RXSA-2023:0334 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Intel 9.2: Important iavf bug fixes (BZ#2127884) * vfio zero page mappings fail after 2M instances (BZ#2128514) * nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359) * ice: Driver Update to 5.19 (BZ#2132070) * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588) * drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619) * updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914) * DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213) * No signal showed in the VGA monitor when installing Rocky Linux SIG Cloud9 in the legacy bios mode (BZ#2140153) * Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168) * ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976) * fatal error: error in backend: Branch target out of insn range (BZ#2144902) * AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217) * Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910) * Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605) * DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Important An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: watch queue race condition can lead to privilege escalation (CVE-2022-2959) * kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) * kernel: i915: Incorrect GPU TLB flush can lead to random memory access (CVE-2022-4139) * kernel: nfsd buffer overflow by RPC message over TCP with garbage data (CVE-2022-43945) * kernel: i2c: unbounded length leads to buffer overflow in ismt_access() (CVE-2022-3077) * kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Intel 9.2: Important iavf bug fixes (BZ#2127884) * vfio zero page mappings fail after 2M instances (BZ#2128514) * nvme-tcp automatic reconnect fails intermittently during EMC powerstore NDU operation (BZ#2131359) * ice: Driver Update to 5.19 (BZ#2132070) * WARNING: CPU: 116 PID: 3440 at arch/x86/mm/extable.c:105 ex_handler_fprestore+0x3f/0x50 (BZ#2134588) * drm: duplicated call of drm_privacy_screen_register_notifier() in drm_connector_register() (BZ#2134619) * updating the appid field through sysfs is returning an -EINVAL error (BZ#2136914) * DELL EMC: System is not booting into RT Kernel with perc12. (BZ#2139213) * No signal showed in the VGA monitor when installing Rocky Linux SIG Cloud9 in the legacy bios mode (BZ#2140153) * Practically limit "Dummy wait" workaround to old Intel systems (BZ#2142168) * ppc64le: unexpected oom panic when there's enough memory left in zswap test (BZ#2143976) * fatal error: error in backend: Branch target out of insn range (BZ#2144902) * AMdCLIENT: The kernel command line parameter "nomodeset" not working properly (BZ#2145217) * Azure: PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (BZ#2150910) * Azure z-stream: Sometimes newly deployed VMs are not getting accelerated network during provisioning (BZ#2151605) * DELL 9.0 RT - On PE R760 system, call traces are observed dmesg when system is running stress (BZ#2154407) rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm bb0d33a3f542792d3cda476130bcffc042bb8c68ff57c974afdeaeaa3b2d7232 kernel-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 209cca4e7cbe7957d4206a16878c698d80df00805f820264fda693e2ca07d4fe kernel-abi-stablelists-5.14.0-162.12.1.el9_1.cloud.0.1.noarch.rpm 7d125f0361e0211faa3702c9cc9cb98f6c92bd56ec193d4dbc5a4d913eb1a3fa kernel-core-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm fdbaeca6c200df8ff15cdbf5d98bd90f467102ed78c7a17566243a1d5bfeb590 kernel-cross-headers-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 7fc3ddfbead7161d4384379a88975e68291bc3e026f44f06d8ddd12ffa63c8d8 kernel-debug-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm e17ac2ebb3ed213590e6b4b8dae700ff3dece4c2e798fcaf0b31307e036964c2 kernel-debug-core-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 5594c1c63d60e968846aa5ec888b761ce4dd2501be76d55f2cd76efa54eb9d04 kernel-debug-devel-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 941910192b66bd4c5d14e63dcee687f92a792096fd4e41363ec3f2e4e1bf8566 kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 02d0dfa3c02d2a632d91c07d467eed17fa5e69424b8dc74290c656b1afd1c4d8 kernel-debug-modules-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm f665ca4569ae94fe3095b7e36671b91a6e9078b761697d5bc377cb995e4e5fa7 kernel-debug-modules-extra-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm b0b8559e43ddf709e8787efd189ea2564de732c055108cf297dcf2dc4e06159f kernel-devel-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 82ab31b77e294f735c28cdbf3bc12c6795cc3f4ac7bc933f3cd85dc350749ac6 kernel-devel-matched-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm c08073ea3cbdd2aa010110a8bb14c8fd5aeee47968e53c7348266d737deac4ad kernel-doc-5.14.0-162.12.1.el9_1.cloud.0.1.noarch.rpm 6f5c9063dbf11a75fe42bab60b2f726c99c2ef358f4375ad0daccd67613836e9 kernel-headers-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm eaf6d387504e3d09389a0178d7fbab9da9dc3df86aa5e5e91867b1f79f665041 kernel-modules-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 8a111e38946f474031f6105f35d7e31731211184a1586c6e58b43cc654662ae1 kernel-modules-extra-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 2f9d5e41054861d8f2bdc204dba0694f04a828ae86ea6e39858ceca07b1879dc kernel-tools-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm d93cd6a20c662d34b5016fcb4c3b19a90bb47bea1d73bfaa54c5fd426a6574d1 kernel-tools-libs-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm ddeb5f7dae41302b349d5906eae3882762ed47b8a6d1a61a77dd205a059b9b9d kernel-tools-libs-devel-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm ff9ea1824909004aa2820a1b5151c453eab47dcfc42c79612bc70073008b6141 perf-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 8a2bf2ec5fd3296c50c80e7f4c7dff562350c921cb201276d37446d43cc013a7 python3-perf-5.14.0-162.12.1.el9_1.cloud.0.1.aarch64.rpm 58f181729f9a8ea3b1480c320664848506637e15bc1a358ef26a49e0fe33dc8f RXSA-2023:0951 Important: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux SIG Cloud 9.0: LTP Test failure and crash at fork14 on Sapphire Rapids Platinum 8280+ (BZ#2133083) * Rocky Linux SIG Cloud 9.1 Extending NMI watchdog's timer during LPM (BZ#2140085) * AMDSERVER 9.1: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151274) * qla2xxx NVMe-FC: WARNING: CPU: 0 PID: 124072 at drivers/scsi/qla2xxx/qla_init.c:70 qla2xxx_rel_done_warning+0x25/0x30 [qla2xxx] (BZ#2152178) * Regression: Kernel panic on Lenovo T480 with AH40 USB-C docking station (BZ#2153277) * Scheduler Update (rhel9.2) (BZ#2153792) * Rocky Linux SIG Cloud9.1, Nx_Gzip: nr_total_credits is not decremented when processing units are reduced by dlpar in shared mode. (FW1030 / DLPAR) (BZ#2154305) * MSFT, MANA, NET Patch Rocky Linux SIG Cloud-9: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155145) * Azure vPCI Rocky Linux SIG Cloud-9 add the support of multi-MSI (BZ#2155459) * Azure Rocky Linux SIG Cloud-9: VM Deployment Failures Patch Request (BZ#2155930) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158815) * Rocky Linux SIG Cloud-9.2: Update NVMe driver to sync with upstream v6.0 (BZ#2161344) * CEE cephfs: Rocky Linux SIG Cloud9 cephfs client crashing with RIP: 0010:netfs_rreq_unlock+0xef/0x380 [netfs] (BZ#2161418) * block layer: update with upstream v6.0 (BZ#2162535) Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Important An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) * kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack (CVE-2022-4379) * kernel: Netfilter integer overflow vulnerability in nft_payload_copy_vlan (CVE-2023-0179) * kernel: an out-of-bounds vulnerability in i2c-ismt driver (CVE-2022-2873) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Rocky Linux SIG Cloud 9.0: LTP Test failure and crash at fork14 on Sapphire Rapids Platinum 8280+ (BZ#2133083) * Rocky Linux SIG Cloud 9.1 Extending NMI watchdog's timer during LPM (BZ#2140085) * AMDSERVER 9.1: amdpstate driver incorrectly designed to load as default for Genoa (BZ#2151274) * qla2xxx NVMe-FC: WARNING: CPU: 0 PID: 124072 at drivers/scsi/qla2xxx/qla_init.c:70 qla2xxx_rel_done_warning+0x25/0x30 [qla2xxx] (BZ#2152178) * Regression: Kernel panic on Lenovo T480 with AH40 USB-C docking station (BZ#2153277) * Scheduler Update (rhel9.2) (BZ#2153792) * Rocky Linux SIG Cloud9.1, Nx_Gzip: nr_total_credits is not decremented when processing units are reduced by dlpar in shared mode. (FW1030 / DLPAR) (BZ#2154305) * MSFT, MANA, NET Patch Rocky Linux SIG Cloud-9: Fix race on per-CQ variable napi_iperf panic fix (BZ#2155145) * Azure vPCI Rocky Linux SIG Cloud-9 add the support of multi-MSI (BZ#2155459) * Azure Rocky Linux SIG Cloud-9: VM Deployment Failures Patch Request (BZ#2155930) * The 'date' command shows wrong time in nested KVM s390x guest (BZ#2158815) * Rocky Linux SIG Cloud-9.2: Update NVMe driver to sync with upstream v6.0 (BZ#2161344) * CEE cephfs: Rocky Linux SIG Cloud9 cephfs client crashing with RIP: 0010:netfs_rreq_unlock+0xef/0x380 [netfs] (BZ#2161418) * block layer: update with upstream v6.0 (BZ#2162535) rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 55304b11f58474e76cf15bd7b54279a67bc2be5317d77459a4bf8914d818d021 kernel-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 3234b52849610ff2e854c8c4719210c687817d3a1b4c42e7ad169a13bf6be78a kernel-abi-stablelists-5.14.0-162.18.1.el9_1.cloud.noarch.rpm 6d651c9e8c0c7e3e5e8e554019824808af818c196187ef92527231e5a95847cb kernel-core-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm b9613fb7ad3154c37e248429edefb9d4e6842ed7074ed2a86f3b24f1fd716c12 kernel-cross-headers-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm fc2eb957cd1058ba03bba8c1e66c1b0760f6c34fd1794085415e2b31e9b121e1 kernel-debug-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm bccbb458aeebcca3afbe2064898ccbfc324362bd1a56c11fb89e2f44d543530a kernel-debug-core-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 507dd8a4dc761abaa9cb15a5602c2122106e7c7c77b00d66ea3f1c6d144e03d8 kernel-debug-devel-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 4387eee9f2310a222a82b480b677d02d089b797413b9caf008c77761a58b5a4e kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm f722b8e05019f018fcb5fa3355a2d094a119ed19b1f7093d149f2fb1340ad27a kernel-debug-modules-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 25872cfee23501c8f3d2ec44b3adf2c2d9b957f453eb624a622928ac24174f6c kernel-debug-modules-extra-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 4b4a23353dfd7f3ff870170fd76fe13ac5d9cd211986b7b30bc330b89cfce124 kernel-devel-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 5a624dce3d0671f7c891b147d943551f733441995b402a3f0e83de6a4bc52aad kernel-devel-matched-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm f125117c459bb02cc47e5d85faeea59f5b74dd67086551313a0b1550dd8cf2b7 kernel-doc-5.14.0-162.18.1.el9_1.cloud.noarch.rpm 76525ebe57cbdc9d27923428193192082f6b8d3ee560cb46f39cee46beade212 kernel-headers-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 9dd791c2950c02472394e6e717f4a77badfe6c48d80529bec09deac0f0199443 kernel-modules-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 70f7c39c59b5cedef1ea4ff595a86ab07807ac7a40f41030f8abe5faf42f22fb kernel-modules-extra-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm c164fe5c08507d01a3ef745a1de6976bc926dcb4935e4745d5f2ff4ea3e7654f kernel-tools-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm b64e20161d86179de3286e64641fc306bcac75b36d5c24eeccfd21020a565beb kernel-tools-libs-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 8e129cbba2dcaf66acd9688f5e14e8ea9b1611a32fffb730c7f564020e13a2d3 kernel-tools-libs-devel-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm a535df8f319e456fc07cbee5b1d552d7c77ba09cf29cb2439577ed7f7c430964 perf-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 17fa939e6c815ce330bffb759b22d214a236ad707ec8eb464e81227848592969 python3-perf-5.14.0-162.18.1.el9_1.cloud.aarch64.rpm 5e70dfa08a74891fa42602b0bdcdeaee68b392983ea39f73dbdba6a9ee9aedf6 RXSA-2023:7749 Important: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free vulnerability in the smb client component (CVE-2023-5345) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Important An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: use-after-free vulnerability in the smb client component (CVE-2023-5345) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569) * kernel: use-after-free in smb2_is_status_io_timeout() (CVE-2023-1192) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-7.2.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 661b5a26ea223a67412ec9da1b4ef58ed6a33d979ad66f50bf3dccc6c1944136 kernel-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 3b9cf7ad46ff442053ce5c0f06039c071d3208c3148f426f7967a0e94a8192b2 kernel-64k-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm ef33f97b28e91fc9dab0c1cc623bc421dde4c855d65424677e4d268d0fee2a55 kernel-64k-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 09085bd5d378c8fed7c435a00798183330b7aa1f25bc46859d1e0c6881a90cd4 kernel-64k-debug-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 959d6f2ed52e6f7910919d5472fc81c272f4069f50cd5b3f2a04ceff3d8b7c6a kernel-64k-debug-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 481ab50afdd11f5b4660712ca507c4c932d24911ebf4e5e3e56e5480eaddf991 kernel-64k-debug-devel-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 8924454802df21eef07da5aa301f468c0dc172473ec891afa361dfd45b67e1e5 kernel-64k-debug-devel-matched-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 2419fb51859986c50a728a680a8495d786309c8b64628bde2602318f0f5319cd kernel-64k-debug-modules-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 41ba7f2e2e30d833fe42ff6d5fc391380907a625033ebfe675675544dbeb9b10 kernel-64k-debug-modules-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 88260a11c1797bdcbadef0565691635cb18d480ca6c37adef6b0843584c0787d kernel-64k-debug-modules-extra-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 0a6f97cb5632130d58965a3aaafde7eada2da5aa9803205cace89dda1e0c38fd kernel-64k-devel-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm a4339e1869f6be791d34533a9112ee575ece152ecc803a5e0591613a88116482 kernel-64k-devel-matched-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 18e1bfcf0f3698622862d05bd4ea153b50b6931281f148c060d08d44dba85983 kernel-64k-modules-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 010b17feecf0bc82808c540cf48fa14b8b024b86b0243cfdc788a57637c82ed1 kernel-64k-modules-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 163cf4cf0c3bfe87a52775c158f04def1ae627d084a02c9b339d98957585450b kernel-64k-modules-extra-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm af559d9f8328770e9934cec0ccd2b0bf1807ae62efba606a131df75c02381f33 kernel-abi-stablelists-5.14.0-362.13.1.el9_3.cloud.0.3.noarch.rpm e9e2fc4c3958f9f18f79caef05f363a555135e2de234c6d73f4924526c458539 kernel-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 57d1d9a18fa3e0dc740ead81f71c91e9bdb2176dc87485bea8d3540c4c230b36 kernel-cross-headers-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 040dea47c47935c97ee31393a776e340adc858ad1a024110edbe24681020f4b1 kernel-debug-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 4285b8d7639b84cd049bd91b8fce1247a244e0c7a6b6fa3a0fdf13522d83612e kernel-debug-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 1dadabace0573446277be20ed25b5d1c8afa91dc081af3c18f1a8e67e0c58a6f kernel-debug-devel-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm f4ff055beb02aa9d6fcc2286d1e3eb11c99161ef35da5d5ebf1ab957f2020227 kernel-debug-devel-matched-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm c389a0a6b52fd15b9bb3c9e7aed64e9c0d4796a4a5e47e64c1f15e65681f1d9e kernel-debug-modules-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 05f49f205b8f613ded3481c03025b3673d93e88d8a0326954181e025b4c455d8 kernel-debug-modules-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm da863fad646f911762931712a6e392f3e53fd436ca7b5658c5294714ee5c1504 kernel-debug-modules-extra-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 619db5ae1c956c560c6a323019885f649e9af0cfeea6d2737c93bd40ed7465d9 kernel-devel-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 6f2b2a39d62fe0c22666fdc2f82605433c2be883cd667126f75d47dbfbc8dcc6 kernel-devel-matched-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 79b5e634db5f7e160d324f53beed01b83a67fcf1a46030c4a09a287027aefa9e kernel-doc-5.14.0-362.13.1.el9_3.cloud.0.3.noarch.rpm f46555ea3a26a69c0342739116bbfcced93311cc2817f07f95267541f954c590 kernel-headers-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 1ed55b9d79f4c93940b700abaea9b4efd49181e5300a5130f752eafc65773231 kernel-modules-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 6f1678e22807a344412c6b140cb947517318f38a2efd5400983f8e6b48367c72 kernel-modules-core-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm f2694b20a5ca2c119dc194778aff3e3cc47291f2ce8b164116ff390a63e42438 kernel-modules-extra-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 76200fb2a187c0b230e4af4fc71d914c938ae15f9c495b1c8bb26b79e07f843b kernel-tools-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm b204eaa427c42de6c54e75d1073c319c11bc96bc8eff98e83c66bfff95e6d46d kernel-tools-libs-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 393e3bb7af3333a9c597b0fb7d8a7fd302735a1bf80a62583e73b51e2c5784e0 kernel-tools-libs-devel-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 136d3d04fc174305ec5279097244adc3258b74506fe203c82652801c5a77b3f4 perf-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 78840f8d5d7084b2e3a8ffe38ebd5fd8bbbccf86a255931835ec25442a84ff39 python3-perf-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm 6820a810401a46d199caffeeac18ed338f0229d86fceef1af0bcf45027b04e3b rtla-5.14.0-362.13.1.el9_3.cloud.0.3.aarch64.rpm dc114cb64a9d9c30d32921d12447f59bfd5100f0835755cc45f1d7c2f4a5bdd1 RXSA-2024:1248 Important: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817) * kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193) * kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646) * kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction (CVE-2023-4244) * kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list (CVE-2023-5717) * kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356) * kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535) * kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536) * kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606) * kernel: OOB Access in smb2_dump_detail (CVE-2023-6610) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Important An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: inactive elements in nft_pipapo_walk (CVE-2023-6817) * kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation (CVE-2024-0193) * kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination (CVE-2024-0646) * kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction (CVE-2023-4244) * kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list (CVE-2023-5717) * kernel: NULL pointer dereference in nvmet_tcp_build_iovec (CVE-2023-6356) * kernel: NULL pointer dereference in nvmet_tcp_execute_request (CVE-2023-6535) * kernel: NULL pointer dereference in __nvmet_req_complete (CVE-2023-6536) * kernel: Out-Of-Bounds Read vulnerability in smbCalcSize (CVE-2023-6606) * kernel: OOB Access in smb2_dump_detail (CVE-2023-6610) * kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (CVE-2023-51042) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-7.2.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 3c2a3a1be9860dcaa2c31cecf6a1b40f79f0f47cd3503aafd5fab0fb74a4d567 kernel-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 260ce6b88eaa4f5a1a8966a1dae6560f8f553665ce398dd32367d37373bf63bb kernel-abi-stablelists-5.14.0-362.24.1.el9_3.cloud.0.6.noarch.rpm 7f9d7cfdcb1aba22fae0431defc61a8e352fea84a33b40c56557757d72e3f51b kernel-core-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm fba15052681dbde881b27a0a16efe5623a20bb392275edbc67c0929089c32d28 kernel-cross-headers-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 6307173991f0ceac2e5ce0a8695627910d56d38e7cf19dc29a5d6d0f1bfd45b2 kernel-debug-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm aeee795fc0da215bccdeeca4b6a7e209f2141031cc0d7b3f2203ef326dc12ef9 kernel-debug-core-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm f063bd57330206e99b2ec51620f502079ca61b55f49f92f372cb38fb377c7cd5 kernel-debug-devel-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm d37670f9b6a7d66d2c0cae6664548f3f9bb05874bf5b9c81f3146d8729086608 kernel-debug-devel-matched-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 11f1e2311b6790451e541edce030fcfa25a64bffd07052bc261aefdda5b10af4 kernel-debug-modules-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 70833cf92ecbb1d03cc2de3a027995d98281699cd869d7aaeb9231e7cac3b262 kernel-debug-modules-core-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm bf5f8e0a0718861bf3e2a253cd75de559d34ea9e4884cb4dd80efdd58e4a3bd6 kernel-debug-modules-extra-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm a5c3b11f18a3f921915e07205fbd8c6f354a4aab4458c3481e4c623b1cb58d7d kernel-devel-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm ec068cda546af7567cec38641fd35d84954f02879a049a0b899593a781f87597 kernel-devel-matched-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm e98ba53acac9b58c73d910219f513e81e6f183e227dc377c6995d40e13a44f9c kernel-doc-5.14.0-362.24.1.el9_3.cloud.0.6.noarch.rpm 99d6d50981d3094b0d07887f8b5b8256f66f510462b909d180df36c5d6a5a767 kernel-headers-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 19c9c5f477bc80eb2f706a8de1ba7589f4ed27b218c0546198c13b9667aa4bb1 kernel-modules-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 953ca51679dadf0c4577bedb457ef0aa9d5b87f999366a71b28ec92985677416 kernel-modules-core-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm d51c252ae51471bf5a18aad263d676ec1190216054729cb5e0d11e4d0355f23c kernel-modules-extra-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 1838a0a541ed0f4a8ea0aa57466bbba15392146059bb1686753828537c667795 kernel-tools-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 9644ea0a5be070497b336b84798c1d92080a04d01392c6f4f8d1ba4efa9d46b8 kernel-tools-libs-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 670db820dbafa94f7cc284ebea659e21b87e74fa985c4ae5e063fbb957e71654 kernel-tools-libs-devel-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm ad4128fe09ffab2b70603a39bc87a55278ac6b37f8e1f627cf910fb9cef18f12 perf-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm f275f958af1012969c1f6ddd66aba9af997ea197b8397bb416e5c01e7fa8fc80 python3-perf-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm a47b923bb3e05b2c39dbfa0ac8ae6f27c4e851c0fc2f5a9b8025a6f561992426 rtla-5.14.0-362.24.1.el9_3.cloud.0.6.aarch64.rpm 0754efc4ecac272ed357a731e21e4e4a2c9d17fc64b1c0c55852725e69c47bb3 RXSA-2024:4349 Moderate: kernel security and bug fix update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801) * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974) * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870) * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960) * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400) Bug Fix(es): * cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux SIG Cloud-28943) * BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-35672) * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-36220) * [Rocky Linux SIG Cloud9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-36687) * ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-36716) * CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-37641) * IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-37669) * [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-38252) * Isolated cores causing issues on latest Rocky Linux SIG Cloud9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-38595) * [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-39083) * [HPEMC Rocky Linux SIG Cloud 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-34953) * bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-43272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Moderate An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context (CVE-2023-52626) * kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset (CVE-2024-26801) * kernel: crypto: qat - resolve race condition during AER recovery (CVE-2024-26974) * kernel: xen-netfront: Add missing skb_mark_for_recycle (CVE-2024-27393) * kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups (CVE-2023-52667) * kernel: smb: client: fix UAF in smb2_reconnect_server() (CVE-2024-35870) * kernel: net/mlx5: Properly link new fs rules into the tree (CVE-2024-35960) * kernel: net: hns3: do not allow call hns3_nic_net_open repeatedly (CVE-2021-47400) Bug Fix(es): * cifs - kernel panic with cifs_put_smb_ses (JIRA:Rocky Linux SIG Cloud-28943) * BUG: unable to handle page fault for address: ff16bf752f593ff8 [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-35672) * [HPE 9.4 Bug] Request merge of AMD address translation library patch series [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-36220) * [Rocky Linux SIG Cloud9] kernel BUG at lib/list_debug.c:51! [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-36687) * ice: DPLL-related fixes [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-36716) * CNB95: net/sched: update TC core to upstream v6.8 [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-37641) * IPv6: SR: backport fixes from upstream [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-37669) * [RFE] Backport tmpfs noswap mount option [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-38252) * Isolated cores causing issues on latest Rocky Linux SIG Cloud9.4 kernel and not functioning as desired. [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-38595) * [ice] Add automatic VF reset on Tx MDD events [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-39083) * [HPEMC Rocky Linux SIG Cloud 9.4 REGRESSION] turbostat: turbostat broken on 10+ sockets. [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-34953) * bnx2x: fix crashes in PCI error handling, resource leaks [rhel-9.4.z] (JIRA:Rocky Linux SIG Cloud-43272) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section. rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-7.3.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 6282780d68e29d7f47008d6e7b6279bf7167b1e6def0a33dfbb209db68238543 kernel-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm df4424d876d22eacbe41c2767cdf52015f21481667050693a5440688cb4ee079 kernel-64k-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 2819941fb7f8f68a8234fd4bef45ead1c0b1c99fd2175658dbc65e4b78acadab kernel-64k-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm ee5f18e475808465f1ec3d04609c305c087d534daea84c600fb0daa13c61cc74 kernel-64k-debug-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm ea3ff9eab3a6c8a85dd9ae6c7142b4b62df179f71df67e3bf3f80ad88c0a6ca0 kernel-64k-debug-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm dece682bfdf8dfe55289ba4fbf1b7c175fd95f357bdb8ff5596c0de692ec33fb kernel-64k-debug-devel-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 59dc41d18b70287c5143161d0c8e40f9429725ba02872f82fed11b654f548ce7 kernel-64k-debug-devel-matched-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 0afbdab2c7ffc8b3ae01ca8ba8f30eb8c84589104b94b3e7b089e99a1511351a kernel-64k-debug-modules-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm c2b6d782aa8c9aed3abc5ceb0b7a71928333d8a80e5f566c33ebc21e1e339eee kernel-64k-debug-modules-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 7e438a8f305f817581db30777132213fb158c0aec4d48c83f225daca3c1e6c15 kernel-64k-debug-modules-extra-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm ff01c5d9a4d330a1db970070b7de4dbe6456fbe4ae1be9b073266d1f03213ff3 kernel-64k-devel-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 626df75873f71615485bd95c14cfd40c8f49866c5568e9d6af9689ad4f473a6d kernel-64k-devel-matched-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 0c4822a1b028e25422256bc0d458d7decb765e54eb7dd964aa63ce32e0861ce4 kernel-64k-modules-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 99404b0239d07914cea37ea44fca941da38c174ad4ba431c2846fc80473d978f kernel-64k-modules-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 3ecd36a51eb8ed2883607daab15083245bc3048f61ecf2de5e7144ee73f3fa09 kernel-64k-modules-extra-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 7684d58041f7e110bb5c546140370482d12dd9730204607882d732a01cda62ec kernel-abi-stablelists-5.14.0-427.24.1.el9_4.cloud.3.0.noarch.rpm a5bd650270ae4bdf0dad5b1b93eb24c3ca73254f2917d52f95ac6e4463e87cd8 kernel-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm bbaf169a3df5fea29c9e5f9977b99810fa09a5aaeeb6c49b615ac9684dad6fae kernel-cross-headers-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 6686560761ac3e0945feeed5c45ab702ae9f8f9da4adbcac1d2fb45884319da9 kernel-debug-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm e4d5c66ee52a1efaf4e40d9e868a1c833c87df01b36188f682cb02d2ecb437ba kernel-debug-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 9b0ff8acc5752f984c1931ad702e5c24ecfda9f9ef56eee7a0e700048537692f kernel-debug-devel-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 888487e811757fa3c904ca8d47e1321d003ab2dd4f4b281f0691ba13fecc05d8 kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 177a1c90f33b847d2cedd27b3941c2d248cc2e5b431015d0e1d9e3f90df76928 kernel-debug-modules-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm eeb3f00a520aae0f8b729b4343390a8eef47bafe8f58a8c70fdf07284d914f6b kernel-debug-modules-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 164bc5f377f05765e045f67f040097dd36d5c0f53de43a8cda5aea7b29178f0a kernel-debug-modules-extra-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 722eda37cb2ae8cabec7dad959676fe81a9d3a5dd03912db32aece83b72adaa0 kernel-devel-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm bfc39bd6610d8da589dd322c4106154d2f4da71118fe098ed65b651a39d877d1 kernel-devel-matched-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 822ffda6ec001c6a8899c66911d0614f616587ebf4f01b32e5c3d015ed9a848f kernel-doc-5.14.0-427.24.1.el9_4.cloud.3.0.noarch.rpm 22790939295dc0cc23678a6ab07c69b4f90a0b557750c4d71961df5f2a440fa2 kernel-headers-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm a026d8786c259cb580113b63afb373784d7a0e345db162fae746070957bc9c03 kernel-modules-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm bcdb5c0f3008a409ec9a35d1d3e3040b8e5b98777d47158ac69e992b09c3c531 kernel-modules-core-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 3101ecfe5796380918e353bfaca4b0d3515ff77efa1f39edee050dc519427853 kernel-modules-extra-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 630c6f377c7ff56a35f6f6a6b906cadd81202796e2d0adf199c162a7d7d67a2d kernel-tools-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 1f234766078506a0a0a3eefcf0958f4820925a714aa79e6ff2b18fc936c82c84 kernel-tools-libs-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm b2471772790fb9cb4b66a214186b62cd852c6fcf7a63d87593b5993da187dfaa kernel-tools-libs-devel-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm ae32f8114a09ec4001045f3cabe3015f96f6e4dc118c524bf781e13f89d05455 perf-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm f168ea3d129049bb24e8126cb72aa1f2693ec07a12e83e3a0c2f8698612071cd python3-perf-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 360049016ebf9157ddf113ea58263209af34bb97d0ab923897efe2f929ca85f5 rtla-5.14.0-427.24.1.el9_4.cloud.3.0.aarch64.rpm 5b42f8987457f76d2a77d4bba04b3f1ea029c77229194b5e64d8840dce201cfd RXSA-2024:4928 Moderate: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773) * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737) * kernel: dm: call the resume method on internal suspend (CVE-2024-26880) * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046) * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030) * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857) * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907) * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885) * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809) * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459) * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924) * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952) * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743) * kernel: epoll: be better about file lifetimes (CVE-2024-38580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Moderate An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: block: null pointer dereference in ioctl.c when length and logical block size are misaligned (CVE-2023-52458) * kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773) * kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel (CVE-2024-26737) * kernel: dm: call the resume method on internal suspend (CVE-2024-26880) * kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() (CVE-2024-26852) * kernel: Squashfs: check the inode number is not the invalid value of zero (CVE-2024-26982) * kernel: nfp: flower: handle acti_netdevs allocation failure (CVE-2024-27046) * kernel: octeontx2-af: Use separate handlers for interrupts (CVE-2024-27030) * kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() (CVE-2024-35857) * kernel: mlxbf_gige: call request_irq() after NAPI initialized (CVE-2024-35907) * kernel: mlxbf_gige: stop interface during shutdown (CVE-2024-35885) * kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (CVE-2023-52809) * kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv (CVE-2021-47459) * kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (CVE-2024-36924) * kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (CVE-2024-36952) * kernel: net: amd-xgbe: Fix skb data length underflow (CVE-2022-48743) * kernel: epoll: be better about file lifetimes (CVE-2024-38580) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-7.3.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm b4feb01cc2b25d08742f0d7a84eb0439ca790fab3c9911dedfd056e7271865fd kernel-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm e7a8cda1cbfa6b50469cd1ee80e527adfc15ded853c5fc27a56d5a4d20278e32 kernel-abi-stablelists-5.14.0-427.28.1.el9_4.cloud.1.0.noarch.rpm 0f5505d20d92ee1403cde0d42b055270a58d8dea5502f9d4c9495fff9c07fd7a kernel-core-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 44dc18514b4d560e216e5952a61538ccc44ef057b2665b75a9cc11aa926c8419 kernel-cross-headers-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 658d9954396067106116c27749436d30d55d97eec534412ed5fecaed509ee3bc kernel-debug-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 565c9aa9facf0a10e221d44aa0d2cb524c6ff3bd5510fd469f64398d9c5f6e57 kernel-debug-core-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm f2d0bb9bd55c36ee1521e17842b35fb4efe2771de8e9766032104987a1bc6a05 kernel-debug-devel-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 4119ab197265fed4136309d89afbb477cd687e7f43f450426c8a488c7af8fe81 kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm d9bfa1c9c478bd62f99f8c3e782a2d547b1b44969218af0f928fc5e93da470b3 kernel-debug-modules-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm b6ac4a88714ea5f5314dfd7143b94e0b9525f10c1187e84aff4371cbc0d23d48 kernel-debug-modules-core-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 5c2ba29e475af9715167a6e216f6e11ebf3de5b74c9c0ef82a072fcc5b82f0b9 kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm e8c76ae502a31fad11b61a7c3f84946a88ad33c1507674f42831a9b51efa7371 kernel-devel-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm f8c2e13f61ff8edb0cade17d2437bdfe5a9ea71b06519ee21b39389b16777ea8 kernel-devel-matched-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 2b0bd746037495e7e203b66b3e5564ce6b7c99e41227877ab49d9b1c49a65384 kernel-doc-5.14.0-427.28.1.el9_4.cloud.1.0.noarch.rpm d634a5ae6d178d45a878db264f0463d655b23030e00710da55aba679ad64f845 kernel-headers-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 7b2a47ea6a1f9658ab7c3187c6dddce5a0287c47a992bd1daf642dd03cc99c34 kernel-modules-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 3f2c3212c34ff5389e9db655f77dfcca845e78ae9644921eda0bc9699b57bbc4 kernel-modules-core-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 0185c34defb2ed4187c7234742fe0701f7e1730ae384dc3223d500565559229c kernel-modules-extra-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 98e8473e5cac662d72832b46f2f4e1d2418948684c79340bd72e074e70699711 kernel-tools-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm d1bea8adbfc21a654082f2e7e710dbe31849911f1a2e3d769f1e9b0672b7a05c kernel-tools-libs-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 043574a26073e024030089281102fc692f97c8afe8d6db2f33bf1a958747e057 kernel-tools-libs-devel-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm a6333a3f8829d8285faf64848b0305a5dba329071540c5ec33f2a9d5e8e46456 perf-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 20439d0d424a42082e700e281604b224be5140d52398703f11f10272ba6289f9 python3-perf-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 2a96b41b33bc3f7d1bbec9201150fe97eabed3b41ba829deefb71e31a5703ec0 rtla-5.14.0-427.28.1.el9_4.cloud.1.0.aarch64.rpm 72b4551218405d3ce4fabfba74e1402c9f606a67bb0dc614ab737d3ff6730145 RXSA-2024:6567 Moderate: kernel security update The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629) * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630) * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720) * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886) * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946) * kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791) * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797) * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875) * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000) * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801) * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883) * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019) * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619) * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979) * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559) * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927) * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936) * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040) * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044) * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055) * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096) * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082) * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096) * kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102) * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131) * kernel: nvme: avoid double free special payload (CVE-2024-41073) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Copyright 2024 Rocky Enterprise Software Foundation Rocky Linux SIG Cloud 9 1 Moderate An update is available for kernel. This update affects Rocky Linux SIG Cloud 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: efivarfs: force RO when remounting if SetVariable is not supported (CVE-2023-52463) * kernel: nfsd: fix RELEASE_LOCKOWNER (CVE-2024-26629) * kernel: mm: cachestat: fix folio read-after-free in cache walk (CVE-2024-26630) * kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again (CVE-2024-26720) * kernel: Bluetooth: af_bluetooth: Fix deadlock (CVE-2024-26886) * kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946) * kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() (CVE-2024-35791) * kernel: mm: cachestat: fix two shmem bugs (CVE-2024-35797) * kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems (CVE-2024-35875) * kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (CVE-2024-36000) * kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area (CVE-2023-52801) * kernel: net: fix out-of-bounds access in ops_init (CVE-2024-36883) * kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() (CVE-2024-36019) * kernel: usb-storage: alauda: Check whether the media is initialized (CVE-2024-38619) * kernel: net: bridge: mst: fix vlan use-after-free (CVE-2024-36979) * kernel: scsi: qedf: Ensure the copied buf is NUL terminated (CVE-2024-38559) * kernel: xhci: Handle TD clearing for multiple streams case (CVE-2024-40927) * kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() (CVE-2024-40936) * kernel: net/sched: Fix UAF when resolving a clash (CVE-2024-41040) * kernel: ppp: reject claimed-as-LCP but actually malformed packets (CVE-2024-41044) * kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() (CVE-2024-41055) * kernel: PCI/MSI: Fix UAF in msi_capability_init (CVE-2024-41096) * kernel: xdp: Remove WARN() from __xdp_reg_mem_model() (CVE-2024-42082) * kernel: x86: stop playing stack games in profile_pc() (CVE-2024-42096) * kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" (CVE-2024-42102) * kernel: mm: avoid overflows in dirty throttling logic (CVE-2024-42131) * kernel: nvme: avoid double free special payload (CVE-2024-41073) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. rocky-linux-9-sig-cloud-aarch64-cloud-kernel-rpms bpftool-7.3.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm ab80caedb470b93db747d4334d5dcdf9b8efecece7ffc9ae6ef38c40b2416dbf kernel-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm a63c45a22d34d1a95415cb695936e22129c1892239093c94b005b6e8423157b8 kernel-abi-stablelists-5.14.0-427.35.1.el9_4.cloud.1.0.noarch.rpm ddf8ca7ed1e0a4ba9158e649468efdae9ee5fa82138f2dec852629079604ab19 kernel-core-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 0e81d6ef4341eb6365ee830c7264f73bf555d65eea35b6e0fb1bd1952f2a7bd3 kernel-cross-headers-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 3d40a31a0cafd3ba01e9c3b7c30e0327eb725232faccd589d516bd80d750b42d kernel-debug-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm cb0ac28f9cbdec669dcc347840837da0736924611abb12403cba59448ef1c1d4 kernel-debug-core-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 3c75fcc4921241dde2414bf3c62b800d31a817049fdfab5f4f51ddc9eacde31e kernel-debug-devel-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 9ca0faa919b3ff822c894c0785c490b299360facab0d18846421e747ac29b794 kernel-debug-devel-matched-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm cedb58554f14b6424eba376a913d298436a800ac282175bcad2120a5e12b68ea kernel-debug-modules-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 3b06c9ea30909e20a242f2c99518ac4b9af1880d76403975e8e998512c1106bf kernel-debug-modules-core-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 07e50e2fa417005c3098657ac8d8cf8010f8a4b7800289647dcf0f15392549d5 kernel-debug-modules-extra-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm ed65884073e6bc997da3b5335036e4191f9f04489cfc10aed397dbb563227400 kernel-devel-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 38452180e99a313e7775b8a1d2b9d4f60f7ee92b9dd23d628ca3f9efee184e03 kernel-devel-matched-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 4ba34afed046827d7ec52d2c97ba4a8795c8768737a5279f8dec27959091a4d7 kernel-doc-5.14.0-427.35.1.el9_4.cloud.1.0.noarch.rpm 7f5e0fd7b778a5de57cfbedbdf18e15b1a836a7f0704ac87e94a3aec9e6b7019 kernel-headers-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 47fe4e5a05a49c5d953dcc08a2aecb2122433504ddab5cfc62f1afe33fa55847 kernel-modules-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 2d8aabacc89775fe30d9891088d0ac2841489c111b22c7dda6720255582bfd02 kernel-modules-core-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 30e2f53dc3b4834386b0a7797c3431e2ac99c9077d19d1953191e8979f332067 kernel-modules-extra-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 5f90d31c63a9893de2f11eec7568fccdf3e251acb35eaf7294f71afaf39e08b3 kernel-tools-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 6e0b7d419b58222951af8b680ef140de909b47aa8c6452d1dca229cb2e7a6783 kernel-tools-libs-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 88e1322babc449fc1d2e925fcafd9d39a13f8f3da67c4c12aec836703e1ac900 kernel-tools-libs-devel-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 3f3e87aa0e860a5823c4aefdc08b58a222c1976d6be3e62370872848d9e26e0e perf-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm 99252dc47a391319d2df1a09fcb7837f5bf713304fb03ab1ba777790fb02c654 python3-perf-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm a0900d538b1e4a019b67242322ac810940b1a5f3187cbdcc0a8f60d75783c964 rtla-5.14.0-427.35.1.el9_4.cloud.1.0.aarch64.rpm c3dbb768113a0577c70e72352257bc388c28df443490797722e3afd42f51282f