- Issued:
- 2024-11-12
- Updated:
- 2024-11-12
RHSA-2024:9315 - Security Advisory
Synopsis
Moderate: kernel security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for kernel is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS) (CVE-2020-10135)
- kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340)
- kernel: use-after-free in cec_queue_msg_fh (CVE-2024-23848)
- kernel: stack overflow problem in Open vSwitch kernel module leading to DoS (CVE-2024-1151)
- kernel: crash due to a missing check for leb_size (CVE-2024-25739)
- kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach (CVE-2024-26591)
- kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)
- kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)
- kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS (CVE-2024-26589)
- kernel: iommu: Don't reserve 0-length IOVA region (CVE-2023-52455)
- kernel: bpf: fix check for attempt to corrupt spilled pointer (CVE-2023-52462)
- kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
- kernel: PCI/ASPM: Fix deadlock when enabling ASPM (CVE-2024-26605)
- kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603)
- kernel: ext4: regenerate buddy after block freeing failed if under fc replay (CVE-2024-26601)
- kernel: out-of-bounds read in pci_dev_for_each_resource() (CVE-2023-52466)
- kernel:null pointer dereference in of_syscon_register() (CVE-2023-52467)
- kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857)
- kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function (CVE-2024-24858)
- kernel: use after free in i2c (CVE-2019-25162)
- kernel: NULL pointer dereference in zone registration error path (CVE-2023-52473)
- kernel: use-after-free in powermate_config_complete (CVE-2023-52475)
- kernel: x86/srso: Add SRSO mitigation for Hygon processors (CVE-2023-52482)
- kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477)
- kernel: NULL Pointer dereference bluetooth allows Overflow Buffers (CVE-2024-22099)
- kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)
- kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565)
- kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)
- kernel: ring-buffer: Do not attempt to read past "commit" (CVE-2023-52501)
- kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528)
- kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)
- kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)
- kernel: asix: fix uninit-value in asix_mdio_read() (CVE-2021-47101)
- kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations (CVE-2021-47098)
- kernel: powerpc/lib: Validate size for vector operations (CVE-2023-52606)
- kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)
- kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)
- kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() (CVE-2023-52585)
- kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code (CVE-2023-52498)
- kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)
- kernel: mm: migrate: fix getting incorrect page mapping during page migration (CVE-2023-52490)
- hw: arm64/sme: Always exit sme_alloc() early with existing storage (CVE-2024-26618)
- kernel: netfs, fscache: Prevent Oops in fscache_put_cache() (CVE-2024-26612)
- kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP (CVE-2024-26611)
- kernel: tcp: make sure init the accept_queue's spinlocks once (CVE-2024-26614)
- kernel: PM / devfreq: Fix buffer overflow in trans_stat_show (CVE-2023-52614)
- kernel: pstore/ram: Fix crash when setting number of cpus to an odd number (CVE-2023-52619)
- kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615)
- kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (CVE-2024-26641)
- kernel: nbd: always initialize struct msghdr completely (CVE-2024-26638)
- kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (CVE-2024-26631)
- kernel: tracing: Ensure visibility when inserting an element into tracing_map (CVE-2024-26645)
- kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface (CVE-2023-52625)
- kernel: drm/amd/display: Wake DMCUB before executing GPINT commands (CVE-2023-52624)
- kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
- kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers (CVE-2023-52621)
- kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM (CVE-2024-26646)
- kernel: p2sb_bar() calls during PCI device probe (CVE-2024-26650)
- kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)
- kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 (CVE-2024-26660)
- kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (CVE-2024-26661)
- kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' (CVE-2024-26662)
- kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (CVE-2024-26663)
- kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)
- kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)
- kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD (CVE-2024-26670)
- kernel: drm/amdkfd: lock dependency warning with srcu (CVE-2023-52632)
- kernel: drm/amd/display: Fix disable_otg_wa logic (CVE-2023-52634)
- kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] (CVE-2023-52635)
- kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' (CVE-2024-26672)
- kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (CVE-2024-26674)
- kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
- kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section (CVE-2024-26678)
- kernel: inet: read sk->sk_family once in inet_recv_error() (CVE-2024-26679)
- kernel: net: atlantic: Fix DMA mapping for PTP hwts ring (CVE-2024-26680)
- kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (CVE-2023-52637)
- kernel: KVM: arm64: Fix circular locking dependency (CVE-2024-26691)
- kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats (CVE-2024-26686)
- kernel: drm/amd/display: Fix MST Null Ptr for RV (CVE-2024-26700)
- kernel: dpll: fix possible deadlock during netlink dump operation (CVE-2024-26725)
- kernel: nouveau: offload fence uevents work to workqueue (CVE-2024-26719)
- kernel: HID: i2c-hid-of: fix NULL-deref on failed power up (CVE-2024-26717)
- kernel: powerpc/kasan: Fix addr error caused by page alignment (CVE-2024-26712)
- kernel: mptcp: really cope with fastopen race (CVE-2024-26708)
- kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() (CVE-2024-26707)
- kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)
- kernel: drm/amd/display: fixed integer types and null check locations (CVE-2024-26767)
- kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (CVE-2024-26761)
- kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)
- kernel: md: Don't ignore suspended array in md_check_recovery() (CVE-2024-26758)
- kernel: md: Don't ignore read-only array in md_check_recovery() (CVE-2024-26757)
- kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (CVE-2024-26774)
- kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)
- kernel: arp: Prevent overflow in arp_req_get(). (CVE-2024-26733)
- kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744)
- kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)
- kernel: net/sched: act_mirred: use the backlog for mirred ingress (CVE-2024-26740)
- kernel: dmaengine: idxd: Ensure safe user copy of completion record (CVE-2024-26746)
- kernel: net: veth: clear GRO when clearing XDP even when down (CVE-2024-26803)
- kernel: iommufd: Fix iopt_access_list_id overwrite bug (CVE-2024-26786)
- kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (CVE-2024-26785)
- kernel: mptcp: fix double-free on socket dismantle (CVE-2024-26782)
- kernel: vfio/pci: Create persistent INTx handler (CVE-2024-26812)
- kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ (CVE-2024-27437)
- kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check (CVE-2024-26815)
- kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185)
- kernel: nvme-fc: do not wait in vain when unloading module (CVE-2024-26846)
- kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)
- kernel: cachefiles: fix memory leak in cachefiles_add_cache() (CVE-2024-26840)
- kernel: RDMA/irdma: Fix KASAN issue with tasklet (CVE-2024-26838)
- kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload (CVE-2024-26837)
- kernel: netfilter: nf_tables: set dormant flag on hook register failure (CVE-2024-26835)
- kernel: iio: core: fix memleak in iio_device_register_sysfs (CVE-2023-52643)
- kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
- kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)
- kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (CVE-2024-26903)
- kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901)
- kernel: md: fix kmemleak of rdev->serial (CVE-2024-26900)
- kernel: block: fix deadlock between bd_link_disk_holder and partition scan (CVE-2024-26899)
- kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (CVE-2024-26894)
- kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() (CVE-2024-26892)
- kernel: Bluetooth: btrtl: fix out of bounds memory access (CVE-2024-26890)
- kernel: Bluetooth: hci_core: Fix possible buffer overflow (CVE-2024-26889)
- kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() (CVE-2024-26882)
- kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)
- kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872)
- kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (CVE-2024-26870)
- kernel: hsr: Fix uninit-value access in hsr_get_node() (CVE-2024-26863)
- kernel: packet: annotate data-races around ignore_outgoing (CVE-2024-26862)
- kernel: wireguard: receive: annotate data-race around receiving_counter.counter (CVE-2024-26861)
- kernel: geneve: make sure to pull inner header in geneve_rx() (CVE-2024-26857)
- kernel: tracing/trigger: Fix to return error if failed to alloc snapshot (CVE-2024-26920)
- kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit (CVE-2024-26915)
- kernel: inet: inet_defrag: prevent sk release while still in use (CVE-2024-26921)
- kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly (CVE-2024-26922)
- kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924)
- kernel: ASoC: SOF: Add some bounds checking to firmware data (CVE-2024-26927)
- kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() (CVE-2024-26928)
- kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)
- kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (CVE-2024-26962)
- kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() (CVE-2024-26960)
- kernel: nfs: fix UAF in direct writes (CVE-2024-26958)
- kernel: net: esp: fix bad handling of pages from page_pool (CVE-2024-26953)
- kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list (CVE-2024-26951)
- kernel: wireguard: netlink: access device through ctx instead of peer (CVE-2024-26950)
- kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (CVE-2024-26940)
- kernel: drm/i915/vma: Fix UAF on destroy against retire race (CVE-2024-26939)
- kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (CVE-2024-26938)
- kernel: drm/i915/gt: Reset queue_priority_hint on parking (CVE-2024-26937)
- kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934)
- kernel: USB: core: Fix deadlock in port "disable" sysfs attribute (CVE-2024-26933)
- kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)
- kernel: netfilter: flowtable: incorrect pppoe tuple (CVE-2024-27015)
- kernel: net/mlx5e: Prevent deadlock while disabling aRFS (CVE-2024-27014)
- kernel: tun: limit printing rate when illegal packet received by tun dev (CVE-2024-27013)
- kernel: netfilter: nf_tables: restore set elements when delete set fails (CVE-2024-27012)
- kernel: netfilter: nf_tables: fix memleak in map from abort path (CVE-2024-27011)
- kernel: net/sched: Fix mirred deadlock on device recursion (CVE-2024-27010)
- kernel: clk: Get runtime PM before walking tree during disable_unused (CVE-2024-27004)
- kernel: clk: Get runtime PM before walking tree for clk_summary (CVE-2024-27003)
- kernel: KVM: x86/pmu: Disable support for adaptive PEBS (CVE-2024-26992)
- kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (CVE-2024-26990)
- kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() (CVE-2024-26989)
- kernel: init/main.c: Fix potential static_command_line memory overflow (CVE-2024-26988)
- kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled (CVE-2024-26987)
- kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)
- kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)
- kernel: powercap: intel_rapl: Fix a NULL pointer dereference (CVE-2024-26975)
- kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)
- kernel: nouveau: lock the client object tree. (CVE-2024-27062)
- kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (CVE-2024-27057)
- kernel: wifi: brcm80211: handle pmk_op allocation failure (CVE-2024-27048)
- kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (CVE-2024-27042)
- kernel: clk: Fix clk_core_get NULL dereference (CVE-2024-27038)
- kernel: nbd: null check for nla_nest_start (CVE-2024-27025)
- kernel: md: Fix missing release of 'active_io' for flush (CVE-2024-27023)
- kernel: iommu/vt-d: Fix NULL domain on device release (CVE-2024-27079)
- kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node (CVE-2023-52650)
- kernel: drm/vkms: Avoid reading beyond LUT array (CVE-2023-52649)
- kernel: pstore: inode: Only d_invalidate() is needed (CVE-2024-27389)
- kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)
- kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state (CVE-2023-52648)
- kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() (CVE-2022-48672)
- kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (CVE-2022-48703)
- kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit (CVE-2024-27395)
- kernel: io_uring: drop any code related to SCM_RIGHTS (CVE-2023-52656)
- kernel: dm-raid: really frozen sync_thread during suspend (CVE-2024-35794)
- kernel: md/md-bitmap: fix incorrect usage for sb_index (CVE-2024-35787)
- kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program (CVE-2024-27431)
- kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (CVE-2024-27414)
- kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410)
- kernel: mptcp: fix data races on remote_id (CVE-2024-27404)
- kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. (CVE-2024-27436)
- kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (CVE-2023-52659)
- kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs (CVE-2024-35795)
- kernel: wifi: mac80211: fix potential sta-link leak (CVE-2024-35838)
- kernel: net/mlx5e: fix a double-free in arfs_create_groups (CVE-2024-35835)
- kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails (CVE-2024-35831)
- kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (CVE-2024-35827)
- kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume (CVE-2024-35824)
- kernel: usb: udc: remove warning when queue disabled ep (CVE-2024-35822)
- kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (CVE-2024-35817)
- kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling (CVE-2024-35814)
- kernel: usb: cdc-wdm: close race between read and workqueue (CVE-2024-35812)
- kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory (CVE-2024-35810)
- kernel: PCI/PM: Drain runtime-idle callbacks before driver removal (CVE-2024-35809)
- kernel: md/dm-raid: don't call md_reap_sync_thread() directly (CVE-2024-35808)
- kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)
- kernel: dm snapshot: fix lockup in dm_exception_table_exit (CVE-2024-35805)
- kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)
- kernel: block: fix module reference leakage from bdev_open_by_dev error path (CVE-2024-35859)
- kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update (CVE-2024-35855)
- kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash (CVE-2024-35854)
- kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (CVE-2024-35853)
- kernel: irqchip/gic-v3-its: Prevent double free on error (CVE-2024-35847)
- kernel: iommu/vt-d: Use device rbtree in iopf reporting path (CVE-2024-35843)
- kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (CVE-2024-35840)
- kernel: calipso: fix memory leak in netlbl_calipso_add_pass() (CVE-2023-52698)
- kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL (CVE-2023-52697)
- kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init() (CVE-2023-52696)
- kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one() (CVE-2023-52690)
- kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels (CVE-2023-52689)
- kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686)
- kernel: ACPI: LPIT: Avoid u32 multiplication overflow (CVE-2023-52683)
- kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get() (CVE-2023-52680)
- kernel: of: Fix double free in of_parse_phandle_with_args_map (CVE-2023-52679)
- kernel: bpf: Guard stack limits against 32bit overflow (CVE-2023-52676)
- kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() (CVE-2023-52674)
- kernel: net: atlantic: eliminate double free in error handling logic (CVE-2023-52664)
- kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe() (CVE-2023-52663)
- kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (CVE-2023-52662)
- kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (CVE-2023-52661)
- kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
- kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (CVE-2024-35928)
- kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (CVE-2024-35930)
- kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery (CVE-2024-35931)
- kernel: drm: Check output polling initialized before disabling (CVE-2024-35927)
- kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (CVE-2024-35913)
- kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks (CVE-2024-35912)
- kernel: tls: get psock ref after taking rxlock to avoid leak (CVE-2024-35908)
- kernel: bpf: Protect against int overflow for stack access size (CVE-2024-35905)
- kernel: selinux: avoid dereference of garbage after mount failure (CVE-2024-35904)
- kernel: netfilter: nf_tables: reject new basechain after table flag update (CVE-2024-35900)
- kernel: mptcp: prevent BPF accessing lowat from a subflow socket. (CVE-2024-35894)
- kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (CVE-2024-35892)
- kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)
- kernel: ipv6: Fix infinite recursion in fib6_dump_done(). (CVE-2024-35886)
- kernel: io_uring/kbuf: hold io_buffer_list reference over mmap (CVE-2024-35880)
- kernel: of: module: prevent NULL pointer dereference in vsnprintf() (CVE-2024-35878)
- kernel: x86/mm/pat: fix VM_PAT handling in COW mappings (CVE-2024-35877)
- kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)
- kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios (CVE-2024-35872)
- kernel: smb: client: guarantee refcounted children from parent session (CVE-2024-35869)
- kernel: block: prevent division by zero in blk_rq_stat_sum() (CVE-2024-35925)
- kernel: smb: client: fix potential UAF in cifs_stats_proc_show() (CVE-2024-35867)
- kernel: usb: typec: ucsi: Limit read size on v1.2 (CVE-2024-35924)
- kernel: smb: client: fix potential UAF in cifs_dump_full_key() (CVE-2024-35866)
- kernel: io_uring: clear opcode specific data for an early failure (CVE-2024-35923)
- kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() (CVE-2024-35865)
- kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() (CVE-2024-35864)
- kernel: smb: client: fix potential UAF in is_valid_oplock_break() (CVE-2024-35863)
- kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() (CVE-2024-35862)
- kernel: randomize_kstack: Improve entropy diffusion (CVE-2024-35918)
- kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() (CVE-2024-35861)
- kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() (CVE-2024-35944)
- kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (CVE-2024-35942)
- kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939)
- kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB (CVE-2024-35938)
- kernel: wifi: rtw89: fix null pointer access when abort scan (CVE-2024-35946)
- kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue (CVE-2024-35991)
- kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS (CVE-2024-35983)
- kernel: raid1: fix use-after-free for original bio in raid1_write_request() (CVE-2024-35979)
- kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (CVE-2024-35976)
- kernel: geneve: fix header validation in geneve[6]_xmit_skb (CVE-2024-35973)
- kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959)
- kernel: iommu/vt-d: Fix WARN_ON in iommu probe path (CVE-2024-35957)
- kernel: scsi: sg: Avoid sg device teardown race (CVE-2024-35954)
- kernel: drm/ast: Fix soft lockup (CVE-2024-35952)
- kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex (CVE-2024-35950)
- kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage (CVE-2024-36006)
- kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses (CVE-2024-35995)
- kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI (CVE-2021-47429)
- kernel: powerpc/64s: fix program check interrupt emergency stack path (CVE-2021-47428)
- kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47386)
- kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384)
- kernel: lib/generic-radix-tree.c: Don't overflow in peek() (CVE-2021-47432)
- kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path (CVE-2023-52703)
- kernel: pstore/platform: Add check for kstrdup (CVE-2023-52869)
- kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size (CVE-2023-52762)
- kernel: nbd: fix uaf in nbd_open (CVE-2023-52837)
- kernel: mmc: sdio: fix possible resource leaks in some error paths (CVE-2023-52730)
- kernel: smb: client: fix potential deadlock when releasing mids (CVE-2023-52757)
- kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (CVE-2023-52819)
- kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls (CVE-2023-52788)
- kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET (CVE-2023-52813)
- kernel: drm/amdgpu: Fix potential null pointer derefernce (CVE-2023-52814)
- kernel: drm/radeon: possible buffer overflow (CVE-2023-52867)
- kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (CVE-2023-52817)
- kernel: spi: Fix null dereference on suspend (CVE-2023-52749)
- kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds (CVE-2023-52878)
- kernel: net/smc: avoid data corruption caused by decline (CVE-2023-52775)
- kernel: cpu/hotplug: Don't offline the last non-isolated CPU (CVE-2023-52831)
- kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (CVE-2023-52740)
- kernel: pwm: Fix double shift bug (CVE-2023-52756)
- kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811)
- kernel: atl1c: Work around the DMA RX overflow issue (CVE-2023-52834)
- kernel: perf: hisi: Fix use-after-free when register pmu fails (CVE-2023-52859)
- kernel: i2c: dev: copy userspace array safely (CVE-2023-52758)
- kernel: smb: client: fix use-after-free in smb2_query_info_compound() (CVE-2023-52751)
- kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (CVE-2023-52840)
- kernel: Bluetooth: btusb: Add date->evt_skb is NULL check (CVE-2023-52833)
- kernel: i2c: core: Run atomic i2c xfer when !preemptible (CVE-2023-52791)
- kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784)
- kernel: fbdev: Fix invalid page access after closing deferred I/O devices (CVE-2023-52731)
- kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() (CVE-2021-47457)
- kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline (CVE-2021-47454)
- kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells (CVE-2021-47497)
- kernel: usbnet: sanity check for maxpacket (CVE-2021-47495)
- kernel: igb: Fix string truncation warnings in igb_set_fw_version (CVE-2024-36010)
- kernel: aio: fix use-after-free due to missing POLLFREE handling (CVE-2021-47505)
- kernel: ppdev: Add an error check in register_device (CVE-2024-36015)
- kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (CVE-2024-36885)
- kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() (CVE-2024-36884)
- kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() (CVE-2024-36882)
- kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones (CVE-2024-36881)
- kernel: octeontx2-af: fix the double free in rvu_npc_freemem() (CVE-2024-36030)
- kernel: keys: Fix overwrite of key expiration on instantiation (CVE-2024-36031)
- kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() (CVE-2024-36028)
- kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload (CVE-2024-36022)
- kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (CVE-2024-36945)
- kernel: Reapply "drm/qxl: simplify qxl_fence_wait" (CVE-2024-36944)
- kernel: pinctrl: core: delete incorrect free in pinctrl_enable() (CVE-2024-36940)
- kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). (CVE-2024-36933)
- kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal (CVE-2024-36932)
- kernel: spi: fix null pointer dereference within spi_sync (CVE-2024-36930)
- kernel: ipv4: Fix uninit-value access in __ip_make_skb() (CVE-2024-36927)
- kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE (CVE-2024-36926)
- kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (CVE-2024-36920)
- kernel: block: fix overflow in blk_ioctl_discard() (CVE-2024-36917)
- kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (CVE-2024-36905)
- kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (CVE-2024-36902)
- kernel: USB: core: Fix access violation during port device removal (CVE-2024-36896)
- kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference (CVE-2024-36891)
- kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal (CVE-2024-36956)
- kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (CVE-2024-36955)
- kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). (CVE-2024-36939)
- kernel: ipv6: prevent NULL dereference in ip6_output() (CVE-2024-36901)
- kernel: thermal/debugfs: Fix two locking issues with thermal zone debug (CVE-2024-36961)
- kernel: drm/vmwgfx: Fix invalid reads in fence signaled events (CVE-2024-36960)
- kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() (CVE-2024-36967)
- kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command (CVE-2024-36977)
- kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (CVE-2024-36974)
- kernel: ALSA: timer: Set lower bound of start tick time (CVE-2024-38618)
- kernel: ALSA: core: Fix NULL module pointer assignment at card init (CVE-2024-38605)
- kernel: block: refine the EOF check in blkdev_iomap_begin (CVE-2024-38604)
- kernel: ALSA: Fix deadlocks with kctl removals at disconnection (CVE-2024-38600)
- kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598)
- kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (CVE-2024-38596)
- kernel: drm/amdgpu/mes: fix use-after-free issue (CVE-2024-38581)
- kernel: net/mlx5: Discard command completions in internal error (CVE-2024-38555)
- kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (CVE-2024-36477)
- kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (CVE-2024-38388)
- kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (CVE-2024-31076)
- kernel: soundwire: cadence: fix invalid PDI offset (CVE-2024-38635)
- kernel: vfio/pci: fix potential memory leak in vfio_intx_enable() (CVE-2024-38632)
- kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida (CVE-2024-38629)
- kernel: stm class: Fix a double free in stm_register_device() (CVE-2024-38627)
- kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (CVE-2024-39291)
- kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages (CVE-2024-39298)
- kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (CVE-2024-39276)
- kernel: drm/amdgpu: add error handle to avoid out-of-bounds (CVE-2024-39471)
- kernel: drm/i915/hwmon: Get rid of devm (CVE-2024-39479)
- kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (CVE-2024-39473)
- kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (CVE-2024-39474)
- kernel: efi/unaccepted: touch soft lockup during memory accept (CVE-2024-36936)
- kernel: drm/drm_file: Fix pid refcounting race (CVE-2024-39486)
- kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (CVE-2024-39488)
- kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (CVE-2024-39491)
- kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (CVE-2024-39497)
- kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (CVE-2024-39498)
- kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() (CVE-2024-39499)
- kernel: drivers: core: synchronize really_probe() and dev_uevent() (CVE-2024-39501)
- kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503)
- kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (CVE-2024-39508)
- kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (CVE-2024-40903)
- kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906)
- kernel: ionic: fix kernel panic in XDP_TX action (CVE-2024-40907)
- kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (CVE-2024-40913)
- kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (CVE-2024-40919)
- kernel: io_uring/rsrc: don't lock while !TASK_RUNNING (CVE-2024-40922)
- kernel: vmxnet3: disable rx data ring on dma allocation failure (CVE-2024-40923)
- kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924)
- kernel: block: fix request.queuelist usage in flush (CVE-2024-40925)
- kernel: wifi: cfg80211: validate HE operation element parsing (CVE-2024-40930)
- kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (CVE-2024-40940)
- kernel: iommu: Return right value in iommu_sva_bind_device() (CVE-2024-40945)
- kernel: mm/page_table_check: fix crash on ZONE_DEVICE (CVE-2024-40948)
- kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer (CVE-2024-40965)
- kernel: tty: add the option to have a tty reject a new ldisc (CVE-2024-40966)
- kernel: serial: imx: Introduce timeout when waiting on transmitter empty (CVE-2024-40967)
- kernel: drm/radeon: fix UBSAN warning in kv_dpm.c (CVE-2024-40988)
- kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown (CVE-2024-40989)
- kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (CVE-2024-40997)
- kernel: io_uring/sqpoll: work around a potential audit memory leak (CVE-2024-41001)
- kernel: net: hns3: fix kernel crash problem in concurrent scenario (CVE-2024-39507)
- kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (CVE-2024-40901)
- kernel: tcp: avoid too many retransmit packets (CVE-2024-41007)
- kernel: drm/amdgpu: change vm->task_info handling (CVE-2024-41008)
- kernel: vt_ioctl: fix array_index_nospec in vt_setactivate (CVE-2022-48804)
- kernel: bluetooth: race condition in sniff_{min,max}_interval_set() (CVE-2024-24859)
- kernel: filelock: Remove locks reliably when fcntl/close race is detected (CVE-2024-41012)
- kernel: filelock: Fix fcntl/close race recovery compat path (CVE-2024-41020)
- kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask (CVE-2024-41032)
- kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (CVE-2024-41038)
- kernel: firmware: cs_dsp: Fix overflow checking of wmfw header (CVE-2024-41039)
- kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)
- kernel: filelock: fix potential use-after-free in posix_lock_inode (CVE-2024-41049)
- kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (CVE-2024-41056)
- kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (CVE-2024-41057)
- kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (CVE-2024-41058)
- kernel: drm/radeon: check bo_va->bo is non-NULL before using it (CVE-2024-41060)
- kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (CVE-2024-41063)
- kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace (CVE-2024-41065)
- kernel: null_blk: fix validation of block size (CVE-2024-41077)
- kernel: nvmet: always initialize cqe.result (CVE-2024-41079)
- kernel: nvme-fabrics: use reserved tag for reg read/write command (CVE-2024-41082)
- kernel: cxl/region: Avoid null pointer dereference in region lookup (CVE-2024-41084)
- kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling (CVE-2024-41085)
- kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (CVE-2024-41089)
- kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092)
- kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)
- kernel: drm/fbdev-dma: Only set smem_start is enable per module option (CVE-2024-41094)
- kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (CVE-2024-41095)
- kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070)
- kernel: nfsd: initialise nfsd_info.mutex early. (CVE-2024-42078)
- kernel: ftruncate: pass a signed offset (CVE-2024-42084)
- kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (CVE-2024-42090)
- kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (CVE-2024-42101)
- kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (CVE-2024-42114)
- kernel: drm/amdgpu: fix double free err_addr pointer warnings (CVE-2024-42123)
- kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible (CVE-2024-42124)
- kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (CVE-2024-42125)
- kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (CVE-2024-42132)
- kernel: Bluetooth: ISO: Check socket flag instead of hcon (CVE-2024-42141)
- kernel: tcp_metrics: validate source addr length (CVE-2024-42154)
- kernel: scsi: mpi3mr: Sanitise num_phys (CVE-2024-42159)
- kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (CVE-2024-42226)
- kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (CVE-2024-42228)
- kernel: firmware: cs_dsp: Validate payload length before processing block (CVE-2024-42237)
- kernel: firmware: cs_dsp: Return error if block header overflows file (CVE-2024-42238)
- kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation (CVE-2024-42240)
- kernel: Revert "sched/fair: Make sure to try to detach at least one movable task" (CVE-2024-42245)
- kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines (CVE-2024-42258)
- kernel: net/mlx5: Fix missing lock on sync reset reload (CVE-2024-42268)
- kernel: net/iucv: fix use after free in iucv_sock_close() (CVE-2024-42271)
- kernel: nvme-pci: add missing condition check for existence of mapped data (CVE-2024-42276)
- kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301)
- kernel: net: missing check virtio (CVE-2024-43817)
- kernel: nfs: pass explicit offset/count to trace events (CVE-2024-43826)
- kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() (CVE-2024-43830)
- kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CVE-2024-43842)
- kernel: dma: fix call order in dmam_free_coherent (CVE-2024-43856)
- kernel: s390/fpu: Re-add exception handling in load_fpu_state() (CVE-2024-43865)
- kernel: net/mlx5: Always drain health in shutdown callback (CVE-2024-43866)
- kernel: perf: Fix event leak upon exec and file release (CVE-2024-43869)
- kernel: perf: Fix event leak upon exit (CVE-2024-43870)
- kernel: wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (CVE-2024-43879)
- kernel: nommu: fix memory leak in do_mmap() error path (CVE-2023-52902)
- kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. (CVE-2022-48929)
- kernel: mm: list_lru: fix UAF for memory cgroup (CVE-2024-43888)
- kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892)
- kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (CVE-2024-43911)
- kernel: fuse: Initialize beyond-EOF page contents before setting uptodate (CVE-2024-44947)
- kernel: usb: gadget: core: Check for unset descriptor (CVE-2024-44960)
- kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption (CVE-2024-44965)
- kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970)
- kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (CVE-2024-44984)
- kernel: KVM: s390: fix validity interception issue when gisa is switched off (CVE-2024-45005)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Real Time 9 x86_64
- Red Hat Enterprise Linux for Real Time for NFV 9 x86_64
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
Fixes
- BZ - 1832397 - CVE-2020-10135 kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS)
- BZ - 2257406 - CVE-2024-0340 kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
- BZ - 2260038 - CVE-2024-23848 kernel: use-after-free in cec_queue_msg_fh
- BZ - 2262241 - CVE-2024-1151 kernel: stack overflow problem in Open vSwitch kernel module leading to DoS
- BZ - 2263879 - CVE-2024-25739 kernel: crash due to a missing check for leb_size
- BZ - 2265648 - CVE-2024-26591 kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- BZ - 2265650 - CVE-2023-52451 kernel: powerpc: Fix access beyond end of drmem array
- BZ - 2265654 - CVE-2023-52445 kernel: pvrusb2: fix use after free on context disconnection
- BZ - 2265657 - CVE-2024-26589 kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
- BZ - 2265793 - CVE-2023-52455 kernel: iommu: Don't reserve 0-length IOVA region
- BZ - 2265798 - CVE-2023-52462 kernel: bpf: fix check for attempt to corrupt spilled pointer
- BZ - 2265800 - CVE-2023-52464 kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c
- BZ - 2265831 - CVE-2024-26605 kernel: PCI/ASPM: Fix deadlock when enabling ASPM
- BZ - 2265833 - CVE-2024-26603 kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever
- BZ - 2265836 - CVE-2024-26601 kernel: ext4: regenerate buddy after block freeing failed if under fc replay
- BZ - 2266210 - CVE-2023-52466 kernel: out-of-bounds read in pci_dev_for_each_resource()
- BZ - 2266212 - CVE-2023-52467 kernel:null pointer dereference in of_syscon_register()
- BZ - 2266247 - CVE-2024-24857 kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set()
- BZ - 2266249 - CVE-2024-24858 kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function
- BZ - 2266296 - CVE-2019-25162 kernel: use after free in i2c
- BZ - 2266363 - CVE-2023-52473 kernel: NULL pointer dereference in zone registration error path
- BZ - 2266916 - CVE-2023-52475 kernel: use-after-free in powermate_config_complete
- BZ - 2267028 - CVE-2023-52482 kernel: x86/srso: Add SRSO mitigation for Hygon processors
- BZ - 2267038 - CVE-2023-52477 kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
- BZ - 2267701 - CVE-2024-22099 kernel: NULL Pointer dereference bluetooth allows Overflow Buffers
- BZ - 2267705 - CVE-2024-23307 kernel: Integer Overflow in raid5_cache_count
- BZ - 2267724 - CVE-2023-52565 kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
- BZ - 2267730 - CVE-2023-52560 kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions()
- BZ - 2267782 - CVE-2023-52501 kernel: ring-buffer: Do not attempt to read past "commit"
- BZ - 2267789 - CVE-2023-52528 kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
- BZ - 2267797 - CVE-2023-52520 kernel: platform/x86: think-lmi: Fix reference leak
- BZ - 2267804 - CVE-2023-52513 kernel: RDMA/siw: Fix connection failure handling
- BZ - 2267916 - CVE-2021-47101 kernel: asix: fix uninit-value in asix_mdio_read()
- BZ - 2267920 - CVE-2021-47098 kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
- BZ - 2268293 - CVE-2023-52606 kernel: powerpc/lib: Validate size for vector operations
- BZ - 2268315 - CVE-2023-52595 kernel: wifi: rt2x00: restart beacon queue when hardware reset
- BZ - 2268317 - CVE-2023-52594 kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
- BZ - 2268335 - CVE-2023-52585 kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- BZ - 2269063 - CVE-2023-52498 kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code
- BZ - 2269183 - CVE-2023-52492 kernel: dmaengine: fix NULL pointer in channel unregistration function
- BZ - 2269187 - CVE-2023-52490 kernel: mm: migrate: fix getting incorrect page mapping during page migration
- BZ - 2269192 - CVE-2024-26618 hw: arm64/sme: Always exit sme_alloc() early with existing storage
- BZ - 2269201 - CVE-2024-26612 kernel: netfs, fscache: Prevent Oops in fscache_put_cache()
- BZ - 2269203 - CVE-2024-26611 kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP
- BZ - 2269211 - CVE-2024-26614 kernel: tcp: make sure init the accept_queue's spinlocks once
- BZ - 2270071 - CVE-2023-52614 kernel: PM / devfreq: Fix buffer overflow in trans_stat_show
- BZ - 2270084 - CVE-2023-52619 kernel: pstore/ram: Fix crash when setting number of cpus to an odd number
- BZ - 2270093 - CVE-2023-52615 kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng
- BZ - 2270097 - CVE-2024-26641 kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
- BZ - 2270103 - CVE-2024-26638 kernel: nbd: always initialize struct msghdr completely
- BZ - 2270133 - CVE-2024-26631 kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
- BZ - 2271648 - CVE-2024-26645 kernel: tracing: Ensure visibility when inserting an element into tracing_map
- BZ - 2271682 - CVE-2023-52625 kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface
- BZ - 2271684 - CVE-2023-52624 kernel: drm/amd/display: Wake DMCUB before executing GPINT commands
- BZ - 2271688 - CVE-2023-52622 kernel: ext4: avoid online resizing failures due to oversized flex bg
- BZ - 2271690 - CVE-2023-52621 kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
- BZ - 2271788 - CVE-2024-26646 kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM
- BZ - 2271795 - CVE-2024-26650 kernel: p2sb_bar() calls during PCI device probe
- BZ - 2272692 - CVE-2024-26656 kernel: drm/amdgpu: use-after-free vulnerability
- BZ - 2272782 - CVE-2024-26660 kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301
- BZ - 2272784 - CVE-2024-26661 kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
- BZ - 2272786 - CVE-2024-26662 kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()'
- BZ - 2272788 - CVE-2024-26663 kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
- BZ - 2272791 - CVE-2024-26664 kernel: hwmon: (coretemp) Fix out-of-bounds memory access
- BZ - 2272795 - CVE-2024-26669 kernel: net/sched: flower: Fix chain template offload
- BZ - 2272800 - CVE-2024-26670 kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD
- BZ - 2272804 - CVE-2023-52632 kernel: drm/amdkfd: lock dependency warning with srcu
- BZ - 2272806 - CVE-2023-52634 kernel: drm/amd/display: Fix disable_otg_wa logic
- BZ - 2272808 - CVE-2023-52635 kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop]
- BZ - 2272814 - CVE-2024-26672 kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'
- BZ - 2272818 - CVE-2024-26674 kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups
- BZ - 2272829 - CVE-2024-26675 kernel: ppp_async: limit MRU to 64K
- BZ - 2272836 - CVE-2024-26678 kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section
- BZ - 2272839 - CVE-2024-26679 kernel: inet: read sk->sk_family once in inet_recv_error()
- BZ - 2272842 - CVE-2024-26680 kernel: net: atlantic: Fix DMA mapping for PTP hwts ring
- BZ - 2273085 - CVE-2023-52637 kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)
- BZ - 2273098 - CVE-2024-26691 kernel: KVM: arm64: Fix circular locking dependency
- BZ - 2273109 - CVE-2024-26686 kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
- BZ - 2273113 - CVE-2024-26700 kernel: drm/amd/display: Fix MST Null Ptr for RV
- BZ - 2273130 - CVE-2024-26725 kernel: dpll: fix possible deadlock during netlink dump operation
- BZ - 2273143 - CVE-2024-26719 kernel: nouveau: offload fence uevents work to workqueue
- BZ - 2273148 - CVE-2024-26717 kernel: HID: i2c-hid-of: fix NULL-deref on failed power up
- BZ - 2273158 - CVE-2024-26712 kernel: powerpc/kasan: Fix addr error caused by page alignment
- BZ - 2273166 - CVE-2024-26708 kernel: mptcp: really cope with fastopen race
- BZ - 2273168 - CVE-2024-26707 kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
- BZ - 2273174 - CVE-2024-26704 kernel: ext4: fix double-free of blocks due to wrong extents moved_len
- BZ - 2273185 - CVE-2024-26767 kernel: drm/amd/display: fixed integer types and null check locations
- BZ - 2273200 - CVE-2024-26761 kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window
- BZ - 2273204 - CVE-2024-26759 kernel: mm/swap: fix race when skipping swapcache
- BZ - 2273206 - CVE-2024-26758 kernel: md: Don't ignore suspended array in md_check_recovery()
- BZ - 2273208 - CVE-2024-26757 kernel: md: Don't ignore read-only array in md_check_recovery()
- BZ - 2273234 - CVE-2024-26774 kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt
- BZ - 2273242 - CVE-2024-26772 kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
- BZ - 2273247 - CVE-2024-26733 kernel: arp: Prevent overflow in arp_req_get().
- BZ - 2273260 - CVE-2024-26744 kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
- BZ - 2273262 - CVE-2024-26743 kernel: RDMA/qedr: Fix qedr_create_user_qp error flow
- BZ - 2273268 - CVE-2024-26740 kernel: net/sched: act_mirred: use the backlog for mirred ingress
- BZ - 2273408 - CVE-2024-26746 kernel: dmaengine: idxd: Ensure safe user copy of completion record
- BZ - 2273425 - CVE-2024-26803 kernel: net: veth: clear GRO when clearing XDP even when down
- BZ - 2273459 - CVE-2024-26786 kernel: iommufd: Fix iopt_access_list_id overwrite bug
- BZ - 2273461 - CVE-2024-26785 kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova
- BZ - 2273468 - CVE-2024-26782 kernel: mptcp: fix double-free on socket dismantle
- BZ - 2273650 - CVE-2024-26812 kernel: vfio/pci: Create persistent INTx handler
- BZ - 2273657 - CVE-2024-27437 kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ
- BZ - 2274478 - CVE-2024-26815 kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
- BZ - 2274624 - CVE-2021-47185 kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
- BZ - 2275558 - CVE-2024-26846 kernel: nvme-fc: do not wait in vain when unloading module
- BZ - 2275565 - CVE-2024-26843 kernel: efi: runtime: Fix potential overflow of soft-reserved region size
- BZ - 2275573 - CVE-2024-26840 kernel: cachefiles: fix memory leak in cachefiles_add_cache()
- BZ - 2275578 - CVE-2024-26838 kernel: RDMA/irdma: Fix KASAN issue with tasklet
- BZ - 2275580 - CVE-2024-26837 kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload
- BZ - 2275584 - CVE-2024-26835 kernel: netfilter: nf_tables: set dormant flag on hook register failure
- BZ - 2275624 - CVE-2023-52643 kernel: iio: core: fix memleak in iio_device_register_sysfs
- BZ - 2275633 - CVE-2024-26907 kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment
- BZ - 2275635 - CVE-2024-26906 kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
- BZ - 2275641 - CVE-2024-26903 kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
- BZ - 2275645 - CVE-2024-26901 kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
- BZ - 2275647 - CVE-2024-26900 kernel: md: fix kmemleak of rdev->serial
- BZ - 2275650 - CVE-2024-26899 kernel: block: fix deadlock between bd_link_disk_holder and partition scan
- BZ - 2275661 - CVE-2024-26894 kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
- BZ - 2275666 - CVE-2024-26892 kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq()
- BZ - 2275670 - CVE-2024-26890 kernel: Bluetooth: btrtl: fix out of bounds memory access
- BZ - 2275672 - CVE-2024-26889 kernel: Bluetooth: hci_core: Fix possible buffer overflow
- BZ - 2275686 - CVE-2024-26882 kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
- BZ - 2275694 - CVE-2024-26878 kernel: quota: Fix potential NULL pointer dereference
- BZ - 2275707 - CVE-2024-26872 kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup
- BZ - 2275711 - CVE-2024-26870 kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
- BZ - 2275725 - CVE-2024-26863 kernel: hsr: Fix uninit-value access in hsr_get_node()
- BZ - 2275727 - CVE-2024-26862 kernel: packet: annotate data-races around ignore_outgoing
- BZ - 2275729 - CVE-2024-26861 kernel: wireguard: receive: annotate data-race around receiving_counter.counter
- BZ - 2275737 - CVE-2024-26857 kernel: geneve: make sure to pull inner header in geneve_rx()
- BZ - 2275775 - CVE-2024-26920 kernel: tracing/trigger: Fix to return error if failed to alloc snapshot
- BZ - 2275790 - CVE-2024-26915 kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
- BZ - 2275928 - CVE-2024-26921 kernel: inet: inet_defrag: prevent sk release while still in use
- BZ - 2276665 - CVE-2024-26922 kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly
- BZ - 2277168 - CVE-2024-26924 kernel: netfilter: nft_set_pipapo: do not free live element
- BZ - 2277844 - CVE-2024-26927 kernel: ASoC: SOF: Add some bounds checking to firmware data
- BZ - 2277937 - CVE-2024-26928 kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show()
- BZ - 2278169 - CVE-2024-26964 kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma
- BZ - 2278174 - CVE-2024-26962 kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape
- BZ - 2278178 - CVE-2024-26960 kernel: mm: swap: fix race between free_swap_and_cache() and swapoff()
- BZ - 2278182 - CVE-2024-26958 kernel: nfs: fix UAF in direct writes
- BZ - 2278193 - CVE-2024-26953 kernel: net: esp: fix bad handling of pages from page_pool
- BZ - 2278197 - CVE-2024-26951 kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list
- BZ - 2278200 - CVE-2024-26950 kernel: wireguard: netlink: access device through ctx instead of peer
- BZ - 2278218 - CVE-2024-26940 kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed
- BZ - 2278220 - CVE-2024-26939 kernel: drm/i915/vma: Fix UAF on destroy against retire race
- BZ - 2278229 - CVE-2024-26938 kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()
- BZ - 2278231 - CVE-2024-26937 kernel: drm/i915/gt: Reset queue_priority_hint on parking
- BZ - 2278237 - CVE-2024-26934 kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
- BZ - 2278240 - CVE-2024-26933 kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
- BZ - 2278262 - CVE-2024-27017 kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump
- BZ - 2278266 - CVE-2024-27015 kernel: netfilter: flowtable: incorrect pppoe tuple
- BZ - 2278268 - CVE-2024-27014 kernel: net/mlx5e: Prevent deadlock while disabling aRFS
- BZ - 2278270 - CVE-2024-27013 kernel: tun: limit printing rate when illegal packet received by tun dev
- BZ - 2278275 - CVE-2024-27012 kernel: netfilter: nf_tables: restore set elements when delete set fails
- BZ - 2278277 - CVE-2024-27011 kernel: netfilter: nf_tables: fix memleak in map from abort path
- BZ - 2278279 - CVE-2024-27010 kernel: net/sched: Fix mirred deadlock on device recursion
- BZ - 2278291 - CVE-2024-27004 kernel: clk: Get runtime PM before walking tree during disable_unused
- BZ - 2278293 - CVE-2024-27003 kernel: clk: Get runtime PM before walking tree for clk_summary
- BZ - 2278316 - CVE-2024-26992 kernel: KVM: x86/pmu: Disable support for adaptive PEBS
- BZ - 2278320 - CVE-2024-26990 kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
- BZ - 2278322 - CVE-2024-26989 kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save()
- BZ - 2278324 - CVE-2024-26988 kernel: init/main.c: Fix potential static_command_line memory overflow
- BZ - 2278327 - CVE-2024-26987 kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled
- BZ - 2278333 - CVE-2024-26984 kernel: nouveau: fix instmem race condition around ptr stores
- BZ - 2278350 - CVE-2024-26976 kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed
- BZ - 2278352 - CVE-2024-26975 kernel: powercap: intel_rapl: Fix a NULL pointer dereference
- BZ - 2278356 - CVE-2024-26973 kernel: fat: fix uninitialized field in nostale filehandles
- BZ - 2278387 - CVE-2024-27062 kernel: nouveau: lock the client object tree.
- BZ - 2278406 - CVE-2024-27057 kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
- BZ - 2278431 - CVE-2024-27048 kernel: wifi: brcm80211: handle pmk_op allocation failure
- BZ - 2278447 - CVE-2024-27042 kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
- BZ - 2278456 - CVE-2024-27038 kernel: clk: Fix clk_core_get NULL dereference
- BZ - 2278484 - CVE-2024-27025 kernel: nbd: null check for nla_nest_start
- BZ - 2278488 - CVE-2024-27023 kernel: md: Fix missing release of 'active_io' for flush
- BZ - 2278492 - CVE-2024-27079 kernel: iommu/vt-d: Fix NULL domain on device release
- BZ - 2278522 - CVE-2023-52650 kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node
- BZ - 2278524 - CVE-2023-52649 kernel: drm/vkms: Avoid reading beyond LUT array
- BZ - 2278532 - CVE-2024-27389 kernel: pstore: inode: Only d_invalidate() is needed
- BZ - 2278537 - CVE-2022-48669 kernel: powerpc/pseries: Fix potential memleak in papr_get_attr()
- BZ - 2278539 - CVE-2023-52648 kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state
- BZ - 2278939 - CVE-2022-48672 kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes()
- BZ - 2278960 - CVE-2022-48703 kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
- BZ - 2280440 - CVE-2024-27395 kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit
- BZ - 2280444 - CVE-2023-52656 kernel: io_uring: drop any code related to SCM_RIGHTS
- BZ - 2281045 - CVE-2024-35794 kernel: dm-raid: really frozen sync_thread during suspend
- BZ - 2281061 - CVE-2024-35787 kernel: md/md-bitmap: fix incorrect usage for sb_index
- BZ - 2281069 - CVE-2024-27431 kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program
- BZ - 2281103 - CVE-2024-27414 kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
- BZ - 2281113 - CVE-2024-27410 kernel: wifi: nl80211: reject iftype change with mesh ID change
- BZ - 2281125 - CVE-2024-27404 kernel: mptcp: fix data races on remote_id
- BZ - 2281141 - CVE-2024-27436 kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found.
- BZ - 2281145 - CVE-2023-52659 kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
- BZ - 2281155 - CVE-2024-35795 kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs
- BZ - 2281157 - CVE-2024-35838 kernel: wifi: mac80211: fix potential sta-link leak
- BZ - 2281165 - CVE-2024-35835 kernel: net/mlx5e: fix a double-free in arfs_create_groups
- BZ - 2281173 - CVE-2024-35831 kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails
- BZ - 2281183 - CVE-2024-35827 kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()
- BZ - 2281189 - CVE-2024-35824 kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume
- BZ - 2281192 - CVE-2024-35822 kernel: usb: udc: remove warning when queue disabled ep
- BZ - 2281202 - CVE-2024-35817 kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag
- BZ - 2281207 - CVE-2024-35814 kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling
- BZ - 2281211 - CVE-2024-35812 kernel: usb: cdc-wdm: close race between read and workqueue
- BZ - 2281215 - CVE-2024-35810 kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory
- BZ - 2281217 - CVE-2024-35809 kernel: PCI/PM: Drain runtime-idle callbacks before driver removal
- BZ - 2281219 - CVE-2024-35808 kernel: md/dm-raid: don't call md_reap_sync_thread() directly
- BZ - 2281221 - CVE-2024-35807 kernel: ext4: fix corruption during on-line resize
- BZ - 2281225 - CVE-2024-35805 kernel: dm snapshot: fix lockup in dm_exception_table_exit
- BZ - 2281235 - CVE-2024-35801 kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
- BZ - 2281243 - CVE-2024-35859 kernel: block: fix module reference leakage from bdev_open_by_dev error path
- BZ - 2281251 - CVE-2024-35855 kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
- BZ - 2281253 - CVE-2024-35854 kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash
- BZ - 2281255 - CVE-2024-35853 kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
- BZ - 2281268 - CVE-2024-35847 kernel: irqchip/gic-v3-its: Prevent double free on error
- BZ - 2281276 - CVE-2024-35843 kernel: iommu/vt-d: Use device rbtree in iopf reporting path
- BZ - 2281282 - CVE-2024-35840 kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()
- BZ - 2281286 - CVE-2023-52698 kernel: calipso: fix memory leak in netlbl_calipso_add_pass()
- BZ - 2281288 - CVE-2023-52697 kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
- BZ - 2281290 - CVE-2023-52696 kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init()
- BZ - 2281303 - CVE-2023-52690 kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one()
- BZ - 2281305 - CVE-2023-52689 kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels
- BZ - 2281311 - CVE-2023-52686 kernel: powerpc/powernv: Add a null pointer check in opal_event_init()
- BZ - 2281317 - CVE-2023-52683 kernel: ACPI: LPIT: Avoid u32 multiplication overflow
- BZ - 2281324 - CVE-2023-52680 kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get()
- BZ - 2281326 - CVE-2023-52679 kernel: of: Fix double free in of_parse_phandle_with_args_map
- BZ - 2281332 - CVE-2023-52676 kernel: bpf: Guard stack limits against 32bit overflow
- BZ - 2281336 - CVE-2023-52674 kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()
- BZ - 2281356 - CVE-2023-52664 kernel: net: atlantic: eliminate double free in error handling logic
- BZ - 2281358 - CVE-2023-52663 kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe()
- BZ - 2281360 - CVE-2023-52662 kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
- BZ - 2281362 - CVE-2023-52661 kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
- BZ - 2281510 - CVE-2024-35947 kernel: dyndbg: fix old BUG_ON in >control parser
- BZ - 2281517 - CVE-2024-35928 kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()
- BZ - 2281519 - CVE-2024-35930 kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
- BZ - 2281523 - CVE-2024-35931 kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery
- BZ - 2281526 - CVE-2024-35927 kernel: drm: Check output polling initialized before disabling
- BZ - 2281634 - CVE-2024-35913 kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF
- BZ - 2281636 - CVE-2024-35912 kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks
- BZ - 2281645 - CVE-2024-35908 kernel: tls: get psock ref after taking rxlock to avoid leak
- BZ - 2281651 - CVE-2024-35905 kernel: bpf: Protect against int overflow for stack access size
- BZ - 2281655 - CVE-2024-35904 kernel: selinux: avoid dereference of garbage after mount failure
- BZ - 2281664 - CVE-2024-35900 kernel: netfilter: nf_tables: reject new basechain after table flag update
- BZ - 2281679 - CVE-2024-35894 kernel: mptcp: prevent BPF accessing lowat from a subflow socket.
- BZ - 2281684 - CVE-2024-35892 kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
- BZ - 2281693 - CVE-2024-35888 kernel: erspan: make sure erspan_base_hdr is present in skb->head
- BZ - 2281697 - CVE-2024-35886 kernel: ipv6: Fix infinite recursion in fib6_dump_done().
- BZ - 2281713 - CVE-2024-35880 kernel: io_uring/kbuf: hold io_buffer_list reference over mmap
- BZ - 2281718 - CVE-2024-35878 kernel: of: module: prevent NULL pointer dereference in vsnprintf()
- BZ - 2281720 - CVE-2024-35877 kernel: x86/mm/pat: fix VM_PAT handling in COW mappings
- BZ - 2281725 - CVE-2024-35876 kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()
- BZ - 2281736 - CVE-2024-35872 kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios
- BZ - 2281742 - CVE-2024-35869 kernel: smb: client: guarantee refcounted children from parent session
- BZ - 2281752 - CVE-2024-35925 kernel: block: prevent division by zero in blk_rq_stat_sum()
- BZ - 2281754 - CVE-2024-35867 kernel: smb: client: fix potential UAF in cifs_stats_proc_show()
- BZ - 2281758 - CVE-2024-35924 kernel: usb: typec: ucsi: Limit read size on v1.2
- BZ - 2281760 - CVE-2024-35866 kernel: smb: client: fix potential UAF in cifs_dump_full_key()
- BZ - 2281762 - CVE-2024-35923 kernel: io_uring: clear opcode specific data for an early failure
- BZ - 2281763 - CVE-2024-35865 kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break()
- BZ - 2281769 - CVE-2024-35864 kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break()
- BZ - 2281773 - CVE-2024-35863 kernel: smb: client: fix potential UAF in is_valid_oplock_break()
- BZ - 2281781 - CVE-2024-35862 kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted()
- BZ - 2281783 - CVE-2024-35918 kernel: randomize_kstack: Improve entropy diffusion
- BZ - 2281786 - CVE-2024-35861 kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()
- BZ - 2281807 - CVE-2024-35944 kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
- BZ - 2281811 - CVE-2024-35942 kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain
- BZ - 2281817 - CVE-2024-35939 kernel: dma-direct: Leak pages on dma_set_decrypted() failure
- BZ - 2281819 - CVE-2024-35938 kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB
- BZ - 2281833 - CVE-2024-35946 kernel: wifi: rtw89: fix null pointer access when abort scan
- BZ - 2281843 - CVE-2024-35991 kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue
- BZ - 2281863 - CVE-2024-35983 kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS
- BZ - 2281872 - CVE-2024-35979 kernel: raid1: fix use-after-free for original bio in raid1_write_request()
- BZ - 2281884 - CVE-2024-35976 kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
- BZ - 2281891 - CVE-2024-35973 kernel: geneve: fix header validation in geneve[6]_xmit_skb
- BZ - 2281923 - CVE-2024-35959 kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow
- BZ - 2281927 - CVE-2024-35957 kernel: iommu/vt-d: Fix WARN_ON in iommu probe path
- BZ - 2281933 - CVE-2024-35954 kernel: scsi: sg: Avoid sg device teardown race
- BZ - 2281938 - CVE-2024-35952 kernel: drm/ast: Fix soft lockup
- BZ - 2281942 - CVE-2024-35950 kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex
- BZ - 2281989 - CVE-2024-36006 kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
- BZ - 2282088 - CVE-2024-35995 kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses
- BZ - 2282302 - CVE-2021-47429 kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI
- BZ - 2282304 - CVE-2021-47428 kernel: powerpc/64s: fix program check interrupt emergency stack path
- BZ - 2282354 - CVE-2021-47386 kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
- BZ - 2282356 - CVE-2021-47384 kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
- BZ - 2282366 - CVE-2021-47432 kernel: lib/generic-radix-tree.c: Don't overflow in peek()
- BZ - 2282612 - CVE-2023-52703 kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
- BZ - 2282622 - CVE-2023-52869 kernel: pstore/platform: Add check for kstrdup
- BZ - 2282623 - CVE-2023-52762 kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size
- BZ - 2282637 - CVE-2023-52837 kernel: nbd: fix uaf in nbd_open
- BZ - 2282640 - CVE-2023-52730 kernel: mmc: sdio: fix possible resource leaks in some error paths
- BZ - 2282641 - CVE-2023-52757 kernel: smb: client: fix potential deadlock when releasing mids
- BZ - 2282646 - CVE-2023-52819 kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
- BZ - 2282652 - CVE-2023-52788 kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls
- BZ - 2282653 - CVE-2023-52813 kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET
- BZ - 2282655 - CVE-2023-52814 kernel: drm/amdgpu: Fix potential null pointer derefernce
- BZ - 2282670 - CVE-2023-52867 kernel: drm/radeon: possible buffer overflow
- BZ - 2282676 - CVE-2023-52817 kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
- BZ - 2282679 - CVE-2023-52749 kernel: spi: Fix null dereference on suspend
- BZ - 2282680 - CVE-2023-52878 kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
- BZ - 2282690 - CVE-2023-52775 kernel: net/smc: avoid data corruption caused by decline
- BZ - 2282740 - CVE-2023-52831 kernel: cpu/hotplug: Don't offline the last non-isolated CPU
- BZ - 2282741 - CVE-2023-52740 kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch
- BZ - 2282742 - CVE-2023-52756 kernel: pwm: Fix double shift bug
- BZ - 2282743 - CVE-2023-52811 kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool
- BZ - 2282744 - CVE-2023-52834 kernel: atl1c: Work around the DMA RX overflow issue
- BZ - 2282745 - CVE-2023-52859 kernel: perf: hisi: Fix use-after-free when register pmu fails
- BZ - 2282746 - CVE-2023-52758 kernel: i2c: dev: copy userspace array safely
- BZ - 2282748 - CVE-2023-52751 kernel: smb: client: fix use-after-free in smb2_query_info_compound()
- BZ - 2282757 - CVE-2023-52840 kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
- BZ - 2282762 - CVE-2023-52833 kernel: Bluetooth: btusb: Add date->evt_skb is NULL check
- BZ - 2282763 - CVE-2023-52791 kernel: i2c: core: Run atomic i2c xfer when !preemptible
- BZ - 2282772 - CVE-2023-52784 kernel: bonding: stop the device in bond_setup_by_slave()
- BZ - 2282787 - CVE-2023-52731 kernel: fbdev: Fix invalid page access after closing deferred I/O devices
- BZ - 2282901 - CVE-2021-47457 kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
- BZ - 2282904 - CVE-2021-47454 kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline
- BZ - 2282918 - CVE-2021-47497 kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
- BZ - 2282920 - CVE-2021-47495 kernel: usbnet: sanity check for maxpacket
- BZ - 2282950 - CVE-2024-36010 kernel: igb: Fix string truncation warnings in igb_set_fw_version
- BZ - 2283448 - CVE-2021-47505 kernel: aio: fix use-after-free due to missing POLLFREE handling
- BZ - 2283786 - CVE-2024-36015 kernel: ppdev: Add an error check in register_device
- BZ - 2284265 - CVE-2024-36885 kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()
- BZ - 2284269 - CVE-2024-36884 kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()
- BZ - 2284273 - CVE-2024-36882 kernel: mm: use memalloc_nofs_save() in page_cache_ra_order()
- BZ - 2284277 - CVE-2024-36881 kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones
- BZ - 2284295 - CVE-2024-36030 kernel: octeontx2-af: fix the double free in rvu_npc_freemem()
- BZ - 2284410 - CVE-2024-36031 kernel: keys: Fix overwrite of key expiration on instantiation
- BZ - 2284413 - CVE-2024-36028 kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio()
- BZ - 2284427 - CVE-2024-36022 kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload
- BZ - 2284465 - CVE-2024-36945 kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route()
- BZ - 2284468 - CVE-2024-36944 kernel: Reapply "drm/qxl: simplify qxl_fence_wait"
- BZ - 2284477 - CVE-2024-36940 kernel: pinctrl: core: delete incorrect free in pinctrl_enable()
- BZ - 2284488 - CVE-2024-36933 kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
- BZ - 2284490 - CVE-2024-36932 kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal
- BZ - 2284494 - CVE-2024-36930 kernel: spi: fix null pointer dereference within spi_sync
- BZ - 2284500 - CVE-2024-36927 kernel: ipv4: Fix uninit-value access in __ip_make_skb()
- BZ - 2284502 - CVE-2024-36926 kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE
- BZ - 2284515 - CVE-2024-36920 kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
- BZ - 2284519 - CVE-2024-36917 kernel: block: fix overflow in blk_ioctl_discard()
- BZ - 2284539 - CVE-2024-36905 kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
- BZ - 2284545 - CVE-2024-36902 kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
- BZ - 2284556 - CVE-2024-36896 kernel: USB: core: Fix access violation during port device removal
- BZ - 2284567 - CVE-2024-36891 kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference
- BZ - 2284583 - CVE-2024-36956 kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal
- BZ - 2284586 - CVE-2024-36955 kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
- BZ - 2284628 - CVE-2024-36939 kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init().
- BZ - 2284634 - CVE-2024-36901 kernel: ipv6: prevent NULL dereference in ip6_output()
- BZ - 2290407 - CVE-2024-36961 kernel: thermal/debugfs: Fix two locking issues with thermal zone debug
- BZ - 2290408 - CVE-2024-36960 kernel: drm/vmwgfx: Fix invalid reads in fence signaled events
- BZ - 2292329 - CVE-2024-36967 kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode()
- BZ - 2293000 - CVE-2024-36977 kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command
- BZ - 2293003 - CVE-2024-36974 kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- BZ - 2293329 - CVE-2024-38618 kernel: ALSA: timer: Set lower bound of start tick time
- BZ - 2293359 - CVE-2024-38605 kernel: ALSA: core: Fix NULL module pointer assignment at card init
- BZ - 2293361 - CVE-2024-38604 kernel: block: refine the EOF check in blkdev_iomap_begin
- BZ - 2293365 - CVE-2024-38600 kernel: ALSA: Fix deadlocks with kctl removals at disconnection
- BZ - 2293367 - CVE-2024-38598 kernel: md: fix resync softlockup when bitmap size is less than array size
- BZ - 2293371 - CVE-2024-38596 kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- BZ - 2293408 - CVE-2024-38581 kernel: drm/amdgpu/mes: fix use-after-free issue
- BZ - 2293444 - CVE-2024-38555 kernel: net/mlx5: Discard command completions in internal error
- BZ - 2293639 - CVE-2024-36477 kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- BZ - 2293656 - CVE-2024-38388 kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup
- BZ - 2293684 - CVE-2024-31076 kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
- BZ - 2293693 - CVE-2024-38635 kernel: soundwire: cadence: fix invalid PDI offset
- BZ - 2293696 - CVE-2024-38632 kernel: vfio/pci: fix potential memory leak in vfio_intx_enable()
- BZ - 2293698 - CVE-2024-38629 kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida
- BZ - 2293700 - CVE-2024-38627 kernel: stm class: Fix a double free in stm_register_device()
- BZ - 2294223 - CVE-2024-39291 kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()
- BZ - 2294268 - CVE-2024-39298 kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages
- BZ - 2294274 - CVE-2024-39276 kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
- BZ - 2294313 - CVE-2024-39471 kernel: drm/amdgpu: add error handle to avoid out-of-bounds
- BZ - 2296059 - CVE-2024-39479 kernel: drm/i915/hwmon: Get rid of devm
- BZ - 2296064 - CVE-2024-39473 kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension
- BZ - 2296066 - CVE-2024-39474 kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL
- BZ - 2296278 - CVE-2024-36936 kernel: efi/unaccepted: touch soft lockup during memory accept
- BZ - 2296383 - CVE-2024-39486 kernel: drm/drm_file: Fix pid refcounting race
- BZ - 2297057 - CVE-2024-39488 kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
- BZ - 2297061 - CVE-2024-39491 kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance
- BZ - 2297469 - CVE-2024-39497 kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
- BZ - 2297470 - CVE-2024-39498 kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2
- BZ - 2297471 - CVE-2024-39499 kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()
- BZ - 2297473 - CVE-2024-39501 kernel: drivers: core: synchronize really_probe() and dev_uevent()
- BZ - 2297475 - CVE-2024-39503 kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type
- BZ - 2297480 - CVE-2024-39508 kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags
- BZ - 2297487 - CVE-2024-40903 kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps
- BZ - 2297490 - CVE-2024-40906 kernel: net/mlx5: Always stop health timer during driver removal
- BZ - 2297491 - CVE-2024-40907 kernel: ionic: fix kernel panic in XDP_TX action
- BZ - 2297497 - CVE-2024-40913 kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds
- BZ - 2297503 - CVE-2024-40919 kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
- BZ - 2297506 - CVE-2024-40922 kernel: io_uring/rsrc: don't lock while !TASK_RUNNING
- BZ - 2297507 - CVE-2024-40923 kernel: vmxnet3: disable rx data ring on dma allocation failure
- BZ - 2297508 - CVE-2024-40924 kernel: drm/i915/dpt: Make DPT object unshrinkable
- BZ - 2297509 - CVE-2024-40925 kernel: block: fix request.queuelist usage in flush
- BZ - 2297514 - CVE-2024-40930 kernel: wifi: cfg80211: validate HE operation element parsing
- BZ - 2297524 - CVE-2024-40940 kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail
- BZ - 2297529 - CVE-2024-40945 kernel: iommu: Return right value in iommu_sva_bind_device()
- BZ - 2297532 - CVE-2024-40948 kernel: mm/page_table_check: fix crash on ZONE_DEVICE
- BZ - 2297549 - CVE-2024-40965 kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer
- BZ - 2297550 - CVE-2024-40966 kernel: tty: add the option to have a tty reject a new ldisc
- BZ - 2297551 - CVE-2024-40967 kernel: serial: imx: Introduce timeout when waiting on transmitter empty
- BZ - 2297572 - CVE-2024-40988 kernel: drm/radeon: fix UBSAN warning in kv_dpm.c
- BZ - 2297573 - CVE-2024-40989 kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown
- BZ - 2297581 - CVE-2024-40997 kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
- BZ - 2297585 - CVE-2024-41001 kernel: io_uring/sqpoll: work around a potential audit memory leak
- BZ - 2297702 - CVE-2024-39507 kernel: net: hns3: fix kernel crash problem in concurrent scenario
- BZ - 2297706 - CVE-2024-40901 kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- BZ - 2297909 - CVE-2024-41007 kernel: tcp: avoid too many retransmit packets
- BZ - 2298079 - CVE-2024-41008 kernel: drm/amdgpu: change vm->task_info handling
- BZ - 2298140 - CVE-2022-48804 kernel: vt_ioctl: fix array_index_nospec in vt_setactivate
- BZ - 2298817 - CVE-2024-24859 kernel: bluetooth: race condition in sniff_{min,max}_interval_set()
- BZ - 2299452 - CVE-2024-41012 kernel: filelock: Remove locks reliably when fcntl/close race is detected
- BZ - 2300363 - CVE-2024-41020 kernel: filelock: Fix fcntl/close race recovery compat path
- BZ - 2300398 - CVE-2024-41032 kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask
- BZ - 2300407 - CVE-2024-41038 kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
- BZ - 2300408 - CVE-2024-41039 kernel: firmware: cs_dsp: Fix overflow checking of wmfw header
- BZ - 2300412 - CVE-2024-41042 kernel: netfilter: nf_tables: prefer nft_chain_validate
- BZ - 2300422 - CVE-2024-41049 kernel: filelock: fix potential use-after-free in posix_lock_inode
- BZ - 2300430 - CVE-2024-41056 kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
- BZ - 2300431 - CVE-2024-41057 kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()
- BZ - 2300432 - CVE-2024-41058 kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
- BZ - 2300434 - CVE-2024-41060 kernel: drm/radeon: check bo_va->bo is non-NULL before using it
- BZ - 2300438 - CVE-2024-41063 kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
- BZ - 2300440 - CVE-2024-41065 kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace
- BZ - 2300454 - CVE-2024-41077 kernel: null_blk: fix validation of block size
- BZ - 2300456 - CVE-2024-41079 kernel: nvmet: always initialize cqe.result
- BZ - 2300459 - CVE-2024-41082 kernel: nvme-fabrics: use reserved tag for reg read/write command
- BZ - 2300480 - CVE-2024-41084 kernel: cxl/region: Avoid null pointer dereference in region lookup
- BZ - 2300481 - CVE-2024-41085 kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling
- BZ - 2300486 - CVE-2024-41089 kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
- BZ - 2300487 - CVE-2024-41092 kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers
- BZ - 2300488 - CVE-2024-41093 kernel: drm/amdgpu: avoid using null object of framebuffer
- BZ - 2300489 - CVE-2024-41094 kernel: drm/fbdev-dma: Only set smem_start is enable per module option
- BZ - 2300490 - CVE-2024-41095 kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
- BZ - 2300508 - CVE-2024-42070 kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
- BZ - 2300516 - CVE-2024-42078 kernel: nfsd: initialise nfsd_info.mutex early.
- BZ - 2300533 - CVE-2024-42084 kernel: ftruncate: pass a signed offset
- BZ - 2300552 - CVE-2024-42090 kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
- BZ - 2301464 - CVE-2024-42101 kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
- BZ - 2301477 - CVE-2024-42114 kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
- BZ - 2301488 - CVE-2024-42123 kernel: drm/amdgpu: fix double free err_addr pointer warnings
- BZ - 2301489 - CVE-2024-42124 kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible
- BZ - 2301490 - CVE-2024-42125 kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband
- BZ - 2301497 - CVE-2024-42132 kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
- BZ - 2301506 - CVE-2024-42141 kernel: Bluetooth: ISO: Check socket flag instead of hcon
- BZ - 2301522 - CVE-2024-42154 kernel: tcp_metrics: validate source addr length
- BZ - 2301530 - CVE-2024-42159 kernel: scsi: mpi3mr: Sanitise num_phys
- BZ - 2301544 - CVE-2024-42226 kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB
- BZ - 2303077 - CVE-2024-42228 kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- BZ - 2304187 - CVE-2024-42258 kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines
- BZ - 2306363 - CVE-2024-43869 kernel: perf: Fix event leak upon exec and file release
- BZ - 2307861 - CVE-2024-43888 kernel: mm: list_lru: fix UAF for memory cgroup
- BZ - 2307865 - CVE-2024-43892 kernel: memcg: protect concurrent access to mem_cgroup_idr
- BZ - 2307884 - CVE-2024-43911 kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session
- BZ - 2309273 - CVE-2024-44947 kernel: fuse: Initialize beyond-EOF page contents before setting uptodate
- BZ - 2309791 - CVE-2024-44960 kernel: usb: gadget: core: Check for unset descriptor
- BZ - 2309796 - CVE-2024-44965 kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption
- BZ - 2309801 - CVE-2024-44970 kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
- BZ - 2309847 - CVE-2024-44984 kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
- BZ - 2309868 - CVE-2024-45005 kernel: KVM: s390: fix validity interception issue when gisa is switched off
- RHEL-26081 - [RHEL-9] bnx2i issues with cnic uio interface
- RHEL-9148 - Interrupt thread not affined after interrupt reaffined
- RHEL-17714 - During hotplug 416 vcpus hit "watchdog: BUG: soft lockup - CPU#9 stuck for 44s! [swapper/9:0]" issues
- RHEL-23575 - Open vSwitch kernel module recursive DoS
- RHEL-32199 - Rebase kexec/kdump to upstream kernel v6.5
- RHEL-29437 - The kernel rejects programmed TSC offsets in the architectural MSRs
- RHEL-36182 - idpf: "ethtool -G ... tcp-data-split off" is silently ignored
- RHEL-36224 - Fix objtool warnings in kernel build
- RHEL-7990 - "rpm -e" in libguestfs appliance (guest) triggers xfs_iunlink_lookup() WARNING [kernel-5.14.0-347.el9]
- RHEL-9429 - [rhel-9 wwan] wwan core and drivers rebase to v6.9
- RHEL-45158 - text console via virtio-gpu is not working on s390x anymore
- RHEL-31876 - [OVS] per-flow sample optimization using psample (kernel)
- RHEL-35853 - nfs: getcwd returns ENOENT in subdirectory of mount after upgrade from RHEL7 to RHEL9
- RHEL-9096 - auditd fails to start with "Error setting audit daemon pid (No buffer space available)"
CVEs
- CVE-2019-25162
- CVE-2020-10135
- CVE-2021-47098
- CVE-2021-47101
- CVE-2021-47185
- CVE-2021-47384
- CVE-2021-47386
- CVE-2021-47428
- CVE-2021-47429
- CVE-2021-47432
- CVE-2021-47454
- CVE-2021-47457
- CVE-2021-47495
- CVE-2021-47497
- CVE-2021-47505
- CVE-2022-48669
- CVE-2022-48672
- CVE-2022-48703
- CVE-2022-48804
- CVE-2022-48929
- CVE-2023-52445
- CVE-2023-52451
- CVE-2023-52455
- CVE-2023-52462
- CVE-2023-52464
- CVE-2023-52466
- CVE-2023-52467
- CVE-2023-52473
- CVE-2023-52475
- CVE-2023-52477
- CVE-2023-52482
- CVE-2023-52490
- CVE-2023-52492
- CVE-2023-52498
- CVE-2023-52501
- CVE-2023-52513
- CVE-2023-52520
- CVE-2023-52528
- CVE-2023-52560
- CVE-2023-52565
- CVE-2023-52585
- CVE-2023-52594
- CVE-2023-52595
- CVE-2023-52606
- CVE-2023-52614
- CVE-2023-52615
- CVE-2023-52619
- CVE-2023-52621
- CVE-2023-52622
- CVE-2023-52624
- CVE-2023-52625
- CVE-2023-52632
- CVE-2023-52634
- CVE-2023-52635
- CVE-2023-52637
- CVE-2023-52643
- CVE-2023-52648
- CVE-2023-52649
- CVE-2023-52650
- CVE-2023-52656
- CVE-2023-52659
- CVE-2023-52661
- CVE-2023-52662
- CVE-2023-52663
- CVE-2023-52664
- CVE-2023-52674
- CVE-2023-52676
- CVE-2023-52679
- CVE-2023-52680
- CVE-2023-52683
- CVE-2023-52686
- CVE-2023-52689
- CVE-2023-52690
- CVE-2023-52696
- CVE-2023-52697
- CVE-2023-52698
- CVE-2023-52703
- CVE-2023-52730
- CVE-2023-52731
- CVE-2023-52740
- CVE-2023-52749
- CVE-2023-52751
- CVE-2023-52756
- CVE-2023-52757
- CVE-2023-52758
- CVE-2023-52762
- CVE-2023-52775
- CVE-2023-52784
- CVE-2023-52788
- CVE-2023-52791
- CVE-2023-52811
- CVE-2023-52813
- CVE-2023-52814
- CVE-2023-52817
- CVE-2023-52819
- CVE-2023-52831
- CVE-2023-52833
- CVE-2023-52834
- CVE-2023-52837
- CVE-2023-52840
- CVE-2023-52859
- CVE-2023-52867
- CVE-2023-52869
- CVE-2023-52878
- CVE-2023-52902
- CVE-2024-0340
- CVE-2024-1151
- CVE-2024-22099
- CVE-2024-23307
- CVE-2024-23848
- CVE-2024-24857
- CVE-2024-24858
- CVE-2024-24859
- CVE-2024-25739
- CVE-2024-26589
- CVE-2024-26591
- CVE-2024-26601
- CVE-2024-26603
- CVE-2024-26605
- CVE-2024-26611
- CVE-2024-26612
- CVE-2024-26614
- CVE-2024-26618
- CVE-2024-26631
- CVE-2024-26638
- CVE-2024-26641
- CVE-2024-26645
- CVE-2024-26646
- CVE-2024-26650
- CVE-2024-26656
- CVE-2024-26660
- CVE-2024-26661
- CVE-2024-26662
- CVE-2024-26663
- CVE-2024-26664
- CVE-2024-26669
- CVE-2024-26670
- CVE-2024-26672
- CVE-2024-26674
- CVE-2024-26675
- CVE-2024-26678
- CVE-2024-26679
- CVE-2024-26680
- CVE-2024-26686
- CVE-2024-26691
- CVE-2024-26700
- CVE-2024-26704
- CVE-2024-26707
- CVE-2024-26708
- CVE-2024-26712
- CVE-2024-26717
- CVE-2024-26719
- CVE-2024-26725
- CVE-2024-26733
- CVE-2024-26740
- CVE-2024-26743
- CVE-2024-26744
- CVE-2024-26746
- CVE-2024-26757
- CVE-2024-26758
- CVE-2024-26759
- CVE-2024-26761
- CVE-2024-26767
- CVE-2024-26772
- CVE-2024-26774
- CVE-2024-26782
- CVE-2024-26785
- CVE-2024-26786
- CVE-2024-26803
- CVE-2024-26812
- CVE-2024-26815
- CVE-2024-26835
- CVE-2024-26837
- CVE-2024-26838
- CVE-2024-26840
- CVE-2024-26843
- CVE-2024-26846
- CVE-2024-26857
- CVE-2024-26861
- CVE-2024-26862
- CVE-2024-26863
- CVE-2024-26870
- CVE-2024-26872
- CVE-2024-26878
- CVE-2024-26882
- CVE-2024-26889
- CVE-2024-26890
- CVE-2024-26892
- CVE-2024-26894
- CVE-2024-26899
- CVE-2024-26900
- CVE-2024-26901
- CVE-2024-26903
- CVE-2024-26906
- CVE-2024-26907
- CVE-2024-26915
- CVE-2024-26920
- CVE-2024-26921
- CVE-2024-26922
- CVE-2024-26924
- CVE-2024-26927
- CVE-2024-26928
- CVE-2024-26933
- CVE-2024-26934
- CVE-2024-26937
- CVE-2024-26938
- CVE-2024-26939
- CVE-2024-26940
- CVE-2024-26950
- CVE-2024-26951
- CVE-2024-26953
- CVE-2024-26958
- CVE-2024-26960
- CVE-2024-26962
- CVE-2024-26964
- CVE-2024-26973
- CVE-2024-26975
- CVE-2024-26976
- CVE-2024-26984
- CVE-2024-26987
- CVE-2024-26988
- CVE-2024-26989
- CVE-2024-26990
- CVE-2024-26992
- CVE-2024-27003
- CVE-2024-27004
- CVE-2024-27010
- CVE-2024-27011
- CVE-2024-27012
- CVE-2024-27013
- CVE-2024-27014
- CVE-2024-27015
- CVE-2024-27017
- CVE-2024-27023
- CVE-2024-27025
- CVE-2024-27038
- CVE-2024-27042
- CVE-2024-27048
- CVE-2024-27057
- CVE-2024-27062
- CVE-2024-27079
- CVE-2024-27389
- CVE-2024-27395
- CVE-2024-27404
- CVE-2024-27410
- CVE-2024-27414
- CVE-2024-27431
- CVE-2024-27436
- CVE-2024-27437
- CVE-2024-31076
- CVE-2024-35787
- CVE-2024-35794
- CVE-2024-35795
- CVE-2024-35801
- CVE-2024-35805
- CVE-2024-35807
- CVE-2024-35808
- CVE-2024-35809
- CVE-2024-35810
- CVE-2024-35812
- CVE-2024-35814
- CVE-2024-35817
- CVE-2024-35822
- CVE-2024-35824
- CVE-2024-35827
- CVE-2024-35831
- CVE-2024-35835
- CVE-2024-35838
- CVE-2024-35840
- CVE-2024-35843
- CVE-2024-35847
- CVE-2024-35853
- CVE-2024-35854
- CVE-2024-35855
- CVE-2024-35859
- CVE-2024-35861
- CVE-2024-35862
- CVE-2024-35863
- CVE-2024-35864
- CVE-2024-35865
- CVE-2024-35866
- CVE-2024-35867
- CVE-2024-35869
- CVE-2024-35872
- CVE-2024-35876
- CVE-2024-35877
- CVE-2024-35878
- CVE-2024-35880
- CVE-2024-35886
- CVE-2024-35888
- CVE-2024-35892
- CVE-2024-35894
- CVE-2024-35900
- CVE-2024-35904
- CVE-2024-35905
- CVE-2024-35908
- CVE-2024-35912
- CVE-2024-35913
- CVE-2024-35918
- CVE-2024-35923
- CVE-2024-35924
- CVE-2024-35925
- CVE-2024-35927
- CVE-2024-35928
- CVE-2024-35930
- CVE-2024-35931
- CVE-2024-35938
- CVE-2024-35939
- CVE-2024-35942
- CVE-2024-35944
- CVE-2024-35946
- CVE-2024-35947
- CVE-2024-35950
- CVE-2024-35952
- CVE-2024-35954
- CVE-2024-35957
- CVE-2024-35959
- CVE-2024-35973
- CVE-2024-35976
- CVE-2024-35979
- CVE-2024-35983
- CVE-2024-35991
- CVE-2024-35995
- CVE-2024-36006
- CVE-2024-36010
- CVE-2024-36015
- CVE-2024-36022
- CVE-2024-36028
- CVE-2024-36030
- CVE-2024-36031
- CVE-2024-36477
- CVE-2024-36881
- CVE-2024-36882
- CVE-2024-36884
- CVE-2024-36885
- CVE-2024-36891
- CVE-2024-36896
- CVE-2024-36901
- CVE-2024-36902
- CVE-2024-36905
- CVE-2024-36917
- CVE-2024-36920
- CVE-2024-36926
- CVE-2024-36927
- CVE-2024-36930
- CVE-2024-36932
- CVE-2024-36933
- CVE-2024-36936
- CVE-2024-36939
- CVE-2024-36940
- CVE-2024-36944
- CVE-2024-36945
- CVE-2024-36955
- CVE-2024-36956
- CVE-2024-36960
- CVE-2024-36961
- CVE-2024-36967
- CVE-2024-36974
- CVE-2024-36977
- CVE-2024-38388
- CVE-2024-38555
- CVE-2024-38581
- CVE-2024-38596
- CVE-2024-38598
- CVE-2024-38600
- CVE-2024-38604
- CVE-2024-38605
- CVE-2024-38618
- CVE-2024-38627
- CVE-2024-38629
- CVE-2024-38632
- CVE-2024-38635
- CVE-2024-39276
- CVE-2024-39291
- CVE-2024-39298
- CVE-2024-39471
- CVE-2024-39473
- CVE-2024-39474
- CVE-2024-39479
- CVE-2024-39486
- CVE-2024-39488
- CVE-2024-39491
- CVE-2024-39497
- CVE-2024-39498
- CVE-2024-39499
- CVE-2024-39501
- CVE-2024-39503
- CVE-2024-39507
- CVE-2024-39508
- CVE-2024-40901
- CVE-2024-40903
- CVE-2024-40906
- CVE-2024-40907
- CVE-2024-40913
- CVE-2024-40919
- CVE-2024-40922
- CVE-2024-40923
- CVE-2024-40924
- CVE-2024-40925
- CVE-2024-40930
- CVE-2024-40940
- CVE-2024-40945
- CVE-2024-40948
- CVE-2024-40965
- CVE-2024-40966
- CVE-2024-40967
- CVE-2024-40988
- CVE-2024-40989
- CVE-2024-40997
- CVE-2024-41001
- CVE-2024-41007
- CVE-2024-41008
- CVE-2024-41012
- CVE-2024-41020
- CVE-2024-41032
- CVE-2024-41038
- CVE-2024-41039
- CVE-2024-41042
- CVE-2024-41049
- CVE-2024-41056
- CVE-2024-41057
- CVE-2024-41058
- CVE-2024-41060
- CVE-2024-41063
- CVE-2024-41065
- CVE-2024-41077
- CVE-2024-41079
- CVE-2024-41082
- CVE-2024-41084
- CVE-2024-41085
- CVE-2024-41089
- CVE-2024-41092
- CVE-2024-41093
- CVE-2024-41094
- CVE-2024-41095
- CVE-2024-42070
- CVE-2024-42078
- CVE-2024-42084
- CVE-2024-42090
- CVE-2024-42101
- CVE-2024-42114
- CVE-2024-42123
- CVE-2024-42124
- CVE-2024-42125
- CVE-2024-42132
- CVE-2024-42141
- CVE-2024-42154
- CVE-2024-42159
- CVE-2024-42226
- CVE-2024-42228
- CVE-2024-42237
- CVE-2024-42238
- CVE-2024-42240
- CVE-2024-42245
- CVE-2024-42258
- CVE-2024-42268
- CVE-2024-42271
- CVE-2024-42276
- CVE-2024-42301
- CVE-2024-43817
- CVE-2024-43826
- CVE-2024-43830
- CVE-2024-43842
- CVE-2024-43856
- CVE-2024-43865
- CVE-2024-43866
- CVE-2024-43869
- CVE-2024-43870
- CVE-2024-43879
- CVE-2024-43888
- CVE-2024-43892
- CVE-2024-43911
- CVE-2024-44947
- CVE-2024-44960
- CVE-2024-44965
- CVE-2024-44970
- CVE-2024-44984
- CVE-2024-45005
Red Hat Enterprise Linux for x86_64 9
SRPM | |
---|---|
kernel-5.14.0-503.11.1.el9_5.src.rpm | SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377 |
x86_64 | |
bpftool-7.4.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e1cee1a98de8075bebe457ffedb9a598f1db425f1d399298908bb62cfc3e4310 |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm | SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24 |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm | SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24 |
kernel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e65522701d74ee0124fb4c4f6f5c3ec271615eaeda9c997bd6e37f604987bd2e |
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330 |
kernel-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 865eb14ef393035d13f4771a9cb0dd637e9260cc9f58f6085c2a7e0d6f8c9d21 |
kernel-debug-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: bc34a39cbea07a1107af9480ef2bedb1fec3a6fba9fa33aedbb9d85a2ac73adc |
kernel-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f04fc1e40c44fbb8aaca9a44dc512c4b4eb988edca6ccb5ab87d238ed5ccb886 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431 |
kernel-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 6079a2e1e5bdfcf6e3543717b0c0efd7c4bc13fec05172b496c8cc7d4580f4f7 |
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 03c9b79a23f3e013e9de43cb9f8a14b6a14bac47c22681456e63684ab08b7eb2 |
kernel-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 03a3dbbc8a1cb39ad7c915424819b1f35727ddb45b4ba0e577cac9c4694e184b |
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 393c6893fcae8abaaf46ff04d1e600127b0f05a187b1f207b4680a69923b7517 |
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 5b4cd0c7ed93c6caaeaa83accb0cc5c89a93ed1fbf1d6317327f8d2251c374dd |
kernel-debug-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 224907fb0c363e60eb4338415072f54c8f0592e1a0af6d1c34a058bcdb62389d |
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8 |
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6 |
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6 |
kernel-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 05bed7e417a6f9a8b83a827e82893a0e3f9a54884b3507a6f114014c85be0fbc |
kernel-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 4187eec9493c5298ca502ad004b88046e80a6a4d2182e18e1faac875c68432e5 |
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20 |
kernel-headers-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 854a873f372a26a898cec557cdf567c39da231733fbc407d3d76e2d7469ba265 |
kernel-modules-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 6e97cb58c97028f8f005239b625d657b2dc09df86b07e7178118c5c9ed84ace7 |
kernel-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 78007292f22918311ef2b86707c15dc7dfed147e2a0b9ddb190aedc97574f3d7 |
kernel-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 81d94339f8a59568ef31f207e01ccc4db48a195138c30b743fd090eb3a1c62b8 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773 |
kernel-tools-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: fae1216364267c740191d87c45868d02721f7c1c497a5d1980c70d21844e31c4 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd |
kernel-tools-libs-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 27b7cf8b6a5fa3865ee2f7e3fcef9e13644c9d033dacfdc2786e80b4403b2b3f |
kernel-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: bfaa147612d329ed7d059129092daef6632d2bab8a2a37cc00d570a7ddaa7808 |
kernel-uki-virt-addons-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 4a3b9f9690bb6f84e2686cf7b3cde0c482692fe4954f5f05870c247edb9c6da9 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75 |
perf-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d2c88aa040283a4f5cdbc69b9d6965e15242ce3cdf3bb7ea0aefb0207146cd05 |
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53 |
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53 |
python3-perf-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a357c9fdd1363389f17a3f60229fbb413febd2a3c488a1e72bb3217b8771ad5d |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc |
rtla-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e7ce1f80f44533ddf6b684f3ca1049d79ea40a219683f696e218f4ad3bd588f5 |
rv-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 9f8b86435f5e333cc8257c1d434b0d81425e52db11f8c585416c7ab34fb72e68 |
Red Hat Enterprise Linux for IBM z Systems 9
SRPM | |
---|---|
kernel-5.14.0-503.11.1.el9_5.src.rpm | SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377 |
s390x | |
bpftool-7.4.0-503.11.1.el9_5.s390x.rpm | SHA-256: 58258553917e9d699c7ad90de2ee3355c8e6ce659e7a7810f0f518360320937f |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm | SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7 |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm | SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7 |
kernel-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: c3486c1e4d2297c697722d38bc40c6a501d6c5e7d03b92fbf78254daa42c6fe6 |
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330 |
kernel-core-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 801e9fe9f15a18d9f52bd2d1b1cac02d28533eb13aced19e077939b0b3aba799 |
kernel-debug-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 45046393bf0023ca590e0d4e163ca4ca0c8547a93a2a62399df98f347c3db08b |
kernel-debug-core-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 6bc7a1f45952f7cf5e16eabafbebd74433a07ab0856b2557eaebf499e25a44b3 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054 |
kernel-debug-devel-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 8cb812b499919d1de72ab78ba7940df301c5817ed41155fb636f1043c4a63dea |
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 439c30128da1d4289b2a3227c6c6a75dac97670047e661f7590bc7a3dd7c5d46 |
kernel-debug-modules-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: ff03f41959372389b43983eeb0aa02da3a7fc71df52538e85c916e926ce12f1f |
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 6ff15681f317d00e3854d23398d67a09bf86dd2f09440c4a5908c1b91cace418 |
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 31f049cbb1f0306cfac6401de7dc613ead0a1b8d6d8d9e1068af0bc726df2c39 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719 |
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764 |
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764 |
kernel-devel-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 74fb02296932965e9b971dbae0b0262726a30e46573e384c627a71f1716f4271 |
kernel-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: d4488c53dc44a1a3c76dc41370d012307fd60f0f899a861a0543808b8b0a0588 |
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20 |
kernel-headers-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 481496788f15df4f34be2ee92d97e702f9e818bbede2919c9d2736f4e9884458 |
kernel-modules-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 12fbb76d854d75c6738e6030feafaab1c38ec65f0f2f362afc4686a683cc5a19 |
kernel-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 979d2d3bc8300c3df243f8a6f7590e9d6ccbc2505361bf174cb743b330a7c7ee |
kernel-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: e043c034f8742c9cbd00cd218ea1b36156745af1a5b436e7d651d744c5763b0a |
kernel-tools-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 49673cbfdfa567c1bf8e8e61edfbc04637b87c90c0298ed50ca311dc1467428c |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd |
kernel-zfcpdump-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 3daef7cc0220feaf30a29de591afeb3aea20dad0b74d05434b8593fd28f56727 |
kernel-zfcpdump-core-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: faa785798b45d046867863b47e017672d389b4edb341103d11645dc3735ea86e |
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30 |
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30 |
kernel-zfcpdump-devel-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: dffa64bbaa54b97643d71cf59cb274e37e0927be4b54545355847715ef5fa25f |
kernel-zfcpdump-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 2b9de186a62a6509c9235c4bafa27e6e960936781fd7263a2fdad15bd9fb205a |
kernel-zfcpdump-modules-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 7055a5539ce017e474d10951fdcdd162c021f40149f84e4723ced0c17fea18c7 |
kernel-zfcpdump-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 049988bf60c5911795e1851c2b442cf17a938aee4c082e63e6a20cbe0f6a07ea |
kernel-zfcpdump-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 1f378fc71bdb6283b12326b6ae2858438bedb1092e13d6b2d7b27c71c5f082db |
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e |
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e |
perf-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 83206f8028c9986ff7b2f0225bb586451cbb9f0987cd2e8b73877ba7a1231a56 |
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb |
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb |
python3-perf-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 843ca449722b2a2418daab83b018be2cd4f89c57d98a15a176330e67559ed78e |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9 |
rtla-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: b5be8e49a62bdfcf0837452cfbb920924ba877421659bdfe35759fccc65298df |
rv-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: cfd0ab3fa0ef0ae0230209e7df702510485032cff79b012c0d44a64a3b691255 |
Red Hat Enterprise Linux for Power, little endian 9
SRPM | |
---|---|
kernel-5.14.0-503.11.1.el9_5.src.rpm | SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377 |
ppc64le | |
bpftool-7.4.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 330b20d1eea2a40c77bf7e37415e6d4e9d6c444f1a93899015ce058f7b576935 |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87 |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87 |
kernel-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 859c8b1ddacc441e453aaf8b2bd6d3ca890540724dbec488d466deaf2fe7e43f |
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330 |
kernel-core-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: fd4f8ac2318a29e0ea8e83cd2b3e0f33002a40c965e68e9ce1ccdd10c26c6073 |
kernel-debug-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: a3f6d9647e857787de50b64c19de0268b7d574d3c9aa7f5dccdabced61985d27 |
kernel-debug-core-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 9668eca54db4cd3596d7d9afdd073f266c2bf6287acc61c4803da0795ed9e50c |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd |
kernel-debug-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 844fc64937074372a5f1095b434e029d4047b33abb75edaae125b9564eea6c69 |
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 7e655b7824bd1cdefe337a33c939052444d94c402bdd3f41698214ca709a4746 |
kernel-debug-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 35524024c0707f92c3cd4395909ed217600a476beb56ee58ae2e4d3da6f2b8e9 |
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 4cc9c5e9b4ba9b3cf92324a50bce6e3277bfffe64bd02e85ca5d78447bb3c68b |
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 623cf98eeefbb08f318874045a7cc5a0e51d5ca9a8e930aa5a1f9614b53500d2 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0 |
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713 |
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713 |
kernel-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 8199e4247736a3cb80d7338628d80974a31d0ccda9d38fe65131da83ca7b5a62 |
kernel-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 9e4599d50c054bc473f9d2e2b69ac5a7103d82dcee39dbc3e72cad4339e525c1 |
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20 |
kernel-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 1d76d37ce3454c4f6c04d9f1a9b2e176820b5bd6444321ca2dbfd9cd9e5f5eba |
kernel-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 000b8c62d1c7beb46771f8b2819706fe7a14aea856dc0183cce676560b428fd2 |
kernel-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: bded82aa257fd85c42d6cafe9ec7756e6921a5dec304e02125ca2788ea3976e9 |
kernel-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: bd3b72c316aec32ea0ce8e4ab0adada966a743d46ba0e7a62387c279ff87a447 |
kernel-tools-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: ad114c73d3294d69ee776fe6350f2109b0bf965f66143b808b5c467fea24ef58 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119 |
kernel-tools-libs-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 43ceb6c859070d82e97000b8805b4c7eac92c981ff9dab591bfc58a413685dad |
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584 |
perf-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 1f275b2190b24f70011595c82f2e42ce8bf4efead2ecac6a4f2b42887155db64 |
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7 |
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7 |
python3-perf-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: f832861722c4ddff58a0f815cd63dc289fd0bfcc3843a8c8333905d3737b88b0 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d |
rtla-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: a8ca4a9798c83a972a5afca4690016d1806c722fb9f51fdc3c85692094b4dc41 |
rv-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 5debd0e484a9ccc6ee8cb948b6fd396126c884008fe6d273a25c261badec848a |
Red Hat Enterprise Linux for Real Time 9
SRPM | |
---|---|
x86_64 | |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm | SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8 |
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6 |
kernel-rt-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e07f37d077eda7650dc8af8b5e1392baaef2d8310e736b7dfc08a730b99e3206 |
kernel-rt-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: ce65e9a2feb30d73a58abb19da04ad7683e59f53ef23a963a4dbd7b1cdb3bdec |
kernel-rt-debug-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 1e4ea51ffdbe0d2b2a5506cc9a216b7ec645414a729f40a5163c7d8cb1f55aa2 |
kernel-rt-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: b13cdd4673e50b27440d6ba4a17ca23562dcc887261b4281ed4e93bcd1bbfac3 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76 |
kernel-rt-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: c9281cec83a1595ebc36173c4b03ed0eb0839ee1bae8a5723a7f94c42095e91c |
kernel-rt-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0417faac72afa9badfaee932b811cf0d8f0d461966f0c28b259f38d1138c0ce6 |
kernel-rt-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 55c4d82d23d2ad866740f5bb088d9d96b6a84b722b1aa3dcdcb22484f4528399 |
kernel-rt-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 66fae4e6c639df3209af19d63f14bc61888639270a81fe9df9efb08260bfd860 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773 |
kernel-rt-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d62c7248f77691e792ba247a754f3495a2b7aaa92392c5af2404eae39200d4c2 |
kernel-rt-modules-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 133f1b3b2f80a719b47032d99eb86f289168a28a53004c54e42e9a9d6e6d365d |
kernel-rt-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 2526dffdd51bfc8c170d9c7ddb720c8e3a24cda4d4eed9335369444f6a9c7a8d |
kernel-rt-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f4897d95cc46ca9e99f5307c16e395a0bad5b9566aaef006acd90e6cc0c565e9 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd |
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75 |
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc |
Red Hat Enterprise Linux for Real Time for NFV 9
SRPM | |
---|---|
x86_64 | |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm | SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8 |
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6 |
kernel-rt-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e07f37d077eda7650dc8af8b5e1392baaef2d8310e736b7dfc08a730b99e3206 |
kernel-rt-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: ce65e9a2feb30d73a58abb19da04ad7683e59f53ef23a963a4dbd7b1cdb3bdec |
kernel-rt-debug-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 1e4ea51ffdbe0d2b2a5506cc9a216b7ec645414a729f40a5163c7d8cb1f55aa2 |
kernel-rt-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: b13cdd4673e50b27440d6ba4a17ca23562dcc887261b4281ed4e93bcd1bbfac3 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76 |
kernel-rt-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: c9281cec83a1595ebc36173c4b03ed0eb0839ee1bae8a5723a7f94c42095e91c |
kernel-rt-debug-kvm-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a61d323466152a17cd67a07dc30087f0beb18a98759247ee47ca88117dc803b7 |
kernel-rt-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0417faac72afa9badfaee932b811cf0d8f0d461966f0c28b259f38d1138c0ce6 |
kernel-rt-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 55c4d82d23d2ad866740f5bb088d9d96b6a84b722b1aa3dcdcb22484f4528399 |
kernel-rt-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 66fae4e6c639df3209af19d63f14bc61888639270a81fe9df9efb08260bfd860 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773 |
kernel-rt-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d62c7248f77691e792ba247a754f3495a2b7aaa92392c5af2404eae39200d4c2 |
kernel-rt-kvm-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: aef7784a3a8fc00db7d69f810851a129aa4f6faf2b359246f2e4316bdbd3b4a6 |
kernel-rt-modules-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 133f1b3b2f80a719b47032d99eb86f289168a28a53004c54e42e9a9d6e6d365d |
kernel-rt-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 2526dffdd51bfc8c170d9c7ddb720c8e3a24cda4d4eed9335369444f6a9c7a8d |
kernel-rt-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f4897d95cc46ca9e99f5307c16e395a0bad5b9566aaef006acd90e6cc0c565e9 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd |
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75 |
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc |
Red Hat Enterprise Linux for ARM 64 9
SRPM | |
---|---|
kernel-5.14.0-503.11.1.el9_5.src.rpm | SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377 |
aarch64 | |
bpftool-7.4.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 7223bccc459f435a07905b5d897a7e486c7162da2e603e9530b8c40379be5411 |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a |
kernel-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: fef062b0fea2033e1be550a65bf8c374ed0109514473e1390492285bbdbbcb72 |
kernel-64k-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 754e02a080b70a572d12bfcce7838a78a60bdafb65229d61e3a203aac8ee8608 |
kernel-64k-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: f7bc356cf6fe6492cafb25b61f250060e88e710f18fca77ea34048f6ec2d6c49 |
kernel-64k-debug-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 660b0cc8bc3e2d8574468e4f4bb4e964d6cd9f3765251f0288e8576ad999a68a |
kernel-64k-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: e317f5f1edc2b755a4406498a714c00bb59b890250a0378c8b94300290d2c23b |
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e |
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e |
kernel-64k-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 5de01b632557320ae42a5302f6b0c17c4f797158010cf0ad4aa318e88d8b5a90 |
kernel-64k-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 62add628980b1524fce4454b9904dfc90427b4eab7af411c6264db7a41ecb06c |
kernel-64k-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: d9be41d6a77730fc57b1e1d94c1bf3109d0735742bbb548825dfb53a19003e9a |
kernel-64k-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 6e73a208f0699e8bb8af6afe7e58efc1ccdb76c14cf234fe53f0c8d590360777 |
kernel-64k-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: f09623b6ea079a3585094aa0b363dac7f4451166b1267ea6aa0fe8353acc3737 |
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe |
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe |
kernel-64k-devel-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: f59a9b76b35308cd2de95c6cee56d697f5d3bb0ba511de2c47ca3d97901cf37c |
kernel-64k-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 9f2f362e63f8cc337575970ef4bedcff124a67eeb7ac350d15c94a871cb5bdf9 |
kernel-64k-modules-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 6de06c8da1050ea61e5c310ea03cfb71afb8c68ecb7fd1992bb2f20ad95c626f |
kernel-64k-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 56d5a2bb18e877adc296b8878c7ba03d6b6789509a446da947547d42eb4eb86f |
kernel-64k-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: b7d969141b07cf66e2dc56ca9fb8289b3649c88e879e9e64f47ff8c50b322781 |
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330 |
kernel-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 73de9f72a9393f1006d62eaa702fc4f9ef16f5911b81207ddd0e4caf858b43c2 |
kernel-debug-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: f4cf563b6daf1f4b9e3f953e6471672ae5c01c0099122b3a84b15646c301a4a3 |
kernel-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 010f87d688501d2f9daa3f97c32a55bd246028a644d9afd7ac102b8da8efe10a |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519 |
kernel-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: de456e48dd4b7b972312c89f8965c282d124b089aa9d97c8002adc7800dc8d5b |
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ec12cdf28b864ded1af4c071e5824eb47250fd4f11ba8d40266c4e4cbf6b0a62 |
kernel-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: bffa5dced7c0d160e6c1b55b226087e098f0d2a58e587026a1cd933ecb2fe22e |
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 1d9a2ed53fe3cb5a2ee26ef7fc5af6603b6abc4df8b25be28ac681681fdab8c7 |
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 9fcd8168ec6b3e93b91e64ed0cd07f74e7a092052635adc1afc337740c3be843 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec |
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec |
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5 |
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5 |
kernel-devel-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ddf75722cad44a93e96cb588d7d9cc51ea2eb25425faea9128755341a3f20178 |
kernel-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 463ec90dc173812d6227b4e4860deedf45f93132333e8c3c5da552a3b010b823 |
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm | SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20 |
kernel-headers-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: cbb7258f68435f2b9ae66580abd493982375485c1833184e5148a2b2672239b8 |
kernel-modules-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 953fc560348f3964c5cceef456558dd16a7c2e291e2aec6f64243f3542dba606 |
kernel-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 5103165deaef634ccfc9c2f0a6b8d80d7199ffe08a1a55009918ea8d89e92a09 |
kernel-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: d18293f47492e286de1d5f655d61b41f3da8ef9928a96ebe1bd4d8bbbaa6ba5c |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd |
kernel-tools-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: f9a266a270a7f6614e3def0747b4723e7e2f7a0763ff8c6770c698aae9e3d675 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20 |
kernel-tools-libs-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 9386197da4f3b072a63fd70c5a09878c81789fba943c2cab4ddf6c6997faba91 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26 |
perf-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 30b3a132e92150c02673cd7b4cd528f5fa9ebf94c12c534b21b2e558a61bce8a |
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4 |
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4 |
python3-perf-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: a3a9f68d2d1f667358e7de9e42470d0483c0e53bcfaafc8ab460c1ff0685ad1d |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7 |
rtla-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 8354c6ae508666b840fae87f2137af09d254916c4b8f40a4166763ecb013c63a |
rv-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: afb0e6f1c1eb06eb0d0729ab31e3744c29b54816cce2012fd36a631608772b66 |
Red Hat CodeReady Linux Builder for x86_64 9
SRPM | |
---|---|
x86_64 | |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm | SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24 |
kernel-cross-headers-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 7d911b939e12bd2fda871411dafbdb454a3543cc95fdb8654ea7a8a2915c26ec |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8 |
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd |
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 461b9f716dd29d8d00b1fc591f579367c55ec70dff65cf05ca2a9ea4ff0c0e3f |
libperf-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 99d36accfaf2b7dcd71a854431d49f3a4b3da19e58d534743d354a7143a1348d |
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75 |
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm | SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc |
Red Hat CodeReady Linux Builder for Power, little endian 9
SRPM | |
---|---|
ppc64le | |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87 |
kernel-cross-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 2bc23910575f861cc3e7b0394c8c0ca76565c1f4dd540bfb1df259a75c41846b |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd |
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0 |
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119 |
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 697fac2e15b0dd00010bc8ae42afe7dcacbc39d8bdb296c072c251d21ba02f5b |
libperf-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: f9f932256f782053ce136ed433f85b18527fce4ebaebd1a0bb5524a99e0f1840 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584 |
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm | SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d |
Red Hat CodeReady Linux Builder for ARM 64 9
SRPM | |
---|---|
aarch64 | |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a |
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e |
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe |
kernel-cross-headers-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 455f6ace43af2161b04aa27fca6d1b7b562e282312869e0d2309157f3aecd5f2 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec |
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5 |
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346 |
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20 |
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 038cd3218556beb502ed4fafc5a122d47d0e0f63ba7a3d5129d06f5b99abe759 |
libperf-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 51bbd68661f563c36b590054bd61d5d29be1bc8cad10b1fd67aa61fda0118bd4 |
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26 |
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4 |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm | SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7 |
Red Hat CodeReady Linux Builder for IBM z Systems 9
SRPM | |
---|---|
s390x | |
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm | SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7 |
kernel-cross-headers-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 5920b79569000e49a45a7cd2e4a1302aa2fd454c5b51085bfe65ff3d822530b3 |
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054 |
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719 |
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764 |
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd |
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30 |
libperf-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 8fa0c7299c5c3abef5accdd961904addd78d06a7b6364824499886fcee4c201d |
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e |
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb |
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm | SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.