kernel-5.14.0-362.8.1.el9_3

エラータID: AXSA:2023-7038:31

Release date: 
Saturday, January 20, 2024 - 05:18
Subject: 
kernel-5.14.0-362.8.1.el9_3
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609)
* kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208)
* kernel: eBPF: insufficient stack type checks in dynptr (CVE-2023-39191)
* Kernel: race when faulting a device private page in memory manager (CVE-2022-3523)
* kernel: use-after-free in l1oip timer handlers (CVE-2022-3565)
* kernel: Rate limit overflow messages in r8152 in intr_callback (CVE-2022-3594)
* kernel: vmwgfx: use-after-free in vmw_cmd_res_check (CVE-2022-38457)
* kernel: vmwgfx: use-after-free in vmw_execbuf_tie_context (CVE-2022-40133)
* hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)
* kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c (CVE-2022-42895)
* kernel: x86/mm: Randomize per-cpu entry area (CVE-2023-0597)
* kernel: HID: check empty report_list in hid_validate_values() (CVE-2023-1073)
* kernel: sctp: fail if no bound addresses can be used for a given scope (CVE-2023-1074)
* kernel: hid: Use After Free in asus_remove() (CVE-2023-1079)
* kernel: hash collisions in the IPv6 connection lookup table (CVE-2023-1206)
* kernel: ovl: fix use after free in struct ovl_aio_req (CVE-2023-1252)
* Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (CVE-2023-1652)
* kernel: Use after free bug in btsdio_remove due to race condition (CVE-2023-1989)
* kernel: fbcon: shift-out-of-bounds in fbcon_set_font() (CVE-2023-3161)
* kernel: out-of-bounds access in relay_file_read (CVE-2023-3268)
* kernel: xfrm: NULL pointer dereference in xfrm_update_ae_params() (CVE-2023-3772)
* kernel: xfrm: out-of-bounds read of XFRMA_MTIMER_THRESH nlattr (CVE-2023-3773)
* kernel: KVM: SEV-ES / SEV-SNP VMGEXIT double fetch vulnerability (CVE-2023-4155)
* kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry (CVE-2023-4273)
* kernel: mpls: double free on sysctl allocation failure (CVE-2023-26545)
* kernel: KVM: nVMX: missing consistency checks for CR0 and CR4 (CVE-2023-30456)
* kernel: net: qcom/emac: race condition leading to use-after-free in emac_remove() (CVE-2023-33203)
* kernel: vmwgfx: race condition leading to information disclosure vulnerability (CVE-2023-33951)
* kernel: vmwgfx: double free within the handling of vmw_buffer_object objects (CVE-2023-33952)
* kernel: r592: race condition leading to use-after-free in r592_remove() (CVE-2023-35825)
* kernel: net/tls: tls_is_tx_ready() checked list_entry (CVE-2023-1075)
* kernel: tap: tap_open(): correctly initialize socket uid (CVE-2023-1076)
* kernel: missing mmap_lock in file_files_note that could possibly lead to a use after free in the coredump code (CVE-2023-1249)
* kernel: use-after-free bug in remove function xgene_hwmon_remove (CVE-2023-1855)
* kernel: Use after free bug in r592_remove (CVE-2023-3141)
* kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() (CVE-2023-3212)
* kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf() (CVE-2023-3358)
* kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid (CVE-2023-4194)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-3523
A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.
CVE-2022-3565
A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.
CVE-2022-3594
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
CVE-2022-38457
A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
CVE-2022-40133
A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
CVE-2022-40982
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
CVE-2022-42895
There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit  https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62... https://www.google.com/url
CVE-2023-0597
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
CVE-2023-1073
A memory corruption flaw was found in the Linux kernel’s human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
CVE-2023-1074
A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.
CVE-2023-1075
A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec->tx_ready.
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
CVE-2023-1079
A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.
CVE-2023-1206
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
CVE-2023-1249
A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
CVE-2023-1252
A use-after-free flaw was found in the Linux kernel’s Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.
CVE-2023-1652
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
CVE-2023-1855
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
CVE-2023-1989
A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.
CVE-2023-26545
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.
CVE-2023-30456
An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.
CVE-2023-3141
A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
CVE-2023-3161
A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.
CVE-2023-3212
A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
CVE-2023-3268
An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
CVE-2023-33203
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
CVE-2023-3358
A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.
CVE-2023-33951
A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.
CVE-2023-33952
A double-free vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of vmw_buffer_object objects. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. This flaw allows a local privileged user to escalate privileges and execute code in the context of the kernel.
CVE-2023-35825
REJECTED
CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
CVE-2023-3772
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
CVE-2023-3773
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
CVE-2023-39191
An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
CVE-2023-4128
REJECTED
CVE-2023-4155
A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
CVE-2023-4194
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
CVE-2023-4206
A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation. When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.
CVE-2023-4207
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.
CVE-2023-4208
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.
CVE-2023-4273
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-362.8.1.el9_3.src.rpm
    MD5: 6a70a35a1851f92e26dee8971840fc68
    SHA-256: 43ce98b4d21e1165dbe5ab27a01d9c740b3ead67328d69090617999554628835
    Size: 140.76 MB

Asianux Server 9 for x86_64
  1. bpftool-7.2.0-362.8.1.el9_3.x86_64.rpm
    MD5: 6e39e27cacb2ab0fa30cfd23eeddff74
    SHA-256: cf3cad859e1be78b28bce0929612901c3458e5f57900e40bba7a08550d7f4bf9
    Size: 5.71 MB
  2. kernel-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 31e1e1f94df8ea4b382a68285e1c0372
    SHA-256: 00df24d7a77fc974c94bb4460e841995b5c14857d1f668bce7e219bf8928f520
    Size: 4.97 MB
  3. kernel-abi-stablelists-5.14.0-362.8.1.el9_3.noarch.rpm
    MD5: 09be387c14c473f894fdf8b36ea559e0
    SHA-256: 29fd4db863691738f384150db53154022b759d09f67a1a5860c984f70fe3a0d2
    Size: 4.98 MB
  4. kernel-core-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 8e9c63c74876aa013cc97cd7d34155bc
    SHA-256: e8044c5f4dc265299238330040f0a998a39accce7cf54eff5c32286df763a525
    Size: 19.55 MB
  5. kernel-cross-headers-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 8bddcb32e1d257c81a169452ddfb989b
    SHA-256: 8b9adbc28464c099361e5703626f2e40af007ace7e56fa529855314d465cc9b9
    Size: 10.64 MB
  6. kernel-debug-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 5502f3ce8ef00711ae257e2b12e0cb18
    SHA-256: 8b40f47b15926d53da07f87e6beb4058188a66bd3f70cb7faa745336e28cdbe0
    Size: 4.97 MB
  7. kernel-debug-core-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: d1d1d1bb576f7337e10fec8246e36c27
    SHA-256: 2b4b6e4016ce6a3d27622c5322ead2bc83e7a4991f940bfcbace20f529c9ba92
    Size: 31.95 MB
  8. kernel-debug-devel-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 2580e7e630265594c6afa7220856c0cf
    SHA-256: 3c7da1c8814ec5853ec2f4187b013b5c41fce2f37d658772cfc7be959beec05a
    Size: 20.43 MB
  9. kernel-debug-devel-matched-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: e408f71f93d31d2cb87cf5ed35c20b58
    SHA-256: 9c647472b0c51ea08c5d42ecadbebf7753fcb73ea9d82bda7a65194b69e8e1d6
    Size: 4.97 MB
  10. kernel-debug-modules-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 3823d5f53eb2c9ff6b6fdf60a8f8bbd2
    SHA-256: 0e023d622d60dc5cc92abb23d3b2fd745f802908160b21faa318c7ecd2be9071
    Size: 61.69 MB
  11. kernel-debug-modules-core-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 53b9fd60a018014ce1806d3bbf2bf693
    SHA-256: 7c038bf61d39d043ad8ae845ef93c2303eb6666f19d4f5b938453b6cf5a2932b
    Size: 48.46 MB
  12. kernel-debug-modules-extra-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 53725689349ef935404ab2b0687c5e06
    SHA-256: 718de731a1d0aa8233e309ada521df940b25b1b7cf3b7676f2ee90f368ac6434
    Size: 5.80 MB
  13. kernel-debug-uki-virt-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 48940d7a1a5d2a93f7fb1491e37774b5
    SHA-256: 8c10f6144ae55eac1450330bcad246626e6fa44338538455f7691b58f2f8749c
    Size: 79.85 MB
  14. kernel-devel-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 2421bb84e5f9b3cae784d71c4e52f624
    SHA-256: f75d46163780ec52e8528dd1736caa31df86c0f8121543b4f27a0da0d670261e
    Size: 20.31 MB
  15. kernel-devel-matched-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 169533c8be25d49c17b04219dbb642ef
    SHA-256: d6a77a3a2788f21c0271f42d54ddde34dae0ac058c6f033a1cd1deac5afd47ef
    Size: 4.97 MB
  16. kernel-doc-5.14.0-362.8.1.el9_3.noarch.rpm
    MD5: a93037dbbc722938b47e347a67580030
    SHA-256: 31c5ec215ffa1b7c614d076273c5902053e468504ebb1751e2118e081272f454
    Size: 34.65 MB
  17. kernel-headers-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 939b84e4936b527e1812cc15b0a9b0ba
    SHA-256: 572731d3ed6ba544a3d72a654ef8af4e819872c94d4925bdb6efd81807c9fae7
    Size: 6.40 MB
  18. kernel-modules-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: eb06673dbda9eb6565a749bb4812327c
    SHA-256: bb19a4dd0a2ff45d04c0d451dc1025793d37fee953fd279b84c45f22c33981da
    Size: 37.17 MB
  19. kernel-modules-core-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 834574cecd479f5b7336c0eecf0550ce
    SHA-256: 0a8798dff4d1f1a8679c8c88047246fdeac096a7d6693002cb89b361fe6cc225
    Size: 31.60 MB
  20. kernel-modules-extra-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: bde8b2a993224074c70652994f544741
    SHA-256: b4485d411feba1a67e9e91e03bce18d9355156b3ee975363c2f43eb41daa2423
    Size: 5.41 MB
  21. kernel-tools-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 320e2cbee289eeb7b1c35fecc84bae75
    SHA-256: 897417682c3a06151a95944a6df01e7e11fba9455c9ef017a038bb2d24da7eba
    Size: 5.20 MB
  22. kernel-tools-libs-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 0cdea151db9f6d92bb022f49637dda5d
    SHA-256: 503d15df4b9f1f7a226e31310168ce7d6d7d12b5ea86e615c466a8ec975fed12
    Size: 4.98 MB
  23. kernel-tools-libs-devel-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 1cde3de4c9fa9422b9bbbe38c2ef20d2
    SHA-256: 69a7505b48f6069dde0a68f89c090757ea4e96f02bf7a8348d622028c7ef2b7c
    Size: 4.97 MB
  24. kernel-uki-virt-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 02e6f4aad33c21deeee012909ea436a1
    SHA-256: 1c2c044af4e8378f645bfc5fc59b56a142b00e7ddaa033bfb9223148f6df2032
    Size: 59.99 MB
  25. libperf-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: cffdb8a869d839224c04c3cdf874a8a0
    SHA-256: 1eb86ce2f43febe3fb29fc4329bd26f95878af3e701d2da41fff47742ce44be6
    Size: 4.99 MB
  26. perf-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: d4bfbdef7ffd62f03cf428a0201513d1
    SHA-256: 40fb665afe3152956519d15ab7e69636bd91e3e7828392b3b556f3dfe4d5cf72
    Size: 7.44 MB
  27. python3-perf-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 7cdc9676389b530c958c9e5519f64c8e
    SHA-256: 2433dffc98435545300e9798459f83e4534da300c3f9436b14279b6444df3082
    Size: 5.06 MB
  28. rtla-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 1eb53dd3424ea4888bf6189601e4bfbb
    SHA-256: e832dcf6666a0bb14a06366733aa43d3e6e6d9529a697cba34b4a59736ba7de8
    Size: 5.01 MB
  29. rv-5.14.0-362.8.1.el9_3.x86_64.rpm
    MD5: 33bcd963fa2743bc6ccf5aaa88c059f7
    SHA-256: 2e1ae641497137f87245ec99e4e5c1d5c7caa0c4e25a121f89054df3d8270278
    Size: 4.98 MB