kernel-4.18.0-553.32.1.el8_10
エラータID: AXSA:2025-9521:01
以下項目について対処しました。
[Security Fix]
- SELinux および smack の実装には、inode_setsecctx
フック処理において権限のチェックを迂回できてしまう
問題があるため、ローカルの攻撃者により、root squash
が有効化された NFS ファイルシステム上での不正な
セキュリティラベルの変更と、これに起因するデータの
改竄等を可能とする脆弱性が存在します。
(CVE-2024-46695)
- net/core/dev.c の qdisc_pkt_len_init() 関数には、
ヘッダー長のチェック処理の欠落に起因したアンダーフロー
の問題があるため、ローカルの攻撃者より、サービス拒否
攻撃を可能とする脆弱性が存在します。(CVE-2024-49949)
- block/blk-rq-qos.c の rq_qos_wake_function() 関数
には、レースコンディションに起因してクラッシュの発生
に至る問題があるため、ローカルの攻撃者により、サービス
拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-50082)
- net/xfrm/xfrm_user.c の copy_to_user_auth() 関数
には、カーネル空間のデータを用いてユーザー空間に公開
される可能性のある構造体のパディング領域を初期化して
しまう問題があるため、ローカルの攻撃者により、情報の
漏洩可能とする脆弱性が存在します。(CVE-2024-50110)
- net/xfrm/xfrm_user.c の verify_newsa_info() 関数
には、変数の検証が欠けている問題があるため、ローカル
の攻撃者により、巧妙に細工された設定を介して、サービス
妨害を可能とする脆弱性が存在します。(CVE-2024-50142)
- GIC irqchip ドライバーには、レースコンディションの
問題があるため、ローカルの攻撃者により、サービス拒否
攻撃を可能とする脆弱性が存在します。(CVE-2024-50192)
- net/ipv6/netfilter/nf_reject_ipv6.c の
nf_send_reset6() 関数には、イーサネットヘッダに
データ長が 0 のデータの挿入を試行してしまう問題がある
ため、ローカルの攻撃者により、サービス拒否攻撃を可能
とする脆弱性が存在します。(CVE-2024-50256)
- net/vmw_vsock/virtio_transport_common.c の
virtio_transport_destruct() 関数には、メモリ領域の
解放後利用の問題があるため、ローカルの攻撃者により、
サービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2024-50264)
パッケージをアップデートしてください。
In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an NFS filesystem that is exported with root squashing enabled. The end of the kerneldoc comment for __vfs_setxattr_noperm() states: * This function requires the caller to lock the inode's i_mutex before it * is executed. It also assumes that the caller will make the appropriate * permission checks. nfsd_setattr() does do permissions checking via fh_verify() and nfsd_permission(), but those don't do all the same permissions checks that are done by security_inode_setxattr() and its related LSM hooks do. Since nfsd_setattr() is the only consumer of security_inode_setsecctx(), simplest solution appears to be to replace the call to __vfs_setxattr_noperm() with a call to __vfs_setxattr_locked(). This fixes the above issue and has the added benefit of causing nfsd to recall conflicting delegations on a file when a client tries to change its security label.
In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO After commit 7c6d2ecbda83 ("net: be more gentle about silly gso requests coming from user") virtio_net_hdr_to_skb() had sanity check to detect malicious attempts from user space to cook a bad GSO packet. Then commit cf9acc90c80ec ("net: virtio_net_hdr_to_skb: count transport header in UFO") while fixing one issue, allowed user space to cook a GSO packet with the following characteristic : IPv4 SKB_GSO_UDP, gso_size=3, skb->len = 28. When this packet arrives in qdisc_pkt_len_init(), we end up with hdr_len = 28 (IPv4 header + UDP header), matching skb->len Then the following sets gso_segs to 0 : gso_segs = DIV_ROUND_UP(skb->len - hdr_len, shinfo->gso_size); Then later we set qdisc_skb_cb(skb)->pkt_len to back to zero :/ qdisc_skb_cb(skb)->pkt_len += (gso_segs - 1) * hdr_len; This leads to the following crash in fq_codel [1] qdisc_pkt_len_init() is best effort, we only want an estimation of the bytes sent on the wire, not crashing the kernel. This patch is fixing this particular issue, a following one adds more sanity checks for another potential bug. [1] [ 70.724101] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 70.724561] #PF: supervisor read access in kernel mode [ 70.724561] #PF: error_code(0x0000) - not-present page [ 70.724561] PGD 10ac61067 P4D 10ac61067 PUD 107ee2067 PMD 0 [ 70.724561] Oops: Oops: 0000 [#1] SMP NOPTI [ 70.724561] CPU: 11 UID: 0 PID: 2163 Comm: b358537762 Not tainted 6.11.0-virtme #991 [ 70.724561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 70.724561] RIP: 0010:fq_codel_enqueue (net/sched/sch_fq_codel.c:120 net/sched/sch_fq_codel.c:168 net/sched/sch_fq_codel.c:230) sch_fq_codel [ 70.724561] Code: 24 08 49 c1 e1 06 44 89 7c 24 18 45 31 ed 45 31 c0 31 ff 89 44 24 14 4c 03 8b 90 01 00 00 eb 04 39 ca 73 37 4d 8b 39 83 c7 01 <49> 8b 17 49 89 11 41 8b 57 28 45 8b 5f 34 49 c7 07 00 00 00 00 49 All code ======== 0: 24 08 and $0x8,%al 2: 49 c1 e1 06 shl $0x6,%r9 6: 44 89 7c 24 18 mov %r15d,0x18(%rsp) b: 45 31 ed xor %r13d,%r13d e: 45 31 c0 xor %r8d,%r8d 11: 31 ff xor %edi,%edi 13: 89 44 24 14 mov %eax,0x14(%rsp) 17: 4c 03 8b 90 01 00 00 add 0x190(%rbx),%r9 1e: eb 04 jmp 0x24 20: 39 ca cmp %ecx,%edx 22: 73 37 jae 0x5b 24: 4d 8b 39 mov (%r9),%r15 27: 83 c7 01 add $0x1,%edi 2a:* 49 8b 17 mov (%r15),%rdx <-- trapping instruction 2d: 49 89 11 mov %rdx,(%r9) 30: 41 8b 57 28 mov 0x28(%r15),%edx 34: 45 8b 5f 34 mov 0x34(%r15),%r11d 38: 49 c7 07 00 00 00 00 movq $0x0,(%r15) 3f: 49 rex.WB Code starting with the faulting instruction =========================================== 0: 49 8b 17 mov (%r15),%rdx 3: 49 89 11 mov %rdx,(%r9) 6: 41 8b 57 28 mov 0x28(%r15),%edx a: 45 8b 5f 34 mov 0x34(%r15),%r11d e: 49 c7 07 00 00 00 00 movq $0x0,(%r15) 15: 49 rex.WB [ 70.724561] RSP: 0018:ffff95ae85e6fb90 EFLAGS: 00000202 [ 70.724561] RAX: 0000000002000000 RBX: ffff95ae841de000 RCX: 0000000000000000 [ 70.724561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 70.724561] RBP: ffff95ae85e6fbf8 R08: 0000000000000000 R09: ffff95b710a30000 [ 70.724561] R10: 0000000000000000 R11: bdf289445ce31881 R12: ffff95ae85e6fc58 [ 70.724561] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000000 [ 70.724561] FS: 000000002c5c1380(0000) GS:ffff95bd7fcc0000(0000) knlGS:0000000000000000 [ 70.724561] CS: 0010 DS: 0000 ES: 0000 C ---truncated---
In the Linux kernel, the following vulnerability has been resolved: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race We're seeing crashes from rq_qos_wake_function that look like this: BUG: unable to handle page fault for address: ffffafe180a40084 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0 Oops: Oops: 0002 [#1] PREEMPT SMP PTI CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014 RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00
In the Linux kernel, the following vulnerability has been resolved: arm64: probes: Remove broken LDR (literal) uprobe support The simulate_ldr_literal() and simulate_ldrsw_literal() functions are unsafe to use for uprobes. Both functions were originally written for use with kprobes, and access memory with plain C accesses. When uprobes was added, these were reused unmodified even though they cannot safely access user memory. There are three key problems: 1) The plain C accesses do not have corresponding extable entries, and thus if they encounter a fault the kernel will treat these as unintentional accesses to user memory, resulting in a BUG() which will kill the kernel thread, and likely lead to further issues (e.g. lockup or panic()). 2) The plain C accesses are subject to HW PAN and SW PAN, and so when either is in use, any attempt to simulate an access to user memory will fault. Thus neither simulate_ldr_literal() nor simulate_ldrsw_literal() can do anything useful when simulating a user instruction on any system with HW PAN or SW PAN. 3) The plain C accesses are privileged, as they run in kernel context, and in practice can access a small range of kernel virtual addresses. The instructions they simulate have a range of +/-1MiB, and since the simulated instructions must itself be a user instructions in the TTBR0 address range, these can address the final 1MiB of the TTBR1 acddress range by wrapping downwards from an address in the first 1MiB of the TTBR0 address range. In contemporary kernels the last 8MiB of TTBR1 address range is reserved, and accesses to this will always fault, meaning this is no worse than (1). Historically, it was theoretically possible for the linear map or vmemmap to spill into the final 8MiB of the TTBR1 address range, but in practice this is extremely unlikely to occur as this would require either: * Having enough physical memory to fill the entire linear map all the way to the final 1MiB of the TTBR1 address range. * Getting unlucky with KASLR randomization of the linear map such that the populated region happens to overlap with the last 1MiB of the TTBR address range. ... and in either case if we were to spill into the final page there would be larger problems as the final page would alias with error pointers. Practically speaking, (1) and (2) are the big issues. Given there have been no reports of problems since the broken code was introduced, it appears that no-one is relying on probing these instructions with uprobes. Avoid these issues by not allowing uprobes on LDR (literal) and LDRSW (literal), limiting the use of simulate_ldr_literal() and simulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR (literal) and LDRSW (literal) will be rejected as arm_probe_decode_insn() will return INSN_REJECTED. In future we can consider introducing working uprobes support for these instructions, but this will require more significant work.
In the Linux kernel, the following vulnerability has been resolved: xfrm: fix one more kernel-infoleak in algo dumping During fuzz testing, the following issue was discovered: BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x598/0x2a30 _copy_to_iter+0x598/0x2a30 __skb_datagram_iter+0x168/0x1060 skb_copy_datagram_iter+0x5b/0x220 netlink_recvmsg+0x362/0x1700 sock_recvmsg+0x2dc/0x390 __sys_recvfrom+0x381/0x6d0 __x64_sys_recvfrom+0x130/0x200 x64_sys_call+0x32c8/0x3cc0 do_syscall_64+0xd8/0x1c0 entry_SYSCALL_64_after_hwframe+0x79/0x81 Uninit was stored to memory at: copy_to_user_state_extra+0xcc1/0x1e00 dump_one_state+0x28c/0x5f0 xfrm_state_walk+0x548/0x11e0 xfrm_dump_sa+0x1e0/0x840 netlink_dump+0x943/0x1c40 __netlink_dump_start+0x746/0xdb0 xfrm_user_rcv_msg+0x429/0xc00 netlink_rcv_skb+0x613/0x780 xfrm_netlink_rcv+0x77/0xc0 netlink_unicast+0xe90/0x1280 netlink_sendmsg+0x126d/0x1490 __sock_sendmsg+0x332/0x3d0 ____sys_sendmsg+0x863/0xc30 ___sys_sendmsg+0x285/0x3e0 __x64_sys_sendmsg+0x2d6/0x560 x64_sys_call+0x1316/0x3cc0 do_syscall_64+0xd8/0x1c0 entry_SYSCALL_64_after_hwframe+0x79/0x81 Uninit was created at: __kmalloc+0x571/0xd30 attach_auth+0x106/0x3e0 xfrm_add_sa+0x2aa0/0x4230 xfrm_user_rcv_msg+0x832/0xc00 netlink_rcv_skb+0x613/0x780 xfrm_netlink_rcv+0x77/0xc0 netlink_unicast+0xe90/0x1280 netlink_sendmsg+0x126d/0x1490 __sock_sendmsg+0x332/0x3d0 ____sys_sendmsg+0x863/0xc30 ___sys_sendmsg+0x285/0x3e0 __x64_sys_sendmsg+0x2d6/0x560 x64_sys_call+0x1316/0x3cc0 do_syscall_64+0xd8/0x1c0 entry_SYSCALL_64_after_hwframe+0x79/0x81 Bytes 328-379 of 732 are uninitialized Memory access of size 732 starts at ffff88800e18e000 Data copied to user address 00007ff30f48aff0 CPU: 2 PID: 18167 Comm: syz-executor.0 Not tainted 6.8.11 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Fixes copying of xfrm algorithms where some random data of the structure fields can end up in userspace. Padding in structures may be filled with random (possibly sensitve) data and should never be given directly to user-space. A similar issue was resolved in the commit 8222d5910dae ("xfrm: Zero padding when dumping algos and encap") Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
In the Linux kernel, the following vulnerability has been resolved: xfrm: validate new SA's prefixlen using SA family when sel.family is unset This expands the validation introduced in commit 07bf7908950a ("xfrm: Validate address prefix lengths in the xfrm selector.") syzbot created an SA with usersa.sel.family = AF_UNSPEC usersa.sel.prefixlen_s = 128 usersa.family = AF_INET Because of the AF_UNSPEC selector, verify_newsa_info doesn't put limits on prefixlen_{s,d}. But then copy_from_user_state sets x->sel.family to usersa.family (AF_INET). Do the same conversion in verify_newsa_info before validating prefixlen_{s,d}, since that's how prefixlen is going to be used later on.
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE Kunkun Jiang reported that there is a small window of opportunity for userspace to force a change of affinity for a VPE while the VPE has already been unmapped, but the corresponding doorbell interrupt still visible in /proc/irq/. Plug the race by checking the value of vmapp_count, which tracks whether the VPE is mapped ot not, and returning an error in this case. This involves making vmapp_count common to both GICv4.1 and its v4.0 ancestor.
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() I got a syzbot report without a repro [1] crashing in nf_send_reset6() I think the issue is that dev->hard_header_len is zero, and we attempt later to push an Ethernet header. Use LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c. [1] skbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun kernel BUG at net/core/skbuff.c:206 ! Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline] RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216 Code: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 RSP: 0018:ffffc900045269b0 EFLAGS: 00010282 RAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800 RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000 RBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc R10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140 R13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c FS: 00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
N/A
SRPMS
- kernel-4.18.0-553.32.1.el8_10.src.rpm
MD5: 809b2a9342172db0b356980e4b0f5f9d
SHA-256: 874171bb30eb4eab6d59861c5b7949fa0fc9b62fca1a486a9f5507733711e475
Size: 132.21 MB
Asianux Server 8 for x86_64
- bpftool-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: c46084152f63a2ea0acd7f7dbaee5696
SHA-256: 9f442a8adf3f8b9765046449160e74f1d081e7a9da266f286f5e3f0f27070210
Size: 11.20 MB - kernel-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 032ff2c13b087cc5b2139e0c586fe121
SHA-256: de21b4b1cd337cbb43c25976a04dc05366a6a04ac791292cc9474d35d4d43ce8
Size: 10.47 MB - kernel-abi-stablelists-4.18.0-553.32.1.el8_10.noarch.rpm
MD5: d15e3501ad17308794d97b8cb372a0b8
SHA-256: b9915eaa553ab43a300938a15f4d5975daa144b9e92a832085ae372bd5472100
Size: 10.49 MB - kernel-core-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 5eeb52695f413b9e6fcc2d6d6acfc20f
SHA-256: dd1f83863b43a3589c9b3812a315336222ee70ca6734945664d43ffc5a709773
Size: 43.49 MB - kernel-cross-headers-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 6a45232e77987370a27b0f6aa938391a
SHA-256: 495d30939fc0dd1411a64407e011590fb9b9d11abddef091538927e49aa83e2b
Size: 15.82 MB - kernel-debug-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 08d8d3d3765edab668d6fdbbb3dece9d
SHA-256: 0ac7b0ed47bab727193bfa34fdb7a7652af203a841f17d51e301b688e07d24db
Size: 10.47 MB - kernel-debug-core-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: f88be1b57e66534f8c592b3832f77fa2
SHA-256: 4fa4b559326d1542d2b60eefd75fa1e5ce8823ed7ce9c0a27cd8b7daa27bfc1e
Size: 72.79 MB - kernel-debug-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 3ae12e3d53469137d6ab78d20b955659
SHA-256: 7563becc5286541229236990bae51144e2667508672e79bbb85a759da6d3908c
Size: 24.30 MB - kernel-debug-modules-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 19666feabaab77c0a0ee9b9811ef02af
SHA-256: c2ae5acb61d3189a634baa05dbd5a6e021342ef9740c1c0558f59e8f31da5c3c
Size: 65.91 MB - kernel-debug-modules-extra-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 990ac82603ffd26c0d7dd5075fd35d31
SHA-256: f0467d9856e1a0969fa382baa6a576a9f95b6328f0c93dc0a670cfd3cada840a
Size: 11.85 MB - kernel-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: e290a56ac9b806d065d36968446efd56
SHA-256: c559da22a06c4e9ab0ba8b6a158827e6c6be7cc17e0816fcd0340bc1f665d93f
Size: 24.10 MB - kernel-doc-4.18.0-553.32.1.el8_10.noarch.rpm
MD5: d632ba161cb3a67d71ad9e9d603169b1
SHA-256: d8741a8b5b99f7484bd52dbb6931bed6cb85c2a1448af57cff7ee0083c428b61
Size: 28.33 MB - kernel-headers-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: c8a87bf2c159aa8f11efd0ef03a4f6b9
SHA-256: da9d039c29777e78d41a034697df5786d4a6b5a28ee465fd1e95864a8bb6eb0f
Size: 11.82 MB - kernel-modules-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: a85f621329aabe91725be6922a86751f
SHA-256: a2afdcf9e3ed3eee6050b20a9b527ed3836235849b4ba310848ffff64350be92
Size: 36.28 MB - kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 676e1b3002f87838ed16affc40e0c769
SHA-256: 42982b5e56ecc367e07c96d43d19489a02c615ab2b0ab01beac40fba2331ba21
Size: 11.16 MB - kernel-tools-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 3bc586e8f480bea8670101c275b12de9
SHA-256: f0af79fe9d8bf47669c562eb009bad25a1a0e6eaccae0ad31af4a7b171d9de5f
Size: 10.69 MB - kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: 7d0307abfe18daa0ce9300fcb2cc06f1
SHA-256: d5aa4c7d5bd4492893636bd015f26d9b8e9c7c4dbfe89668e2bb3fb35aa25d73
Size: 10.48 MB - kernel-tools-libs-devel-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: aadcc98899a7f464745d5601dd8de6f8
SHA-256: c450b7aa9c932c7508a19fb36ea1ece1add4e90ad25ad6bfe7c85812f2169ba3
Size: 10.47 MB - perf-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: f962ce218017fb00cf8939aaad4ae00a
SHA-256: b0c6c9f8160bd5dab31a2a552bed3cf33e056cbe9dc16e6007eb4f67ef2f5cb2
Size: 12.79 MB - python3-perf-4.18.0-553.32.1.el8_10.x86_64.rpm
MD5: b968997cc1c5a8791bc4590b2d46a171
SHA-256: 48141836c3e4b2a89bc7f2a5b5f5359a219bffce935a204411fe2b35075d9edb
Size: 10.60 MB