Rocky Linux: RLSA-2022:7444 kernel-rt security and bug fix update
Summary
An update for kernel-rt is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
RPMs
References
No References
CVEs
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36558.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3640.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0168.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0617.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0854.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1016.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1048.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1055.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1184.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1852.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-20368.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2078.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21499.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24448.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2586.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26373.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2639.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28390.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28893.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2938.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29581.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36946.json
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2037769
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695