kernel-5.14.0-611.26.1.el9_7

エラータID: AXSA:2026-144:08

Release date: 
Thursday, February 5, 2026 - 13:59
Subject: 
kernel-5.14.0-611.26.1.el9_7
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: Linux kernel: Use-after-free in device mapper due to race condition in zone reporting (CVE-2025-38141)
* kernel: Linux kernel use-after-free in eventpoll (CVE-2025-38349)
* kernel: drm/xe: Fix vm_bind_ioctl double free bug (CVE-2025-38731)
* kernel: Linux kernel: vsock vulnerability may lead to memory corruption (CVE-2025-40248)
* kernel: mptcp: fix race condition in mptcp_schedule_work() (CVE-2025-40258)
* kernel: Linux kernel: Out-of-bounds write in Bluetooth MGMT can lead to information disclosure and denial of service (CVE-2025-40294)
* kernel: net: atlantic: fix fragment overflow handling in RX path (CVE-2025-68301)
* kernel: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (CVE-2025-68305)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-38141
In the Linux kernel, the following vulnerability has been resolved: dm: fix dm_blk_report_zones If dm_get_live_table() returned NULL, dm_put_live_table() was never called. Also, it is possible that md->zone_revalidate_map will change while calling this function. Only read it once, so that we are always using the same value. Otherwise we might miss a call to dm_put_live_table(). Finally, while md->zone_revalidate_map is set and a process is calling blk_revalidate_disk_zones() to set up the zone append emulation resources, it is possible that another process, perhaps triggered by blkdev_report_zones_ioctl(), will call dm_blk_report_zones(). If blk_revalidate_disk_zones() fails, these resources can be freed while the other process is still using them, causing a use-after-free error. blk_revalidate_disk_zones() will only ever be called when initially setting up the zone append emulation resources, such as when setting up a zoned dm-crypt table for the first time. Further table swaps will not set md->zone_revalidate_map or call blk_revalidate_disk_zones(). However it must be called using the new table (referenced by md->zone_revalidate_map) and the new queue limits while the DM device is suspended. dm_blk_report_zones() needs some way to distinguish between a call from blk_revalidate_disk_zones(), which must be allowed to use md->zone_revalidate_map to access this not yet activated table, and all other calls to dm_blk_report_zones(), which should not be allowed while the device is suspended and cannot use md->zone_revalidate_map, since the zone resources might be freed by the process currently calling blk_revalidate_disk_zones(). Solve this by tracking the process that sets md->zone_revalidate_map in dm_revalidate_zones() and only allowing that process to make use of it in dm_blk_report_zones().
CVE-2025-38349
In the Linux kernel, the following vulnerability has been resolved: eventpoll: don't decrement ep refcount while still holding the ep mutex Jann Horn points out that epoll is decrementing the ep refcount and then doing a mutex_unlock(&ep->mtx); afterwards. That's very wrong, because it can lead to a use-after-free. That pattern is actually fine for the very last reference, because the code in question will delay the actual call to "ep_free(ep)" until after it has unlocked the mutex. But it's wrong for the much subtler "next to last" case when somebody *else* may also be dropping their reference and free the ep while we're still using the mutex. Note that this is true even if that other user is also using the same ep mutex: mutexes, unlike spinlocks, can not be used for object ownership, even if they guarantee mutual exclusion. A mutex "unlock" operation is not atomic, and as one user is still accessing the mutex as part of unlocking it, another user can come in and get the now released mutex and free the data structure while the first user is still cleaning up. See our mutex documentation in Documentation/locking/mutex-design.rst, in particular the section [1] about semantics: "mutex_unlock() may access the mutex structure even after it has internally released the lock already - so it's not safe for another context to acquire the mutex and assume that the mutex_unlock() context is not using the structure anymore" So if we drop our ep ref before the mutex unlock, but we weren't the last one, we may then unlock the mutex, another user comes in, drops _their_ reference and releases the 'ep' as it now has no users - all while the mutex_unlock() is still accessing it. Fix this by simply moving the ep refcount dropping to outside the mutex: the refcount itself is atomic, and doesn't need mutex protection (that's the whole _point_ of refcounts: unlike mutexes, they are inherently about object lifetimes).
CVE-2025-38731
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Fix vm_bind_ioctl double free bug If the argument check during an array bind fails, the bind_ops are freed twice as seen below. Fix this by setting bind_ops to NULL after freeing. ================================================================== BUG: KASAN: double-free in xe_vm_bind_ioctl+0x1b2/0x21f0 [xe] Free of addr ffff88813bb9b800 by task xe_vm/14198 CPU: 5 UID: 0 PID: 14198 Comm: xe_vm Not tainted 6.16.0-xe-eudebug-cmanszew+ #520 PREEMPT(full) Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR5 RVP, BIOS ADLPFWI1.R00.2411.A02.2110081023 10/08/2021 Call Trace: dump_stack_lvl+0x82/0xd0 print_report+0xcb/0x610 ? __virt_addr_valid+0x19a/0x300 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe] kasan_report_invalid_free+0xc8/0xf0 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe] ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe] check_slab_allocation+0x102/0x130 kfree+0x10d/0x440 ? should_fail_ex+0x57/0x2f0 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe] xe_vm_bind_ioctl+0x1b2/0x21f0 [xe] ? __pfx_xe_vm_bind_ioctl+0x10/0x10 [xe] ? __lock_acquire+0xab9/0x27f0 ? lock_acquire+0x165/0x300 ? drm_dev_enter+0x53/0xe0 [drm] ? find_held_lock+0x2b/0x80 ? drm_dev_exit+0x30/0x50 [drm] ? drm_ioctl_kernel+0x128/0x1c0 [drm] drm_ioctl_kernel+0x128/0x1c0 [drm] ? __pfx_xe_vm_bind_ioctl+0x10/0x10 [xe] ? find_held_lock+0x2b/0x80 ? __pfx_drm_ioctl_kernel+0x10/0x10 [drm] ? should_fail_ex+0x57/0x2f0 ? __pfx_xe_vm_bind_ioctl+0x10/0x10 [xe] drm_ioctl+0x352/0x620 [drm] ? __pfx_drm_ioctl+0x10/0x10 [drm] ? __pfx_rpm_resume+0x10/0x10 ? do_raw_spin_lock+0x11a/0x1b0 ? find_held_lock+0x2b/0x80 ? __pm_runtime_resume+0x61/0xc0 ? rcu_is_watching+0x20/0x50 ? trace_irq_enable.constprop.0+0xac/0xe0 xe_drm_ioctl+0x91/0xc0 [xe] __x64_sys_ioctl+0xb2/0x100 ? rcu_is_watching+0x20/0x50 do_syscall_64+0x68/0x2e0 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7fa9acb24ded (cherry picked from commit a01b704527c28a2fd43a17a85f8996b75ec8492a)
CVE-2025-40248
In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_transport_get_credit(). This results in a permanently elevated `vvs->bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling. 2. connect() resetting a connected socket's state may race with socket being placed in a sockmap. A disconnected socket remaining in a sockmap breaks sockmap's assumptions. And gives rise to WARNs. 3. connect() transitioning SS_CONNECTED -> SS_UNCONNECTED allows for a transport change/drop after TCP_ESTABLISHED. Which poses a problem for any simultaneous sendmsg() or connect() and may result in a use-after-free/null-ptr-deref. Do not disconnect socket on signal/timeout. Keep the logic for unconnected sockets: they don't linger, can't be placed in a sockmap, are rejected by sendmsg(). [1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox... [2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8... [3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox...
CVE-2025-40258
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-free in mptcp_schedule_work() [1] Issue here is that mptcp_schedule_work() schedules a work, then gets a refcount on sk->sk_refcnt if the work was scheduled. This refcount will be released by mptcp_worker(). [A] if (schedule_work(...)) { [B] sock_hold(sk); return true; } Problem is that mptcp_worker() can run immediately and complete before [B] We need instead : sock_hold(sk); if (schedule_work(...)) return true; sock_put(sk); [1] refcount_t: addition on 0; use-after-free. WARNING: CPU: 1 PID: 29 at lib/refcount.c:25 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:25 Call Trace: __refcount_add include/linux/refcount.h:-1 [inline] __refcount_inc include/linux/refcount.h:366 [inline] refcount_inc include/linux/refcount.h:383 [inline] sock_hold include/net/sock.h:816 [inline] mptcp_schedule_work+0x164/0x1a0 net/mptcp/protocol.c:943 mptcp_tout_timer+0x21/0xa0 net/mptcp/protocol.c:2316 call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747 expire_timers kernel/time/timer.c:1798 [inline] __run_timers kernel/time/timer.c:2372 [inline] __run_timer_base+0x648/0x970 kernel/time/timer.c:2384 run_timer_base kernel/time/timer.c:2393 [inline] run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403 handle_softirqs+0x22f/0x710 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] run_ktimerd+0xcf/0x190 kernel/softirq.c:1138 smpboot_thread_fn+0x542/0xa60 kernel/smpboot.c:160 kthread+0x711/0x8a0 kernel/kthread.c:463 ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
CVE-2025-40294
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern() In the parse_adv_monitor_pattern() function, the value of the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251). The size of the 'value' array in the mgmt_adv_pattern structure is 31. If the value of 'pattern[i].length' is set in the user space and exceeds 31, the 'patterns[i].value' array can be accessed out of bound when copied. Increasing the size of the 'value' array in the 'mgmt_adv_pattern' structure will break the userspace. Considering this, and to avoid OOB access revert the limits for 'offset' and 'length' back to the value of HCI_MAX_AD_LENGTH. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
CVE-2025-68301
In the Linux kernel, the following vulnerability has been resolved: net: atlantic: fix fragment overflow handling in RX path The atlantic driver can receive packets with more than MAX_SKB_FRAGS (17) fragments when handling large multi-descriptor packets. This causes an out-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic. The issue occurs because the driver doesn't check the total number of fragments before calling skb_add_rx_frag(). When a packet requires more than MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds. Fix by assuming there will be an extra frag if buff->len > AQ_CFG_RX_HDR_SIZE, then all fragments are accounted for. And reusing the existing check to prevent the overflow earlier in the code path. This crash occurred in production with an Aquantia AQC113 10G NIC. Stack trace from production environment: ``` RIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0 Code: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89 ca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90 c8 00 00 00 <48> 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48 89 fa 83 RSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287 RAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX: fffffffe0a0c8000 RDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI: 0000000000037a40 RBP: 0000000000000024 R08: 0000000000000000 R09: 0000000000000021 R10: 0000000000000848 R11: 0000000000000000 R12: ffffa9bec02a8e24 R13: ffff925ad8615570 R14: 0000000000000000 R15: ffff925b22e80a00 FS: 0000000000000000(0000) GS:ffff925e47880000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4: 0000000000f72ef0 PKRU: 55555554 Call Trace: aq_ring_rx_clean+0x175/0xe60 [atlantic] ? aq_ring_rx_clean+0x14d/0xe60 [atlantic] ? aq_ring_tx_clean+0xdf/0x190 [atlantic] ? kmem_cache_free+0x348/0x450 ? aq_vec_poll+0x81/0x1d0 [atlantic] ? __napi_poll+0x28/0x1c0 ? net_rx_action+0x337/0x420 ``` Changes in v4: - Add Fixes: tag to satisfy patch validation requirements. Changes in v3: - Fix by assuming there will be an extra frag if buff->len > AQ_CFG_RX_HDR_SIZE, then all fragments are accounted for.
CVE-2025-68305
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind There is a potential race condition between sock bind and socket write iter. bind may free the same cmd via mgmt_pending before write iter sends the cmd, just as syzbot reported in UAF[1]. Here we use hci_dev_lock to synchronize the two, thereby avoiding the UAF mentioned in [1]. [1] syzbot reported: BUG: KASAN: slab-use-after-free in mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316 Read of size 8 at addr ffff888077164818 by task syz.0.17/5989 Call Trace: mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316 set_link_security+0x5c2/0x710 net/bluetooth/mgmt.c:1918 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:742 sock_write_iter+0x279/0x360 net/socket.c:1195 Allocated by task 5989: mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296 set_link_security+0x557/0x710 net/bluetooth/mgmt.c:1910 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x21c/0x270 net/socket.c:742 sock_write_iter+0x279/0x360 net/socket.c:1195 Freed by task 5991: mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline] mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257 mgmt_index_removed+0x112/0x2f0 net/bluetooth/mgmt.c:9477 hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-5.14.0-611.26.1.el9_7.src.rpm
    MD5: 415ef71ae1003bf562d0e14dfcde4fe1
    SHA-256: 004c3ff19c94c9a572c6e01752761662ec6678778b570e7dfd916ff2d52704dd
    Size: 143.99 MB

Asianux Server 9 for x86_64
  1. kernel-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 5ebb74f36bc1921c716668fec250eda1
    SHA-256: d20acb3ea83cc0fb9a4be0956181ae717a072ca3ad87a7628621c7741c51868b
    Size: 1.10 MB
  2. kernel-abi-stablelists-5.14.0-611.26.1.el9_7.noarch.rpm
    MD5: 779680fb192adba8b003e6d1a748e8ce
    SHA-256: f326ef5be9c548164e9a380f886c457285e60777772839bb65df8faa0ca64289
    Size: 1.12 MB
  3. kernel-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: d629b4ef1d417d0f2b5031fd1736d7a1
    SHA-256: 24ebb201571f3787c34a4a9dd6300448ec1694fd1e6dddde4dac0ba63161ccfa
    Size: 17.37 MB
  4. kernel-cross-headers-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 0b93fa1cc751eb846ac5088980f47953
    SHA-256: 700ec46539a4fa1cb03f042b498f5d066e8df10d585922810f222112dfe925b7
    Size: 8.04 MB
  5. kernel-debug-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 17a68755164f55070a11bb77ac398666
    SHA-256: b9d3539c21ac3175afb9a58f05b4b2450db6c34485d0c6e695408d1bc7a6f644
    Size: 1.10 MB
  6. kernel-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: a5b5aa7be2ffcc516770505c3bef7678
    SHA-256: c2d8aba83931f586f2a34adf09d8bc0edb704f068cd6a5a85769b483c5e0ac53
    Size: 30.95 MB
  7. kernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 857968cfdc965db90393783ce508036b
    SHA-256: 7267be3d2dd503f3d540710fb75d1508700fd50101ee0d465b1c294b95ddb7be
    Size: 21.29 MB
  8. kernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 0732c1af38604d30c45a4de49ca29365
    SHA-256: 5114025a53f8ab0827f1be1726dec3b9fbe3388f54ad0db80941180562375367
    Size: 1.10 MB
  9. kernel-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 8c403b22502f0b60d47cb6d466ffc001
    SHA-256: d8531b9df31541b59fd30d048cd3d64b2e788b9a7f6a69f4b0bb40541cc90a39
    Size: 69.36 MB
  10. kernel-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 0827493353bd608298f0020952f54417
    SHA-256: 0d01b71cf2c4143e319e2d289cc8152a808e0b9451356bed99a29b44d592fc2c
    Size: 49.53 MB
  11. kernel-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 644e7e66f15a28ed827165908d365062
    SHA-256: 7cddf28af3a931e598a26ccf1f530b49e3ea19199f16efe0837cf46a8441915c
    Size: 1.87 MB
  12. kernel-debug-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 3afc3e9ab41fcbce3a886d4e07f7e6dc
    SHA-256: 8ff532e1b80df0eda09ca35eeea4642842b5c5acc81eea9449dd763a58aba022
    Size: 85.82 MB
  13. kernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: be0ff4fa63c4bbb307b6d9c702c03c58
    SHA-256: 764220e8e325225cff3c99e20b989b76f9f15e411a81dc9512d28ee6aa189a11
    Size: 21.12 MB
  14. kernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 7c7cf36bdf642ee7ff3252da40293189
    SHA-256: 3d084423fb07f2aba053f4d858ed382295d5ebcfa6a632ccf8eca6ddc24122f5
    Size: 1.10 MB
  15. kernel-doc-5.14.0-611.26.1.el9_7.noarch.rpm
    MD5: fd5bdf312d05fe286563b4da7a99175a
    SHA-256: f81323e6c739ecc83fa325348cdaf9bf2b148a81b56577b207afe3fb9166ed79
    Size: 38.84 MB
  16. kernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 35b2d859798befd86bab6d1a9496202e
    SHA-256: 5546ad0d71be4f312e0623752f15bc25ea1b0830389db0f3ea9aaf7ca65461bb
    Size: 2.86 MB
  17. kernel-modules-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 067e7769a5c60e634dd328f3623816bb
    SHA-256: bac3a6959cad26233dc079286cde4976dfc85b5a4f2840bbb221013503aa94f2
    Size: 39.76 MB
  18. kernel-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: eb9fb0ad59a5a645191c1dd63a0b5f70
    SHA-256: 0d9545653774f180f0c987192ec305fa2dd67fde37d3b68f0abf8b3e5f90c720
    Size: 30.97 MB
  19. kernel-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 5bd489d70e0ef19ce69ff7b01afb1442
    SHA-256: 7dfead7d1c5583f22927c08da0aa6b6744d22e98b04f88e22be673c5b85b1db1
    Size: 1.52 MB
  20. kernel-rt-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 6381d2081b4e6d0cd77c8df16cd54459
    SHA-256: 1b7041f3995316dac67f3b0b136771b44785e6307a6a9a5e06e95f7ac6130228
    Size: 1.10 MB
  21. kernel-rt-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: b98129fcb625e7652dd2b8d5def1f9b3
    SHA-256: 594b539dfd66bcdd051510b2f6a8e055bdc92db9c8c41875241283a9b7a2831e
    Size: 17.28 MB
  22. kernel-rt-debug-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 8505117d1b7cc87920a6fd7cf6f4463f
    SHA-256: c98a8ab2a225c0b107952a4addb331a45eb773b916e0fe306e978ed85ce1553b
    Size: 1.10 MB
  23. kernel-rt-debug-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: cdeeaaa1bc777f380d1a75415d221dbc
    SHA-256: 0472c1adbc5ee0488db893815e6f0198ca88a9a63a301f9e6a76d0735a7f32a3
    Size: 18.71 MB
  24. kernel-rt-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: c543d899207f13644dfdec16c9c0d0de
    SHA-256: 2821fcea411a7e8720a06bf46395d5482cd9f35ec9f7609c1c99f591c12af8e4
    Size: 21.24 MB
  25. kernel-rt-debug-modules-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: f51a40c52d2164aa885a84ebfe092d6a
    SHA-256: ec2ff8ac8c379a268586c21e31e5789db02794849049ecab6f10876a7b0bbc31
    Size: 41.31 MB
  26. kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: c3b6f4b0c19e790a4917ef31415773a9
    SHA-256: fef903084a2d31f33191122739c2ee046a1c5c2b2c04296f65f2cb08894ee02e
    Size: 32.13 MB
  27. kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: d790c7ec184e06acd583994e71ee0c6d
    SHA-256: 40b4167782f7215b47c70a1748864162a20d31dce3243f25793b62a8a9af2e7a
    Size: 1.55 MB
  28. kernel-rt-devel-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 17e691b2815e6b89e083fc1bc718c232
    SHA-256: 051e145445864db05b47747ee65bd2be21b9e0c4810432b86c0003d12643f817
    Size: 21.10 MB
  29. kernel-rt-modules-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 5769f43d3591257c8fb98fcb8341275b
    SHA-256: 8ab421d74c98859548f080e633eb0519f44ce0b16056fafa03ace95a4f63272d
    Size: 39.82 MB
  30. kernel-rt-modules-core-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: b0d92ec00981149751eb2443bcc125e9
    SHA-256: 52006ce7816f9bfced0d2357c2f4537b3268886eb69ef4648a79033f4976f512
    Size: 31.04 MB
  31. kernel-rt-modules-extra-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 6815e74d53d1d2135b8953ef719720a0
    SHA-256: 737cca70c7fe5f3504b83ec34eecf3f5a4ffb7d0080820f739ccf844ac764409
    Size: 1.52 MB
  32. kernel-tools-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 6c3d7c78bd11205145325cbd3945f3c2
    SHA-256: 4af2d80632422434fd59eefddd3025b8bb32384475c74058b4f71750bac89aae
    Size: 1.39 MB
  33. kernel-tools-libs-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: d68b28d7d16a9ee46dd7057f8d8e1a70
    SHA-256: 3375a56eaf3de8f0d83e3b0b328fc79847d1aa38e5b98320e6b7d2fc8fc6e69e
    Size: 1.11 MB
  34. kernel-tools-libs-devel-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: f4e6de304b1084438b3c4a8562ca6f5c
    SHA-256: 7861a0d81807194ee3c676908ae08965391a1aa9027dcad9ecc611f69fbda5e0
    Size: 1.10 MB
  35. kernel-uki-virt-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 13fd484b2b22640af114e9cc1f242885
    SHA-256: 08e8ba780ca29dc983acaa298ca85d08d7e45eba8168bc65b90d3d2705051777
    Size: 63.96 MB
  36. kernel-uki-virt-addons-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 66a5d2366c3a2d7a63c7e55c4c5d31c8
    SHA-256: 1effd3821b9d4a5d44285e00c5a617e787fcf8e26b0b12c2ddeed42fd6183478
    Size: 1.12 MB
  37. libperf-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 80b28d7ff169b82a7c75a0c5653fed57
    SHA-256: fc359ba37f8cfff462ae02a9b3bdb468c7aeb5c5dc3f7ce57acc054403c8e1d7
    Size: 1.12 MB
  38. perf-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 7869fb9d243a87ee4ddd9c06876a13dc
    SHA-256: 154c309f204e1c912b2ccf88c823150652f88cbfca208d06b32d578a2c47599e
    Size: 3.35 MB
  39. python3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 1a5723c63f3067175ea021c6be1121a4
    SHA-256: 26211416b760132122f9135ee33af30185c555c93d07d9cdc54124f4c716de0a
    Size: 2.53 MB
  40. rtla-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 9921998d565b0159efdab944df28e573
    SHA-256: 9af513f7a858c365ceae73e814d94ac18ea3322684da9142c8f8134ff4ae7c46
    Size: 1.17 MB
  41. rv-5.14.0-611.26.1.el9_7.x86_64.rpm
    MD5: 652398804d1544fefefcfc2f63ccde00
    SHA-256: 71420d99304819a7855c4d17b68ec5827ab2a9551bdf4099da80051f40e72c71
    Size: 1.12 MB