kernel-5.14.0-611.45.1.el9_7
エラータID: AXSA:2026-409:25
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem (CVE-2025-38180)
* kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (CVE-2025-40096)
* kernel: Linux kernel: Local denial of service and memory leak in DAMON sysfs via setup failure (CVE-2026-23144)
* kernel: Linux kernel: Use-after-free in bonding module can cause system crash or arbitrary code execution (CVE-2026-23171)
* kernel: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (CVE-2026-23193)
* kernel: macvlan: fix error recovery in macvlan_common_newlink() (CVE-2026-23209)
* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)
* kernel: ALSA: aloop: Fix racy access at PCM trigger (CVE-2026-23191)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2025-38180
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF.
CVE-2025-40096
In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insufficient to hit it. The bug was then only noticed and fixed after commit 9c2ba265352a ("drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2") landed, with its fixup of commit 4eaf02d6076c ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies"). At that point it was a slightly different flavour of a double free, which commit 963d0b356935 ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder") noticed and attempted to fix. But it only moved the double free from happening inside the drm_sched_job_add_dependency(), when releasing the reference not yet obtained, to the caller, when releasing the reference already released by the former in the failure case. As such it is not easy to identify the right target for the fixes tag so lets keep it simple and just continue the chain. While fixing we also improve the comment and explain the reason for taking the reference and not dropping it.
CVE-2026-23144
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure When a context DAMON sysfs directory setup is failed after setup of attrs/ directory, subdirectories of attrs/ directory are not cleaned up. As a result, DAMON sysfs interface is nearly broken until the system reboots, and the memory for the unremoved directory is leaked. Cleanup the directories under such failures.
CVE-2026-23171
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free due to enslave fail after slave array update Fix a use-after-free which happens due to enslave failure after the new slave has been added to the array. Since the new slave can be used for Tx immediately, we can use it after it has been freed by the enslave error cleanup path which frees the allocated slave memory. Slave update array is supposed to be called last when further enslave failures are not expected. Move it after xdp setup to avoid any problems. It is very easy to reproduce the problem with a simple xdp_pass prog: ip l add bond1 type bond mode balance-xor ip l set bond1 up ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass ip l add dumdum type dummy Then run in parallel: while :; do ip l set dumdum master bond1 1>/dev/null 2>&1; done; mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn" The crash happens almost immediately: [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf] [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary) [ 605.602979] Tainted: [B]=BAD_PAGE [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210 [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89 [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213 [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000 [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000 [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84 [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000 [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0 [ 605.603373] Call Trace: [ 605.603392] [ 605.603410] __dev_queue_xmit+0x448/0x32a0 [ 605.603434] ? __pfx_vprintk_emit+0x10/0x10 [ 605.603461] ? __pfx_vprintk_emit+0x10/0x10 [ 605.603484] ? __pfx___dev_queue_xmit+0x10/0x10 [ 605.603507] ? bond_start_xmit+0xbfb/0xc20 [bonding] [ 605.603546] ? _printk+0xcb/0x100 [ 605.603566] ? __pfx__printk+0x10/0x10 [ 605.603589] ? bond_start_xmit+0xbfb/0xc20 [bonding] [ 605.603627] ? add_taint+0x5e/0x70 [ 605.603648] ? add_taint+0x2a/0x70 [ 605.603670] ? end_report.cold+0x51/0x75 [ 605.603693] ? bond_start_xmit+0xbfb/0xc20 [bonding] [ 605.603731] bond_start_xmit+0x623/0xc20 [bonding]
CVE-2026-23191
In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop operations are performed outside the cable lock, this may result in UAF when a program attempts to trigger frequently while opening/closing the tied stream, as spotted by fuzzers. For addressing the UAF, this patch changes two things: - It covers the most of code in loopback_check_format() with cable->lock spinlock, and add the proper NULL checks. This avoids already some racy accesses. - In addition, now we try to check the state of the capture PCM stream that may be stopped in this function, which was the major pain point leading to UAF.
CVE-2026-23193
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the session release path) may wake up and free the iscsit_session structure immediately. This creates a race condition where the current thread may attempt to execute spin_unlock_bh() on a session structure that has already been deallocated, resulting in a KASAN slab-use-after-free. To resolve this, release the session_usage_lock before calling complete() to ensure all dereferences of the sess pointer are finished before the waiter is allowed to proceed with deallocation.
CVE-2026-23204
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
CVE-2026-23209
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20 ping -c1 -I p1 1.2.3.4 He also gave a very detailed analysis: The issue is triggered when a new macvlan link is created with MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan port and register_netdevice() called from macvlan_common_newlink() fails (e.g. because of the invalid link name). In this case macvlan_hash_add_source is called from macvlan_change_sources() / macvlan_common_newlink(): This adds a reference to vlan to the port's vlan_source_hash using macvlan_source_entry. vlan is a pointer to the priv data of the link that is being created. When register_netdevice() fails, the error is returned from macvlan_newlink() to rtnl_newlink_create(): if (ops->newlink) err = ops->newlink(dev, ¶ms, extack); else err = register_netdevice(dev); if (err < 0) { free_netdev(dev); goto out; } and free_netdev() is called, causing a kvfree() on the struct net_device that is still referenced in the source entry attached to the lower device's macvlan port. Now all packets sent on the macvlan port with a matching source mac address will trigger a use-after-free in macvlan_forward_source(). With all that, my fix is to make sure we call macvlan_flush_sources() regardless of @create value whenever "goto destroy_macvlan_port;" path is taken. Many thanks to valis for following up on this issue.
Update packages.
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF.
In the Linux kernel, the following vulnerability has been resolved: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies When adding dependencies with drm_sched_job_add_dependency(), that function consumes the fence reference both on success and failure, so in the latter case the dma_fence_put() on the error path (xarray failed to expand) is a double free. Interestingly this bug appears to have been present ever since commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code back then looked like this: drm_sched_job_add_implicit_dependencies(): ... for (i = 0; i < fence_count; i++) { ret = drm_sched_job_add_dependency(job, fences[i]); if (ret) break; } for (; i < fence_count; i++) dma_fence_put(fences[i]); Which means for the failing 'i' the dma_fence_put was already a double free. Possibly there were no users at that time, or the test cases were insufficient to hit it. The bug was then only noticed and fixed after commit 9c2ba265352a ("drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2") landed, with its fixup of commit 4eaf02d6076c ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies"). At that point it was a slightly different flavour of a double free, which commit 963d0b356935 ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder") noticed and attempted to fix. But it only moved the double free from happening inside the drm_sched_job_add_dependency(), when releasing the reference not yet obtained, to the caller, when releasing the reference already released by the former in the failure case. As such it is not easy to identify the right target for the fixes tag so lets keep it simple and just continue the chain. While fixing we also improve the comment and explain the reason for taking the reference and not dropping it.
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure When a context DAMON sysfs directory setup is failed after setup of attrs/ directory, subdirectories of attrs/ directory are not cleaned up. As a result, DAMON sysfs interface is nearly broken until the system reboots, and the memory for the unremoved directory is leaked. Cleanup the directories under such failures.
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free due to enslave fail after slave array update Fix a use-after-free which happens due to enslave failure after the new slave has been added to the array. Since the new slave can be used for Tx immediately, we can use it after it has been freed by the enslave error cleanup path which frees the allocated slave memory. Slave update array is supposed to be called last when further enslave failures are not expected. Move it after xdp setup to avoid any problems. It is very easy to reproduce the problem with a simple xdp_pass prog: ip l add bond1 type bond mode balance-xor ip l set bond1 up ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass ip l add dumdum type dummy Then run in parallel: while :; do ip l set dumdum master bond1 1>/dev/null 2>&1; done; mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn" The crash happens almost immediately: [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf] [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary) [ 605.602979] Tainted: [B]=BAD_PAGE [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210 [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89 [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213 [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000 [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000 [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84 [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000 [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0 [ 605.603373] Call Trace: [ 605.603392]
In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop operations are performed outside the cable lock, this may result in UAF when a program attempts to trigger frequently while opening/closing the tied stream, as spotted by fuzzers. For addressing the UAF, this patch changes two things: - It covers the most of code in loopback_check_format() with cable->lock spinlock, and add the proper NULL checks. This avoids already some racy accesses. - In addition, now we try to check the state of the capture PCM stream that may be stopped in this function, which was the major pain point leading to UAF.
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the session release path) may wake up and free the iscsit_session structure immediately. This creates a race condition where the current thread may attempt to execute spin_unlock_bh() on a session structure that has already been deallocated, resulting in a KASAN slab-use-after-free. To resolve this, release the session_usage_lock before calling complete() to ensure all dereferences of the sess pointer are finished before the waiter is allowed to proceed with deallocation.
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20 ping -c1 -I p1 1.2.3.4 He also gave a very detailed analysis:
The issue is triggered when a new macvlan link is created with MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan port and register_netdevice() called from macvlan_common_newlink() fails (e.g. because of the invalid link name). In this case macvlan_hash_add_source is called from macvlan_change_sources() / macvlan_common_newlink(): This adds a reference to vlan to the port's vlan_source_hash using macvlan_source_entry. vlan is a pointer to the priv data of the link that is being created. When register_netdevice() fails, the error is returned from macvlan_newlink() to rtnl_newlink_create(): if (ops->newlink) err = ops->newlink(dev, ¶ms, extack); else err = register_netdevice(dev); if (err < 0) { free_netdev(dev); goto out; } and free_netdev() is called, causing a kvfree() on the struct net_device that is still referenced in the source entry attached to the lower device's macvlan port. Now all packets sent on the macvlan port with a matching source mac address will trigger a use-after-free in macvlan_forward_source().With all that, my fix is to make sure we call macvlan_flush_sources() regardless of @create value whenever "goto destroy_macvlan_port;" path is taken. Many thanks to valis for following up on this issue.
N/A
SRPMS
- kernel-5.14.0-611.45.1.el9_7.src.rpm
MD5: 19f7a8530e67d729eda1e14e9047b40c
SHA-256: d327eec897062988096078856f17971583a768caada935143e80ff56d82b4e45
Size: 144.02 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 11ab9c2d3abd3af9346b84d87eaf3e9b
SHA-256: 46f8256dbe4b8936d39e69fb413e2151a22ebd53e29b68b49a614e303ad60aa5
Size: 1.11 MB - kernel-abi-stablelists-5.14.0-611.45.1.el9_7.noarch.rpm
MD5: c0e03f3a081082dfdc5b424615b801d6
SHA-256: 82aa96f8ae6965cb84f076a34274daff1c9845f3580a8c75250a090e41d28bd8
Size: 1.14 MB - kernel-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 1d7c2ce98fadf49fe382b490c5dbb0f7
SHA-256: 81c5ca82b8b8a6a958d2eeebcfdb4a3059f1193ec8d7909434773158e591f458
Size: 17.39 MB - kernel-cross-headers-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: bfeed65aae8462db91f86f70edacee21
SHA-256: a31e8a0880cf75b7a6e01aa1ec5e7b03f473e9410b079de7c0eb0dee02195338
Size: 8.06 MB - kernel-debug-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: f09fa99cce86840569f768c51d29e933
SHA-256: edb93e3e84dfc1a96701f24fb45024b49d29c70acf446fdf316090aa56457a21
Size: 1.12 MB - kernel-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 0fec9d983d6cc68f1bad65c3a312b4f4
SHA-256: 99dd3ceb85d2517e945abafc247c0aabb6f4b6bb9ca87b544dc38a1375e30de8
Size: 30.98 MB - kernel-debug-devel-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 412c73dc68cc3592f848e1c2c58b3295
SHA-256: 2186acf6e7a92f2d4a3c15e3c0e198c6b521e61067e776b032b76e91437cf35a
Size: 21.30 MB - kernel-debug-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 913c1014d8c5496839e41477cea3bb4f
SHA-256: 3acee54d07fecb95d8eef655606dd81907f81b650bf4f1e6b509739e0f5746c8
Size: 1.12 MB - kernel-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: cbacc34e77c6d3f68e2cd56c2b806b54
SHA-256: 1e9aececce3740be0de7eab1231ebd351136049bb311bdd0299065a7b8a042db
Size: 69.35 MB - kernel-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 2070d53f55932da626a31b251e0849d4
SHA-256: ac706ed197285f20d2ca78edd19012f414553284aeeab120042cc62bb60ffea1
Size: 49.53 MB - kernel-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 637cb15329fc908a76fc0073f4a1ac0f
SHA-256: 7403cd3f61ce3e9f411e5689db77e9111dfcdac94e451ccad7dbaf701bee8dba
Size: 1.92 MB - kernel-debug-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 6dba520b6d5700ab53b543e58375247c
SHA-256: a205d92a3525294b2ed1fd950965b05a99b353feeaca1b58dd34b8df81860166
Size: 85.86 MB - kernel-devel-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 1fc8dd73104acbdbebbfae2772b4df01
SHA-256: 02c0fbcfa6e17b94a1307e8df7a6185e12f194e4b7ac989eb6352c3b5b7b3715
Size: 21.14 MB - kernel-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: ea43e6633cc219f9372c0395cf9f44ce
SHA-256: 4ba191c3bccf70a7d5ca468a37c3caa67f41ac71990e009213c35a4c56ce44a2
Size: 1.12 MB - kernel-doc-5.14.0-611.45.1.el9_7.noarch.rpm
MD5: 678706cdadcf7d546f650ab5f8af2b05
SHA-256: 4c127a46d70223be51a50df2e4cf097d6ce24264f929cb75bd084f1f6ba77d69
Size: 38.86 MB - kernel-headers-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: add2d40a1987f1bfe3632ca468e3fb24
SHA-256: f37ec98cf4f2277d12d180fd2aa45eb4b9ef20e14b3349273654536d18af5b22
Size: 2.87 MB - kernel-modules-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 0315d47412a03ae81f08544a766f3be7
SHA-256: 0e00fe8c5eb8b91c5d69d2e6d1f2ec47aeb30c3cd190b3672de2c889beeb8f30
Size: 39.78 MB - kernel-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 1a2126ecd90391923b4829b450e3f6ea
SHA-256: ac71a990c003dbccf3d6ee7dcecead662b674e57c4bca6e9474433e1b2734421
Size: 30.98 MB - kernel-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 55e649f842675c98d7aa81413094efb5
SHA-256: ef12365144b6c3af3216e8b1e16470b27611fd4f8867bb8f66005e42a7dd1a95
Size: 1.55 MB - kernel-rt-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: b9623899917053548dc3e18475851af8
SHA-256: 0fadea287cc5d1914a016015a9a066112463410d6c5a6c82825407f4e8d9fb6b
Size: 1.12 MB - kernel-rt-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: b8b7656b186442efc90c9ffa985bbacf
SHA-256: fb0ba56a38d1c050795cf7b34bb7355c4124bcbc0eb73feb6b32470e6f39eb5e
Size: 17.31 MB - kernel-rt-debug-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 43c27ddda90c373df832e3f1e1391c46
SHA-256: f783e10b1f8fdc7eb5fded1a1d3c4043af536023e4d60bb1c85254b66ba406f9
Size: 1.12 MB - kernel-rt-debug-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: d7170f5c22e88de6111b096b1a89702d
SHA-256: a335e327b22df577dc776958aa7326f17d423c0b8f1daa5b23474b72ff8f4ec8
Size: 18.74 MB - kernel-rt-debug-devel-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: cfb622e29219cea5e87b2b62ae05164d
SHA-256: 2873db5f0d1224d8f7ff0fb3123ee1de1157795e0316b483471981493bb673ff
Size: 21.25 MB - kernel-rt-debug-modules-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 318a5ef1a0be37045ee788d2af2ef486
SHA-256: 5829e01dd199a664e9c772edfa8e5cd9e3ae986b81940e607a8d41f64c7aeaee
Size: 41.34 MB - kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 249c22078481cc49c1b2bc2dcc0a508a
SHA-256: 92421630643f0a5ebf14aa44408f203201c05a1ddd528455845ac2f73717bc69
Size: 32.15 MB - kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 6f4565d9fca54c1979463d08f673982e
SHA-256: 8112ee16d04f3db150155a57ff4f7e1c9cef56836715596287cf93327e595fde
Size: 1.58 MB - kernel-rt-devel-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 57b750d2389d032bab7b11614eec561e
SHA-256: 72a5ae498b53c1179804a70f11c85e00c212237287b554de1aa573d5ea1e8093
Size: 21.12 MB - kernel-rt-modules-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 1f58e3fa101e860cbf6c617440cc1129
SHA-256: e6407ad3cf58b59f7e36e70fc74fd65f81de6c8ae217906db79f121f0eab43aa
Size: 39.83 MB - kernel-rt-modules-core-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: d9153dbd00a444e534afe6d3c81dbc60
SHA-256: efe522b00b768b09b4084c82a15c922e304e8c903c77fbdc04510f957f31e085
Size: 31.06 MB - kernel-rt-modules-extra-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 066ee9cbb1907de03de8d176eb50da68
SHA-256: a3abcac900f69110093a90867694af53fecdb7ab60fa9ec60122613fea15edf1
Size: 1.56 MB - kernel-tools-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 5e3330d703609b849dbbc07aa44e5977
SHA-256: bd348352decdd4a7976b620728e63a2c688aec4e240815678d1a3a337f02c478
Size: 1.41 MB - kernel-tools-libs-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 26fd48b10065cd33acd9602ac0f37c5f
SHA-256: ed0f333269c2a2cd0ac226349b5048dd22b7741be56a7f68466d12a32a907670
Size: 1.13 MB - kernel-tools-libs-devel-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: f864f144d2bca383a1f985ea4870aa8d
SHA-256: cce7dad4734d6ea24bc49bf728952a106ced5760e48fd91c0708002a6e263803
Size: 1.12 MB - kernel-uki-virt-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: d2a3ff252c2e60083508dd03bebebf7b
SHA-256: b17dd61074c8eccd55e60f75c1c3bbd9f59dbeda7a42e77df3c031417ae52bda
Size: 63.99 MB - kernel-uki-virt-addons-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 01adff2d232a64371ae84db737de54c9
SHA-256: 42319c66dc1f80147a9dcc2b8fe3d8c8fbf95a2db3d96185143b60d2ba78f8f9
Size: 1.14 MB - libperf-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 0ba3dc1b738bdcf1825fdbd940f63290
SHA-256: ea922c6af855d98d22862caaf6c551f203a8a03280b3af10145959ff2654d13b
Size: 1.14 MB - perf-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 3fb50b0dce63ac4dc20b0d6342ca52c5
SHA-256: 1d6b77caeb0201419dad25d887bdb140e78d55d494198b56d41db8a4793cd04e
Size: 3.37 MB - python3-perf-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: d73ce6c94101e453c5e5ac3387e37dff
SHA-256: 7aa714b05584eba04221a122609abfd93a8e5848989f753c5cef8a6976d4287b
Size: 2.54 MB - rtla-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 3b7996028277321f7f1e11a8e2ff501b
SHA-256: 170f3b9fcda7f6ceec07edd8f661065066cc359f89bf0abed4531bd70e440b92
Size: 1.18 MB - rv-5.14.0-611.45.1.el9_7.x86_64.rpm
MD5: 71bc44f38da908658887e61a35a09802
SHA-256: 891383daee57dba545ff1dd084765f5891f47bde8620cb838f258806c82f11b9
Size: 1.13 MB