RLBA-2022:8321 tuned bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for tuned. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-nfv-rpms tuned-profiles-nfv-2.19.0-1.el9.noarch.rpm 3ecae7bb81855cbfde7b8bc61d7018728daa12b6f260f72a4cfbafc3c742cdb2 tuned-profiles-nfv-guest-2.19.0-1.el9.noarch.rpm ea7e4c351656b476345596fd2e439bbd8e7a37671a8f0b28782df60b4f9fd61d tuned-profiles-nfv-host-2.19.0-1.el9.noarch.rpm 86cf21b89db1f3afe156b2d4a9ad0cf0a4123f47748dfd320544dbe671652e6e tuned-profiles-realtime-2.19.0-1.el9.noarch.rpm fb0dbba6e33e15cead237638bb3ba2217f1f97dad6d226fbf28ddc5b6f256016 RLBA-2022:7934 rteval bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-nfv-rpms rteval-3.4-1.el9.noarch.rpm 779ef99730b0722c8085dd7bfeb5caa7c3fc469c860fe8070cc6f73ba2ae964c RLBA-2022:7936 realtime-setup bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for realtime-setup. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-nfv-rpms realtime-setup-2.2-6.el9.x86_64.rpm 09d1e8c58237d226f48dcd7ea1859255908739b2bd44891cb9c2200a7737ac18 RLBA-2022:7939 rteval-loads bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval-loads. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section. rocky-linux-9-x86-64-nfv-rpms rteval-loads-1.6-1.el9.noarch.rpm d90521c5eadf3f090373ef007bc30c919b714cf597c400efd189542cc7de73bb RLSA-2023:0300 Important: kernel-rt security and bug fix update The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863) * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z1 Batch (BZ#2141817) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * DELL EMC: System is not booting into RT Kernel with perc12 [kernel-rt] (BZ#2139863) * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z1 Batch (BZ#2141817) rocky-linux-9-x86-64-nfv-rpms kernel-rt-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm a7e1f3a73355138f0b833a118d6b89658f74d299cfa39c77f8a259395a7330c3 kernel-rt-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 5b68b98ea60d1532352676df69dd5f01bb4091a19159f80b4987be94ad3f9d5e kernel-rt-debug-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm b3a01fa3e91d415b63e0da93758d281b8f25a549dc982bb9cad82a17be557220 kernel-rt-debug-core-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 46b42686c27706db3766e029fe5b849642652dd85ca7f4c7e8ccffb8ee5ad4c4 kernel-rt-debug-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 3f1d53fb45a4edb3c5a2ae633202b7d9637faa9fb0c6d6cc8f4247124264c836 kernel-rt-debug-kvm-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm ec4beff42c43ffadd5ce03dc91887ae6f758a0544a6c19cceb92fe07792d3ec0 kernel-rt-debug-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 1090f4e8d8356909d3e656f774eb05ac4b44af0bc3e9bb37ed084eb42bd15f79 kernel-rt-debug-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 9988382bde8954cac0c0b91da17ce38b528b25465fb25b642aa9a029fd577d49 kernel-rt-devel-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 1c5864022ae27f7f2f238959bbf5eb754d939c3064c782c20e02325a514c68c5 kernel-rt-kvm-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm 54d9f42d4f2158df3bd3f8f490d8aae6da119aa2788c1df95a76558a77e0a723 kernel-rt-modules-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm c8fcbfdcf00d9e0b594bb22083bcfea58004e2009c316e66b776657e9bd58831 kernel-rt-modules-extra-5.14.0-162.12.1.rt21.175.el9_1.x86_64.rpm faa845cb72002e6899eee20b282e5859dfb66fd9180e99f0287e3a39a914bb30 RLSA-2023:0979 Important: kernel-rt security and bug fix update The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z2 Batch (BZ#2160463) rocky-linux-9-x86-64-nfv-rpms kernel-rt-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 7b3306e40d0eb276b81736e5b4d0a090b32e7428669108e3a9b5e9e6aaad5464 kernel-rt-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm d982083ee4ad4d679065f00f97454fe4d98fa099b0c48fe7b43f336383a843f1 kernel-rt-debug-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 604d8762e724e8a645b855749d0e0e9356fece859c97bf6465dfb24c4bc2ef00 kernel-rt-debug-core-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 2bae5de2733341e8ae12f4f0ee969fac2d108d977898196276c97acef486a544 kernel-rt-debug-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 0659314a6f21c051ddc70aaac21c744c84bbd3ee79324d9cd8f63d68b43a90d1 kernel-rt-debug-kvm-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm d36e8f2d118d803b571207e3354f2ecbbe1be262943615f87cab8ccfa205b1ec kernel-rt-debug-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 7a2333a7b531b60da3f5bccf06897798f67f859911183f627c994ca49d0d74f0 kernel-rt-debug-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm c3011279e4e4898e4cfc91e5c0dda8b355f934a49d40275bd757e97faa2c87e8 kernel-rt-devel-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 2a65d0b572d8b1c5d785424854a314aa0106e65d52e57f327be144ceb1fb955c kernel-rt-kvm-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm eb384f7c5b48aa33121ce2715ff3993ea7f926c65cb3eb4f7ec41c362ae05e1e kernel-rt-modules-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm c785118454a0725cad5b48f0163e8f67e6015d1fe8b75d4ee0000473779c8810 kernel-rt-modules-extra-5.14.0-162.18.1.rt21.181.el9_1.x86_64.rpm 1f580e31f2eabb98c9c86eaa7afd295e34d4c2b9ae448672fb17633b7bac9cfa RLSA-2023:1469 Important: kernel-rt security and bug fix update The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460) Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 Important An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: tun: avoid double free in tun_free_netdev (CVE-2022-4744) * ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF (CVE-2023-0266) * kernel: net: CPU soft lockup in TC mirred egress-to-ingress action (CVE-2022-4269) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the latest Rocky Linux-9.1.z3 Batch (BZ#2170460) rocky-linux-9-x86-64-nfv-rpms kernel-rt-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 568dd09bab56394023fe0306b75bd37ea022a6d953d67a0a684d0e3c09a062eb kernel-rt-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm dfabf38ea0e692f2e9e79032718f856947f6c79322302ba7b3e71da432b89a43 kernel-rt-debug-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm e1262ce076bfef2e64439348d0994b007be9dca1826f412e41ef1ae0ad9a65be kernel-rt-debug-core-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 68994eab42c1b61e40fb586c0db25b9e1e0120c20ef4cda336eed835530e3750 kernel-rt-debug-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm feeb3cbbbb86b394efd4f1c725cf5196c615e5d95da7d65ac35df62e428f9c09 kernel-rt-debug-kvm-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 6e915ef0375935ddbb6a22d786520dc3ade628dffaefba0f69a7ad163d4dbc57 kernel-rt-debug-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 16b5584dc7bfa322f30bb2365392e97001f24356dd5550f329c994c5e13157d4 kernel-rt-debug-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 7ee7488f2e287486a29fef3c09b5ee84f602f58a61cea14ced64f4c07483bb99 kernel-rt-devel-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 557f3f925cb9019b8d559ef7d0c76d910b62d338d424a57306781e6985118e7d kernel-rt-kvm-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 17c5d4216b724aec4fcb1b6dd52ff60045cbfd1ad7371c67f12a676c2e6bda11 kernel-rt-modules-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 2825674e7d7e26a5e1d90766a5094258be1f1cfb5e3ff2360f0786df2c25c919 kernel-rt-modules-extra-5.14.0-162.22.2.rt21.186.el9_1.x86_64.rpm 5df494c468c21ba95a1e5d4330dfcf63dbcbb2d36f140cba6541b812c3f7ab5b RLBA-2023:2149 rteval bug fix and enhancement update For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. Copyright 2023 Rocky Enterprise Software Foundation Rocky Linux 9 1 None An update is available for rteval. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list For detailed information on changes in this release, see the Rocky Linux 9.2 Release Notes linked from the References section. rocky-linux-9-x86-64-nfv-rpms rteval-3.5-7.el9.noarch.rpm 04313b632c9cadc83f364224fade45c1340ef4995001f1f943d2be4b1ec5819f