ELSA-2024-8617

ELSA-2024-8617 - kernel security update

Type:SECURITY
Impact:MODERATE
Release Date:2024-10-30

Description


[5.14.0-427.42.1_4.OL9]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates

[5.14.0-427.42.1_4]
- redhat/configs: Add CONFIG_MITIGATION_SPECTRE_BHI (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Fix BHI retpoline check (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Clarify that syscall hardening isn't a BHI mitigation (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Fix BHI handling of RRSBA (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Fix BHI documentation (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Fix return type of spectre_bhi_state() (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Make CONFIG_SPECTRE_BHI_ON the default (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- KVM: x86: Add BHI_NO (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bhi: Mitigate KVM by default (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bhi: Add BHI mitigation knob (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bhi: Enumerate Branch History Injection (BHI) bug (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bhi: Define SPEC_CTRL_BHI_DIS_S (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bhi: Add support for clearing branch history at syscall entry (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- perf/x86/amd/lbr: Use freeze based on availability (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- Documentation/kernel-parameters: Add spec_rstack_overflow to mitigations=off (Waiman Long) [RHEL-45492 RHEL-28203] {CVE-2024-2201}
- KVM: x86: Use a switch statement and macros in __feature_translate() (Maxim Levitsky) [RHEL-45492 RHEL-32430]
- KVM: x86: Advertise CPUID.(EAX=7,ECX=2):EDX[5:0] to userspace (Maxim Levitsky) [RHEL-45492 RHEL-32430]
- x86/entry/32: Convert do_fast_syscall_32() to bool return type (Prarit Bhargava) [RHEL-45492 RHEL-25415]
- x86/entry: Add do_SYSENTER_32() prototype (Prarit Bhargava) [RHEL-45492 RHEL-25415]
- x86/bugs: Reset speculation control settings on init (Prarit Bhargava) [RHEL-45492 RHEL-25415]
- mpls: Reduce skb re-allocations due to skb_cow() (Guillaume Nault) [RHEL-61696 RHEL-55145]
- scsi: core: Fix unremoved procfs host directory regression (Ewan D. Milne) [RHEL-39539 RHEL-39601 RHEL-33543 RHEL-35000] {CVE-2024-26935}
- tty: Fix out-of-bound vmalloc access in imageblit (Andrew Halaney) [RHEL-42095 RHEL-24205] {CVE-2021-47383}
- block: initialize integrity buffer to zero before writing it to media (Ming Lei) [RHEL-54769 RHEL-54768] {CVE-2024-43854}
- block: cleanup bio_integrity_prep (Ming Lei) [RHEL-54769 RHEL-25988]
- block: refactor to use helper (Ming Lei) [RHEL-54769 RHEL-25988]
- ceph: fix cap ref leak via netfs init_request (Patrick Donnelly) [RHEL-62666 RHEL-61459]
- redhat/configs: Enable CONFIG_OCTEON_EP_VF (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: add ethtool support (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: add Tx/Rx processing and interrupt support (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: add support for ndo ops (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: add Tx/Rx ring resource setup and cleanup (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: add VF-PF mailbox communication. (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: add hardware configuration APIs (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep_vf: Add driver framework and device initialization (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep: support firmware notifications for VFs (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep: control net framework to support VF offloads (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep: PF-VF mailbox version support (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- octeon_ep: add PF-VF mailbox communication (CKI Backport Bot) [RHEL-61744 RHEL-25860]
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped. (Chris von Recklinghausen) [RHEL-62209 RHEL-26268]
- netfilter: nfnetlink_queue: un-break NF_REPEAT (Phil Sutter) [RHEL-62299]

[5.14.0-427.41.1_4]
- iommu/amd: Fix panic accessing amd_iommu_enable_faulting (Jerry Snitselaar) [RHEL-55507 RHEL-37320 RHEL-40344]
- iommu/vt-d: Allocate DMAR fault interrupts locally (Jerry Snitselaar) [RHEL-55507 RHEL-28780]
- netfilter: nft_inner: validate mandatory meta and payload (Phil Sutter) [RHEL-47488 RHEL-47486] {CVE-2024-39504}
- netfilter: flowtable: initialise extack before use (CKI Backport Bot) [RHEL-58546 RHEL-58544] {CVE-2024-45018}
- ext4: do not create EA inode under buffer lock (Carlos Maiolino) [RHEL-48285 RHEL-48282] {CVE-2024-40972}
- ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (Carlos Maiolino) [RHEL-48285 RHEL-48282] {CVE-2024-40972}
- ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (Carlos Maiolino) [RHEL-48519 RHEL-48517] {CVE-2024-40998}
- ext4: turn quotas off if mount failed after enabling quotas (Carlos Maiolino) [RHEL-48519 RHEL-48517] {CVE-2024-40998}
- mptcp: fix data re-injection from stale subflow (Davide Caratti) [RHEL-59920 RHEL-32669] {CVE-2024-26826}
- xfs: add bounds checking to xlog_recover_process_data (CKI Backport Bot) [RHEL-50864 RHEL-50862] {CVE-2024-41014}
- af_unix: Suppress false-positive lockdep splat for spin_lock() in __unix_gc(). (Davide Caratti) [RHEL-42771 RHEL-33410]
- af_unix: Fix garbage collector racing against connect() (Davide Caratti) [RHEL-42771 RHEL-33410] {CVE-2024-26923}
- af_unix: fix lockdep positive in sk_diag_dump_icons() (Davide Caratti) [RHEL-42771 RHEL-33410]
- xfs: don't walk off the end of a directory data block (CKI Backport Bot) [RHEL-50887 RHEL-50885] {CVE-2024-41013}
- ipv6: prevent possible NULL dereference in rt6_probe() (Hangbin Liu) [RHEL-48161 RHEL-45826] {CVE-2024-40960}
- mac802154: fix llsec key resources release in mac802154_llsec_key_del (Steve Best) [RHEL-42795 RHEL-34969] {CVE-2024-26961}
- mptcp: ensure snd_una is properly initialized on connect (Florian Westphal) [RHEL-47945 RHEL-47943] {CVE-2024-40931}
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (CKI Backport Bot) [RHEL-47560 RHEL-47558] {CVE-2024-40904}
- nvme-multipath: fix io accounting on failover (John Meneghini) [RHEL-59646 RHEL-56635]
- nvme: fix multipath batched completion accounting (John Meneghini) [RHEL-59646 RHEL-56635]
- xfs: fix log recovery buffer allocation for the legacy h_size fixup (Bill O'Donnell) [RHEL-46481 RHEL-46479] {CVE-2024-39472}
- tcp: add sanity checks to rx zerocopy (Paolo Abeni) [RHEL-58403 RHEL-29496] {CVE-2024-26640}
- netpoll: Fix race condition in netpoll_owner_active (CKI Backport Bot) [RHEL-49373 RHEL-49371] {CVE-2024-41005}
- wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (CKI Backport Bot) [RHEL-48321 RHEL-48319] {CVE-2024-40977}
- smb: client: fix hang in wait_for_response() for negproto (Jay Shin) [RHEL-61606 RHEL-57983]
- NFSv4.1/pnfs: fix NFS with TLS in pnfs (Benjamin Coddington) [RHEL-61467 RHEL-34576]
- ceph: remove the incorrect Fw reference check when dirtying pages (Xiubo Li) [RHEL-61415 RHEL-60255]
- net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (Davide Caratti) [RHEL-48483 RHEL-44375] {CVE-2024-40995}
- net/sched: taprio: extend minimum interval restriction to entire cycle too (Davide Caratti) [RHEL-44377 RHEL-44375] {CVE-2024-36244}
- net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (Davide Caratti) [RHEL-44377 RHEL-44375] {CVE-2024-36244}


Related CVEs


CVE-2024-26640
CVE-2024-41013
CVE-2024-36244
CVE-2024-40995
CVE-2024-26935
CVE-2024-2201
CVE-2024-41014
CVE-2024-26923
CVE-2024-26826
CVE-2024-39504
CVE-2024-40904
CVE-2024-40931
CVE-2024-40977
CVE-2024-45018
CVE-2024-41005
CVE-2024-43854
CVE-2024-26961
CVE-2024-40960
CVE-2024-40998
CVE-2021-47383
CVE-2024-39472
CVE-2024-40972

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_aarch64_appstream
kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_aarch64_baseos_latest
kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_aarch64_codeready_builder
kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_aarch64_u4_baseos_patch
bpftool-7.3.0-427.42.1.el9_4.aarch64.rpm4e3a1a3ff52e2f761e4ee49e84c4400765cc3c50c5b137d5c9d9c86d2a31a081-ol9_aarch64_baseos_latest
bpftool-7.3.0-427.42.1.el9_4.aarch64.rpm4e3a1a3ff52e2f761e4ee49e84c4400765cc3c50c5b137d5c9d9c86d2a31a081-ol9_aarch64_u4_baseos_patch
kernel-cross-headers-5.14.0-427.42.1.el9_4.aarch64.rpmd8e61110a18aa2a05e61db726cdfc18b60f462928ca0d4113bed33772b0317f7-ol9_aarch64_codeready_builder
kernel-headers-5.14.0-427.42.1.el9_4.aarch64.rpmdb9a3ee274176b0a5ed959c3d29a4b3cda82ec8babdaa8e7bc285311547229da-ol9_aarch64_appstream
kernel-tools-5.14.0-427.42.1.el9_4.aarch64.rpm4340fef438dc3fcc555e1febcfda4fdaf303abfa6004e87f76812de0f5096cde-ol9_aarch64_baseos_latest
kernel-tools-5.14.0-427.42.1.el9_4.aarch64.rpm4340fef438dc3fcc555e1febcfda4fdaf303abfa6004e87f76812de0f5096cde-ol9_aarch64_u4_baseos_patch
kernel-tools-libs-5.14.0-427.42.1.el9_4.aarch64.rpm886a68e2671e2fb9a7c60647475971937af76f5a7064b578148bfaf14c3d00d7-ol9_aarch64_baseos_latest
kernel-tools-libs-5.14.0-427.42.1.el9_4.aarch64.rpm886a68e2671e2fb9a7c60647475971937af76f5a7064b578148bfaf14c3d00d7-ol9_aarch64_u4_baseos_patch
kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.aarch64.rpm4f8ed151095ab11c27092f37e56ec34a641b7c9db5fa4ea93013c9bee911218b-ol9_aarch64_codeready_builder
perf-5.14.0-427.42.1.el9_4.aarch64.rpme9eb4297dc376134b7faa5bb0b29d6d1264a2cadfa010e5a5c84f3eb6ef7773e-ol9_aarch64_appstream
python3-perf-5.14.0-427.42.1.el9_4.aarch64.rpm0515952f272f067c33ccb7d3550f90a2acafe5f7786c73bbfe9f4a6dc02b2ee0-ol9_aarch64_baseos_latest
python3-perf-5.14.0-427.42.1.el9_4.aarch64.rpm0515952f272f067c33ccb7d3550f90a2acafe5f7786c73bbfe9f4a6dc02b2ee0-ol9_aarch64_u4_baseos_patch
Oracle Linux 9 (x86_64) kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_x86_64_appstream
kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_x86_64_baseos_latest
kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_x86_64_codeready_builder
kernel-5.14.0-427.42.1.el9_4.src.rpm41c4bac468e124fabfc49f2eb524966254ea20bab925634836cba39d0292742f-ol9_x86_64_u4_baseos_patch
bpftool-7.3.0-427.42.1.el9_4.x86_64.rpm21ef74948cbc1ce2ef67eef8ab056ba76db7148b595a965ecc7764a15967649b-ol9_x86_64_baseos_latest
bpftool-7.3.0-427.42.1.el9_4.x86_64.rpm21ef74948cbc1ce2ef67eef8ab056ba76db7148b595a965ecc7764a15967649b-ol9_x86_64_u4_baseos_patch
kernel-5.14.0-427.42.1.el9_4.x86_64.rpma8ba2953ad9be9b47db540a733d40740f47dcf0cf3b75abfe18a12de9478736e-ol9_x86_64_baseos_latest
kernel-5.14.0-427.42.1.el9_4.x86_64.rpma8ba2953ad9be9b47db540a733d40740f47dcf0cf3b75abfe18a12de9478736e-ol9_x86_64_u4_baseos_patch
kernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm6942988e56e67378e7d5691b4c35533c00abc8a8962f5475ff8a01949091c1c3-ol9_x86_64_baseos_latest
kernel-abi-stablelists-5.14.0-427.42.1.el9_4.noarch.rpm6942988e56e67378e7d5691b4c35533c00abc8a8962f5475ff8a01949091c1c3-ol9_x86_64_u4_baseos_patch
kernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm86814574b36c9b6e6f3fe2d6590b4d496b8b5795442bd0c83cd8c38523aafa2b-ol9_x86_64_baseos_latest
kernel-core-5.14.0-427.42.1.el9_4.x86_64.rpm86814574b36c9b6e6f3fe2d6590b4d496b8b5795442bd0c83cd8c38523aafa2b-ol9_x86_64_u4_baseos_patch
kernel-cross-headers-5.14.0-427.42.1.el9_4.x86_64.rpmbee9e9b0e48b985c66890a365a4c6e3442fb368090de96539f120e4c6089e9a5-ol9_x86_64_codeready_builder
kernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpmcba81362bf9fa2c335df7d0095d506c0602a19af7ef5e27522860c6afb2aa8ef-ol9_x86_64_baseos_latest
kernel-debug-5.14.0-427.42.1.el9_4.x86_64.rpmcba81362bf9fa2c335df7d0095d506c0602a19af7ef5e27522860c6afb2aa8ef-ol9_x86_64_u4_baseos_patch
kernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmec6f16d00c7eef47f32332e2b8851a3d7591cc86db82d438da6bc562fbde3d1e-ol9_x86_64_baseos_latest
kernel-debug-core-5.14.0-427.42.1.el9_4.x86_64.rpmec6f16d00c7eef47f32332e2b8851a3d7591cc86db82d438da6bc562fbde3d1e-ol9_x86_64_u4_baseos_patch
kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpma42c8d8df645dd07941b37e5ddfd51565e38263801049149be4b64583471f745-ol9_x86_64_appstream
kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpmbd30ba2c9edb910b6f35b3f9bf5c0daa27824b34ec379d8d8de48316ecc35f0d-ol9_x86_64_appstream
kernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm7d959782dd00a1bdfa9a865cf67c624f37d82ba2c1845f89a9b46eea2d411f60-ol9_x86_64_baseos_latest
kernel-debug-modules-5.14.0-427.42.1.el9_4.x86_64.rpm7d959782dd00a1bdfa9a865cf67c624f37d82ba2c1845f89a9b46eea2d411f60-ol9_x86_64_u4_baseos_patch
kernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm14902e1a5032033612bd47f1b1e929e7633bcb5e8f815637b2d519981a6673be-ol9_x86_64_baseos_latest
kernel-debug-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm14902e1a5032033612bd47f1b1e929e7633bcb5e8f815637b2d519981a6673be-ol9_x86_64_u4_baseos_patch
kernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm1e8895cac13966861b557e2a21b3e5459cbdbe274c6e6eedeed9aa94c0e35f10-ol9_x86_64_baseos_latest
kernel-debug-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm1e8895cac13966861b557e2a21b3e5459cbdbe274c6e6eedeed9aa94c0e35f10-ol9_x86_64_u4_baseos_patch
kernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm589762e8e4159b5654f9e98391cbd2145bbd570fe5176c88a0718b727abec278-ol9_x86_64_baseos_latest
kernel-debug-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm589762e8e4159b5654f9e98391cbd2145bbd570fe5176c88a0718b727abec278-ol9_x86_64_u4_baseos_patch
kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpmb8524e7e151dc9829f5e602f8dfc62280eb70093c582e07c46c04d078d0d707c-ol9_x86_64_appstream
kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm5ae589b9731d402bd2da48199dbbb52aae0e0945215095ebd86a0070fbce8da3-ol9_x86_64_appstream
kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm54ea44e089386e72565d8afe921614bb23292f5f3f71773cd1faef090fc5d19d-ol9_x86_64_appstream
kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpmb44a2eacf13133944f1070537d6efd172e5b1fd4ffc1fa117a54af9829fcc830-ol9_x86_64_appstream
kernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpme40929da877c7c10680826a6431b4f55651f5b005b0bcfcc8cb0724537c18c67-ol9_x86_64_baseos_latest
kernel-modules-5.14.0-427.42.1.el9_4.x86_64.rpme40929da877c7c10680826a6431b4f55651f5b005b0bcfcc8cb0724537c18c67-ol9_x86_64_u4_baseos_patch
kernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm19dc301e30f10063ca0ecd91092ed4cf748219bfaf9685e353b686314b43293c-ol9_x86_64_baseos_latest
kernel-modules-core-5.14.0-427.42.1.el9_4.x86_64.rpm19dc301e30f10063ca0ecd91092ed4cf748219bfaf9685e353b686314b43293c-ol9_x86_64_u4_baseos_patch
kernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm8dcc2390a546bc3be11909791def645ca9cc51df0f2c7da930ba0e35736ece8c-ol9_x86_64_baseos_latest
kernel-modules-extra-5.14.0-427.42.1.el9_4.x86_64.rpm8dcc2390a546bc3be11909791def645ca9cc51df0f2c7da930ba0e35736ece8c-ol9_x86_64_u4_baseos_patch
kernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm62b9220716d777220575630559a9e182430552f86ad8aa7038331f09c2ffc0cd-ol9_x86_64_baseos_latest
kernel-tools-5.14.0-427.42.1.el9_4.x86_64.rpm62b9220716d777220575630559a9e182430552f86ad8aa7038331f09c2ffc0cd-ol9_x86_64_u4_baseos_patch
kernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm70285bcaf1742da9234d50f8694921449692b135a730e5a12d912ee3d6e71643-ol9_x86_64_baseos_latest
kernel-tools-libs-5.14.0-427.42.1.el9_4.x86_64.rpm70285bcaf1742da9234d50f8694921449692b135a730e5a12d912ee3d6e71643-ol9_x86_64_u4_baseos_patch
kernel-tools-libs-devel-5.14.0-427.42.1.el9_4.x86_64.rpmbfad8970392963385fcbf26d1facdafa5da76e889f0c5647a768e30d165be6ba-ol9_x86_64_codeready_builder
kernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm639013387a65b03aff034317ab1b41c5af4989f6ae02d241dc6e02189a573c98-ol9_x86_64_baseos_latest
kernel-uki-virt-5.14.0-427.42.1.el9_4.x86_64.rpm639013387a65b03aff034317ab1b41c5af4989f6ae02d241dc6e02189a573c98-ol9_x86_64_u4_baseos_patch
libperf-5.14.0-427.42.1.el9_4.x86_64.rpmab9d37620b41b5e48e3c6431aa232d36f8cfb19c5d9aa06ae32e58a12c7c78da-ol9_x86_64_codeready_builder
perf-5.14.0-427.42.1.el9_4.x86_64.rpm9b548259a201c33574617087528aef2bc496fc341cf663b996278ef49318752d-ol9_x86_64_appstream
python3-perf-5.14.0-427.42.1.el9_4.x86_64.rpma3aeaf0c61dea59dd0469e30b5ed5a947848f28d68418de1f954a4166192d508-ol9_x86_64_baseos_latest
python3-perf-5.14.0-427.42.1.el9_4.x86_64.rpma3aeaf0c61dea59dd0469e30b5ed5a947848f28d68418de1f954a4166192d508-ol9_x86_64_u4_baseos_patch
rtla-5.14.0-427.42.1.el9_4.x86_64.rpm365a2f42bdf65888255c8dc65980a79743d440bffa08844f95ea0f69491c4e8c-ol9_x86_64_appstream
rv-5.14.0-427.42.1.el9_4.x86_64.rpm26777f28c2a1c5e5cdeeb6ad0daf1b5f24cbab8df55f41b599eb0e859908a5b4-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete