kernel-5.14.0-611.54.1.el9_7
エラータID: AXSA:2026-615:34
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: Linux kernel: Denial of Service in libceph OSD client due to unreset sparse-read state (CVE-2026-23136)
* kernel: Linux kernel: Use-after-free in traffic control (act_ct) may lead to denial of service or privilege escalation (CVE-2026-23270)
* kernel: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache (CVE-2026-31402)
* kernel: crypto: algif_aead - Revert to operating out-of-place (CVE-2026-31431)
* kernel: rxrpc: linearize incoming DATA packet when it has paged frags (CVE-2026-43500)
* kernel: xfrm: esp: avoid in-place decrypt on shared skb frags (CVE-2026-43284)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-23136
In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read state in osd_fault() When a fault occurs, the connection is abandoned, reestablished, and any pending operations are retried. The OSD client tracks the progress of a sparse-read reply using a separate state machine, largely independent of the messenger's state. If a connection is lost mid-payload or the sparse-read state machine returns an error, the sparse-read state is not reset. The OSD client will then interpret the beginning of a new reply as the continuation of the old one. If this makes the sparse-read machinery enter a failure state, it may never recover, producing loops like: libceph: [0] got 0 extents libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read Therefore, reset the sparse-read state in osd_fault(), ensuring retries start from a clean state.
CVE-2026-23270
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks As Paolo said earlier [1]: "Since the blamed commit below, classify can return TC_ACT_CONSUMED while the current skb being held by the defragmentation engine. As reported by GangMin Kim, if such packet is that may cause a UaF when the defrag engine later on tries to tuch again such packet." act_ct was never meant to be used in the egress path, however some users are attaching it to egress today [2]. Attempting to reach a middle ground, we noticed that, while most qdiscs are not handling TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we address the issue by only allowing act_ct to bind to clsact/ingress qdiscs and shared blocks. That way it's still possible to attach act_ct to egress (albeit only with clsact). [1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.... [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn....
CVE-2026-31402
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request.
CVE-2026-31431
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
CVE-2026-43500
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-owned paged fragments (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via __ip_append_data, or a chained skb_has_frag_list()) falls through to the in-place decryption path, which binds the frag pages directly into the AEAD/skcipher SGL via skb_to_sgvec(). Extend the gate to also unshare when skb_has_frag_list() or skb_has_shared_frag() is true. This catches the splice-loopback vector and other externally-shared frag sources while preserving the zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC page_pool RX, GRO). The OOM/trace handling already in place is reused.
CVE-2026-43284
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().
Update packages.
In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read state in osd_fault() When a fault occurs, the connection is abandoned, reestablished, and any pending operations are retried. The OSD client tracks the progress of a sparse-read reply using a separate state machine, largely independent of the messenger's state. If a connection is lost mid-payload or the sparse-read state machine returns an error, the sparse-read state is not reset. The OSD client will then interpret the beginning of a new reply as the continuation of the old one. If this makes the sparse-read machinery enter a failure state, it may never recover, producing loops like: libceph: [0] got 0 extents libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read libceph: data len 142248331 != extent len 0 libceph: osd0 (1)...:6801 socket error on read Therefore, reset the sparse-read state in osd_fault(), ensuring retries start from a clean state.
In the Linux kernel, the following vulnerability has been resolved: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks As Paolo said earlier [1]: "Since the blamed commit below, classify can return TC_ACT_CONSUMED while the current skb being held by the defragmentation engine. As reported by GangMin Kim, if such packet is that may cause a UaF when the defrag engine later on tries to tuch again such packet." act_ct was never meant to be used in the egress path, however some users are attaching it to egress today [2]. Attempting to reach a middle ground, we noticed that, while most qdiscs are not handling TC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we address the issue by only allowing act_ct to bind to clsact/ingress qdiscs and shared blocks. That way it's still possible to attach act_ct to egress (albeit only with clsact). [1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/ [2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/
In the Linux kernel, the following vulnerability has been resolved: nfsd: fix heap overflow in NFSv4.0 LOCK replay cache The NFSv4.0 replay cache uses a fixed 112-byte inline buffer (rp_ibuf[NFSD4_REPLAY_ISIZE]) to store encoded operation responses. This size was calculated based on OPEN responses and does not account for LOCK denied responses, which include the conflicting lock owner as a variable-length field up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a LOCK operation is denied due to a conflict with an existing lock that has a large owner, nfsd4_encode_operation() copies the full encoded response into the undersized replay buffer via read_bytes_from_xdr_buf() with no bounds check. This results in a slab-out-of-bounds write of up to 944 bytes past the end of the buffer, corrupting adjacent heap memory. This can be triggered remotely by an unauthenticated attacker with two cooperating NFSv4.0 clients: one sets a lock with a large owner string, then the other requests a conflicting lock to provoke the denial. We could fix this by increasing NFSD4_REPLAY_ISIZE to allow for a full opaque, but that would increase the size of every stateowner, when most lockowners are not that large. Instead, fix this by checking the encoded response length against NFSD4_REPLAY_ISIZE before copying into the replay buffer. If the response is too large, set rp_buflen to 0 to skip caching the replay payload. The status is still cached, and the client already received the correct response on the original request.
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-owned paged fragments (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via __ip_append_data, or a chained skb_has_frag_list()) falls through to the in-place decryption path, which binds the frag pages directly into the AEAD/skcipher SGL via skb_to_sgvec(). Extend the gate to also unshare when skb_has_frag_list() or skb_has_shared_frag() is true. This catches the splice-loopback vector and other externally-shared frag sources while preserving the zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC page_pool RX, GRO). The OOM/trace handling already in place is reused.
In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().
N/A
SRPMS
- kernel-5.14.0-611.54.1.el9_7.src.rpm
MD5: b45789d45f2ecfd7542c9c5539f657ee
SHA-256: 18a0b5d92960d3de642c1910a303a92e60202c420b0f381d2cf95d69369bb5c7
Size: 144.06 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: f27e46f914d47a36c3429a1f284f5e19
SHA-256: 03261b3b50719f24d4391a0e9984e921d77253da233a4b2f8f0aecbe60e8c0b5
Size: 1.12 MB - kernel-abi-stablelists-5.14.0-611.54.1.el9_7.noarch.rpm
MD5: e72e1d3674ecf7e171df1ded334c0657
SHA-256: 072bef58e7ba1156f4992af59b6c596719c9e430d94bd981295c69a1b1099d8c
Size: 1.14 MB - kernel-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: b2a6e0c11572f5cef4484be15a136448
SHA-256: a78e8217ddbcd336285cc8c1b92beb3ddfd75f8f4acf2e6676c519f075a1e751
Size: 17.40 MB - kernel-cross-headers-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 4ff2422cfe4aac471498620e63377cf7
SHA-256: 565b896f203dd825c39a95f8cbe0ae88d9686eac2a69c54415ecfb61a4843a00
Size: 8.06 MB - kernel-debug-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 0c7a8c5cb732149d179fb4d2f67ba0e8
SHA-256: db6b88a7b1ca1a5cab59ef37b3c05242c17310b25b6dc76f871712bc353f4135
Size: 1.12 MB - kernel-debug-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: b403516b9aa085a83249d5926d2c72fa
SHA-256: 002c732b1c1991139d68f2a7cb866bfb98e7d43e65a92f5423e6c63c530f06db
Size: 30.99 MB - kernel-debug-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: a76ae06c9ea9c10ea4eee16a371bdf08
SHA-256: 0921b50f59a30ca2df83dcb1621a28a7581d6cb356767d4214ccc6bff9f3f011
Size: 21.31 MB - kernel-debug-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: f53c7e62ad05a9dad1834c9fb97f867e
SHA-256: 50c3f1678eca7f612392e954f0a1ee2d86f32c48a96bd2660db1e4da2c712233
Size: 1.12 MB - kernel-debug-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: ef215e09c753c65bcc89857974092409
SHA-256: 9d09fc4023ad4895c8c2c9a9525a62acbe3a8b114ec6175dc6f3fd69d4493bd9
Size: 69.37 MB - kernel-debug-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 504ba82c07879607c956978e146aeda0
SHA-256: 5261e92989638afa1efb12461f995dad52f3b31e6068ed87c1670690ea278463
Size: 49.55 MB - kernel-debug-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 6fc1f51b42201dc8fdd8348be5a79580
SHA-256: 9ab5651d12a81431a2014b49ad2ff66d96d5b82e58871f021ad65a7d660dc287
Size: 1.92 MB - kernel-debug-uki-virt-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 407267671f4919a0399c125a912894f8
SHA-256: 87c958ffd171cbadca6820dd11bce968c987f3f5611270a01b6f7af0980950e3
Size: 85.85 MB - kernel-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: ad125edbe1605d7253aa204be0a72131
SHA-256: 2189f7461207334334ff13bec763e7babbae6c29d43416e8ac51caa2c5e92afb
Size: 21.14 MB - kernel-devel-matched-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 6f7595a2c2cf58afb162dd8b707452b8
SHA-256: 0cdc4300e1b066c2ae6bf901790b642ab66078ca8ae43920dbf9c59ccdd79057
Size: 1.12 MB - kernel-doc-5.14.0-611.54.1.el9_7.noarch.rpm
MD5: d6ed6b6653f81a6bf1d0c65039d7a6b1
SHA-256: 5156e87be3ea95d502080e909f68bf607dfba24ee4a607cce0f81f839dac5b32
Size: 38.87 MB - kernel-headers-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 6c90b16c83fba7e5da6ce0e685ef7628
SHA-256: 8ba82c71ac680256747b5ba770564abb3d9a6bdaedb4936c2c8d61c952593fc5
Size: 2.88 MB - kernel-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 9536674bbf30154e021cbb09f2668c6b
SHA-256: 87f0d15062d02d1bffe933f495a9a027037c7fd919be4166e71496d4548cbee3
Size: 39.78 MB - kernel-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 389d015ac335a66d46cee4095d7cae2e
SHA-256: 4b3f7760428f3b4e2e5a7836828dbe7583f88e75f5ffa547841aa70a645ed6ca
Size: 30.99 MB - kernel-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: ab89713d12129c6add4044590d1ee6d6
SHA-256: 66fe43c51efd341d0e2beaa7f74344340ba5e4b1b04e6f9925620d4d8652f541
Size: 1.56 MB - kernel-rt-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 8e21a455f44e2741bc69460c3f07f019
SHA-256: 64e13be1ede4970c2b16fe9b2c44f20fc0b3ba1566e982814e1e84891c1b1494
Size: 1.12 MB - kernel-rt-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 380dd7efce80a29417be5a8becba37ee
SHA-256: c6ed2290c3be4b328f622acc58ffbd4b59a911d86c9c530c9fff5e18890179ed
Size: 17.32 MB - kernel-rt-debug-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 8669084ecfbea8a08cd4c9738bb9daba
SHA-256: 777a9c2bedf683ee1ce1a024de9b59c2f84bc53197b02eb8f56f21e9a711d8f3
Size: 1.12 MB - kernel-rt-debug-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 938846434706dadb2026db3ebcecdbb7
SHA-256: c3a7ca11b6b5f893852316d1eb2f1377c1172110287d527001eb5115a17b840e
Size: 18.74 MB - kernel-rt-debug-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 45394d8b53f55eb99bdad085704eec61
SHA-256: 906a6a97218903d5db5fe9349e08e48ad3913c70d76289ae2472a9dad36c1383
Size: 21.26 MB - kernel-rt-debug-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 148fdf6b94b3cfe6eb506f307f58c427
SHA-256: 4610b3293410a3015fd0637085f552a9695a991e4e89d08ca35fb1d84904fa5f
Size: 41.34 MB - kernel-rt-debug-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: d63f41f7bc83044ae89d28cecf69a632
SHA-256: 2dbe165c7f52e9d682d0e0eec617e52e6b8947b775b07b35362f4574b244f0af
Size: 32.17 MB - kernel-rt-debug-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 1b2bd6804b385f04c5192d1f1dd60e13
SHA-256: 2eb6046c5be7001a489c35f1f053aad9a51661c18be5e77c4d0e95fcb00e3eb3
Size: 1.59 MB - kernel-rt-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 8c5b20a15ac4a65a12b21fc84c7d65cf
SHA-256: 7945730215b758ef8fc38adfe4fa61c45ceec2eb4eef4b464eb65005ea8ea548
Size: 21.13 MB - kernel-rt-modules-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 2b4aa6d598d10c8869d334978081ee74
SHA-256: a4d011108f72a446cc362924fc33f200b54d7eef0407de1afff0a1529f3e6943
Size: 39.83 MB - kernel-rt-modules-core-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: c173a8cd841506d8ca42a6340a373b94
SHA-256: 37e831a278afc78aee6c933fd4428f5392424f5a765c54fab6d3ed95978c1654
Size: 31.08 MB - kernel-rt-modules-extra-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 4e474b5a90c18e02f78133e8dddf3985
SHA-256: b7e611fd5e32160579806418132a14bb8b1292454a25f3f1aea45493205871dc
Size: 1.56 MB - kernel-tools-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: edd54e6fe59e9a8b2f18e875ba284102
SHA-256: 3650a8d53cc0d00f46520b6e566cd097c9a1725f6637a130a5c326bade9b2bca
Size: 1.41 MB - kernel-tools-libs-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 157e7b62839ed2173e7e327392f9c92a
SHA-256: 768a6446817f718b46767a26e3978b5f5e0d45523629a20434374fcd7ef01c61
Size: 1.13 MB - kernel-tools-libs-devel-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: d7645df1408e45b9b2e9687f43e24332
SHA-256: 35b2bae6fa9917a255210076783c16323d0e7091227bba29a30fa2867cbcc792
Size: 1.12 MB - kernel-uki-virt-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: a100d316d009db9efba272452dbfa1c4
SHA-256: 9fffce5b34ea0d2ddf9de16d2bbcb7b6e0e1a4d5e06342e30b309554d2f3934a
Size: 63.98 MB - kernel-uki-virt-addons-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 011c7f50ce4fbe78c010117aa86274d5
SHA-256: 949286e24a5d4a7cb01eda25ec0a514ce2f931ab88f1bfbcc37c99172a0ab3cb
Size: 1.14 MB - libperf-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 9fe1e8d0b126c0456132dc3cdfaf45ae
SHA-256: 09fc64638ce30b1b2007dcee6a1aa4ed4fb86dfae5452a9c055d694b0110bdca
Size: 1.14 MB - perf-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: 8fd46eefbb74843953393631ca45bf94
SHA-256: 2823007f55e2d94a63beec32a636d4c53ee46443b329fe2abfd5f7f2f00156af
Size: 3.37 MB - python3-perf-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: b414637065ff237691829c8b6965965c
SHA-256: a2c523b8fbe2cb28bf98716dd55cd15a23361b779ea63c696730cab9bffac78d
Size: 2.55 MB - rtla-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: c2240e1da12c418dd6d8b61ae0b03d3d
SHA-256: 9c60b7bb5fe78824a8801c9610c3b915aa8caaf5c41e0056fe373fb88e4a44a6
Size: 1.19 MB - rv-5.14.0-611.54.1.el9_7.x86_64.rpm
MD5: c95bd180aa1885e723a441469f5ba773
SHA-256: ac896d2da0f6b4b8cbe233316bf924243a5d9175850cbdd336af0d9eafab31fa
Size: 1.14 MB