An update is available for kernel-rt. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: ipvlan: out-of-bounds write caused by unclear skb->cb (CVE-2023-3090) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: KVM: x86/mmu: race condition in direct_page_fault() (CVE-2022-45869) * kernel: speculative pointer dereference in do_prlimit() in kernel/sys.c (CVE-2023-0458) * kernel: Spectre v2 SMT mitigations problem (CVE-2023-1998) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux9 rt: blktests block/024 failed (BZ#2209920) * Backport pinned timers RT specific behavior for FIFO tasks (BZ#2210071) * kernel-rt: update RT source tree to the Rocky Linux-9.2z2 source tree (BZ#2215122) * kernel-rt: update RT source tree to the Rocky Linux-9.2z2b source tree (BZ#2222796)
kernel-rt-debug-modules-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-0:5.14.0-284.25.1.rt14.310.el9_2.src.rpm
kernel-rt-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-debuginfo-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-devel-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debuginfo-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-kvm-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-modules-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-debug-modules-extra-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-devel-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-kvm-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-modules-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-modules-core-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
kernel-rt-modules-extra-0:5.14.0-284.25.1.rt14.310.el9_2.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
https://bugzilla.redhat.com/show_bug.cgi?id=2151317
https://bugzilla.redhat.com/show_bug.cgi?id=2187257
https://bugzilla.redhat.com/show_bug.cgi?id=2193219
https://bugzilla.redhat.com/show_bug.cgi?id=2215768
https://bugzilla.redhat.com/show_bug.cgi?id=2218672