ELSA-2025-21469

ELSA-2025-21469 - kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2025-11-25

Description


[5.14.0-611.8.1]
- Disable UKI signing [Orabug: 36571828]
- Update Oracle Linux certificates (Kevin Lyons)
- Disable signing for aarch64 (Ilya Okomin)
- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]
- Update x509.genkey [Orabug: 24817676]
- Conflict with shim-ia32 and shim-x64 <= 15.3-1.0.5]
- Remove upstream reference during boot (Kevin Lyons) [Orabug: 34729535]
- Add Oracle Linux IMA certificates
- Add new Oracle Linux Driver Signing (key 1) certificate [Orabug: 37985764]

[5.14.0-611.8.1]
- NFSD: Fix callback decoder status codes (Jay Shin) [RHEL-127193]
- NFSD: Fix CB_GETATTR status fix (Jay Shin) [RHEL-127193]
- NFSD: fix decoding in nfs4_xdr_dec_cb_getattr (Jay Shin) [RHEL-127193]
- kernfs: Fix UAF in polling when open file is released (Pavel Reichl) [RHEL-122087] {CVE-2025-39881}
- gitlab-ci: disable automotive pipelines (Scott Weaver)
- NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (Benjamin Coddington) [RHEL-122154]
- sched: Add wait/wake interface for variable updated under a lock. (Benjamin Coddington) [RHEL-122154]
- sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up() (Benjamin Coddington) [RHEL-122154]
- sched: Document wait_var_event() family of functions and wake_up_var() (Benjamin Coddington) [RHEL-122154]
- sched: Improve documentation for wake_up_bit/wait_on_bit family of functions (Benjamin Coddington) [RHEL-122154]
- sched: change wake_up_bit() and related function to expect unsigned long * (Benjamin Coddington) [RHEL-122154]
- bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} [rhel-9.7.z] (Xin Long) [RHEL-125513]
- redhat: use the same cert as UKI's to sign addons (Li Tian) [RHEL-125317]
- i40e: add mask to apply valid bits for itr_idx (Michal Schmidt) [RHEL-123808]
- i40e: add max boundary check for VF filters (Michal Schmidt) [RHEL-123808] {CVE-2025-39968}
- i40e: fix validation of VF state in get resources (Michal Schmidt) [RHEL-123808] {CVE-2025-39969}
- i40e: fix input validation logic for action_meta (Michal Schmidt) [RHEL-123808] {CVE-2025-39970}
- i40e: fix idx validation in config queues msg (Michal Schmidt) [RHEL-123808] {CVE-2025-39971}
- i40e: fix idx validation in i40e_validate_queue_map (Michal Schmidt) [RHEL-123808] {CVE-2025-39972}
- i40e: add validation for ring_len param (Michal Schmidt) [RHEL-123808] {CVE-2025-39973}
- io_uring/waitid: always prune wait queue entry in io_waitid_wait() (CKI Backport Bot) [RHEL-124971] {CVE-2025-40047}
- Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue (CKI Backport Bot) [RHEL-124129] {CVE-2025-39983}
- Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (CKI Backport Bot) [RHEL-123821] {CVE-2025-39982}
- use uniform permission checks for all mount propagation changes (Ian Kent) [RHEL-121704] {CVE-2025-38498}
- do_change_type(): refuse to operate on unmounted/not ours mounts (Ian Kent) [RHEL-121704] {CVE-2025-38498}
- KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (Jon Maloy) [RHEL-117136] {CVE-2025-38351}
- ibmveth: Add multi buffers rx replenishment hcall support (Mamatha Inamdar) [RHEL-117438]
- net: ibmveth: Reset the adapter when unexpected states are detected (Mamatha Inamdar) [RHEL-117438]
- NFS: Fix a race when updating an existing write (CKI Backport Bot) [RHEL-113855] {CVE-2025-39697}

[5.14.0-611.7.1]
- The rpminspect.yaml emptyrpm list needs to be expanded (Alexandra Hajkova)
- crypto: xts - Handle EBUSY correctly (Vladis Dronov) [RHEL-119236] {CVE-2023-53494}
- ice: fix NULL access of tx->in_use in ice_ll_ts_intr (Petr Oros) [RHEL-112874]
- ice: fix NULL access of tx->in_use in ice_ptp_ts_irq (Petr Oros) [RHEL-112874]
- ice: fix Rx page leak on multi-buffer frames (Petr Oros) [RHEL-116540]
- xfs: do not propagate ENODATA disk errors into xattr code (Carlos Maiolino) [RHEL-115730]
- ipv6: sr: Fix MAC comparison to be constant-time (CKI Backport Bot) [RHEL-116383] {CVE-2025-39702}
- s390/hypfs: Enable limited access during lockdown (CKI Backport Bot) [RHEL-114434]
- s390/hypfs: Avoid unnecessary ioctl registration in debugfs (CKI Backport Bot) [RHEL-114434]
- vsock/virtio: Validate length in packet header before skb_put() (Jon Maloy) [RHEL-114298] {CVE-2025-39718}

[5.14.0-611.6.1]
- pstore/ram: Check start of empty przs during init (CKI Backport Bot) [RHEL-122068] {CVE-2023-53331}
- ixgbe: fix ixgbe_orom_civd_info struct layout (Michal Schmidt) [RHEL-119074]
- scsi: lpfc: Fix buffer free/clear order in deferred receive path (CKI Backport Bot) [RHEL-119130] {CVE-2025-39841}
- efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CKI Backport Bot) [RHEL-118257] {CVE-2025-39817}
- SUNRPC: call xs_sock_process_cmsg for all cmsg (Olga Kornievskaia) [RHEL-110810]
- sunrpc: fix client side handling of tls alerts (Olga Kornievskaia) [RHEL-110810] {CVE-2025-38571}
- smb: client: fix wrong index reference in smb2_compound_op() (Paulo Alcantara) [RHEL-117880]
- smb: client: handle unlink(2) of files open by different clients (Paulo Alcantara) [RHEL-117880]
- smb: client: fix file open check in __cifs_unlink() (Paulo Alcantara) [RHEL-117880]
- smb: client: fix filename matching of deferred files (Paulo Alcantara) [RHEL-117880]
- smb: client: fix data loss due to broken rename(2) (Paulo Alcantara) [RHEL-117880]
- smb: client: fix compound alignment with encryption (Paulo Alcantara) [RHEL-117880]
- fs/smb: Fix inconsistent refcnt update (Paulo Alcantara) [RHEL-117880] {CVE-2025-39819}
- sunrpc: fix handling of server side tls alerts (Steve Dickson) [RHEL-111069] {CVE-2025-38566}
- wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (CKI Backport Bot) [RHEL-117580] {CVE-2025-39849}
- crypto: seqiv - Handle EBUSY correctly (CKI Backport Bot) [RHEL-117235] {CVE-2023-53373}
- ibmvnic: Increase max subcrq indirect entries with fallback (Mamatha Inamdar) [RHEL-116187]
- fs: fix UAF/GPF bug in nilfs_mdt_destroy (CKI Backport Bot) [RHEL-116662] {CVE-2022-50367}
- firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails (Charles Mirabile) [RHEL-113837] {CVE-2022-50087}
- hv_netvsc: Fix panic during namespace deletion with VF (Maxim Levitsky) [RHEL-115070]
- RDMA/mana_ib: Fix DSCP value in modify QP (Maxim Levitsky) [RHEL-115070]
- net: mana: Handle Reset Request from MANA NIC (Maxim Levitsky) [RHEL-115070]
- net: mana: Set tx_packets to post gso processing packet count (Maxim Levitsky) [RHEL-115070]
- net: mana: Handle unsupported HWC commands (Maxim Levitsky) [RHEL-115070]
- net: mana: Add handler for hardware servicing events (Maxim Levitsky) [RHEL-115070]
- RDMA/mana_ib: Add device statistics support (Maxim Levitsky) [RHEL-115070]
- net: mana: Expose additional hardware counters for drop and TC via ethtool. (Maxim Levitsky) [RHEL-115070]
- net: mana: Fix warnings for missing export.h header inclusion (Maxim Levitsky) [RHEL-115070]
- net: mana: Record doorbell physical address in PF mode (Maxim Levitsky) [RHEL-115070]
- s390/pci: Do not try re-enabling load/store if device is disabled (CKI Backport Bot) [RHEL-114451]
- s390/pci: Fix stale function handles in error handling (CKI Backport Bot) [RHEL-114451]
- redhat: enable TDX host config (Paolo Bonzini) [RHEL-27146]
- KVM: TDX: Explicitly do WBINVD when no more TDX SEAMCALLs (Paolo Bonzini) [RHEL-27146]
- x86/virt/tdx: Update the kexec section in the TDX documentation (Paolo Bonzini) [RHEL-27146]
- x86/virt/tdx: Remove the !KEXEC_CORE dependency (Paolo Bonzini) [RHEL-27146]
- x86/kexec: Disable kexec/kdump on platforms with TDX partial write erratum (Paolo Bonzini) [RHEL-27146]
- x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL (Paolo Bonzini) [RHEL-27146]
- x86/sme: Use percpu boolean to control WBINVD during kexec (Paolo Bonzini) [RHEL-27146]
- x86/virt/tdx: Avoid indirect calls to TDX assembly functions (Paolo Bonzini) [RHEL-27146]
- ibmvnic: Use ndo_get_stats64 to fix inaccurate SAR reporting (Mamatha Inamdar) [RHEL-114437]
- ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (Mamatha Inamdar) [RHEL-114437]
- ibmvnic: Add stat for tx direct vs tx batched (Mamatha Inamdar) [RHEL-114437]
- redhat/configs: Enable CONFIG_MITIGATION_VMSCAPE for x86 (Waiman Long) [RHEL-114272]
- x86/vmscape: Add old Intel CPUs to affected list (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- x86/vmscape: Warn when STIBP is disabled with SMT (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- x86/bugs: Move cpu_bugs_smt_update() down (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- x86/vmscape: Enable the mitigation (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- x86/vmscape: Add conditional IBPB mitigation (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- x86/vmscape: Enumerate VMSCAPE bug (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- Documentation/hw-vuln: Add VMSCAPE documentation (Waiman Long) [RHEL-114272] {CVE-2025-40300}
- randomize_kstack: Remove non-functional per-arch entropy filtering (Waiman Long) [RHEL-114272]
- tunnels: reset the GSO metadata before reusing the skb (Antoine Tenart) [RHEL-113917]


Related CVEs


CVE-2025-38351
CVE-2025-38498
CVE-2025-39697
CVE-2025-39881
CVE-2025-39971
CVE-2025-39982
CVE-2025-39983
CVE-2025-40047

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_aarch64_appstream
kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_aarch64_baseos_latest
kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_aarch64_codeready_builder
kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_aarch64_u7_baseos_patch
kernel-cross-headers-5.14.0-611.8.1.el9_7.aarch64.rpm607dcc407d43ecfa4f111800c2a2e47585b3e664a00bee11293c70ab7926d211-ol9_aarch64_codeready_builder
kernel-headers-5.14.0-611.8.1.el9_7.aarch64.rpm0e3801066ca8c2deb647d8dbe0ff75cb1e654fe8d7104388acdbe55fb862da68-ol9_aarch64_appstream
kernel-tools-5.14.0-611.8.1.el9_7.aarch64.rpm0003c4716b7d8b0a2a98fb52c943587f3f00762b6da1846e58e87b4632a406c6-ol9_aarch64_baseos_latest
kernel-tools-5.14.0-611.8.1.el9_7.aarch64.rpm0003c4716b7d8b0a2a98fb52c943587f3f00762b6da1846e58e87b4632a406c6-ol9_aarch64_u7_baseos_patch
kernel-tools-libs-5.14.0-611.8.1.el9_7.aarch64.rpm04e4d26beca024c5c4d00748adc2be51427277cf110d9baffba48af1f86ce471-ol9_aarch64_baseos_latest
kernel-tools-libs-5.14.0-611.8.1.el9_7.aarch64.rpm04e4d26beca024c5c4d00748adc2be51427277cf110d9baffba48af1f86ce471-ol9_aarch64_u7_baseos_patch
kernel-tools-libs-devel-5.14.0-611.8.1.el9_7.aarch64.rpm9583f73edb478561cd81529844f3544741aa7dad55c4273b82b0041d6d73a051-ol9_aarch64_codeready_builder
libperf-5.14.0-611.8.1.el9_7.aarch64.rpm2607b6c13a09307389695c7e32a23d8c67a800dd9b3639f60e8e25b5907248b7-ol9_aarch64_codeready_builder
perf-5.14.0-611.8.1.el9_7.aarch64.rpme6700d339ff77d5b208a596b9be16a0a2f8ab0c9ec67091d42f51c58eef14401-ol9_aarch64_appstream
python3-perf-5.14.0-611.8.1.el9_7.aarch64.rpm054bb6f9d6456383ef769f5909a440587e805eb1139c7932809403ae37cff60d-ol9_aarch64_appstream
rtla-5.14.0-611.8.1.el9_7.aarch64.rpm4fde31d90c546c4e519faae367c23a62c715b943c1c592038069a26643a2a784-ol9_aarch64_appstream
rv-5.14.0-611.8.1.el9_7.aarch64.rpm0754bdd3f49bdcf0119000402990fe827af7a6b8798711269549822e587181bd-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_x86_64_appstream
kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_x86_64_baseos_latest
kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_x86_64_codeready_builder
kernel-5.14.0-611.8.1.el9_7.src.rpme08506b3b0f02856112444ea40a057f5ec6418e930a0008975e5e46265feb492-ol9_x86_64_u7_baseos_patch
kernel-5.14.0-611.8.1.el9_7.x86_64.rpm37299d96aba1f31d65d981bdc9e0c81d76a8f7ac1cff468a07cda386e840ebba-ol9_x86_64_baseos_latest
kernel-5.14.0-611.8.1.el9_7.x86_64.rpm37299d96aba1f31d65d981bdc9e0c81d76a8f7ac1cff468a07cda386e840ebba-ol9_x86_64_u7_baseos_patch
kernel-abi-stablelists-5.14.0-611.8.1.el9_7.noarch.rpmd3819b2ea53663c81fe03ee54492ad151fa9261426ae0fc93b22c1aa823f7645-ol9_x86_64_baseos_latest
kernel-abi-stablelists-5.14.0-611.8.1.el9_7.noarch.rpmd3819b2ea53663c81fe03ee54492ad151fa9261426ae0fc93b22c1aa823f7645-ol9_x86_64_u7_baseos_patch
kernel-core-5.14.0-611.8.1.el9_7.x86_64.rpm607ba10a3a2f826a2d87e55c2a4d6e6789488da9ed084f0600ed121b81bf955b-ol9_x86_64_baseos_latest
kernel-core-5.14.0-611.8.1.el9_7.x86_64.rpm607ba10a3a2f826a2d87e55c2a4d6e6789488da9ed084f0600ed121b81bf955b-ol9_x86_64_u7_baseos_patch
kernel-cross-headers-5.14.0-611.8.1.el9_7.x86_64.rpm3b9d06db5c33630185a012850f18c2ad5903e0cce66727fe01a915159a81f26d-ol9_x86_64_codeready_builder
kernel-debug-5.14.0-611.8.1.el9_7.x86_64.rpm4caca02c7757d9f4b48628fde7207437111c277941d04448924ca41ec521996d-ol9_x86_64_baseos_latest
kernel-debug-5.14.0-611.8.1.el9_7.x86_64.rpm4caca02c7757d9f4b48628fde7207437111c277941d04448924ca41ec521996d-ol9_x86_64_u7_baseos_patch
kernel-debug-core-5.14.0-611.8.1.el9_7.x86_64.rpmfec42d09b02668e1f656f5c8f50a4ca13d3d44ab1a5a5d97fcfdd01b9f0cd0d8-ol9_x86_64_baseos_latest
kernel-debug-core-5.14.0-611.8.1.el9_7.x86_64.rpmfec42d09b02668e1f656f5c8f50a4ca13d3d44ab1a5a5d97fcfdd01b9f0cd0d8-ol9_x86_64_u7_baseos_patch
kernel-debug-devel-5.14.0-611.8.1.el9_7.x86_64.rpm0257a06e37b53d7cec7e0cf8121531c7a55af15d939f7a98b0add28a49c7950b-ol9_x86_64_appstream
kernel-debug-devel-matched-5.14.0-611.8.1.el9_7.x86_64.rpm487a56475823643ad4d69dbdd38241130cbc9cc07a82c3d195a0d5fac1551871-ol9_x86_64_appstream
kernel-debug-modules-5.14.0-611.8.1.el9_7.x86_64.rpm4dfd692f6ba333539a97513ac2faa57eb4fcd0dc467a6481fdd06a6cc64dcaf1-ol9_x86_64_baseos_latest
kernel-debug-modules-5.14.0-611.8.1.el9_7.x86_64.rpm4dfd692f6ba333539a97513ac2faa57eb4fcd0dc467a6481fdd06a6cc64dcaf1-ol9_x86_64_u7_baseos_patch
kernel-debug-modules-core-5.14.0-611.8.1.el9_7.x86_64.rpmc91956d342621172343d177014b94de1d9e40eb39a5939bee1abfe221acebdf1-ol9_x86_64_baseos_latest
kernel-debug-modules-core-5.14.0-611.8.1.el9_7.x86_64.rpmc91956d342621172343d177014b94de1d9e40eb39a5939bee1abfe221acebdf1-ol9_x86_64_u7_baseos_patch
kernel-debug-modules-extra-5.14.0-611.8.1.el9_7.x86_64.rpm20ba73f67ceb317f90cf432ab6915a57371531e6187998b14bb37ed0e552ef20-ol9_x86_64_baseos_latest
kernel-debug-modules-extra-5.14.0-611.8.1.el9_7.x86_64.rpm20ba73f67ceb317f90cf432ab6915a57371531e6187998b14bb37ed0e552ef20-ol9_x86_64_u7_baseos_patch
kernel-debug-uki-virt-5.14.0-611.8.1.el9_7.x86_64.rpma239cc76d6a3c1be044e96ed617780d0a7cbc314ddab05cfe759ccac7c34a84a-ol9_x86_64_baseos_latest
kernel-debug-uki-virt-5.14.0-611.8.1.el9_7.x86_64.rpma239cc76d6a3c1be044e96ed617780d0a7cbc314ddab05cfe759ccac7c34a84a-ol9_x86_64_u7_baseos_patch
kernel-devel-5.14.0-611.8.1.el9_7.x86_64.rpm89f9bdc2a9612ee20c913ec9e47a76a1b205873df81246ae39d94c06f486d580-ol9_x86_64_appstream
kernel-devel-matched-5.14.0-611.8.1.el9_7.x86_64.rpm4da56c7066851609fad02327f97601ba28265ab8e7c05bc0f8bb9a5378006952-ol9_x86_64_appstream
kernel-doc-5.14.0-611.8.1.el9_7.noarch.rpmad99e87571365b955aa762cce30bcd8cedd054190159ccec5c988c3ddbba6253-ol9_x86_64_appstream
kernel-headers-5.14.0-611.8.1.el9_7.x86_64.rpm4eca8cdfcbf6564db5dddf2fb72775f3c4b81b2170d712be17c56c15c2ebf013-ol9_x86_64_appstream
kernel-modules-5.14.0-611.8.1.el9_7.x86_64.rpmf55eed07773fd1c57a332cbf22ca3655376b626e8ae5cd863fd336412481cded-ol9_x86_64_baseos_latest
kernel-modules-5.14.0-611.8.1.el9_7.x86_64.rpmf55eed07773fd1c57a332cbf22ca3655376b626e8ae5cd863fd336412481cded-ol9_x86_64_u7_baseos_patch
kernel-modules-core-5.14.0-611.8.1.el9_7.x86_64.rpmb3fc94f5ebc285a9a5065b1b14cb57fe036ca52a2efc992fc1ed6ca9e945f258-ol9_x86_64_baseos_latest
kernel-modules-core-5.14.0-611.8.1.el9_7.x86_64.rpmb3fc94f5ebc285a9a5065b1b14cb57fe036ca52a2efc992fc1ed6ca9e945f258-ol9_x86_64_u7_baseos_patch
kernel-modules-extra-5.14.0-611.8.1.el9_7.x86_64.rpmba5d907ea8c287a087ae348672b8a78efb7924ca6d3277f2dfc799a6ae35dca7-ol9_x86_64_baseos_latest
kernel-modules-extra-5.14.0-611.8.1.el9_7.x86_64.rpmba5d907ea8c287a087ae348672b8a78efb7924ca6d3277f2dfc799a6ae35dca7-ol9_x86_64_u7_baseos_patch
kernel-tools-5.14.0-611.8.1.el9_7.x86_64.rpmfd4466a0c8555b7a28cb00f6126630525cad9af7545b8723c3e3cf72f0974295-ol9_x86_64_baseos_latest
kernel-tools-5.14.0-611.8.1.el9_7.x86_64.rpmfd4466a0c8555b7a28cb00f6126630525cad9af7545b8723c3e3cf72f0974295-ol9_x86_64_u7_baseos_patch
kernel-tools-libs-5.14.0-611.8.1.el9_7.x86_64.rpm2b828fffe1b30dcff2f3eb26cd31870b0bf1754854ce4f426edb408105b06b38-ol9_x86_64_baseos_latest
kernel-tools-libs-5.14.0-611.8.1.el9_7.x86_64.rpm2b828fffe1b30dcff2f3eb26cd31870b0bf1754854ce4f426edb408105b06b38-ol9_x86_64_u7_baseos_patch
kernel-tools-libs-devel-5.14.0-611.8.1.el9_7.x86_64.rpmb280d541b6a1c0583a24be831c52975ca35c2d33ac314b20a9292891e4869ea2-ol9_x86_64_codeready_builder
kernel-uki-virt-5.14.0-611.8.1.el9_7.x86_64.rpm44ab05336b8976846a63c268b5562936b526e3b1523f36910ffb5e253b3f731f-ol9_x86_64_baseos_latest
kernel-uki-virt-5.14.0-611.8.1.el9_7.x86_64.rpm44ab05336b8976846a63c268b5562936b526e3b1523f36910ffb5e253b3f731f-ol9_x86_64_u7_baseos_patch
kernel-uki-virt-addons-5.14.0-611.8.1.el9_7.x86_64.rpmea940644d34ce1972bfa0db447413493ef1dd4254f37a4addf7ef59a9a7919e7-ol9_x86_64_baseos_latest
kernel-uki-virt-addons-5.14.0-611.8.1.el9_7.x86_64.rpmea940644d34ce1972bfa0db447413493ef1dd4254f37a4addf7ef59a9a7919e7-ol9_x86_64_u7_baseos_patch
libperf-5.14.0-611.8.1.el9_7.x86_64.rpm5ba44c037c4c35302e001f911bd9b82940e9fd1e68b78982611cef36a9379f75-ol9_x86_64_codeready_builder
perf-5.14.0-611.8.1.el9_7.x86_64.rpm498d0a8ad465f3e1deff715cd4082d14e132fd593daf382e97336ba64a45fbd6-ol9_x86_64_appstream
python3-perf-5.14.0-611.8.1.el9_7.x86_64.rpm355f8837ccdf2345434d3f78e5f0f1ad265e048c9d3dac6d4f5d89930c7512a5-ol9_x86_64_appstream
rtla-5.14.0-611.8.1.el9_7.x86_64.rpm7ec65a01cba514f72b64cbf40c7c7de25e6b8ff122b4b1b09bfb433d631c6f7f-ol9_x86_64_appstream
rv-5.14.0-611.8.1.el9_7.x86_64.rpmf9466cdf4b9ffc9d4ef8f0800bf68a4d822b5493e68350a712388b40c98eb2d1-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete