Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2019-08-04 |
kernel
- 2.6.18-419.0.0.0.13
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Call VERW on NMI path when returning to user (Patrick Colp) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Fix verw usage to use memory operand (Patrick Colp) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Make cpu_matches() __cpuinit (Patrick Colp) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add mitigation mode VMWERV (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add sysfs reporting for MDS (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add mitigation control for MDS (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Improve coverage for MDS vulnerability (Boris Ostrovsky) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Clear CPU buffers on exit to user (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add mds_clear_cpu_buffers() (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add BUG_MSBDS_ONLY (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation/mds: Add basic bug infrastructure for MDS (Andi Kleen) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- x86/speculation: Consolidate CPU whitelists (Thomas Gleixner) [orabug 29821515] {CVE-2018-12126} {CVE-2018-12130} {CVE-2018-12127} {CVE-2019-11091}
- 2.6.18-419.0.0.0.12
- [x86] mm/dump_pagetables: Add a check_l1tf debugfs file (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] cpu: Make flush_l1d visible in /proc/cpuinfo (Chris von Recklinghausen) [1593378]
- [x86] cpufeatures: Add detection of L1D cache flush support. (Chris von Recklinghausen) [1593378]
- [x86] l1tf: protect _PAGE_FILE PTEs against speculation (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Extend 64bit swap file size limit (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] bugs: Move the l1tf function and define pr_fmt properly (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Limit swap file size to MAX_PA/2 (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Add sysfs reporting for l1tf (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect PROT_NONE PTEs against speculation (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Protect swap entries against L1TF (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Change order of offset/type in swap entry (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] cpu: Fix incorrect vulnerabilities files function prototypes (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] bugs: Export the internal __cpu_bugs variable (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] spec_ctrl: sync with upstream cpu_set_bug_bits() (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] intel-family.h: Add GEMINI_LAKE SOC (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] mm: Fix swap entry comment and macro (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] mm: Move swap offset/type up in PTE to work around erratum (Chris von Recklinghausen) [1593378] {CVE-2018-3620}
- [x86] cpufeatures: Resolve X86_FEATURE_SMEP definition conflict (Radomir Vrbovsky) [1570474]
- [x86] fix kexec load warnings with PTI enabled (Rafael Aquini) [1576191]
- [x86] ia32entry: make target ia32_ret_from_sys_call the common exit point to long-mode (Rafael Aquini) [1570474] {CVE-2009-2910}
- [x86] spec_ctrl: only perform RSB stuffing on SMEP capable CPUs (Rafael Aquini) [1570474] {CVE-2009-2910}
- [net] tcp: fix 0 divide in __tcp_select_window (Davide Caratti) [1488343] {CVE-2017-14106}
- [net] tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0 (Davide Caratti) [1488343] {CVE-2017-14106}
- [x86] adjust / fix LDT handling for PTI (Rafael Aquini) [1584622]
- [x86] Fix up /proc/cpuinfo entries (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [kernel] spec_ctrl: work around broken microcode (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] Only expose PR_{GET, SET}_SPECULATION_CTRL if CONFIG_SPEC_CTRL is defined (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] misc changes to fix i386 builds (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] amd: Disable AMD SSBD mitigation in a VM (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] spec_ctrl: add support for SSBD to RHEL IBRS entry/exit macros (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Rename _RDS to _SSBD (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] speculation: Add prctl for Speculative Store Bypass mitigation (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] process: Allow runtime control of Speculative Store Bypass (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] 64: add skeletonized version of __switch_to_xtra (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [kernel] prctl: Add speculation control prctls (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs/AMD: Add support to disable RDS on Fam[15, 16, 17]h if requested (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] spec_ctrl: Sync up RDS setting with IBRS code (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Provide boot parameters for the spec_store_bypass_disable mitigation (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Expose the /sys/../spec_store_bypass and X86_BUG_SPEC_STORE_BYPASS (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] include: add latest intel-family.h from RHEL6 (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] spec_ctrl: Use separate PCP variables for IBRS entry and exit (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpuid: Fix up IBRS/IBPB/STIBP feature bits on Intel (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpufeatures: Clean up Spectre v2 related CPUID flags (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpufeatures: Add AMD feature bits for Speculation Control (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpufeatures: Add Intel feature bits for Speculation (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- [x86] cpu: Add driver auto probing for x86 features (Chris von Recklinghausen) [1566896] {CVE-2018-3639}
- 2.6.18-419.0.0.0.11
- x86_64/entry: Don't use IST entry for #BP stack [orabug 28452062] {CVE-2018-8897}
- 2.6.18-419.0.0.0.10
- Backport CVE-2017-5715 to RHCK/OL5 [orabug 27787723]
- 2.6.18-419.0.0.0.9
- rebuild with retpoline compiler
- 2.6.18-419.0.0.0.8
- Backport CVEs to RHCK/OL5 [orabug 27547712] {CVE-2017-5753} {CVE-2017-5754}
- 2.6.18-419.0.0.0.5
- [fs] fix kernel panic on boot on ia64 guests (Honglei Wang) [orabug 26934100]
- 2.6.18-419.0.0.0.4
- [fs] fix bug in loading of PIE binaries (Michael Davidson) [orabug 26916951] {CVE-2017-1000253}
- 2.6.18-419.0.0.0.3
- nfsd: stricter decoding of write-like NFSv2/v3 ops (J. Bruce Fields) [orabug 26586706] {CVE-2017-7895}
CVE-2018-12130 |
CVE-2018-12127 |
CVE-2019-11091 |
CVE-2018-12126 |
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 5 (i386) | kernel-2.6.18-419.0.0.0.13.el5.src.rpm | 92cab293c0e0929e516e4107a7edb61e16836f41da929cbb4ee39fdec4e8bbea | ELSA-2019-4732 | ol5_i386_ELS |
ocfs2-2.6.18-419.0.0.0.13.el5-1.4.11-1.el5.src.rpm | 336de5dbd6c34ac4d7f212992b8920dba138d6f5d8a0d6d8d27fabe93d342a31 | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5-2.0.5-2.el5.src.rpm | f48d4d13ae84e9640763781161a1b6707fb2ed6236adc300b6422ba2e76318d8 | - | ol5_i386_ELS | |
kernel-2.6.18-419.0.0.0.13.el5.i686.rpm | 881b2543d198a9fa3ca8cb1a5626406c3b92fbe5874e0664e6976101f24b27bb | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-PAE-2.6.18-419.0.0.0.13.el5.i686.rpm | a19157e5709f55f69d01c8a75412e8ac0e72679a90ba985a7ff5b92997ac658e | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-PAE-devel-2.6.18-419.0.0.0.13.el5.i686.rpm | 986871f9bf660a3f0f305c7e39f86f17d978e90a1abf97ce047370cbc709ff21 | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-debug-2.6.18-419.0.0.0.13.el5.i686.rpm | 76c7ef3d2a54ac5aa2e89c1330805a332d62d2c3f17bde8b96ea10d8518b763b | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-debug-devel-2.6.18-419.0.0.0.13.el5.i686.rpm | 0a99d364494e5d8151ccdaeecd3c5fa813feabe2c18261fec8be754d7c8e630b | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-devel-2.6.18-419.0.0.0.13.el5.i686.rpm | e1a0c76ff9490560028818eb49e9a7e44fe54e56d15896f7ee17a87f5735144b | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-doc-2.6.18-419.0.0.0.13.el5.noarch.rpm | 185303f80d3d08c215bd31e1a853bdc2d1b1deb314e84c9597ba33bdf3e26194 | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-headers-2.6.18-419.0.0.0.13.el5.i386.rpm | aaa6fc267f427230ba0418c4069b66f4c6096aab8ff203ed1256a1a8ab60b13b | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-xen-2.6.18-419.0.0.0.13.el5.i686.rpm | d711f77e6f307c92d7e107a287c8804828b9a6470d45eb6f54b758fe2602cc4b | ELSA-2019-4732 | ol5_i386_ELS | |
kernel-xen-devel-2.6.18-419.0.0.0.13.el5.i686.rpm | 2b67a0f20a7aafe73d63befaf107d9689aab1f19390e1ffc0e256f6ac2b98904 | ELSA-2019-4732 | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5-1.4.11-1.el5.i686.rpm | 4b6a2ef602180126976bab3986c4a3c28105e40abf4bcb1a12f828aad33e11a0 | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5PAE-1.4.11-1.el5.i686.rpm | b75083e49f82127ba28f9e00c26cf12c545c27fae07ce68211927eca40f3019c | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5debug-1.4.11-1.el5.i686.rpm | 0216071aa34648dea67d89dab770e9a593f9903f680be7b611fb351b3802c2d2 | - | ol5_i386_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5xen-1.4.11-1.el5.i686.rpm | fdf0c9c094d03946ac00bc79f39cd9e5aa877a0caa8ef5e58515b0ec737d6ecb | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5-2.0.5-2.el5.i686.rpm | 05e52f8c734d9c13ff0f1a41b790f29661632f974d67d58dc7644c714fdf25c4 | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5PAE-2.0.5-2.el5.i686.rpm | 9e6d2c8d0fdc2917da0c254dabc9b4627b4565fa291b16cd2f394515f61dc6b8 | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5debug-2.0.5-2.el5.i686.rpm | f8923b6b428fc31fc6e541bee65316e6584272288bcca3f89efdfed2c6f8fb2f | - | ol5_i386_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5xen-2.0.5-2.el5.i686.rpm | 6a40d2dd55319afb48d076a5c92a5fb2863c9dd99249d39377956b7d409eb127 | - | ol5_i386_ELS | |
Oracle Linux 5 (ia64) | kernel-2.6.18-419.0.0.0.13.el5.src.rpm | 92cab293c0e0929e516e4107a7edb61e16836f41da929cbb4ee39fdec4e8bbea | ELSA-2019-4732 | ol5_ia64_ELS |
ocfs2-2.6.18-419.0.0.0.13.el5-1.4.11-1.el5.src.rpm | 336de5dbd6c34ac4d7f212992b8920dba138d6f5d8a0d6d8d27fabe93d342a31 | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5-2.0.5-2.el5.src.rpm | f48d4d13ae84e9640763781161a1b6707fb2ed6236adc300b6422ba2e76318d8 | - | ol5_ia64_ELS | |
kernel-2.6.18-419.0.0.0.13.el5.ia64.rpm | b6caf7d610df38087287aa7be8c83e9e81871b3e324e634952115571c5121ca3 | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-debug-2.6.18-419.0.0.0.13.el5.ia64.rpm | c0e7299f04476fe9c241f55e3a24cbbb188ff73839d24c55fcfbbd7690a3a2cd | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-debug-devel-2.6.18-419.0.0.0.13.el5.ia64.rpm | 31560f6cb4361027d1772da154ea739c1ff136404c06670ce7e0595725e05585 | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-devel-2.6.18-419.0.0.0.13.el5.ia64.rpm | fd0de42dc5ecf277bd997ec9efe61f08610ca965f9b068739ae5f86932beb309 | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-doc-2.6.18-419.0.0.0.13.el5.noarch.rpm | 185303f80d3d08c215bd31e1a853bdc2d1b1deb314e84c9597ba33bdf3e26194 | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-headers-2.6.18-419.0.0.0.13.el5.ia64.rpm | 6b718c7af30023c499344f5a9c31889275e149c33480d1ba8419bc9e92f41fbc | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-xen-2.6.18-419.0.0.0.13.el5.ia64.rpm | 1315d5843cb0effbd8de725a8f2627f222dc7cfe9b77f90e679400252b3eaf9e | ELSA-2019-4732 | ol5_ia64_ELS | |
kernel-xen-devel-2.6.18-419.0.0.0.13.el5.ia64.rpm | e1220ae57f2f606fbd6a1a0597674aee04638bc20fcb6016417e2c73a19bcbe5 | ELSA-2019-4732 | ol5_ia64_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5-1.4.11-1.el5.ia64.rpm | 63812bdde569d91685787baf878367a0c925e55cdd01f0deb28bd241f6833307 | - | ol5_ia64_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5debug-1.4.11-1.el5.ia64.rpm | 150391a897eb9f669f9fa2907780dd85e41eea9c68cfefd4d45f8d5e499233d1 | - | ol5_ia64_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5xen-1.4.11-1.el5.ia64.rpm | 28543cfce5c941458531ed561c5f8ea14884a02cc0d21fb5a131ebd48c12da8f | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5-2.0.5-2.el5.ia64.rpm | ea7720959f4256b918621419936315e7e5d5c82912ae548e4db9bbda05b157b3 | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5debug-2.0.5-2.el5.ia64.rpm | 55d27b4626fe2056641625dab4d922ac24e386f2389e9fd348abdab909606652 | - | ol5_ia64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5xen-2.0.5-2.el5.ia64.rpm | 206eb1135d867e0d0ed2ba2d168f52bb6b4efcafbe0fa331dedcb062f60b407a | - | ol5_ia64_ELS | |
Oracle Linux 5 (x86_64) | kernel-2.6.18-419.0.0.0.13.el5.src.rpm | 92cab293c0e0929e516e4107a7edb61e16836f41da929cbb4ee39fdec4e8bbea | ELSA-2019-4732 | ol5_x86_64_ELS |
ocfs2-2.6.18-419.0.0.0.13.el5-1.4.11-1.el5.src.rpm | 336de5dbd6c34ac4d7f212992b8920dba138d6f5d8a0d6d8d27fabe93d342a31 | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5-2.0.5-2.el5.src.rpm | f48d4d13ae84e9640763781161a1b6707fb2ed6236adc300b6422ba2e76318d8 | - | ol5_x86_64_ELS | |
kernel-2.6.18-419.0.0.0.13.el5.x86_64.rpm | 2de98affb907ae14025a706c096ab160be79de443c011d2f82194726fc1e6b86 | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-debug-2.6.18-419.0.0.0.13.el5.x86_64.rpm | a3e7247b169d0f3ab29ee4ffb52ab456e631767fbc2df35f27e704e1c5b88a92 | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-debug-devel-2.6.18-419.0.0.0.13.el5.x86_64.rpm | 7978fa70f83c8419761d89c214a493178c197ede9b6d16fa4d2b61ca8575d5cc | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-devel-2.6.18-419.0.0.0.13.el5.x86_64.rpm | 91cdc5c229f014fcd365c237ba31aa8ee9a53feb91a47d0b29b13e10f8f70006 | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-doc-2.6.18-419.0.0.0.13.el5.noarch.rpm | 185303f80d3d08c215bd31e1a853bdc2d1b1deb314e84c9597ba33bdf3e26194 | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-headers-2.6.18-419.0.0.0.13.el5.x86_64.rpm | 877e3e8edb6afca46b8f96d36b0eba9028c57914f6dce69706ebabe2ce5beed2 | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-xen-2.6.18-419.0.0.0.13.el5.x86_64.rpm | ee5ec4accb877e1ea5a4ce218fbd679ca8a8e8e0df2cce061e2dc679d3363dce | ELSA-2019-4732 | ol5_x86_64_ELS | |
kernel-xen-devel-2.6.18-419.0.0.0.13.el5.x86_64.rpm | e9df659af0eb3dbfe297efb899f1cf995855be39ffe901faafa7caf86337e874 | ELSA-2019-4732 | ol5_x86_64_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5-1.4.11-1.el5.x86_64.rpm | 2d4001f2b31d85608cecdc1ee1103c37ad3bf735128cccf03fba66f67a917aec | - | ol5_x86_64_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5debug-1.4.11-1.el5.x86_64.rpm | 79cbf40274ddb9690d07c1aa61097ceb9e77d3494d32dcd97ab49c8baf1cd400 | - | ol5_x86_64_ELS | |
ocfs2-2.6.18-419.0.0.0.13.el5xen-1.4.11-1.el5.x86_64.rpm | d7216bb7304e784f5c3d74508fd5915c230fa90c49829d395632cb6334dec50d | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5-2.0.5-2.el5.x86_64.rpm | ca69d66ddaad8daa188d614cbab6f15d73e7134785eff6fd0a063a27b6381f70 | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5debug-2.0.5-2.el5.x86_64.rpm | 844ecb29db36693344665b7ad8025a9566e2494854e61d73ada043f55a799bbf | - | ol5_x86_64_ELS | |
oracleasm-2.6.18-419.0.0.0.13.el5xen-2.0.5-2.el5.x86_64.rpm | f7aa69629b217ca67d6c6d23c8e445c14de2629e3ee4a8ecf0822ce1e07539ce | - | ol5_x86_64_ELS |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team