kernel-5.14.0-570.21.1.el9_6
エラータID: AXSA:2025-10584:46
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
Security Fix(es):
kernel: net: gso: fix ownership in __udp_gso_segment (CVE-2025-21926)
kernel: vlan: enforce underlying device type (CVE-2025-21920)
kernel: xsk: fix an integer overflow in xp_create_and_assign_umem()
(CVE-2025-21997)
kernel: net: fix geneve_opt length integer overflow (CVE-2025-22055)
kernel: ext4: fix OOB read when checking dotdot dir (CVE-2025-37785)
kernel: wifi: ath12k: Fix invalid data access in
ath12k_dp_rx_h_undecap_nwifi (CVE-2025-37943)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE(s):
CVE-2025-21920
In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_applicant) and MRP (mrp_init_applicant) for the underlying device. As part of the initialization process, we add the multicast address of each applicant to the underlying device, by calling dev_mc_add. __dev_mc_add uses dev->addr_len to determine the length of the new multicast address. This causes an out-of-bounds read if dev->addr_len is greater than 6, since the multicast addresses provided by GARP and MRP are only 6 bytes long. This behaviour can be reproduced using the following commands: ip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo ip l set up dev gretest ip link add link gretest name vlantest type vlan id 100 Then, the following command will display the address of garp_pdu_rcv: ip maddr show | grep 01:80:c2:00:00:21 Fix the bug by enforcing the type of the underlying device during VLAN device initialization.
CVE-2025-21926
In the Linux kernel, the following vulnerability has been resolved: net: gso: fix ownership in __udp_gso_segment In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the original skb is later orphaned as we can hit the following bug: kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Call Trace: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 The above can happen following a sequence of events when using OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action: 1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb goes through queue_gso_packets and then __udp_gso_segment, where its destructor is removed. 2. The segments' data are copied and sent to userspace. 3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the same original skb is sent to its path. 4. If it later hits skb_orphan, we hit the bug. Fix this by also removing the reference to the socket in __udp_gso_segment.
CVE-2025-21997
In the Linux kernel, the following vulnerability has been resolved: xsk: fix an integer overflow in xp_create_and_assign_umem() Since the i and pool->chunk_size variables are of type 'u32', their product can wrap around and then be cast to 'u64'. This can lead to two different XDP buffers pointing to the same memory area. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-22055
In the Linux kernel, the following vulnerability has been resolved: net: fix geneve_opt length integer overflow struct geneve_opt uses 5 bit length for each single option, which means every vary size option should be smaller than 128 bytes. However, all current related Netlink policies cannot promise this length condition and the attacker can exploit a exact 128-byte size option to *fake* a zero length option and confuse the parsing logic, further achieve heap out-of-bounds read. One example crash log is like below: [ 3.905425] ================================================================== [ 3.905925] BUG: KASAN: slab-out-of-bounds in nla_put+0xa9/0xe0 [ 3.906255] Read of size 124 at addr ffff888005f291cc by task poc/177 [ 3.906646] [ 3.906775] CPU: 0 PID: 177 Comm: poc-oob-read Not tainted 6.1.132 #1 [ 3.907131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 [ 3.907784] Call Trace: [ 3.907925] [ 3.908048] dump_stack_lvl+0x44/0x5c [ 3.908258] print_report+0x184/0x4be [ 3.909151] kasan_report+0xc5/0x100 [ 3.909539] kasan_check_range+0xf3/0x1a0 [ 3.909794] memcpy+0x1f/0x60 [ 3.909968] nla_put+0xa9/0xe0 [ 3.910147] tunnel_key_dump+0x945/0xba0 [ 3.911536] tcf_action_dump_1+0x1c1/0x340 [ 3.912436] tcf_action_dump+0x101/0x180 [ 3.912689] tcf_exts_dump+0x164/0x1e0 [ 3.912905] fw_dump+0x18b/0x2d0 [ 3.913483] tcf_fill_node+0x2ee/0x460 [ 3.914778] tfilter_notify+0xf4/0x180 [ 3.915208] tc_new_tfilter+0xd51/0x10d0 [ 3.918615] rtnetlink_rcv_msg+0x4a2/0x560 [ 3.919118] netlink_rcv_skb+0xcd/0x200 [ 3.919787] netlink_unicast+0x395/0x530 [ 3.921032] netlink_sendmsg+0x3d0/0x6d0 [ 3.921987] __sock_sendmsg+0x99/0xa0 [ 3.922220] __sys_sendto+0x1b7/0x240 [ 3.922682] __x64_sys_sendto+0x72/0x90 [ 3.922906] do_syscall_64+0x5e/0x90 [ 3.923814] entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ 3.924122] RIP: 0033:0x7e83eab84407 [ 3.924331] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 faf [ 3.925330] RSP: 002b:00007ffff505e370 EFLAGS: 00000202 ORIG_RAX: 000000000000002c [ 3.925752] RAX: ffffffffffffffda RBX: 00007e83eaafa740 RCX: 00007e83eab84407 [ 3.926173] RDX: 00000000000001a8 RSI: 00007ffff505e3c0 RDI: 0000000000000003 [ 3.926587] RBP: 00007ffff505f460 R08: 00007e83eace1000 R09: 000000000000000c [ 3.926977] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffff505f3c0 [ 3.927367] R13: 00007ffff505f5c8 R14: 00007e83ead1b000 R15: 00005d4fbbe6dcb8 Fix these issues by enforing correct length condition in related policies.
CVE-2025-37785
In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted directory is removed). ext4_empty_dir() assumes every ext4 directory contains at least '.' and '..' as directory entries in the first data block. It first loads the '.' dir entry, performs sanity checks by calling ext4_check_dir_entry() and then uses its rec_len member to compute the location of '..' dir entry (in ext4_next_entry). It assumes the '..' dir entry fits into the same data block. If the rec_len of '.' is precisely one block (4KB), it slips through the sanity checks (it is considered the last directory entry in the data block) and leaves "struct ext4_dir_entry_2 *de" point exactly past the memory slot allocated to the data block. The following call to ext4_check_dir_entry() on new value of de then dereferences this pointer which results in out-of-bounds mem access. Fix this by extending __ext4_check_dir_entry() to check for '.' dir entries that reach the end of data block. Make sure to ignore the phony dir entries for checksum (by checking name_len for non-zero). Note: This is reported by KASAN as use-after-free in case another structure was recently freed from the slot past the bound, but it is really an OOB read. This issue was found by syzkaller tool. Call Trace: [ 38.594108] BUG: KASAN: slab-use-after-free in __ext4_check_dir_entry+0x67e/0x710 [ 38.594649] Read of size 2 at addr ffff88802b41a004 by task syz-executor/5375 [ 38.595158] [ 38.595288] CPU: 0 UID: 0 PID: 5375 Comm: syz-executor Not tainted 6.14.0-rc7 #1 [ 38.595298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 38.595304] Call Trace: [ 38.595308] [ 38.595311] dump_stack_lvl+0xa7/0xd0 [ 38.595325] print_address_description.constprop.0+0x2c/0x3f0 [ 38.595339] ? __ext4_check_dir_entry+0x67e/0x710 [ 38.595349] print_report+0xaa/0x250 [ 38.595359] ? __ext4_check_dir_entry+0x67e/0x710 [ 38.595368] ? kasan_addr_to_slab+0x9/0x90 [ 38.595378] kasan_report+0xab/0xe0 [ 38.595389] ? __ext4_check_dir_entry+0x67e/0x710 [ 38.595400] __ext4_check_dir_entry+0x67e/0x710 [ 38.595410] ext4_empty_dir+0x465/0x990 [ 38.595421] ? __pfx_ext4_empty_dir+0x10/0x10 [ 38.595432] ext4_rmdir.part.0+0x29a/0xd10 [ 38.595441] ? __dquot_initialize+0x2a7/0xbf0 [ 38.595455] ? __pfx_ext4_rmdir.part.0+0x10/0x10 [ 38.595464] ? __pfx___dquot_initialize+0x10/0x10 [ 38.595478] ? down_write+0xdb/0x140 [ 38.595487] ? __pfx_down_write+0x10/0x10 [ 38.595497] ext4_rmdir+0xee/0x140 [ 38.595506] vfs_rmdir+0x209/0x670 [ 38.595517] ? lookup_one_qstr_excl+0x3b/0x190 [ 38.595529] do_rmdir+0x363/0x3c0 [ 38.595537] ? __pfx_do_rmdir+0x10/0x10 [ 38.595544] ? strncpy_from_user+0x1ff/0x2e0 [ 38.595561] __x64_sys_unlinkat+0xf0/0x130 [ 38.595570] do_syscall_64+0x5b/0x180 [ 38.595583] entry_SYSCALL_64_after_hwframe+0x76/0x7e
CVE-2025-37943
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi In certain cases, hardware might provide packets with a length greater than the maximum native Wi-Fi header length. This can lead to accessing and modifying fields in the header within the ath12k_dp_rx_h_undecap_nwifi function for DP_RX_DECAP_TYPE_NATIVE_WIFI decap type and potentially resulting in invalid data access and memory corruption. Add a sanity check before processing the SKB to prevent invalid data access in the undecap native Wi-Fi function for the DP_RX_DECAP_TYPE_NATIVE_WIFI decap type. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
Update packages.
In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_applicant) and MRP (mrp_init_applicant) for the underlying device. As part of the initialization process, we add the multicast address of each applicant to the underlying device, by calling dev_mc_add. __dev_mc_add uses dev->addr_len to determine the length of the new multicast address. This causes an out-of-bounds read if dev->addr_len is greater than 6, since the multicast addresses provided by GARP and MRP are only 6 bytes long. This behaviour can be reproduced using the following commands: ip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo ip l set up dev gretest ip link add link gretest name vlantest type vlan id 100 Then, the following command will display the address of garp_pdu_rcv: ip maddr show | grep 01:80:c2:00:00:21 Fix the bug by enforcing the type of the underlying device during VLAN device initialization.
In the Linux kernel, the following vulnerability has been resolved: net: gso: fix ownership in __udp_gso_segment In __udp_gso_segment the skb destructor is removed before segmenting the skb but the socket reference is kept as-is. This is an issue if the original skb is later orphaned as we can hit the following bug: kernel BUG at ./include/linux/skbuff.h:3312! (skb_orphan) RIP: 0010:ip_rcv_core+0x8b2/0xca0 Call Trace: ip_rcv+0xab/0x6e0 __netif_receive_skb_one_core+0x168/0x1b0 process_backlog+0x384/0x1100 __napi_poll.constprop.0+0xa1/0x370 net_rx_action+0x925/0xe50 The above can happen following a sequence of events when using OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an OVS_ACTION_ATTR_OUTPUT action: 1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb goes through queue_gso_packets and then __udp_gso_segment, where its destructor is removed. 2. The segments' data are copied and sent to userspace. 3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the same original skb is sent to its path. 4. If it later hits skb_orphan, we hit the bug. Fix this by also removing the reference to the socket in __udp_gso_segment.
In the Linux kernel, the following vulnerability has been resolved: xsk: fix an integer overflow in xp_create_and_assign_umem() Since the i and pool->chunk_size variables are of type 'u32', their product can wrap around and then be cast to 'u64'. This can lead to two different XDP buffers pointing to the same memory area. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
In the Linux kernel, the following vulnerability has been resolved: net: fix geneve_opt length integer overflow struct geneve_opt uses 5 bit length for each single option, which means every vary size option should be smaller than 128 bytes. However, all current related Netlink policies cannot promise this length condition and the attacker can exploit a exact 128-byte size option to *fake* a zero length option and confuse the parsing logic, further achieve heap out-of-bounds read. One example crash log is like below: [ 3.905425] ================================================================== [ 3.905925] BUG: KASAN: slab-out-of-bounds in nla_put+0xa9/0xe0 [ 3.906255] Read of size 124 at addr ffff888005f291cc by task poc/177 [ 3.906646] [ 3.906775] CPU: 0 PID: 177 Comm: poc-oob-read Not tainted 6.1.132 #1 [ 3.907131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 [ 3.907784] Call Trace: [ 3.907925]
In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted directory is removed). ext4_empty_dir() assumes every ext4 directory contains at least '.' and '..' as directory entries in the first data block. It first loads the '.' dir entry, performs sanity checks by calling ext4_check_dir_entry() and then uses its rec_len member to compute the location of '..' dir entry (in ext4_next_entry). It assumes the '..' dir entry fits into the same data block. If the rec_len of '.' is precisely one block (4KB), it slips through the sanity checks (it is considered the last directory entry in the data block) and leaves "struct ext4_dir_entry_2 *de" point exactly past the memory slot allocated to the data block. The following call to ext4_check_dir_entry() on new value of de then dereferences this pointer which results in out-of-bounds mem access. Fix this by extending __ext4_check_dir_entry() to check for '.' dir entries that reach the end of data block. Make sure to ignore the phony dir entries for checksum (by checking name_len for non-zero). Note: This is reported by KASAN as use-after-free in case another structure was recently freed from the slot past the bound, but it is really an OOB read. This issue was found by syzkaller tool. Call Trace: [ 38.594108] BUG: KASAN: slab-use-after-free in __ext4_check_dir_entry+0x67e/0x710 [ 38.594649] Read of size 2 at addr ffff88802b41a004 by task syz-executor/5375 [ 38.595158] [ 38.595288] CPU: 0 UID: 0 PID: 5375 Comm: syz-executor Not tainted 6.14.0-rc7 #1 [ 38.595298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 38.595304] Call Trace: [ 38.595308]
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi In certain cases, hardware might provide packets with a length greater than the maximum native Wi-Fi header length. This can lead to accessing and modifying fields in the header within the ath12k_dp_rx_h_undecap_nwifi function for DP_RX_DECAP_TYPE_NATIVE_WIFI decap type and potentially resulting in invalid data access and memory corruption. Add a sanity check before processing the SKB to prevent invalid data access in the undecap native Wi-Fi function for the DP_RX_DECAP_TYPE_NATIVE_WIFI decap type. Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
N/A
SRPMS
- kernel-5.14.0-570.21.1.el9_6.src.rpm
MD5: f214e744277061d1c8d65a6d31fe1e69
SHA-256: bc705ccc0bfd64489b25b71371cf1da3d010e0e712500e67355a0c0578b272e9
Size: 142.47 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: e8aebdd09967142ed97da8b81bc08c72
SHA-256: 32a9ae6940da9532cb3a07da4bc751944d863f1536c5af4f105badd20a9d0154
Size: 1.77 MB - kernel-abi-stablelists-5.14.0-570.21.1.el9_6.noarch.rpm
MD5: 90e98ac92d3e270b305eb841b764a2d4
SHA-256: 9a95bc61138dd39157960b1ddeb75b8ce0c89a9d3947f370d988cb50ccbf26ca
Size: 1.79 MB - kernel-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 5a9459bc5876da1c1d748a6cbdaf0096
SHA-256: aebeb64c10d1ef90862816a47ae3a58a3a2f8ff05dbdf3e7046b80af85b43e71
Size: 17.84 MB - kernel-cross-headers-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 6ce9d26a9a04c12c75d7f16e9c2db760
SHA-256: 556daee7d6f8203d3585ae73fbd24eee6c290e19e7568ad69e58348c26896ece
Size: 8.64 MB - kernel-debug-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: f2827db85c2ec9dfd2afe67a522d3754
SHA-256: 05103ec4f8af6024a9bb6f5f0fd5a3dec55d5c937e63462a3f842405e4ce5781
Size: 1.77 MB - kernel-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: b8ebc6821d62757faa2d9d13d8d5f0f8
SHA-256: 20d29158578eabdc1845f1584959db9b5e5ea9affcc188fbc4a72d455734ec76
Size: 31.28 MB - kernel-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 1131543dc74da59af97ebfa50837bcea
SHA-256: 5a7d23bf54aac7e0ef002be22ed0e234905f72fa7415ee81ed8609173f97c774
Size: 21.76 MB - kernel-debug-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 42d410f1abee7d9126a93e2709ed4388
SHA-256: b10712f303d7f033f846d088f23b4ab8ab027fbc48f04e62f2c69fcdb7a015fe
Size: 1.77 MB - kernel-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: f1a90ba3e90ed8964c5a9c932bd48186
SHA-256: da2e5d264f365054a3115a22300840274c318dc346d0d4e12b1e4ec3dcb91c84
Size: 67.07 MB - kernel-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 8e90dd84738c42b76ea33ae691befec7
SHA-256: 1057eb37039f67940e99bca8e2ec14b7f030d241e1e77e903ad73a0b458c2de8
Size: 48.88 MB - kernel-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 239fbe5061458e106b7cec59ee6819cc
SHA-256: 5e9357312360e1e4343146e1519dcd02225af4e23dffc7f886eed07b2c020c33
Size: 2.54 MB - kernel-debug-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: d2f651d82d8d6f6bf16ea58dedbd281e
SHA-256: 5a88184984c081b456c5ff5739b42d095cd7c588023efbadbb01f6a3f86a7d13
Size: 84.33 MB - kernel-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: aea513ddb7d4920a49b243377e53b5f0
SHA-256: 87d84b172fa73b36774d97e9ae4d7ffd120849a92b76ec91027788e96ef886a9
Size: 21.58 MB - kernel-devel-matched-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 8d5e022a2f9ddca96bcd6b31b5231325
SHA-256: e8933da0b4fd4eafe03eba50126ea42298530782cc0a69d228618bf2d99bb220
Size: 1.77 MB - kernel-doc-5.14.0-570.21.1.el9_6.noarch.rpm
MD5: c4825ab0c2317de5511c45bf33a90e7c
SHA-256: 65982ab315ec00ffdf44dc539e8c67ed2e5a6b1237a5fae0af21064b87435078
Size: 37.90 MB - kernel-headers-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: cbb80c94d75c51b864fb0c53a9d425da
SHA-256: f2e014542f96e25fd5b7a240902a850efe2a1cd70670d5ce3c2a20c9ff4d85b4
Size: 3.51 MB - kernel-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: db0657f4010b9e31976b6ba6de4dc721
SHA-256: 50e787f4fdbf9a26672616297979e05596b126170c724eb8626129aea57da2d5
Size: 38.74 MB - kernel-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: aa32d5145edabb5628b3d5eb4deb8f26
SHA-256: 215f2fb9e9adc34cea008dbb773cb4b5114c701d19bac44b0ab6ca8e39327165
Size: 30.85 MB - kernel-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 383f4b3799b3eaf3b25d140724dc349e
SHA-256: 9f4536b5d6b839be6136feb2095b681ca552db66d7fe1e41b9db0ee7db8aada7
Size: 2.19 MB - kernel-rt-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 70d044549d076a724e4c8e0c099c52ef
SHA-256: 239f2f0ae2564666a44062cd2542ff5d32a5b96a2ba411b1f32c0b459c6c2da3
Size: 1.77 MB - kernel-rt-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: ad2889596437a94b4917a0d4c9515350
SHA-256: 5b07c89d6b9abf09776a991278e6ed62fe309dd197eaca486d2be121df5faceb
Size: 17.74 MB - kernel-rt-debug-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 50c58888db58ada21aa36d847f4e5ce7
SHA-256: 1b8792cd1f239d02ab8223f68020948645eac01daecb188dad339b6ebdcb68fd
Size: 1.77 MB - kernel-rt-debug-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 1cea2c95bfe4f16604ec04652927bb38
SHA-256: 1853439d55a6432baf7ba4b257cc8996f1106b90593829e6948d9c35f55cd932
Size: 19.13 MB - kernel-rt-debug-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: fcaf04d56c99b18069c09c9666569e06
SHA-256: db697934dc3ebca239e62eeeba3bf9da23a7e2bc23d3ce79b41ca14753e910fc
Size: 21.71 MB - kernel-rt-debug-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 6de580066536b10f82f8535c2be81b10
SHA-256: 4fae8facc6dd44cecbad484ba194cedb8bfe065d78d88e4b717f1fb1f46875fe
Size: 40.14 MB - kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 792f84cc617b535f0cd83c59dfabb807
SHA-256: fda905c4812a92d1c7d25dca7328414441348c4dc365f41a5b4e5904461366d8
Size: 31.29 MB - kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 9e9d810350520bafac452eb2ff2d8b5b
SHA-256: 84dbef82170a18a06ba2d3843ed7034ad5116899491152bc38f175683c212a57
Size: 2.22 MB - kernel-rt-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: f9151e311610d2d27f863db9e236b3b0
SHA-256: 9439ad442b454c7c5198dcd4d4e7d5af9a2fd07dda21848f81de4f2a11869b4d
Size: 21.56 MB - kernel-rt-modules-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: b0b7cf470cd5755db93338dfe5c82c0b
SHA-256: 911039acfdeb3a6c1545a397fc46801e1e218cd197749e90e023da4f01a672a9
Size: 38.76 MB - kernel-rt-modules-core-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 86ba104653f6240ce6e09bc36c3e601a
SHA-256: 819f0ea10998d66760e573e417e79491d57253a54bbe0433f0af6e479391cdeb
Size: 30.24 MB - kernel-rt-modules-extra-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 4e4a00b8bc0d9c031cf2439b64c89ed9
SHA-256: 8d9ef75308c067a3fc27247b17ef3fb5738babcb973f209cb1c4e5883091b834
Size: 2.20 MB - kernel-tools-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: aea2e812f21c8282328716f0c24f79f4
SHA-256: 489258c61f294e27d4cdbafed88c0d473ce1cb138ff0b0361b07ef72ff699f87
Size: 2.05 MB - kernel-tools-libs-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 28b6847110f263ce463093e262e65336
SHA-256: fc31fdc6502717f5008743ed71fe553d6a33d68dc9730edfee71f86df8045168
Size: 1.78 MB - kernel-tools-libs-devel-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 1de85060e807b36e48efa9fd273e2d24
SHA-256: b438977f22604f27a2ba80a052d75177facd8bc556ccf856a5c50cf9a8771a71
Size: 1.77 MB - kernel-uki-virt-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: e7baf135055f0264cae99225eb6cb891
SHA-256: 83661f728d875ef382d2fdb68586847027e124d697486d80acf55fc671331cca
Size: 62.95 MB - kernel-uki-virt-addons-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 486dbd46630113c0b75cf1146ad8279d
SHA-256: 54ab3ed0114510f120708601e1d18ec3cbee22bc16ee4d5acfca776d8b229d25
Size: 1.79 MB - libperf-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 404bd18396e67e60c9cf39954fb49816
SHA-256: b7f8ebdaf1c955af195ac5e521ab3c8fd6c8d17e55ac7c7d93f8422af50faf3a
Size: 1.79 MB - perf-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 163d9c2dceb1fa2e3abb64a8b8154ffb
SHA-256: 470d6aa66c302cfe12d1e30df5261357695320d6b4f6eb06e3341746b38b45ba
Size: 4.00 MB - python3-perf-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 5ede0c47ac9d071b5380503b27683a97
SHA-256: f01d6b84185e3be2d69652c17ea58d29117f278ef654fcc845b804c5787f7f60
Size: 3.18 MB - rtla-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: eedf71d231c83975542d631386dad0e3
SHA-256: eee5bf121a6dd8f3ec7db4090d37fea6505d5eb0765c564596a4fe3c0e1b601b
Size: 1.83 MB - rv-5.14.0-570.21.1.el9_6.x86_64.rpm
MD5: 8528ade9bc792fff70e2a93a95df8968
SHA-256: 74fea632b38ad23266d73b4a414f635613755cadf3f412236317942b8455020d
Size: 1.78 MB