kernel-5.14.0-427.28.1.el9_4
エラータID: AXSA:2024-8642:23
以下項目について対処しました。
[Security Fix]
- net/can/j1939/main.c の j1939_netdev_start() 関数には、
メモリの解放後利用の問題があるため、ローカルの攻撃者
により、巧妙なデバイス操作を介して、サービス拒否攻撃
を可能とする脆弱性が存在します。(CVE-2021-47459)
- drivers/net/ethernet/amd/xgbe/xgbe-drv.c の xgbe_rx_poll()
関数には、ソケットバッファサイズのアンダーフローが発生
した際、意図しない警告メッセージが出力されてしまう問題
があるため、ローカルの攻撃者により、サービス拒否攻撃を
可能とする脆弱性が存在します。(CVE-2022-48743)
- ブロックサブシステムには、パーティションの追加や
リサイズをする前の処理にチェックが足りない問題がある
ため、ローカルの特権を持った攻撃者により、サービス拒否
攻撃を可能とする脆弱性があります。(CVE-2023-52458)
- drivers/scsi/libfc/fc_lport.c の fc_lport_ptp_setup() 関数には、
潜在的にNULLポインタデリファレンスを起こす問題がある
ため、ローカルの攻撃者により、巧妙に細工されたデバイス
を介して、サービス拒否攻撃を可能とする脆弱性が存在
します。(CVE-2023-52809)
- BPF 機能には、bpf_timer_cancel_and_free() 関数と
bpf_timer_cancel() 関数間のレースコンディションに起因
するメモリ領域の解放後利用の問題があるため、ローカル
の攻撃者により、サービス拒否攻撃を可能とする脆弱性が
存在します。(CVE-2024-26737)
- fs/ext4/mballoc.c の ext4_mb_try_best_found() 関数には、
ブロックの割り当て前にグループのブロックビットマップ
の破損状況のチェック処理の欠落に起因して、破損した
ブロックビットマップを持つグループからブロックを割り
当ててしまう問題があるため、ローカルの攻撃者により、
データ破壊を可能とする脆弱性が存在します。
(CVE-2024-26773)
- net/ipv6/route.c の ip6_route_mpath_notify() 関数には、
fib6_info_release() 関数の呼び出しタイミングの不備に起因
したメモリ領域の解放後利用の問題があるため、ローカル
の攻撃者により、情報の漏洩、およびサービス拒否攻撃
などを可能とする脆弱性が存在します。(CVE-2024-26852)
- drivers/md/dm.c には、処理中断時と再開時の処理間に
不整合があるため、ローカルの攻撃者により、サービス
拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-26880)
- fs/squashfs/inode.c の squashfs_new_inode() 関数には、
inode 番号のチェック処理漏れに起因したメモリ領域の
範囲外アクセスの問題があるため、ローカルの攻撃者に
より、サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-26982)
- octeontx2 ネットワークデバイスドライバーの
drivers/net/ethernet/marvell/octeontx2/af/rvu.c には、同一
の割り込みハンドラーが複数の割り込みベクタに登録して
しまうことに起因したレースコンディションの問題がある
ため、ローカルの攻撃者により、データ破壊を可能とする
脆弱性が存在します。(CVE-2024-27030)
- drivers/net/ethernet/netronome/nfp/flower/lag_conf.c の
nfp_fl_lag_do_work() 関数には、NULL ポインタ
デリファレンスの問題があるため、ローカルの攻撃者に
より、サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-27046)
- net/ipv4/icmp.c の icmp_build_probe() 関数には、NULL
ポインタデリファレンスの問題があるため、ローカルの
攻撃者により、サービス拒否攻撃を可能とする脆弱性が
存在します。(CVE-2024-35857)
- drivers/net/ethernet/mellanox/mlxbf_gige/mlxbf_gige_main.c
の mlxbf_gige_shutdown() 関数には、NULL ポインタ
デリファレンスの問題があるため、ローカルの攻撃者により、
システムのシャットダウン処理の実行を介して、サービス
拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-35885)
- drivers/net/ethernet/mellanox/mlxbf_gige/mlxbf_gige_main.c
の mlxbf_gige_open() 関数には、kdump 機能が有効に
なっている場合における NULL ポインタデリファレンスの
問題があるため、ローカルの攻撃者により、サービス拒否
攻撃を可能とする脆弱性が存在します。(CVE-2024-35907)
- drivers/scsi/lpfc/lpfc.h の lpfc_worker_wake_up() 関数には、
潜在的にデッドロックを起こす問題があるため、ローカル
の攻撃者により、サービス妨害を可能とする脆弱性が存在
します。(CVE-2024-36924)
- drivers/scsi/lpfc/lpfc_vport.c の lpfc_vport_delete() 関数には、
Remove All DA_ID CT および LOGO ELS がファブリックに
送信される前に vport の登録が解除された場合、ファブリック
スイッチが削除した NPIV をまだログイン中であると誤認して
しまう問題があるため、ローカルの攻撃者により、サービス
拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-36952)
- fs/eventpoll.c には、ファイルポインターの取り扱いに問題
があるため、ローカルの攻撃者により、epoll() 関数の利用を
介して、サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-38580)
パッケージをアップデートしてください。
In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv It will trigger UAF for rx_kref of j1939_priv as following. cpu0 cpu1 j1939_sk_bind(socket0, ndev0, ...) j1939_netdev_start j1939_sk_bind(socket1, ndev0, ...) j1939_netdev_start j1939_priv_set j1939_priv_get_by_ndev_locked j1939_jsk_add ..... j1939_netdev_stop kref_put_lock(&priv->rx_kref, ...) kref_get(&priv->rx_kref, ...) REFCOUNT_WARN("addition on 0;...") ==================================================== refcount_t: addition on 0; use-after-free. WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 RIP: 0010:refcount_warn_saturate+0x169/0x1e0 Call Trace: j1939_netdev_start+0x68b/0x920 j1939_sk_bind+0x426/0xeb0 ? security_socket_bind+0x83/0xb0 The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to protect.
In the Linux kernel, the following vulnerability has been resolved: net: amd-xgbe: Fix skb data length underflow There will be BUG_ON() triggered in include/linux/skbuff.h leading to intermittent kernel panic, when the skb length underflow is detected. Fix this by dropping the packet if such length underflows are seen because of inconsistencies in the hardware descriptors.
In the Linux kernel, the following vulnerability has been resolved: block: add check that partition length needs to be aligned with block size Before calling add partition or resize partition, there is no check on whether the length is aligned with the logical block size. If the logical block size of the disk is larger than 512 bytes, then the partition size maybe not the multiple of the logical block size, and when the last sector is read, bio_truncate() will adjust the bio size, resulting in an IO error if the size of the read command is smaller than the logical block size.If integrity data is supported, this will also result in a null pointer dereference when calling bio_integrity_free.
In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() fc_lport_ptp_setup() did not check the return value of fc_rport_create() which can return NULL and would cause a NULL pointer dereference. Address this issue by checking return value of fc_rport_create() and log error message on fc_rport_create() failed.
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel The following race is possible between bpf_timer_cancel_and_free and bpf_timer_cancel. It will lead a UAF on the timer->timer. bpf_timer_cancel(); spin_lock(); t = timer->time; spin_unlock(); bpf_timer_cancel_and_free(); spin_lock(); t = timer->timer; timer->timer = NULL; spin_unlock(); hrtimer_cancel(&t->timer); kfree(t); /* UAF on t */ hrtimer_cancel(&t->timer); In bpf_timer_cancel_and_free, this patch frees the timer->timer after a rcu grace period. This requires a rcu_head addition to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init, this does not need a kfree_rcu because it is still under the spin_lock and timer->timer has not been visible by others yet. In bpf_timer_cancel, rcu_read_lock() is added because this helper can be used in a non rcu critical section context (e.g. from a sleepable bpf prog). Other timer->timer usages in helpers.c have been audited, bpf_timer_cancel() is the only place where timer->timer is used outside of the spin_lock. Another solution considered is to mark a t->flag in bpf_timer_cancel and clear it after hrtimer_cancel() is done. In bpf_timer_cancel_and_free, it busy waits for the flag to be cleared before kfree(t). This patch goes with a straight forward solution and frees timer->timer after a rcu grace period.
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to avoid allocating blocks from a group with a corrupted block bitmap in the following concurrency and making the situation worse. ext4_mb_regular_allocator ext4_lock_group(sb, group) ext4_mb_good_group // check if the group bbitmap is corrupted ext4_mb_complex_scan_group // Scan group gets ac_b_ex but doesn't use it ext4_unlock_group(sb, group) ext4_mark_group_bitmap_corrupted(group) // The block bitmap was corrupted during // the group unlock gap. ext4_mb_try_best_found ext4_lock_group(ac->ac_sb, group) ext4_mb_use_best_found mb_mark_used // Allocating blocks in block bitmap corrupted group
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") was not able to fix the root cause. We need to defer the fib6_info_release() calls after ip6_route_mpath_notify(), in the cleanup phase. [1] BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0 Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037 CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend There is this reported crash when experimenting with the lvm2 testsuite. The list corruption is caused by the fact that the postsuspend and resume methods were not paired correctly; there were two consecutive calls to the origin_postsuspend function. The second call attempts to remove the "hash_list" entry from a list, while it was already removed by the first call. Fix __dm_internal_resume so that it calls the preresume and resume methods of the table's targets. If a preresume method of some target fails, we are in a tricky situation. We can't return an error because dm_internal_resume isn't supposed to return errors. We can't return success, because then the "resume" and "postsuspend" methods would not be paired correctly. So, we set the DMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace tools, but it won't cause a kernel crash. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:56! invalid opcode: 0000 [#1] PREEMPT SMP CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014 RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero Syskiller has produced an out of bounds access in fill_meta_index(). That out of bounds access is ultimately caused because the inode has an inode number with the invalid value of zero, which was not checked. The reason this causes the out of bounds access is due to following sequence of events: 1. Fill_meta_index() is called to allocate (via empty_meta_index()) and fill a metadata index. It however suffers a data read error and aborts, invalidating the newly returned empty metadata index. It does this by setting the inode number of the index to zero, which means unused (zero is not a valid inode number). 2. When fill_meta_index() is subsequently called again on another read operation, locate_meta_index() returns the previous index because it matches the inode number of 0. Because this index has been returned it is expected to have been filled, and because it hasn't been, an out of bounds access is performed. This patch adds a sanity check which checks that the inode number is not zero when the inode is created and returns -EINVAL if it is. [phillip@squashfs.org.uk: whitespace fix] Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk
In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Use separate handlers for interrupts For PF to AF interrupt vector and VF to AF vector same interrupt handler is registered which is causing race condition. When two interrupts are raised to two CPUs at same time then two cores serve same event corrupting the data.
In the Linux kernel, the following vulnerability has been resolved: nfp: flower: handle acti_netdevs allocation failure The kmalloc_array() in nfp_fl_lag_do_work() will return null, if the physical memory has run out. As a result, if we dereference the acti_netdevs, the null pointer dereference bugs will happen. This patch adds a check to judge whether allocation failure occurs. If it happens, the delayed work will be rescheduled and try again.
In the Linux kernel, the following vulnerability has been resolved: icmp: prevent possible NULL dereferences from icmp_build_probe() First problem is a double call to __in_dev_get_rcu(), because the second one could return NULL. if (__in_dev_get_rcu(dev) && __in_dev_get_rcu(dev)->ifa_list) Second problem is a read from dev->ip6_ptr with no NULL check: if (!list_empty(&rcu_dereference(dev->ip6_ptr)->addr_list)) Use the correct RCU API to fix these. v2: add missing include
In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: stop interface during shutdown The mlxbf_gige driver intermittantly encounters a NULL pointer exception while the system is shutting down via "reboot" command. The mlxbf_driver will experience an exception right after executing its shutdown() method. One example of this exception is: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000004 CM = 0, WnR = 0 user pgtable: 4k pages, 48-bit VAs, pgdp=000000011d373000 [0000000000000070] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 96000004 [#1] SMP CPU: 0 PID: 13 Comm: ksoftirqd/0 Tainted: G S OE 5.15.0-bf.6.gef6992a #1 Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS 4.0.2.12669 Apr 21 2023 pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige] lr : mlxbf_gige_poll+0x54/0x160 [mlxbf_gige] sp : ffff8000080d3c10 x29: ffff8000080d3c10 x28: ffffcce72cbb7000 x27: ffff8000080d3d58 x26: ffff0000814e7340 x25: ffff331cd1a05000 x24: ffffcce72c4ea008 x23: ffff0000814e4b40 x22: ffff0000814e4d10 x21: ffff0000814e4128 x20: 0000000000000000 x19: ffff0000814e4a80 x18: ffffffffffffffff x17: 000000000000001c x16: ffffcce72b4553f4 x15: ffff80008805b8a7 x14: 0000000000000000 x13: 0000000000000030 x12: 0101010101010101 x11: 7f7f7f7f7f7f7f7f x10: c2ac898b17576267 x9 : ffffcce720fa5404 x8 : ffff000080812138 x7 : 0000000000002e9a x6 : 0000000000000080 x5 : ffff00008de3b000 x4 : 0000000000000000 x3 : 0000000000000001 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000 Call trace: mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige] mlxbf_gige_poll+0x54/0x160 [mlxbf_gige] __napi_poll+0x40/0x1c8 net_rx_action+0x314/0x3a0 __do_softirq+0x128/0x334 run_ksoftirqd+0x54/0x6c smpboot_thread_fn+0x14c/0x190 kthread+0x10c/0x110 ret_from_fork+0x10/0x20 Code: 8b070000 f9000ea0 f95056c0 f86178a1 (b9407002) ---[ end trace 7cc3941aa0d8e6a4 ]--- Kernel panic - not syncing: Oops: Fatal exception in interrupt Kernel Offset: 0x4ce722520000 from 0xffff800008000000 PHYS_OFFSET: 0x80000000 CPU features: 0x000005c1,a3330e5a Memory Limit: none ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]--- During system shutdown, the mlxbf_gige driver's shutdown() is always executed. However, the driver's stop() method will only execute if networking interface configuration logic within the Linux distribution has been setup to do so. If shutdown() executes but stop() does not execute, NAPI remains enabled and this can lead to an exception if NAPI is scheduled while the hardware interface has only been partially deinitialized. The networking interface managed by the mlxbf_gige driver must be properly stopped during system shutdown so that IFF_UP is cleared, the hardware interface is put into a clean state, and NAPI is fully deinitialized.
In the Linux kernel, the following vulnerability has been resolved: mlxbf_gige: call request_irq() after NAPI initialized The mlxbf_gige driver encounters a NULL pointer exception in mlxbf_gige_open() when kdump is enabled. The sequence to reproduce the exception is as follows: a) enable kdump b) trigger kdump via "echo c > /proc/sysrq-trigger" c) kdump kernel executes d) kdump kernel loads mlxbf_gige module e) the mlxbf_gige module runs its open() as the the "oob_net0" interface is brought up f) mlxbf_gige module will experience an exception during its open(), something like: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Mem abort info: ESR = 0x0000000086000004 EC = 0x21: IABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault user pgtable: 4k pages, 48-bit VAs, pgdp=00000000e29a4000 [0000000000000000] pgd=0000000000000000, p4d=0000000000000000 Internal error: Oops: 0000000086000004 [#1] SMP CPU: 0 PID: 812 Comm: NetworkManager Tainted: G OE 5.15.0-1035-bluefield #37-Ubuntu Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.6.0.13024 Jan 19 2024 pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0x0 lr : __napi_poll+0x40/0x230 sp : ffff800008003e00 x29: ffff800008003e00 x28: 0000000000000000 x27: 00000000ffffffff x26: ffff000066027238 x25: ffff00007cedec00 x24: ffff800008003ec8 x23: 000000000000012c x22: ffff800008003eb7 x21: 0000000000000000 x20: 0000000000000001 x19: ffff000066027238 x18: 0000000000000000 x17: ffff578fcb450000 x16: ffffa870b083c7c0 x15: 0000aaab010441d0 x14: 0000000000000001 x13: 00726f7272655f65 x12: 6769675f6662786c x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa870b0842398 x8 : 0000000000000004 x7 : fe5a48b9069706ea x6 : 17fdb11fc84ae0d2 x5 : d94a82549d594f35 x4 : 0000000000000000 x3 : 0000000000400100 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000066027238 Call trace: 0x0 net_rx_action+0x178/0x360 __do_softirq+0x15c/0x428 __irq_exit_rcu+0xac/0xec irq_exit+0x18/0x2c handle_domain_irq+0x6c/0xa0 gic_handle_irq+0xec/0x1b0 call_on_irq_stack+0x20/0x2c do_interrupt_handler+0x5c/0x70 el1_interrupt+0x30/0x50 el1h_64_irq_handler+0x18/0x2c el1h_64_irq+0x7c/0x80 __setup_irq+0x4c0/0x950 request_threaded_irq+0xf4/0x1bc mlxbf_gige_request_irqs+0x68/0x110 [mlxbf_gige] mlxbf_gige_open+0x5c/0x170 [mlxbf_gige] __dev_open+0x100/0x220 __dev_change_flags+0x16c/0x1f0 dev_change_flags+0x2c/0x70 do_setlink+0x220/0xa40 __rtnl_newlink+0x56c/0x8a0 rtnl_newlink+0x58/0x84 rtnetlink_rcv_msg+0x138/0x3c4 netlink_rcv_skb+0x64/0x130 rtnetlink_rcv+0x20/0x30 netlink_unicast+0x2ec/0x360 netlink_sendmsg+0x278/0x490 __sock_sendmsg+0x5c/0x6c ____sys_sendmsg+0x290/0x2d4 ___sys_sendmsg+0x84/0xd0 __sys_sendmsg+0x70/0xd0 __arm64_sys_sendmsg+0x2c/0x40 invoke_syscall+0x78/0x100 el0_svc_common.constprop.0+0x54/0x184 do_el0_svc+0x30/0xac el0_svc+0x48/0x160 el0t_64_sync_handler+0xa4/0x12c el0t_64_sync+0x1a4/0x1a8 Code: bad PC value ---[ end trace 7d1c3f3bf9d81885 ]--- Kernel panic - not syncing: Oops: Fatal exception in interrupt Kernel Offset: 0x2870a7a00000 from 0xffff800008000000 PHYS_OFFSET: 0x80000000 CPU features: 0x0,000005c1,a3332a5a Memory Limit: none ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]--- The exception happens because there is a pending RX interrupt before the call to request_irq(RX IRQ) executes. Then, the RX IRQ handler fires immediately after this request_irq() completes. The ---truncated---
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() lpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the hbalock. Thus, lpfc_worker_wake_up() should not be called while holding the hbalock to avoid potential deadlock.
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up There are cases after NPIV deletion where the fabric switch still believes the NPIV is logged into the fabric. This occurs when a vport is unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the fabric. Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including the fabric D_ID, removes the last ndlp reference and frees the ndlp rport object. This sometimes causes the race condition where the final DA_ID and LOGO are skipped from being sent to the fabric switch. Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID and LOGO are sent.
In the Linux kernel, the following vulnerability has been resolved: epoll: be better about file lifetimes epoll can call out to vfs_poll() with a file pointer that may race with the last 'fput()'. That would make f_count go down to zero, and while the ep->mtx locking means that the resulting file pointer tear-down will be blocked until the poll returns, it means that f_count is already dead, and any use of it won't actually get a reference to the file any more: it's dead regardless. Make sure we have a valid ref on the file pointer before we call down to vfs_poll() from the epoll routines.
N/A
SRPMS
- kernel-5.14.0-427.28.1.el9_4.src.rpm
MD5: 308956ae8934b749a288714224625718
SHA-256: 6baa6ed1bb424d3052fe7543f8b053ae660d13beb7e6d7fe73f8f1ff4a8d77e6
Size: 138.40 MB
Asianux Server 9 for x86_64
- bpftool-7.3.0-427.28.1.el9_4.x86_64.rpm
MD5: 19fdb554a2edd8256453af8df3aaa633
SHA-256: 4ad283243f5803e7f0d7e5b9ef661185fc0c6818496c214672631b574dc92694
Size: 5.72 MB - kernel-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 0d18ceb9e18722fdeb99674f9dada31d
SHA-256: b6dc791bd280b503d055337afa645f6138c5cd9eb6b90f3a68990ef145940204
Size: 4.96 MB - kernel-abi-stablelists-5.14.0-427.28.1.el9_4.noarch.rpm
MD5: a7afb848e5ab3063f24255d738965531
SHA-256: 9217e952bfe5c3c5028de360973456f639ac6340725d65cf54878179eb663a28
Size: 4.97 MB - kernel-core-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 05c0ec06ba5c09d944934b93b6305a40
SHA-256: 904857ee0317a5ba3af28994b535b0621a3316f462503c834875e1b663add3eb
Size: 19.82 MB - kernel-cross-headers-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 7c5c353be1d1b8e9a6a9413af234977e
SHA-256: 667935e10c5e2c89f819857421d43b5eee38f3ea1b3a4933eef5fd9a34a2010a
Size: 11.56 MB - kernel-debug-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 685ee8769e7ccf366f79d1ac2d47be66
SHA-256: c79957a5863a21ee694f518516d5cdbbfc19afd71d1170b4218219d590c609d6
Size: 4.96 MB - kernel-debug-core-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 9ae34c85028c2c2fa0393b5c883ddfbc
SHA-256: ad3ed2f5938d03aa7f182cb8e637fe2d08acb70c6f9d21412f4f7557618361be
Size: 32.49 MB - kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 9f6bfd4f44d041ee89f8a7f40753660e
SHA-256: c8a4b5059f2306d3c15454d1c5129b161e181845c7a4180f126ed456d954bee8
Size: 24.42 MB - kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 9eddd604eb3f38b2d351b5d6ff9b3f9c
SHA-256: 780f79d8b726da522f4c11b96ea733a1cb4e327e5b3bd69f92058a26bf256d65
Size: 4.96 MB - kernel-debug-modules-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: e9a6bba565089a524838f8e9d8ce335f
SHA-256: 0d4700517a4a53548572b9dbc6ce21c622dbc9545fee53f3f1750d5a0a8275ec
Size: 63.91 MB - kernel-debug-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 539aefc8fba7dd36eaf38c0453a0b0df
SHA-256: 203f32921bb2c9e9485d1c873db00f6e9f14d37e0fe5286cb00898269940f48a
Size: 50.10 MB - kernel-debug-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 92b886723b08c80ae76d0f76edca24a9
SHA-256: 7712a905ed1be8fa84ed6205a3c6f0357617e0715978b56bbbf84dd449ab6a1f
Size: 5.79 MB - kernel-debug-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 0180c819fee453a6ca5fc3570faca056
SHA-256: b0912504b5dd4f691b6a2a90fdd421fa1e4d746b528a9d29c783cc76e718ee7e
Size: 81.80 MB - kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: adade1cb74f05649846169efbcbaff07
SHA-256: c4791f1b5b658ccd2441d666f7ab042ff69a4a0ee1187dbc10b52eb396be5df9
Size: 24.25 MB - kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 02b66b0b4736e184baabc24800ddd02f
SHA-256: 34f9d39a4d41a0412029c05188cc06777f5ed0a28be21936552bce2f0f6e6934
Size: 4.96 MB - kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm
MD5: 19af487b59bc87caf551264dd3e4a94f
SHA-256: cb0531b67afdd8239a92d7c254d0a1f10bf6bb8f922af621443d7a1b4c1191af
Size: 38.40 MB - kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: e4bbe04015bcea50c3cf61a0baa4161c
SHA-256: c501c0197941d98c311116c85e2c1bbe7b5ca24c066154e2991cbdff976fa981
Size: 6.63 MB - kernel-modules-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 5254921663e717b6d45724ac811ff90c
SHA-256: f4bcff169b16a7774bc37f720debe3262c23c11c57a80ab3e13698a057a98caf
Size: 38.57 MB - kernel-modules-core-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 4de0d846016d41f900e4e19c171b0a4b
SHA-256: 45b205b88a1846d8c763cdcc0ee54bf3e2dff80ae2036349af5652863009ee13
Size: 32.77 MB - kernel-modules-extra-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: e30500c401bbbca50c8f13108281e7b0
SHA-256: 884156b46def7c89ce18c1a39ae6d5e6e5471908a812c3b5655904328f63ebdb
Size: 5.41 MB - kernel-tools-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 4a9ba945ded18a3b8890719314d3c133
SHA-256: f53451ecd3a41222c6e8ba26c7acad654ab5a705c4fbd53d71ea4db9294018c3
Size: 5.21 MB - kernel-tools-libs-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 346809f16df8831d6c26520907dce306
SHA-256: 2c8c5db0b18c7607b2faf93b37dad083feb85873f9555dc4b3a2e69072dd6f01
Size: 4.97 MB - kernel-tools-libs-devel-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 8053f1542978a52643ed3e57e92aabfe
SHA-256: bec2086e30716bda55b69bc7ab7e34772c05c868e6534b6cc52e024413571b5c
Size: 4.96 MB - kernel-uki-virt-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 0dce81cf561fb4841304f376ff66b961
SHA-256: 168474777e68f5dfa7409fde709f7c6c36a6a6f35933d8705285499bf39abe2d
Size: 61.69 MB - libperf-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: cc8a21fc2dec283d6b22f5da156975dd
SHA-256: 6a2fd2ba68636518ca607f8bf1cfd45e8980401349d8aacc5457b5e217e8fb2b
Size: 4.98 MB - perf-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: fb95e6f0e87572831d5b8fa29414afa8
SHA-256: 61805015639ff02d2b2a264eca48507992b4133e4905cbf24f090d519a9c8bfb
Size: 6.98 MB - python3-perf-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: ffe21169671406e07807adb71509b57d
SHA-256: 8e45c1aa08a3a1e48ae3167f9193e839111ba3a3e6ff9fe8765804131e388e62
Size: 5.05 MB - rtla-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 1fcd83c64c43dd14f3851a390260ccd5
SHA-256: fa22738af437ab84ea172b8039cf1fa607c5b32991b2ebcd1b667f0a673832e9
Size: 5.00 MB - rv-5.14.0-427.28.1.el9_4.x86_64.rpm
MD5: 4be87eefc65293e2463df1e259a468a5
SHA-256: e6ad5cef53c168d54b1977c5e581c1a609f1d7941997f197b19b4d469dc8d6eb
Size: 4.97 MB