kernel-5.14.0-611.30.1.el9_7
エラータID: AXSA:2026-192:12
以下項目について対処しました。
[Security Fix]
- kernel の Open vSwitch の実装には、入力データのチェック処理
に不備があるため、ローカルの攻撃者により、情報の漏洩、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-37789)
- kernel の GICv2m ドライバには、メモリ領域の解放後利用の問題が
あるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-37819)
- kernel の Infiniband ドライバには、ロック処理に不備があるため、
ローカルの攻撃者により、情報の漏洩、およびサービス拒否攻撃を可能
とする脆弱性が存在します。(CVE-2025-38022)
- kernel の RDMA の実装には、メモリ領域の解放後利用の問題が
あるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-38024)
- kernel の VMCI ドライバには、リソースの初期化処理が欠落して
いるため、ローカルの攻撃者により、情報の漏洩、およびサービス拒否
攻撃を可能とする脆弱性が存在します。(CVE-2025-38403)
- kernel の Squashfs の実装には、戻り値のチェック処理が欠落して
いるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-38415)
- kernel の ATM の実装には、無限ループの発生に至る問題があるため、
ローカルの攻撃者により、サービス拒否攻撃を可能とする脆弱性が存在
します。(CVE-2025-38459)
- kernel の io_uring サブシステムのネットワーク関連処理には、
ローカルの攻撃者により、情報の漏洩、およびサービス拒否攻撃を可能
とする脆弱性が存在します。(CVE-2025-38730)
- kernel の USB ドライバには、メモリ領域の範囲外読み取りの問題が
あるため、ローカルの攻撃者により、情報の漏洩、およびサービス拒否
攻撃を可能とする脆弱性が存在します。(CVE-2025-39760)
- kernel の IPv6 スタックには、メモリ領域の解放後利用の問題が
あるため、ローカルの攻撃者により、サービス拒否攻撃を可能とする
脆弱性が存在します。(CVE-2025-40135)
- kernel の Bluetooth スタックには、メモリ領域の解放後利用の問題
があるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-40141)
- kernel の IPv6 スタックには、メモリ領域の解放後利用の問題が
あるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-40158)
- kernel の net サブシステムには、メモリ領域の解放後利用の問題が
あるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-40170)
- kernel の ALSA USB オーディオドライバには、バッファサイズの
算出処理に不備があるため、ローカルの攻撃者により、情報の漏洩、
データ破壊、およびサービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2025-40269)
- kernel の proc ファイルシステムの実装には、メモリ領域の解放後
利用の問題があるため、ローカルの攻撃者により、情報の漏洩、データ
破壊、およびサービス拒否攻撃を可能とする脆弱性が存在します。
(CVE-2025-40271)
- kernel の Bluetooth スタックには、メモリ領域の解放後利用の問題
があるため、ローカルの攻撃者により、情報の漏洩、データ破壊、および
サービス拒否攻撃を可能とする脆弱性が存在します。(CVE-2025-40318)
パッケージをアップデートしてください。
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode() With ACPI in place, gicv2m_get_fwnode() is registered with the pci subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime during a PCI host bridge probe. But, the call back is wrongly marked as __init, causing it to be freed, while being registered with the PCI subsystem and could trigger: Unable to handle kernel paging request at virtual address ffff8000816c0400 gicv2m_get_fwnode+0x0/0x58 (P) pci_set_bus_msi_domain+0x74/0x88 pci_register_host_bridge+0x194/0x548 This is easily reproducible on a Juno board with ACPI boot. Retain the function for later use.
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xe0/0x110 mm/kasan/report.c:634 strlen+0x93/0xa0 lib/string.c:420 __fortify_strlen include/linux/fortify-string.h:268 [inline] get_kobj_path_length lib/kobject.c:118 [inline] kobject_get_path+0x3f/0x2a0 lib/kobject.c:158 kobject_uevent_env+0x289/0x1870 lib/kobject_uevent.c:545 ib_register_device drivers/infiniband/core/device.c:1472 [inline] ib_register_device+0x8cf/0xe00 drivers/infiniband/core/device.c:1393 rxe_register_device+0x275/0x320 drivers/infiniband/sw/rxe/rxe_verbs.c:1552 rxe_net_add+0x8e/0xe0 drivers/infiniband/sw/rxe/rxe_net.c:550 rxe_newlink+0x70/0x190 drivers/infiniband/sw/rxe/rxe.c:225 nldev_newlink+0x3a3/0x680 drivers/infiniband/core/nldev.c:1796 rdma_nl_rcv_msg+0x387/0x6e0 drivers/infiniband/core/netlink.c:195 rdma_nl_rcv_skb.constprop.0.isra.0+0x2e5/0x450 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x53a/0x7f0 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x8d1/0xdd0 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg net/socket.c:727 [inline] ____sys_sendmsg+0xa95/0xc70 net/socket.c:2566 ___sys_sendmsg+0x134/0x1d0 net/socket.c:2620 __sys_sendmsg+0x16d/0x220 net/socket.c:2652 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f This problem is similar to the problem that the commit 1d6a9e7449e2 ("RDMA/core: Fix use-after-free when rename device name") fixes. The root cause is: the function ib_device_rename() renames the name with lock. But in the function kobject_uevent(), this name is accessed without lock protection at the same time. The solution is to add the lock protection when this name is accessed in the function kobject_uevent().
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug Call Trace:
In the Linux kernel, the following vulnerability has been resolved: vsock/vmci: Clear the vmci transport packet properly when initializing it In vmci_transport_packet_init memset the vmci_transport_packet before populating the fields to avoid any uninitialised data being left in the structure.
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check return result of sb_min_blocksize Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug. Syzkaller forks multiple processes which after mounting the Squashfs filesystem, issues an ioctl("/dev/loop0", LOOP_SET_BLOCK_SIZE, 0x8000). Now if this ioctl occurs at the same time another process is in the process of mounting a Squashfs filesystem on /dev/loop0, the failure occurs. When this happens the following code in squashfs_fill_super() fails. ---- msblk->devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE); msblk->devblksize_log2 = ffz(~msblk->devblksize); ---- sb_min_blocksize() returns 0, which means msblk->devblksize is set to 0. As a result, ffz(~msblk->devblksize) returns 64, and msblk->devblksize_log2 is set to 64. This subsequently causes the UBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36 shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long') This commit adds a check for a 0 return by sb_min_blocksize().
In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix infinite recursive call of clip_push(). syzbot reported the splat below. [0] This happens if we call ioctl(ATMARP_MKIP) more than once. During the first call, clip_mkip() sets clip_push() to vcc->push(), and the second call copies it to clip_vcc->old_push(). Later, when the socket is close()d, vcc_destroy_socket() passes NULL skb to clip_push(), which calls clip_vcc->old_push(), triggering the infinite recursion. Let's prevent the second ioctl(ATMARP_MKIP) by checking vcc->user_back, which is allocated by the first call as clip_vcc. Note also that we use lock_sock() to prevent racy calls. [0]: BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000) Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191 Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00 RSP: 0018:ffffc9000d670000 EFLAGS: 00010246 RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000 RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300 R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578 FS: 000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0 Call Trace:
In the Linux kernel, the following vulnerability has been resolved: io_uring/net: commit partial buffers on retry Ring provided buffers are potentially only valid within the single execution context in which they were acquired. io_uring deals with this and invalidates them on retry. But on the networking side, if MSG_WAITALL is set, or if the socket is of the streaming type and too little was processed, then it will hang on to the buffer rather than recycle or commit it. This is problematic for two reasons: 1) If someone unregisters the provided buffer ring before a later retry, then the req->buf_list will no longer be valid. 2) If multiple sockers are using the same buffer group, then multiple receives can consume the same memory. This can cause data corruption in the application, as either receive could land in the same userspace buffer. Fix this by disallowing partial retries from pinning a provided buffer across multiple executions, if ring provided buffers are used.
In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_xmit() Use RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent possible UAF.
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix possible UAF on iso_conn_free This attempt to fix similar issue to sco_conn_free where if the conn->sk is not set to NULL may lead to UAF on iso_conn_free.
In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_output() Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent possible UAF. We can remove rcu_read_lock()/rcu_read_unlock() pairs from ip6_finish_output2().
In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer The PCM stream data in USB-audio driver is transferred over USB URB packet buffers, and each packet size is determined dynamically. The packet sizes are limited by some factors such as wMaxPacketSize USB descriptor. OTOH, in the current code, the actually used packet sizes are determined only by the rate and the PPS, which may be bigger than the size limit above. This results in a buffer overflow, as reported by syzbot. Basically when the limit is smaller than the calculated packet size, it implies that something is wrong, most likely a weird USB descriptor. So the best option would be just to return an error at the parameter setup time before doing any further operations. This patch introduces such a sanity check, and returns -EINVAL when the packet size is greater than maxpacksize. The comparison with ep->packsize[1] alone should suffice since it's always equal or greater than ep->packsize[0].
In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using stress-ng testing, need to run testcase getdent and tun in the same time. The steps of the issue is as follows: 1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current pde is tun3; 2) in the [time windows] unregister netdevice tun3 and tun2, and erase them from rbtree. erase tun3 first, and then erase tun2. the pde(tun2) will be released to slab; 3) continue to getdent process, then pde_subdir_next() will return pde(tun2) which is released, it will case uaf access. CPU 0 | CPU 1 ------------------------------------------------------------------------- traverse dir /proc/pid/net/dev_snmp6/ | unregister_netdevice(tun->dev) //tun3 tun2 sys_getdents64() | iterate_dir() | proc_readdir() | proc_readdir_de() | snmp6_unregister_dev() pde_get(de); | proc_remove() read_unlock(&proc_subdir_lock); | remove_proc_subtree() | write_lock(&proc_subdir_lock); [time window] | rb_erase(&root->subdir_node, &parent->subdir); | write_unlock(&proc_subdir_lock); read_lock(&proc_subdir_lock); | next = pde_subdir_next(de); | pde_put(de); | de = next; //UAF | rbtree of dev_snmp6 | pde(tun3) / \ NULL pde(tun2)
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once hci_cmd_sync_dequeue_once() does lookup and then cancel the entry under two separate lock sections. Meanwhile, hci_cmd_sync_work() can also delete the same entry, leading to double list_del() and "UAF". Fix this by holding cmd_sync_work_lock across both lookup and cancel, so that the entry cannot be removed concurrently.
N/A
SRPMS
- kernel-5.14.0-611.30.1.el9_7.src.rpm
MD5: 1ab5c76dc60ae72aafb2d1d21f1d24f3
SHA-256: 9f0a337d8a9a7dd7fac29eee0f9b0299f0c9ec624f199bfc9ce71965af1694e3
Size: 144.01 MB
Asianux Server 9 for x86_64
- kernel-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 718227a34523f44d490d4a6b219ab9d8
SHA-256: 29ab49629dd7e636a48659b2aca34339be75ceee4325f167c8066f4f346db61d
Size: 1.11 MB - kernel-abi-stablelists-5.14.0-611.30.1.el9_7.noarch.rpm
MD5: 31abcbe98823f611feed066f0eeec569
SHA-256: 9e78f0f0550ecdb0c7472db31c53fb6b7e6cb1f9da732fabd6a988a9558aee15
Size: 1.13 MB - kernel-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 714c0503b8e5db1abf996cb9b57be617
SHA-256: 3232bc40334140f08ffc1c3cd987de34419b7986303fa13658e46898fef34f2d
Size: 17.38 MB - kernel-cross-headers-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 5dffca921e0af41db06b1251935059ed
SHA-256: 2921d7c9c8427faacd4d79fd0c7a1f2b8ec5f79b2cfe85f872b769b28c80eb46
Size: 8.05 MB - kernel-debug-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 9960ba718c92eadfeeae40c3a76b361e
SHA-256: 045bddecd79df1a6ff134146ff1976827423a07003663a46abd0bbb41801c489
Size: 1.11 MB - kernel-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 4b5277827a9633e5d83a1f4be9f1ec24
SHA-256: e1bffb44c46322f25d8b79f790918f4759577639967bb25cabe0ec7515e04b71
Size: 30.97 MB - kernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 5f4ef30c6f52fbae18b0e6acec300d91
SHA-256: a169b95392021c4dac96c3dc3dfd9e7973f80c45f1a4840ea155c9d8966bfff0
Size: 21.29 MB - kernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: d4fa99a9e4829755b499bd1b800a25f5
SHA-256: ce4f1d2e4e3a8bfd197edf2df4bfd478f8200772a6f44c02103f08e0948f1bc0
Size: 1.11 MB - kernel-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 47f25f7a06e7104dc3b51f63e2e87272
SHA-256: 68c8761548c4c1b8537169227f2e9cc8291ac072032889f2a3215edc8ab91de7
Size: 69.35 MB - kernel-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 7f30bdea370590bb5d1b55f596a1f8b7
SHA-256: 8de8e4f2e8611a67266d581c1d51be345f75ffe2821efbab77ee3a8e78dfbb18
Size: 49.54 MB - kernel-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: b77b72add94715d2b4db4e6937e09157
SHA-256: ca20979a142885c85f557e18f2cd970b65f89bef64e6d0e934f990b9a517ffa4
Size: 1.88 MB - kernel-debug-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: ea57b8638b4dbb8ead2e351719d2dcb0
SHA-256: 270e148b65a8db0b3081e384db6095282b119d58b7f502bce1bf28c2a9cc3a89
Size: 85.83 MB - kernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: f2b11513d4b05671eb3ae30199cf5893
SHA-256: 78d46fc10949a58e64fa7a3e29ab73ff6ce66efa590f260422086290f0cc1fd3
Size: 21.13 MB - kernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 9cbe0e4101ec98e966499a7d4aba22f7
SHA-256: a5ba170ee260a88efca592a301780b24ebd7fcc37ec641ff9d17cfd12df612a9
Size: 1.11 MB - kernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm
MD5: 340e581fe24a3ea51a33f1b01f716c0a
SHA-256: 67613fb66190e5b91bd082fce0076444e4a2d5e90351358abada20dd10f79fe0
Size: 38.85 MB - kernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 5f1ab389cbbc68f3f254648b46d2c1c6
SHA-256: c2179816cfd7621987d506510712e203cc27cc21fa968afaa7beffe4917fee9d
Size: 2.86 MB - kernel-modules-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 25135696aa9de0b00d7d9f8edc4c91c1
SHA-256: 2e5f543e29721d06f79caa73bc4b3a98ed878014b68077a87e23988232e75e21
Size: 39.77 MB - kernel-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: ddc005a0d698b712922e8ff9cf9c3c4c
SHA-256: 70408cbdfee2006b310098f660efc3af1c552576e2df7fbdc871ea96ca231e06
Size: 30.98 MB - kernel-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 04b123d9e666bb8132e29ec44ceb41e9
SHA-256: 99b5429c5e0745de3052ffba10c6e640dfb2b35156f5a6337f055de73dd05368
Size: 1.53 MB - kernel-rt-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 3b926224ed7d411f87f6be879a34e4da
SHA-256: ce47d13705cee493a36156282ef73263f2be4f8c3ee877fcaa0f147407f895ef
Size: 1.11 MB - kernel-rt-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 31a8b071b7f886fbab79b633e6fc5c4e
SHA-256: b8597e39e9c5db9286f9ceea54777af1da878085fa26daef48e18f9406814ae9
Size: 17.29 MB - kernel-rt-debug-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: b07b24603e83b4ac3d2e269602b839ee
SHA-256: 0e148a8dbd1764c68e349be4e58f25111a43f3ae59d3c2f9e426b95271708c4e
Size: 1.11 MB - kernel-rt-debug-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 3393a136e493deaa81d2c2e598c727ec
SHA-256: 96d6ccdd855ca5b1d3c8ffafa6ab0e1a63953d0feeb7935d3eb0efe45bf84185
Size: 18.72 MB - kernel-rt-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: facd37400c9c95b4b1663f47170ded76
SHA-256: 2efb0e3923a44ce6f62c47bc333409bdc09903f242ea879f007a3f3af7988d43
Size: 21.24 MB - kernel-rt-debug-modules-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: cdb2af02cac5bac9b453cf7b788e1adc
SHA-256: 045034f1d9bba0620a734d4da9d9f74f87d7f9071e589f886b7e007dfedad278
Size: 41.33 MB - kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: fb5913879c5436f5977d74a2ee924c80
SHA-256: 919772bce8b702910b3cfef6d86ff504e19be5e514bdb5a1d91b6a53ae32e40d
Size: 32.13 MB - kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 98d98af70c554f9c583343d83dbea52e
SHA-256: ea81d78ac8a531ed3828a8d72e0c38d247bae4559e2e832c91e2eacd21c51237
Size: 1.55 MB - kernel-rt-devel-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: a974e3d4e957e642e246448c9264ba5b
SHA-256: 3fbba7cdc5a7402ca0d118cc8b080e18ec91e680136ce319c88cbbe9aa797b59
Size: 21.11 MB - kernel-rt-modules-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 856420966701634bef8aef092ed7a6d0
SHA-256: 78a8de2b79ae0514c9bd5d7a2a3d2a9b946b8467572ca133dbf45be2c9c6f745
Size: 39.83 MB - kernel-rt-modules-core-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 30b2f6d5dc0ca1229903830a44e8116b
SHA-256: d19c1b1f51b512e9c5125bf16f668c1c9894ef7261440b798ed11e36ebf65913
Size: 31.05 MB - kernel-rt-modules-extra-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 2d2abd73c2d0356511871218af8fb051
SHA-256: c1f715a57cced4548a11a21d586cb0a3420acbfe27d2b08d968e490f9035a833
Size: 1.53 MB - kernel-tools-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 7ae96ae511fe15fb057648bfef2ae6a6
SHA-256: c562b91bb4a793932495e0cef8767bef51220e601135cbc6244e5a49178aaedc
Size: 1.40 MB - kernel-tools-libs-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 6653f35b349b265b34521e3acf71aacc
SHA-256: 414d2391e8d0d6ded8b926a09aaeded3e85b27bb6667d494db0b6a4e9e90b70d
Size: 1.12 MB - kernel-tools-libs-devel-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 488f61441d273a8b25d086431c14dfb2
SHA-256: 2aec43da164fe092477138cbc4167219f0205fd631c697309ebe693e03b00aca
Size: 1.11 MB - kernel-uki-virt-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 35bde1738920ff3d6a61c586fce24aab
SHA-256: 31504abd3eccd247cf7f31c300f6f0fb856c3220f9e3820ffa13790b21d465bc
Size: 63.97 MB - kernel-uki-virt-addons-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 334f99f94e60436e5040835f80975a62
SHA-256: 5847b9f58a23d2fa5eb9da4bed90497826fcd4aaef03b3c4c380fb6c5b65bdcc
Size: 1.13 MB - libperf-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: bf7640c2688f8d90b2016a23277be109
SHA-256: c8bc7bdf5e36b8da83d15b573e0135cd869ac7b8953992d50ba4f71100199315
Size: 1.13 MB - perf-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: aee6a611a4e6bb438a77cb2528a85c4d
SHA-256: bf7fba8208aab230bdf2ef45d5f5acea9123a4bbf3b0306bba981f7237a8b59b
Size: 3.36 MB - python3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 8c223160d2a425d34f08192153b4aa80
SHA-256: 39ab9b61fd27d869a607d3d1a3f2e955bb99916cb83cdf585b4b1b609edce996
Size: 2.53 MB - rtla-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: 0e0d71dfbd178989fca6baf17ade93c4
SHA-256: ff3d1ed11367411dd8938c8f058b0b050126cd4bb6a1b93b23378ce46eaf13b2
Size: 1.17 MB - rv-5.14.0-611.30.1.el9_7.x86_64.rpm
MD5: c5ca7b7020123f6c1606ca8bcb408707
SHA-256: fe4c597c3f879fd516eac78b87f346fb05729ea7fa5783e9850ebfe999eeb39c
Size: 1.12 MB