RLBA-2022:7934
rteval bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
none-rt-rpms
rteval-3.4-1.el9.noarch.rpm
779ef99730b0722c8085dd7bfeb5caa7c3fc469c860fe8070cc6f73ba2ae964c
RLBA-2022:8321
tuned bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
none-rt-rpms
tuned-profiles-realtime-2.19.0-1.el9.noarch.rpm
fb0dbba6e33e15cead237638bb3ba2217f1f97dad6d226fbf28ddc5b6f256016
RLSA-2023:0300
Important: kernel-rt security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959)
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964)
* kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139)
* kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945)
* kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077)
* kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863)
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z1 Batch (BZ#2141817)
none-rt-rpms
kernel-rt-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
a7e1f3a73355138f0b833a118d6b89658f74d299cfa39c77f8a259395a7330c3
kernel-rt-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
5b68b98ea60d1532352676df69dd5f01bb4091a19159f80b4987be94ad3f9d5e
kernel-rt-debug-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
b3a01fa3e91d415b63e0da93758d281b8f25a549dc982bb9cad82a17be557220
kernel-rt-debug-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
46b42686c27706db3766e029fe5b849642652dd85ca7f4c7e8ccffb8ee5ad4c4
kernel-rt-debug-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
3f1d53fb45a4edb3c5a2ae633202b7d9637faa9fb0c6d6cc8f4247124264c836
kernel-rt-debug-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
1090f4e8d8356909d3e656f774eb05ac4b44af0bc3e9bb37ed084eb42bd15f79
kernel-rt-debug-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
9988382bde8954cac0c0b91da17ce38b528b25465fb25b642aa9a029fd577d49
kernel-rt-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
1c5864022ae27f7f2f238959bbf5eb754d939c3064c782c20e02325a514c68c5
kernel-rt-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
c8fcbfdcf00d9e0b594bb22083bcfea58004e2009c316e66b776657e9bd58831
kernel-rt-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm
faa845cb72002e6899eee20b282e5859dfb66fd9180e99f0287e3a39a914bb30
RLBA-2022:7936
realtime-setup bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
none-rt-rpms
realtime-setup-2.2-6.el9.x86_64.rpm
09d1e8c58237d226f48dcd7ea1859255908739b2bd44891cb9c2200a7737ac18
RLBA-2022:7939
rteval-loads bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval-loads.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
none-rt-rpms
rteval-loads-1.6-1.el9.noarch.rpm
d90521c5eadf3f090373ef007bc30c919b714cf597c400efd189542cc7de73bb
RLBA-2022:4000
new packages: tuned
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
none-rt-rpms
tuned-profiles-realtime-2.18.0-1.el9.noarch.rpm
ed91e68f132251d7141dc5bfc1e2dce751baa2c78e5bdc056f5bb94c87a0c243
RLBA-2022:2289
new packages: rteval
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
none-rt-rpms
rteval-3.3-4.el9_0.noarch.rpm
019729970d7bac6e9b27d4ff0ef6c06cafce8fb43a87d71ea684d81b00c55de0
RLSA-2022:7319
Important: kernel-rt security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* posix cpu timer use-after-free may lead to local privilege escalation (CVE-2022-2585)
* Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update RT source tree to the latest Rocky Linux-9.0.z4 Batch (BZ#2123498)
none-rt-rpms
kernel-rt-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
1570608c147f1bceb30c12dd70e1bed9986a9771583b13abc7dee921e7e321b3
kernel-rt-core-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
94f9765002871587cca51495c1807768f1d234a29c66990956100da4e383bfc5
kernel-rt-debug-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
9a99253366eb8a45a022e8083f6808c7ab4c0de9ecb8e395e236dedd226b6c9b
kernel-rt-debug-core-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
9df5272ef01d3ffe7d928bf002166b87675d6f0615403e2953e32349e1ca9349
kernel-rt-debug-devel-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
6c6524ca49db45ea02ff061d078fbd347016287c4836586c3f8a6a8887ba8c66
kernel-rt-debug-modules-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
9019fce735ca80632f4a2d67bbb38b7107d6e274f38ce95dd1c48294e5c32c1e
kernel-rt-debug-modules-extra-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
29ad53dabb2a64afecd622ede67d40dbb923af53cd25ba74feec37499879ecd9
kernel-rt-devel-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
76db4e4e8a1adb606c23a2d2b11b2d9d78dbc94065190c04f99edaeeccd0ecc0
kernel-rt-modules-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
b22cdb879491b78106f353d901e84198a7230517a9f1bc48b43fd4f35d513cc7
kernel-rt-modules-extra-5.14.0-70.30.1.rt21.102.el9.x86_64.rpm
8d1a0adcd9f9957f835b585877859b64d40456bea25a02861633f8498173c163
RLBA-2022:2295
new packages: realtime-setup
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
none-rt-rpms
realtime-setup-2.2-5.el9.x86_64.rpm
493ce016ae51a35e2c801ee946b7f1a3d50cf12400b5331464bcda19c90d7e93
RLBA-2022:2296
new packages: rteval-loads
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval-loads.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
none-rt-rpms
rteval-loads-1.5-1.el9.noarch.rpm
5cee27bbfdba57b9dab2488c3dd4e6d11bc7fe811e8b52b5d5d19b04fe0554d1
RLSA-2023:0979
Important: kernel-rt security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564)
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378)
* kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379)
* kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179)
* kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463)
none-rt-rpms
kernel-rt-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
7b3306e40d0eb276b81736e5b4d0a090b32e7428669108e3a9b5e9e6aaad5464
kernel-rt-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
d982083ee4ad4d679065f00f97454fe4d98fa099b0c48fe7b43f336383a843f1
kernel-rt-debug-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
604d8762e724e8a645b855749d0e0e9356fece859c97bf6465dfb24c4bc2ef00
kernel-rt-debug-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
2bae5de2733341e8ae12f4f0ee969fac2d108d977898196276c97acef486a544
kernel-rt-debug-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
0659314a6f21c051ddc70aaac21c744c84bbd3ee79324d9cd8f63d68b43a90d1
kernel-rt-debug-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
7a2333a7b531b60da3f5bccf06897798f67f859911183f627c994ca49d0d74f0
kernel-rt-debug-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
c3011279e4e4898e4cfc91e5c0dda8b355f934a49d40275bd757e97faa2c87e8
kernel-rt-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
2a65d0b572d8b1c5d785424854a314aa0106e65d52e57f327be144ceb1fb955c
kernel-rt-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
c785118454a0725cad5b48f0163e8f67e6015d1fe8b75d4ee0000473779c8810
kernel-rt-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm
1f580e31f2eabb98c9c86eaa7afd295e34d4c2b9ae448672fb17633b7bac9cfa
RLSA-2023:4378
Important: kernel-rt security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090)
* kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788)
* kernel: KVM: x86/mmu: race condition in direct_page_fault() (CVE-2022-45869)
* kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c (CVE-2023-0458)
* kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Rocky Linux9 rt: blktests block/024 failed (BZ#2209920)
* Backport pinned timers RT specific behavior for FIFO tasks (BZ#2210071)
* kernel-rt: update RT source tree to the Rocky Linux-9.2z2 source tree (BZ#2215122)
* kernel-rt: update RT source tree to the Rocky Linux-9.2z2b source tree (BZ#2222796)
none-rt-rpms
kernel-rt-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
d5d3e0ee745dfcbb9dbc6a773cfafbfd49c4e4c06db98f3b1cc381bffe7b5547
kernel-rt-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
5f413a505a29ea03c4792323b3c27ac9fbafdfd0b1e2669909109b64b76c8660
kernel-rt-debug-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
a0c3bb9c922ec87c324c4df02011fabb0b8eaf2b8b4a324073c27d5fe278ab36
kernel-rt-debug-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
8779a970a4895eac8324a6af97baa666e9d65db219632a3bc390017e03317bd0
kernel-rt-debug-devel-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
0984051db85dcd3f4d9f079cf27fcbec7c44c9058880bde94d32ada3dc352243
kernel-rt-debug-modules-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
68e66d8eb309b91153bbbbbef50355d764a918699f3ab8d54036f1bb7558e7b8
kernel-rt-debug-modules-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
07e68a8d61796b63fa3a08eca1b8568a1db32ab531f5e50c9e6ab5b78371dff2
kernel-rt-debug-modules-extra-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
1a0ca2666a8da6628db0d92f25a4a15e38c4c4550ca1fc7b1360b3c14203a4fe
kernel-rt-devel-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
29942eecd8c51d51404ef8b5da0374f4eaaa48cd7e3768aea3b3a540a1bd8e05
kernel-rt-modules-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
e0715d8df24665fba635bb39c814e94e065d3cabdff39ee50a1eb060cb62d028
kernel-rt-modules-core-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
34d09150036730776d065f2d8ca52183df1499d4f22388d6c638b335ec00c3d7
kernel-rt-modules-extra-5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
fc759ca2882b77c70138837d16791c0c4c023136c041173400214819488c57fa
RLSA-2023:1469
Important: kernel-rt security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel-rt.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744)
* ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266)
* kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460)
none-rt-rpms
kernel-rt-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
568dd09bab56394023fe0306b75bd37ea022a6d953d67a0a684d0e3c09a062eb
kernel-rt-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
dfabf38ea0e692f2e9e79032718f856947f6c79322302ba7b3e71da432b89a43
kernel-rt-debug-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
e1262ce076bfef2e64439348d0994b007be9dca1826f412e41ef1ae0ad9a65be
kernel-rt-debug-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
68994eab42c1b61e40fb586c0db25b9e1e0120c20ef4cda336eed835530e3750
kernel-rt-debug-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
feeb3cbbbb86b394efd4f1c725cf5196c615e5d95da7d65ac35df62e428f9c09
kernel-rt-debug-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
16b5584dc7bfa322f30bb2365392e97001f24356dd5550f329c994c5e13157d4
kernel-rt-debug-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
7ee7488f2e287486a29fef3c09b5ee84f602f58a61cea14ced64f4c07483bb99
kernel-rt-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
557f3f925cb9019b8d559ef7d0c76d910b62d338d424a57306781e6985118e7d
kernel-rt-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
2825674e7d7e26a5e1d90766a5094258be1f1cfb5e3ff2360f0786df2c25c919
kernel-rt-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm
5df494c468c21ba95a1e5d4330dfcf63dbcbb2d36f140cba6541b812c3f7ab5b
RLBA-2023:2149
rteval bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section.
none-rt-rpms
rteval-3.5-7.el9.noarch.rpm
04313b632c9cadc83f364224fade45c1340ef4995001f1f943d2be4b1ec5819f
RLSA-2024:2758
Moderate: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation (CVE-2023-6240)
* CVE-2024-25743 hw: amd: Instruction raise #VC exception at exit (AMD-SN-3008,CVE-2024-25742,CVE-2024-25743)
Bug Fix(es):
* ffdhe* algortihms introduced in 0a2e5b909023 as .fips_allowed=1 lack pairwise consistency tests (JIRA:Rocky Linux-27009)
* mm/mglru: fix underprotected page cache (JIRA:Rocky Linux-29235)
* [EMR] [TBOOT OS] SUT could not go to S3 state with Rocky Linux 9.2 Tboot OS One CPU return -16 running BUSY (JIRA:Rocky Linux-29673)
* system hangs completely - NMI not possible (JIRA:Rocky Linux-30678)
* ice 0000:6f:00.0: PTP failed to get time (JIRA:Rocky Linux-30110)
none-rt-rpms
kernel-rt-5.14.0-427.16.1.el9_4.x86_64.rpm
70d80881dded2b5c0c29b2e275198e56d7d90778a29d6e8e80c3a1f9d49baa78
kernel-rt-core-5.14.0-427.16.1.el9_4.x86_64.rpm
4d3229f8d3cda4d33fdca9db011aecb1d98188cfff90c67c3033b24583476944
kernel-rt-debug-5.14.0-427.16.1.el9_4.x86_64.rpm
4e359e17e5c1504dd9b3636da82becf748bb9547a4337ed965ba34d89f2ef516
kernel-rt-debug-core-5.14.0-427.16.1.el9_4.x86_64.rpm
6f6ed98c2a4d659ecdf3828b67596bc25738554244eecaa46be4e6eb919fd335
kernel-rt-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm
7e654bdc342f15d6b2d2010b9b7cbf4f518f7dfbdfecf676a817a1cfe9e01120
kernel-rt-debug-modules-5.14.0-427.16.1.el9_4.x86_64.rpm
d3a47c7ea53e2f560bd4edff5197731dbd09f5b06044e82ccb88a7f0b8544bde
kernel-rt-debug-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm
222c5f116b1d0ffd47ca4ed99cb52d3f25627d0f65a9d795413de86ebce3cd57
kernel-rt-debug-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm
c5052c437baec8ccf49155185727ef2e31a44da27c02d685a18aa42459cdd3fb
kernel-rt-devel-5.14.0-427.16.1.el9_4.x86_64.rpm
34a2d319e68ce70e54bc4466c59604838c32ca2350ce2a5fc9afbdb0e1f6cfab
kernel-rt-modules-5.14.0-427.16.1.el9_4.x86_64.rpm
d29393987377e172a291c42585d37a322efa398bcccf6becc18a9a11a617ec3c
kernel-rt-modules-core-5.14.0-427.16.1.el9_4.x86_64.rpm
67e01bf2fbb18eccb8074dc1f56b414b9b474be3cb5a0ae9954020bfe71ced46
kernel-rt-modules-extra-5.14.0-427.16.1.el9_4.x86_64.rpm
94e8a947c96bdbe305e9a2cb815e0e3b6c9ae777872a0f1c26ab4313d7115c0c
RLBA-2024:2111
rteval bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
none-rt-rpms
rteval-3.7-7.el9.noarch.rpm
18d4e61ed3779f3bd43d908cd4e6619ee94ca8b8acd15d1e69e6f27ef97c47e5
RLSA-2025:15011
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.39.1.el9_6.x86_64.rpm
4114f16336f06e2579257afd1068497ce86f9037a537175e45c4640bbdd7dab3
kernel-rt-core-5.14.0-570.39.1.el9_6.x86_64.rpm
f20ae937819251c8dcdf1fd645ce7bad5b4a0443ecb5cf6d6093c7197bc09025
kernel-rt-debug-5.14.0-570.39.1.el9_6.x86_64.rpm
94580ad1f752c102c5603920e01da71798bd3b80a39569a665487db9a26800b5
kernel-rt-debug-core-5.14.0-570.39.1.el9_6.x86_64.rpm
d26672ea5b5a353792513c20193e16d46e86dbb6932b30a29a13a0dafee86e71
kernel-rt-debug-devel-5.14.0-570.39.1.el9_6.x86_64.rpm
447eff72bd37253399f07997cca075799d068f90fa6c6b309dfd8efb02ed9266
kernel-rt-debug-modules-5.14.0-570.39.1.el9_6.x86_64.rpm
4c0aece14389c8fb7cbcc40811a8bed03dd1295f235da7b93bedfa2f85390b66
kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm
8f39f412ab7280dadefac979d10f579d253afdb26254d1082b50bea4ff5b81c4
kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm
a8d1b2e19fc70704d7bcd7070b909bc45f144a908833843ebdcf6a1aab90861f
kernel-rt-devel-5.14.0-570.39.1.el9_6.x86_64.rpm
4f5d5bedf5b9d5a0858937c25e1bf65592a6e40adf34119a6a2f7d9c0ec1d2a6
kernel-rt-modules-5.14.0-570.39.1.el9_6.x86_64.rpm
a19e5f8b7f2bc5d45d228528d6302b2bca2b669bad84adb6ac3b75aca09a9a50
kernel-rt-modules-core-5.14.0-570.39.1.el9_6.x86_64.rpm
96eb4b43eaeeec6a160308eefad3a4adf6e591d30b163d5025f347869b886384
kernel-rt-modules-extra-5.14.0-570.39.1.el9_6.x86_64.rpm
15edf65baa612a806cd09241a3f5a776fe08df82e50b5322e59bb146b12d27dc
RLSA-2025:15661
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097)
* kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
* kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.42.2.el9_6.x86_64.rpm
4ed50a4a15aa570e3b4ac96e278d42855089b05c0659802c89b5bbf9371100cb
kernel-rt-core-5.14.0-570.42.2.el9_6.x86_64.rpm
d4532d1613173888120cdfb42a460d6206d776470eb23e165258601b18781001
kernel-rt-debug-5.14.0-570.42.2.el9_6.x86_64.rpm
b30d2808dfdb74dfa69ce091facf1f64b52e86e1be7a604cd35129ef008529da
kernel-rt-debug-core-5.14.0-570.42.2.el9_6.x86_64.rpm
a01ed106b60ab60dd64f13629d2ad0a4962e91a6e40de530d19a4a1017c8e26d
kernel-rt-debug-devel-5.14.0-570.42.2.el9_6.x86_64.rpm
579a9058479d06d4fcb27a12b6f35c8be7320a437b51b47803db7a51f0184b18
kernel-rt-debug-modules-5.14.0-570.42.2.el9_6.x86_64.rpm
a59f9e35ed7a46dac5785efdf4d35494ec6ee99a5ef24f70a9ef984509808e5a
kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm
b40800c5d015c1783a69b7bdcae260432223cded2fd6544c056c02f84ae5d96e
kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm
4b5833c9d597a72ab1b9db4e72fad588f2fd2e7ad4536b96f577b61d470e7af9
kernel-rt-devel-5.14.0-570.42.2.el9_6.x86_64.rpm
89fbbe5507820f0e5db406deebaf11f1fb1982f6d705ecff678134dbe3a4f75e
kernel-rt-modules-5.14.0-570.42.2.el9_6.x86_64.rpm
ef5064d7f7544151b3021087c6a63306addcbedda4cd653201b39ea4bf89bf7b
kernel-rt-modules-core-5.14.0-570.42.2.el9_6.x86_64.rpm
d30e56aed8d31cc19c72537687fb17d7266e0d6bfc2fb3e0a18de8ceff303139
kernel-rt-modules-extra-5.14.0-570.42.2.el9_6.x86_64.rpm
f49fafac1202e42f9040b87776e4fd7dfacdbe5cbe630421250ac3153247ff54
RLSA-2024:3619
Moderate: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
* kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() (CVE-2024-26993)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.20.1.el9_4.x86_64.rpm
d92231ce316aeb6bdf33786809b6bcecfe8c3699a2a45be24845e72b17e62390
kernel-rt-core-5.14.0-427.20.1.el9_4.x86_64.rpm
90be14197200f67342e8a922cc648f98e879d5534644d620c4f3eb09bbbd063a
kernel-rt-debug-5.14.0-427.20.1.el9_4.x86_64.rpm
0b52e1dd9e8ae3bd2f22e7d91c32363beac455ecf9c9d9b58cb94407c9e6f88f
kernel-rt-debug-core-5.14.0-427.20.1.el9_4.x86_64.rpm
9d9eb3ae53f5600a27d9ffbf7ff96a085a754432afbc9adc844986e5c171e0a0
kernel-rt-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm
c755d28b0edff995e62a5c512d669bad1f1357767d7d4e125069648520424610
kernel-rt-debug-modules-5.14.0-427.20.1.el9_4.x86_64.rpm
37dfa3970d6b6c842798864c48b8faa9b078d538882aff16514045e161c016af
kernel-rt-debug-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm
ff4e281020412bbcb919fc44fb75b5a30458938279238d4315bd49755fcada85
kernel-rt-debug-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm
079b63845682699ca37cd6147b7b4aae2fd15820c0aa470f576363f6bf03f7bd
kernel-rt-devel-5.14.0-427.20.1.el9_4.x86_64.rpm
dba23feb84368132ec94a1a021a8ca0c068dda334c67c366a50cd5bd1306260c
kernel-rt-modules-5.14.0-427.20.1.el9_4.x86_64.rpm
d7d2c81c0a721b09cb8c07d0449ea6e2bb77ef08ca603c69a73781f5709483c0
kernel-rt-modules-core-5.14.0-427.20.1.el9_4.x86_64.rpm
06143ab57e8f4302ea5cb196debf9433e65801613115cc4106c2c22fd423c691
kernel-rt-modules-extra-5.14.0-427.20.1.el9_4.x86_64.rpm
ed6954567202825fb678edeeec58675575320efcf6172c9ea98ad09d2bbc75cb
RLSA-2025:16880
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.49.1.el9_6.x86_64.rpm
683bdd29433b53e8012e4060061a01ac0eba6bc1865694df59e10e81437da0fd
kernel-rt-core-5.14.0-570.49.1.el9_6.x86_64.rpm
9a6c0df56cf5092b3ec95b9b8e2131fc9b0ea7879d754bb0e091f4a9b10442d9
kernel-rt-debug-5.14.0-570.49.1.el9_6.x86_64.rpm
4812e5f799b917cb73341aff50dc1f69d87439675f59d7808dce4fa48caa0cc9
kernel-rt-debug-core-5.14.0-570.49.1.el9_6.x86_64.rpm
405af1bc8a6f1a5b95d41e60b8fc7ce9566798f4beaf248407a6019b4ca74547
kernel-rt-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm
54a0d7151958ca075a31f97c525afef5e5241ded61b4a213a255a93ee18de07c
kernel-rt-debug-modules-5.14.0-570.49.1.el9_6.x86_64.rpm
0dfde1173da3dc631b128c063dd14f0f9f2d3980e69b42e42a87bc74a7802d54
kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm
436c2e86b5043cd468c5870e1899ed2a130ad716f9429a305def2cc2a9801984
kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm
f8d2243331488cdacbb060cf996e0d4d55537bc249e88ca0289d67f9e2a3c39b
kernel-rt-devel-5.14.0-570.49.1.el9_6.x86_64.rpm
98946a5a23de4a9a935bce346bd14c083bae68f0803b6ad116b61762fbf57386
kernel-rt-modules-5.14.0-570.49.1.el9_6.x86_64.rpm
deed9e612d46560214ce98279ca0673c8c4d8a1a2eeedad500e0f1a1c62dc848
kernel-rt-modules-core-5.14.0-570.49.1.el9_6.x86_64.rpm
8efc5cb09647e9d653b12c1de01efb1fdb9aa9d5488f086c0d71bbec796687a8
kernel-rt-modules-extra-5.14.0-570.49.1.el9_6.x86_64.rpm
39d543d130b3f7eaf1d86699d262d551161f6d76ae78257920527870e75ffdf1
RLBA-2024:3983
kernel bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix(es):
* [DELL 9.4 BUG] - Screen shows garbage sometimes [rhel-9.4.z] (JIRA:Rocky Linux-36534)
* cifs - Unable to mount CIFS shares after upgrading to Rocky Linux9.4 (JIRA:Rocky Linux-36743)
* [Azure][Rocky Linux-9][MANA]System crash at skbuff when set mtu=100 [rhel-9.4.z] (JIRA:Rocky Linux-37622)
* selective backport from perf upstream v6.8 to fix AmpereOne and Nvidia support [rhel-9.4.z] (JIRA:Rocky Linux-34991)
* [Intel 9.5 FEAT] [SRF] performance: hwmon: (coretemp) Fix core count limitation [rhel-9.4.z] (JIRA:Rocky Linux-35447)
* CNB95: dpll: rebase DPLL to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-36572)
* ice: IRQs being moved to isolated CPUs and causing latency issues [rhel-9.4.z] (JIRA:Rocky Linux-38512)
* Bluetooth device disappears from the device list after a few minutes with AX211 [rhel-9.4.z] (JIRA:Rocky Linux-38524)
* deadlock on dfs_cache_refresh [rhel-9.4.z] (JIRA:Rocky Linux-38904)
* [DELL 9.3 BUG]Unexpected message "integrity: Problem loading X.509 certificate -126" occurred on boot screen. [rhel-9.4.z] (JIRA:Rocky Linux-39933)
* [rhel9-rt-debug] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 ( clocksource_mark_unstable) (JIRA:Rocky Linux-9296)
none-rt-rpms
kernel-rt-5.14.0-427.22.1.el9_4.x86_64.rpm
25ca006830a2a4c84206093b7091c98e3139ac4007c51ca139d1c0189a60bf5d
kernel-rt-core-5.14.0-427.22.1.el9_4.x86_64.rpm
301e65823f8caf28c89022205f76e0e5de20f0f9161123bbd8a3d46f9c0c46c2
kernel-rt-debug-5.14.0-427.22.1.el9_4.x86_64.rpm
fefe6204602302f82f04ab3b999e7ec17c02a660f3e6dc1c3dd0370763791278
kernel-rt-debug-core-5.14.0-427.22.1.el9_4.x86_64.rpm
93a62e9eb1f66b2627941d81ac8cde4e9d58f4d8b8bb4824cd26ce4edf8d9c11
kernel-rt-debug-devel-5.14.0-427.22.1.el9_4.x86_64.rpm
1e2d275a9409cb676f2d4a1f4680d40c3b7ac21fe05066688586b46801d789f3
kernel-rt-debug-modules-5.14.0-427.22.1.el9_4.x86_64.rpm
f00769dca2f72ddcc8bf793c4f56942f014d78615e899274d69b858c0b1ffeb9
kernel-rt-debug-modules-core-5.14.0-427.22.1.el9_4.x86_64.rpm
b00fdec7a57dc8223d3d4994b030f19fa62579c25e285a91e83d929577f96e7b
kernel-rt-debug-modules-extra-5.14.0-427.22.1.el9_4.x86_64.rpm
7b0ce75125b0ebcc0833b45e19f868e5ad05b9a6e978b8f71f982f31ba3deade
kernel-rt-devel-5.14.0-427.22.1.el9_4.x86_64.rpm
0d2a7e5c3af56d3dc075b376e7a6a7b33b8a261349f85af6e6d0b73b23bcddb9
kernel-rt-modules-5.14.0-427.22.1.el9_4.x86_64.rpm
7f3cc86c2d07d077c1e660b1ec6db7a717a89a57ae1003dcfe6390e7160af58c
kernel-rt-modules-core-5.14.0-427.22.1.el9_4.x86_64.rpm
786950035b982c0328b13f9f37a349ad6dee64727e175aa795d32767aeedc464
kernel-rt-modules-extra-5.14.0-427.22.1.el9_4.x86_64.rpm
f1a2842ba043c2b75ae455330f684e421bf4a99040e6a17c04219bda29622a69
RLSA-2024:4349
Moderate: kernel security and bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626)
* kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801)
* kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974)
* kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393)
* kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667)
* kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870)
* kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960)
* kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400)
Bug Fix(es):
* cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux-28943)
* BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux-35672)
* [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux-36220)
* [Rocky Linux9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux-36687)
* ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux-36716)
* CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux-37641)
* IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux-37669)
* [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux-38252)
* Isolated cores causing issues on latest Rocky Linux9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux-38595)
* [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux-39083)
* [HPEMC Rocky Linux 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux-34953)
* bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux-43272)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.24.1.el9_4.x86_64.rpm
a9174a0f528eb4d45aae21e8c8631b8694d0392b741d53015f2f69c3b709bbb7
kernel-rt-core-5.14.0-427.24.1.el9_4.x86_64.rpm
07e28e228ca42da8399586b0311b5b5744c0c33abd5f4ec49fd6f3472ba6a198
kernel-rt-debug-5.14.0-427.24.1.el9_4.x86_64.rpm
8d6f0caec0b845254c495dd7da16f18b5bdeeaab1c84c311c89062a941ec83ac
kernel-rt-debug-core-5.14.0-427.24.1.el9_4.x86_64.rpm
58ca93f2f3f4c92055b5fcdab990c9b3a96c76eca1c985005157bf0258ec7e02
kernel-rt-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm
99ed36d3a9d033ac86a0c63c067b53df69eb858d73bb47a24086ce4113765118
kernel-rt-debug-modules-5.14.0-427.24.1.el9_4.x86_64.rpm
d75fcac15419efd90b5e41cc502067b853b832dc2eb9f8203636babf2f0d70a7
kernel-rt-debug-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm
29441c63826412ac7c8d5c569fbe17a73fbbf35792e4f63d9b57f6354272d66d
kernel-rt-debug-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm
40e6f1559547f31ce75a05a97a0996c8a05628b5ee2b5150486511819c281605
kernel-rt-devel-5.14.0-427.24.1.el9_4.x86_64.rpm
2a34f5676003bacbf326e669bf3c5c579b5f7bbe40a304da574dea7017cba57f
kernel-rt-modules-5.14.0-427.24.1.el9_4.x86_64.rpm
b0f0d1e53845396a45e98864ff722034a6a857b5db2524f8314ea2c3146838d2
kernel-rt-modules-core-5.14.0-427.24.1.el9_4.x86_64.rpm
ba9979ae8abb1c2f4048d30ad50666ac51015dd9b63b5805d91b3a86b81abd36
kernel-rt-modules-extra-5.14.0-427.24.1.el9_4.x86_64.rpm
758d52ffd3762996472a39ab40d9397f5acf21b108448d19497b59c3f1baec67
RLSA-2024:4928
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458)
* kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
* kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737)
* kernel: dm: call the resume method on internal suspend (CVE-2024-26880)
* kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852)
* kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982)
* kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046)
* kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030)
* kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857)
* kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907)
* kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885)
* kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809)
* kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459)
* kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924)
* kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952)
* kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743)
* kernel: epoll: be better about file lifetimes (CVE-2024-38580)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.28.1.el9_4.x86_64.rpm
6597acd529559ff0318c853933258424ef2c933ca4197c94b22d8db9a801a363
kernel-rt-core-5.14.0-427.28.1.el9_4.x86_64.rpm
ee6d901d13863dfafe077c5813ce838d54fd63508c15350899b6dfb680567795
kernel-rt-debug-5.14.0-427.28.1.el9_4.x86_64.rpm
8347e4d55ee37bd50a6438b5f5670fd416428274616383497a70886228585642
kernel-rt-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm
e85a0fdc620ce0b82d5df2063d2897814df1c3ac395b617e1b246d40a9637c11
kernel-rt-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
bfcd78e3c238120fee226ad73f592d6edbadfb2476e7379ba42be1a45684a48d
kernel-rt-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm
468feeafd0791f035ec84788abd77ddfb0591f722a7b747c38f18746e8725b0e
kernel-rt-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm
ceec0fe7ba5b8a9f6f1c1f0bd5cba2743d404f046c8b49d1257a9f41d98e0a11
kernel-rt-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm
de5b73afe196f9df850867f536713e679290f1e75e731aa063a86444d42beeb0
kernel-rt-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
305c377f41a7bb3d8830c302c9e2b786d7cb2a8ff72d772ba2a272f42ff7170b
kernel-rt-modules-5.14.0-427.28.1.el9_4.x86_64.rpm
ad4f43f652945d46557581000c331e2075f6a3215d39860be3deda5bd00c6b3a
kernel-rt-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm
fb0fec46408b828767322aefb4026da26bd8fd7a3d9d190dca6feb208f5f13d8
kernel-rt-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm
80e5f9b471c0dd173d060a69a59de1ab5597d0fc54f1a232a5e9a68c1a04b9ac
RLSA-2024:4583
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: TIPC message reassembly use-after-free remote code execution vulnerability (CVE-2024-36886)
* kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() (CVE-2021-47548)
* kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg (CVE-2021-47596)
* kernel: vt: fix memory overlapping when deleting chars in the buffer (CVE-2022-48627)
* kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock (CVE-2023-52638)
* kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index (CVE-2024-26783)
* kernel: net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map (CVE-2024-26858)
* kernel: netfilter: nf_tables: use timestamp to check for set element timeout (CVE-2024-27397)
* kernel: nvme: fix reconnection fail due to reserved tag allocation (CVE-2024-27435)
* kernel: net: ena: Fix incorrect descriptor free behavior (CVE-2024-35958)
* kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)
* kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure (CVE-2024-38543)
* kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. (CVE-2024-38586)
* kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 (CVE-2024-38593)
* kernel: netfilter: tproxy: bail out if IP has been disabled on the device (CVE-2024-36270)
* kernel: octeontx2-af: avoid off-by-one read from userspace (CVE-2024-36957)
* kernel: blk-cgroup: fix list corruption from resetting io stat (CVE-2024-38663)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.26.1.el9_4.x86_64.rpm
7f5d3c036e428cbb445de91afe41f0bcfa45fb61821355a30ba3c292dbbf4992
kernel-rt-core-5.14.0-427.26.1.el9_4.x86_64.rpm
a95d4186fe85a446e33d2c2929b2a00e56a2a4eea7f71f112180fd47c44f3f08
kernel-rt-debug-5.14.0-427.26.1.el9_4.x86_64.rpm
baacfb7ff8489abb8f778f2d3a387946074de99a51dee6a090b09ef00ed515c5
kernel-rt-debug-core-5.14.0-427.26.1.el9_4.x86_64.rpm
b351d7ec491186a56aa51d343cdb755de7db3e54497ba80a9b8c178d8777b5b6
kernel-rt-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm
c943b88caf09a37adec94a93e2ff293de4e877685304d06ba6136f16355c9bcd
kernel-rt-debug-modules-5.14.0-427.26.1.el9_4.x86_64.rpm
066321f33eff9258cf91ed85d693603f0115e3141f592921b7c844a0fb7fc580
kernel-rt-debug-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm
6629049e182ffd091d78fb74524be611b4cf765393e2685329bace66e8ebd4bd
kernel-rt-debug-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm
7a6f3b77e207a7e4b2e6987e5aab06f2eed7fa396d2769369a56cd88c96bc8cf
kernel-rt-devel-5.14.0-427.26.1.el9_4.x86_64.rpm
5f71ee5057542ffe26d8fa134c8cb95b4f77db5b9fff1873bed2b4d6c3eb207e
kernel-rt-modules-5.14.0-427.26.1.el9_4.x86_64.rpm
7676dbc7c56850d375bd4e59980e4889c183b87b1f7fa47d4f421e000fa4cd15
kernel-rt-modules-core-5.14.0-427.26.1.el9_4.x86_64.rpm
2eb4fa76976b5a6d7b530a59ce31b02cc226072e134b78dd95c860ab5b7489e1
kernel-rt-modules-extra-5.14.0-427.26.1.el9_4.x86_64.rpm
b0524367e74887607d0b320457511d16794e0266dabf3d35c5bbe95479e4630b
RLSA-2024:5363
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Errata Tool Automation could not update the description because it is longer (4803) than ET limit of 4000 characters. (OSCI-6058)
Please update the description manually.
none-rt-rpms
kernel-rt-5.14.0-427.31.1.el9_4.x86_64.rpm
442c4e26f463b2d68f164c61bc39904edd9eefe6a41c497af86815ec5482b80b
kernel-rt-core-5.14.0-427.31.1.el9_4.x86_64.rpm
42c9794f26351c47cc4b1e9dd139e2d8e894f2da06b9b1d978a0772b5f1962db
kernel-rt-debug-5.14.0-427.31.1.el9_4.x86_64.rpm
7559f699bb154d6e25d07741d8b1638dcfb740e048a2547c38d0a97da6701f38
kernel-rt-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpm
96e0bc3a76f35296bc3a97af4e942b13a69e72c9616aae0ca2fe3cfe0e98b8b3
kernel-rt-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm
851859408cddc6523d7bf9ae93832bbaf4ce8fb139678c24fd6941e56b0c5f44
kernel-rt-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpm
a02653173845bd7cbd3b90c5fc082f3fe8fdbfafecedaaf22a52309215cf400c
kernel-rt-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm
ab16ba57529b003f7023fa7a853817f36e35d8ac9e3088cbb0a845bba140c27b
kernel-rt-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm
2a309e1484f05559555407d1a411d677eda78c5701ab67767c1233d5d78d2634
kernel-rt-devel-5.14.0-427.31.1.el9_4.x86_64.rpm
db08c3f2518d78ff1e31e271424fbdae70afea806413f2e158c3c705edceb87b
kernel-rt-modules-5.14.0-427.31.1.el9_4.x86_64.rpm
cdf7758dd5be74827a29201dfc06fdacfae32fa366b0cb808089fe30f86f1141
kernel-rt-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm
b041df683c25879d32a9137873f57601061f3aabf2997ea9ab10ed4e0a3f0936
kernel-rt-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm
f40f3771cf1cd53e47619c6ca37ec0ca599014d51f9682b6c49daea70750dc0f
RLSA-2024:6567
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463)
* kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629)
* kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630)
* kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720)
* kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886)
* kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)
* kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791)
* kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797)
* kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875)
* kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000)
* kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801)
* kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883)
* kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019)
* kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619)
* kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979)
* kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559)
* kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927)
* kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936)
* kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040)
* kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044)
* kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055)
* kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096)
* kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082)
* kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096)
* kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102)
* kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131)
* kernel: nvme: avoid double free special payload (CVE-2024-41073)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.35.1.el9_4.x86_64.rpm
b0441d7dc998954f317e58d19a27a8aa0efea08eefe38f23b038b2b974c318f0
kernel-rt-core-5.14.0-427.35.1.el9_4.x86_64.rpm
1bb45a638c3a0ffc46b55c4b49230a74effa9a8c8e752a39dd69da2e31a9ed6a
kernel-rt-debug-5.14.0-427.35.1.el9_4.x86_64.rpm
17674faa9f5ff9e8def916fb99c6eb3497321dfec7dd577699cfe8ffde16c9d0
kernel-rt-debug-core-5.14.0-427.35.1.el9_4.x86_64.rpm
e6a1cdba584ee66646a5911a11e33bfbde715c49b078b019a6e4179e008b672e
kernel-rt-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm
8d289ca94947d14cc4627c108f5897eb74d31c2093e66ed8211a5b257241dfda
kernel-rt-debug-modules-5.14.0-427.35.1.el9_4.x86_64.rpm
16cdf89927dabbd96d551fa9a20a8710fce54100805e9a38d0ad3635d1172d82
kernel-rt-debug-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm
83b5a6c881ff642b5953fcd8be1d111fe5d8937d7d939c5c14295d3adc8ffc24
kernel-rt-debug-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm
47ac6c8cba80583aee0d0720f4d3b855c1a99685b7126eb892ef465b2ab6bb4c
kernel-rt-devel-5.14.0-427.35.1.el9_4.x86_64.rpm
40b552d119a369972427fa4322f1a1266594b75f541ee2ade42a4b6b8310103f
kernel-rt-modules-5.14.0-427.35.1.el9_4.x86_64.rpm
1e330f442cfbc1b4dd9edcb6739c28fdcd1eb8beaf0e7bdd9c6df865d436cc10
kernel-rt-modules-core-5.14.0-427.35.1.el9_4.x86_64.rpm
7d4f015e3b30fcb488e410da55ae8298818cad711f0d2c9be87b3e3ccf62ec83
kernel-rt-modules-extra-5.14.0-427.35.1.el9_4.x86_64.rpm
2edfa706cf36ba7262bdc7f905dc43147a7581744841ecc41830d9df236ce3b9
RLBA-2024:6133
rteval bug fix update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The rteval packages contain a utility for measuring realtime scheduler latency while under a heavy system load.
Bug Fix(es):
* Replace dmi information with info from execing dmidecode [rhel-9.4.z] (JIRA:Rocky Linux-34566)
* rteval cyclictest command line arguments broken when called as a module [rhel-9.4.z] (JIRA:Rocky Linux-47154)
* Replace deprecated optparse with argparse for rteval [rhel-9.4.z] (JIRA:Rocky Linux-47209)
* Examine how to change rteval to automatically make use of isolcpus [rhel-9.4.z] (JIRA:Rocky Linux-47211)
* Update rteval [rhel-9.4.0] to latest version upstream [rhel-9.4.z] (JIRA:Rocky Linux-47212)
* Upgrade rteval to use linux-6.6.1 as the default kernel for loads [rhel-9.4.z] (JIRA:Rocky Linux-47213)
* Remove upstream spec files from rteval [rhel-9.4.z] (JIRA:Rocky Linux-47214)
* Add rpminspect.yaml file to rteval to omit permissions inspections [rhel-9.4.z] (JIRA:Rocky Linux-47215)
* Remove dependency on python-dmidecode [rhel-9.4.z] (JIRA:Rocky Linux-47216)
* Refine the user interface on rteval for isolcpus [rhel-9.4.z] (JIRA:Rocky Linux-47217)
* rteval missing procps-ng dependency when installed in minimal environments [rhel-9.4.z] (JIRA:Rocky Linux-47240)
none-rt-rpms
rteval-3.7-10.el9_4.noarch.rpm
2d73209c70ca13b28731e4560c5eec02cc73d4625281774e7274f25266545c0f
RLSA-2024:8162
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Local information disclosure on Intel(R) Atom(R) processors (CVE-2023-28746)
* kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow (CVE-2024-27403)
* kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency" (CVE-2023-52658)
* kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (CVE-2024-35989)
* kernel: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47385)
* kernel: mptcp: ensure snd_nxt is properly initialized on connect (CVE-2024-36889)
* kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (CVE-2024-36978)
* kernel: net/mlx5: Add a timeout to acquire the command queue semaphore (CVE-2024-38556)
* kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked (CVE-2024-39483)
* kernel: ionic: fix use after netif_napi_del() (CVE-2024-39502)
* kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (CVE-2024-40959)
* kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush (CVE-2024-42079)
* kernel: sched: act_ct: take care of padding in struct zones_ht_key (CVE-2024-42272)
* kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error (CVE-2024-42284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.40.1.el9_4.x86_64.rpm
753c5e51a16cb572a8402ad3c63de2dd7b43f7dedc46c02311d56bfff3fc5af6
kernel-rt-core-5.14.0-427.40.1.el9_4.x86_64.rpm
2aabd8b3521aa7c632a9eb71c6ab07015732dffef22c6a7537b11506c86044b3
kernel-rt-debug-5.14.0-427.40.1.el9_4.x86_64.rpm
02eba91b9bd50b32f70d7cc3565557e082f538bf3a3ddac3f0287e69334c4e43
kernel-rt-debug-core-5.14.0-427.40.1.el9_4.x86_64.rpm
62cbb68cf3a28a7928e220494d0e59ee44b743d7f8af9f6ec8e22e585fb1cb80
kernel-rt-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpm
7083cbf3a13838eba37947f06c50c9479610e2c671eba6974e2374cb5e3f8aa8
kernel-rt-debug-modules-5.14.0-427.40.1.el9_4.x86_64.rpm
7fd43301b06f2fcffb76db2e43c37cef9766f930587ad205b30478e77e93036c
kernel-rt-debug-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm
702dd7b8aaad74ce888716521f0e7f7c48d3e27e3224d22b93fffb8571c134dd
kernel-rt-debug-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm
732675e3ea735bf2b8419c854fa462dccdae78d119fd4711a0cf48adb37bf31a
kernel-rt-devel-5.14.0-427.40.1.el9_4.x86_64.rpm
405e0081bddb7c83be73737a929ad354e62541a9965eeb859075ab8747b9250a
kernel-rt-modules-5.14.0-427.40.1.el9_4.x86_64.rpm
5d9e328b5ea7d271c7ae16feead7d1eba3080ff81708e0c388c8a0922d4b70fe
kernel-rt-modules-core-5.14.0-427.40.1.el9_4.x86_64.rpm
85279efe779dfb13535f9967fc692d3c8464c72a2e3395f4d1236e5187269cda
kernel-rt-modules-extra-5.14.0-427.40.1.el9_4.x86_64.rpm
c27a417d61eafd2f3a74929edeae7d9afd699953f12c880fa0ff2775ab2dadaf
RLSA-2024:8617
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* hw: cpu: intel: Native Branch History Injection (BHI) (CVE-2024-2201)
* kernel: tcp: add sanity checks to rx zerocopy (CVE-2024-26640)
* kernel: mptcp: fix data re-injection from stale subflow (CVE-2024-26826)
* kernel: af_unix: Fix garbage collector racing against connect() (CVE-2024-26923)
* kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del (CVE-2024-26961)
* kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)
* kernel: tty: Fix out-of-bound vmalloc access in imageblit (CVE-2021-47383)
* kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too (CVE-2024-36244)
* kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup (CVE-2024-39472)
* kernel: netfilter: nft_inner: validate mandatory meta and payload (CVE-2024-39504)
* kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CVE-2024-40904)
* kernel: mptcp: ensure snd_una is properly initialized on connect (CVE-2024-40931)
* kernel: ipv6: prevent possible NULL dereference in rt6_probe() (CVE-2024-40960)
* kernel: ext4: do not create EA inode under buffer lock (CVE-2024-40972)
* kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CVE-2024-40977)
* kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (CVE-2024-40995)
* kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (CVE-2024-40998)
* kernel: netpoll: Fix race condition in netpoll_owner_active (CVE-2024-41005)
* kernel: xfs: don't walk off the end of a directory data block (CVE-2024-41013)
* kernel: xfs: add bounds checking to xlog_recover_process_data (CVE-2024-41014)
* kernel: block: initialize integrity buffer to zero before writing it to media (CVE-2024-43854)
* kernel: netfilter: flowtable: initialise extack before use (CVE-2024-45018)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-427.42.1.el9_4.x86_64.rpm
67fe35cde20c4f205005a5845d7a54ed9f52111c5dd09fbe534af861e842c717
kernel-rt-core-5.14.0-427.42.1.el9_4.x86_64.rpm
f01426aebaa39a17841dcf2719fe82f20c1b844a934a199c5edb390aa48e4727
kernel-rt-debug-5.14.0-427.42.1.el9_4.x86_64.rpm
921256d9da44d29690febe431782aa8b911037bd31fb4c4b2ddb93e41dccd3bd
kernel-rt-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpm
bc4d2b8eb31a4d26aa22120b797dc8e472ab612f08497c46e93ed36dbfef2ed6
kernel-rt-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm
5814483e6caacb2175228953f29468f1c6fada67e66bd6a23f4a96dd541f6cba
kernel-rt-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm
c83ed5a40c532f78040356d6b848ab5a64df0350e71e606a3058acbf115514e9
kernel-rt-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm
0d583d28493d0eeb1a1f6dc9c10e4fd205e299dcf0930492e72ea548cdeeba7c
kernel-rt-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm
ac421de9c7d8eb3201e840cdf74a3c636aa62b34b064b21d0ab9400fe300d14c
kernel-rt-devel-5.14.0-427.42.1.el9_4.x86_64.rpm
168cf240ef0f01394965afb8f06ff9fbbf4fbd97c4c4bf8b6ca7eaa525b38569
kernel-rt-modules-5.14.0-427.42.1.el9_4.x86_64.rpm
971f507ab8b39063d0a724f6d56b01be76498acfe4203ef8cd49c78438428af2
kernel-rt-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm
ee11f03fa8dc892f7c94058220c14582e07d8e1fee27a1286d61f3e685bfcd90
kernel-rt-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm
d43667ae8e716193d6fa48803780a5b77bdfb3366493fbe1aff2f0ea31e79177
RLSA-2025:17760
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
* kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.52.1.el9_6.x86_64.rpm
ea74e566271a6557138acf6180034ba010719e7a4269c266c83e67c8514ecacc
kernel-rt-core-5.14.0-570.52.1.el9_6.x86_64.rpm
2849b05bd9c5b75c0eabb34d8b568f15aea62c0df4a382554d1b09e14ba5c31f
kernel-rt-debug-5.14.0-570.52.1.el9_6.x86_64.rpm
3599170b88799efb65f2acb04fb22783e9338d9ad01debd3165cc36b482e18c4
kernel-rt-debug-core-5.14.0-570.52.1.el9_6.x86_64.rpm
4d0a52513c78d165503f40de25be7a6a1b7c3fcf579c30f893d9bc432b0d930b
kernel-rt-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
5857041bec890afb4cdacc3eb26da7a0138a54b6b52aa385a9ad766a08f2703d
kernel-rt-debug-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
ec0dc1e1de632e4052609611dd8082c1c782ee42c80f38fe443d4ceff9249a12
kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm
18ecd1253273386c46e814c4ddbc2b344027c957873efc75bd0d6e954ed44e78
kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm
ce2d423655f11576ee108c0757ea3be4e1a596307f839fef8a0b77ca482e4d08
kernel-rt-devel-5.14.0-570.52.1.el9_6.x86_64.rpm
03441f64c46137fceb3b11001219dbe13f9f01fe7d653e3d9ea794fcdfd5d887
kernel-rt-modules-5.14.0-570.52.1.el9_6.x86_64.rpm
010153e2b1b8a1a610e9cbf5c56167804ce881fcd5f2070d1eb5057604067756
kernel-rt-modules-core-5.14.0-570.52.1.el9_6.x86_64.rpm
f7d4c600c16782fbfda87f61c966b59574bd52ccbf54cfa29a1f5eb29b1f1676
kernel-rt-modules-extra-5.14.0-570.52.1.el9_6.x86_64.rpm
86ba928a9b683f4796d7be07dd5579ac2cec1fa2ed2bd03a2f506bda2efade03
RLSA-2024:10384
Important: tuned security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Security Fix(es):
* tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336)
* tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
tuned-profiles-realtime-2.24.0-2.el9_5.noarch.rpm
d203ac52ac9bf9dc064403daa035f047eaf387bbf9ef82c4da24f993f918a45a
RLBA-2024:9075
rteval bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
none-rt-rpms
rteval-3.8-7.el9.noarch.rpm
3a7c3171a10fa25029837c8a06858d774dd560f7bd594de7867d64f48d163f76
RLBA-2024:9082
realtime-setup bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for realtime-setup.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.
none-rt-rpms
realtime-setup-2.5-1.el9.x86_64.rpm
46867ada728376fecbac6574fe3199056ac3b55d1612f4c0ba4a087904dab1a4
RLBA-2024:2112
rteval-loads bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for rteval-loads.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.
none-rt-rpms
rteval-loads-1.6-4.el9.noarch.rpm
be0cd8ff84c18c0c1fcfb480e8825ed998e0674689c648367a3219c38de0d8e4
RLSA-2025:4341
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: kobject_uevent: Fix OOB access within zap_modalias_env() (CVE-2024-42292)
* kernel: ipvs: properly dereference pe in ip_vs_add_service (CVE-2024-42322)
* kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok (CVE-2024-44990)
* kernel: ELF: fix kernel.randomize_va_space double read (CVE-2024-46826)
* kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (CVE-2025-21927)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-503.40.1.el9_5.x86_64.rpm
0cf1ccd370b4980f70de956552d975f9ef88f0ad7cc2daed78fe2d8551b7197d
kernel-rt-core-5.14.0-503.40.1.el9_5.x86_64.rpm
75eab1098532652cc87a23e36f339499ba1f076bd35b3087c6b1e9caa3e4b0e6
kernel-rt-debug-5.14.0-503.40.1.el9_5.x86_64.rpm
6d3b75e72680344fe32bfd9c6e87a909e50a352af8771aaef3a98b01ff0adda3
kernel-rt-debug-core-5.14.0-503.40.1.el9_5.x86_64.rpm
d64046c1ead3c9faeddfb2368027d30e812cb4f6ab28d016964673de3dc9c465
kernel-rt-debug-devel-5.14.0-503.40.1.el9_5.x86_64.rpm
d7d0f1c9f383ce7a486c1a3958e74c585a01b4472ee428d1d6404498bc99a702
kernel-rt-debug-modules-5.14.0-503.40.1.el9_5.x86_64.rpm
80518f1db7e1b4747493a16cfccef3885a1bca92e149643e5403b8218faab0e4
kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5.x86_64.rpm
9e42f18f793c46355c144e2dd0aca63330fc4080efb2a0826cb69eb01f00f1e8
kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5.x86_64.rpm
978aff8861aa076e9ff6bd98cd2da56d2411c7ca065bd6a015af58b822e3f7ba
kernel-rt-devel-5.14.0-503.40.1.el9_5.x86_64.rpm
ef5c422a60c3c405c778508cc582ca4a7558df88f197e62a79ae8648e43483f7
kernel-rt-modules-5.14.0-503.40.1.el9_5.x86_64.rpm
55185e4474de658a7824cd0c553c31b25fcf19b909c9e63438c318a310064057
kernel-rt-modules-core-5.14.0-503.40.1.el9_5.x86_64.rpm
5c57f0fe65ab45c72edac0839e11f3096152151d4dbe2bc0f072b89ecbb9c425
kernel-rt-modules-extra-5.14.0-503.40.1.el9_5.x86_64.rpm
f56711851207b34f086d06c4befd7a9df656c480dc130f8f6f7efcfdca597fc6
RLSA-2025:19105
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)
* kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
* kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751)
* kernel: fs/smb: Fix inconsistent refcnt update (CVE-2025-39819)
* kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.58.1.el9_6.x86_64.rpm
9b5cbdbea128719e37f1131dcc5eacf0518a5c7da0821734669adca9888d4d39
kernel-rt-core-5.14.0-570.58.1.el9_6.x86_64.rpm
4952ccee5b58c75ca7d9149aa448c34b20b6154c6380ea9a56f40bc23891b491
kernel-rt-debug-5.14.0-570.58.1.el9_6.x86_64.rpm
8f5b1c22303b7d0d9b19f35117fc4111da9c1851eb42391c4ea269b3eb5d15e3
kernel-rt-debug-core-5.14.0-570.58.1.el9_6.x86_64.rpm
a0ad726a5f7701a1b18dad4182be138ad86a9b076003b78a8173e380e72ca6b9
kernel-rt-debug-devel-5.14.0-570.58.1.el9_6.x86_64.rpm
650432e0a5aa8498aeaab4d62bccf89f946b96752ed4454819e818e886390017
kernel-rt-debug-modules-5.14.0-570.58.1.el9_6.x86_64.rpm
e1a7df7a30ab0c03f74592c60b4facddccd2f47c148407e2a90662fc02c1b860
kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6.x86_64.rpm
287e1ac2b549abd620065e34ab26d2a521ea45d5e6153d029ad406b3fec9b632
kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6.x86_64.rpm
8d2fa00673df01640dcacccaa8eefecb65e55f50427e87433f8069f6fc31fd92
kernel-rt-devel-5.14.0-570.58.1.el9_6.x86_64.rpm
4a376668e700afb1babe5ace647688681f93a7993e0829f8bec2e3c09ea73b68
kernel-rt-modules-5.14.0-570.58.1.el9_6.x86_64.rpm
ff03420ab1d0ec7919a227d46e232f80286d52212b0a23a58157673f747b3927
kernel-rt-modules-core-5.14.0-570.58.1.el9_6.x86_64.rpm
9c3f09c1677ee979fcd621afd601ab363a902ddafcfd1167f5a4523cdc38047e
kernel-rt-modules-extra-5.14.0-570.58.1.el9_6.x86_64.rpm
092762fc3ded8f5db21464efa067f3789ae53380a0ab53a5df3e486437192a03
RLSA-2025:8333
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Use after Free in gru_set_context_option leading to kernel panic (CVE-2022-3424)
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.19.1.el9_6.x86_64.rpm
8d86f9e66080c880e7173e988bf75458ed41aadf13f6b38b94041adc0488f27b
kernel-rt-core-5.14.0-570.19.1.el9_6.x86_64.rpm
f4a36f9e9b1b5aaa8780d114dc5a49b3a5c0b66e8f2714e1044efb10dcd82e5b
kernel-rt-debug-5.14.0-570.19.1.el9_6.x86_64.rpm
d5dbdea3600133c00707c78b825bf9abb1a0af78c2bd3c4cc213e3a74d8aa523
kernel-rt-debug-core-5.14.0-570.19.1.el9_6.x86_64.rpm
6aa3c8d7f10d8784de3b1e493c60fb9274e80e51e809f3c5576b1c20ddaa647e
kernel-rt-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm
db7900ffaf684b4fcddfa956b6ac206f99ed0fe4cca69828a069a445724e9cb4
kernel-rt-debug-modules-5.14.0-570.19.1.el9_6.x86_64.rpm
ddb90399751e6fa31e754333a3467c7f6e731abdca4d2493cc222e8cbbfaeab4
kernel-rt-debug-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm
2618b725252c77d8d7aeb7cda6a7e37b705f59439217209e41024b3a287247a6
kernel-rt-debug-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm
59c5e8cc670d479d19ae97de6ad475cb27de21c95b3d296d3ec6f93e323ad943
kernel-rt-devel-5.14.0-570.19.1.el9_6.x86_64.rpm
3a7dbb0f32d96f8831aaf81aaa5bbfd69ee976bf6d42c60946e9af032c951d65
kernel-rt-modules-5.14.0-570.19.1.el9_6.x86_64.rpm
0b5fde1633595bf3e65ff5566af82a3c29e184cbb62df4b256cfee557e6f0b6a
kernel-rt-modules-core-5.14.0-570.19.1.el9_6.x86_64.rpm
3fa9a562ec9adb4887821e032cfaca83aadff67d5254fd61be23b595b631e2ad
kernel-rt-modules-extra-5.14.0-570.19.1.el9_6.x86_64.rpm
0552f02c0e00e72dd3426c6e6e4faf15f105e5d95303b170aca7e621acf6b871
RLSA-2025:8142
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.18.1.el9_6.x86_64.rpm
e2f970dde6223aeb692815edcbeb4523603ddffc48fb70b2dac8a4049c63e2de
kernel-rt-core-5.14.0-570.18.1.el9_6.x86_64.rpm
c45f18681828babef3fa17d8931ad77600768ea284de5d07b4f380403e995fcb
kernel-rt-debug-5.14.0-570.18.1.el9_6.x86_64.rpm
3f0813508aa4010928555756b7374003d8a623683dcbb32ea7a52b6bb5aaf64d
kernel-rt-debug-core-5.14.0-570.18.1.el9_6.x86_64.rpm
8222e998ec25256e42558123d8c9f55f8d2b58cb0a9d48f58ab668b76a48ddbe
kernel-rt-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm
fdfe84742cf35571907ef4d032b30b4cbab3759fb21bb3a847abdbd845329e50
kernel-rt-debug-modules-5.14.0-570.18.1.el9_6.x86_64.rpm
46fc0bb48c02a8ed0a96cd19c2072f8f1334fab9c72e47f64a062880c829298f
kernel-rt-debug-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm
3a30d96353c2254847ac2789c652a11e604dc2384866d395a3fdd697eca497b9
kernel-rt-debug-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm
f4263f95406678029b496fb5da499e39c2f6e323c00fdd3dc3a66b7c0cdb4f8a
kernel-rt-devel-5.14.0-570.18.1.el9_6.x86_64.rpm
e0c91a4e52cc6eb9a0677a0b07b14d18cdde8d319099ca326ef04f15b7b3cf92
kernel-rt-modules-5.14.0-570.18.1.el9_6.x86_64.rpm
b523b96ad70bdfefc1635bb803c5400f470a3bfea0587afabad948bea17811e5
kernel-rt-modules-core-5.14.0-570.18.1.el9_6.x86_64.rpm
4788d13a416708a979a390dcbace3e9b92910cf79e980844fc93ff0a134b7bec
kernel-rt-modules-extra-5.14.0-570.18.1.el9_6.x86_64.rpm
341db41f19729d9122f661e94db781627b0fa42da21c7159de4222ed9c3b634e
RLSA-2025:8643
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: vlan: enforce underlying device type (CVE-2025-21920)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.21.1.el9_6.x86_64.rpm
43feaf73b518fc1b71aa8c6854e9a4077d37b9451b852e1e6d82f73db9826cad
kernel-rt-core-5.14.0-570.21.1.el9_6.x86_64.rpm
663d2659217e1fb9b7392850c39a8747177d9bd5bd9b8af6e00c6e467bcd9808
kernel-rt-debug-5.14.0-570.21.1.el9_6.x86_64.rpm
828b56b40c0fe2ed46138b91ec47985abdf73249a5c3e6ae73f110f710cce693
kernel-rt-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm
6252f3552eb0dc9b4c1497daeb66040da87acbc7ef676d3e713ec35685deb13f
kernel-rt-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
84480720624091e471475051a5b150e18f2f48e1be07d26da1c395ce11a2c0e7
kernel-rt-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
c64a3e5333fe39144b37f72bffcf12e1382295207aeba5f5a6109bd29b7b7415
kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm
4c73e5f29021103bf886c12ee93f508053a4ae40851e7ed9e1bd6580b664f006
kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm
c8bd5d16d3fd7c1647642a5b6d72130ee10607633b674460690b67947f5b79db
kernel-rt-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
91e1ee889c3998220933c0ba9efc7ace6dc36b16617802ad54093f4a5b576a8d
kernel-rt-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
6c38c38250c82a4bbe210467e076f5d0d23672a7ae943f17a2f4f341339115a3
kernel-rt-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm
cdbe1fd85210c0dfe593176ec419009528a1e2f9ad522a6bb72a1ffd33e1f72c
kernel-rt-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm
6ff6a39f71b0f6f8ba613fb80b32fe22198c0e5f78039ae80a99f35dd08b26be
RLSA-2025:9080
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: eth: bnxt: fix truesize for mb-xdp-pass case (CVE-2025-21961)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.22.1.el9_6.x86_64.rpm
da03e221e8d20cfd4a68d441d16a3b358713da3ad327fe6e7138cf6a89a9f637
kernel-rt-core-5.14.0-570.22.1.el9_6.x86_64.rpm
0014fccc788520352be800add6e9aa5bc3f26b39983c2693f20b950c3f5912fd
kernel-rt-debug-5.14.0-570.22.1.el9_6.x86_64.rpm
2dd21ebfd0ee0fe3a428f236da72f574f0781dd730a582ab0558f0ea8b43f7d7
kernel-rt-debug-core-5.14.0-570.22.1.el9_6.x86_64.rpm
661e49f125512e2c93952c8e08589e4cece94b794affc3cde31b1c540f516681
kernel-rt-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm
6e8243086983cd8629b0e1d77f89800ad3db4b8cabf47b0a97c6433a0f73f317
kernel-rt-debug-modules-5.14.0-570.22.1.el9_6.x86_64.rpm
2802cf2bfeff9c86bd1cbc76c83ab3da032edc98aa0301a2afe754d1a12cb1c1
kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm
1c6086ac58b1a509112a526424085e529f1e39ab90e4138bfd7aa69f7a77fd5c
kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm
1d1b37115f8dd21360158e02bfc22c66f0f50421a1d793ee85a7988843da6ed9
kernel-rt-devel-5.14.0-570.22.1.el9_6.x86_64.rpm
666d2cab9e21a346f79f7973d7e9b5034728ec4f440879c1d24cb00d979db26f
kernel-rt-modules-5.14.0-570.22.1.el9_6.x86_64.rpm
7d863704b2eda892a682452ef1bce5cd6bd14892ac7710537e354d3c83e77535
kernel-rt-modules-core-5.14.0-570.22.1.el9_6.x86_64.rpm
1e7d03b2e99ff4b09387b829fd09e1a09fefd7d128ac13ee68c5766ecb884fe7
kernel-rt-modules-extra-5.14.0-570.22.1.el9_6.x86_64.rpm
49cb332c15f470ea94d4bb8c2dd0c9d87695cb7c222732efffd10eab8d190021
RLSA-2025:9302
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ice: Fix deinitializing VF in error path (CVE-2025-21883)
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: ibmvnic: Use kernel helpers for hex dumps (CVE-2025-22104)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.23.1.el9_6.x86_64.rpm
e2e50d62f998ca4df7723860d300743cff4a38ee393611f11cceaed60849ebf1
kernel-rt-core-5.14.0-570.23.1.el9_6.x86_64.rpm
da2d015d16e393d5e770a17977df1afedfcb22dc424cb27d4f48aa9c4809a529
kernel-rt-debug-5.14.0-570.23.1.el9_6.x86_64.rpm
b3d36340a82ec7cbcfde3ad902f01908b50a4ac554c016a7039b25c879e47907
kernel-rt-debug-core-5.14.0-570.23.1.el9_6.x86_64.rpm
a7f7eec1de9ba61c8f314748f0d725e92bc577cb550c0bfd40b5d44eba83ab40
kernel-rt-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm
d340a20392fe3eb70f41155cb94b987bd87bc162d066552605f927092dfe9eb4
kernel-rt-debug-modules-5.14.0-570.23.1.el9_6.x86_64.rpm
46919136b1ea497f295c408c1813090e541a2c0266237ea7ac5a792174fedb7b
kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm
5537b4007d66f633d0a0a25c82e7371751440026dd52fb14fe7a08852f3ab717
kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm
8da8425c8ed9fe1eee48695a864575f353eb2b0590d73c5c5216738282611fde
kernel-rt-devel-5.14.0-570.23.1.el9_6.x86_64.rpm
84b6a5e43e734d531966c5021c4a7ac29161e0c0ea25590e5e0f4729b1dcb369
kernel-rt-modules-5.14.0-570.23.1.el9_6.x86_64.rpm
ebeadcfcab0bb8ee2cc0713f6c60973e984a3fb7bc93fe03de9b4552387b3cde
kernel-rt-modules-core-5.14.0-570.23.1.el9_6.x86_64.rpm
6a18c86d8c76fb942ec7476e5479d2501fbcfd69bfcd9ff0fab91eed16892e2a
kernel-rt-modules-extra-5.14.0-570.23.1.el9_6.x86_64.rpm
4743232782a4217afceae038419a2bbcf8c50d8c73810fe9e572dc093236b55e
RLSA-2025:10379
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004)
* kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CVE-2022-49846)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-core-5.14.0-570.25.1.el9_6.x86_64.rpm
34ad984a4fa04a40b74685c0d1d0a796f5676d9b695e8a27fc2d40b9fed21443
kernel-rt-5.14.0-570.25.1.el9_6.x86_64.rpm
fb5d0986bb89f5fe8c22805f38ba4f7b388e57eb38e3e9d8a3ab9599d93626be
kernel-rt-debug-5.14.0-570.25.1.el9_6.x86_64.rpm
47e1d389ce459dd70a21d0611e895d2d6df85cd4b8e7b627416f0ed66df9b458
kernel-rt-debug-core-5.14.0-570.25.1.el9_6.x86_64.rpm
993595094bdfd13585796bc6aecdbc4cf27ce02211370fd617746544eeef2db1
kernel-rt-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm
0c47f68ca8a3ebae640aa177e03449b872b80b767e8ae587482ae1f1e362f2a2
kernel-rt-debug-modules-5.14.0-570.25.1.el9_6.x86_64.rpm
25faec8767a410d331352e687529a0149c01e63f952dea26dd6706c59edef3b7
kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm
ecfcd8a0e990fa2335880f1bc01d3970295cdd9bb67a91f741aa913639837160
kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm
c4362632e19f9adbf2898ec2eaefcf90fba42279d8bd0223223ca4177f0d3d28
kernel-rt-devel-5.14.0-570.25.1.el9_6.x86_64.rpm
3d4c8440e7f7a869a7b11696814c937c4f889ec6e54e272849065d6021c696d1
kernel-rt-modules-5.14.0-570.25.1.el9_6.x86_64.rpm
8e50183809a037dbd5ad6474732350967749af54083f3467de9280c6e6d24846
kernel-rt-modules-core-5.14.0-570.25.1.el9_6.x86_64.rpm
0ec01f8ca486a49ea56e773e208624b43662c95964c25af66442d0efbd1736c8
kernel-rt-modules-extra-5.14.0-570.25.1.el9_6.x86_64.rpm
d1f1354b5f9085cbb8b747139e1d7a31d92edd8885427a71b358ed23d92f9d44
RLSA-2025:10837
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.26.1.el9_6.x86_64.rpm
09075de545cd871a5bfbd9b12e2d35d5b4191a3698a02d8890b2c5bc1d1b3147
kernel-rt-core-5.14.0-570.26.1.el9_6.x86_64.rpm
a306384f03f62fdfcfe51a9bf4aa488f094b5d817596522d3e168f579b9e7b28
kernel-rt-debug-5.14.0-570.26.1.el9_6.x86_64.rpm
f04d98df9229582696ee34fb197fd033e46de142750a427441b9f158880a4f76
kernel-rt-debug-core-5.14.0-570.26.1.el9_6.x86_64.rpm
3c2efdf3862470f8eb5712dc355bce2f929192233cbdc518072e086c903d9595
kernel-rt-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm
0dcbc54a7129b7e38388579e29264dbc1dbc1fb89cba8fb11203a16f85619f09
kernel-rt-debug-modules-5.14.0-570.26.1.el9_6.x86_64.rpm
a6404a178f1fade82ff0ca9a711e923fd90127dd67c84b39112a34b1ccf104a5
kernel-rt-debug-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm
45ef878c4f1b92ca86c73e5be218ca9efff1f0cfa16a9c5de5be28f28b4d3642
kernel-rt-debug-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm
fb23681a330928ebebda9152c66124e94d8631901c102ffb63736dc968641e87
kernel-rt-devel-5.14.0-570.26.1.el9_6.x86_64.rpm
6cc51e8fc49fb5935d0f718a8600a00ed0d9f94ec49eab0149e91d1e09398a04
kernel-rt-modules-5.14.0-570.26.1.el9_6.x86_64.rpm
87a07937788d4f6e463166cde378d0d130dcd8f01c0fa5f58407f42c5453bd8f
kernel-rt-modules-core-5.14.0-570.26.1.el9_6.x86_64.rpm
8f311152b1b632e849be5b7c7af77c0acdc6b8fc4420c61f064beaa50e626ef0
kernel-rt-modules-extra-5.14.0-570.26.1.el9_6.x86_64.rpm
a19121289933dd38ff325fd165dd8c39b099771654fb804d6885c39971e2083b
RLSA-2025:11411
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.28.1.el9_6.x86_64.rpm
048b28c0dabc7629638335b5b50164f7e1b8e4a1e29a63354c5c283a8c2fbeca
kernel-rt-core-5.14.0-570.28.1.el9_6.x86_64.rpm
c58635fc8665ba9ea5322d1a3d2914102979eacc1ec9580175066ed118c69794
kernel-rt-debug-5.14.0-570.28.1.el9_6.x86_64.rpm
1ea0335c85c8480e32d641624026fa24ffd8191b2919f8f0894fdcc52de17b23
kernel-rt-debug-core-5.14.0-570.28.1.el9_6.x86_64.rpm
b916bc7c97bc253e313c1f7415598623b8c32e1b7ccb3856460f8d6eee1e8911
kernel-rt-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm
6fa75e3dcb2aaadfb0e1aa84e38c362a37738c937fb3db5634df33ffaa669a24
kernel-rt-debug-modules-5.14.0-570.28.1.el9_6.x86_64.rpm
ad4ba5193fba0f5ecaf3c705bf765471f976061e038e02458e9f05d44c87a73a
kernel-rt-debug-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm
d7eed696922eefb6c02d28fef7da527d91a32712b0794ff1b1defc8568d03091
kernel-rt-debug-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm
a7914eed60fcd49478c666880d6bdae4c4adeb07b7f158e3247e45f2bac54337
kernel-rt-devel-5.14.0-570.28.1.el9_6.x86_64.rpm
859a1c3e90793796cd7bb9153bb0b77988b5518bd5846eeec2d9e4e543fdece7
kernel-rt-modules-5.14.0-570.28.1.el9_6.x86_64.rpm
ab74e90bd23735ad84c71c92d6008ed06aa660e05830260ab840c22afa5ba37d
kernel-rt-modules-core-5.14.0-570.28.1.el9_6.x86_64.rpm
d52fc1735e7a6fd7e1e274515c6725d8956625520e7cc6f37f229f35bbc76e81
kernel-rt-modules-extra-5.14.0-570.28.1.el9_6.x86_64.rpm
2d441d0a999a2f1d97d0e5d2ccd5587488296ba95a27298bb59a97fb465bce77
RLSA-2025:11861
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.30.1.el9_6.x86_64.rpm
75a03b595d5c6d9e088f40af84b8b639845e12ded241b89b8c73798b99c64bfa
kernel-rt-core-5.14.0-570.30.1.el9_6.x86_64.rpm
d99aa6b2574c3eb37f7ba87d5ee954179f1b4869972a1e68295d5b8f9a3cc7fe
kernel-rt-debug-5.14.0-570.30.1.el9_6.x86_64.rpm
cf1a8cdd3e4e890e3aaab2bbf4039812e18fc6d45bf353fcffe05946cada995a
kernel-rt-debug-core-5.14.0-570.30.1.el9_6.x86_64.rpm
601058d3a4de28aebd7ba81ee84b5903f6a45d4a43ed6223308275a97873ab06
kernel-rt-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpm
ab805e6d00201b17ecd666806f2cf273bc3a7ca14da4a88fd19cf1087a33d72f
kernel-rt-debug-modules-5.14.0-570.30.1.el9_6.x86_64.rpm
aa167186cf09c691ade5a2089cb07c34e299d2bf500373bef423690e50e6b1a0
kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm
6bbd956f934a865357baa07afeec1520ecc74d358b1fac6b5fde7bc4fba3ba90
kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm
ca7f945d7f0b20cb8ff1b62f6aa5fb5b9a6ff54a676727e8d79b5361e6cdb94c
kernel-rt-devel-5.14.0-570.30.1.el9_6.x86_64.rpm
e35d9da3d8d27a8ea8ea55e65015b15b41b411a74403c7ffc631ddee0d9d98bb
kernel-rt-modules-5.14.0-570.30.1.el9_6.x86_64.rpm
8c2d4212ab032c3951f147187c6a336443098289a2e267e0719a9bc24908e0b4
kernel-rt-modules-core-5.14.0-570.30.1.el9_6.x86_64.rpm
eb6cba596bde9c6ca970d06c7933eda76fdd1e9e645befa8e480ef48157d6b58
kernel-rt-modules-extra-5.14.0-570.30.1.el9_6.x86_64.rpm
67ab9ede2237d7a05d30f56f776a1a637b85d407065d19f9b87c7515054e71bc
RLSA-2025:12746
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.32.1.el9_6.x86_64.rpm
d0709c856eb428c3bada7b889f1cc7e50e4b8ffd1f2bc9195475d4ff1deecaa4
kernel-rt-core-5.14.0-570.32.1.el9_6.x86_64.rpm
da6348f7fb66153c16a8f8a85350ebe8a8f2064df6793488c6381d6dea78c0c9
kernel-rt-debug-5.14.0-570.32.1.el9_6.x86_64.rpm
8f6bc2c2329af6eb744a9467c4fe292aa3ad18cc08af44008737aac672f21e8d
kernel-rt-debug-core-5.14.0-570.32.1.el9_6.x86_64.rpm
3a993e22add4fa0c24387a243b632d6acbe965656fd5267ef909bf07a6635048
kernel-rt-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpm
059b760fcecf07610f74d83cc77c8e71031de8e27a01f3a191fbc878ab79e07b
kernel-rt-debug-modules-5.14.0-570.32.1.el9_6.x86_64.rpm
5a0f86f7648fc552f9e2fc796add9e4ba08f46487008d75d34a2d0cd97771b98
kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm
a5e48f47a81710a50dd874b5b7a5b495eee3ee865027e6394427a1b2bf8ce647
kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm
44831fc07a7bef36dd60de3a34bb619352fd40182ffa29a7f8f51da4eef4c54c
kernel-rt-devel-5.14.0-570.32.1.el9_6.x86_64.rpm
4d7b71330aab450ac0b17762060d5818235ee740cf3d66ae1cc2fab259f0be87
kernel-rt-modules-5.14.0-570.32.1.el9_6.x86_64.rpm
92bbb80b897a558a80d178306370fdbb0bed9df51f5d753d1337732f80592377
kernel-rt-modules-core-5.14.0-570.32.1.el9_6.x86_64.rpm
a3ea780bdada2ad6d257891a2128a8794f9099bdf2dcfb925577eddd67549780
kernel-rt-modules-extra-5.14.0-570.32.1.el9_6.x86_64.rpm
b5e98faf39b2f1ed0bf923603b21392d44bfdd02a57e3a2d5b55c0d6cf3b7d5e
RLSA-2025:13602
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.33.2.el9_6.x86_64.rpm
9d58dd1ea49ce71020eb7b45dc1e8b138e436764eccb1512fa6e033eb905b14a
kernel-rt-core-5.14.0-570.33.2.el9_6.x86_64.rpm
144a2d2df7fb3e1fc1bc824e9474122d8a929670e4b6bfc5c874d227f5b64aa0
kernel-rt-debug-5.14.0-570.33.2.el9_6.x86_64.rpm
b005bf4e41a1a10b5de5285293f668d38d2102ccc9b98ae3ae3c88c3947c4d6f
kernel-rt-debug-core-5.14.0-570.33.2.el9_6.x86_64.rpm
bb4710febf96071b25a5ea7f70c07b919d77c2a7bf4f93a72d5b61c2822b6d16
kernel-rt-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm
55d2c995b1a02a2cd282c5a14a2787c15f8a61c7a4b781977fa36895877f85e9
kernel-rt-debug-modules-5.14.0-570.33.2.el9_6.x86_64.rpm
abac949ce201108beaa419964509314252a160637c97b67a571d3ab482546b08
kernel-rt-debug-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm
f9e48a99e5105ea796875c037af9666f0535a8cc9e97a2c611d4510f66971f7b
kernel-rt-debug-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm
3b3714eaf40c85486b8bf50cfc77c564aa3f4d9afd7ea8621694cf7f30121271
kernel-rt-devel-5.14.0-570.33.2.el9_6.x86_64.rpm
7c75af02b927c7344f73bb87068fd10db761fb4e2b496767a1bee0538f1f9bcd
kernel-rt-modules-5.14.0-570.33.2.el9_6.x86_64.rpm
c06185ee5c4fa15bd71ed616a22c89800ba3d2a7276949d4f22da8bc838f214c
kernel-rt-modules-core-5.14.0-570.33.2.el9_6.x86_64.rpm
8248241f0928bdc73538b0376d3e8e69d31d15078ba005c8c10b368e1ab722d0
kernel-rt-modules-extra-5.14.0-570.33.2.el9_6.x86_64.rpm
16fec4c41c0697c779db6c8ffce55783c8896a9c0c25ec8b85ac9b99cc6b79e6
RLSA-2025:14420
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.37.1.el9_6.x86_64.rpm
f65a3a886c4f1c60b0cebb373c086a2d33abc22217a7625a62a6024abadb920d
kernel-rt-core-5.14.0-570.37.1.el9_6.x86_64.rpm
f3614fc3b9802abd0c655de5e7fcc81f68fbffa5019fb6b0493aa33667e4d24b
kernel-rt-debug-5.14.0-570.37.1.el9_6.x86_64.rpm
69e1eaee6b23f9aeb67e69bcbcb8c454b9c4a3169d3f195cf62a055343a1556c
kernel-rt-debug-core-5.14.0-570.37.1.el9_6.x86_64.rpm
a4da214028ff3827851a4c603208e3c13062d96cf5577a000d6175cc3a68161e
kernel-rt-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm
cc95a296693321a9661aa807c2b3bb1c534d45275300ee62775a6cffd88382f9
kernel-rt-debug-modules-5.14.0-570.37.1.el9_6.x86_64.rpm
71280d27e3020034e58cf995e70e9172d45b9c118644669db7e0254a5b2ea696
kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm
b46418425d0cc29a5b5506dd99d224c1b3babef46334c26037191cc23dd7d192
kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm
1908c3bd4742c950db075869736059286876a9372050b95c9485d3bbabec3cfa
kernel-rt-devel-5.14.0-570.37.1.el9_6.x86_64.rpm
310ded7c27ae9e6e376dbb466475ae0d1cc742c2dfbf868264a9e3b64f5e4247
kernel-rt-modules-5.14.0-570.37.1.el9_6.x86_64.rpm
c08454baccabd4ac327facaa773be869d112872ca25451c3bc1db60b82ea8130
kernel-rt-modules-core-5.14.0-570.37.1.el9_6.x86_64.rpm
9cd3ec41dd1636419c5b7a63852c82554ab310e6c40360070fab4a86cb3e443c
kernel-rt-modules-extra-5.14.0-570.37.1.el9_6.x86_64.rpm
bb63e6b5edaed26a4e7b145d7f07108d61cba2ca1e09a64000029321fd809feb