ELSA-2024-5363

ELSA-2024-5363 - kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2024-08-14

Description


[5.14.0-427.31.1_4.OL9]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates

[5.14.0-427.31.1_4]
- net: fix __dst_negative_advice() race (CKI Backport Bot) [RHEL-46798] {CVE-2024-36971}
- net: annotate data-races around sk->sk_dst_pending_confirm (CKI Backport Bot) [RHEL-46798] {CVE-2024-36971}

[5.14.0-427.30.1_4]
- dmaengine: idxd: add a write() method for applications to submit work (Jerry Snitselaar) [RHEL-35840] {CVE-2024-21823}
- dmaengine: idxd: add a new security check to deal with a hardware erratum (Jerry Snitselaar) [RHEL-35840] {CVE-2024-21823}
- VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist (Jerry Snitselaar) [RHEL-35840] {CVE-2024-21823}
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (Mark Salter) [RHEL-49538 RHEL-39308]
- virtio: delete vq in vp_find_vqs_msix() when request_irq() fails (Jon Maloy) [RHEL-44467] {CVE-2024-37353}
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (Izabela Bakollari) [RHEL-36271 RHEL-26682] {CVE-2024-26600}
- eeprom: at24: fix memory corruption race condition (CKI Backport Bot) [RHEL-42970] {CVE-2024-35848}
- eeprom: at24: Probe for DDR3 thermal sensor in the SPD case (CKI Backport Bot) [RHEL-42970] {CVE-2024-35848}
- eeprom: at24: Use dev_err_probe for nvmem register failure (CKI Backport Bot) [RHEL-42970] {CVE-2024-35848}
- eeprom: at24: Add support for 24c1025 EEPROM (CKI Backport Bot) [RHEL-42970] {CVE-2024-35848}
- eeprom: at24: remove struct at24_client (CKI Backport Bot) [RHEL-42970] {CVE-2024-35848}
- at24: Support probing while in non-zero ACPI D state (CKI Backport Bot) [RHEL-42970] {CVE-2024-35848}
- tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). (CKI Backport Bot) [RHEL-44439] {CVE-2024-37356}
- cxl/region: Fix cxlr_pmem leaks (cki-backport-bot) [RHEL-44486] {CVE-2024-38391}
- tls: fix missing memory barrier in tls_init (cki-backport-bot) [RHEL-44480] {CVE-2024-36489}
- igc: avoid returning frame twice in XDP_REDIRECT (Corinna Vinschen) [RHEL-42714 RHEL-33266] {CVE-2024-26853}
- ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound (Hangbin Liu) [RHEL-44404 RHEL-44402] {CVE-2024-33621}
- ipvlan: add ipvlan_route_v6_outbound() helper (Davide Caratti) [RHEL-44404 RHEL-32205]
- ipvlan: properly track tx_errors (Davide Caratti) [RHEL-44404 RHEL-32205]
- wifi: nl80211: don't free NULL coalescing rule (Jose Ignacio Tornos Martinez) [RHEL-41698 RHEL-39754] {CVE-2024-36941}
- wifi: iwlwifi: dbg-tlv: ensure NUL termination (Jose Ignacio Tornos Martinez) [RHEL-41658 RHEL-37028] {CVE-2024-35845}
- mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work (Ivan Vecera) [RHEL-41556 RHEL-37018] {CVE-2024-35852}
- net: openvswitch: fix overwriting ct original tuple for ICMPv6 (cki-backport-bot) [RHEL-44215] {CVE-2024-38558}
- wifi: iwlwifi: read txq->read_ptr under lock (Jose Ignacio Tornos Martinez) [RHEL-41520 RHEL-39799] {CVE-2024-36922}
- wifi: cfg80211: check A-MSDU format more carefully (Jose Ignacio Tornos Martinez) [RHEL-38754 RHEL-37345] {CVE-2024-35937}
- ice: fix memory corruption bug with suspend and rebuild (Petr Oros) [RHEL-49858 RHEL-17486] {CVE-2024-35911}
- ipv6: prevent possible NULL deref in fib6_nh_init() (Hangbin Liu) [RHEL-48182 RHEL-45826] {CVE-2024-40961}
- netns: Make get_net_ns() handle zero refcount net (Paolo Abeni) [RHEL-48117 RHEL-46610] {CVE-2024-40958}
- net: do not leave a dangling sk pointer, when socket creation fails (Paolo Abeni) [RHEL-48072 RHEL-46610] {CVE-2024-40954}
- net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() (CKI Backport Bot) [RHEL-47902] {CVE-2024-40928}
- net: netlink: af_netlink: Prevent empty skb by adding a check on len. (Ivan Vecera) [RHEL-43619 RHEL-30344] {CVE-2021-47606}
- bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (CKI Backport Bot) [RHEL-46921] {CVE-2024-39487}
- nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (Benjamin Coddington) [RHEL-42732 RHEL-34875] {CVE-2024-26868}
- efi: fix panic in kdump kernel (Steve Best) [RHEL-42920 RHEL-36998] {CVE-2024-35800}
- ipv6: fix potential 'struct net' leak in inet6_rtm_getaddr() (Hangbin Liu) [RHEL-41735 RHEL-31050] {CVE-2024-27417}
- netfilter: nf_tables: do not compare internal table flags on updates (Florian Westphal) [RHEL-41682 RHEL-33985] {CVE-2024-27065}
- ipv6: Fix potential uninit-value access in __ip6_make_skb() (Antoine Tenart) [RHEL-41466 RHEL-39786] {CVE-2024-36903}
- netfilter: nf_tables: honor table dormant flag from netdev release event path (Florian Westphal) [RHEL-40056 RHEL-33985] {CVE-2024-36005}
- cifs: fix underflow in parse_server_interfaces() (Paulo Alcantara) [RHEL-34636 RHEL-31245] {CVE-2024-26828}
- drm/i915/audio: Fix audio time stamp programming for DP (CKI Backport Bot) [RHEL-45843]
- platform/x86: wmi: Fix opening of char device (David Arcari) [RHEL-42548 RHEL-38260] {CVE-2023-52864}
- platform/x86: wmi: remove unnecessary initializations (David Arcari) [RHEL-42548 RHEL-38260] {CVE-2023-52864}
- rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (CKI Backport Bot) [RHEL-43170] {CVE-2024-36017}
- netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (Florian Westphal) [RHEL-40062 RHEL-33985] {CVE-2024-26808}
- ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr (Jiri Benc) [RHEL-39017 RHEL-32372] {CVE-2024-35969}
- netfilter: nf_tables: flush pending destroy work before exit_net release (Florian Westphal) [RHEL-38765 RHEL-33985] {CVE-2024-35899}
- vt: fix unicode buffer corruption when deleting characters (Andrew Halaney) [RHEL-42947 RHEL-24205] {CVE-2024-35823}

[5.14.0-427.29.1_4]
- net: Avoid address overwrite in kernel_connect (Davide Caratti) [RHEL-45728 RHEL-30875]
- net: replace calls to sock->ops->connect() with kernel_connect() (Davide Caratti) [RHEL-45728 RHEL-33410]
- i40e: fix vf may be used uninitialized in this function warning (Kamal Heib) [RHEL-41638 RHEL-39704] {CVE-2024-36020}
- cifs: translate network errors on send to -ECONNABORTED (Jay Shin) [RHEL-47047 RHEL-31245]
- wifi: brcmfmac: pcie: handle randbuf allocation failure (Jose Ignacio Tornos Martinez) [RHEL-44132] {CVE-2024-38575}
- wifi: iwlwifi: mvm: guard against invalid STA ID on removal (Jose Ignacio Tornos Martinez) [RHEL-43208 RHEL-39803] {CVE-2024-36921}
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (Jose Ignacio Tornos Martinez) [RHEL-42906 RHEL-36809] {CVE-2024-35789}
- wifi: iwlwifi: mvm: don't set the MFP flag for the GTK (Jose Ignacio Tornos Martinez) [RHEL-42886 RHEL-36900] {CVE-2024-27434}
- wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (Jose Ignacio Tornos Martinez) [RHEL-42860 RHEL-35142] {CVE-2024-27052}
- wifi: mt76: mt7925e: fix use-after-free in free_irq() (Jose Ignacio Tornos Martinez) [RHEL-42856 RHEL-35148] {CVE-2024-27049}
- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete (Jose Ignacio Tornos Martinez) [RHEL-42743 RHEL-34187] {CVE-2024-26897}
- wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (Jose Ignacio Tornos Martinez) [RHEL-42383 RHEL-35199] {CVE-2023-52651}
- net: core: reject skb_copy(_expand) for fraglist GSO skbs (Xin Long) [RHEL-41402 RHEL-39781] {CVE-2024-36929}


Related CVEs


CVE-2024-26853
CVE-2024-27049
CVE-2024-38391
CVE-2024-26828
CVE-2024-40928
CVE-2023-52651
CVE-2024-21823
CVE-2024-35845
CVE-2024-36903
CVE-2024-37356
CVE-2021-47606
CVE-2024-26897
CVE-2024-27434
CVE-2024-35852
CVE-2024-26600
CVE-2024-26868
CVE-2023-52864
CVE-2024-36005
CVE-2024-36929
CVE-2024-37353
CVE-2024-39487
CVE-2024-26808
CVE-2024-27052
CVE-2024-27065
CVE-2024-27417
CVE-2024-35848
CVE-2024-35911
CVE-2024-36489
CVE-2024-40954
CVE-2024-40958
CVE-2024-35937
CVE-2024-35969
CVE-2024-36941
CVE-2024-36971
CVE-2024-35823
CVE-2024-35899
CVE-2024-36017
CVE-2024-36921
CVE-2024-38558
CVE-2024-36922
CVE-2024-40961
CVE-2024-33621
CVE-2024-35789
CVE-2024-35800
CVE-2024-36020
CVE-2024-38575

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_aarch64_appstream
kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_aarch64_baseos_latest
kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_aarch64_codeready_builder
kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_aarch64_u4_baseos_patch
bpftool-7.3.0-427.31.1.el9_4.aarch64.rpm73019cdb2c31b0ed5b73e6b72c5cfeece3db8e4614d9ff2d3f42ff347f3b219d-ol9_aarch64_baseos_latest
bpftool-7.3.0-427.31.1.el9_4.aarch64.rpm73019cdb2c31b0ed5b73e6b72c5cfeece3db8e4614d9ff2d3f42ff347f3b219d-ol9_aarch64_u4_baseos_patch
kernel-cross-headers-5.14.0-427.31.1.el9_4.aarch64.rpmba97b7a18ab90ab3af9fc8f11b689678a2b495525e71c07b1b8dcf34137f4982-ol9_aarch64_codeready_builder
kernel-headers-5.14.0-427.31.1.el9_4.aarch64.rpme75bcfacfa66858104c8b439202f51a7cecd260d541479d77c3ac0ec08a239fb-ol9_aarch64_appstream
kernel-tools-5.14.0-427.31.1.el9_4.aarch64.rpm920ccf8b2adbf415dd8c4dc35d2a0f178a1a76fc3ceabc606486ed1279e3d6db-ol9_aarch64_baseos_latest
kernel-tools-5.14.0-427.31.1.el9_4.aarch64.rpm920ccf8b2adbf415dd8c4dc35d2a0f178a1a76fc3ceabc606486ed1279e3d6db-ol9_aarch64_u4_baseos_patch
kernel-tools-libs-5.14.0-427.31.1.el9_4.aarch64.rpmf3182161e01af3885ebe62ad6a962f7b7876cbae216f9cf80355b313140565c2-ol9_aarch64_baseos_latest
kernel-tools-libs-5.14.0-427.31.1.el9_4.aarch64.rpmf3182161e01af3885ebe62ad6a962f7b7876cbae216f9cf80355b313140565c2-ol9_aarch64_u4_baseos_patch
kernel-tools-libs-devel-5.14.0-427.31.1.el9_4.aarch64.rpm96e9f8c935bee54b6b8f2dd3d1698e26190faf4f4cd252b61aaa13608fe1e718-ol9_aarch64_codeready_builder
perf-5.14.0-427.31.1.el9_4.aarch64.rpm4d3381a79e89ae66f3b14e9d5b82a01970b3b9f33786eeffdf95468eca3f60ad-ol9_aarch64_appstream
python3-perf-5.14.0-427.31.1.el9_4.aarch64.rpm3bc048e6ece95977463eb066ccb8e6b8264e77a5b6b65aaf4398336a2b578b47-ol9_aarch64_baseos_latest
python3-perf-5.14.0-427.31.1.el9_4.aarch64.rpm3bc048e6ece95977463eb066ccb8e6b8264e77a5b6b65aaf4398336a2b578b47-ol9_aarch64_u4_baseos_patch
Oracle Linux 9 (x86_64) kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_x86_64_appstream
kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_x86_64_baseos_latest
kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_x86_64_codeready_builder
kernel-5.14.0-427.31.1.el9_4.src.rpm58736f8655554614e5ca6a37bb2b96354c2394e6a860762d0c64bf096344dbe5-ol9_x86_64_u4_baseos_patch
bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm6d8b3cbc3816707da777604aa6dce56e438a83b4d84979760697b401be88b43d-ol9_x86_64_baseos_latest
bpftool-7.3.0-427.31.1.el9_4.x86_64.rpm6d8b3cbc3816707da777604aa6dce56e438a83b4d84979760697b401be88b43d-ol9_x86_64_u4_baseos_patch
kernel-5.14.0-427.31.1.el9_4.x86_64.rpmd72cde106c29c04521e4d47dd9603836e7ccb2ac2f3f38fab2873a8e457ec2ef-ol9_x86_64_baseos_latest
kernel-5.14.0-427.31.1.el9_4.x86_64.rpmd72cde106c29c04521e4d47dd9603836e7ccb2ac2f3f38fab2873a8e457ec2ef-ol9_x86_64_u4_baseos_patch
kernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm19960207f3418773db72cc39c6788b8a044bc25495b91f1ec9bb7080841f9bae-ol9_x86_64_baseos_latest
kernel-abi-stablelists-5.14.0-427.31.1.el9_4.noarch.rpm19960207f3418773db72cc39c6788b8a044bc25495b91f1ec9bb7080841f9bae-ol9_x86_64_u4_baseos_patch
kernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmdd637429d6a61f943a059b89bbb815d6aa99c36cecc35a0940a764a7d2865210-ol9_x86_64_baseos_latest
kernel-core-5.14.0-427.31.1.el9_4.x86_64.rpmdd637429d6a61f943a059b89bbb815d6aa99c36cecc35a0940a764a7d2865210-ol9_x86_64_u4_baseos_patch
kernel-cross-headers-5.14.0-427.31.1.el9_4.x86_64.rpm5213a2ab300a3132d7dfd94c99dc5416a8726ad6a93995617eedbe3a8ea081dc-ol9_x86_64_codeready_builder
kernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm554df0b4a4ec5390f25dfb7610e79b088de99b15bcb2d28b57bb5829f1e5ce2d-ol9_x86_64_baseos_latest
kernel-debug-5.14.0-427.31.1.el9_4.x86_64.rpm554df0b4a4ec5390f25dfb7610e79b088de99b15bcb2d28b57bb5829f1e5ce2d-ol9_x86_64_u4_baseos_patch
kernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpma27bdd5a240e91a691b3c88230a2bce3b212d7cd003cb5a60ead8c6211961812-ol9_x86_64_baseos_latest
kernel-debug-core-5.14.0-427.31.1.el9_4.x86_64.rpma27bdd5a240e91a691b3c88230a2bce3b212d7cd003cb5a60ead8c6211961812-ol9_x86_64_u4_baseos_patch
kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm8e51c0bc483d0acb634229fca639d14dea8fcf1b344983aed447b84b06ce9138-ol9_x86_64_appstream
kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm8e8de859da03e4cd5701ab4293c68c71f3d311d480192fc19577f71467288515-ol9_x86_64_appstream
kernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmf3880e8d73c76761997b0dbe100eed44fd4f6900fd0125ac2290c5c1f48ddcc7-ol9_x86_64_baseos_latest
kernel-debug-modules-5.14.0-427.31.1.el9_4.x86_64.rpmf3880e8d73c76761997b0dbe100eed44fd4f6900fd0125ac2290c5c1f48ddcc7-ol9_x86_64_u4_baseos_patch
kernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1a99da9c026a8014ebe8275ac556c4e0b65445cd2f8f0f9c5a40096fa4735e7d-ol9_x86_64_baseos_latest
kernel-debug-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm1a99da9c026a8014ebe8275ac556c4e0b65445cd2f8f0f9c5a40096fa4735e7d-ol9_x86_64_u4_baseos_patch
kernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm077f60ecf84a9bbc82f0a85f37b26266d8e5892d82fe20ec4d9fe4857fd6d6a1-ol9_x86_64_baseos_latest
kernel-debug-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm077f60ecf84a9bbc82f0a85f37b26266d8e5892d82fe20ec4d9fe4857fd6d6a1-ol9_x86_64_u4_baseos_patch
kernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmbfae8f4084d52fa37ea9f5e3e6a0cef7c2c6f1580452c1c40af9ecec322276e2-ol9_x86_64_baseos_latest
kernel-debug-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmbfae8f4084d52fa37ea9f5e3e6a0cef7c2c6f1580452c1c40af9ecec322276e2-ol9_x86_64_u4_baseos_patch
kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm8b6d8c0c4fb1b535fa7c688d50cddd20d2354360c45eebbc2756d030e2fcb34c-ol9_x86_64_appstream
kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm261a25a82e0452ebaed478e213a32304049d8624d26e4665e1c3c7af2ed279a8-ol9_x86_64_appstream
kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm4a4246a146755480f1eff93f3248c3214f71548206e7839d543b360285829769-ol9_x86_64_appstream
kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm7fd44191afb9a43207ce3c4f2d736fdc8287633784b68b5a338e723cf2abf0d4-ol9_x86_64_appstream
kernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm0ae02c806342fa42be2249cfbb43db72bd6cabe6494127d98807a4b589066249-ol9_x86_64_baseos_latest
kernel-modules-5.14.0-427.31.1.el9_4.x86_64.rpm0ae02c806342fa42be2249cfbb43db72bd6cabe6494127d98807a4b589066249-ol9_x86_64_u4_baseos_patch
kernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm0051256e4591adc29b1dd6bf783d1ce529a4706591c1681b0979abd453da3f3f-ol9_x86_64_baseos_latest
kernel-modules-core-5.14.0-427.31.1.el9_4.x86_64.rpm0051256e4591adc29b1dd6bf783d1ce529a4706591c1681b0979abd453da3f3f-ol9_x86_64_u4_baseos_patch
kernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm1e7479b6ff42b24a8782053060d22886c348f2e3899dc05f0e1930b405934e6a-ol9_x86_64_baseos_latest
kernel-modules-extra-5.14.0-427.31.1.el9_4.x86_64.rpm1e7479b6ff42b24a8782053060d22886c348f2e3899dc05f0e1930b405934e6a-ol9_x86_64_u4_baseos_patch
kernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpma93e48e3e68ed6af3b65b63035dfa6b9094421548218fda8c311d12246120e6e-ol9_x86_64_baseos_latest
kernel-tools-5.14.0-427.31.1.el9_4.x86_64.rpma93e48e3e68ed6af3b65b63035dfa6b9094421548218fda8c311d12246120e6e-ol9_x86_64_u4_baseos_patch
kernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm94fffe0547937a2c63d66ff844cd2a984e10770604ca5274466ee10ec59046ca-ol9_x86_64_baseos_latest
kernel-tools-libs-5.14.0-427.31.1.el9_4.x86_64.rpm94fffe0547937a2c63d66ff844cd2a984e10770604ca5274466ee10ec59046ca-ol9_x86_64_u4_baseos_patch
kernel-tools-libs-devel-5.14.0-427.31.1.el9_4.x86_64.rpm3010e2b4273c2be03697e065644c201ab693b5e8280165141da56f231bdf9a7c-ol9_x86_64_codeready_builder
kernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmc189ead0b761d89b775d93f6beaf4d145e6e6910109f881672be8c4fabb6e036-ol9_x86_64_baseos_latest
kernel-uki-virt-5.14.0-427.31.1.el9_4.x86_64.rpmc189ead0b761d89b775d93f6beaf4d145e6e6910109f881672be8c4fabb6e036-ol9_x86_64_u4_baseos_patch
libperf-5.14.0-427.31.1.el9_4.x86_64.rpma95e0bb8cc4927dfc907abcbf90952789c9120f56288dd0457da6add4d5a5966-ol9_x86_64_codeready_builder
perf-5.14.0-427.31.1.el9_4.x86_64.rpmb75aaa8c6bf42c63b592b75fc38e2e81ff5914218918d576239792c491b61c73-ol9_x86_64_appstream
python3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmb93ca76f5abe2b873bef5d4feea9bd1c4776ac9a7ac2a038a66cd124f172e639-ol9_x86_64_baseos_latest
python3-perf-5.14.0-427.31.1.el9_4.x86_64.rpmb93ca76f5abe2b873bef5d4feea9bd1c4776ac9a7ac2a038a66cd124f172e639-ol9_x86_64_u4_baseos_patch
rtla-5.14.0-427.31.1.el9_4.x86_64.rpmea3fa8a5afe5ca86bb14ae52a24252375786a565718d9001e605a21eb27b2c5d-ol9_x86_64_appstream
rv-5.14.0-427.31.1.el9_4.x86_64.rpm5b3686ca4ff3a73bf274ace953bce58a3927e4f6824e803f788fab5152a4fdc1-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete