kernel-5.14.0-611.5.1.el9_7

エラータID: AXSA:2025-11493:94

Release date: 
Monday, December 8, 2025 - 18:45
Subject: 
kernel-5.14.0-611.5.1.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: can: isotp: fix potential CAN frame reception race in isotp_rcv() (CVE-2022-48830)
* kernel: soc: qcom: cmd-db: Map shared memory as WC, not WB (CVE-2024-46689)
* kernel: Squashfs: sanity check symbolic link size (CVE-2024-46744)
* kernel: vfs: fix race between evice_inodes() and find_inode()&iput() (CVE-2024-47679)
* kernel: x86/tdx: Fix "in-kernel MMIO" check (CVE-2024-47727)
* kernel: rxrpc: Fix a race between socket set up and I/O thread creation (CVE-2024-49864)
* kernel: io_uring: check if we need to reschedule during overflow flush (CVE-2024-50060)
* kernel: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods (CVE-2022-49024)
* kernel: posix-clock: Fix missing timespec64 check in pc_clock_settime() (CVE-2024-50195)
* kernel: rxrpc: Fix missing locking causing hanging calls (CVE-2024-50294)
* kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (CVE-2024-53052)
* kernel: afs: Fix lock recursion (CVE-2024-53090)
* kernel: virtio/vsock: Fix accept_queue memory leak (CVE-2024-53119)
* kernel: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (CVE-2024-53135)
* kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466) (CVE-2024-53241)
* kernel: RDMA/rxe: Fix the qp flush warnings in req (CVE-2024-53229)
* kernel: block: fix uaf for flush rq while iterating tags (CVE-2024-53170)
* kernel: nfsd: release svc_expkey/svc_export with rcu_work (CVE-2024-53216)
* kernel: net: af_can: do not leave a dangling sk pointer in can_create() (CVE-2024-56603)
* kernel: blk-cgroup: Fix UAF in blkcg_unpin_online() (CVE-2024-56672)
* kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl (CVE-2024-56662)
* kernel: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors (CVE-2024-56675)
* kernel: can: j1939: j1939_session_new(): fix skb reference counting (CVE-2024-56645)
* kernel: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (CVE-2024-56690)
* kernel: io_uring: check if iowq is killed before queuing (CVE-2024-56709)
* kernel: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (CVE-2024-56739)
* kernel: bpf: put bpf_link's program when link is safe to be deallocated (CVE-2024-56786)
* kernel: igb: Fix potential invalid memory access in igb_init_module() (CVE-2024-52332)
* kernel: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (CVE-2024-53680)
* kernel: netfilter: conntrack: clamp maximum hashtable size to INT_MAX (CVE-2025-21648)
* kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts (CVE-2025-21647)
* kernel: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() (CVE-2025-21631)
* kernel: zram: fix potential UAF of zram table (CVE-2025-21671)
* kernel: afs: Fix merge preference rule failure condition (CVE-2025-21672)
* kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug (CVE-2025-21693)
* kernel: cachestat: fix page cache statistics permission checking (CVE-2025-21691)
* kernel: mm: clear uffd-wp PTE/PMD state on mremap() (CVE-2025-21696)
* kernel: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (CVE-2025-21702)
* kernel: usbnet: fix memory leak in error case (CVE-2022-49657)
* kernel: powerpc/xics: fix refcount leak in icp_opal_init() (CVE-2022-49432)
* kernel: net: tun: unlink NAPI from device on destruction (CVE-2022-49672)
* kernel: powerpc/papr_scm: don't requests stats with '0' sized stats buffer (CVE-2022-49353)
* kernel: powerpc/xive: Fix refcount leak in xive_spapr_init (CVE-2022-49437)
* kernel: ima: Fix potential memory leak in ima_init_crypto() (CVE-2022-49627)
* kernel: linux/dim: Fix divide by 0 in RDMA DIM (CVE-2022-49670)
* kernel: can: isotp: sanitize CAN ID checks in isotp_bind() (CVE-2022-49269)
* kernel: ima: Fix a potential integer overflow in ima_appraise_measurement (CVE-2022-49643)
* kernel: powerpc/xive/spapr: correct bitmap allocation size (CVE-2022-49623)
* kernel: efi: Do not import certificates from UEFI Secure Boot for T2 Macs (CVE-2022-49357)
* kernel: list: fix a data-race around ep->rdllist (CVE-2022-49443)
* kernel: tracing/histograms: Fix memory leak problem (CVE-2022-49648)
* kernel: Input: synaptics - fix crash when enabling pass-through port (CVE-2025-21746)
* kernel: NFSD: fix hang in nfsd4_shutdown_callback (CVE-2025-21795)
* kernel: bpf: Send signals asynchronously if !preemptible (CVE-2025-21728)
* kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() (CVE-2024-54456)
* kernel: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek() (CVE-2024-57987)
* kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (CVE-2024-58014)
* kernel: Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name() (CVE-2024-57988)
* kernel: RDMA/mlx5: Fix implicit ODP use after free (CVE-2025-21714)
* kernel: drm/xe/tracing: Fix a potential TP_printk UAF (CVE-2024-49570)
* kernel: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check (CVE-2024-57993)
* kernel: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion (CVE-2025-21729)
* kernel: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links (CVE-2024-57989)
* kernel: wifi: ath12k: Fix for out-of bound access error (CVE-2024-58015)
* kernel: OPP: add index check to assert to avoid buffer overflow in _read_freq() (CVE-2024-57998)
* kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() (CVE-2024-57995)
* kernel: nfsd: clear acl_access/acl_default after releasing them (CVE-2025-21796)
* kernel: scsi: ufs: core: Fix use-after free in init error and remove paths (CVE-2025-21739)
* kernel: workqueue: Put the pwq after detaching the rescuer from the pool (CVE-2025-21786)
* kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (CVE-2025-21738)
* kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections (CVE-2024-57986)
* kernel: padata: avoid UAF for reorder_work (CVE-2025-21726)
* kernel: vrf: use RCU protection in l3mdev_l3_out() (CVE-2025-21791)
* kernel: team: better TEAM_OPTION_TYPE_STRING validation (CVE-2025-21787)
* kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts (CVE-2024-57981)
* kernel: vxlan: check vxlan_vnigroup_init() return value (CVE-2025-21790)
* kernel: wifi: mt76: mt7925: fix off by one in mt7925_load_clc() (CVE-2024-57990)
* kernel: ipv6: use RCU protection in ip6_default_advmss() (CVE-2025-21765)
* kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (CVE-2024-58012)
* kernel: blk-cgroup: Fix class @block_class's subsystem refcount leakage (CVE-2025-21745)
* kernel: net: let net.core.dev_weight always be non-zero (CVE-2025-21806)
* kernel: wifi: rtlwifi: remove unused check_buddy_priv (CVE-2024-58072)
* kernel: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized (CVE-2024-58068)
* kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference (CVE-2024-58062)
* kernel: idpf: convert workqueues to unbound (CVE-2024-58057)
* kernel: wifi: mac80211: don't flush non-uploaded STAs (CVE-2025-21828)
* kernel: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (CVE-2024-58083)
* kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length (CVE-2025-21826)
* kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback (CVE-2024-58077)
* kernel: crypto: tegra - do not transfer req when tegra init fails (CVE-2024-58075)
* kernel: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" (CVE-2025-21829)
* kernel: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop (CVE-2025-21839)
* kernel: io_uring/uring_cmd: unconditionally copy SQEs at prep time (CVE-2025-21837)
* kernel: information leak via transient execution vulnerability in some AMD processors (CVE-2024-36350)
* kernel: transient execution vulnerability in some AMD processors (CVE-2024-36357)
* kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel (CVE-2025-21851)
* kernel: ibmvnic: Don't reference skb after sending to VIOS (CVE-2025-21855)
* kernel: smb: client: Add check for next_buffer in receive_encrypted_standard() (CVE-2025-21844)
* kernel: bpf: avoid holding freeze_mutex during mmap operation (CVE-2025-21853)
* kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() (CVE-2025-21847)
* kernel: tcp: drop secpath at the same time as we currently drop dst (CVE-2025-21864)
* kernel: bpf: Fix deadlock when freeing cgroup storage (CVE-2024-58088)
* kernel: acct: perform last write from workqueue (CVE-2025-21846)
* kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() (CVE-2025-21861)
* kernel: io_uring: prevent opcode speculation (CVE-2025-21863)
* kernel: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (CVE-2025-21848)
* kernel: netfilter: nft_tunnel: fix geneve_opt type confusion addition (CVE-2025-22056)
* kernel: can: j1939: j1939_send_one(): fix missing CAN header initialization (CVE-2022-49845)
* kernel: usb: typec: ucsi: displayport: Fix NULL pointer access (CVE-2025-37994)
* kernel: wifi: ath12k: fix uaf in ath12k_core_init() (CVE-2025-38116)
* kernel: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (CVE-2025-38396)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-611.5.1.el9_7.src.rpm
    MD5: 6075fab9f724bafc52f4449c7930f73f
    SHA-256: d820fce4287ff0fae7b36ce6038713730d151d74245771bfdbfc151cf951b500
    Size: 143.91 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 209be21938043f05f2c992097f1af656
    SHA-256: af63a37a3b632ee53407deb2242e7ca807945f44edb6d4f0190524b4a124fb7a
    Size: 1.08 MB
  2. kernel-abi-stablelists-5.14.0-611.5.1.el9_7.noarch.rpm
    MD5: 70c6bd16c609f8617f0f6e33fe9909a3
    SHA-256: 8b2e35bcddf869221a31c0309f3626402016290bef5e0efbd80d614ace445112
    Size: 1.10 MB
  3. kernel-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: bf73bf909f4eb499a3b098c038b28526
    SHA-256: 5111bef86254c219b4d6e10e90a5aa3750d26b4dd7aa7a6eb2b5cedb417165f8
    Size: 17.33 MB
  4. kernel-cross-headers-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 8c16de7ad49f36b53a88c9338c962ebc
    SHA-256: 5dc4503924ff1fadb862d64ec853f0487126c63092a720f272aeefceabff0338
    Size: 8.02 MB
  5. kernel-debug-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: eeb2104c9eba5612e370f6f2cbe18d30
    SHA-256: 2d239d0a63758afdef77c9b16777f2e95fd5379345eb519619882cfd3ae42ce4
    Size: 1.08 MB
  6. kernel-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 0a6c8c0e430d24846ba6770f5d930c81
    SHA-256: 6252b28a5774cee6c6d9c8c1477c1517e65a7e3d6776fa24d5534948a402a08d
    Size: 30.90 MB
  7. kernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: efe5ad6aefeda569c2ee599817b794f1
    SHA-256: 31f27c1beceb14d4c515f1f7d25c3d6b9570c8720ac252680ab38422d8787caa
    Size: 21.25 MB
  8. kernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: db5b0348e25ccc131cf41b0117f705b7
    SHA-256: 5bd39a847553c406a2cd0b3920a75e7d41514f3e8f7d5a55f2b489adcbbf669a
    Size: 1.08 MB
  9. kernel-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 9caefbc9cbb3dffe67d8341271376b61
    SHA-256: c5d55fb27de8cb57fb6b4f0842b8198525d1507f3de2f37bcd625268d5644ff4
    Size: 69.31 MB
  10. kernel-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: e44775137b936cda784d8c15c765f711
    SHA-256: 14bdd6b8e8abcd6f1502bf77f5a1e4729fc0a93499d4a9981b6e0056543c6f4b
    Size: 49.34 MB
  11. kernel-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 0c548c88eefde986b78ad6471f26403b
    SHA-256: 121e4bb246b5e4e2bca3d194923fa299b6a1ee05173062ae3eec734836474e1a
    Size: 1.85 MB
  12. kernel-debug-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 95229f082886561b973cc127dbe89dfe
    SHA-256: aaa6aacc9f6d413952428ed164e00b97a997c83e55a3b3d3c090ae800ab3e12d
    Size: 85.75 MB
  13. kernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 707cdf2bec68e25170d2058e4044750c
    SHA-256: c3eb4e62f65020642cd687c6269dbf248906f825941a08f1923b587f42e21eaa
    Size: 21.08 MB
  14. kernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 50443f7e0d79ebe25b1b1116ed60101a
    SHA-256: 362d9bd3ac39e0ed1674ec6e69325b2a6e3eca2365965dc04edcb6aa38a3d006
    Size: 1.08 MB
  15. kernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm
    MD5: ed609b5c9a1f6d575e546ffc0cd5dbce
    SHA-256: 25ffce94fc11e839114b0dd165443058754ff3e3860dd5a7b33a8b8301109c34
    Size: 38.81 MB
  16. kernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 21bd7a61255ae8f3999a65960a7632e8
    SHA-256: 50d05cd9c3f8e843651b9f334944b9620e7781adf3be7f2cb1eb7d32d4bf7274
    Size: 2.84 MB
  17. kernel-modules-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 50470ffa353e28c375abc255b1ac2396
    SHA-256: 0bdfc8adaf24ca846706d80488819323b6610f03ad3c45d7f1966c45c05b5cb3
    Size: 39.74 MB
  18. kernel-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: f0f99d83a79eff6570f2b02cb846c00e
    SHA-256: 0e60faf0504df1481d4c293a620b5194492942a9f603c1b00cebccb282fc01f8
    Size: 30.87 MB
  19. kernel-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: be31aed4f69c7ada7412d483b66430aa
    SHA-256: e3a8d4c26cb3860027579fb1276413059656929171484447234e43fb891084f2
    Size: 1.50 MB
  20. kernel-rt-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 8b5c57e29e1cbfb8940fc9023e3177c1
    SHA-256: b99f2e1c6b28c87ad46d5c6e4f527976428fe86775566f15867a83c3cf956364
    Size: 1.08 MB
  21. kernel-rt-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 68c2a3e1c8adb54c2a29713e10dc6f8a
    SHA-256: 3f12c93f07de22d6438cab913abb76ef1030a01d3d966ccc78b007e90e71fa01
    Size: 17.23 MB
  22. kernel-rt-debug-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 74f3391d600ef7d3fde2fc5d9438e0c2
    SHA-256: 8969941934b98dd0e18c847f19dec8866f0cf41690f0b5e6585e8587fb6be7bf
    Size: 1.08 MB
  23. kernel-rt-debug-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 29682d812c8ec17c3fc7a62585807100
    SHA-256: 668895a6b52affa1d0c1fcb8ed22ccabcff0ff316607a876d8c88b5e3feb1daf
    Size: 18.66 MB
  24. kernel-rt-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: b7cebe65205db0fbc0cdcb817d818c0d
    SHA-256: 4c56ba2786cb8054eea5753f3278b8b70ddc39862a52bcdbf810745fd4515182
    Size: 21.20 MB
  25. kernel-rt-debug-modules-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 4cba973bc0dff00049cb2caeef686137
    SHA-256: f54d98abd29d3c67d45492869bcb7cf99f2a7214081a5fbf953017d3361e9ba8
    Size: 41.28 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 55df6dc5fcc7437450c125b889acafda
    SHA-256: 2bad487a4a280e033be5efca09ed23e4d1013557a7239fa3ed256b8286ba885b
    Size: 32.03 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 73710cba2705ca0ae37327de82136ec7
    SHA-256: cfa22ebfb3effbb83f77e49b4cf505d24318da5423fe4577d4602b0d73dda00b
    Size: 1.52 MB
  28. kernel-rt-devel-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 0aadf3522febae7387b0c3770c2de457
    SHA-256: b8a67beeb09ace161d8c04e161d9c21eb67ca223f2150ba6db5669c2a78a1f01
    Size: 21.07 MB
  29. kernel-rt-modules-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: f92da2fa66ffda5e089738bfc3453e88
    SHA-256: a5bb2231a89ef835ded716ff7e851473224291d2d4854768317d970810e25d85
    Size: 39.77 MB
  30. kernel-rt-modules-core-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: e2e44de37a2ae5269d13d84b49537259
    SHA-256: 9fe358c59f4d655652998fb065b6e48a0d7ef9ddb1584ec9390f52cd3a6c4969
    Size: 30.94 MB
  31. kernel-rt-modules-extra-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 5d0b27d53f16c59c6308088db5619559
    SHA-256: a4b472672927b2fcd73ec2a3d0b91429fab12a7a20b74b8cd97bbbce8505d250
    Size: 1.50 MB
  32. kernel-tools-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: da7e8b6804958135067850642391e927
    SHA-256: 22a34157f83f5af06fdd98c91a2347fef7371bb2d1dc7d7a709735d288320316
    Size: 1.37 MB
  33. kernel-tools-libs-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 33d2e4ee4e9260dbf48164eea4c2cd20
    SHA-256: f9e38d2445212a059fd84c74cbf84a0ab1a8c18f0ec063d9dbfdb45746c78776
    Size: 1.09 MB
  34. kernel-tools-libs-devel-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: e8d8d8648f64f5dfa8e50faf830cefb4
    SHA-256: 33dc6778c66e9e3c3ecd88a8b3962322bccb6305e7278113ae762c42a234cebe
    Size: 1.08 MB
  35. kernel-uki-virt-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: b01661a3b0b85637cc05f7420fd4179b
    SHA-256: 7b5bd534a369621f3dd2473f31013902d2e1b779187acd6b5728e0a8a70613b1
    Size: 63.90 MB
  36. kernel-uki-virt-addons-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 51a37c7ae1390829f272a923b7fa48c2
    SHA-256: 6144cfa986ed8aa0347a8fdbaed91fdf3dc78a7fe6038f0fbc7c733dfe3f9ae1
    Size: 1.10 MB
  37. libperf-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: c1ff913cf778714c33a9496909f88d37
    SHA-256: 2d0aed64d0516b72e1a30c322e07bf9de88395a5dde634e171d1376cb6685cb1
    Size: 1.10 MB
  38. perf-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: ea775c0a345a1460e3a8e42001f1839d
    SHA-256: 2e45d26d2e44a742f17ed0bbf3ea339e4112d30f4c62cceec1d79efd18375f0c
    Size: 3.33 MB
  39. python3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 0270c9a2b1795d33fd84e6c87d3b8390
    SHA-256: 707475403d62f387075d25ab9e4b3391b7239003c368d06d707ab9345af0e8b9
    Size: 2.50 MB
  40. rtla-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 3956a6d66e48809ef5069bedbeedc7c9
    SHA-256: cb6e229b4dcf09b0a469b2430730bb4828166186fc21028cdc4605d4e8748c97
    Size: 1.14 MB
  41. rv-5.14.0-611.5.1.el9_7.x86_64.rpm
    MD5: 84aa3cb4bf9b51cc4ed216c9eb799c76
    SHA-256: 92478e6db07ce0d7a2aec47e6e5f70e2a11e85c1b99a1798d6ac60f4bd1df027
    Size: 1.09 MB