ELSA-2022-9590

ELSA-2022-9590 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2022-07-12

Description


[5.15.0-0.30.20]
- floppy: use a statically allocated error counter (Willy Tarreau) [Orabug: 34218638] {CVE-2022-1652}
- x86: Disable RET on kexec (Konrad Rzeszutek Wilk) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: do not enable IBPB-on-entry when IBPB is not supported (Thadeu Lima de Souza Cascardo) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- arm64: proton-pack: provide vulnerability file value for RETBleed (James Morse) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/cpu/amd: Enumerate BTC_NO (Andrew Cooper) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/common: Stamp out the stepping madness (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- KVM: VMX: Prevent RSB underflow before vmenter (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Fill RSB on vmexit for IBRS (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- KVM: VMX: Fix IBRS handling after vmexit (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- KVM: VMX: Convert launched argument to flags (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- KVM: VMX: Flatten __vmx_vcpu_run() (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- objtool: Re-add UNWIND_HINT_{SAVE_RESTORE} (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Remove x86_spec_ctrl_mask (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Fix SPEC_CTRL write on SMT state change (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Fix firmware entry SPEC_CTRL handling (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/cpu/amd: Add Spectral Chicken (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- objtool: Add entry UNRET validation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Do IBPB fallback check only once (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Add retbleed=ibpb (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/xen: Rename SYS* entry points (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- objtool: Update Retpoline validation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- intel_idle: Disable IBRS during long idle (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Report Intel retbleed vulnerability (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation() (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS (Pawan Gupta) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Optimize SPEC_CTRL MSR writes (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/entry: Add kernel IBRS implementation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Enable STIBP for JMP2RET (Kim Phillips) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Add AMD retbleed= boot parameter (Alexandre Chartre) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bugs: Report AMD retbleed vulnerability (Alexandre Chartre) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86: Add magic AMD return-thunk (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- objtool: Treat .text.__x86.* as noinstr (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86: Use return-thunk in asm code (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/sev: Avoid using __x86_return_thunk (Kim Phillips) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/vsyscall_emu/64: Don't use RET in vsyscall emulation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/kvm: Fix SETcc emulation for return thunks (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/bpf: Use alternative RET encoding (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/ftrace: Use alternative RET encoding (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86,static_call: Use alternative RET encoding (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86,objtool: Create .return_sites (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86: Undo return-thunk damage (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/retpoline: Use -mfunction-return (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/retpoline: Swizzle retpoline thunk (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/retpoline: Cleanup some #ifdefery (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/cpufeatures: Move RETPOLINE flags to word 11 (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/kvm/vmx: Make noinstr clean (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/entry: Remove skip_r11rcx (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/entry: Fix register corruption in compat syscall (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/entry: Use PUSH_AND_CLEAR_REGS for compat (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/entry: Simplify entry_INT80_compat() (Linus Torvalds) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/mm: Simplify RESERVE_BRK() (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- crypto: x86/poly1305 - Fixup SLS (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86,static_call: Fix __static_call_return0 for i386 (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- kvm/emulate: Fix SETcc emulation function offsets with SLS (Borislav Petkov) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- objtool: Default ignore INT3 for unreachable (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/ibt,paravirt: Use text_gen_insn() for paravirt_patch() (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86: Add straight-line-speculation mitigation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- objtool: Add straight-line-speculation validation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86: Prepare inline-asm for straight-line-speculation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86: Prepare asm files for straight-line-speculation (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/lib/atomic64_386_32: Rename things (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/alternative: Relax text_poke_bp() constraint (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- static_call,x86: Robustify trampoline patching (Peter Zijlstra) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}
- x86/xen: Move hypercall_page to top of the file (Josh Poimboeuf) [Orabug: 34335631] {CVE-2022-29901} {CVE-2022-23816}


Related CVEs


CVE-2022-29901
CVE-2022-23816
CVE-2022-1652

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) kernel-uek-5.15.0-0.30.20.el8uek.src.rpm2f3b76d2f73f9eeeff6ffb043c11658175e454138570f23651e743261f6acd45-ol8_aarch64_UEKR7
bpftool-5.15.0-0.30.20.el8uek.aarch64.rpmc120f917bbe1a87a3e9478794a7fcf08f9a0cebe7d650defdbdbc42a3df26d55-ol8_aarch64_UEKR7
kernel-uek-5.15.0-0.30.20.el8uek.aarch64.rpmfa917916a678c6a41ce6183d0d9b9cc8ccc66d060efcc0fcf3cf6ba3cabb203d-ol8_aarch64_UEKR7
kernel-uek-core-5.15.0-0.30.20.el8uek.aarch64.rpmcbb065be11c66201ca0a464083015d77458ab168472078580dc62d80610f9edd-ol8_aarch64_UEKR7
kernel-uek-debug-5.15.0-0.30.20.el8uek.aarch64.rpmbbc6529f1c9f3dbd2fa161535c363891df88e71673e253ca66886c26f45cc1ae-ol8_aarch64_UEKR7
kernel-uek-debug-core-5.15.0-0.30.20.el8uek.aarch64.rpmf1b72c0b150cae1174cbd5b1dee2f24a7d309dcfa5bcb52318d6c6eb880f8004-ol8_aarch64_UEKR7
kernel-uek-debug-devel-5.15.0-0.30.20.el8uek.aarch64.rpmffbbd04b0b9dc2e94a0a78598e5f7769859b0a26679bd1fdb736cbc98476fad1-ol8_aarch64_UEKR7
kernel-uek-debug-modules-5.15.0-0.30.20.el8uek.aarch64.rpm47914e473a4e6f4a19a571881170fc9b78931185ed4681378249bb3efc863fc2-ol8_aarch64_UEKR7
kernel-uek-debug-modules-extra-5.15.0-0.30.20.el8uek.aarch64.rpm81e6041ba2f275773ac79247be8127257a59301dedc02bbe491d1fd874728da6-ol8_aarch64_UEKR7
kernel-uek-devel-5.15.0-0.30.20.el8uek.aarch64.rpm631a433f455dc541cf3b450c9e6b73e89baa3fe0b39482b30be411cb2f916abf-ol8_aarch64_UEKR7
kernel-uek-doc-5.15.0-0.30.20.el8uek.noarch.rpmf1bf187f87e0bd5ca2a8f40209aea80c2050649b17d3de12d8c328439d4029d2-ol8_aarch64_UEKR7
kernel-uek-modules-5.15.0-0.30.20.el8uek.aarch64.rpm0d8b70751024bd99dbda3bfaef52df0f2b52d1455a1700ea4fd537629cf8f6c3-ol8_aarch64_UEKR7
kernel-uek-modules-extra-5.15.0-0.30.20.el8uek.aarch64.rpm455206e09e777aa8e563b8e0866a0eb91698db728b8a9bd5606130d82fa26884-ol8_aarch64_UEKR7
Oracle Linux 8 (x86_64) kernel-uek-5.15.0-0.30.20.el8uek.src.rpm2f3b76d2f73f9eeeff6ffb043c11658175e454138570f23651e743261f6acd45-ol8_x86_64_UEKR7
bpftool-5.15.0-0.30.20.el8uek.x86_64.rpm5f856312fb6a954934d5bfa44901c7ae469659485c30ad4d040869b2d9a44a6b-ol8_x86_64_UEKR7
kernel-uek-5.15.0-0.30.20.el8uek.x86_64.rpme2492c38993bb712ec7cd50690afe83db0b0e32127fc84adee0581b8c875014b-ol8_x86_64_UEKR7
kernel-uek-core-5.15.0-0.30.20.el8uek.x86_64.rpm796339aa35b9b80dee98a45023025d9bea23b3c4a0cb23aaa06da9b0c9065e2f-ol8_x86_64_UEKR7
kernel-uek-debug-5.15.0-0.30.20.el8uek.x86_64.rpmfaa3f400e264d32f4126ab8d1d8322cb5e1d2815d74f0b765d76e6cf28b0cfbd-ol8_x86_64_UEKR7
kernel-uek-debug-core-5.15.0-0.30.20.el8uek.x86_64.rpm58638c81728d041f643be2c40f5e36896f012bd0d968d09f58ea5e79c179103d-ol8_x86_64_UEKR7
kernel-uek-debug-devel-5.15.0-0.30.20.el8uek.x86_64.rpm88e8fe1582e33379746aefcbc5b64d87b27c1542ba05c677251dd9ece6195b2f-ol8_x86_64_UEKR7
kernel-uek-debug-modules-5.15.0-0.30.20.el8uek.x86_64.rpm0e193b2891f0b4ce09fda27fc7598820100f6c1dee2a43ba6ac8195dc549c9a8-ol8_x86_64_UEKR7
kernel-uek-debug-modules-extra-5.15.0-0.30.20.el8uek.x86_64.rpmea2633d024a3b55ca923cb0c9a2a8dc4802e2097751d7d5b6b09ef65b6dbb893-ol8_x86_64_UEKR7
kernel-uek-devel-5.15.0-0.30.20.el8uek.x86_64.rpm95372c3a4df0c7b324e9dca12a4a9adbb5d3406af0c694153ef314db2d4faa34-ol8_x86_64_UEKR7
kernel-uek-doc-5.15.0-0.30.20.el8uek.noarch.rpmf1bf187f87e0bd5ca2a8f40209aea80c2050649b17d3de12d8c328439d4029d2-ol8_x86_64_UEKR7
kernel-uek-modules-5.15.0-0.30.20.el8uek.x86_64.rpm128c6c8d90590c56ffcca4ba895d33774b71dcc7ba267b9f790595e5ab7fd41a-ol8_x86_64_UEKR7
kernel-uek-modules-extra-5.15.0-0.30.20.el8uek.x86_64.rpmf9a96296e83f695292eaafc150cf923da4d0e3e1c4ff0c4e75bd3cdef4ca4817-ol8_x86_64_UEKR7
Oracle Linux 9 (aarch64) kernel-uek-5.15.0-0.30.20.el9uek.src.rpm6bed34043870a2dab7c84222e3f33f440f3e1183ca69b96001908495d35d3091-ol9_aarch64_baseos_latest
kernel-uek-5.15.0-0.30.20.el9uek.src.rpm6bed34043870a2dab7c84222e3f33f440f3e1183ca69b96001908495d35d3091-ol9_aarch64_u0_baseos_patch
bpftool-5.15.0-0.30.20.el9uek.aarch64.rpmba06bdf79d8753365bca7885ccce9754fb7b68dc383e26b09e44b23ec402912a-ol9_aarch64_baseos_latest
bpftool-5.15.0-0.30.20.el9uek.aarch64.rpmba06bdf79d8753365bca7885ccce9754fb7b68dc383e26b09e44b23ec402912a-ol9_aarch64_u0_baseos_patch
kernel-uek-5.15.0-0.30.20.el9uek.aarch64.rpm1947126dcbc60503cf47cf9d4025c6bfa4cc4599b313f1d2c24aecc7f9dbc986-ol9_aarch64_baseos_latest
kernel-uek-5.15.0-0.30.20.el9uek.aarch64.rpm1947126dcbc60503cf47cf9d4025c6bfa4cc4599b313f1d2c24aecc7f9dbc986-ol9_aarch64_u0_baseos_patch
kernel-uek-core-5.15.0-0.30.20.el9uek.aarch64.rpmc49b85e6488fb0433361e198e9dc47af07f8ab61a12ed593757d6ed1ff483972-ol9_aarch64_baseos_latest
kernel-uek-core-5.15.0-0.30.20.el9uek.aarch64.rpmc49b85e6488fb0433361e198e9dc47af07f8ab61a12ed593757d6ed1ff483972-ol9_aarch64_u0_baseos_patch
kernel-uek-debug-5.15.0-0.30.20.el9uek.aarch64.rpm68ef2de7dcc2286e5b747a49d6ce7b89728cf9020efeba634f372b0deb8ad108-ol9_aarch64_baseos_latest
kernel-uek-debug-5.15.0-0.30.20.el9uek.aarch64.rpm68ef2de7dcc2286e5b747a49d6ce7b89728cf9020efeba634f372b0deb8ad108-ol9_aarch64_u0_baseos_patch
kernel-uek-debug-core-5.15.0-0.30.20.el9uek.aarch64.rpm0aaaea1e94469e2e70bfb26db8dc507e4700993308b48ff187f311f1b260d55f-ol9_aarch64_baseos_latest
kernel-uek-debug-core-5.15.0-0.30.20.el9uek.aarch64.rpm0aaaea1e94469e2e70bfb26db8dc507e4700993308b48ff187f311f1b260d55f-ol9_aarch64_u0_baseos_patch
kernel-uek-debug-devel-5.15.0-0.30.20.el9uek.aarch64.rpmd440ccfc1869e01019c473ea6f616d7aa0f16e7158a0b884339752762a191e48-ol9_aarch64_baseos_latest
kernel-uek-debug-devel-5.15.0-0.30.20.el9uek.aarch64.rpmd440ccfc1869e01019c473ea6f616d7aa0f16e7158a0b884339752762a191e48-ol9_aarch64_u0_baseos_patch
kernel-uek-debug-modules-5.15.0-0.30.20.el9uek.aarch64.rpm6661194d3e50b81dbf695ebe7d4d0b4751b05e9473876a5048c8c8bbecb79de0-ol9_aarch64_baseos_latest
kernel-uek-debug-modules-5.15.0-0.30.20.el9uek.aarch64.rpm6661194d3e50b81dbf695ebe7d4d0b4751b05e9473876a5048c8c8bbecb79de0-ol9_aarch64_u0_baseos_patch
kernel-uek-debug-modules-extra-5.15.0-0.30.20.el9uek.aarch64.rpma21ad3d6ad21ae188f49a1be60dbacbfd3e31ca39af00a9f87d3d9f3086a94cd-ol9_aarch64_baseos_latest
kernel-uek-debug-modules-extra-5.15.0-0.30.20.el9uek.aarch64.rpma21ad3d6ad21ae188f49a1be60dbacbfd3e31ca39af00a9f87d3d9f3086a94cd-ol9_aarch64_u0_baseos_patch
kernel-uek-devel-5.15.0-0.30.20.el9uek.aarch64.rpm4f1fb1afb83c0b952e83174e19c72956e94c5d45c696233f700ab837dad38d5f-ol9_aarch64_baseos_latest
kernel-uek-devel-5.15.0-0.30.20.el9uek.aarch64.rpm4f1fb1afb83c0b952e83174e19c72956e94c5d45c696233f700ab837dad38d5f-ol9_aarch64_u0_baseos_patch
kernel-uek-doc-5.15.0-0.30.20.el9uek.noarch.rpm571ad5350b49fb8ec67ee4bc68872eb518ab1a5cafac3fd7b4e331d6acc28776-ol9_aarch64_baseos_latest
kernel-uek-doc-5.15.0-0.30.20.el9uek.noarch.rpm571ad5350b49fb8ec67ee4bc68872eb518ab1a5cafac3fd7b4e331d6acc28776-ol9_aarch64_u0_baseos_patch
kernel-uek-modules-5.15.0-0.30.20.el9uek.aarch64.rpma713b5cd672880e7e4f2580bdf8985453073114231f779338576a8758e135abe-ol9_aarch64_baseos_latest
kernel-uek-modules-5.15.0-0.30.20.el9uek.aarch64.rpma713b5cd672880e7e4f2580bdf8985453073114231f779338576a8758e135abe-ol9_aarch64_u0_baseos_patch
kernel-uek-modules-extra-5.15.0-0.30.20.el9uek.aarch64.rpm97eb922575211c4259b6110152c4f84a07af45bdaf516be13bc4d6a654014182-ol9_aarch64_baseos_latest
kernel-uek-modules-extra-5.15.0-0.30.20.el9uek.aarch64.rpm97eb922575211c4259b6110152c4f84a07af45bdaf516be13bc4d6a654014182-ol9_aarch64_u0_baseos_patch
Oracle Linux 9 (x86_64) kernel-uek-5.15.0-0.30.20.el9uek.src.rpm6bed34043870a2dab7c84222e3f33f440f3e1183ca69b96001908495d35d3091-ol9_x86_64_UEKR7
bpftool-5.15.0-0.30.20.el9uek.x86_64.rpmfdc3203bc8907dd8f4b6e8c38d4a2429de518601511241cf803dcef543aa1916-ol9_x86_64_UEKR7
kernel-uek-5.15.0-0.30.20.el9uek.x86_64.rpm47478a6ebe7ba0966c7079d2fe56820e261f5d4a094ee744d31d9dd7481cebdf-ol9_x86_64_UEKR7
kernel-uek-core-5.15.0-0.30.20.el9uek.x86_64.rpm41b53445ee068f25ef5332c3efdcf17749b75c4c600858237f8cbd99acda3460-ol9_x86_64_UEKR7
kernel-uek-debug-5.15.0-0.30.20.el9uek.x86_64.rpm05f01145681cc85563db399bd96d64741da15a050e89cbdab0e34756fa25fa84-ol9_x86_64_UEKR7
kernel-uek-debug-core-5.15.0-0.30.20.el9uek.x86_64.rpm1b8c8b9635e138f1b65dfc16d6777d02357b04c38f7f848e35afbf5a6f171d59-ol9_x86_64_UEKR7
kernel-uek-debug-devel-5.15.0-0.30.20.el9uek.x86_64.rpm71582d002309def6147322f3af03161b5f5b4db5f5c6e0d437d2bb7de2792f7c-ol9_x86_64_UEKR7
kernel-uek-debug-modules-5.15.0-0.30.20.el9uek.x86_64.rpm9196f18f48a52e1a957017689cd02b8eb6f5d1a8079c7388ea1e94ae04440c3b-ol9_x86_64_UEKR7
kernel-uek-debug-modules-extra-5.15.0-0.30.20.el9uek.x86_64.rpmb6bd5933326678f82da2c83e05218a1a05c236f494dc2175df33579be801b74d-ol9_x86_64_UEKR7
kernel-uek-devel-5.15.0-0.30.20.el9uek.x86_64.rpm07dadb4ed26f57cc67749829f5a8ebae2b4618ebebbac089d49700fea8674a6f-ol9_x86_64_UEKR7
kernel-uek-doc-5.15.0-0.30.20.el9uek.noarch.rpm571ad5350b49fb8ec67ee4bc68872eb518ab1a5cafac3fd7b4e331d6acc28776-ol9_x86_64_UEKR7
kernel-uek-modules-5.15.0-0.30.20.el9uek.x86_64.rpm445164815c421de690aa58a344237146dd7e5a8853249ceea31dec1adda8da03-ol9_x86_64_UEKR7
kernel-uek-modules-extra-5.15.0-0.30.20.el9uek.x86_64.rpm2bf172af10bbccb757436f0a46c6e6aa4bddcdf0750c68940da38393cb384022-ol9_x86_64_UEKR7



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete