ELSA-2025-19930

ELSA-2025-19930 - kernel security update

Type:SECURITY
Impact:MODERATE
Release Date:2025-11-10

Description


[5.14.0-570.62.1.0.1]
- nvme-pci: remove two deallocate zeroes quirks [Orabug: 37756650]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-570.62.1]
- redhat/configs: Enable CONFIG_MITIGATION_VMSCAPE for x86 (Waiman Long) [RHEL-114270]
- x86/vmscape: Add old Intel CPUs to affected list (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape: Warn when STIBP is disabled with SMT (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/bugs: Move cpu_bugs_smt_update() down (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape: Enable the mitigation (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape: Add conditional IBPB mitigation (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape: Enumerate VMSCAPE bug (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- Documentation/hw-vuln: Add VMSCAPE documentation (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- randomize_kstack: Remove non-functional per-arch entropy filtering (Waiman Long) [RHEL-114270]
- redhat/configs: Enable CONFIG_MITIGATION_TSA for x86 (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/process: Move the buffer clearing before MONITOR (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- x86/microcode/AMD: Add TSA microcode SHAs (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- KVM: SVM: Advertise TSA CPUID bits to guests (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- x86/bugs: Add a Transient Scheduler Attacks mitigation (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- x86/bugs: Rename MDS machinery to something more generic (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
(Waiman Long) [RHEL-83896 RHEL-83905]
- x86/idle: Remove .s output beautifying delimiters from simpler asm() templates (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/idle: Standardize argument types for MONITOR{,X} and MWAIT{,X} instruction wrappers on 'u32' (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/idle: Remove MFENCEs for X86_BUG_CLFLUSH_MONITOR in mwait_idle_with_hints() and prefer_mwait_c1_over_halt() (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Rename mmio_stale_data_clear to cpu_buf_vm_clear (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode: Consolidate the loader enablement checking (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2025-22047}
- x86/microcode/AMD: Add some forgotten models to the SHA check (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Load only SHA256-checksummed patches (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Add get_patch_level() (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Get rid of the _load_microcode_amd() forward declaration (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Merge early_apply_microcode() into its single callsite (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Remove unused save_microcode_in_initrd_amd() declarations (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Remove ugly linebreak in __verify_patch_section() signature (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpu: Introduce new microcode matching helper (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Remove ret local var in early_apply_microcode() (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Have __apply_microcode_amd() return bool (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Return bool from find_blobs_in_containers() (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Flush patch buffer mapping after application (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/CPU/AMD: Terminate the erratum_1386_microcode array (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-56721}
- x86/mm: Carve out INVLPG inline asm for use by others (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpu: Fix formatting of cpuid_bits[] in scattered.c (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpufeatures: Add X86_FEATURE_AMD_WORKLOAD_CLASS feature bit (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Split load_microcode_amd() (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Pay attention to the stepping dynamically (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Use code segment selector for VERW operand (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-50072}
- x86/microcode/AMD: Fix a -Wsometimes-uninitialized clang false positive (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD: Use the family,model,stepping encoded in the patch ID (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/CPU/AMD: Improve the erratum 1386 workaround (Waiman Long) [RHEL-83896 RHEL-83905]
- x86: Add a comment about the 'magic' behind shadow sti before mwait (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Revert 'Reverse instruction order of CLEAR_CPU_BUFFERS' (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: KVM: Add support for SRSO_MSR_FIX (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpu/kvm: SRSO: Fix possible missing IBPB on VM-Exit (Waiman Long) [RHEL-83896 RHEL-83905]
- KVM: x86: Advertise SRSO_USER_KERNEL_NO to userspace (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add SRSO_USER_KERNEL_NO support (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Skip RSB fill at VMEXIT (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Fix handling when SRSO mitigation is disabled (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add missing NO_SSB flag (Waiman Long) [RHEL-83896 RHEL-83905]
- Documentation/srso: Document a method for checking safe RET operates properly (Waiman Long) [RHEL-83896 RHEL-83905]
- redhat/configs: Add new CONFIG_MITIGATION_* kconfig files (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for GDS (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Remove GDS Force Kconfig option (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for SSB (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for Spectre V2 (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for SRBDS (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for Spectre v1 (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for RETBLEED (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for L1TF (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for MMIO Stable Data (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for TAA (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Add a separate config for MDS (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpufeatures: Flip the /proc/cpuinfo appearance logic (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/bugs: Switch to new Intel CPU model defines (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/cpu: Use EXPORT_PER_CPU_SYMBOL_GPL() for x86_spec_ctrl_current (Waiman Long) [RHEL-83896 RHEL-83905]
- docs: move x86 documentation into Documentation/arch/ (Waiman Long) [RHEL-83896 RHEL-83905]
- cxgb4: Avoid removal of uninserted tid JIRA: https://issues.redhat.com/browse/RHEL-112152 (Jakub Ramaseuski)

[5.14.0-570.61.1]
- NFS: Extend rdirplus mount option with 'force|none' (CKI Backport Bot) [RHEL-118450]
- sched: Fix stop_one_cpu_nowait() vs hotplug (Luis Claudio R. Goncalves) [RHEL-116212]
- s390/hypfs: Enable limited access during lockdown (CKI Backport Bot) [RHEL-114433]
- s390/hypfs: Avoid unnecessary ioctl registration in debugfs (CKI Backport Bot) [RHEL-114433]
- debugfs: lockdown: Allow reading debugfs files that are not world readable (Mete Durlu) [RHEL-114433]


Related CVEs


CVE-2025-40300
CVE-2024-36357
CVE-2024-36350

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_aarch64_appstream
kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_aarch64_baseos_latest
kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_aarch64_codeready_builder
kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_aarch64_u6_baseos_patch
kernel-cross-headers-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm910d321512844e27c9cdffa7c4f17677e18640c69fd0869cc163e800b9327578-ol9_aarch64_codeready_builder
kernel-headers-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm8cf3c4abe32e481f11684943e3abdb99bc37eeeaba1349c63cab1ee2495731e2-ol9_aarch64_appstream
kernel-tools-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm645e20fcc0441c07d9006cf42e8074c64dd54ab2f84c2e01e4ae57bc21396852-ol9_aarch64_baseos_latest
kernel-tools-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm645e20fcc0441c07d9006cf42e8074c64dd54ab2f84c2e01e4ae57bc21396852-ol9_aarch64_u6_baseos_patch
kernel-tools-libs-5.14.0-570.62.1.0.1.el9_6.aarch64.rpmc43abe6b62fc08b3fb28d3ad5f9bc3c0b752a63523add98d2d4d4d035bf749eb-ol9_aarch64_baseos_latest
kernel-tools-libs-5.14.0-570.62.1.0.1.el9_6.aarch64.rpmc43abe6b62fc08b3fb28d3ad5f9bc3c0b752a63523add98d2d4d4d035bf749eb-ol9_aarch64_u6_baseos_patch
kernel-tools-libs-devel-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm15878ec6b8ccb2abcc70e07eab29c89011915e081ff266a471a6ef14479e9771-ol9_aarch64_codeready_builder
libperf-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm4ad4b0b1150454d6344a818b897c8b81504dfa360d757809cdc7514d3bb326cc-ol9_aarch64_codeready_builder
perf-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm7e0b9b491aaa896f744d0e1a447a280719d66524a30d9fb4f745200e2124eb48-ol9_aarch64_appstream
python3-perf-5.14.0-570.62.1.0.1.el9_6.aarch64.rpm98cf9ef2d5af113cabf82de5bb5b9d78c8cf96f89f5df2e6abe1665357a1856f-ol9_aarch64_appstream
rtla-5.14.0-570.62.1.0.1.el9_6.aarch64.rpmb4a52afae643650a35876910c2469a6789c8fca2dda9bfeb90ad86d2720e18c3-ol9_aarch64_appstream
rv-5.14.0-570.62.1.0.1.el9_6.aarch64.rpmb756b24dd878a383ec52989b28030ed8db0b0e1827119cbd65326af0929d3bbc-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_x86_64_appstream
kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_x86_64_baseos_latest
kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_x86_64_codeready_builder
kernel-5.14.0-570.62.1.0.1.el9_6.src.rpma3416010786f088013bc7e7447de28e106c78c253432d452a005936dbf27d563-ol9_x86_64_u6_baseos_patch
kernel-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm1e584a69610651b0c3f9b47e1a50c718fab6c12ebb1510b92b9dc601f6e46d92-ol9_x86_64_baseos_latest
kernel-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm1e584a69610651b0c3f9b47e1a50c718fab6c12ebb1510b92b9dc601f6e46d92-ol9_x86_64_u6_baseos_patch
kernel-abi-stablelists-5.14.0-570.62.1.0.1.el9_6.noarch.rpm7ccab2a4ab2670adafe81201b24fc0d83228e40154b9595e40762f0228f6b441-ol9_x86_64_baseos_latest
kernel-abi-stablelists-5.14.0-570.62.1.0.1.el9_6.noarch.rpm7ccab2a4ab2670adafe81201b24fc0d83228e40154b9595e40762f0228f6b441-ol9_x86_64_u6_baseos_patch
kernel-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmea94dfdae7c5173236ad06f079dda84cb44feff58fc4bcaada1facce01e87a95-ol9_x86_64_baseos_latest
kernel-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmea94dfdae7c5173236ad06f079dda84cb44feff58fc4bcaada1facce01e87a95-ol9_x86_64_u6_baseos_patch
kernel-cross-headers-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm4f37e48f8b2da02f8f3fc007027b4c5342c590026841bb86230258c378fe9108-ol9_x86_64_codeready_builder
kernel-debug-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm6e666e20982a9d919e626b7d13916c0ebdee53526b156cc24fdb366db9924854-ol9_x86_64_baseos_latest
kernel-debug-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm6e666e20982a9d919e626b7d13916c0ebdee53526b156cc24fdb366db9924854-ol9_x86_64_u6_baseos_patch
kernel-debug-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm744bf7658f8a22af00616862281f4970da5e5d80f4aaa3ad927e018d3954e925-ol9_x86_64_baseos_latest
kernel-debug-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm744bf7658f8a22af00616862281f4970da5e5d80f4aaa3ad927e018d3954e925-ol9_x86_64_u6_baseos_patch
kernel-debug-devel-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm15a033b783ed23bbc93bef2cf43f4b7aede363ff5058959d425e536551d97ad9-ol9_x86_64_appstream
kernel-debug-devel-matched-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm0923472080ae634a5ebe0765f51428fa81db28cb535c35ba97783ad6b30e48cb-ol9_x86_64_appstream
kernel-debug-modules-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmf8b06355a609ad0e9aeda3e58ab94e3ff7c3e3893cbf5add1260650a52b58731-ol9_x86_64_baseos_latest
kernel-debug-modules-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmf8b06355a609ad0e9aeda3e58ab94e3ff7c3e3893cbf5add1260650a52b58731-ol9_x86_64_u6_baseos_patch
kernel-debug-modules-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmcbd61cdb0b1a594bca215481ecadd78c71d84268ebeedf76e2229c744b57bb52-ol9_x86_64_baseos_latest
kernel-debug-modules-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmcbd61cdb0b1a594bca215481ecadd78c71d84268ebeedf76e2229c744b57bb52-ol9_x86_64_u6_baseos_patch
kernel-debug-modules-extra-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme80753f0b8153591c2f18e74fd86b92df84e331f8fb1023363eb68e3f13f9242-ol9_x86_64_baseos_latest
kernel-debug-modules-extra-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme80753f0b8153591c2f18e74fd86b92df84e331f8fb1023363eb68e3f13f9242-ol9_x86_64_u6_baseos_patch
kernel-debug-uki-virt-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmab600b474eebb77d86c7ce4fc7e37e5ad3817af119df1d3f4f5fe680f259029a-ol9_x86_64_baseos_latest
kernel-debug-uki-virt-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmab600b474eebb77d86c7ce4fc7e37e5ad3817af119df1d3f4f5fe680f259029a-ol9_x86_64_u6_baseos_patch
kernel-devel-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm8d68eef98d741e3790a1fe79d21e242f9545fda61a2a95988f446d1d985d3001-ol9_x86_64_appstream
kernel-devel-matched-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm11bddf7fd76241be37734bcd26faaceb0471f2ff184feeed7077ec04809d259c-ol9_x86_64_appstream
kernel-doc-5.14.0-570.62.1.0.1.el9_6.noarch.rpm0e23b80ce2b64282aa691ae31f6d62eca732e9893857ee3504a04453c2522f88-ol9_x86_64_appstream
kernel-headers-5.14.0-570.62.1.0.1.el9_6.x86_64.rpma686ad6973eaf660ad9e00321f3af04334234d124d381d305ac77cbee548b7a0-ol9_x86_64_appstream
kernel-modules-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme232e67024b75af4126a4675fa507d243d082e924cdb016fc17d024e7aa63620-ol9_x86_64_baseos_latest
kernel-modules-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme232e67024b75af4126a4675fa507d243d082e924cdb016fc17d024e7aa63620-ol9_x86_64_u6_baseos_patch
kernel-modules-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme66a11bc398553a491886a87cd2560afe7f3fa549e722b0bda24223dbad7029b-ol9_x86_64_baseos_latest
kernel-modules-core-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme66a11bc398553a491886a87cd2560afe7f3fa549e722b0bda24223dbad7029b-ol9_x86_64_u6_baseos_patch
kernel-modules-extra-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmde7b82abbea96a3055c8cdae5a19cda39d4486ca6b499b0091ba180f9907044b-ol9_x86_64_baseos_latest
kernel-modules-extra-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmde7b82abbea96a3055c8cdae5a19cda39d4486ca6b499b0091ba180f9907044b-ol9_x86_64_u6_baseos_patch
kernel-tools-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm9863b32e7a9628bee19ee09488daa7eaa356880e8fc3f6332ff732c5c5cbd0d0-ol9_x86_64_baseos_latest
kernel-tools-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm9863b32e7a9628bee19ee09488daa7eaa356880e8fc3f6332ff732c5c5cbd0d0-ol9_x86_64_u6_baseos_patch
kernel-tools-libs-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm5c035ef559e67f3f7027f87ad6408e56a569b15b8de501b5cba071312ad9595c-ol9_x86_64_baseos_latest
kernel-tools-libs-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm5c035ef559e67f3f7027f87ad6408e56a569b15b8de501b5cba071312ad9595c-ol9_x86_64_u6_baseos_patch
kernel-tools-libs-devel-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm2972e7ffed7acf547abbd6dbcd0a3d93c185906160f74cd7723819887f9e6f33-ol9_x86_64_codeready_builder
kernel-uki-virt-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmad28e3432e36827b1a1e90b4ab58c97ea29cb93d6409fd4cf6da671acc0b5c0a-ol9_x86_64_baseos_latest
kernel-uki-virt-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmad28e3432e36827b1a1e90b4ab58c97ea29cb93d6409fd4cf6da671acc0b5c0a-ol9_x86_64_u6_baseos_patch
kernel-uki-virt-addons-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme4b9d8bc054aa62c01396c0df1c2639224a597ffd31361b011316a1693dff17b-ol9_x86_64_baseos_latest
kernel-uki-virt-addons-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme4b9d8bc054aa62c01396c0df1c2639224a597ffd31361b011316a1693dff17b-ol9_x86_64_u6_baseos_patch
libperf-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm33afdf18763fa4ed700b08c3f3463637f602e959815464387015b24e20f28738-ol9_x86_64_codeready_builder
perf-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm4c87c4270735425f846fc2bf875ace9afc6d5f2c49eef3956cd036f55d51f633-ol9_x86_64_appstream
python3-perf-5.14.0-570.62.1.0.1.el9_6.x86_64.rpmf2bdad42a24bb066fb9496e6b3283b2788e0e22040b15bb8e0d47fde1dad20fb-ol9_x86_64_appstream
rtla-5.14.0-570.62.1.0.1.el9_6.x86_64.rpme09720c2cd9bc1b3c73641b0254fd157ac49a856667c6f2043821fd515d0d259-ol9_x86_64_appstream
rv-5.14.0-570.62.1.0.1.el9_6.x86_64.rpm2c0b22cec911ba6f057b2245085b689a16158c814713de4cac16eafc2cba3af3-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete