.14.0-570.52.1.el9_6.x86_64.rpm 3a81ebe473b9e741972b5aaccc192c80d9b0fa24935d5ff29c0f32291b25f2fc kernel-rt-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm ec0dc1e1de632e4052609611dd8082c1c782ee42c80f38fe443d4ceff9249a12 kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm 18ecd1253273386c46e814c4ddbc2b344027c957873efc75bd0d6e954ed44e78 kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm ce2d423655f11576ee108c0757ea3be4e1a596307f839fef8a0b77ca482e4d08 kernel-rt-devel-5.14.0-570.52.1.el9_6.x86_64.rpm 03441f64c46137fceb3b11001219dbe13f9f01fe7d653e3d9ea794fcdfd5d887 kernel-rt-kvm-5.14.0-570.52.1.el9_6.x86_64.rpm c0d8112cc4583b26c47ae43cbe62ff0e72842a9c241e7e36ad070835d36a8129 kernel-rt-modules-5.14.0-570.52.1.el9_6.x86_64.rpm 010153e2b1b8a1a610e9cbf5c56167804ce881fcd5f2070d1eb5057604067756 kernel-rt-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm f7d4c600c16782fbfda87f61c966b59574bd52ccbf54cfa29a1f5eb29b1f1676 kernel-rt-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm 86ba928a9b683f4796d7be07dd5579ac2cec1fa2ed2bd03a2f506bda2efade03 RLSA-2024:10384 Important: tuned security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The tuned packages provide a service that tunes system settings according to a selected profile. Security Fix(es): * tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336) * tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms tuned-profiles-nfv-2.24.0-2.el9_5.noarch.rpm 619e34b1158e157d60275ad93590647c68b2654e6e58476394bb94dcf7d738fd tuned-profiles-nfv-guest-2.24.0-2.el9_5.noarch.rpm e17f114d66dfb41ff25b38c7d2ece7788ee8ea355330a3446366c6771a88c580 tuned-profiles-nfv-host-2.24.0-2.el9_5.noarch.rpm 2ca4713b858fa0db571e90a8026f7e8fd734dc3a1c1f121d1e56fd9b9307474a tuned-profiles-realtime-2.24.0-2.el9_5.noarch.rpm d203ac52ac9bf9dc064403daa035f047eaf387bbf9ef82c4da24f993f918a45a RLBA-2024:9075 rteval bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. none-nfv-rpms rteval-3.8-7.el9.noarch.rpm 3a7c3171a10fa25029837c8a06858d774dd560f7bd594de7867d64f48d163f76 RLBA-2024:9082 realtime-setup bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section. none-nfv-rpms realtime-setup-2.5-1.el9.x86_64.rpm 46867ada728376fecbac6574fe3199056ac3b55d1612f4c0ba4a087904dab1a4 RLSA-2025:4341 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292) * kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322) * kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990) * kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826) * kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-503.40.1.el9_5.x86_64.rpm 0cf1ccd370b4980f70de956552d975f9ef88f0ad7cc2daed78fe2d8551b7197d kernel-rt-core-5.14.0-503.40.1.el9_5.x86_64.rpm 75eab1098532652cc87a23e36f339499ba1f076bd35b3087c6b1e9caa3e4b0e6 kernel-rt-debug-5.14.0-503.40.1.el9_5.x86_64.rpm 6d3b75e72680344fe32bfd9c6e87a909e50a352af8771aaef3a98b01ff0adda3 kernel-rt-debug-core-5.14.0-503.40.1.el9_5.x86_64.rpm d64046c1ead3c9faeddfb2368027d30e812cb4f6ab28d016964673de3dc9c465 kernel-rt-debug-devel-5.14.0-503.40.1.el9_5.x86_64.rpm d7d0f1c9f383ce7a486c1a3958e74c585a01b4472ee428d1d6404498bc99a702 kernel-rt-debug-kvm-5.14.0-503.40.1.el9_5.x86_64.rpm aeb6dc7c88250549453953b9687dab2a1023a7289d7f8ea0570b4377d295a501 kernel-rt-debug-modules-5.14.0-503.40.1.el9_5.x86_64.rpm 80518f1db7e1b4747493a16cfccef3885a1bca92e149643e5403b8218faab0e4 kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5.x86_64.rpm 9e42f18f793c46355c144e2dd0aca63330fc4080efb2a0826cb69eb01f00f1e8 kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5.x86_64.rpm 978aff8861aa076e9ff6bd98cd2da56d2411c7ca065bd6a015af58b822e3f7ba kernel-rt-devel-5.14.0-503.40.1.el9_5.x86_64.rpm ef5c422a60c3c405c778508cc582ca4a7558df88f197e62a79ae8648e43483f7 kernel-rt-kvm-5.14.0-503.40.1.el9_5.x86_64.rpm fc59b0506f332d7cbecb8df46a5c35243bded9455c62e1f8c213f4a122f41f31 kernel-rt-modules-5.14.0-503.40.1.el9_5.x86_64.rpm 55185e4474de658a7824cd0c553c31b25fcf19b909c9e63438c318a310064057 kernel-rt-modules-core-5.14.0-503.40.1.el9_5.x86_64.rpm 5c57f0fe65ab45c72edac0839e11f3096152151d4dbe2bc0f072b89ecbb9c425 kernel-rt-modules-extra-5.14.0-503.40.1.el9_5.x86_64.rpm f56711851207b34f086d06c4befd7a9df656c480dc130f8f6f7efcfdca597fc6 RLBA-2024:2112 rteval-loads bug fix and enhancement update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval-loads. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section. none-nfv-rpms rteval-loads-1.6-4.el9.noarch.rpm be0cd8ff84c18c0c1fcfb480e8825ed998e0674689c648367a3219c38de0d8e4 RLSA-2025:19105 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718) * kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730) * kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751) * kernel: fs/smb: Fix inconsistent refcnt update (CVE-2025-39819) * kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.58.1.el9_6.x86_64.rpm 9b5cbdbea128719e37f1131dcc5eacf0518a5c7da0821734669adca9888d4d39 kernel-rt-core-5.14.0-570.58.1.el9_6.x86_64.rpm 4952ccee5b58c75ca7d9149aa448c34b20b6154c6380ea9a56f40bc23891b491 kernel-rt-debug-5.14.0-570.58.1.el9_6.x86_64.rpm 8f5b1c22303b7d0d9b19f35117fc4111da9c1851eb42391c4ea269b3eb5d15e3 kernel-rt-debug-core-5.14.0-570.58.1.el9_6.x86_64.rpm a0ad726a5f7701a1b18dad4182be138ad86a9b076003b78a8173e380e72ca6b9 kernel-rt-debug-devel-5.14.0-570.58.1.el9_6.x86_64.rpm 650432e0a5aa8498aeaab4d62bccf89f946b96752ed4454819e818e886390017 kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6.x86_64.rpm a08da2b314a4c4a81f923801da8f2ce40fdfc928a49664b34146a32c253ad551 kernel-rt-debug-modules-5.14.0-570.58.1.el9_6.x86_64.rpm e1a7df7a30ab0c03f74592c60b4facddccd2f47c148407e2a90662fc02c1b860 kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6.x86_64.rpm 287e1ac2b549abd620065e34ab26d2a521ea45d5e6153d029ad406b3fec9b632 kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6.x86_64.rpm 8d2fa00673df01640dcacccaa8eefecb65e55f50427e87433f8069f6fc31fd92 kernel-rt-devel-5.14.0-570.58.1.el9_6.x86_64.rpm 4a376668e700afb1babe5ace647688681f93a7993e0829f8bec2e3c09ea73b68 kernel-rt-kvm-5.14.0-570.58.1.el9_6.x86_64.rpm 9b84bf0017740dfef1474ea1be76c9c36ced84a61fef38190f82862f46ffa976 kernel-rt-modules-5.14.0-570.58.1.el9_6.x86_64.rpm ff03420ab1d0ec7919a227d46e232f80286d52212b0a23a58157673f747b3927 kernel-rt-modules-core-5.14.0-570.58.1.el9_6.x86_64.rpm 9c3f09c1677ee979fcd621afd601ab363a902ddafcfd1167f5a4523cdc38047e kernel-rt-modules-extra-5.14.0-570.58.1.el9_6.x86_64.rpm 092762fc3ded8f5db21464efa067f3789ae53380a0ab53a5df3e486437192a03 RLSA-2025:8142 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.18.1.el9_6.x86_64.rpm e2f970dde6223aeb692815edcbeb4523603ddffc48fb70b2dac8a4049c63e2de kernel-rt-core-5.14.0-570.18.1.el9_6.x86_64.rpm c45f18681828babef3fa17d8931ad77600768ea284de5d07b4f380403e995fcb kernel-rt-debug-5.14.0-570.18.1.el9_6.x86_64.rpm 3f0813508aa4010928555756b7374003d8a623683dcbb32ea7a52b6bb5aaf64d kernel-rt-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpm 8222e998ec25256e42558123d8c9f55f8d2b58cb0a9d48f58ab668b76a48ddbe kernel-rt-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm fdfe84742cf35571907ef4d032b30b4cbab3759fb21bb3a847abdbd845329e50 kernel-rt-debug-kvm-5.14.0-570.18.1.el9_6.x86_64.rpm 15c34cc1ebffd6f207bb330aab6e98fb50822d81861e278155b381a1f5102d52 kernel-rt-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm 46fc0bb48c02a8ed0a96cd19c2072f8f1334fab9c72e47f64a062880c829298f kernel-rt-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm 3a30d96353c2254847ac2789c652a11e604dc2384866d395a3fdd697eca497b9 kernel-rt-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm f4263f95406678029b496fb5da499e39c2f6e323c00fdd3dc3a66b7c0cdb4f8a kernel-rt-devel-5.14.0-570.18.1.el9_6.x86_64.rpm e0c91a4e52cc6eb9a0677a0b07b14d18cdde8d319099ca326ef04f15b7b3cf92 kernel-rt-kvm-5.14.0-570.18.1.el9_6.x86_64.rpm aaf9d0f4dd8c9708a6068d32b34b7f58a558db402f5933b00a327f4939d1f7ce kernel-rt-modules-5.14.0-570.18.1.el9_6.x86_64.rpm b523b96ad70bdfefc1635bb803c5400f470a3bfea0587afabad948bea17811e5 kernel-rt-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm 4788d13a416708a979a390dcbace3e9b92910cf79e980844fc93ff0a134b7bec kernel-rt-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm 341db41f19729d9122f661e94db781627b0fa42da21c7159de4222ed9c3b634e RLSA-2025:8333 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: Use after Free in gru_set_context_option leading to kernel panic (CVE-2022-3424) * kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.19.1.el9_6.x86_64.rpm 8d86f9e66080c880e7173e988bf75458ed41aadf13f6b38b94041adc0488f27b kernel-rt-core-5.14.0-570.19.1.el9_6.x86_64.rpm f4a36f9e9b1b5aaa8780d114dc5a49b3a5c0b66e8f2714e1044efb10dcd82e5b kernel-rt-debug-5.14.0-570.19.1.el9_6.x86_64.rpm d5dbdea3600133c00707c78b825bf9abb1a0af78c2bd3c4cc213e3a74d8aa523 kernel-rt-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpm 6aa3c8d7f10d8784de3b1e493c60fb9274e80e51e809f3c5576b1c20ddaa647e kernel-rt-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm db7900ffaf684b4fcddfa956b6ac206f99ed0fe4cca69828a069a445724e9cb4 kernel-rt-debug-kvm-5.14.0-570.19.1.el9_6.x86_64.rpm 130153d7f9df18bb1486e2f5364a743e171a021f05fc233362fbeb49bbd9fe72 kernel-rt-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm ddb90399751e6fa31e754333a3467c7f6e731abdca4d2493cc222e8cbbfaeab4 kernel-rt-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm 2618b725252c77d8d7aeb7cda6a7e37b705f59439217209e41024b3a287247a6 kernel-rt-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm 59c5e8cc670d479d19ae97de6ad475cb27de21c95b3d296d3ec6f93e323ad943 kernel-rt-devel-5.14.0-570.19.1.el9_6.x86_64.rpm 3a7dbb0f32d96f8831aaf81aaa5bbfd69ee976bf6d42c60946e9af032c951d65 kernel-rt-kvm-5.14.0-570.19.1.el9_6.x86_64.rpm 7ab2d4bdc9db39732c5ea8af575f72cf88f70f31393481ca55d2a915fd9f9d80 kernel-rt-modules-5.14.0-570.19.1.el9_6.x86_64.rpm 0b5fde1633595bf3e65ff5566af82a3c29e184cbb62df4b256cfee557e6f0b6a kernel-rt-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm 3fa9a562ec9adb4887821e032cfaca83aadff67d5254fd61be23b595b631e2ad kernel-rt-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm 0552f02c0e00e72dd3426c6e6e4faf15f105e5d95303b170aca7e621acf6b871 RLSA-2025:8643 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926) * kernel: vlan: enforce underlying device type (CVE-2025-21920) * kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997) * kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055) * kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785) * kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.21.1.el9_6.x86_64.rpm 43feaf73b518fc1b71aa8c6854e9a4077d37b9451b852e1e6d82f73db9826cad kernel-rt-core-5.14.0-570.21.1.el9_6.x86_64.rpm 663d2659217e1fb9b7392850c39a8747177d9bd5bd9b8af6e00c6e467bcd9808 kernel-rt-debug-5.14.0-570.21.1.el9_6.x86_64.rpm 828b56b40c0fe2ed46138b91ec47985abdf73249a5c3e6ae73f110f710cce693 kernel-rt-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm 6252f3552eb0dc9b4c1497daeb66040da87acbc7ef676d3e713ec35685deb13f kernel-rt-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm 84480720624091e471475051a5b150e18f2f48e1be07d26da1c395ce11a2c0e7 kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6.x86_64.rpm 694fb45179254d09b2984fa8cf8771e9553176721b1b931c0d86b90b315ab939 kernel-rt-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm c64a3e5333fe39144b37f72bffcf12e1382295207aeba5f5a6109bd29b7b7415 kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm 4c73e5f29021103bf886c12ee93f508053a4ae40851e7ed9e1bd6580b664f006 kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm c8bd5d16d3fd7c1647642a5b6d72130ee10607633b674460690b67947f5b79db kernel-rt-devel-5.14.0-570.21.1.el9_6.x86_64.rpm 91e1ee889c3998220933c0ba9efc7ace6dc36b16617802ad54093f4a5b576a8d kernel-rt-kvm-5.14.0-570.21.1.el9_6.x86_64.rpm 9d8227e7e6a17361257a213333684a5904e349818322e1782f32be165ff232be kernel-rt-modules-5.14.0-570.21.1.el9_6.x86_64.rpm 6c38c38250c82a4bbe210467e076f5d0d23672a7ae943f17a2f4f341339115a3 kernel-rt-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm cdbe1fd85210c0dfe593176ec419009528a1e2f9ad522a6bb72a1ffd33e1f72c kernel-rt-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm 6ff6a39f71b0f6f8ba613fb80b32fe22198c0e5f78039ae80a99f35dd08b26be RLSA-2025:9080 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: eth: bnxt: fix truesize for mb-xdp-pass case (CVE-2025-21961) * kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969) * kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963) * kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979) * kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999) * kernel: md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126) * kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.22.1.el9_6.x86_64.rpm da03e221e8d20cfd4a68d441d16a3b358713da3ad327fe6e7138cf6a89a9f637 kernel-rt-core-5.14.0-570.22.1.el9_6.x86_64.rpm 0014fccc788520352be800add6e9aa5bc3f26b39983c2693f20b950c3f5912fd kernel-rt-debug-5.14.0-570.22.1.el9_6.x86_64.rpm 2dd21ebfd0ee0fe3a428f236da72f574f0781dd730a582ab0558f0ea8b43f7d7 kernel-rt-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpm 661e49f125512e2c93952c8e08589e4cece94b794affc3cde31b1c540f516681 kernel-rt-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm 6e8243086983cd8629b0e1d77f89800ad3db4b8cabf47b0a97c6433a0f73f317 kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6.x86_64.rpm 31fe3e7830fd316eec10188621098df2d5d3a83fa8900ae2ac32c2baf46c9f82 kernel-rt-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpm 2802cf2bfeff9c86bd1cbc76c83ab3da032edc98aa0301a2afe754d1a12cb1c1 kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm 1c6086ac58b1a509112a526424085e529f1e39ab90e4138bfd7aa69f7a77fd5c kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm 1d1b37115f8dd21360158e02bfc22c66f0f50421a1d793ee85a7988843da6ed9 kernel-rt-devel-5.14.0-570.22.1.el9_6.x86_64.rpm 666d2cab9e21a346f79f7973d7e9b5034728ec4f440879c1d24cb00d979db26f kernel-rt-kvm-5.14.0-570.22.1.el9_6.x86_64.rpm 5f1a86db9fd136f78f56c9b6e9ebcdf4a83ba3234dd4aef31a05674244717f1c kernel-rt-modules-5.14.0-570.22.1.el9_6.x86_64.rpm 7d863704b2eda892a682452ef1bce5cd6bd14892ac7710537e354d3c83e77535 kernel-rt-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm 1e7d03b2e99ff4b09387b829fd09e1a09fefd7d128ac13ee68c5766ecb884fe7 kernel-rt-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm 49cb332c15f470ea94d4bb8c2dd0c9d87695cb7c222732efffd10eab8d190021 RLSA-2025:9302 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ice: Fix deinitializing VF in error path (CVE-2025-21883) * kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919) * kernel: ibmvnic: Use kernel helpers for hex dumps (CVE-2025-22104) * kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150) * kernel: ext4: ignore xattrs past end (CVE-2025-37738) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.23.1.el9_6.x86_64.rpm e2e50d62f998ca4df7723860d300743cff4a38ee393611f11cceaed60849ebf1 kernel-rt-core-5.14.0-570.23.1.el9_6.x86_64.rpm da2d015d16e393d5e770a17977df1afedfcb22dc424cb27d4f48aa9c4809a529 kernel-rt-debug-5.14.0-570.23.1.el9_6.x86_64.rpm b3d36340a82ec7cbcfde3ad902f01908b50a4ac554c016a7039b25c879e47907 kernel-rt-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpm a7f7eec1de9ba61c8f314748f0d725e92bc577cb550c0bfd40b5d44eba83ab40 kernel-rt-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm d340a20392fe3eb70f41155cb94b987bd87bc162d066552605f927092dfe9eb4 kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6.x86_64.rpm 69cf8d5185a7865e5ea0f9fb302251a90a412bcd42e3777f39c425f27509a143 kernel-rt-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpm 46919136b1ea497f295c408c1813090e541a2c0266237ea7ac5a792174fedb7b kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm 5537b4007d66f633d0a0a25c82e7371751440026dd52fb14fe7a08852f3ab717 kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm 8da8425c8ed9fe1eee48695a864575f353eb2b0590d73c5c5216738282611fde kernel-rt-devel-5.14.0-570.23.1.el9_6.x86_64.rpm 84b6a5e43e734d531966c5021c4a7ac29161e0c0ea25590e5e0f4729b1dcb369 kernel-rt-kvm-5.14.0-570.23.1.el9_6.x86_64.rpm c0b67ac8190efdb93e7b3bec738187c7f34f5833b1cb671fb601b6c74bf59484 kernel-rt-modules-5.14.0-570.23.1.el9_6.x86_64.rpm ebeadcfcab0bb8ee2cc0713f6c60973e984a3fb7bc93fe03de9b4552387b3cde kernel-rt-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm 6a18c86d8c76fb942ec7476e5479d2501fbcfd69bfcd9ff0fab91eed16892e2a kernel-rt-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm 4743232782a4217afceae038419a2bbcf8c50d8c73810fe9e572dc093236b55e RLSA-2025:10379 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759) * kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887) * kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004) * kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CVE-2022-49846) * kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.25.1.el9_6.x86_64.rpm fb5d0986bb89f5fe8c22805f38ba4f7b388e57eb38e3e9d8a3ab9599d93626be kernel-rt-core-5.14.0-570.25.1.el9_6.x86_64.rpm 34ad984a4fa04a40b74685c0d1d0a796f5676d9b695e8a27fc2d40b9fed21443 kernel-rt-debug-5.14.0-570.25.1.el9_6.x86_64.rpm 47e1d389ce459dd70a21d0611e895d2d6df85cd4b8e7b627416f0ed66df9b458 kernel-rt-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpm 993595094bdfd13585796bc6aecdbc4cf27ce02211370fd617746544eeef2db1 kernel-rt-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm 0c47f68ca8a3ebae640aa177e03449b872b80b767e8ae587482ae1f1e362f2a2 kernel-rt-debug-kvm-5.14.0-570.25.1.el9_6.x86_64.rpm 6603cf212db76eb82213cca86ed93168e0456fee3f8a26f3dd90654938d35872 kernel-rt-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpm 25faec8767a410d331352e687529a0149c01e63f952dea26dd6706c59edef3b7 kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm ecfcd8a0e990fa2335880f1bc01d3970295cdd9bb67a91f741aa913639837160 kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm c4362632e19f9adbf2898ec2eaefcf90fba42279d8bd0223223ca4177f0d3d28 kernel-rt-devel-5.14.0-570.25.1.el9_6.x86_64.rpm 3d4c8440e7f7a869a7b11696814c937c4f889ec6e54e272849065d6021c696d1 kernel-rt-kvm-5.14.0-570.25.1.el9_6.x86_64.rpm 005b72553f86e1ac819173bb7f1c5dd601eb747907ff180d068247b1391603fc kernel-rt-modules-5.14.0-570.25.1.el9_6.x86_64.rpm 8e50183809a037dbd5ad6474732350967749af54083f3467de9280c6e6d24846 kernel-rt-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm 0ec01f8ca486a49ea56e773e208624b43662c95964c25af66442d0efbd1736c8 kernel-rt-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm d1f1354b5f9085cbb8b747139e1d7a31d92edd8885427a71b358ed23d92f9d44 RLSA-2025:10837 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.26.1.el9_6.x86_64.rpm 09075de545cd871a5bfbd9b12e2d35d5b4191a3698a02d8890b2c5bc1d1b3147 kernel-rt-core-5.14.0-570.26.1.el9_6.x86_64.rpm a306384f03f62fdfcfe51a9bf4aa488f094b5d817596522d3e168f579b9e7b28 kernel-rt-debug-5.14.0-570.26.1.el9_6.x86_64.rpm f04d98df9229582696ee34fb197fd033e46de142750a427441b9f158880a4f76 kernel-rt-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm 3c2efdf3862470f8eb5712dc355bce2f929192233cbdc518072e086c903d9595 kernel-rt-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm 0dcbc54a7129b7e38388579e29264dbc1dbc1fb89cba8fb11203a16f85619f09 kernel-rt-debug-kvm-5.14.0-570.26.1.el9_6.x86_64.rpm 481e1a1e874953a6c6e570ccb5306d7aec2fe1b4f091e4df078dc61176f7e0a0 kernel-rt-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpm a6404a178f1fade82ff0ca9a711e923fd90127dd67c84b39112a34b1ccf104a5 kernel-rt-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm 45ef878c4f1b92ca86c73e5be218ca9efff1f0cfa16a9c5de5be28f28b4d3642 kernel-rt-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm fb23681a330928ebebda9152c66124e94d8631901c102ffb63736dc968641e87 kernel-rt-devel-5.14.0-570.26.1.el9_6.x86_64.rpm 6cc51e8fc49fb5935d0f718a8600a00ed0d9f94ec49eab0149e91d1e09398a04 kernel-rt-kvm-5.14.0-570.26.1.el9_6.x86_64.rpm 0a33ccd63015f00ee8f5ec620e06182dbc6e0a022fd51cd871faaa80273b50f2 kernel-rt-modules-5.14.0-570.26.1.el9_6.x86_64.rpm 87a07937788d4f6e463166cde378d0d130dcd8f01c0fa5f58407f42c5453bd8f kernel-rt-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm 8f311152b1b632e849be5b7c7af77c0acdc6b8fc4420c61f064beaa50e626ef0 kernel-rt-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm a19121289933dd38ff325fd165dd8c39b099771654fb804d6885c39971e2083b RLSA-2025:11411 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002) * kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.28.1.el9_6.x86_64.rpm 048b28c0dabc7629638335b5b50164f7e1b8e4a1e29a63354c5c283a8c2fbeca kernel-rt-core-5.14.0-570.28.1.el9_6.x86_64.rpm c58635fc8665ba9ea5322d1a3d2914102979eacc1ec9580175066ed118c69794 kernel-rt-debug-5.14.0-570.28.1.el9_6.x86_64.rpm 1ea0335c85c8480e32d641624026fa24ffd8191b2919f8f0894fdcc52de17b23 kernel-rt-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpm b916bc7c97bc253e313c1f7415598623b8c32e1b7ccb3856460f8d6eee1e8911 kernel-rt-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm 6fa75e3dcb2aaadfb0e1aa84e38c362a37738c937fb3db5634df33ffaa669a24 kernel-rt-debug-kvm-5.14.0-570.28.1.el9_6.x86_64.rpm 51940280335829e685a2afe72bb78499af76db397b446b609d58d95534a7cd87 kernel-rt-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpm ad4ba5193fba0f5ecaf3c705bf765471f976061e038e02458e9f05d44c87a73a kernel-rt-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm d7eed696922eefb6c02d28fef7da527d91a32712b0794ff1b1defc8568d03091 kernel-rt-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm a7914eed60fcd49478c666880d6bdae4c4adeb07b7f158e3247e45f2bac54337 kernel-rt-devel-5.14.0-570.28.1.el9_6.x86_64.rpm 859a1c3e90793796cd7bb9153bb0b77988b5518bd5846eeec2d9e4e543fdece7 kernel-rt-kvm-5.14.0-570.28.1.el9_6.x86_64.rpm e5e170b68b17e6c38cce670db5e7f7fa6eb6d6517ae87e0525ee2223ec099944 kernel-rt-modules-5.14.0-570.28.1.el9_6.x86_64.rpm ab74e90bd23735ad84c71c92d6008ed06aa660e05830260ab840c22afa5ba37d kernel-rt-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm d52fc1735e7a6fd7e1e274515c6725d8956625520e7cc6f37f229f35bbc76e81 kernel-rt-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm 2d441d0a999a2f1d97d0e5d2ccd5587488296ba95a27298bb59a97fb465bce77 RLSA-2025:11861 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980) * kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905) * kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091) * kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121) * kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113) * kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797) * kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958) * kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086) * kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.30.1.el9_6.x86_64.rpm 75a03b595d5c6d9e088f40af84b8b639845e12ded241b89b8c73798b99c64bfa kernel-rt-core-5.14.0-570.30.1.el9_6.x86_64.rpm d99aa6b2574c3eb37f7ba87d5ee954179f1b4869972a1e68295d5b8f9a3cc7fe kernel-rt-debug-5.14.0-570.30.1.el9_6.x86_64.rpm cf1a8cdd3e4e890e3aaab2bbf4039812e18fc6d45bf353fcffe05946cada995a kernel-rt-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm 601058d3a4de28aebd7ba81ee84b5903f6a45d4a43ed6223308275a97873ab06 kernel-rt-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpm ab805e6d00201b17ecd666806f2cf273bc3a7ca14da4a88fd19cf1087a33d72f kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6.x86_64.rpm e2b9bbb8e38a9ba18251b1ee62b2166c9d9ae639a1fcf32f5df11ff0d19f232a kernel-rt-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm aa167186cf09c691ade5a2089cb07c34e299d2bf500373bef423690e50e6b1a0 kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm 6bbd956f934a865357baa07afeec1520ecc74d358b1fac6b5fde7bc4fba3ba90 kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm ca7f945d7f0b20cb8ff1b62f6aa5fb5b9a6ff54a676727e8d79b5361e6cdb94c kernel-rt-devel-5.14.0-570.30.1.el9_6.x86_64.rpm e35d9da3d8d27a8ea8ea55e65015b15b41b411a74403c7ffc631ddee0d9d98bb kernel-rt-kvm-5.14.0-570.30.1.el9_6.x86_64.rpm 4d8ca817a761e3be7ec9e50f2ca03a373058121bfcd219800f9e349cb0827c29 kernel-rt-modules-5.14.0-570.30.1.el9_6.x86_64.rpm 8c2d4212ab032c3951f147187c6a336443098289a2e267e0719a9bc24908e0b4 kernel-rt-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm eb6cba596bde9c6ca970d06c7933eda76fdd1e9e645befa8e480ef48157d6b58 kernel-rt-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm 67ab9ede2237d7a05d30f56f776a1a637b85d407065d19f9b87c7515054e71bc RLSA-2025:12746 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: padata: fix UAF in padata_reorder (CVE-2025-21727) * kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928) * kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929) * kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962) * kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020) * kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788) * kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890) * kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052) * kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.32.1.el9_6.x86_64.rpm d0709c856eb428c3bada7b889f1cc7e50e4b8ffd1f2bc9195475d4ff1deecaa4 kernel-rt-core-5.14.0-570.32.1.el9_6.x86_64.rpm da6348f7fb66153c16a8f8a85350ebe8a8f2064df6793488c6381d6dea78c0c9 kernel-rt-debug-5.14.0-570.32.1.el9_6.x86_64.rpm 8f6bc2c2329af6eb744a9467c4fe292aa3ad18cc08af44008737aac672f21e8d kernel-rt-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm 3a993e22add4fa0c24387a243b632d6acbe965656fd5267ef909bf07a6635048 kernel-rt-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpm 059b760fcecf07610f74d83cc77c8e71031de8e27a01f3a191fbc878ab79e07b kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6.x86_64.rpm e97493ffa493120cea3498e059f36fb846f031428bd671871f457e291d69d613 kernel-rt-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm 5a0f86f7648fc552f9e2fc796add9e4ba08f46487008d75d34a2d0cd97771b98 kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm a5e48f47a81710a50dd874b5b7a5b495eee3ee865027e6394427a1b2bf8ce647 kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm 44831fc07a7bef36dd60de3a34bb619352fd40182ffa29a7f8f51da4eef4c54c kernel-rt-devel-5.14.0-570.32.1.el9_6.x86_64.rpm 4d7b71330aab450ac0b17762060d5818235ee740cf3d66ae1cc2fab259f0be87 kernel-rt-kvm-5.14.0-570.32.1.el9_6.x86_64.rpm 31eeb913c6d06a8b5a15a3c9fa4e42ede9ed8d331c4ee6ec26f34a3d91f47508 kernel-rt-modules-5.14.0-570.32.1.el9_6.x86_64.rpm 92bbb80b897a558a80d178306370fdbb0bed9df51f5d753d1337732f80592377 kernel-rt-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm a3ea780bdada2ad6d257891a2128a8794f9099bdf2dcfb925577eddd67549780 kernel-rt-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm b5e98faf39b2f1ed0bf923603b21392d44bfdd02a57e3a2d5b55c0d6cf3b7d5e RLSA-2025:13602 Moderate: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Moderate An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): The kernel packages contain the Linux kernel, the core of any Linux operating system. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079) * kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.33.2.el9_6.x86_64.rpm 9d58dd1ea49ce71020eb7b45dc1e8b138e436764eccb1512fa6e033eb905b14a kernel-rt-core-5.14.0-570.33.2.el9_6.x86_64.rpm 144a2d2df7fb3e1fc1bc824e9474122d8a929670e4b6bfc5c874d227f5b64aa0 kernel-rt-debug-5.14.0-570.33.2.el9_6.x86_64.rpm b005bf4e41a1a10b5de5285293f668d38d2102ccc9b98ae3ae3c88c3947c4d6f kernel-rt-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm bb4710febf96071b25a5ea7f70c07b919d77c2a7bf4f93a72d5b61c2822b6d16 kernel-rt-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm 55d2c995b1a02a2cd282c5a14a2787c15f8a61c7a4b781977fa36895877f85e9 kernel-rt-debug-kvm-5.14.0-570.33.2.el9_6.x86_64.rpm e98554b3bac789a97f3ea03b652d6541705741adadb41d35b51f7a8cda3ac7f8 kernel-rt-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm abac949ce201108beaa419964509314252a160637c97b67a571d3ab482546b08 kernel-rt-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm f9e48a99e5105ea796875c037af9666f0535a8cc9e97a2c611d4510f66971f7b kernel-rt-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm 3b3714eaf40c85486b8bf50cfc77c564aa3f4d9afd7ea8621694cf7f30121271 kernel-rt-devel-5.14.0-570.33.2.el9_6.x86_64.rpm 7c75af02b927c7344f73bb87068fd10db761fb4e2b496767a1bee0538f1f9bcd kernel-rt-kvm-5.14.0-570.33.2.el9_6.x86_64.rpm 54db72ff8cb8a0ff335094f2e51a13395d3503185250fb4accc77e18f8c69afa kernel-rt-modules-5.14.0-570.33.2.el9_6.x86_64.rpm c06185ee5c4fa15bd71ed616a22c89800ba3d2a7276949d4f22da8bc838f214c kernel-rt-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm 8248241f0928bdc73538b0376d3e8e69d31d15078ba005c8c10b368e1ab722d0 kernel-rt-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm 16fec4c41c0697c779db6c8ffce55783c8896a9c0c25ec8b85ac9b99cc6b79e6 RLSA-2025:14420 Important: kernel security update Copyright 2026 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: udp: Fix memory accounting leak. (CVE-2025-22058) * kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914) * kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. none-nfv-rpms kernel-rt-5.14.0-570.37.1.el9_6.x86_64.rpm f65a3a886c4f1c60b0cebb373c086a2d33abc22217a7625a62a6024abadb920d kernel-rt-core-5.14.0-570.37.1.el9_6.x86_64.rpm f3614fc3b9802abd0c655de5e7fcc81f68fbffa5019fb6b0493aa33667e4d24b kernel-rt-debug-5.14.0-570.37.1.el9_6.x86_64.rpm 69e1eaee6b23f9aeb67e69bcbcb8c454b9c4a3169d3f195cf62a055343a1556c kernel-rt-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm a4da214028ff3827851a4c603208e3c13062d96cf5577a000d6175cc3a68161e kernel-rt-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm cc95a296693321a9661aa807c2b3bb1c534d45275300ee62775a6cffd88382f9 kernel-rt-debug-kvm-5.14.0-570.37.1.el9_6.x86_64.rpm 5d0e1092221713b1200e64bc99845f4554bb09dbe96c8d3d0cafa9f402bb1a07 kernel-rt-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm 71280d27e3020034e58cf995e70e9172d45b9c118644669db7e0254a5b2ea696 kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm b46418425d0cc29a5b5506dd99d224c1b3babef46334c26037191cc23dd7d192 kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm 1908c3bd4742c950db075869736059286876a9372050b95c9485d3bbabec3cfa kernel-rt-devel-5.14.0-570.37.1.el9_6.x86_64.rpm 310ded7c27ae9e6e376dbb466475ae0d1cc742c2dfbf868264a9e3b64f5e4247 kernel-rt-kvm-5.14.0-570.37.1.el9_6.x86_64.rpm bfe929e13383a3a730a0dc0532bda8c3f1866ea27ff1ea23a33c1cc480ad7cea kernel-rt-modules-5.14.0-570.37.1.el9_6.x86_64.rpm c08454baccabd4ac327facaa773be869d112872ca25451c3bc1db60b82ea8130 kernel-rt-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm 9cd3ec41dd1636419c5b7a63852c82554ab310e6c40360070fab4a86cb3e443c kernel-rt-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm bb63e6b5edaed26a4e7b145d7f07108d61cba2ca1e09a64000029321fd809feb