ELSA-2018-1319

ELSA-2018-1319 - kernel security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2018-05-08

Description


[2.6.32-696.28.1.OL6]
- Update genkey [bug 25599697]

[2.6.32-696.28.1]
- [x86] entry/64: Don't use IST entry for #BP stack (Waiman Long) [1567078 1567079] {CVE-2018-8897}
- [x86] xen: do not use xen_info on HVM, set pv_info name to 'Xen HVM' (Vitaly Kuznetsov) [1569141 1568241]

[2.6.32-696.27.1]
- [mm] account skipped entries to avoid looping in find_get_pages (Dave Wysochanski) [1565989 1559386]
- [x86] pti/32: Don't use trampoline stack on Xen PV (Waiman Long) [1568327 1562725]
- [x86] pti: Use boot_cpu_has(X86_FEATURE_PTI_SUPPORT) for early call sites (Waiman Long) [1568327 1562725]
- [x86] pti: Set X86_FEATURE_PTI_SUPPORT early (Waiman Long) [1568327 1562725]
- [x86] pti: Rename X86_FEATURE_NOPTI to X86_FEATURE_PTI_SUPPORT (Waiman Long) [1568327 1562725]
- [x86] pti/32: Fix setup_trampoline_page_table() bug (Waiman Long) [1568327 1562725]
- [x86] entry: Remove extra argument in call instruction (Waiman Long) [1568332 1562552]
- [x86] syscall: Fix ia32_ptregs handling bug in 64-bit kernel (Waiman Long) [1568332 1562552]
- [x86] efi/64: Align efi_pgd on even page boundary (Waiman Long) [1568535 1558845]
- [x86] pgtable/pae: Revert 'Use separate kernel PMDs for user page-table' (Waiman Long) [1568535 1558845]
- [x86] pgtable/pae: Revert 'Unshare kernel PMDs when PTI is enabled' (Waiman Long) [1568535 1558845]
- [x86] mm: Dump both kernel & user page tables at fault (Waiman Long) [1568535 1558845]
- [x86] entry/32: Fix typo in PARANOID_EXIT_TO_KERNEL_MODE (Waiman Long) [1568535 1558845]

[2.6.32-696.26.1]
- [s390] qeth: check not more than 16 SBALEs on the completion queue (Hendrik Brueckner) [1557477 1520860]
- [x86] pti: Disable kaiser_add_mapping if X86_FEATURE_NOPTI (Waiman Long) [1561441 1557562] {CVE-2017-5754}
- [x86] irq/ioapic: Check for valid irq_cfg pointer in smp_irq_move_cleanup_interrupt (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] kexec/64: Clear control page after PGD init (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] efi/64: Fix potential PTI data corruption problem (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti/mm: Fix machine check with PTI on old AMD CPUs (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti/mm: Enable PAGE_GLOBAL if not affected by Meltdown (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] retpoline: Avoid retpolines for built-in __init functions (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] kexec/32: Allocate 8k PGD for PTI (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] spec_ctrl: Patch out lfence on old 32-bit CPUs (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] spec_ctrl/32: Enable IBRS processing on kernel entries & exits (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] spec_ctrl/32: Stuff RSB on kernel entry (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti: Allow CONFIG_PAGE_TABLE_ISOLATION for x86_32 (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti/32: Add a PAE specific version of __pti_set_user_pgd (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] mm/dump_pagetables: Support PAE page table dumping (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pgtable/pae: Use separate kernel PMDs for user page-table (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] mm/pae: Populate valid user PGD entries (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti: Enable x86-32 for kaiser.c (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti: Disable PCID handling in x86-32 TLB flushing code (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pgtable: Disable user PGD poisoning for PAE (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pgtable: Move more PTI functions out of pgtable_64.h (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pgtable: Move pgdp kernel/user conversion functions to pgtable.h (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pgtable/32: Allocate 8k page-tables when PTI is enabled (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pgtable/pae: Unshare kernel PMDs when PTI is enabled (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Handle debug exception similar to NMI (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Add PTI cr3 switch to non-NMI entry/exit points (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Add PTI cr3 switches to NMI handler code (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Introduce SAVE_ALL_NMI and RESTORE_ALL_NMI (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Enable the use of trampoline stack (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Change INT80 to be an interrupt gate (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Handle Entry from Kernel-Mode on Entry-Stack (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Leave the kernel via trampoline stack (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Enter the kernel via trampoline stack (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Restore segments before int registers (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Split off return-to-kernel path (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Unshare NMI return path (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Put ESPFIX code into a macro (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Load task stack from x86_tss.sp1 in SYSENTER handler (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Rename TSS_sysenter_sp0 to TSS_entry_stack (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] pti: Add X86_FEATURE_NOPTI to permanently disable PTI (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] entry/32: Simplify and fix up the SYSENTER stack #DB/NMI fixup (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] doublefault: Set the right gs register for doublefault (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] syscall: int80 must not clobber r12-15 (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] syscall: change ia32_syscall() to create the full register frame in ia32_do_call() (Waiman Long) [1553283 1550599] {CVE-2017-5754}
- [x86] cve: Make all Meltdown/Spectre percpu variables available to x86-32 (Waiman Long) [1553283 1550599] {CVE-2017-5754}

[2.6.32-696.25.1]
- [net] packet: Allow packets with only a header (but no payload) (Lorenzo Bianconi) [1557896 1535024]
- [net] packet: make packet too small warning match condition (Lorenzo Bianconi) [1557896 1535024]
- [net] packet: bail out of packet_snd() if L2 header creation fails (Lorenzo Bianconi) [1557896 1535024]
- [net] packet: make packet_snd fail on len smaller than l2 header (Lorenzo Bianconi) [1557896 1535024]
- [net] dccp: use-after-free in DCCP code (Stefano Brivio) [1520818 1520817] {CVE-2017-8824}
- [fs] nfsd: check for oversized NFSv2/v3 arguments (J. Bruce Fields) [1447640 1447641] {CVE-2017-7645}
- [netdrv] be2net: Fix UE detection logic for BE3 (Ivan Vecera) [1552706 1437991]
- [x86] skip check for spurious faults for non-present faults (Daniel Vacek) [1551471 1495167]
- [x86] mm: Fix boot crash caused by incorrect loop count calculation in sync_global_pgds() (Daniel Vacek) [1551471 1495167]
- [scsi] lpfc: Null pointer dereference when log_verbose is set to 0xffffffff (Dick Kennedy) [1540481 1538340]
- [mm] prevent concurrent unmap_mapping_range() on the same inode (Miklos Szeredi) [1538654 1408108]
- [s390] fix transactional execution control register handling (Hendrik Brueckner) [1538591 1520862]
- [netdrv] bnx2x: prevent crash when accessing PTP with interface down (Michal Schmidt) [1538586 1518669]
- [v4l] media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic fixup (Jarod Wilson) [1548429 1548432] {CVE-2017-13166}
- [v4l] media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic (Jarod Wilson) [1548429 1548432] {CVE-2017-13166}
- [net] netfilter: xt_TCPMSS: add more sanity tests on tcph->doff (Florian Westphal) [1543089 1543091] {CVE-2017-18017}
- [net] netfilter: xt_TCPMSS: fix handling of malformed TCP header and options (Florian Westphal) [1543089 1543091] {CVE-2017-18017}
- [net] netfilter: xt_TCPMSS: SYN packets are allowed to contain data (Florian Westphal) [1543089 1543091] {CVE-2017-18017}
- [net] bluetooth: Prevent uninitialized data (Gopal Tiwari) [1519627 1519626] {CVE-2017-1000410}

[2.6.32-696.24.1]
- [kernel] sched/core: Rework rq->clock update skips (Lauro Ramos Venancio) [1551475 1212959]
- [kernel] sched: Remove useless code in yield_to() (Lauro Ramos Venancio) [1551475 1212959]
- [kernel] sched: Set skip_clock_update in yield_task_fair() (Lauro Ramos Venancio) [1551475 1212959]
- [kernel] sched, rt: Update rq clock when unthrottling of an otherwise idle CPU (Lauro Ramos Venancio) [1551475 1212959]
- [kernel] lockdep: Fix lock_is_held() on recursion (Lauro Ramos Venancio) [1551475 1212959]
- [net] bonding: discard lowest hash bit for 802.3ad layer3+4 (Hangbin Liu) [1550103 1532167]


Related CVEs


CVE-2017-7645
CVE-2017-13166
CVE-2017-1000410
CVE-2017-18017
CVE-2018-8897
CVE-2017-8824

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (i386) kernel-2.6.32-696.28.1.el6.src.rpm50eb7b14097726aac63a43a11b6c2f6fad71fce3941b732cc8923376189d3699ELSA-2024-1831ol6_i386_latest
kernel-2.6.32-696.28.1.el6.src.rpm50eb7b14097726aac63a43a11b6c2f6fad71fce3941b732cc8923376189d3699ELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-696.28.1.el6.src.rpm50eb7b14097726aac63a43a11b6c2f6fad71fce3941b732cc8923376189d3699ELSA-2024-1831ol6_u9_i386_patch
kernel-2.6.32-696.28.1.el6.i686.rpm1af51a3ab44c85efa4d25fc64027b13baf2266b8ae89f84e67598137b8b3b80eELSA-2024-1831ol6_i386_latest
kernel-2.6.32-696.28.1.el6.i686.rpm1af51a3ab44c85efa4d25fc64027b13baf2266b8ae89f84e67598137b8b3b80eELSA-2024-1831ol6_i386_latest_archive
kernel-2.6.32-696.28.1.el6.i686.rpm1af51a3ab44c85efa4d25fc64027b13baf2266b8ae89f84e67598137b8b3b80eELSA-2024-1831ol6_u9_i386_patch
kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpmb9caf1c5841944c2836dea103be909851e06be662ba4178e84ccc4c00f316a4fELSA-2024-1831ol6_i386_latest
kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpmb9caf1c5841944c2836dea103be909851e06be662ba4178e84ccc4c00f316a4fELSA-2024-1831ol6_i386_latest_archive
kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpmb9caf1c5841944c2836dea103be909851e06be662ba4178e84ccc4c00f316a4fELSA-2024-1831ol6_u9_i386_patch
kernel-debug-2.6.32-696.28.1.el6.i686.rpm99b3cd58b4cb4a7909f3fbb9f125c3457645e2d3d53de861659797ba75f4f1dcELSA-2024-1831ol6_i386_latest
kernel-debug-2.6.32-696.28.1.el6.i686.rpm99b3cd58b4cb4a7909f3fbb9f125c3457645e2d3d53de861659797ba75f4f1dcELSA-2024-1831ol6_i386_latest_archive
kernel-debug-2.6.32-696.28.1.el6.i686.rpm99b3cd58b4cb4a7909f3fbb9f125c3457645e2d3d53de861659797ba75f4f1dcELSA-2024-1831ol6_u9_i386_patch
kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpmeb9a35294a3a549fe90b9bb19057218f677014a4a0334132585bd43b2afd4ad7ELSA-2024-1831ol6_i386_latest
kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpmeb9a35294a3a549fe90b9bb19057218f677014a4a0334132585bd43b2afd4ad7ELSA-2024-1831ol6_i386_latest_archive
kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpmeb9a35294a3a549fe90b9bb19057218f677014a4a0334132585bd43b2afd4ad7ELSA-2024-1831ol6_u9_i386_patch
kernel-devel-2.6.32-696.28.1.el6.i686.rpm9d091ad940b36c578cfaa5a53b86f6602158bd6b5b9479e248b8b230d0e489eaELSA-2024-1831ol6_i386_latest
kernel-devel-2.6.32-696.28.1.el6.i686.rpm9d091ad940b36c578cfaa5a53b86f6602158bd6b5b9479e248b8b230d0e489eaELSA-2024-1831ol6_i386_latest_archive
kernel-devel-2.6.32-696.28.1.el6.i686.rpm9d091ad940b36c578cfaa5a53b86f6602158bd6b5b9479e248b8b230d0e489eaELSA-2024-1831ol6_u9_i386_patch
kernel-doc-2.6.32-696.28.1.el6.noarch.rpm7dc394c521e5ee7a4f3fde8239db3bd4b7bc7c06319d9e7fdbdc840f3abfd21eELSA-2024-1831ol6_i386_latest
kernel-doc-2.6.32-696.28.1.el6.noarch.rpm7dc394c521e5ee7a4f3fde8239db3bd4b7bc7c06319d9e7fdbdc840f3abfd21eELSA-2024-1831ol6_i386_latest_archive
kernel-doc-2.6.32-696.28.1.el6.noarch.rpm7dc394c521e5ee7a4f3fde8239db3bd4b7bc7c06319d9e7fdbdc840f3abfd21eELSA-2024-1831ol6_u9_i386_patch
kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm33056552e4f7702ec3230bf64e4c5a1a3fb7902a1d0bad44bcf6b012819797e1ELSA-2024-1831ol6_i386_latest
kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm33056552e4f7702ec3230bf64e4c5a1a3fb7902a1d0bad44bcf6b012819797e1ELSA-2024-1831ol6_i386_latest_archive
kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm33056552e4f7702ec3230bf64e4c5a1a3fb7902a1d0bad44bcf6b012819797e1ELSA-2024-1831ol6_u9_i386_patch
kernel-headers-2.6.32-696.28.1.el6.i686.rpmfc5613693dde0f60033bc734511ab371afd5a8496f93a0a6dc805dba09cb9762ELSA-2024-1831ol6_i386_latest
kernel-headers-2.6.32-696.28.1.el6.i686.rpmfc5613693dde0f60033bc734511ab371afd5a8496f93a0a6dc805dba09cb9762ELSA-2024-1831ol6_i386_latest_archive
kernel-headers-2.6.32-696.28.1.el6.i686.rpmfc5613693dde0f60033bc734511ab371afd5a8496f93a0a6dc805dba09cb9762ELSA-2024-1831ol6_u9_i386_patch
perf-2.6.32-696.28.1.el6.i686.rpm7c61155cac02255f15377abc56787c6bc2f2560a72689cd02dbe3b225d2c8fd3ELSA-2024-1831ol6_i386_latest
perf-2.6.32-696.28.1.el6.i686.rpm7c61155cac02255f15377abc56787c6bc2f2560a72689cd02dbe3b225d2c8fd3ELSA-2024-1831ol6_i386_latest_archive
perf-2.6.32-696.28.1.el6.i686.rpm7c61155cac02255f15377abc56787c6bc2f2560a72689cd02dbe3b225d2c8fd3ELSA-2024-1831ol6_u9_i386_patch
python-perf-2.6.32-696.28.1.el6.i686.rpm1d83e5e3d7aaeee6e922cb1ce400b0e99b55ffc629ee0e0e8dd7ab48e4831e6dELSA-2024-1831ol6_i386_latest
python-perf-2.6.32-696.28.1.el6.i686.rpm1d83e5e3d7aaeee6e922cb1ce400b0e99b55ffc629ee0e0e8dd7ab48e4831e6dELSA-2024-1831ol6_i386_latest_archive
python-perf-2.6.32-696.28.1.el6.i686.rpm1d83e5e3d7aaeee6e922cb1ce400b0e99b55ffc629ee0e0e8dd7ab48e4831e6dELSA-2024-1831ol6_u9_i386_patch
Oracle Linux 6 (x86_64) kernel-2.6.32-696.28.1.el6.src.rpm50eb7b14097726aac63a43a11b6c2f6fad71fce3941b732cc8923376189d3699ELSA-2024-1831ol6_u9_x86_64_patch
kernel-2.6.32-696.28.1.el6.src.rpm50eb7b14097726aac63a43a11b6c2f6fad71fce3941b732cc8923376189d3699ELSA-2024-1831ol6_x86_64_latest
kernel-2.6.32-696.28.1.el6.src.rpm50eb7b14097726aac63a43a11b6c2f6fad71fce3941b732cc8923376189d3699ELSA-2024-1831ol6_x86_64_latest_archive
kernel-2.6.32-696.28.1.el6.x86_64.rpm2954c13de67b6934e03b4d3afe03b30f1c3fc09e9ad26c8231f5cb4ea90bd3ceELSA-2024-1831ol6_u9_x86_64_patch
kernel-2.6.32-696.28.1.el6.x86_64.rpm2954c13de67b6934e03b4d3afe03b30f1c3fc09e9ad26c8231f5cb4ea90bd3ceELSA-2024-1831ol6_x86_64_latest
kernel-2.6.32-696.28.1.el6.x86_64.rpm2954c13de67b6934e03b4d3afe03b30f1c3fc09e9ad26c8231f5cb4ea90bd3ceELSA-2024-1831ol6_x86_64_latest_archive
kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpmb9caf1c5841944c2836dea103be909851e06be662ba4178e84ccc4c00f316a4fELSA-2024-1831ol6_u9_x86_64_patch
kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpmb9caf1c5841944c2836dea103be909851e06be662ba4178e84ccc4c00f316a4fELSA-2024-1831ol6_x86_64_latest
kernel-abi-whitelists-2.6.32-696.28.1.el6.noarch.rpmb9caf1c5841944c2836dea103be909851e06be662ba4178e84ccc4c00f316a4fELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm5cf89b33c1f53af5206abeea73c8431b219e1f38c3c076ba79c76d36e622f79eELSA-2024-1831ol6_u9_x86_64_patch
kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm5cf89b33c1f53af5206abeea73c8431b219e1f38c3c076ba79c76d36e622f79eELSA-2024-1831ol6_x86_64_latest
kernel-debug-2.6.32-696.28.1.el6.x86_64.rpm5cf89b33c1f53af5206abeea73c8431b219e1f38c3c076ba79c76d36e622f79eELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpmeb9a35294a3a549fe90b9bb19057218f677014a4a0334132585bd43b2afd4ad7ELSA-2024-1831ol6_u9_x86_64_patch
kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpmeb9a35294a3a549fe90b9bb19057218f677014a4a0334132585bd43b2afd4ad7ELSA-2024-1831ol6_x86_64_latest
kernel-debug-devel-2.6.32-696.28.1.el6.i686.rpmeb9a35294a3a549fe90b9bb19057218f677014a4a0334132585bd43b2afd4ad7ELSA-2024-1831ol6_x86_64_latest_archive
kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm092de7762eaeb1ad3964113d5908afbe8d3330e1625e227705e79cb597a3b431ELSA-2024-1831ol6_u9_x86_64_patch
kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm092de7762eaeb1ad3964113d5908afbe8d3330e1625e227705e79cb597a3b431ELSA-2024-1831ol6_x86_64_latest
kernel-debug-devel-2.6.32-696.28.1.el6.x86_64.rpm092de7762eaeb1ad3964113d5908afbe8d3330e1625e227705e79cb597a3b431ELSA-2024-1831ol6_x86_64_latest_archive
kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm3fbaeaf5bb95126c13b3f410f56c2e0ef42df03ddb0f10cc40eaaeef79eaa265ELSA-2024-1831ol6_u9_x86_64_patch
kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm3fbaeaf5bb95126c13b3f410f56c2e0ef42df03ddb0f10cc40eaaeef79eaa265ELSA-2024-1831ol6_x86_64_latest
kernel-devel-2.6.32-696.28.1.el6.x86_64.rpm3fbaeaf5bb95126c13b3f410f56c2e0ef42df03ddb0f10cc40eaaeef79eaa265ELSA-2024-1831ol6_x86_64_latest_archive
kernel-doc-2.6.32-696.28.1.el6.noarch.rpm7dc394c521e5ee7a4f3fde8239db3bd4b7bc7c06319d9e7fdbdc840f3abfd21eELSA-2024-1831ol6_u9_x86_64_patch
kernel-doc-2.6.32-696.28.1.el6.noarch.rpm7dc394c521e5ee7a4f3fde8239db3bd4b7bc7c06319d9e7fdbdc840f3abfd21eELSA-2024-1831ol6_x86_64_latest
kernel-doc-2.6.32-696.28.1.el6.noarch.rpm7dc394c521e5ee7a4f3fde8239db3bd4b7bc7c06319d9e7fdbdc840f3abfd21eELSA-2024-1831ol6_x86_64_latest_archive
kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm33056552e4f7702ec3230bf64e4c5a1a3fb7902a1d0bad44bcf6b012819797e1ELSA-2024-1831ol6_u9_x86_64_patch
kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm33056552e4f7702ec3230bf64e4c5a1a3fb7902a1d0bad44bcf6b012819797e1ELSA-2024-1831ol6_x86_64_latest
kernel-firmware-2.6.32-696.28.1.el6.noarch.rpm33056552e4f7702ec3230bf64e4c5a1a3fb7902a1d0bad44bcf6b012819797e1ELSA-2024-1831ol6_x86_64_latest_archive
kernel-headers-2.6.32-696.28.1.el6.x86_64.rpmf5fee5c19e06cf99b9532724d72dfa51279b1b0cbb8e22346bd15982edaa5d6dELSA-2024-1831exadata_dbserver_12.2.1.1.8_x86_64_base
kernel-headers-2.6.32-696.28.1.el6.x86_64.rpmf5fee5c19e06cf99b9532724d72dfa51279b1b0cbb8e22346bd15982edaa5d6dELSA-2024-1831exadata_dbserver_18.1.6.0.0_x86_64_base
kernel-headers-2.6.32-696.28.1.el6.x86_64.rpmf5fee5c19e06cf99b9532724d72dfa51279b1b0cbb8e22346bd15982edaa5d6dELSA-2024-1831ol6_u9_x86_64_patch
kernel-headers-2.6.32-696.28.1.el6.x86_64.rpmf5fee5c19e06cf99b9532724d72dfa51279b1b0cbb8e22346bd15982edaa5d6dELSA-2024-1831ol6_x86_64_latest
kernel-headers-2.6.32-696.28.1.el6.x86_64.rpmf5fee5c19e06cf99b9532724d72dfa51279b1b0cbb8e22346bd15982edaa5d6dELSA-2024-1831ol6_x86_64_latest_archive
perf-2.6.32-696.28.1.el6.x86_64.rpm8df00ec2f7762cd85811fd769926da4a655dd6d10ef76371d2a8e27d16df271eELSA-2024-1831ol6_u9_x86_64_patch
perf-2.6.32-696.28.1.el6.x86_64.rpm8df00ec2f7762cd85811fd769926da4a655dd6d10ef76371d2a8e27d16df271eELSA-2024-1831ol6_x86_64_latest
perf-2.6.32-696.28.1.el6.x86_64.rpm8df00ec2f7762cd85811fd769926da4a655dd6d10ef76371d2a8e27d16df271eELSA-2024-1831ol6_x86_64_latest_archive
python-perf-2.6.32-696.28.1.el6.x86_64.rpma8da2de8e8ee4db4a271a1437b7eb962cc708a54350bef1c92a4bb57be228b84ELSA-2024-1831ol6_u9_x86_64_patch
python-perf-2.6.32-696.28.1.el6.x86_64.rpma8da2de8e8ee4db4a271a1437b7eb962cc708a54350bef1c92a4bb57be228b84ELSA-2024-1831ol6_x86_64_latest
python-perf-2.6.32-696.28.1.el6.x86_64.rpma8da2de8e8ee4db4a271a1437b7eb962cc708a54350bef1c92a4bb57be228b84ELSA-2024-1831ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete