RLBA-2022:8321
tuned bug fix and enhancement update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.
none-rt-rpms
tuned-profiles-realtime-2.19.0-1.el9.noarch.rpm
fb0dbba6e33e15cead237638bb3ba2217f1f97dad6d226fbf28ddc5b6f256016
RLBA-2022:4000
new packages: tuned
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
None
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
For detailed information on changes in this release, see the Rocky Linux 9.0 Release Notes linked from the References section.
none-rt-rpms
tuned-profiles-realtime-2.18.0-1.el9.noarch.rpm
ed91e68f132251d7141dc5bfc1e2dce751baa2c78e5bdc056f5bb94c87a0c243
RLSA-2025:15011
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (CVE-2025-37823)
* kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (CVE-2025-38200)
* kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction (CVE-2025-38211)
* kernel: net/sched: Always pass notifications when child class becomes empty (CVE-2025-38350)
* kernel: tipc: Fix use-after-free in tipc_conn_close() (CVE-2025-38464)
* kernel: vsock: Fix transport_* TOCTOU (CVE-2025-38461)
* kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (CVE-2025-38500)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.39.1.el9_6.aarch64.rpm
fdb144432149f435470ead3e1c2c179fe4b17e2bf310e62b703f636dc1acb61d
kernel-rt-64k-5.14.0-570.39.1.el9_6.aarch64.rpm
c41032f81ccdef65fb1aa0515392f6718980f1afae5c037927230b1c70747fa6
kernel-rt-64k-core-5.14.0-570.39.1.el9_6.aarch64.rpm
1ed16e61b74da39d4c7dc0bf41fac3c1ca00d6bc9a8f3d493e6d39c23df2a3c3
kernel-rt-64k-debug-5.14.0-570.39.1.el9_6.aarch64.rpm
ccea62c3bcb1f5340e11f6e0c2a2445df3d90c0b13369ce564f7fcb1e60bf50a
kernel-rt-64k-debug-core-5.14.0-570.39.1.el9_6.aarch64.rpm
533cca5229f142500f60350cd15910c666487971389c138e0646943bea441d5b
kernel-rt-64k-debug-devel-5.14.0-570.39.1.el9_6.aarch64.rpm
efa9ba1b10df06db96adeb89443ab4e8e53c695ef686c9ceb6ead078b21daea6
kernel-rt-64k-debug-modules-5.14.0-570.39.1.el9_6.aarch64.rpm
1c05a33115e9f30641d14bd860fd8d5b14c29798476e892bd9cb46d574e5fffd
kernel-rt-64k-debug-modules-core-5.14.0-570.39.1.el9_6.aarch64.rpm
11146918455c1b62ae48a6888dfc1bde32dba792bb49738ea53cf54c434879ed
kernel-rt-64k-debug-modules-extra-5.14.0-570.39.1.el9_6.aarch64.rpm
5cdcedbe2507402e5b3d94254c6b457879b591e625f8a418d59d061826338962
kernel-rt-64k-devel-5.14.0-570.39.1.el9_6.aarch64.rpm
c9e7b3de18acfcb2c272c9a10094941723d5d0ba7f12cec1b218483f96a185f7
kernel-rt-64k-modules-5.14.0-570.39.1.el9_6.aarch64.rpm
3bd1f8c1607acf9f59ba3636f6faec095bacddb6957af0b14f9723720d2f4c6a
kernel-rt-64k-modules-core-5.14.0-570.39.1.el9_6.aarch64.rpm
10e2380fe1188f19b9b0afc93af92f3fc710e61ebdf7cd394bbfbd8ab796fa1a
kernel-rt-64k-modules-extra-5.14.0-570.39.1.el9_6.aarch64.rpm
f159790f0060376be74fccd2ea17b3d40f1ebc0ff2fce85da5c3dc72805e601f
kernel-rt-core-5.14.0-570.39.1.el9_6.aarch64.rpm
6065ad27a54d395da7506269d75946742ff4eb6f16dba5d8e64ab2bda732612e
kernel-rt-debug-5.14.0-570.39.1.el9_6.aarch64.rpm
e540fa9e93fb3d1bfec6366e84087fb3a0273e4d8a77def9fdc5a7c701405e0c
kernel-rt-debug-core-5.14.0-570.39.1.el9_6.aarch64.rpm
6db115abb28aad3d49d56c85211b51d91baabdc6a3c7940a50f9e9367e758495
kernel-rt-debug-devel-5.14.0-570.39.1.el9_6.aarch64.rpm
0448617ae4aa78914fb6810762913e5852981dbd0f9ba6d135c31f7089b7deb5
kernel-rt-debug-modules-5.14.0-570.39.1.el9_6.aarch64.rpm
59c937fcb4270a0addadfa3c878ff366fd0008f0177056864aacaf57125638dd
kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6.aarch64.rpm
067eb0b1a7300d21245eecffa5aac4a04e35a5f4501f6e097e71fa52281c8ba8
kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6.aarch64.rpm
128b85cc73e5410245c4c2b174fa33c3d3fc916ebba29bc65c4b60bd4cd7ec5d
kernel-rt-devel-5.14.0-570.39.1.el9_6.aarch64.rpm
d631ec1a5f639785747a95e539a5a1bc893d4c15b3875a757c66a24db172aff2
kernel-rt-modules-5.14.0-570.39.1.el9_6.aarch64.rpm
4f34b21a61b6fea339065deb646b80cd0f22c83bade654531a055161a00cebaa
kernel-rt-modules-core-5.14.0-570.39.1.el9_6.aarch64.rpm
1cac0f190d63305c28f9c124255a4f52c68924ee23be40b7952e523fedec3d33
kernel-rt-modules-extra-5.14.0-570.39.1.el9_6.aarch64.rpm
aaaac57aa7135d2dd7d7416e93ae50ab37ec35a19e541ef98487133c23722904
RLSA-2025:15661
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: drm/vkms: Fix use after free and double free on init error (CVE-2025-22097)
* kernel: scsi: lpfc: Use memcpy() for BIOS version (CVE-2025-38332)
* kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (CVE-2025-38352)
* kernel: drm/gem: Acquire references on GEM handles for framebuffers (CVE-2025-38449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.42.2.el9_6.aarch64.rpm
956906caaf8353009b1473b8fdeed7ea38a14e2ba0021697b714f36ae9e355a2
kernel-rt-64k-5.14.0-570.42.2.el9_6.aarch64.rpm
61e4675323704635bcd874fd7e75294cb4ffd0ab39e19d4eca554d38ee0748f6
kernel-rt-64k-core-5.14.0-570.42.2.el9_6.aarch64.rpm
fa5b63e43040b0f9a23b4c4db39a4e60076491c8a2d7c9537af020d02eb4a1bd
kernel-rt-64k-debug-5.14.0-570.42.2.el9_6.aarch64.rpm
86bc71e04ff35d1bf832a3633ff3ab1f448209fd39602ae7e32c264999d19bdd
kernel-rt-64k-debug-core-5.14.0-570.42.2.el9_6.aarch64.rpm
c8477cee301984c910435c49c8ba1381136c001ab88b3c3afc87fb99cbedf37c
kernel-rt-64k-debug-devel-5.14.0-570.42.2.el9_6.aarch64.rpm
a140ddfe9bf76d24861b66fee94af925808ff6ca3175a9a934e6902f6d905030
kernel-rt-64k-debug-modules-5.14.0-570.42.2.el9_6.aarch64.rpm
ef71389d0a458c05c969ee38465b1e773692a406b35c3417a3ff0c189933b2c1
kernel-rt-64k-debug-modules-core-5.14.0-570.42.2.el9_6.aarch64.rpm
8c31397ab0bba43961dc56ebf0cb21885cac31fc08e72f98e8be6976e88bc2e2
kernel-rt-64k-debug-modules-extra-5.14.0-570.42.2.el9_6.aarch64.rpm
4ebcfd1288ff99c54b5ac59c63454f45c010586697cadda5001a799de333e092
kernel-rt-64k-devel-5.14.0-570.42.2.el9_6.aarch64.rpm
92b2162028d813e82af9b7d81818218e20446e6775c672e489e70bec37e40764
kernel-rt-64k-modules-5.14.0-570.42.2.el9_6.aarch64.rpm
93f05ca3cdc12c46dca194ecf66a2acc22e555ead613b178ef5e6011b6ede8d8
kernel-rt-64k-modules-core-5.14.0-570.42.2.el9_6.aarch64.rpm
5a441e74c94530675543a07ab7f7f64795ebb68b8c532f08b830fe5aefc595b3
kernel-rt-64k-modules-extra-5.14.0-570.42.2.el9_6.aarch64.rpm
34fec93b5148973236ea7d5f06cd997cd00ac6e45472acb98c809cde3e41a7d7
kernel-rt-core-5.14.0-570.42.2.el9_6.aarch64.rpm
7fb7d495a5ea9a3bc045feb3ffa00a4da71b3a3271c4a51e25e3d5328224a557
kernel-rt-debug-5.14.0-570.42.2.el9_6.aarch64.rpm
7e76f6c005ae15476c28242df2d988eed9cac22ebf847a57bc9427be61bc8093
kernel-rt-debug-core-5.14.0-570.42.2.el9_6.aarch64.rpm
15334760135f9974da38c1f6e04193856f597be944c11d69fda4a2a027f74c5d
kernel-rt-debug-devel-5.14.0-570.42.2.el9_6.aarch64.rpm
5384721280e23b217506612eb49b9d8225166a3227d955c262e474800615a270
kernel-rt-debug-modules-5.14.0-570.42.2.el9_6.aarch64.rpm
bfe2ced31431f22981db2c07bf60eb50769a274c49604ae95084847c6a4b407c
kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6.aarch64.rpm
dbe2b8b4987cbc6078e3561e72a9fd5649c9e75b3d2b93094b39855f7d12d3e0
kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6.aarch64.rpm
8fe6241368da9e3ce3a122830ff31a4ab422eb0ef0f87b9fb438feb225ca9422
kernel-rt-devel-5.14.0-570.42.2.el9_6.aarch64.rpm
9629ae1dcf586168c97fca0b9d0f17635f19d6dfe5df10ce6ca800664c2f247b
kernel-rt-modules-5.14.0-570.42.2.el9_6.aarch64.rpm
0208747f8aeb7a84a19bb9e0e98d04ad6534b55b8f41833ae0fdbcc8d2a18b36
kernel-rt-modules-core-5.14.0-570.42.2.el9_6.aarch64.rpm
00d357e9a1c97280f300752ff8736bd23c7cae4cb62ed8268b06e5f6e62ea861
kernel-rt-modules-extra-5.14.0-570.42.2.el9_6.aarch64.rpm
e1ed9d9bfb6904aa7f7e7ed4497cf45be346c1116b05ccbbfdadb847af801b45
RLSA-2025:16880
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (CVE-2025-38472)
* kernel: smb: client: fix use-after-free in cifs_oplock_break (CVE-2025-38527)
* kernel: sctp: linearize cloned gso packets in sctp_rcv (CVE-2025-38718)
* kernel: tls: fix handling of zero-length records on the rx_list (CVE-2025-39682)
* kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (CVE-2025-39698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.49.1.el9_6.aarch64.rpm
e2dee15aa3b983b91320da3a805ea60332099602f3c3677d33199fbaf028ce6f
kernel-rt-64k-5.14.0-570.49.1.el9_6.aarch64.rpm
e6a192e2ff4123ee6757b419989ff87924fb75d04151d6acecd4d95281ca7951
kernel-rt-64k-core-5.14.0-570.49.1.el9_6.aarch64.rpm
146df170cd9f0b84b304ac1b1aeb7bf9b13e9a0e4bb774b512f6827c2124b924
kernel-rt-64k-debug-5.14.0-570.49.1.el9_6.aarch64.rpm
1687a5dfd9c6007ac03c6e45f6e7aa00a7bd33c742a52667bbebbadb5966592d
kernel-rt-64k-debug-core-5.14.0-570.49.1.el9_6.aarch64.rpm
ad8e9bedcd5ce4f7c2c80c3cff522f4dbec71e7dc1603fcd24b209b3244ef2b5
kernel-rt-64k-debug-devel-5.14.0-570.49.1.el9_6.aarch64.rpm
4f2a8cdf5137037079d356d78c3c721d9856e9292fe6f803a70ef8e9eae59fa4
kernel-rt-64k-debug-modules-5.14.0-570.49.1.el9_6.aarch64.rpm
d3f19aea26f13c66672dbd7055f3a37e99a48f4cbda0f94a7c1a95921939b289
kernel-rt-64k-debug-modules-core-5.14.0-570.49.1.el9_6.aarch64.rpm
adb530dfa7559377eb122121f6fcd6b7c0b1bda360e1b54dbb48e147c004cfe5
kernel-rt-64k-debug-modules-extra-5.14.0-570.49.1.el9_6.aarch64.rpm
33c59fe56ecc36766604f42dec3e57a0ad8df6fdc0818d1a22ddc428776811d5
kernel-rt-64k-devel-5.14.0-570.49.1.el9_6.aarch64.rpm
588e272c482c75eda42acf33791c5bbb66db0251db850185170312f3db1794ae
kernel-rt-64k-modules-5.14.0-570.49.1.el9_6.aarch64.rpm
1225975155483488cbe67d3ccd8f5dbb26513d1b7716682f6fba1acfee07f02d
kernel-rt-64k-modules-core-5.14.0-570.49.1.el9_6.aarch64.rpm
237f77081e784f3625b069a60d2ce705f21da8b8bd995a398d58683070d8efdb
kernel-rt-64k-modules-extra-5.14.0-570.49.1.el9_6.aarch64.rpm
50829b86d08fbbad1efb8dcd988808d1534807a9e3e9363e53f9f781ce2ed7fc
kernel-rt-core-5.14.0-570.49.1.el9_6.aarch64.rpm
d9ad3a2bbd034c7baf99b3241d8c7b6e932eeb892ef78cbef6655229d4819ca7
kernel-rt-debug-5.14.0-570.49.1.el9_6.aarch64.rpm
aa0a4d5c40347f55888bf72ad735415ba54c6c75f158784349d6e93e483515b3
kernel-rt-debug-core-5.14.0-570.49.1.el9_6.aarch64.rpm
01934bb4e23890f53549627a511b1c9faa14f392a422529d53c34150ff016fff
kernel-rt-debug-devel-5.14.0-570.49.1.el9_6.aarch64.rpm
29c3bb70157f5930b58f039c4023a701f314bd90c6c552c23ad9fdabd6b65fbb
kernel-rt-debug-modules-5.14.0-570.49.1.el9_6.aarch64.rpm
2727db281785a4eebcb55191c28d5563c28c939da3c461292207516ba1718d22
kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6.aarch64.rpm
765a72953c730780b4ad07c4ec7c73177ad22fa535a49d26159b57e2688242f8
kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6.aarch64.rpm
14cced1512e533f63aeb01c1f8c71ec8a90b0384992522db0377de1e059fe7de
kernel-rt-devel-5.14.0-570.49.1.el9_6.aarch64.rpm
e41e1fc5006c24ba13c4da21f19443eaadc8a7c0ace79fc7f475903940d9c68c
kernel-rt-modules-5.14.0-570.49.1.el9_6.aarch64.rpm
a022c6c780306afe589c8ba7132c142b9ea0c5adec70f4a37ea5d5fda4a7daf6
kernel-rt-modules-core-5.14.0-570.49.1.el9_6.aarch64.rpm
3e97e76e3e6a9bce05690901473c9e833f6d0f11185e4ea4d598c8007f0fd7ac
kernel-rt-modules-extra-5.14.0-570.49.1.el9_6.aarch64.rpm
8c1dabae578f17a1bfdd20061858114ab6f607067d9368f15fe16d3148198f3c
RLSA-2025:17760
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: HID: core: Harden s32ton() against conversion to 0 bits (CVE-2025-38556)
* kernel: eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
* kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors (CVE-2025-39757)
* kernel: crypto: seqiv - Handle EBUSY correctly (CVE-2023-53373)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.52.1.el9_6.aarch64.rpm
856825b7e4fdffbda234db977af4d031d73d7984b394db582420b87a951ab845
kernel-rt-64k-5.14.0-570.52.1.el9_6.aarch64.rpm
498a570bbec1f143e5bf47924923c43f2311ac9d69fc9f9eccaaa0d0932831d5
kernel-rt-64k-core-5.14.0-570.52.1.el9_6.aarch64.rpm
ad553c20012c189cda64eeea5dcc5e531b1e6ca5bc625891ed72be927d8e061e
kernel-rt-64k-debug-5.14.0-570.52.1.el9_6.aarch64.rpm
e6877480b53a28fa938008d88bac025e4e8dd6cb4affa7136a20c88f61fccd7a
kernel-rt-64k-debug-core-5.14.0-570.52.1.el9_6.aarch64.rpm
4d8015d36273f5eecdd04761f9cecbf060ea8eb81b456a3fa46236d4111407c5
kernel-rt-64k-debug-devel-5.14.0-570.52.1.el9_6.aarch64.rpm
a7a17bf4308314a96227c0ff303c33283e6ef9efe6b34cb0901f638fb22416d6
kernel-rt-64k-debug-modules-5.14.0-570.52.1.el9_6.aarch64.rpm
dddb56c19b68d62d2f02d190b0e382c2b344941f03029f36846a21f10a0b70de
kernel-rt-64k-debug-modules-core-5.14.0-570.52.1.el9_6.aarch64.rpm
750fa3410e8c8eb714c278e69559dfe47bbb72ea2f33b657c89a353cb2cf37d1
kernel-rt-64k-debug-modules-extra-5.14.0-570.52.1.el9_6.aarch64.rpm
1163754e0f9f99655a95bf0164dbed718971527a7b8f4014f3603d364e417fda
kernel-rt-64k-devel-5.14.0-570.52.1.el9_6.aarch64.rpm
0f8a8a9aa81eb9d1a56bc234a9dc3d753fb58c9af3046db0f3e00b9fa9d204aa
kernel-rt-64k-modules-5.14.0-570.52.1.el9_6.aarch64.rpm
a15ed44204b88beb76d9a48633c8601b077f0c95add95447ca17fc3f319de617
kernel-rt-64k-modules-core-5.14.0-570.52.1.el9_6.aarch64.rpm
adcb392cdeb4361cb929dfec13eccc282fd7c0e5ba5ac9c9a817e541c20d2dbf
kernel-rt-64k-modules-extra-5.14.0-570.52.1.el9_6.aarch64.rpm
cb937569ab7babd6a55aa5e7cffc2ea90f90c8ecef429ea343e1aacfa44fe5fd
kernel-rt-core-5.14.0-570.52.1.el9_6.aarch64.rpm
3c1a5a793b73adb98ef7a8c4cc829ed25fff87c9df071d5628e37f81ea72d64b
kernel-rt-debug-5.14.0-570.52.1.el9_6.aarch64.rpm
dd140372dcea447e69500ca70c83d3dd07a9f1f2f5c34ee45b9037747ddb4b9e
kernel-rt-debug-core-5.14.0-570.52.1.el9_6.aarch64.rpm
9d64a935a89fe99d59cd7a9ff588320be15a331a483c0020186e7f4fc5fd24d5
kernel-rt-debug-devel-5.14.0-570.52.1.el9_6.aarch64.rpm
9414c76d7428f684bff9ff8f6a802f4a4f4deaf304b170e5befca2ca6e906f1b
kernel-rt-debug-modules-5.14.0-570.52.1.el9_6.aarch64.rpm
11d0dccfe9405ebde3b472f4ef54994fabac6de579ac5c16d4a99135dfe98423
kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6.aarch64.rpm
e9e12ea0fa138ce5e7a930340c5d015e201577fa3c4931ded14bcbf10efdf3ae
kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6.aarch64.rpm
2da075192ba5fcc5f7bfd396fd82504d0d432a1ceb84bc1f8e277af21a50e6bc
kernel-rt-devel-5.14.0-570.52.1.el9_6.aarch64.rpm
e4cd0d431d0b75d3496d2470cd8b8d780a2f814b1b31059bde34a9a07e4f9a49
kernel-rt-modules-5.14.0-570.52.1.el9_6.aarch64.rpm
e73c157b26d5a949194a6ef38d6b2b12d20c54a9035a2b4842964c97a5ab71cd
kernel-rt-modules-core-5.14.0-570.52.1.el9_6.aarch64.rpm
311eb84109ab9f7a852b14751b321dd8b916538d8fc6eefe9871788b21d45ceb
kernel-rt-modules-extra-5.14.0-570.52.1.el9_6.aarch64.rpm
54d7852d2108aa9ca9f498bbc9f6eb3659ef8857ca36ae64f72f1aca931bc42e
RLSA-2024:10384
Important: tuned security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for tuned.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The tuned packages provide a service that tunes system settings according to a selected profile.
Security Fix(es):
* tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root (CVE-2024-52336)
* tuned: improper sanitization of `instance_name` parameter of the `instance_create()` method (CVE-2024-52337)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
tuned-profiles-realtime-2.24.0-2.el9_5.noarch.rpm
d203ac52ac9bf9dc064403daa035f047eaf387bbf9ef82c4da24f993f918a45a
RLSA-2025:19105
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: vsock/virtio: Validate length in packet header before skb_put() (CVE-2025-39718)
* kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (CVE-2025-39730)
* kernel: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (CVE-2025-39751)
* kernel: fs/smb: Fix inconsistent refcnt update (CVE-2025-39819)
* kernel: pstore/ram: Check start of empty przs during init (CVE-2023-53331)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.58.1.el9_6.aarch64.rpm
f780491df25ceb5df5c2504f80d55fdb45aa4dcc4a8be80845c2a735843d2c50
kernel-rt-64k-5.14.0-570.58.1.el9_6.aarch64.rpm
5c01691c661a093d111798138885258d9a59ee64bb701d03dc98aaf2eb726db9
kernel-rt-64k-core-5.14.0-570.58.1.el9_6.aarch64.rpm
aa93e393ee5dea2d962892c2dd01969aae1b9673be193b266f2110951b254d7b
kernel-rt-64k-debug-5.14.0-570.58.1.el9_6.aarch64.rpm
51ca0a46bb388840af9cf0f53d5b6398cac3275e9c274391a9250136a53f553e
kernel-rt-64k-debug-core-5.14.0-570.58.1.el9_6.aarch64.rpm
288457ee422e34ced2dbb6cad6c3c6e6d4932fb51ecd710bfee755e5df44f062
kernel-rt-64k-debug-devel-5.14.0-570.58.1.el9_6.aarch64.rpm
ffaf7e955e8fe87dd9c31cb6149efff550da3046a87e325fb6284b3e44b8f99f
kernel-rt-64k-debug-modules-5.14.0-570.58.1.el9_6.aarch64.rpm
0998b2a452d2d946fd6cbc49b26a81aa9960c19e18b545ef22861eb7d8b4fdc4
kernel-rt-64k-debug-modules-core-5.14.0-570.58.1.el9_6.aarch64.rpm
efaa8192c8c3e7ed36767ff03e1f32f3ca1c9fd1f39c3034713f06e936ce4c92
kernel-rt-64k-debug-modules-extra-5.14.0-570.58.1.el9_6.aarch64.rpm
de2c23aabecde4597435bcdc10fb2bb007c78bd305a41a712d1ca65037fc7bbc
kernel-rt-64k-devel-5.14.0-570.58.1.el9_6.aarch64.rpm
0d5f8fe5bf5bf04dc59644b5d86c4eb7b2c51108e80cb3a341fda5c092189e6a
kernel-rt-64k-modules-5.14.0-570.58.1.el9_6.aarch64.rpm
81a943b73c7f7c175396a4ec63617fa782a1e7ecbc295dd6e6038fb5116911c1
kernel-rt-64k-modules-core-5.14.0-570.58.1.el9_6.aarch64.rpm
86eaa4047e90ef3608351dfa6481e6d94f109b5159ca2a1a719dbbb872b014f9
kernel-rt-64k-modules-extra-5.14.0-570.58.1.el9_6.aarch64.rpm
bcc196f27642666b337e843315125e5f9d0997b9bcd0ad263e5465f9e3412099
kernel-rt-core-5.14.0-570.58.1.el9_6.aarch64.rpm
d6303dc172f19089583bb9946df25ed374236cdbbc4277ca4214129f3774fca2
kernel-rt-debug-5.14.0-570.58.1.el9_6.aarch64.rpm
91662bb631bcf65b95bc4c0c877a6113652f0343738a239473dde29a6519c385
kernel-rt-debug-core-5.14.0-570.58.1.el9_6.aarch64.rpm
37e5a901a79c1c90801c5c0c0168dcce2a57877b9808682064fa0fde9c492d39
kernel-rt-debug-devel-5.14.0-570.58.1.el9_6.aarch64.rpm
684d73a88deed1c8fd590564c88e069a9787e436f5ccbcc0e0a7d07a53855de7
kernel-rt-debug-modules-5.14.0-570.58.1.el9_6.aarch64.rpm
bafae74ded7fdbdbe70eadb05b10940104ef034a61abfa0d4d921f7872c63952
kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6.aarch64.rpm
6f1d48741d999a59a7c6af9883626eb2820c7d44c6e24bf56e492aef864e60de
kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6.aarch64.rpm
c7b2d10fe6cc86d54651ebdb7c492c87d46a0e1331702172405a1371971c33a3
kernel-rt-devel-5.14.0-570.58.1.el9_6.aarch64.rpm
9dd4b232fd9d51e00c8f471ea5cb82d089c68f60e44b7b5747ffdb1f24d2979e
kernel-rt-modules-5.14.0-570.58.1.el9_6.aarch64.rpm
5154794d1989590cef346850312505c60dc30b4c221ce85e5943adea6b70a1bc
kernel-rt-modules-core-5.14.0-570.58.1.el9_6.aarch64.rpm
4e91cf692c87bb788a93f52544c36477ac7205f0e464f49de144c975d9cebc51
kernel-rt-modules-extra-5.14.0-570.58.1.el9_6.aarch64.rpm
7ae0fc5553c5e1551dffe1a045d9272d930f2098b25766771476bed06d190057
RLSA-2025:8142
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: cifs: Fix integer overflow while processing acregmax mount option (CVE-2025-21964)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.18.1.el9_6.aarch64.rpm
15e454a32f3faaafac6a9258ea9de41e7a9d6c69edf820a779da46fb362e1054
kernel-rt-64k-5.14.0-570.18.1.el9_6.aarch64.rpm
738d2d41e0621f42a8f42f7ddcca32fc9eaefa280c92b871e146a0e87f4284c1
kernel-rt-64k-core-5.14.0-570.18.1.el9_6.aarch64.rpm
77fac0c5cb8ce2c627692d63d6081fd8b47a306212f6a7cb7f04706087e8c51b
kernel-rt-64k-debug-5.14.0-570.18.1.el9_6.aarch64.rpm
1fe166999c3f7f8ee92617eaa919e644866095a625629f0a0a2e4ba2e0b6c740
kernel-rt-64k-debug-core-5.14.0-570.18.1.el9_6.aarch64.rpm
282ec67211d3387a63b9f8cf02497f9271e6ba5b3fb36dd01cdf1fd687f46c92
kernel-rt-64k-debug-devel-5.14.0-570.18.1.el9_6.aarch64.rpm
92d7f8426bc3d6e0d4088c6472490ebb37ccd6076c799033e4e66d127736b58a
kernel-rt-64k-debug-modules-5.14.0-570.18.1.el9_6.aarch64.rpm
f127a926c32bc21d878a22ac30561f0acf2d93097e2aecb183fbcfe0c2d6a08e
kernel-rt-64k-debug-modules-core-5.14.0-570.18.1.el9_6.aarch64.rpm
d1e52bb057fe6b8f737dd6b42adef7d35bfbf1dc5f605c264ecdaf071346fad7
kernel-rt-64k-debug-modules-extra-5.14.0-570.18.1.el9_6.aarch64.rpm
54412f7e889699fa2f139aab1dd13f0ec91695b87a95cc3f4ee4a4e2d4270429
kernel-rt-64k-devel-5.14.0-570.18.1.el9_6.aarch64.rpm
4bcea62b9d054b146422833688d3fbd2d67f9d6ceaba81ee68c1410f9b3bef94
kernel-rt-64k-modules-5.14.0-570.18.1.el9_6.aarch64.rpm
02e839e4abba19f9bbc49a5789aaa506fdfdd50ffb1422ed52ea854b1048b8f4
kernel-rt-64k-modules-core-5.14.0-570.18.1.el9_6.aarch64.rpm
1c5464077bb63a27698b61ef97a9878033020c3612db47b3b04fc57a97e07213
kernel-rt-64k-modules-extra-5.14.0-570.18.1.el9_6.aarch64.rpm
c71481ee1e8fe967fd94f5130429c75c78f4858f9d2acb5629ae8aa2479eb0bb
kernel-rt-core-5.14.0-570.18.1.el9_6.aarch64.rpm
ae8b3e5b5d59e23315a368e77452e6aa55cfbb27ce7a8694631af509675a5860
kernel-rt-debug-5.14.0-570.18.1.el9_6.aarch64.rpm
3c989a8cbcd0b98cf9f1ed437acc6b4a4719888e2fdc2637b0349cfe52093155
kernel-rt-debug-core-5.14.0-570.18.1.el9_6.aarch64.rpm
e8c324018fb07a1cbab11cee659aeb6942b4c20086c67e20474a2b873c531e7a
kernel-rt-debug-devel-5.14.0-570.18.1.el9_6.aarch64.rpm
54c5a8ff2bdeb03d5541f902e3d45d74cad1005063be24fe922fad29c580b1cb
kernel-rt-debug-modules-5.14.0-570.18.1.el9_6.aarch64.rpm
f656aa9d31c44a271c58718e710968fd393b2c5652dfb993b6858eff49d2ee40
kernel-rt-debug-modules-core-5.14.0-570.18.1.el9_6.aarch64.rpm
812b0c8547544492a9067173cacec00a9630fc83edd0a64b1d66f8547608ad41
kernel-rt-debug-modules-extra-5.14.0-570.18.1.el9_6.aarch64.rpm
4215f90589966fac8dd1e37d26ab6761f75531dc11c144bd33a62f8bef794003
kernel-rt-devel-5.14.0-570.18.1.el9_6.aarch64.rpm
c331a0d37db72d4b21099b8513265174e23936c6679596b8c3e9ee1a2595f037
kernel-rt-modules-5.14.0-570.18.1.el9_6.aarch64.rpm
d88e39e48c44a6eaa670692dcbd94e14aca77dbcbf45d3014d98be4cf8450760
kernel-rt-modules-core-5.14.0-570.18.1.el9_6.aarch64.rpm
98e70de38925be7fb5f981b5179a2441a622f99593c3e70a14ed658a20f61d0c
kernel-rt-modules-extra-5.14.0-570.18.1.el9_6.aarch64.rpm
002aa675fd901cfc2e49aaa659ec9afc62486833acb6f382afe890f5e5c1db29
RLSA-2025:8333
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Use after Free in gru_set_context_option leading to kernel panic (CVE-2022-3424)
* kernel: ndisc: use RCU protection in ndisc_alloc_skb() (CVE-2025-21764)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.19.1.el9_6.aarch64.rpm
cf335ba5f077ebd9625bff0d50a2ebe72310a6f31d7c17448ca5d09ca4e7a113
kernel-rt-64k-5.14.0-570.19.1.el9_6.aarch64.rpm
154571df6258201552f727fac747336bcc942ed397bd97a3681ae98c23b10173
kernel-rt-64k-core-5.14.0-570.19.1.el9_6.aarch64.rpm
743b2d2c703ca0b4d3b02d30df7db3ab23f067ed19ba9231d3c1b29baa259594
kernel-rt-64k-debug-5.14.0-570.19.1.el9_6.aarch64.rpm
6198f2587a070f19231736b8942bf3d263d6b106839922bd9c60976e33fe1da7
kernel-rt-64k-debug-core-5.14.0-570.19.1.el9_6.aarch64.rpm
d14ef84d50d755a03eca7163cb67c3a7b90626a85922579f5aff0faaa5daeed4
kernel-rt-64k-debug-devel-5.14.0-570.19.1.el9_6.aarch64.rpm
dad3699ef22620b3ee35b63b79875af948c36fecd38f7cab21118e448cdcba25
kernel-rt-64k-debug-modules-5.14.0-570.19.1.el9_6.aarch64.rpm
fd02a4b142dc50fd97cf7e70380d738e1facd38b3c297bec2e2da4b167fcce8d
kernel-rt-64k-debug-modules-core-5.14.0-570.19.1.el9_6.aarch64.rpm
804d42f94a69fffa8be32df95a06856eefdb59b71c13be24f203531fbe6c3ca5
kernel-rt-64k-debug-modules-extra-5.14.0-570.19.1.el9_6.aarch64.rpm
ba3c28e3b00732cc247b82de7ba6ae2e433c77495dc8c9f025106785aac89e34
kernel-rt-64k-devel-5.14.0-570.19.1.el9_6.aarch64.rpm
d48000ad712284afa35b44cc54ae66e13efcdcf580cc9dd015491b28d67fbc69
kernel-rt-64k-modules-5.14.0-570.19.1.el9_6.aarch64.rpm
84539e46cf75446ac92e68d2560cdee88bb5b8db1cc66a899b37cf9ed0d53d6c
kernel-rt-64k-modules-core-5.14.0-570.19.1.el9_6.aarch64.rpm
50b1f7db5786d60b9b5eeb7b7a20ba667b490e8bb0a9d8796fa0baee8bd3980b
kernel-rt-64k-modules-extra-5.14.0-570.19.1.el9_6.aarch64.rpm
86a7f1c749f611c3522f5f10e07d37aef41afed5ac12bdfbe2b28623e95b2636
kernel-rt-core-5.14.0-570.19.1.el9_6.aarch64.rpm
6f86b6158de674385fb0db63e212e44eefc29d05084bc1decdd6a95226a01064
kernel-rt-debug-5.14.0-570.19.1.el9_6.aarch64.rpm
c359a160506c6919d4629bd595847dc723bb194791d8d78aa288def04e39ca95
kernel-rt-debug-core-5.14.0-570.19.1.el9_6.aarch64.rpm
a617d1626abbcd61cc66656f8734de294fb422bae1586e4366ff8ffe008da7dc
kernel-rt-debug-devel-5.14.0-570.19.1.el9_6.aarch64.rpm
71bdc7f9ee05eaff985eb279a2b562a70cc6185fcf7f02c1d1ed09f1049adacc
kernel-rt-debug-modules-5.14.0-570.19.1.el9_6.aarch64.rpm
272c05f6640a8f0e10e62d30a2b6219509e1c536eace68c8d799db381f3c29ff
kernel-rt-debug-modules-core-5.14.0-570.19.1.el9_6.aarch64.rpm
0e4db85ec68107f1bc6ec2f6d3013cfaf9099fef7c31aad1468d1df37d5b718f
kernel-rt-debug-modules-extra-5.14.0-570.19.1.el9_6.aarch64.rpm
86d7171d47ec14bce86f6d6693b99711e864b0b67294a0d0cb4aeaa92d41ed48
kernel-rt-devel-5.14.0-570.19.1.el9_6.aarch64.rpm
9d9f7ddd71b1fc6c434445e98c4a563518640a5c72b7fb504a3f2a67bc95bf0e
kernel-rt-modules-5.14.0-570.19.1.el9_6.aarch64.rpm
010f8b49c3104b3b74899e41c18d9257d3fa6af16371669a30bad16f2a672f9b
kernel-rt-modules-core-5.14.0-570.19.1.el9_6.aarch64.rpm
8aea8d264e17b46648e1f05ded03d29d2729b7241f4d20df4e200fa47c7a2211
kernel-rt-modules-extra-5.14.0-570.19.1.el9_6.aarch64.rpm
c3f98a669840d0d3f0a042198f53faca20c315f7c436ca2b217af716e0c04208
RLSA-2025:8643
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
* kernel: vlan: enforce underlying device type (CVE-2025-21920)
* kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() (CVE-2025-21997)
* kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
* kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
* kernel: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.21.1.el9_6.aarch64.rpm
f86f7a333b41521dd554619d3bfc2d3a9d05af45c87031f3a6a5ad7c7e81c258
kernel-rt-64k-5.14.0-570.21.1.el9_6.aarch64.rpm
7ae5a6448f251957c5b68f50a2eeece312b140f485cf146fe53b6d6a80aec2c0
kernel-rt-64k-core-5.14.0-570.21.1.el9_6.aarch64.rpm
597f2aafb7899d5b28713ba1714495453a2002023b2ea98155db35e90fa6290a
kernel-rt-64k-debug-5.14.0-570.21.1.el9_6.aarch64.rpm
f7040a8050e65e813a76aaa2dfff21fe605d2576bd845735da1bf6a2dde59ef3
kernel-rt-64k-debug-core-5.14.0-570.21.1.el9_6.aarch64.rpm
a89526fc5f84d6d50d1bc2e6e27e03c8ef2187c54df40375de6d8c7926b84ac1
kernel-rt-64k-debug-devel-5.14.0-570.21.1.el9_6.aarch64.rpm
5c548495074a7589db0fff8bce515c94a50a6a5042ea0b663bf0ae6ff3eb86b0
kernel-rt-64k-debug-modules-5.14.0-570.21.1.el9_6.aarch64.rpm
2a4faf7d6f13f503f4da1e16476f5a12128b8d7d472ea8d396f97bf9b88f8bb9
kernel-rt-64k-debug-modules-core-5.14.0-570.21.1.el9_6.aarch64.rpm
6870b4b41e1a29fbbfbfd90a6af10f4e69b2e8a6c45e6440fecf99b1776dfd85
kernel-rt-64k-debug-modules-extra-5.14.0-570.21.1.el9_6.aarch64.rpm
5f78264263d5b302723ddaab3b902162465353305b61b4df8ee5fe2549c63ac2
kernel-rt-64k-devel-5.14.0-570.21.1.el9_6.aarch64.rpm
c4d4d7649f70db6a80aec02a769fd0717627435cf84629b5938eb6adccb944c6
kernel-rt-64k-modules-5.14.0-570.21.1.el9_6.aarch64.rpm
37e09ab46da38895b12432b9a224a11d72c108b9c86b3cfe7225aa857bf1b8c8
kernel-rt-64k-modules-core-5.14.0-570.21.1.el9_6.aarch64.rpm
da66a61b970d855fa4bb66d2733f0aa6f1b4c68f770e241fbd80f4e90c51cc0d
kernel-rt-64k-modules-extra-5.14.0-570.21.1.el9_6.aarch64.rpm
c2ed250555d772d8d69424491f4d27b4843702ae2e2e7f8a7976042b955cd59b
kernel-rt-core-5.14.0-570.21.1.el9_6.aarch64.rpm
514fca7f831989e2c6710afa1faf29245c0cb74ce40d11774382a9debd5fd259
kernel-rt-debug-5.14.0-570.21.1.el9_6.aarch64.rpm
e17188007d39577909ef84183f99f20894f382c4b6f2e22013cdba9cc4f7c2ed
kernel-rt-debug-core-5.14.0-570.21.1.el9_6.aarch64.rpm
cbbbe629127b939f2247f255b1e5b834cd3b77f522ff91617c622776c912ba9b
kernel-rt-debug-devel-5.14.0-570.21.1.el9_6.aarch64.rpm
a2d1c44a1e4810795db5b0b4ae1b5edf425a45b641b8a764052fb67f4f07a240
kernel-rt-debug-modules-5.14.0-570.21.1.el9_6.aarch64.rpm
142882ff564f6018d2e1a75fc606962e555f73c596f9b536a62cf51891870246
kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6.aarch64.rpm
6c732f84908f9208b2d299bc0470e0e82d6a17eaa1b9be2e5f9e383a59c7d930
kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6.aarch64.rpm
b99bd86ecdf0d98fcb8c28693c5932addf04a98ca59983c7f471076f17bd5780
kernel-rt-devel-5.14.0-570.21.1.el9_6.aarch64.rpm
84e540a57d6098827d11e3db2286a804d0b264bc151a3b4a70882b669f01804b
kernel-rt-modules-5.14.0-570.21.1.el9_6.aarch64.rpm
4c20b69f815458a9943b3c9476d5552cca2d42991bc2e24ccc172083a40187a7
kernel-rt-modules-core-5.14.0-570.21.1.el9_6.aarch64.rpm
8aeaffd69563591e445826c943ca9ae156502427cab60f1e906c3c996f194824
kernel-rt-modules-extra-5.14.0-570.21.1.el9_6.aarch64.rpm
77a5bb41fd66a912184b64c63b73a6736d954e8bfdd53ad6f813d53f41003291
RLSA-2025:9080
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: eth: bnxt: fix truesize for mb-xdp-pass case (CVE-2025-21961)
* kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd (CVE-2025-21969)
* kernel: cifs: Fix integer overflow while processing acdirmax mount option (CVE-2025-21963)
* kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy (CVE-2025-21979)
* kernel: proc: fix UAF in proc_get_inode() (CVE-2025-21999)
* kernel: md: fix mddev uaf while iterating all_mddevs list (CVE-2025-22126)
* kernel: smb: client: fix UAF in decryption with multichannel (CVE-2025-37750)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.22.1.el9_6.aarch64.rpm
7578f507e0bc1ad828f56577a13a01aad4e227b985aeeca520a6f1b2f8a67404
kernel-rt-64k-5.14.0-570.22.1.el9_6.aarch64.rpm
509a3dab425fea7f3946edcebdebc4c59f478460afee1859567878dfd2b3b77d
kernel-rt-64k-core-5.14.0-570.22.1.el9_6.aarch64.rpm
f7c2f4d1e1ae86cbf0fa172116a6268dc9020507d6a17f472045f1ba27ab0038
kernel-rt-64k-debug-5.14.0-570.22.1.el9_6.aarch64.rpm
16677f37f3ea89a19be6bb6d9c7d51b687bfc080f5af0c83617b7af047500353
kernel-rt-64k-debug-core-5.14.0-570.22.1.el9_6.aarch64.rpm
e23af2d3a703f6d27009e9f19d581f941c086b23b55ffc33456b2d64ce0ff5a7
kernel-rt-64k-debug-devel-5.14.0-570.22.1.el9_6.aarch64.rpm
48f184be878975cef4a3d6edebc2a5fb5ac3b760d0b95d26db8fc6fc876140b5
kernel-rt-64k-debug-modules-5.14.0-570.22.1.el9_6.aarch64.rpm
47fd05a30c2f113b8091e0bfdc6fc0e4e7a1c192b2b41e5d19f1134cfe189d23
kernel-rt-64k-debug-modules-core-5.14.0-570.22.1.el9_6.aarch64.rpm
18f0fd8041af965b9be78111f910fa55f312917be9c4faf7dcede65963602e9f
kernel-rt-64k-debug-modules-extra-5.14.0-570.22.1.el9_6.aarch64.rpm
fb5bd9436e2fae44a12ab43436e8d65567a536475baa572269f0d9a21690150d
kernel-rt-64k-devel-5.14.0-570.22.1.el9_6.aarch64.rpm
4611f96afd6f468c83cbc9ce2556e75cc3138498ac89014fca541db1007e93d6
kernel-rt-64k-modules-5.14.0-570.22.1.el9_6.aarch64.rpm
810395de5a123dd61d7f1198917f0bc2a1bec92f220d36994a2ef7f3a5b23afb
kernel-rt-64k-modules-core-5.14.0-570.22.1.el9_6.aarch64.rpm
16ee1f7937f3d299b538aedecca608ebc8424d1c009668236190289e0f9cf46b
kernel-rt-64k-modules-extra-5.14.0-570.22.1.el9_6.aarch64.rpm
9938300e475508e8ad95661546d52b964d7ba00b33f911b43847fcf6c1dea0f4
kernel-rt-core-5.14.0-570.22.1.el9_6.aarch64.rpm
88b7730f399fb1356a4893b012a02bfdf7420d6f1c39de3030544723dde7c139
kernel-rt-debug-5.14.0-570.22.1.el9_6.aarch64.rpm
ce5759d38ad93ccff6f277baff6f5b44f6c7935d91280a1702f0c1423e10aafd
kernel-rt-debug-core-5.14.0-570.22.1.el9_6.aarch64.rpm
2620cad3e51536928121121f15cfc508323027c18e5407b38f210703630398ae
kernel-rt-debug-devel-5.14.0-570.22.1.el9_6.aarch64.rpm
73dfcc93191724689f05057e53c9992a1e3378091f9e5164331e4f56e6821c6f
kernel-rt-debug-modules-5.14.0-570.22.1.el9_6.aarch64.rpm
9488c7dc203197dbe5666687cf019fb1453dbfd457112aacbe34266dee0c0769
kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6.aarch64.rpm
c46c22a707c09bf6fe3a5076733503dbe510157bb255a8f451b2a139f7ebc8b3
kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6.aarch64.rpm
7117a7d0f6216223af58e05f3143694d68e9face0ec03aaf45740262d114b3c5
kernel-rt-devel-5.14.0-570.22.1.el9_6.aarch64.rpm
3420d7d59563054fd3cd7d10ca0feb262a77b9bfea6dd3f0861468048371bc7f
kernel-rt-modules-5.14.0-570.22.1.el9_6.aarch64.rpm
28481ecb4da872e9ba8b4de71a3de39abdb9362786ab37e04c636dd8b115d2f8
kernel-rt-modules-core-5.14.0-570.22.1.el9_6.aarch64.rpm
68f2827c809bfe8d53130210103630f3246ca29cf4d98f18374bba4fa59d22ce
kernel-rt-modules-extra-5.14.0-570.22.1.el9_6.aarch64.rpm
9c345e687470ba19bb4565c53918ec8adac2304aa13511ecb00817cbf7c06cf5
RLSA-2025:9302
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ice: Fix deinitializing VF in error path (CVE-2025-21883)
* kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list (CVE-2025-21919)
* kernel: ibmvnic: Use kernel helpers for hex dumps (CVE-2025-22104)
* kernel: ext4: fix off-by-one error in do_split (CVE-2025-23150)
* kernel: ext4: ignore xattrs past end (CVE-2025-37738)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.23.1.el9_6.aarch64.rpm
e1865fffcefda04ed1dc2e8c26abf9034d9c64fe89ee27346fbb0f387ad832ab
kernel-rt-64k-5.14.0-570.23.1.el9_6.aarch64.rpm
28218fa3d63065d08c8e28972dcad12b2b3085ab36a13a473b0345c40ec496be
kernel-rt-64k-core-5.14.0-570.23.1.el9_6.aarch64.rpm
4e0dfc629f56ffd0364e2de12d043c39302ef81137c135cb8d96eea9990f0d18
kernel-rt-64k-debug-5.14.0-570.23.1.el9_6.aarch64.rpm
673ae1090f824d020fad16890567bdb11a9cdc3225ebcb376b598be3e7ce69bc
kernel-rt-64k-debug-core-5.14.0-570.23.1.el9_6.aarch64.rpm
0c95f0cfe002d535ddf470cb01e79fcac9fdc56c98ec4e8d2220df11460ec646
kernel-rt-64k-debug-devel-5.14.0-570.23.1.el9_6.aarch64.rpm
90c75ba8381e68cf51ae662971e27d991037b955ce13d105486a8dfd64d60b80
kernel-rt-64k-debug-modules-5.14.0-570.23.1.el9_6.aarch64.rpm
6162175451ce7811b2e90250ee02f46b5b70e168089d655d4e7999b6153d9983
kernel-rt-64k-debug-modules-core-5.14.0-570.23.1.el9_6.aarch64.rpm
d9d09a4c60b0d88e048aaa137b48304269b24b6788bf3dd5b5962fcd49a62019
kernel-rt-64k-debug-modules-extra-5.14.0-570.23.1.el9_6.aarch64.rpm
4532f5e7910926e82221a199cb6928aa41fc9ba489000108d228619dcc20458c
kernel-rt-64k-devel-5.14.0-570.23.1.el9_6.aarch64.rpm
20d019786eb1919473430ec95d5224d940e6c5acf6f037f77c2869d5b4ae31ce
kernel-rt-64k-modules-5.14.0-570.23.1.el9_6.aarch64.rpm
0aa26f9723d415608bc969df393d2e24d2a8abbefae1c56a393150991f9d0ea5
kernel-rt-64k-modules-core-5.14.0-570.23.1.el9_6.aarch64.rpm
10bfde32b975a429b7e2de3b75780299db63335094aedd8cc01ab8f0774554da
kernel-rt-64k-modules-extra-5.14.0-570.23.1.el9_6.aarch64.rpm
50436d3045560886b660f765fd9c6ecafab78c282631ded7dca26e44fdb48a5c
kernel-rt-core-5.14.0-570.23.1.el9_6.aarch64.rpm
c8434be688581fcf1352976808ba270b925e539b5ac6d6092ffa7e517a4d3bed
kernel-rt-debug-5.14.0-570.23.1.el9_6.aarch64.rpm
1e08cc30004876fc109bd212e73330bd3da90da3e96cf6751974ada6e2faf125
kernel-rt-debug-core-5.14.0-570.23.1.el9_6.aarch64.rpm
213ecc68f11d44eda188f01d071cdcb793f7d418d0017dc9f562d6040173488e
kernel-rt-debug-devel-5.14.0-570.23.1.el9_6.aarch64.rpm
a910e219f4822d1c93daa38532f83cba9e5c9329ef30a117e58f6456a9d3901c
kernel-rt-debug-modules-5.14.0-570.23.1.el9_6.aarch64.rpm
0a8a17444bce7d9b2582d8eb05def512bd42f5df8b4c9672cb1d8fb412eb7ad2
kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6.aarch64.rpm
638a6e346ad93cac22087d56770db3094f036ce683c20b0672750b966c8e5d95
kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6.aarch64.rpm
a7f63e273d7885c37bc8899ccc3bae43343ca3cf24177fbee8f8b051bc2f1293
kernel-rt-devel-5.14.0-570.23.1.el9_6.aarch64.rpm
acda44a6eb95fa3513c9f7f45e7b40b14a8cb34ad0d432d7d33fcd4fab471b6a
kernel-rt-modules-5.14.0-570.23.1.el9_6.aarch64.rpm
808e2144cb108267d66817f0d93ed3dc6febf1b582dc5f8fb53a77819e8ec6b1
kernel-rt-modules-core-5.14.0-570.23.1.el9_6.aarch64.rpm
561e9cab76fbd0d9bfd2c250bf3137398e5b78b6facf00eaa742d4289606e202
kernel-rt-modules-extra-5.14.0-570.23.1.el9_6.aarch64.rpm
6320a64a9ab1384cfc86ab819384fdbad26763420d611712d99c9c54a1a05d22
RLSA-2025:10379
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: ipv6: mcast: extend RCU protection in igmp6_send() (CVE-2025-21759)
* kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up (CVE-2025-21887)
* kernel: net: atm: fix use after free in lec_send() (CVE-2025-22004)
* kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (CVE-2022-49846)
* kernel: vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp (CVE-2025-37799)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.25.1.el9_6.aarch64.rpm
eece7825a27ef0c00b20f1db87ffef2a46c2300f8e2d45b57fb87d4806499941
kernel-rt-64k-5.14.0-570.25.1.el9_6.aarch64.rpm
d0a15871a7b3e3803254af975ad62ebb18bea03430ab660ade9783171428e5cb
kernel-rt-64k-core-5.14.0-570.25.1.el9_6.aarch64.rpm
5966f54514429d56f80faa0576377bc5f1cb8f73bb3836ff3f9d85e77dd292ad
kernel-rt-64k-debug-5.14.0-570.25.1.el9_6.aarch64.rpm
99a257f14cc529db0f41de8de71618f05e134f5772dc9a7d908b94e9ed440d60
kernel-rt-64k-debug-core-5.14.0-570.25.1.el9_6.aarch64.rpm
835700940684b6ce51561ed4d396f60ec3deb27b22115b3fc0fb7340db978d73
kernel-rt-64k-debug-devel-5.14.0-570.25.1.el9_6.aarch64.rpm
91710ea02edf52c90299882d5e879a35dd014f17184baa5bbbf07ee12306fe93
kernel-rt-64k-debug-modules-5.14.0-570.25.1.el9_6.aarch64.rpm
15ec20ae0facec4e1d2cd5cc80c1fe82cb7a5a56ce6886f980cdbc66ad11bfa2
kernel-rt-64k-debug-modules-core-5.14.0-570.25.1.el9_6.aarch64.rpm
95b9b9bef956587ee99e7bb7a1360a4f3e09f5608cd60d17c7cbfe0af4cc4ef3
kernel-rt-64k-debug-modules-extra-5.14.0-570.25.1.el9_6.aarch64.rpm
a66b5296c0d44b5733e0855fd14252b477b6d2b3f629020b0cdb3455efe8c0a5
kernel-rt-64k-devel-5.14.0-570.25.1.el9_6.aarch64.rpm
f045a19611394322b95764d412ae5af39c0d03065fbe122a3d3bf347ce8e438f
kernel-rt-64k-modules-5.14.0-570.25.1.el9_6.aarch64.rpm
b015a03b0d5dde3241e6423c0efd6d1a46910523838c94e0f8f77e60860d7040
kernel-rt-64k-modules-core-5.14.0-570.25.1.el9_6.aarch64.rpm
592462a1d90e8b6d3fcc52d5304a2d13c0a10810b5a4998fa67c5a6ac82a8c29
kernel-rt-64k-modules-extra-5.14.0-570.25.1.el9_6.aarch64.rpm
87b963bd418fc276cfac1f9373f013524b0aaa978d4fac1add09fa300eac24df
kernel-rt-core-5.14.0-570.25.1.el9_6.aarch64.rpm
a06b732a6251b3140388480f795482f3dd0001f250f6894b538c464dd268fed1
kernel-rt-debug-5.14.0-570.25.1.el9_6.aarch64.rpm
836ffceae04e279d904731c5bd4b1633a8b2e02d94b356826d5681954ae249eb
kernel-rt-debug-core-5.14.0-570.25.1.el9_6.aarch64.rpm
7f368545cb6f510b82b7b19738d9243799b2be5d8ef5efd6063def08a1f89d71
kernel-rt-debug-devel-5.14.0-570.25.1.el9_6.aarch64.rpm
2b2ba153589ec5e969f5da5954f64c09f48fd70364908b60097df8e1cb01e99f
kernel-rt-debug-modules-5.14.0-570.25.1.el9_6.aarch64.rpm
c979a9a0fb7d89bf18a44374e53889c753f4e05eaf93374ffb114f4e26623aa1
kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6.aarch64.rpm
ef56828c50d8bb56a871876ce38c1f89f3e2bff710a3043e8d04890578d939d7
kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6.aarch64.rpm
9a8536f1fc3832f2719047ab942ff0d67df7e57f646a3e15fca3353fcc555f0a
kernel-rt-devel-5.14.0-570.25.1.el9_6.aarch64.rpm
0b30a4e48d794cffb86d66385a8d21199a4febee0f394e4c612c72e0a6ed4019
kernel-rt-modules-5.14.0-570.25.1.el9_6.aarch64.rpm
74296265f346d7dd98027c7ece2e9aed5a142fd4830db72e6a24a385479ded71
kernel-rt-modules-core-5.14.0-570.25.1.el9_6.aarch64.rpm
44910258ba01c4cc663214d05553d302e2f02654972e4aa7d92982063d986cb6
kernel-rt-modules-extra-5.14.0-570.25.1.el9_6.aarch64.rpm
4661fa7912ddaad4b4aad413ab79888cae35c0ff0410edf2e4b22980b3448522
RLSA-2025:10837
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes (CVE-2025-21991)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.26.1.el9_6.aarch64.rpm
9180378669171b90e73f8815359904cf9e6e77add1a7cac29485aefade770390
kernel-rt-64k-5.14.0-570.26.1.el9_6.aarch64.rpm
cdd00252c35c1f266d1bf88828ef29c97f33e85a67087a5271843ccf00a27a5d
kernel-rt-64k-core-5.14.0-570.26.1.el9_6.aarch64.rpm
5d5640f52b7a6230cdd1d077e480fdd1b99c704d504d7a048fc681f19c4f1247
kernel-rt-64k-debug-5.14.0-570.26.1.el9_6.aarch64.rpm
7c999d59380dfa15e7288d4a5193abe9f6688a4b973ae45a8b1c4195e3fb822e
kernel-rt-64k-debug-core-5.14.0-570.26.1.el9_6.aarch64.rpm
876722652ae4e0de6e548dc8f7ebc6abab49ba58086c94ae045c45afc8b8879b
kernel-rt-64k-debug-devel-5.14.0-570.26.1.el9_6.aarch64.rpm
b524b250aeee947578654386121d96f5a64961af339ba7829f8e74dc00955248
kernel-rt-64k-debug-modules-5.14.0-570.26.1.el9_6.aarch64.rpm
5f9e035a80277a7aaeb0508c847aba9a9e3c7fe8f9706142f754fe93591acce6
kernel-rt-64k-debug-modules-core-5.14.0-570.26.1.el9_6.aarch64.rpm
90454e470f370807fbb25d30a255aaec82e192adcbae4a8be3fe68aab2984e86
kernel-rt-64k-debug-modules-extra-5.14.0-570.26.1.el9_6.aarch64.rpm
31408e2fcd8ec88893702ce9fd37e429f8c7b49a54221756e5482775ac5adff7
kernel-rt-64k-devel-5.14.0-570.26.1.el9_6.aarch64.rpm
efaf4836abb3091136914df1bbe27edabc1ab45050319c877910be7aa4cbb9b7
kernel-rt-64k-modules-5.14.0-570.26.1.el9_6.aarch64.rpm
25995524a4fac5374a333c39decd7503ea18c9a6dd30b2bf30ed11fe551e67c9
kernel-rt-64k-modules-core-5.14.0-570.26.1.el9_6.aarch64.rpm
728408a88d620b6a2d073172c502fd04d1d28947be8d23bea31ff0fea55865e1
kernel-rt-64k-modules-extra-5.14.0-570.26.1.el9_6.aarch64.rpm
fe37ecf948d911f8f131ac8b759866b7010ee78dc55ad33e442a45395876c3fe
kernel-rt-core-5.14.0-570.26.1.el9_6.aarch64.rpm
96527b97899c3d0efe242caca361e63dfc3c06776139f91486265ced77a7d793
kernel-rt-debug-5.14.0-570.26.1.el9_6.aarch64.rpm
a0ca984a2799ac652b0dc12803b7b2e08c58c221a0a1b6d54c687353e633669d
kernel-rt-debug-core-5.14.0-570.26.1.el9_6.aarch64.rpm
d021cdebcdbc763dd9c34cddb480bf6443e901e86a4b362547ed6449a508f8c2
kernel-rt-debug-devel-5.14.0-570.26.1.el9_6.aarch64.rpm
fb14ac1434c2739fb58588740a6f2587dbe9882fca2083d7ef9226115b9b1228
kernel-rt-debug-modules-5.14.0-570.26.1.el9_6.aarch64.rpm
1fff8a225b394d8ffdcb7433e6fa89853355c20af13d6329f7d5c1f5b38022b6
kernel-rt-debug-modules-core-5.14.0-570.26.1.el9_6.aarch64.rpm
9a17acc824a36e12d7220af8b94e3752d1938677243499e2daaf419873a0f2b0
kernel-rt-debug-modules-extra-5.14.0-570.26.1.el9_6.aarch64.rpm
50096f910ccda3b29ef8b50c9d3b6b63cd44b3f3cc35e0aff2ddfed9bce6a85b
kernel-rt-devel-5.14.0-570.26.1.el9_6.aarch64.rpm
57b5f51511f8b241ee880a9ca003f0813d57e289947434e8002e50362ef24644
kernel-rt-modules-5.14.0-570.26.1.el9_6.aarch64.rpm
4417895c615a3957c038558534fa32c6f0e65b0bdb947f77bc969b11b82d2d4d
kernel-rt-modules-core-5.14.0-570.26.1.el9_6.aarch64.rpm
ed676b5e9f26bdb21e1d94c0933354270be3412a2ce9c45c859eccdbfade1685
kernel-rt-modules-extra-5.14.0-570.26.1.el9_6.aarch64.rpm
e5bf4349a2fc105ef15b9be5ca2ac020e29fa81c1aa8b76680e7304782704ead
RLSA-2025:11411
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Remove dangling pointers (CVE-2024-58002)
* kernel: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (CVE-2025-38089)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.28.1.el9_6.aarch64.rpm
4dae7e3d468c3257c7562f822855719bd907f60c15c4bde6c1d56e7e58dbe261
kernel-rt-64k-5.14.0-570.28.1.el9_6.aarch64.rpm
99ec5431e9b41644428dbf82dd31a82d24e9f4ff06e582be808128796f975b8d
kernel-rt-64k-core-5.14.0-570.28.1.el9_6.aarch64.rpm
827b3a4b4beb4cfc400892813d2c27a7a7027c503a1637641469d324ee3810c8
kernel-rt-64k-debug-5.14.0-570.28.1.el9_6.aarch64.rpm
6768e2808bb9adbfe6cb2d4868f0dd264bbb8282dbc497abbc8ceb6742bc234b
kernel-rt-64k-debug-core-5.14.0-570.28.1.el9_6.aarch64.rpm
6dc87288b8a91ca5ad0578bd93a3ffa46c9ea12cd3eeb34aaefc141aa70413a2
kernel-rt-64k-debug-devel-5.14.0-570.28.1.el9_6.aarch64.rpm
e96ca2bd78c267e832ede29f8fc7b87a6c17fca794a45a9ec853edbcfeda897a
kernel-rt-64k-debug-modules-5.14.0-570.28.1.el9_6.aarch64.rpm
8f232d0425869c73829b0bddcc6e4eec6017c7e6f4f1b17690f87d527d4b6250
kernel-rt-64k-debug-modules-core-5.14.0-570.28.1.el9_6.aarch64.rpm
623170691484899da8cdbafeaff0c0ba5a66b1b7e5f78c2e8e83068d0a7346e6
kernel-rt-64k-debug-modules-extra-5.14.0-570.28.1.el9_6.aarch64.rpm
ac46a5873304f4fb0158f48774756354c51eac01927e4a43faa0279d66161d5a
kernel-rt-64k-devel-5.14.0-570.28.1.el9_6.aarch64.rpm
921e4898a2659c8ebf8d9c613570414f4aeaec76dd353c605ee484cc5ccf588c
kernel-rt-64k-modules-5.14.0-570.28.1.el9_6.aarch64.rpm
cdbb6c4b9f5dff06e9a1ee3cd001cae1b321424683e2b8faf771f2f522a959a4
kernel-rt-64k-modules-core-5.14.0-570.28.1.el9_6.aarch64.rpm
276392c3c5df3cafbfb504fa95d80c846839d750f71969c785573aa684ee9f4b
kernel-rt-64k-modules-extra-5.14.0-570.28.1.el9_6.aarch64.rpm
9c70e7a82c5e931042c5c95e55ed00055b504659cc12af82e493daed94f220bd
kernel-rt-core-5.14.0-570.28.1.el9_6.aarch64.rpm
7d9fa924833883e62a90bbb239c31cff604c789600e8c9f4752ef3483338b796
kernel-rt-debug-5.14.0-570.28.1.el9_6.aarch64.rpm
c781441dc77471966901b84bf3a5355238517e27712c6a013ce09a4e439ee770
kernel-rt-debug-core-5.14.0-570.28.1.el9_6.aarch64.rpm
be7f71d05f37c4f796617697d8f821e4e8a538510065e38888a717cc34a6078a
kernel-rt-debug-devel-5.14.0-570.28.1.el9_6.aarch64.rpm
40421e917349204b0f3fbfacad95905b04d24e406468c205743120695a118eb7
kernel-rt-debug-modules-5.14.0-570.28.1.el9_6.aarch64.rpm
ee72ae9f835e551e9a14122c2a8c8e0996e079a17329195934d46f15372bde96
kernel-rt-debug-modules-core-5.14.0-570.28.1.el9_6.aarch64.rpm
cdb59d8fcb8f750b8e8dad0b14cee9efd853755feef8581377bcec4ceef4d7f6
kernel-rt-debug-modules-extra-5.14.0-570.28.1.el9_6.aarch64.rpm
12473a74ba80ec99367e74687248d54de43469f45aaa2703ba6d35aaccaee9cb
kernel-rt-devel-5.14.0-570.28.1.el9_6.aarch64.rpm
2655244c92a4dd5274e2b3c41ef80206871279850feb166d63e39f11e5cba4f9
kernel-rt-modules-5.14.0-570.28.1.el9_6.aarch64.rpm
7f91648b2dc56bb59d80dc959332e58ddbfb1fedc9606e9eb7dba1b6ebce9554
kernel-rt-modules-core-5.14.0-570.28.1.el9_6.aarch64.rpm
d59e9af7e06c72a7089eeb7dad94f7d7c3538725144e988cf972b2e081cbbd00
kernel-rt-modules-extra-5.14.0-570.28.1.el9_6.aarch64.rpm
586c462fa216e7758c32a18a0ef22cc0f29456f885fe848f0e7e0776cc084f3f
RLSA-2025:11861
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: media: uvcvideo: Fix double free in error path (CVE-2024-57980)
* kernel: wifi: iwlwifi: limit printed string from FW file (CVE-2025-21905)
* kernel: RDMA/mlx5: Fix page_size variable overflow (CVE-2025-22091)
* kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() (CVE-2025-22121)
* kernel: ext4: avoid journaling sb update on error if journal is destroying (CVE-2025-22113)
* kernel: RDMA/core: Fix use-after-free when rename device name (CVE-2025-22085)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class handling (CVE-2025-37797)
* kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry (CVE-2025-37958)
* kernel: net: ch9200: fix uninitialised access during mii_nway_restart (CVE-2025-38086)
* kernel: net/mdiobus: Fix potential out-of-bounds clause 45 read/write access (CVE-2025-38110)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.30.1.el9_6.aarch64.rpm
c66da6fa635faf722c5ad4a2aa91c6c2728b80bcfd344dfac64bfc3b632b4e33
kernel-rt-64k-5.14.0-570.30.1.el9_6.aarch64.rpm
ba53c30f469983946fff940e839f26008ffb2118791d3da4b521eddafd0183fe
kernel-rt-64k-core-5.14.0-570.30.1.el9_6.aarch64.rpm
92ea234099394fdd3e3e6e6aecad181423cce7408678ec3e307c4704ff1b2ee3
kernel-rt-64k-debug-5.14.0-570.30.1.el9_6.aarch64.rpm
e7a1076206bbbd054fcc9a46387076f64746cec3ac30f2b6bef9807a24e4c67a
kernel-rt-64k-debug-core-5.14.0-570.30.1.el9_6.aarch64.rpm
9ddf768a567754f88d06e756d32c6457f3173611ced7ac0495c17381cf951bc9
kernel-rt-64k-debug-devel-5.14.0-570.30.1.el9_6.aarch64.rpm
292f51ba172340229b0c4f6ed03f927e4a0e352814eff83e902140998145d9b2
kernel-rt-64k-debug-modules-5.14.0-570.30.1.el9_6.aarch64.rpm
856989598f040d9ccad99c2b4130b1e3ffc6b41d0977729db956d64a3499f42e
kernel-rt-64k-debug-modules-core-5.14.0-570.30.1.el9_6.aarch64.rpm
5f1f1194a9003f3c5d0d66243133637d273c3b9a137aae5a15ef66b1289f4176
kernel-rt-64k-debug-modules-extra-5.14.0-570.30.1.el9_6.aarch64.rpm
19e4abf98e9e02435e96fe77f9f725833c0a28377db2409860f92b5c8206e295
kernel-rt-64k-devel-5.14.0-570.30.1.el9_6.aarch64.rpm
0c175c3b12a08627f881dfdf0585e38d4be964b167777cb64088f4777ec12110
kernel-rt-64k-modules-5.14.0-570.30.1.el9_6.aarch64.rpm
de134de92472f1a606e30dbcc02281a36612b87411f11b6fe97eec01a7703157
kernel-rt-64k-modules-core-5.14.0-570.30.1.el9_6.aarch64.rpm
11bcdecef04305cc3c713fffc8370d5862b51d30e664cbff33309cfe630171ca
kernel-rt-64k-modules-extra-5.14.0-570.30.1.el9_6.aarch64.rpm
3e4bde72c5756b0a6f4a76e033755b31bb8cf827d036e3398225b86ee3ea1550
kernel-rt-core-5.14.0-570.30.1.el9_6.aarch64.rpm
2f128262b20e36eb467861b4e21d6ab86bf8ebd9ee7748c734661b876f766128
kernel-rt-debug-5.14.0-570.30.1.el9_6.aarch64.rpm
836fc8c71b7322d004ea085cdeb2e863f7fc990b5532f094737a582240a3da5a
kernel-rt-debug-core-5.14.0-570.30.1.el9_6.aarch64.rpm
407bb44239a2c1506efdbe139f346e1b0b15b4a87a5f5667dfb24250f692e744
kernel-rt-debug-devel-5.14.0-570.30.1.el9_6.aarch64.rpm
00147037f907e9eae05b4ea2b594c5e7d588c210b91575e28a8996d288b9a170
kernel-rt-debug-modules-5.14.0-570.30.1.el9_6.aarch64.rpm
8221ec681755ecdde0de97432b7a0ceac54f3c67c88208b4b50163cdab3118eb
kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6.aarch64.rpm
8f80043975700c220a5523d4c21a8e48344b432e835702fda76bb033e1866797
kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6.aarch64.rpm
76afdcac94ebfe136410934c88ec8ba40ea181ba515ed12a8183d6f454c362c8
kernel-rt-devel-5.14.0-570.30.1.el9_6.aarch64.rpm
0e64beb47ce05d2d58091fd13a850581c860cf6d2b5d63c63644cd0f4c4f8dcf
kernel-rt-modules-5.14.0-570.30.1.el9_6.aarch64.rpm
354732539f7484ee8d66bf6a48ef408361be4bf55fb526d384c169b70364b67e
kernel-rt-modules-core-5.14.0-570.30.1.el9_6.aarch64.rpm
ab129ed9d819991f03d52789394437a231b827e928b5a099143f905f2f5804cc
kernel-rt-modules-extra-5.14.0-570.30.1.el9_6.aarch64.rpm
dbccc4df0d3143fe853406beb37c87fc60ff03ea33d1c2fc55fee8366104108f
RLSA-2025:12746
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: padata: fix UAF in padata_reorder (CVE-2025-21727)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (CVE-2025-21928)
* kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove() (CVE-2025-21929)
* kernel: cifs: Fix integer overflow while processing closetimeo mount option (CVE-2025-21962)
* kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (CVE-2025-22020)
* kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() (CVE-2022-49788)
* kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (CVE-2025-37890)
* kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done (CVE-2025-38052)
* kernel: net/sched: fix use-after-free in taprio_dev_notifier (CVE-2025-38087)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.32.1.el9_6.aarch64.rpm
9cb00a2ef064c0412684057441e7a1f10454925d5049e53299a3fe9e482647e3
kernel-rt-64k-5.14.0-570.32.1.el9_6.aarch64.rpm
c54251a722028752aa41ec7f96bad3ff3df2239a26589a218241c6eb4f8177f2
kernel-rt-64k-core-5.14.0-570.32.1.el9_6.aarch64.rpm
111ddb1af42c0f281e2010bf549c0ba46aff1111b75c3544d1a19b5d94363a3f
kernel-rt-64k-debug-5.14.0-570.32.1.el9_6.aarch64.rpm
4e02c707009139a4aca0774a2e31a4d701ae70145ae77711a9e0130b30660534
kernel-rt-64k-debug-core-5.14.0-570.32.1.el9_6.aarch64.rpm
54be70498f15c9ddb010ea51e47c130b2fa3c941c3846b340191a574c5b7531c
kernel-rt-64k-debug-devel-5.14.0-570.32.1.el9_6.aarch64.rpm
16bab30bd4bc85f2a69bbf092eed77603f7d9044a54481ab821a11b2dcf58a68
kernel-rt-64k-debug-modules-5.14.0-570.32.1.el9_6.aarch64.rpm
2dca477b57c3756f4a6aca014502a8d2efe73295b5931e8e938c8df96fef51d7
kernel-rt-64k-debug-modules-core-5.14.0-570.32.1.el9_6.aarch64.rpm
73f4f72ba464cb782cc703ceef225b6771e819ae8619de2d0bb311b757239181
kernel-rt-64k-debug-modules-extra-5.14.0-570.32.1.el9_6.aarch64.rpm
8d8c85013b8772233020466097e98df43a6b4ca7f16b2d63c92ecc40018185f4
kernel-rt-64k-devel-5.14.0-570.32.1.el9_6.aarch64.rpm
f1079ea39ba2c406586291cb52e512e2d5044984eb02f668100ef94689d31d05
kernel-rt-64k-modules-5.14.0-570.32.1.el9_6.aarch64.rpm
0c754b7c62606bd070a7d2859149333ed55add9bd73cd17e73b0776078e80468
kernel-rt-64k-modules-core-5.14.0-570.32.1.el9_6.aarch64.rpm
519be5f3124399846628f3d8c54d456a1d9732d674a979c1677da6c2e6510a9e
kernel-rt-64k-modules-extra-5.14.0-570.32.1.el9_6.aarch64.rpm
972b3c6bfc92a47549744e088d6976b0ae2d9e2213d71bb1962a176de80f04eb
kernel-rt-core-5.14.0-570.32.1.el9_6.aarch64.rpm
bd78ec6753c13661dda8b29f004e23c11801bd699da63ed955ae293e162f6012
kernel-rt-debug-5.14.0-570.32.1.el9_6.aarch64.rpm
c3f0abc2afd07bb902f43c1ce64b9c3369c77e645d91417707a2e726c7593a7d
kernel-rt-debug-core-5.14.0-570.32.1.el9_6.aarch64.rpm
0490285a83ea06c6ad0dbfef4e505ffea7ef1c85d8b726d5789f90fd32348413
kernel-rt-debug-devel-5.14.0-570.32.1.el9_6.aarch64.rpm
0104c5cf8e0480bbfac87dec390bf4e282102eaaf214bfd76a1f013d4dd7e37b
kernel-rt-debug-modules-5.14.0-570.32.1.el9_6.aarch64.rpm
2cd1474503a6b89781237941300002d06bcb780247d940bc90b7bc5218766ab6
kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6.aarch64.rpm
9966edf71e5e27290f26273607c190f4b6ab114350100f7324c8a0697dabdd7c
kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6.aarch64.rpm
bd1974df7d9c07f13021496bf712ece35350cd6eb6c65c52bba074316eb2cf90
kernel-rt-devel-5.14.0-570.32.1.el9_6.aarch64.rpm
f4a32d37864a39c945aa7423de830461e22eff98ce2cf3a07aa37b319ab19d23
kernel-rt-modules-5.14.0-570.32.1.el9_6.aarch64.rpm
5246cd5198c950b6e818013cb0505d34942414a63e250f19baaf7df410a50dbe
kernel-rt-modules-core-5.14.0-570.32.1.el9_6.aarch64.rpm
8f9d4d9f200c3f06585a12b200c8c6795679b84bff64f7f9f0db6706918b7658
kernel-rt-modules-extra-5.14.0-570.32.1.el9_6.aarch64.rpm
ce484c9c5e4a932f7672e3aa49490c1d74f277ed822c3aba7a3df223eeb29d72
RLSA-2025:13602
Moderate: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Moderate
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
The kernel packages contain the Linux kernel, the core of any Linux operating system.
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: crypto: algif_hash - fix double free in hash_accept (CVE-2025-38079)
* kernel: wifi: ath12k: fix invalid access to memory (CVE-2025-38292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.33.2.el9_6.aarch64.rpm
542fcbc792bde103e66c14ec717a7d8cfaa1aa2195066f865e0469dbbbc8743a
kernel-rt-64k-5.14.0-570.33.2.el9_6.aarch64.rpm
72b0f8260af8b9db555f8221f4b87cc494fa8834438aac2251cdd80a7171fca8
kernel-rt-64k-core-5.14.0-570.33.2.el9_6.aarch64.rpm
f796128b43810ab7432f822bc4b995542453520682ec91f8d6bb6c6b6238bdb9
kernel-rt-64k-debug-5.14.0-570.33.2.el9_6.aarch64.rpm
6e3a257c10fdf85d68fd9a4a9adc6093908900360091e5eeeb17de109d3c88e5
kernel-rt-64k-debug-core-5.14.0-570.33.2.el9_6.aarch64.rpm
688e608a1f616a56a9fbe793ba99a7b4336a86e656fc3ccf7e142cedacfcff03
kernel-rt-64k-debug-devel-5.14.0-570.33.2.el9_6.aarch64.rpm
c8d2f5dc8a6dbfcc1418005be86997e175cbc30fb0b6675171d2819fed50a4bd
kernel-rt-64k-debug-modules-5.14.0-570.33.2.el9_6.aarch64.rpm
780fe6db17be06b8058b7d31249c12fa5118728b8d42d5bd1e07310ab1a83b42
kernel-rt-64k-debug-modules-core-5.14.0-570.33.2.el9_6.aarch64.rpm
60f07d363a1342e5f9c5fa6fce5735263eec91afeb0379d4a62048e8167cc8cb
kernel-rt-64k-debug-modules-extra-5.14.0-570.33.2.el9_6.aarch64.rpm
fc1b2030fa1f7246c6b971c07486272a74f1eb7c6dddce58ab97498fa2059bba
kernel-rt-64k-devel-5.14.0-570.33.2.el9_6.aarch64.rpm
0364bbe52d4d21d54a93f7fbf64c2809e7ad8b1fd80edf63aa34df1dac7c6ddc
kernel-rt-64k-modules-5.14.0-570.33.2.el9_6.aarch64.rpm
183d97d34c70903d234d0230561059f2f8877d7eab7313cf56005fcbdf4cc3c6
kernel-rt-64k-modules-core-5.14.0-570.33.2.el9_6.aarch64.rpm
bdf9fa2e340d8ade95882034b6d62987ac44ddfbec03bcbbe0e8b08e11c7f942
kernel-rt-64k-modules-extra-5.14.0-570.33.2.el9_6.aarch64.rpm
80b23078b9e0bf417b77c4e9aa5b792f5d4f5f75ae47999a12c4f33fb833830c
kernel-rt-core-5.14.0-570.33.2.el9_6.aarch64.rpm
be1efc020354fdd5081f9f20f1acb2c78e24a719ae44cbd17cb5178eb847d660
kernel-rt-debug-5.14.0-570.33.2.el9_6.aarch64.rpm
6651d081136822e96a207b013ab901e35fd86b0249903616cd938eb6efe393d4
kernel-rt-debug-core-5.14.0-570.33.2.el9_6.aarch64.rpm
164a6a1bb1fdef2b6477b4bcc3397a05323b511715c12c08e9dc12dade52d71d
kernel-rt-debug-devel-5.14.0-570.33.2.el9_6.aarch64.rpm
5a595923265f62e63f8ee353b9363ab1e2f0f90abb7e5a04c4d54f359b0e10e0
kernel-rt-debug-modules-5.14.0-570.33.2.el9_6.aarch64.rpm
6bc60352605e13b23c698cd0c4c49dfb45a20ae66c93d417b6a527c5149ae174
kernel-rt-debug-modules-core-5.14.0-570.33.2.el9_6.aarch64.rpm
afef222f81149ddf22a9d702be0111d231d012b07fe857e61e2001bdbc239ac5
kernel-rt-debug-modules-extra-5.14.0-570.33.2.el9_6.aarch64.rpm
c1e0d8057dbe177509dc388db2d84880531569c85adfcb485f419d9e029ae0d7
kernel-rt-devel-5.14.0-570.33.2.el9_6.aarch64.rpm
3fe53bc5f36c261c1941ec7d60559c1ffb647859218775c5e9f82630892b3b9c
kernel-rt-modules-5.14.0-570.33.2.el9_6.aarch64.rpm
745e9361c58a1dfafc0b41337296b90d49e4af409a94a2b6388348236e18a4e2
kernel-rt-modules-core-5.14.0-570.33.2.el9_6.aarch64.rpm
39fe984f56cf74e3329f131d0dcebef325f421694f5193394f34b547ccf28e1a
kernel-rt-modules-extra-5.14.0-570.33.2.el9_6.aarch64.rpm
7ccb615a143ce38b140bc6ddd35281cbebd1817e1b97acfac5fdcb74e04fdc13
RLSA-2025:14420
Important: kernel security update
Copyright 2026 Rocky Enterprise Software Foundation
Rocky Linux 9
1
Important
An update is available for kernel.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: udp: Fix memory accounting leak. (CVE-2025-22058)
* kernel: net_sched: ets: Fix double list add in class with netem as child qdisc (CVE-2025-37914)
* kernel: ice: fix eswitch code memory leak in reset scenario (CVE-2025-38417)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
none-rt-rpms
kernel-rt-5.14.0-570.37.1.el9_6.aarch64.rpm
15f7a40bddab324694c9022fd908a6dc9582f70e5a823337e5fc53fcc5220315
kernel-rt-64k-5.14.0-570.37.1.el9_6.aarch64.rpm
8300988d01ea178bf8da3e7bc4f9e4e3de4cab8e6c5346c5875a6ff7a6bcc9db
kernel-rt-64k-core-5.14.0-570.37.1.el9_6.aarch64.rpm
b74a80e9b7badcef6951af7ed81c7c76f54467462dd05dd547502a59f5c6bdeb
kernel-rt-64k-debug-5.14.0-570.37.1.el9_6.aarch64.rpm
37f5ae449f235b79ccfbc476608195718c101eadd4e32275e5da9a0486960456
kernel-rt-64k-debug-core-5.14.0-570.37.1.el9_6.aarch64.rpm
6802a50440558939099b78f731998b7134c2a8f049b3348778201a60a6c380bc
kernel-rt-64k-debug-devel-5.14.0-570.37.1.el9_6.aarch64.rpm
413f382992e16ee080e75652b44e52658bfb7991e08a1d0c65d137272f61f3c5
kernel-rt-64k-debug-modules-5.14.0-570.37.1.el9_6.aarch64.rpm
43f0ca079286a2b50e71f6ef0a4153a23a93c460fb5e5bb03020c527b9fd4e2f
kernel-rt-64k-debug-modules-core-5.14.0-570.37.1.el9_6.aarch64.rpm
36a988e0621027c5ca36ba9c4a673fb57ef5c4c598d6cbe4e57ab85c08d007f8
kernel-rt-64k-debug-modules-extra-5.14.0-570.37.1.el9_6.aarch64.rpm
ce2262066a494160f447a92ad76f2611b9fbb5d1b77f1bc2becb5efa451a6466
kernel-rt-64k-devel-5.14.0-570.37.1.el9_6.aarch64.rpm
bb790ab7dc97f90c11e2d343be56705fd5afdc7b30e3fbb455fc58320bb81421
kernel-rt-64k-modules-5.14.0-570.37.1.el9_6.aarch64.rpm
ac4919215143ca23af2c4a7ae275b0e1e296f2d41de881bc66a96b10e49c2fbf
kernel-rt-64k-modules-core-5.14.0-570.37.1.el9_6.aarch64.rpm
5bd50bcddaabc80df70826ff2432fd7e88d8b68e5cf13e2e65bf2a59598ee73e
kernel-rt-64k-modules-extra-5.14.0-570.37.1.el9_6.aarch64.rpm
f0379d744569db274a9a03869a810b5cae753a3c79132b04589441ab32a2d909
kernel-rt-core-5.14.0-570.37.1.el9_6.aarch64.rpm
f2cbb15d3f5d9c3793a3c0a7080bf37dbc9ed1cd14490bd8fd8b949299b5e1fb
kernel-rt-debug-5.14.0-570.37.1.el9_6.aarch64.rpm
1f2e46f57ce3fe9d96d4a77fbfa359b3809d487f9a15887698a61b215437562f
kernel-rt-debug-core-5.14.0-570.37.1.el9_6.aarch64.rpm
7c5d03fab76db2b7120b512e0742db89bcec2bb1cb420032114962f05bc91eb8
kernel-rt-debug-devel-5.14.0-570.37.1.el9_6.aarch64.rpm
9dcd92f3285766ac5974f03ae0f37a91091deb0ffb39c8d0da1b632cccb58800
kernel-rt-debug-modules-5.14.0-570.37.1.el9_6.aarch64.rpm
3dfe10b773c1da42401819e34890a1f37af075d11a734e7c2c59eb7173b708c6
kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6.aarch64.rpm
1b4acb57b7af11d0e1b2e3c7a4641dd46cb9215d944df62283d8799f1c247b19
kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6.aarch64.rpm
cda9c827cb5bb88f13fe5b75d3497019303171661cc93b7128818b8a5f085e88
kernel-rt-devel-5.14.0-570.37.1.el9_6.aarch64.rpm
ae7b8ecc134b4f09af04a7900e8a5ea7708dfbbf8793c8b52f2a0eaf2cd10b6f
kernel-rt-modules-5.14.0-570.37.1.el9_6.aarch64.rpm
6ac9052446024e56c171495c79c90c7757bbfac55fe0a835ea7f124cd5369add
kernel-rt-modules-core-5.14.0-570.37.1.el9_6.aarch64.rpm
795c213177eeaf441acbc9bbcb24e083d49c7a2f4292e3e43dc111ecad864c8a
kernel-rt-modules-extra-5.14.0-570.37.1.el9_6.aarch64.rpm
c1ffdfb3b85b1a7419d936611bbcf2489ba806bab967c83be9ae2b1ff695b634