RLBA-2022:8321
tuned bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-rt-rpms
tuned-profiles-realtime-2.19.0-1.el9.noarch.rpm
fb0dbba6e33e15cead237638bb3ba2217f1f97dad6d226fbf28ddc5b6f256016
RLBA-2022:7934
rteval bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-rt-rpms
rteval-3.4-1.el9.noarch.rpm
779ef99730b0722c8085dd7bfeb5caa7c3fc469c860fe8070cc6f73ba2ae964c
RLBA-2022:7936
realtime-setup bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-rt-rpms
realtime-setup-2.2-6.el9.x86_64.rpm
09d1e8c58237d226f48dcd7ea1859255908739b2bd44891cb9c2200a7737ac18
RLBA-2022:7939
rteval-loads bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval-loads.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
rocky-linux-9-x86-64-rt-rpms
rteval-loads-1.6-1.el9.noarch.rpm
d90521c5eadf3f090373ef007bc30c919b714cf597c400efd189542cc7de73bb
RLSA-2023:0300
Important: kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z1 Batch (BZ#2141817)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z1 Batch (BZ#2141817)
rocky-linux-9-x86-64-rt-rpms
kernel-rt-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
a7e1f3a73355138f0b833a118d6b89658f74d299cfa39c77f8a259395a7330c3
kernel-rt-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
5b68b98ea60d1532352676df69dd5f01bb4091a19159f80b4987be94ad3f9d5e
kernel-rt-debug-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
b3a01fa3e91d415b63e0da93758d281b8f25a549dc982bb9cad82a17be557220
kernel-rt-debug-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
46b42686c27706db3766e029fe5b849642652dd85ca7f4c7e8ccffb8ee5ad4c4
kernel-rt-debug-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
3f1d53fb45a4edb3c5a2ae633202b7d9637faa9fb0c6d6cc8f4247124264c836
kernel-rt-debug-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
1090f4e8d8356909d3e656f774eb05ac4b44af0bc3e9bb37ed084eb42bd15f79
kernel-rt-debug-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
9988382bde8954cac0c0b91da17ce38b528b25465fb25b642aa9a029fd577d49
kernel-rt-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
1c5864022ae27f7f2f238959bbf5eb754d939c3064c782c20e02325a514c68c5
kernel-rt-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
c8fcbfdcf00d9e0b594bb22083bcfea58004e2009c316e66b776657e9bd58831
kernel-rt-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
faa845cb72002e6899eee20b282e5859dfb66fd9180e99f0287e3a39a914bb30
RLSA-2023:0979
Important: kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)
* kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)
* kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463)
rocky-linux-9-x86-64-rt-rpms
kernel-rt-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
7b3306e40d0eb276b81736e5b4d0a090b32e7428669108e3a9b5e9e6aaad5464
kernel-rt-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
d982083ee4ad4d679065f00f97454fe4d98fa099b0c48fe7b43f336383a843f1
kernel-rt-debug-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
604d8762e724e8a645b855749d0e0e9356fece859c97bf6465dfb24c4bc2ef00
kernel-rt-debug-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
2bae5de2733341e8ae12f4f0ee969fac2d108d977898196276c97acef486a544
kernel-rt-debug-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
0659314a6f21c051ddc70aaac21c744c84bbd3ee79324d9cd8f63d68b43a90d1
kernel-rt-debug-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
7a2333a7b531b60da3f5bccf06897798f67f859911183f627c994ca49d0d74f0
kernel-rt-debug-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
c3011279e4e4898e4cfc91e5c0dda8b355f934a49d40275bd757e97faa2c87e8
kernel-rt-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
2a65d0b572d8b1c5d785424854a314aa0106e65d52e57f327be144ceb1fb955c
kernel-rt-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
c785118454a0725cad5b48f0163e8f67e6015d1fe8b75d4ee0000473779c8810
kernel-rt-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
1f580e31f2eabb98c9c86eaa7afd295e34d4c2b9ae448672fb17633b7bac9cfa
RLSA-2023:1469
Important: kernel-rt security and bug fix update
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460)
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460)
rocky-linux-9-x86-64-rt-rpms
kernel-rt-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
568dd09bab56394023fe0306b75bd37ea022a6d953d67a0a684d0e3c09a062eb
kernel-rt-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
dfabf38ea0e692f2e9e79032718f856947f6c79322302ba7b3e71da432b89a43
kernel-rt-debug-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
e1262ce076bfef2e64439348d0994b007be9dca1826f412e41ef1ae0ad9a65be
kernel-rt-debug-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
68994eab42c1b61e40fb586c0db25b9e1e0120c20ef4cda336eed835530e3750
kernel-rt-debug-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
feeb3cbbbb86b394efd4f1c725cf5196c615e5d95da7d65ac35df62e428f9c09
kernel-rt-debug-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
16b5584dc7bfa322f30bb2365392e97001f24356dd5550f329c994c5e13157d4
kernel-rt-debug-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
7ee7488f2e287486a29fef3c09b5ee84f602f58a61cea14ced64f4c07483bb99
kernel-rt-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
557f3f925cb9019b8d559ef7d0c76d910b62d338d424a57306781e6985118e7d
kernel-rt-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
2825674e7d7e26a5e1d90766a5094258be1f1cfb5e3ff2360f0786df2c25c919
kernel-rt-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
5df494c468c21ba95a1e5d4330dfcf63dbcbb2d36f140cba6541b812c3f7ab5b
RLBA-2023:2149
rteval bug fix and enhancement update
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
Copyright 2023 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
rocky-linux-9-x86-64-rt-rpms
rteval-3.5-7.el9.noarch.rpm
04313b632c9cadc83f364224fade45c1340ef4995001f1f943d2be4b1ec5819f