Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2018-01-25 |
[2.6.32-696.20.1.OL6]
- Update genkey [bug 25599697]
[2.6.32-696.20.1]
- [x86] kaiser/efi: unbreak tboot (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] pti/mm: Fix trampoline stack problem with XEN PV (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] pti/mm: Fix XEN PV boot failure (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Invoke TRACE_IRQS_IRETQ in paranoid_userspace_restore_all (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] spec_ctrl: show added cpuid flags in /proc/cpuinfo after late microcode update (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: svm: spec_ctrl at vmexit needs per-cpu areas functional (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: Eliminate redundnat FEATURE Not Present messages (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: enable IBRS and stuff_RSB before calling NMI C code (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: skip CAP_SYS_PTRACE check to skip audit (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: disable ibrs while in intel_idle() (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: skip IBRS/CR3 restore when paranoid exception returns to userland (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- Revert 'x86/entry: Use retpoline for syscall's indirect calls' (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] mm/dump_pagetables: Allow dumping current pagetables (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/dump_pagetables: Add a pgd argument to walk_pgd_level() (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/dump_pagetables: Add page table directory (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Remove unneeded nmi_userspace code (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Fix nmi exit code with CONFIG_TRACE_IRQFLAGS (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: init_tss is supposed to go in the PAGE_ALIGNED per-cpu section (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: Clear kdump pgd page to prevent incorrect behavior (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: consider the init_mm.pgd a kaiser pgd (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: convert userland visible 'kpti' name to 'pti' (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] spec_ctrl: set IBRS during resume from RAM if ibrs_enabled is 2 (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] mm/kaiser: __load_cr3 in resume from RAM after kernel %gs has been restored (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] mm/kaiser: Revert the __GFP_COMP flag change (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Fix paranoid_exit() trampoline clobber (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] spec_ctrl: allow use_ibp_disable only if both SPEC_CTRL and IBPB_SUPPORT are missing (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: Documentation spec_ctrl.txt (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: remove irqs_disabled() check from intel_idle() (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: use enum when setting ibrs/ibpb_enabled (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: undo speculation barrier for ibrs_enabled and noibrs_cmdline (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: introduce ibpb_enabled = 2 for IBPB instead of IBRS (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: introduce SPEC_CTRL_PCP_ONLY_IBPB (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: cleanup s/flush/sync/ naming when sending IPIs (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: set IBRS during CPU init if in ibrs_enabled == 2 (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: use IBRS_ENABLED instead of 1 (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: allow the IBP disable feature to be toggled at runtime (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: always initialize save_reg in ENABLE_IBRS_SAVE_AND_CLOBBER (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: ibrs_enabled() is expected to return > 1 (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: CLEAR_EXTRA_REGS and extra regs save/restore (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] syscall: Clear unused extra registers on syscall (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] entry: Add back STUFF_RSB to interrupt and error paths (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] mm/kaiser: make is_kaiser_pgd reliable (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: disable global pages by default with KAISER (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] revert: mm/kaiser: Disable global pages by default with KAISER (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] kaiser/mm: fix pgd freeing in error path (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Fix 32-bit program crash with 64-bit kernel on AMD boxes (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: reload spec_ctrl cpuid in all microcode load paths (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: Prevent unwanted speculation without IBRS (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: add noibrs noibpb boot options (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] entry: Use retpoline for syscall's indirect calls (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] syscall: Clear unused extra registers on 32-bit compatible syscall entrance (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: rescan cpuid after a late microcode update (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: add debugfs ibrs_enabled ibpb_enabled (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: consolidate the spec control boot detection (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] Remove __cpuinitdata from some data & function (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] KVM/spec_ctrl: allow IBRS to stay enabled in host userland (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: move stuff_RSB in spec_ctrl.h (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] entry: Remove STUFF_RSB in error and interrupt code (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] entry: Stuff RSB for entry to kernel for non-SMEP platform (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] mm: Only set IBPB when the new thread cannot ptrace (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] mm: Set IBPB upon context switch (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] idle: Disable IBRS when offlining cpu and re-enable (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] idle: Disable IBRS entering idle and enable it on wakeup (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: implement spec ctrl C methods (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: save IBRS MSR value in save_paranoid for NMI (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] enter: Use IBRS on syscall and interrupts (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: swap rdx with rsi for nmi nesting detection (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: spec_ctrl_pcp and kaiser_enabled_pcp in same cachline (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] spec_ctrl: use per-cpu knob instead of ALTERNATIVES for ibpb and ibrs (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] enter: MACROS to set/clear IBRS and set IBPB (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [kvm] x86: add SPEC_CTRL to MSR and CPUID lists (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [kvm] svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] svm: Set IBPB when running a different VCPU (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [kvm] vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [kvm] vmx: Set IBPB when running a different VCPU (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [kvm] x86: clear registers on VM exit (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] [kvm] Pad RSB on VM transition (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [security] Add SPEC_CTRL Kconfig option (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] cpu/AMD: Control indirect branch predictor when SPEC_CTRL not available (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] feature: Report presence of IBPB and IBRS control (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] feature: Enable the x86 feature to control Speculation (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] cpuid: Provide get_scattered_cpuid_leaf() (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] cpuid: Cleanup cpuid_regs definitions (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] microcode: Share native MSR accessing variants (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] nop: Make the ASM_NOP* macros work from assembly (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] cpu: Clean up and unify the NOP selection infrastructure (Waiman Long) [1519797 1519796] {CVE-2017-5715}
- [x86] entry: Further simplify the paranoid_exit code (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Remove trampoline check from paranoid entry path (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Don't switch to trampoline stack in paranoid_exit (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Simplify trampoline stack restore code (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [misc] locking/barriers: prevent speculative execution based on Coverity scan results (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [fs] udf: prevent speculative execution (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [fs] prevent speculative execution (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [scsi] qla2xxx: prevent speculative execution (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [netdrv] p54: prevent speculative execution (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [netdrv] carl9170: prevent speculative execution (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [media] uvcvideo: prevent speculative execution (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [x86] cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [x86] cpu/AMD: Make the LFENCE instruction serialized (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [kernel] locking/barriers: introduce new memory barrier gmb() (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [x86] Fix typo preventing msr_set/clear_bit from having an effect (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [x86] Add another set of MSR accessor functions (Waiman Long) [1519787 1519789] {CVE-2017-5753}
- [x86] mm/kaiser: Replace kaiser with kpti to sync with upstream (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: map the trace idt tables in userland shadow pgd (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: add 'kaiser' and 'nokaiser' boot options (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] kaiser/mm: fix RESTORE_CR3 crash in kaiser_stop_machine (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: use stop_machine for enable/disable knob (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] kaiser/mm: use atomic ops to poison/unpoison user pagetables (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: use invpcid to flush the two kaiser PCID AISD (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: use two PCID ASIDs optimize the TLB during enter/exit kernel (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: stop patching flush_tlb_single (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm: If INVPCID is available, use it to flush global mappings (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: use PCID feature to make user and kernel switches faster (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/64: Initialize CR4.PCIDE early (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm: Add a 'noinvpcid' boot option to turn off INVPCID (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm: Add the 'nopcid' boot option to turn off PCID (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: validate trampoline stack (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] entry: Move SYSENTER_stack to the beginning of struct tss_struct (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: isolate the user mapped per cpu areas (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: selective boot time defaults (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser/xen: Dynamically disable KAISER when running under Xen PV (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: add Kconfig (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: avoid false positives during non-kaiser pgd updates (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: Respect disabled CPU features (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] kaiser/mm: trampoline stack comments (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: stack trampoline (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: re-enable vsyscalls (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: allow to build KAISER with KASRL (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: allow KAISER to be enabled/disabled at runtime (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: un-poison PGDs at runtime (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: add a function to check for KAISER being enabled (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: add debugfs file to turn KAISER on/off at runtime (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: disable native VSYSCALL (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: map virtually-addressed performance monitoring buffers (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: add kprobes text section (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: map trace interrupt entry (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: map entry stack per-cpu areas (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: map dynamically-allocated LDTs (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: make sure static PGDs are 8k in size (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: allow NX poison to be set in p4d/pgd (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: unmap kernel from userspace page tables (core patch) (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: mark per-cpu data structures required for entry/exit (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: introduce user-mapped per-cpu areas (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: add cr3 switches to entry code (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: remove scratch registers (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: prepare assembly for entry/exit CR3 switching (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/kaiser: Disable global pages by default with KAISER (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm: Document X86_CR4_PGE toggling behavior (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm/tlb: Make CR4-based TLB flushes more robust (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm: Do not set _PAGE_USER for init_mm page tables (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] increase robusteness of bad_iret fixup handler (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] mm: Check if PUD is large when validating a kernel address (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [x86] Separate out entry text section (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [include] linux/const.h: Add _BITUL() and _BITULL() (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [include] linux/mmdebug.h: add VM_WARN_ON() and VM_WARN_ON_ONCE() (Waiman Long) [1519799 1519802] {CVE-2017-5754}
- [include] stddef.h: Move offsetofend() from vfio.h to a generic kernel header (Waiman Long) [1519799 1519802] {CVE-2017-5754}
[2.6.32-696.19.1]
- [scsi] bnx2fc: Fix hung task messages when a cleanup response is not received during abort (Chad Dupuis) [1523783 1504260]
CVE-2017-9074 |
CVE-2017-11176 |
CVE-2017-7542 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 6 (i386) | kernel-2.6.32-696.20.1.el6.src.rpm | 258e5694a9dafee628f39b202ca6f3a871370b0e7608e79ba5373ddd6c044e78 | ELSA-2024-1831 | ol6_i386_latest |
kernel-2.6.32-696.20.1.el6.src.rpm | 258e5694a9dafee628f39b202ca6f3a871370b0e7608e79ba5373ddd6c044e78 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-2.6.32-696.20.1.el6.src.rpm | 258e5694a9dafee628f39b202ca6f3a871370b0e7608e79ba5373ddd6c044e78 | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-2.6.32-696.20.1.el6.i686.rpm | cc4608ffcf9ff20dcb8cd3a071ff69349a25b17469ea7cabc2e32849e4e8b25b | ELSA-2024-1831 | ol6_i386_latest | |
kernel-2.6.32-696.20.1.el6.i686.rpm | cc4608ffcf9ff20dcb8cd3a071ff69349a25b17469ea7cabc2e32849e4e8b25b | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-2.6.32-696.20.1.el6.i686.rpm | cc4608ffcf9ff20dcb8cd3a071ff69349a25b17469ea7cabc2e32849e4e8b25b | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm | d5ea4652967fa7dbc8ad7f665a42c3a10f499302ad6ac6a989a6cb87ad6a6290 | ELSA-2024-1831 | ol6_i386_latest | |
kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm | d5ea4652967fa7dbc8ad7f665a42c3a10f499302ad6ac6a989a6cb87ad6a6290 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm | d5ea4652967fa7dbc8ad7f665a42c3a10f499302ad6ac6a989a6cb87ad6a6290 | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-debug-2.6.32-696.20.1.el6.i686.rpm | 20aed129ed2ab90fb73c46bd0182d93435bdf293cdcc7d4da43ac1dd2afd2b05 | ELSA-2024-1831 | ol6_i386_latest | |
kernel-debug-2.6.32-696.20.1.el6.i686.rpm | 20aed129ed2ab90fb73c46bd0182d93435bdf293cdcc7d4da43ac1dd2afd2b05 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-debug-2.6.32-696.20.1.el6.i686.rpm | 20aed129ed2ab90fb73c46bd0182d93435bdf293cdcc7d4da43ac1dd2afd2b05 | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm | 7987069c472c9ac543f2607b5b013bfdfebf0fca868d871a7518b43a022eb3fe | ELSA-2024-1831 | ol6_i386_latest | |
kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm | 7987069c472c9ac543f2607b5b013bfdfebf0fca868d871a7518b43a022eb3fe | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm | 7987069c472c9ac543f2607b5b013bfdfebf0fca868d871a7518b43a022eb3fe | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-devel-2.6.32-696.20.1.el6.i686.rpm | 57e32b036ec8e1ced989e84672435225f43fd375afee2be2219481c785a5e7eb | ELSA-2024-1831 | ol6_i386_latest | |
kernel-devel-2.6.32-696.20.1.el6.i686.rpm | 57e32b036ec8e1ced989e84672435225f43fd375afee2be2219481c785a5e7eb | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-devel-2.6.32-696.20.1.el6.i686.rpm | 57e32b036ec8e1ced989e84672435225f43fd375afee2be2219481c785a5e7eb | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-doc-2.6.32-696.20.1.el6.noarch.rpm | c1f5c3d8595aaa2fdfa937f9bfd949f9451480e402512d3b4f4993a401388a5c | ELSA-2024-1831 | ol6_i386_latest | |
kernel-doc-2.6.32-696.20.1.el6.noarch.rpm | c1f5c3d8595aaa2fdfa937f9bfd949f9451480e402512d3b4f4993a401388a5c | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-doc-2.6.32-696.20.1.el6.noarch.rpm | c1f5c3d8595aaa2fdfa937f9bfd949f9451480e402512d3b4f4993a401388a5c | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm | 822aa9f241c96d71a2dfae2bb55a5de0e9783f869a0a2706ead361a149020b12 | ELSA-2024-1831 | ol6_i386_latest | |
kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm | 822aa9f241c96d71a2dfae2bb55a5de0e9783f869a0a2706ead361a149020b12 | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm | 822aa9f241c96d71a2dfae2bb55a5de0e9783f869a0a2706ead361a149020b12 | ELSA-2024-1831 | ol6_u9_i386_patch | |
kernel-headers-2.6.32-696.20.1.el6.i686.rpm | b0195bb1f4de5dbd13703bf132652829589b71557c384fb7fac509483635f9de | ELSA-2024-1831 | ol6_i386_latest | |
kernel-headers-2.6.32-696.20.1.el6.i686.rpm | b0195bb1f4de5dbd13703bf132652829589b71557c384fb7fac509483635f9de | ELSA-2024-1831 | ol6_i386_latest_archive | |
kernel-headers-2.6.32-696.20.1.el6.i686.rpm | b0195bb1f4de5dbd13703bf132652829589b71557c384fb7fac509483635f9de | ELSA-2024-1831 | ol6_u9_i386_patch | |
perf-2.6.32-696.20.1.el6.i686.rpm | 9c6fe6c46ae5d1f195175b0e4b22522e4b766285159cd4a640b57ed3672d3c2d | ELSA-2024-1831 | ol6_i386_latest | |
perf-2.6.32-696.20.1.el6.i686.rpm | 9c6fe6c46ae5d1f195175b0e4b22522e4b766285159cd4a640b57ed3672d3c2d | ELSA-2024-1831 | ol6_i386_latest_archive | |
perf-2.6.32-696.20.1.el6.i686.rpm | 9c6fe6c46ae5d1f195175b0e4b22522e4b766285159cd4a640b57ed3672d3c2d | ELSA-2024-1831 | ol6_u9_i386_patch | |
python-perf-2.6.32-696.20.1.el6.i686.rpm | 7f78fd4ff53b439bd16fc74edf3dda2394bb4b97b1b8b4dd3bbb71fd301d4a8f | ELSA-2024-1831 | ol6_i386_latest | |
python-perf-2.6.32-696.20.1.el6.i686.rpm | 7f78fd4ff53b439bd16fc74edf3dda2394bb4b97b1b8b4dd3bbb71fd301d4a8f | ELSA-2024-1831 | ol6_i386_latest_archive | |
python-perf-2.6.32-696.20.1.el6.i686.rpm | 7f78fd4ff53b439bd16fc74edf3dda2394bb4b97b1b8b4dd3bbb71fd301d4a8f | ELSA-2024-1831 | ol6_u9_i386_patch | |
Oracle Linux 6 (x86_64) | kernel-2.6.32-696.20.1.el6.src.rpm | 258e5694a9dafee628f39b202ca6f3a871370b0e7608e79ba5373ddd6c044e78 | ELSA-2024-1831 | ol6_u9_x86_64_patch |
kernel-2.6.32-696.20.1.el6.src.rpm | 258e5694a9dafee628f39b202ca6f3a871370b0e7608e79ba5373ddd6c044e78 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-2.6.32-696.20.1.el6.x86_64.rpm | 34cc70121d13fcee6d0fab56d68ac35fa90b0f8366f5cb3440a64d20bd8812e7 | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-2.6.32-696.20.1.el6.x86_64.rpm | 34cc70121d13fcee6d0fab56d68ac35fa90b0f8366f5cb3440a64d20bd8812e7 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm | d5ea4652967fa7dbc8ad7f665a42c3a10f499302ad6ac6a989a6cb87ad6a6290 | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm | d5ea4652967fa7dbc8ad7f665a42c3a10f499302ad6ac6a989a6cb87ad6a6290 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-debug-2.6.32-696.20.1.el6.x86_64.rpm | 46485189d7ce027d1b9642dfcf9677f73c605d60951564c1c25ba44e02b1ed38 | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-debug-2.6.32-696.20.1.el6.x86_64.rpm | 46485189d7ce027d1b9642dfcf9677f73c605d60951564c1c25ba44e02b1ed38 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm | 7987069c472c9ac543f2607b5b013bfdfebf0fca868d871a7518b43a022eb3fe | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm | 7987069c472c9ac543f2607b5b013bfdfebf0fca868d871a7518b43a022eb3fe | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-debug-devel-2.6.32-696.20.1.el6.x86_64.rpm | e1bb9be4a158fc5d1745f912ede10944be39eee332c0ac681222584d40c3c1af | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-debug-devel-2.6.32-696.20.1.el6.x86_64.rpm | e1bb9be4a158fc5d1745f912ede10944be39eee332c0ac681222584d40c3c1af | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-devel-2.6.32-696.20.1.el6.x86_64.rpm | 89db106ddcc6cc6833a82a347a5c5df023d1b2454eb661c7a25932e96764ee2f | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-devel-2.6.32-696.20.1.el6.x86_64.rpm | 89db106ddcc6cc6833a82a347a5c5df023d1b2454eb661c7a25932e96764ee2f | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-doc-2.6.32-696.20.1.el6.noarch.rpm | c1f5c3d8595aaa2fdfa937f9bfd949f9451480e402512d3b4f4993a401388a5c | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-doc-2.6.32-696.20.1.el6.noarch.rpm | c1f5c3d8595aaa2fdfa937f9bfd949f9451480e402512d3b4f4993a401388a5c | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm | 822aa9f241c96d71a2dfae2bb55a5de0e9783f869a0a2706ead361a149020b12 | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm | 822aa9f241c96d71a2dfae2bb55a5de0e9783f869a0a2706ead361a149020b12 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
kernel-headers-2.6.32-696.20.1.el6.x86_64.rpm | 57eacabbc67216c06c4b22c67ede2c468bddfede988c4c4f684ddd68fc2428b2 | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
kernel-headers-2.6.32-696.20.1.el6.x86_64.rpm | 57eacabbc67216c06c4b22c67ede2c468bddfede988c4c4f684ddd68fc2428b2 | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
perf-2.6.32-696.20.1.el6.x86_64.rpm | d0e832af1891749e8c8805b3a2f4521a852f13df7cf73494a2bb1a707e4882bc | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
perf-2.6.32-696.20.1.el6.x86_64.rpm | d0e832af1891749e8c8805b3a2f4521a852f13df7cf73494a2bb1a707e4882bc | ELSA-2024-1831 | ol6_x86_64_latest_archive | |
python-perf-2.6.32-696.20.1.el6.x86_64.rpm | 2530bd8178c4e5446b749a0fba7bf54c2a8d4419b7fd4295994923bcffde511a | ELSA-2024-1831 | ol6_u9_x86_64_patch | |
python-perf-2.6.32-696.20.1.el6.x86_64.rpm | 2530bd8178c4e5446b749a0fba7bf54c2a8d4419b7fd4295994923bcffde511a | ELSA-2024-1831 | ol6_x86_64_latest_archive |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team