ELSA-2026-50280

ELSA-2026-50280 - Unbreakable Enterprise kernel security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2026-05-20

Description


[5.15.0-320.202.8.4]
- ptrace: slightly saner 'get_dumpable()' logic (Linus Torvalds) [Orabug: 39391447] {CVE-2026-46333}

[5.15.0-320.202.8.3]
- nfsd: fix heap overflow in NFSv4.0 LOCK replay cache (Jeff Layton) [Orabug: 39362036] {CVE-2026-31402}
- net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (Victor Nogueira) [Orabug: 39362005] {CVE-2026-23270}
- KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking (Maxim Levitsky) [Orabug: 39362018]
- KVM: Don't block+unblock when halt-polling is successful (Sean Christopherson) [Orabug: 39362018]

[5.15.0-320.202.8.2]
- xfrm: esp: ipv4: fix up flags setting (Greg Kroah-Hartman) [Orabug: 39344515] {CVE-2026-43284}
- xfrm: esp: avoid in-place decrypt on shared skb frags (Kuan-Ting Chen) [Orabug: 39344515] {CVE-2026-43284}

[5.15.0-320.202.8.1]
- x86/CPU/AMD: Add a fix for AMD-SB-7052 (Prathyushi Nangia) [Orabug: 39327141] {CVE-2025-54518}

[5.15.0-320.202.8]
- iommu/arm-smmu-v3: Handle zeroed A4-2C HTTU override settings (Joao Martins) [Orabug: 39186453]
- iommu: Move IOMMU_DIRTY_NO_CLEAR define (Shameer Kolothum) [Orabug: 39186453]
- iommu/arm-smmu-v3: Enable HTTU for stage1 with io-pgtable mapping (Kunkun Jiang) [Orabug: 39186453]
- iommu/arm-smmu-v3: Add support for dirty tracking in domain alloc (Joao Martins) [Orabug: 39186453]
- iommu/io-pgtable-arm: Add read_and_clear_dirty() support (Shameer Kolothum) [Orabug: 39186453]
- iommu/arm-smmu-v3: Add feature detection for HTTU (Jean-Philippe Brucker) [Orabug: 39186453]

[5.15.0-320.202.7]
- crypto: algif_aead - Fix minimum RX size check for decryption (Herbert Xu) [Orabug: 39250686]
- crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl (Herbert Xu) [Orabug: 39250686]
- crypto: authencesn - Fix src offset when decrypting in-place (Herbert Xu) [Orabug: 39250686]
- crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption (Herbert Xu) [Orabug: 39250686]
- crypto: authenc - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39250686]
- crypto: algif_aead - snapshot IV for async AEAD requests (Douya Le) [Orabug: 39250686]
- crypto: algif_aead - Revert to operating out-of-place (Herbert Xu) [Orabug: 39250686] {CVE-2026-31431}
- crypto: algif_aead - use memcpy_sglist() instead of null skcipher (Eric Biggers) [Orabug: 39250686]
- crypto: scatterwalk - Backport memcpy_sglist() (Eric Biggers) [Orabug: 39250686]
- uek-rpm: Enable FWCTL for aarch64 (Dave Kleikamp) [Orabug: 39252913]

[5.15.0-320.202.6]
- Revert 'rds: Drop rds conn in connect worker if not in down state.' (Vijayendra Suman) [Orabug: 39277795]
- uek-rpm: CONFIG_INTEL_IOMMU_SCALABLE_MODE_DEFAULT_ON should be set (Dave Kleikamp) [Orabug: 39109819]
- iommu/vt-d: Disallow dirty tracking if incoherent page walk (Lu Baolu) [Orabug: 39109819]
- iommu/vt-d: Set variable intel_dirty_ops to static (Kunwu Chan) [Orabug: 39109819]
- iommu/vt-d: Access/Dirty bit support for SS domains (Joao Martins) [Orabug: 39109819]
- iommu/amd: reduce GA Log overflow printk noise (Alejandro Jimenez) [Orabug: 39209012]
- iommu/amd: add reschedule points to GA Log draining (Alejandro Jimenez) [Orabug: 39209012]
- iommu/amd: Rework GAInt handling in overflow case (Joao Martins) [Orabug: 39209012]
- iommu/amd: Disable GAInt while GA Log is processed (Joao Martins) [Orabug: 39209012]
- iommu/amd: Move helpers to update IOMMU features to amd_iommu.h (Alejandro Jimenez) [Orabug: 39209012]
- iommu/amd: Increase GA Log buffer size to 8192 entries (Joao Martins) [Orabug: 39209012]
- x86/CPU: Fix FPDSS on Zen1 (Borislav Petkov) [Orabug: 39241228,39273722] {CVE-2026-31628}

[5.15.0-320.202.5]
- Revert 'PCI: Enable ACS after configuring IOMMU for OF platforms' (Manivannan Sadhasivam) [Orabug: 39187371]
- net/handshake: duplicate handshake cancellations leak socket (Scott Mayhew) [Orabug: 38847720] {CVE-2025-68775}
- ext4: show 'shutdown' hint when ext4 is forced to shutdown (Baokun Li) [Orabug: 39002346]
- ext4: show 'emergency_ro' when EXT4_FLAGS_EMERGENCY_RO is set (Baokun Li) [Orabug: 39002346]
- ext4: correct behavior under errors=remount-ro mode (Baokun Li) [Orabug: 39002346]
- ext4: add more ext4_emergency_state() checks around sb_rdonly() (Baokun Li) [Orabug: 39002346]
- ext4: add ext4_emergency_state() helper function (Baokun Li) [Orabug: 39002346]
- ext4: add EXT4_FLAGS_EMERGENCY_RO bit (Baokun Li) [Orabug: 39002346]
- ext4: convert EXT4_FLAGS_* defines to enum (Baokun Li) [Orabug: 39002346]
- ext4: make ext4_forced_shutdown() take struct super_block (Jan Kara) [Orabug: 39002346]
- ipv6: use RCU in ip6_xmit() (Eric Dumazet) [Orabug: 38649062] {CVE-2025-40135}
- memfd: move MFD_MF_KEEP_UE_MAPPED flag to higher bit (William Roche) [Orabug: 39109773]
- scsi: qla2xxx: Sanitize payload size to prevent member overflow (Jiasheng Jiang) [Orabug: 38930868] {CVE-2026-23059}
- bpf: Fix reference count leak in bpf_prog_test_run_xdp() (Tetsuo Handa) [Orabug: 38887702] {CVE-2026-22994}
- nfsd: check that server is running in unlock_filesystem (Olga Kornievskaia) [Orabug: 38887682] {CVE-2026-22989}
- net/mlx5e: TC, delete flows only for existing peers (Mark Bloch) [Orabug: 38970398] {CVE-2026-23173}
- net/handshake: restore destructor on submit failure (Caoping) [Orabug: 38887601] {CVE-2025-71148}
- scsi: qla2xxx: Fix improper freeing of purex item (Zilin Guan) [Orabug: 38798929] {CVE-2025-68741}
- bnxt_en: Fix XDP_TX path (Michael Chan) [Orabug: 38847684] {CVE-2025-68770}
- perf/x86/amd: Check event before enable to avoid GPF (George Kennedy) [Orabug: 38847849] {CVE-2025-68798}
- scsi: smartpqi: Fix device resources accessed after device removal (Mike Mcgowen) [Orabug: 38798848] {CVE-2025-68371}
- KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (Omar Sandoval) [Orabug: 38773579] {CVE-2025-68259}
- x86/fpu: Ensure XFD state on signal delivery (Chang S. Bae) [Orabug: 38773165] {CVE-2025-68171}
- virtio-net: fix received length check in big packets (Bui Quang Minh) [Orabug: 38737152] {CVE-2025-40292}
- ACPI: CPPC: Fix NULL pointer dereference when nosmp is used (Yunhui Cui) [Orabug: 38641284] {CVE-2025-38113}
- EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (Qiuxu Zhuo) [Orabug: 38649173] {CVE-2025-40157}
- sunrpc: fix null pointer dereference on zero-length checksum (Lei Lu) [Orabug: 38649042] {CVE-2025-40129}
- cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() (Jinjie Ruan) [Orabug: 38641275] {CVE-2024-53230}
- cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw() (Jinjie Ruan) [Orabug: 38641272] {CVE-2024-53231}
- vhost: vringh: Fix copy_to_iter return value check (Michael S. Tsirkin) [Orabug: 38592117] {CVE-2025-40056}
- crypto: qat - flush misc workqueue during device shutdown (Giovanni Cabiddu) [Orabug: 38401717] {CVE-2025-39721}
- vhost: vringh: Modify the return value check (Zhang Jiao) [Orabug: 38592085] {CVE-2025-40051}
- virtio-net: fix recursived rtnl_lock() during probe() (Zigit Zo) [Orabug: 38324330] {CVE-2025-38551}
- gve: prevent ethtool ops after shutdown (Jordan Rhee) [Orabug: 38401492] {CVE-2025-38735}
- KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (Sean Christopherson) [Orabug: 38254140] {CVE-2025-38455}
- net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect (Oleksij Rempel) [Orabug: 38253871] {CVE-2025-38385}
- net/mlx5e: Disable MACsec offload for uplink representor profile (Carolina Jubran) [Orabug: 38094809] {CVE-2025-38020}
- dmaengine: idxd: fix memory leak in error handling path of idxd_alloc (Shuai Xue) [Orabug: 38094794] {CVE-2025-38015}
- net/mlx5: Fix ECVF vports unload on shutdown flow (Amir Tzin) [Orabug: 38152903] {CVE-2025-38109}
- bnxt: properly flush XDP redirect lists (Yan Zhai) [Orabug: 38175054] {CVE-2025-38246}
- eth: bnxt: fix missing ring index trim on error path (Jakub Kicinski) [Orabug: 37937451] {CVE-2025-37873}
- net/mlx5: Fix null-ptr-deref in mlx5_create_{inner_,}ttc_table() (Henry Martin) [Orabug: 37938078] {CVE-2025-37888}
- nfsd: fix possible badness in FREE_STATEID (Olga Kornievskaia) [Orabug: 37989102] {CVE-2024-50043}
- devlink: fix xa_alloc_cyclic() error handling (Michal Swiatkowski) [Orabug: 37828271] {CVE-2025-22017}

[5.15.0-320.202.4]
- xsk: fix an integer overflow in xp_create_and_assign_umem() (Gavrilov Ilia) [Orabug: 37828202] {CVE-2025-21997}
- RDMA/mlx5: Fix the recovery flow of the UMR QP (Yishai Hadas) [Orabug: 37766306] {CVE-2025-21892}
- misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors (Vimal Agrawal) [Orabug: 37678552] {CVE-2024-58078}
- net/sched: cls_api: fix error handling causing NULL dereference (Pierre Riteau) [Orabug: 37702083] {CVE-2025-21857}
- bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() (Shigeru Yoshida) [Orabug: 37766220] {CVE-2025-21867}
- net: xdp: Disallow attaching device-bound programs in generic mode (Toke Hoiland-Jorgensen) [Orabug: 37650238] {CVE-2025-21808}
- iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() (Qasim Ijaz) [Orabug: 37649891] {CVE-2025-21724}
- xfrm: delete intermediate secpath entry in packet offload mode (Alexandre Cassen) [Orabug: 37649866] {CVE-2025-21720}
- gpiolib: Fix crash on error in gpiochip_get_ngpios() (Andy Shevchenko) [Orabug: 37650154] {CVE-2025-21783}
- scsi: mpi3mr: Fix possible crash when setting up bsg fails (Guixin Liu) [Orabug: 37649886] {CVE-2025-21723}
- uek-rpm: Enable CONFIG_NET_VRF in container kernel (Boris Ostrovsky) [Orabug: 38932706]
- Documentation: add documentation for MFD_MF_KEEP_UE_MAPPED (William Roche) [Orabug: 38768951]
- selftests/mm: test userspace MFR for HugeTLB hugepage (William Roche) [Orabug: 38768951]
- mm: memfd/hugetlb: introduce memfd-based userspace MFR policy (William Roche) [Orabug: 38768951]

[5.15.0-320.202.3]
- net/mlx5: poll mlx5 eq during irq migration (Praveen Kumar Kannoju) [Orabug: 38915250]
- ipv4: icmp: convert to dev_net_rcu() (Eric Dumazet) [Orabug: 38807392]
- ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (Eric Dumazet) [Orabug: 38807392]
- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (Sean Christopherson) [Orabug: 39151165,39159089] {CVE-2026-23401}


Related CVEs


CVE-2026-46333

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) kernel-uek-5.15.0-320.202.8.4.el8uek.src.rpm327c9361c084c6c4b1d8ea5d6d030261d65ee594a3c1373e1573133dfc6ae77c-ol8_aarch64_UEKR7
bpftool-5.15.0-320.202.8.4.el8uek.aarch64.rpm2f781cd6fa361d0d0d353202b6d2826bf147ec0fb993ba5e0f69ba6248a2f4da-ol8_aarch64_UEKR7
kernel-uek-5.15.0-320.202.8.4.el8uek.aarch64.rpme03be7fff238195a7d251a17ddd9f1861de787fed152c6108aadc2ac8897d423-ol8_aarch64_UEKR7
kernel-uek-container-5.15.0-320.202.8.4.el8uek.aarch64.rpm565a1bebd0c09227a0e9de9941ba20bea168eeb1e4aabeb1a2333ac224d122e9-ol8_aarch64_UEKR7
kernel-uek-container-debug-5.15.0-320.202.8.4.el8uek.aarch64.rpm8160a54b6c64a8f12fe42d25f286fdcec87c2e38b7b9b1b4cb7cf7727db93c3b-ol8_aarch64_UEKR7
kernel-uek-core-5.15.0-320.202.8.4.el8uek.aarch64.rpm1f8d87c73959a9677e5f26a814ca50998935a4e6c61b8e3d744ef47862528ffa-ol8_aarch64_UEKR7
kernel-uek-debug-5.15.0-320.202.8.4.el8uek.aarch64.rpmbdfd52f74ed7d8ffe35e5089b7714ab852706a7a05830cc43e13f287896f893d-ol8_aarch64_UEKR7
kernel-uek-debug-core-5.15.0-320.202.8.4.el8uek.aarch64.rpm5ba2ca377ebe6860c23fad7579acda32d107ef212fa19ba69eb100b4f8021282-ol8_aarch64_UEKR7
kernel-uek-debug-devel-5.15.0-320.202.8.4.el8uek.aarch64.rpm95829ee9d55ed3a9deabd8c458e043e0a8473d98e31957439909984ac4b43eff-ol8_aarch64_UEKR7
kernel-uek-debug-modules-5.15.0-320.202.8.4.el8uek.aarch64.rpm920be0dd3f9747460ab86fc24f5b794999edca32916f21102a569a55fdab9be0-ol8_aarch64_UEKR7
kernel-uek-debug-modules-extra-5.15.0-320.202.8.4.el8uek.aarch64.rpma0302eba6b3fc1db3f5dfb47a666f9d79b2d7913cf866944402f9904b78a93a5-ol8_aarch64_UEKR7
kernel-uek-devel-5.15.0-320.202.8.4.el8uek.aarch64.rpme0baaec24db081795caa2a8ea68cad09c21e1dfce1600abc57a6a016e3662d54-ol8_aarch64_UEKR7
kernel-uek-doc-5.15.0-320.202.8.4.el8uek.noarch.rpmad4d41cf3c4c05008e2b157f7a28f4c78e9b31b97f91b0316471e1f668ad45b5-ol8_aarch64_UEKR7
kernel-uek-modules-5.15.0-320.202.8.4.el8uek.aarch64.rpm42b37cd89f2a98e623106c228d45c2f1ae8181f400341151c25c4903c6d19791-ol8_aarch64_UEKR7
kernel-uek-modules-extra-5.15.0-320.202.8.4.el8uek.aarch64.rpmb00b9b566bdc26e5c1ec2b47aad111ce37e180c21d9f85ebf41bfcb76627cc8e-ol8_aarch64_UEKR7
Oracle Linux 8 (x86_64) kernel-uek-5.15.0-320.202.8.4.el8uek.src.rpm327c9361c084c6c4b1d8ea5d6d030261d65ee594a3c1373e1573133dfc6ae77c-ol8_x86_64_UEKR7
bpftool-5.15.0-320.202.8.4.el8uek.x86_64.rpmcde6c69170c641ea7ac2b11e3bbffe09e299696ec5d2246fe805bb6e19c08374-ol8_x86_64_UEKR7
kernel-uek-5.15.0-320.202.8.4.el8uek.x86_64.rpm50eb4358d0ae1f1a68d868b324a1b77810dcae8af8a6320ceed0909001e01d51-ol8_x86_64_UEKR7
kernel-uek-container-5.15.0-320.202.8.4.el8uek.x86_64.rpmf86fcec0731e7ee4cdfe37b93e254fac7e1958014a9fb5ce3f885f01923bd599-ol8_x86_64_UEKR7
kernel-uek-container-debug-5.15.0-320.202.8.4.el8uek.x86_64.rpmbe7e577727ee9f95fc11a513fc54675be9ab30293d80db914c3ac4b3e68ed335-ol8_x86_64_UEKR7
kernel-uek-core-5.15.0-320.202.8.4.el8uek.x86_64.rpm87da7b64a1c5942632a63382d0d8eda5d3b623122e46c5aecfccee55e70d7181-ol8_x86_64_UEKR7
kernel-uek-debug-5.15.0-320.202.8.4.el8uek.x86_64.rpmf48af4210cff7a24f8ad98011c523258ab00f41d31511a2da751a8c1769e1afc-ol8_x86_64_UEKR7
kernel-uek-debug-core-5.15.0-320.202.8.4.el8uek.x86_64.rpm5530f853a8b0ab315ab20e7ffdb7e9ba2fd5e8d8188776ed839ba7352b5cb5c3-ol8_x86_64_UEKR7
kernel-uek-debug-devel-5.15.0-320.202.8.4.el8uek.x86_64.rpmffb2465cac6fb599ecde668c64e3a455127bba535b456ce8aad2b6fceeefe1e0-ol8_x86_64_UEKR7
kernel-uek-debug-modules-5.15.0-320.202.8.4.el8uek.x86_64.rpm411477be95316e1c88ba00ab6cbe0a4b4824247739f12e287051dbba2520fafa-ol8_x86_64_UEKR7
kernel-uek-debug-modules-extra-5.15.0-320.202.8.4.el8uek.x86_64.rpmc9b0a87747a0928c868ef77bb73ea02cb32e4c83082ef1c823d3c5e1f2fa12e0-ol8_x86_64_UEKR7
kernel-uek-devel-5.15.0-320.202.8.4.el8uek.x86_64.rpm5dc82d4170874de1b5dee4b5018b8a6561f20d0f4c348098ee0faac4b567de56-ol8_x86_64_UEKR7
kernel-uek-doc-5.15.0-320.202.8.4.el8uek.noarch.rpmad4d41cf3c4c05008e2b157f7a28f4c78e9b31b97f91b0316471e1f668ad45b5-ol8_x86_64_UEKR7
kernel-uek-modules-5.15.0-320.202.8.4.el8uek.x86_64.rpm35904f74b0a7448e85b4cf91f95ac5cd24e4c8a8d718dea2d577b6387ff1c7bd-ol8_x86_64_UEKR7
kernel-uek-modules-extra-5.15.0-320.202.8.4.el8uek.x86_64.rpm7ea1b25799a0eefa1c149d251acbfd15f7ee21d0c4492c0640daa1eacedd40a9-ol8_x86_64_UEKR7
Oracle Linux 9 (aarch64) kernel-uek-5.15.0-320.202.8.4.el9uek.src.rpmd372666fe06e283fcf026bdc4378795763bb911fadbb47a5f7ddd1ee10994555-ol9_aarch64_baseos_latest
kernel-uek-5.15.0-320.202.8.4.el9uek.src.rpmd372666fe06e283fcf026bdc4378795763bb911fadbb47a5f7ddd1ee10994555-ol9_aarch64_u7_baseos_patch
bpftool-5.15.0-320.202.8.4.el9uek.aarch64.rpma47bdb4f72724561bf9861e62899c44f6ff1771c3685463720c35093b760a71a-ol9_aarch64_baseos_latest
bpftool-5.15.0-320.202.8.4.el9uek.aarch64.rpma47bdb4f72724561bf9861e62899c44f6ff1771c3685463720c35093b760a71a-ol9_aarch64_u7_baseos_patch
kernel-uek-5.15.0-320.202.8.4.el9uek.aarch64.rpm8b2d71385e8741826952e166d03611a30a63b7bcba13ca9c5a104c61ef16ccad-ol9_aarch64_baseos_latest
kernel-uek-5.15.0-320.202.8.4.el9uek.aarch64.rpm8b2d71385e8741826952e166d03611a30a63b7bcba13ca9c5a104c61ef16ccad-ol9_aarch64_u7_baseos_patch
kernel-uek-container-5.15.0-320.202.8.4.el9uek.aarch64.rpm4311f215f5b17a921f942629dd98305d05a392488ee3e885158456d06ae8c538-ol9_aarch64_baseos_latest
kernel-uek-container-5.15.0-320.202.8.4.el9uek.aarch64.rpm4311f215f5b17a921f942629dd98305d05a392488ee3e885158456d06ae8c538-ol9_aarch64_u7_baseos_patch
kernel-uek-container-debug-5.15.0-320.202.8.4.el9uek.aarch64.rpmc0dcf12ccfbd0f4824bdd57568ed3843873b7c390246be1f9cfc99bf91ec799b-ol9_aarch64_baseos_latest
kernel-uek-container-debug-5.15.0-320.202.8.4.el9uek.aarch64.rpmc0dcf12ccfbd0f4824bdd57568ed3843873b7c390246be1f9cfc99bf91ec799b-ol9_aarch64_u7_baseos_patch
kernel-uek-core-5.15.0-320.202.8.4.el9uek.aarch64.rpmb1753da13f201c1af69179a49f6a106889a59c3e34c4c0c99fffac48bb161bae-ol9_aarch64_baseos_latest
kernel-uek-core-5.15.0-320.202.8.4.el9uek.aarch64.rpmb1753da13f201c1af69179a49f6a106889a59c3e34c4c0c99fffac48bb161bae-ol9_aarch64_u7_baseos_patch
kernel-uek-debug-5.15.0-320.202.8.4.el9uek.aarch64.rpme1bdc972a4e11e9f19f2cec6aaa626c5b08394e6a0252e926a183fd710fed7f1-ol9_aarch64_baseos_latest
kernel-uek-debug-5.15.0-320.202.8.4.el9uek.aarch64.rpme1bdc972a4e11e9f19f2cec6aaa626c5b08394e6a0252e926a183fd710fed7f1-ol9_aarch64_u7_baseos_patch
kernel-uek-debug-core-5.15.0-320.202.8.4.el9uek.aarch64.rpm70066fa8a1a82d9382de801b54b148cc36ad810743fba34a1ea8c4933168182a-ol9_aarch64_baseos_latest
kernel-uek-debug-core-5.15.0-320.202.8.4.el9uek.aarch64.rpm70066fa8a1a82d9382de801b54b148cc36ad810743fba34a1ea8c4933168182a-ol9_aarch64_u7_baseos_patch
kernel-uek-debug-devel-5.15.0-320.202.8.4.el9uek.aarch64.rpm8680a1a2ed1a3dce62957a783641dcddf10943b14f2e52492a0b7001766fb5d2-ol9_aarch64_baseos_latest
kernel-uek-debug-devel-5.15.0-320.202.8.4.el9uek.aarch64.rpm8680a1a2ed1a3dce62957a783641dcddf10943b14f2e52492a0b7001766fb5d2-ol9_aarch64_u7_baseos_patch
kernel-uek-debug-modules-5.15.0-320.202.8.4.el9uek.aarch64.rpmbc5ce82de5251cebd185ad0247eaf635d70f867ad8d68045c2d1a2e1c47e9644-ol9_aarch64_baseos_latest
kernel-uek-debug-modules-5.15.0-320.202.8.4.el9uek.aarch64.rpmbc5ce82de5251cebd185ad0247eaf635d70f867ad8d68045c2d1a2e1c47e9644-ol9_aarch64_u7_baseos_patch
kernel-uek-debug-modules-extra-5.15.0-320.202.8.4.el9uek.aarch64.rpmb539679c13def742496657e729727abb7e06c353a6ceff0b28cc8a8820570f50-ol9_aarch64_baseos_latest
kernel-uek-debug-modules-extra-5.15.0-320.202.8.4.el9uek.aarch64.rpmb539679c13def742496657e729727abb7e06c353a6ceff0b28cc8a8820570f50-ol9_aarch64_u7_baseos_patch
kernel-uek-devel-5.15.0-320.202.8.4.el9uek.aarch64.rpm74ea3a443a99fac01dcb46f2aa27953da23dd3cc5080b16477b9310e143c6a00-ol9_aarch64_baseos_latest
kernel-uek-devel-5.15.0-320.202.8.4.el9uek.aarch64.rpm74ea3a443a99fac01dcb46f2aa27953da23dd3cc5080b16477b9310e143c6a00-ol9_aarch64_u7_baseos_patch
kernel-uek-doc-5.15.0-320.202.8.4.el9uek.noarch.rpm5fdd34d0206abdafbb6d49d05c32a551af9bb821adf1e21520e454ead6af0ea5-ol9_aarch64_baseos_latest
kernel-uek-doc-5.15.0-320.202.8.4.el9uek.noarch.rpm5fdd34d0206abdafbb6d49d05c32a551af9bb821adf1e21520e454ead6af0ea5-ol9_aarch64_u7_baseos_patch
kernel-uek-modules-5.15.0-320.202.8.4.el9uek.aarch64.rpm0172fb03b971eda3430f0e63d64742bcb285694fb2b22ed99faffd06430031c4-ol9_aarch64_baseos_latest
kernel-uek-modules-5.15.0-320.202.8.4.el9uek.aarch64.rpm0172fb03b971eda3430f0e63d64742bcb285694fb2b22ed99faffd06430031c4-ol9_aarch64_u7_baseos_patch
kernel-uek-modules-extra-5.15.0-320.202.8.4.el9uek.aarch64.rpmaf3fa2da56f96bde292130e9c955709a667133bdda0946ab40f0e865e5ffb6c6-ol9_aarch64_baseos_latest
kernel-uek-modules-extra-5.15.0-320.202.8.4.el9uek.aarch64.rpmaf3fa2da56f96bde292130e9c955709a667133bdda0946ab40f0e865e5ffb6c6-ol9_aarch64_u7_baseos_patch
kernel-uek64k-5.15.0-320.202.8.4.el9uek.aarch64.rpmd3028fd08c0e637f22e20d46e3df2c469677e0f079f6c11ee512c1b20b632738-ol9_aarch64_baseos_latest
kernel-uek64k-5.15.0-320.202.8.4.el9uek.aarch64.rpmd3028fd08c0e637f22e20d46e3df2c469677e0f079f6c11ee512c1b20b632738-ol9_aarch64_u7_baseos_patch
kernel-uek64k-core-5.15.0-320.202.8.4.el9uek.aarch64.rpm05c28873e8f8e46b4534bb977ec48bc9158d044d17075ce441c32d8db85a1092-ol9_aarch64_baseos_latest
kernel-uek64k-core-5.15.0-320.202.8.4.el9uek.aarch64.rpm05c28873e8f8e46b4534bb977ec48bc9158d044d17075ce441c32d8db85a1092-ol9_aarch64_u7_baseos_patch
kernel-uek64k-devel-5.15.0-320.202.8.4.el9uek.aarch64.rpm67ed743f735cfacb57f1d5b59f66926ba01f7fd5adf9d39b896222c875045182-ol9_aarch64_baseos_latest
kernel-uek64k-devel-5.15.0-320.202.8.4.el9uek.aarch64.rpm67ed743f735cfacb57f1d5b59f66926ba01f7fd5adf9d39b896222c875045182-ol9_aarch64_u7_baseos_patch
kernel-uek64k-modules-5.15.0-320.202.8.4.el9uek.aarch64.rpmfd2a20a261fb509bb0d9055a748162c7fdf5e33f8b5567dcbddf6c3f8182c6a2-ol9_aarch64_baseos_latest
kernel-uek64k-modules-5.15.0-320.202.8.4.el9uek.aarch64.rpmfd2a20a261fb509bb0d9055a748162c7fdf5e33f8b5567dcbddf6c3f8182c6a2-ol9_aarch64_u7_baseos_patch
kernel-uek64k-modules-extra-5.15.0-320.202.8.4.el9uek.aarch64.rpmb9ad7be138a5ffd030f2da72d18016da0f320c4f03221b267a4d91a9e7992f0d-ol9_aarch64_baseos_latest
kernel-uek64k-modules-extra-5.15.0-320.202.8.4.el9uek.aarch64.rpmb9ad7be138a5ffd030f2da72d18016da0f320c4f03221b267a4d91a9e7992f0d-ol9_aarch64_u7_baseos_patch
Oracle Linux 9 (x86_64) kernel-uek-5.15.0-320.202.8.4.el9uek.src.rpmd372666fe06e283fcf026bdc4378795763bb911fadbb47a5f7ddd1ee10994555-ol9_x86_64_UEKR7
bpftool-5.15.0-320.202.8.4.el9uek.x86_64.rpmf292e67048ba0787ec61ef00adc92013af297c7118bb1da81efd68461b618b39-ol9_x86_64_UEKR7
kernel-uek-5.15.0-320.202.8.4.el9uek.x86_64.rpm39c55ace8679b8fddd1fe536888ddf5b902c11cf469ca509507a0b24b2be2277-ol9_x86_64_UEKR7
kernel-uek-container-5.15.0-320.202.8.4.el9uek.x86_64.rpmf0dade4c521390ed9bda95c958cfe198b9e4518b60c1b51a18614c09e07fc380-ol9_x86_64_UEKR7
kernel-uek-container-debug-5.15.0-320.202.8.4.el9uek.x86_64.rpm1d71345fd0f90339bd0579671124ebd432552e566c845487b5d7e91549077e63-ol9_x86_64_UEKR7
kernel-uek-core-5.15.0-320.202.8.4.el9uek.x86_64.rpm7d98cb4e8f56d94931b5f25e5695971da3919ec413876a0394674f74c775b693-ol9_x86_64_UEKR7
kernel-uek-debug-5.15.0-320.202.8.4.el9uek.x86_64.rpmf82159b8e7fb6de120ef15bc4cc58069f0b914eb1645b0918b956258269cdeaa-ol9_x86_64_UEKR7
kernel-uek-debug-core-5.15.0-320.202.8.4.el9uek.x86_64.rpmf0b828a7156ea1858052fe8f96499a0017aec11817230e7d699c9fa2585ab32c-ol9_x86_64_UEKR7
kernel-uek-debug-devel-5.15.0-320.202.8.4.el9uek.x86_64.rpm6323d525ffecf1059ddd56a0d1a17067deeb0a2ece7b40b82aa90be7a78503df-ol9_x86_64_UEKR7
kernel-uek-debug-modules-5.15.0-320.202.8.4.el9uek.x86_64.rpm0b4c1ef6ee49c5f2268bf1a5ca8d063b958cfa33947176cb32279b7992e55518-ol9_x86_64_UEKR7
kernel-uek-debug-modules-extra-5.15.0-320.202.8.4.el9uek.x86_64.rpmb49438682563a03c0565ae033cafd9010831acbe448b24d1a172afe8c417f6dd-ol9_x86_64_UEKR7
kernel-uek-devel-5.15.0-320.202.8.4.el9uek.x86_64.rpmee62d77094aba19c8b603cfe6c249cf455caf027fa9d16930ff82e7ef1ba53b3-ol9_x86_64_UEKR7
kernel-uek-doc-5.15.0-320.202.8.4.el9uek.noarch.rpm5fdd34d0206abdafbb6d49d05c32a551af9bb821adf1e21520e454ead6af0ea5-ol9_x86_64_UEKR7
kernel-uek-modules-5.15.0-320.202.8.4.el9uek.x86_64.rpm83742fb77824b2f1d8d6a2ef4eed3cf44c796f6a0dbb18838a7f2e7dda97b51f-ol9_x86_64_UEKR7
kernel-uek-modules-extra-5.15.0-320.202.8.4.el9uek.x86_64.rpmb130e929c8bc6006fd92c89b8ee73f7687a24ed6d8a1f31a1a0979d3adaa28eb-ol9_x86_64_UEKR7



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete