Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:9315 - Security Advisory
Issued:
2024-11-12
Updated:
2024-11-12

RHSA-2024:9315 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: kernel security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for kernel is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

[Updated 11 Dec 2024]

CVE-2023-52490 was previously incorrectly listed as fixed in this erratum. The CVE list was updated to remove this CVE. No changes have been made to the packages.

Description

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS) (CVE-2020-10135)
  • kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2024-0340)
  • kernel: use-after-free in cec_queue_msg_fh (CVE-2024-23848)
  • kernel: stack overflow problem in Open vSwitch kernel module leading to DoS (CVE-2024-1151)
  • kernel: crash due to a missing check for leb_size (CVE-2024-25739)
  • kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach (CVE-2024-26591)
  • kernel: powerpc: Fix access beyond end of drmem array (CVE-2023-52451)
  • kernel: pvrusb2: fix use after free on context disconnection (CVE-2023-52445)
  • kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS (CVE-2024-26589)
  • kernel: iommu: Don't reserve 0-length IOVA region (CVE-2023-52455)
  • kernel: bpf: fix check for attempt to corrupt spilled pointer (CVE-2023-52462)
  • kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c (CVE-2023-52464)
  • kernel: PCI/ASPM: Fix deadlock when enabling ASPM (CVE-2024-26605)
  • kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever (CVE-2024-26603)
  • kernel: ext4: regenerate buddy after block freeing failed if under fc replay (CVE-2024-26601)
  • kernel: out-of-bounds read in pci_dev_for_each_resource() (CVE-2023-52466)
  • kernel:null pointer dereference in of_syscon_register() (CVE-2023-52467)
  • kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() (CVE-2024-24857)
  • kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function (CVE-2024-24858)
  • kernel: use after free in i2c (CVE-2019-25162)
  • kernel: NULL pointer dereference in zone registration error path (CVE-2023-52473)
  • kernel: use-after-free in powermate_config_complete (CVE-2023-52475)
  • kernel: x86/srso: Add SRSO mitigation for Hygon processors (CVE-2023-52482)
  • kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors (CVE-2023-52477)
  • kernel: NULL Pointer dereference bluetooth allows Overflow Buffers (CVE-2024-22099)
  • kernel: Integer Overflow in raid5_cache_count (CVE-2024-23307)
  • kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() (CVE-2023-52565)
  • kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() (CVE-2023-52560)
  • kernel: ring-buffer: Do not attempt to read past "commit" (CVE-2023-52501)
  • kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (CVE-2023-52528)
  • kernel: platform/x86: think-lmi: Fix reference leak (CVE-2023-52520)
  • kernel: RDMA/siw: Fix connection failure handling (CVE-2023-52513)
  • kernel: asix: fix uninit-value in asix_mdio_read() (CVE-2021-47101)
  • kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations (CVE-2021-47098)
  • kernel: powerpc/lib: Validate size for vector operations (CVE-2023-52606)
  • kernel: wifi: rt2x00: restart beacon queue when hardware reset (CVE-2023-52595)
  • kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (CVE-2023-52594)
  • kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() (CVE-2023-52585)
  • kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code (CVE-2023-52498)
  • kernel: dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)
  • hw: arm64/sme: Always exit sme_alloc() early with existing storage (CVE-2024-26618)
  • kernel: netfs, fscache: Prevent Oops in fscache_put_cache() (CVE-2024-26612)
  • kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP (CVE-2024-26611)
  • kernel: tcp: make sure init the accept_queue's spinlocks once (CVE-2024-26614)
  • kernel: PM / devfreq: Fix buffer overflow in trans_stat_show (CVE-2023-52614)
  • kernel: pstore/ram: Fix crash when setting number of cpus to an odd number (CVE-2023-52619)
  • kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615)
  • kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (CVE-2024-26641)
  • kernel: nbd: always initialize struct msghdr completely (CVE-2024-26638)
  • kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work (CVE-2024-26631)
  • kernel: tracing: Ensure visibility when inserting an element into tracing_map (CVE-2024-26645)
  • kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface (CVE-2023-52625)
  • kernel: drm/amd/display: Wake DMCUB before executing GPINT commands (CVE-2023-52624)
  • kernel: ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
  • kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers (CVE-2023-52621)
  • kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM (CVE-2024-26646)
  • kernel: p2sb_bar() calls during PCI device probe (CVE-2024-26650)
  • kernel: drm/amdgpu: use-after-free vulnerability (CVE-2024-26656)
  • kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 (CVE-2024-26660)
  • kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (CVE-2024-26661)
  • kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' (CVE-2024-26662)
  • kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (CVE-2024-26663)
  • kernel: hwmon: (coretemp) Fix out-of-bounds memory access (CVE-2024-26664)
  • kernel: net/sched: flower: Fix chain template offload (CVE-2024-26669)
  • kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD (CVE-2024-26670)
  • kernel: drm/amdkfd: lock dependency warning with srcu (CVE-2023-52632)
  • kernel: drm/amd/display: Fix disable_otg_wa logic (CVE-2023-52634)
  • kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] (CVE-2023-52635)
  • kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' (CVE-2024-26672)
  • kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups (CVE-2024-26674)
  • kernel: ppp_async: limit MRU to 64K (CVE-2024-26675)
  • kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section (CVE-2024-26678)
  • kernel: inet: read sk->sk_family once in inet_recv_error() (CVE-2024-26679)
  • kernel: net: atlantic: Fix DMA mapping for PTP hwts ring (CVE-2024-26680)
  • kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (CVE-2023-52637)
  • kernel: KVM: arm64: Fix circular locking dependency (CVE-2024-26691)
  • kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats (CVE-2024-26686)
  • kernel: drm/amd/display: Fix MST Null Ptr for RV (CVE-2024-26700)
  • kernel: dpll: fix possible deadlock during netlink dump operation (CVE-2024-26725)
  • kernel: nouveau: offload fence uevents work to workqueue (CVE-2024-26719)
  • kernel: HID: i2c-hid-of: fix NULL-deref on failed power up (CVE-2024-26717)
  • kernel: powerpc/kasan: Fix addr error caused by page alignment (CVE-2024-26712)
  • kernel: mptcp: really cope with fastopen race (CVE-2024-26708)
  • kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() (CVE-2024-26707)
  • kernel: ext4: fix double-free of blocks due to wrong extents moved_len (CVE-2024-26704)
  • kernel: drm/amd/display: fixed integer types and null check locations (CVE-2024-26767)
  • kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window (CVE-2024-26761)
  • kernel: mm/swap: fix race when skipping swapcache (CVE-2024-26759)
  • kernel: md: Don't ignore suspended array in md_check_recovery() (CVE-2024-26758)
  • kernel: md: Don't ignore read-only array in md_check_recovery() (CVE-2024-26757)
  • kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt (CVE-2024-26774)
  • kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)
  • kernel: arp: Prevent overflow in arp_req_get(). (CVE-2024-26733)
  • kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter (CVE-2024-26744)
  • kernel: RDMA/qedr: Fix qedr_create_user_qp error flow (CVE-2024-26743)
  • kernel: net/sched: act_mirred: use the backlog for mirred ingress (CVE-2024-26740)
  • kernel: dmaengine: idxd: Ensure safe user copy of completion record (CVE-2024-26746)
  • kernel: net: veth: clear GRO when clearing XDP even when down (CVE-2024-26803)
  • kernel: iommufd: Fix iopt_access_list_id overwrite bug (CVE-2024-26786)
  • kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova (CVE-2024-26785)
  • kernel: mptcp: fix double-free on socket dismantle (CVE-2024-26782)
  • kernel: vfio/pci: Create persistent INTx handler (CVE-2024-26812)
  • kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ (CVE-2024-27437)
  • kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check (CVE-2024-26815)
  • kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (CVE-2021-47185)
  • kernel: nvme-fc: do not wait in vain when unloading module (CVE-2024-26846)
  • kernel: efi: runtime: Fix potential overflow of soft-reserved region size (CVE-2024-26843)
  • kernel: cachefiles: fix memory leak in cachefiles_add_cache() (CVE-2024-26840)
  • kernel: RDMA/irdma: Fix KASAN issue with tasklet (CVE-2024-26838)
  • kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload (CVE-2024-26837)
  • kernel: netfilter: nf_tables: set dormant flag on hook register failure (CVE-2024-26835)
  • kernel: iio: core: fix memleak in iio_device_register_sysfs (CVE-2023-52643)
  • kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)
  • kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() (CVE-2024-26906)
  • kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (CVE-2024-26903)
  • kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901)
  • kernel: md: fix kmemleak of rdev->serial (CVE-2024-26900)
  • kernel: block: fix deadlock between bd_link_disk_holder and partition scan (CVE-2024-26899)
  • kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (CVE-2024-26894)
  • kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq() (CVE-2024-26892)
  • kernel: Bluetooth: btrtl: fix out of bounds memory access (CVE-2024-26890)
  • kernel: Bluetooth: hci_core: Fix possible buffer overflow (CVE-2024-26889)
  • kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() (CVE-2024-26882)
  • kernel: quota: Fix potential NULL pointer dereference (CVE-2024-26878)
  • kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup (CVE-2024-26872)
  • kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (CVE-2024-26870)
  • kernel: hsr: Fix uninit-value access in hsr_get_node() (CVE-2024-26863)
  • kernel: packet: annotate data-races around ignore_outgoing (CVE-2024-26862)
  • kernel: wireguard: receive: annotate data-race around receiving_counter.counter (CVE-2024-26861)
  • kernel: geneve: make sure to pull inner header in geneve_rx() (CVE-2024-26857)
  • kernel: tracing/trigger: Fix to return error if failed to alloc snapshot (CVE-2024-26920)
  • kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit (CVE-2024-26915)
  • kernel: inet: inet_defrag: prevent sk release while still in use (CVE-2024-26921)
  • kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly (CVE-2024-26922)
  • kernel: netfilter: nft_set_pipapo: do not free live element (CVE-2024-26924)
  • kernel: ASoC: SOF: Add some bounds checking to firmware data (CVE-2024-26927)
  • kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() (CVE-2024-26928)
  • kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)
  • kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape (CVE-2024-26962)
  • kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() (CVE-2024-26960)
  • kernel: nfs: fix UAF in direct writes (CVE-2024-26958)
  • kernel: net: esp: fix bad handling of pages from page_pool (CVE-2024-26953)
  • kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list (CVE-2024-26951)
  • kernel: wireguard: netlink: access device through ctx instead of peer (CVE-2024-26950)
  • kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (CVE-2024-26940)
  • kernel: drm/i915/vma: Fix UAF on destroy against retire race (CVE-2024-26939)
  • kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (CVE-2024-26938)
  • kernel: drm/i915/gt: Reset queue_priority_hint on parking (CVE-2024-26937)
  • kernel: USB: core: Fix deadlock in usb_deauthorize_interface() (CVE-2024-26934)
  • kernel: USB: core: Fix deadlock in port "disable" sysfs attribute (CVE-2024-26933)
  • kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)
  • kernel: netfilter: flowtable: incorrect pppoe tuple (CVE-2024-27015)
  • kernel: net/mlx5e: Prevent deadlock while disabling aRFS (CVE-2024-27014)
  • kernel: tun: limit printing rate when illegal packet received by tun dev (CVE-2024-27013)
  • kernel: netfilter: nf_tables: restore set elements when delete set fails (CVE-2024-27012)
  • kernel: netfilter: nf_tables: fix memleak in map from abort path (CVE-2024-27011)
  • kernel: net/sched: Fix mirred deadlock on device recursion (CVE-2024-27010)
  • kernel: clk: Get runtime PM before walking tree during disable_unused (CVE-2024-27004)
  • kernel: clk: Get runtime PM before walking tree for clk_summary (CVE-2024-27003)
  • kernel: KVM: x86/pmu: Disable support for adaptive PEBS (CVE-2024-26992)
  • kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status (CVE-2024-26990)
  • kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() (CVE-2024-26989)
  • kernel: init/main.c: Fix potential static_command_line memory overflow (CVE-2024-26988)
  • kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled (CVE-2024-26987)
  • kernel: nouveau: fix instmem race condition around ptr stores (CVE-2024-26984)
  • kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)
  • kernel: powercap: intel_rapl: Fix a NULL pointer dereference (CVE-2024-26975)
  • kernel: fat: fix uninitialized field in nostale filehandles (CVE-2024-26973)
  • kernel: nouveau: lock the client object tree. (CVE-2024-27062)
  • kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend (CVE-2024-27057)
  • kernel: wifi: brcm80211: handle pmk_op allocation failure (CVE-2024-27048)
  • kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (CVE-2024-27042)
  • kernel: clk: Fix clk_core_get NULL dereference (CVE-2024-27038)
  • kernel: nbd: null check for nla_nest_start (CVE-2024-27025)
  • kernel: md: Fix missing release of 'active_io' for flush (CVE-2024-27023)
  • kernel: iommu/vt-d: Fix NULL domain on device release (CVE-2024-27079)
  • kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node (CVE-2023-52650)
  • kernel: drm/vkms: Avoid reading beyond LUT array (CVE-2023-52649)
  • kernel: pstore: inode: Only d_invalidate() is needed (CVE-2024-27389)
  • kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() (CVE-2022-48669)
  • kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state (CVE-2023-52648)
  • kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes() (CVE-2022-48672)
  • kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR (CVE-2022-48703)
  • kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit (CVE-2024-27395)
  • kernel: io_uring: drop any code related to SCM_RIGHTS (CVE-2023-52656)
  • kernel: dm-raid: really frozen sync_thread during suspend (CVE-2024-35794)
  • kernel: md/md-bitmap: fix incorrect usage for sb_index (CVE-2024-35787)
  • kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program (CVE-2024-27431)
  • kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (CVE-2024-27414)
  • kernel: wifi: nl80211: reject iftype change with mesh ID change (CVE-2024-27410)
  • kernel: mptcp: fix data races on remote_id (CVE-2024-27404)
  • kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. (CVE-2024-27436)
  • kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (CVE-2023-52659)
  • kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs (CVE-2024-35795)
  • kernel: wifi: mac80211: fix potential sta-link leak (CVE-2024-35838)
  • kernel: net/mlx5e: fix a double-free in arfs_create_groups (CVE-2024-35835)
  • kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails (CVE-2024-35831)
  • kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (CVE-2024-35827)
  • kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume (CVE-2024-35824)
  • kernel: usb: udc: remove warning when queue disabled ep (CVE-2024-35822)
  • kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (CVE-2024-35817)
  • kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling (CVE-2024-35814)
  • kernel: usb: cdc-wdm: close race between read and workqueue (CVE-2024-35812)
  • kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory (CVE-2024-35810)
  • kernel: PCI/PM: Drain runtime-idle callbacks before driver removal (CVE-2024-35809)
  • kernel: md/dm-raid: don't call md_reap_sync_thread() directly (CVE-2024-35808)
  • kernel: ext4: fix corruption during on-line resize (CVE-2024-35807)
  • kernel: dm snapshot: fix lockup in dm_exception_table_exit (CVE-2024-35805)
  • kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)
  • kernel: block: fix module reference leakage from bdev_open_by_dev error path (CVE-2024-35859)
  • kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update (CVE-2024-35855)
  • kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash (CVE-2024-35854)
  • kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (CVE-2024-35853)
  • kernel: irqchip/gic-v3-its: Prevent double free on error (CVE-2024-35847)
  • kernel: iommu/vt-d: Use device rbtree in iopf reporting path (CVE-2024-35843)
  • kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect() (CVE-2024-35840)
  • kernel: calipso: fix memory leak in netlbl_calipso_add_pass() (CVE-2023-52698)
  • kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL (CVE-2023-52697)
  • kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init() (CVE-2023-52696)
  • kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one() (CVE-2023-52690)
  • kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels (CVE-2023-52689)
  • kernel: powerpc/powernv: Add a null pointer check in opal_event_init() (CVE-2023-52686)
  • kernel: ACPI: LPIT: Avoid u32 multiplication overflow (CVE-2023-52683)
  • kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get() (CVE-2023-52680)
  • kernel: of: Fix double free in of_parse_phandle_with_args_map (CVE-2023-52679)
  • kernel: bpf: Guard stack limits against 32bit overflow (CVE-2023-52676)
  • kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put() (CVE-2023-52674)
  • kernel: net: atlantic: eliminate double free in error handling logic (CVE-2023-52664)
  • kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe() (CVE-2023-52663)
  • kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (CVE-2023-52662)
  • kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (CVE-2023-52661)
  • kernel: dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
  • kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() (CVE-2024-35928)
  • kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (CVE-2024-35930)
  • kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery (CVE-2024-35931)
  • kernel: drm: Check output polling initialized before disabling (CVE-2024-35927)
  • kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF (CVE-2024-35913)
  • kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks (CVE-2024-35912)
  • kernel: tls: get psock ref after taking rxlock to avoid leak (CVE-2024-35908)
  • kernel: bpf: Protect against int overflow for stack access size (CVE-2024-35905)
  • kernel: selinux: avoid dereference of garbage after mount failure (CVE-2024-35904)
  • kernel: netfilter: nf_tables: reject new basechain after table flag update (CVE-2024-35900)
  • kernel: mptcp: prevent BPF accessing lowat from a subflow socket. (CVE-2024-35894)
  • kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() (CVE-2024-35892)
  • kernel: erspan: make sure erspan_base_hdr is present in skb->head (CVE-2024-35888)
  • kernel: ipv6: Fix infinite recursion in fib6_dump_done(). (CVE-2024-35886)
  • kernel: io_uring/kbuf: hold io_buffer_list reference over mmap (CVE-2024-35880)
  • kernel: of: module: prevent NULL pointer dereference in vsnprintf() (CVE-2024-35878)
  • kernel: x86/mm/pat: fix VM_PAT handling in COW mappings (CVE-2024-35877)
  • kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (CVE-2024-35876)
  • kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios (CVE-2024-35872)
  • kernel: smb: client: guarantee refcounted children from parent session (CVE-2024-35869)
  • kernel: block: prevent division by zero in blk_rq_stat_sum() (CVE-2024-35925)
  • kernel: smb: client: fix potential UAF in cifs_stats_proc_show() (CVE-2024-35867)
  • kernel: usb: typec: ucsi: Limit read size on v1.2 (CVE-2024-35924)
  • kernel: smb: client: fix potential UAF in cifs_dump_full_key() (CVE-2024-35866)
  • kernel: io_uring: clear opcode specific data for an early failure (CVE-2024-35923)
  • kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() (CVE-2024-35865)
  • kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() (CVE-2024-35864)
  • kernel: smb: client: fix potential UAF in is_valid_oplock_break() (CVE-2024-35863)
  • kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() (CVE-2024-35862)
  • kernel: randomize_kstack: Improve entropy diffusion (CVE-2024-35918)
  • kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() (CVE-2024-35861)
  • kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() (CVE-2024-35944)
  • kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain (CVE-2024-35942)
  • kernel: dma-direct: Leak pages on dma_set_decrypted() failure (CVE-2024-35939)
  • kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB (CVE-2024-35938)
  • kernel: wifi: rtw89: fix null pointer access when abort scan (CVE-2024-35946)
  • kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue (CVE-2024-35991)
  • kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS (CVE-2024-35983)
  • kernel: raid1: fix use-after-free for original bio in raid1_write_request() (CVE-2024-35979)
  • kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (CVE-2024-35976)
  • kernel: geneve: fix header validation in geneve[6]_xmit_skb (CVE-2024-35973)
  • kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow (CVE-2024-35959)
  • kernel: iommu/vt-d: Fix WARN_ON in iommu probe path (CVE-2024-35957)
  • kernel: scsi: sg: Avoid sg device teardown race (CVE-2024-35954)
  • kernel: drm/ast: Fix soft lockup (CVE-2024-35952)
  • kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex (CVE-2024-35950)
  • kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage (CVE-2024-36006)
  • kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses (CVE-2024-35995)
  • kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI (CVE-2021-47429)
  • kernel: powerpc/64s: fix program check interrupt emergency stack path (CVE-2021-47428)
  • kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47386)
  • kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field (CVE-2021-47384)
  • kernel: lib/generic-radix-tree.c: Don't overflow in peek() (CVE-2021-47432)
  • kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path (CVE-2023-52703)
  • kernel: pstore/platform: Add check for kstrdup (CVE-2023-52869)
  • kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size (CVE-2023-52762)
  • kernel: nbd: fix uaf in nbd_open (CVE-2023-52837)
  • kernel: mmc: sdio: fix possible resource leaks in some error paths (CVE-2023-52730)
  • kernel: smb: client: fix potential deadlock when releasing mids (CVE-2023-52757)
  • kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (CVE-2023-52819)
  • kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls (CVE-2023-52788)
  • kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET (CVE-2023-52813)
  • kernel: drm/amdgpu: Fix potential null pointer derefernce (CVE-2023-52814)
  • kernel: drm/radeon: possible buffer overflow (CVE-2023-52867)
  • kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (CVE-2023-52817)
  • kernel: spi: Fix null dereference on suspend (CVE-2023-52749)
  • kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds (CVE-2023-52878)
  • kernel: net/smc: avoid data corruption caused by decline (CVE-2023-52775)
  • kernel: cpu/hotplug: Don't offline the last non-isolated CPU (CVE-2023-52831)
  • kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (CVE-2023-52740)
  • kernel: pwm: Fix double shift bug (CVE-2023-52756)
  • kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (CVE-2023-52811)
  • kernel: atl1c: Work around the DMA RX overflow issue (CVE-2023-52834)
  • kernel: perf: hisi: Fix use-after-free when register pmu fails (CVE-2023-52859)
  • kernel: i2c: dev: copy userspace array safely (CVE-2023-52758)
  • kernel: smb: client: fix use-after-free in smb2_query_info_compound() (CVE-2023-52751)
  • kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (CVE-2023-52840)
  • kernel: Bluetooth: btusb: Add date->evt_skb is NULL check (CVE-2023-52833)
  • kernel: i2c: core: Run atomic i2c xfer when !preemptible (CVE-2023-52791)
  • kernel: bonding: stop the device in bond_setup_by_slave() (CVE-2023-52784)
  • kernel: fbdev: Fix invalid page access after closing deferred I/O devices (CVE-2023-52731)
  • kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() (CVE-2021-47457)
  • kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline (CVE-2021-47454)
  • kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells (CVE-2021-47497)
  • kernel: usbnet: sanity check for maxpacket (CVE-2021-47495)
  • kernel: igb: Fix string truncation warnings in igb_set_fw_version (CVE-2024-36010)
  • kernel: aio: fix use-after-free due to missing POLLFREE handling (CVE-2021-47505)
  • kernel: ppdev: Add an error check in register_device (CVE-2024-36015)
  • kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor() (CVE-2024-36885)
  • kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() (CVE-2024-36884)
  • kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() (CVE-2024-36882)
  • kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones (CVE-2024-36881)
  • kernel: octeontx2-af: fix the double free in rvu_npc_freemem() (CVE-2024-36030)
  • kernel: keys: Fix overwrite of key expiration on instantiation (CVE-2024-36031)
  • kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() (CVE-2024-36028)
  • kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload (CVE-2024-36022)
  • kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (CVE-2024-36945)
  • kernel: Reapply "drm/qxl: simplify qxl_fence_wait" (CVE-2024-36944)
  • kernel: pinctrl: core: delete incorrect free in pinctrl_enable() (CVE-2024-36940)
  • kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). (CVE-2024-36933)
  • kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal (CVE-2024-36932)
  • kernel: spi: fix null pointer dereference within spi_sync (CVE-2024-36930)
  • kernel: ipv4: Fix uninit-value access in __ip_make_skb() (CVE-2024-36927)
  • kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE (CVE-2024-36926)
  • kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING (CVE-2024-36920)
  • kernel: block: fix overflow in blk_ioctl_discard() (CVE-2024-36917)
  • kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (CVE-2024-36905)
  • kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (CVE-2024-36902)
  • kernel: USB: core: Fix access violation during port device removal (CVE-2024-36896)
  • kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference (CVE-2024-36891)
  • kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal (CVE-2024-36956)
  • kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (CVE-2024-36955)
  • kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). (CVE-2024-36939)
  • kernel: ipv6: prevent NULL dereference in ip6_output() (CVE-2024-36901)
  • kernel: thermal/debugfs: Fix two locking issues with thermal zone debug (CVE-2024-36961)
  • kernel: drm/vmwgfx: Fix invalid reads in fence signaled events (CVE-2024-36960)
  • kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() (CVE-2024-36967)
  • kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command (CVE-2024-36977)
  • kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (CVE-2024-36974)
  • kernel: ALSA: timer: Set lower bound of start tick time (CVE-2024-38618)
  • kernel: ALSA: core: Fix NULL module pointer assignment at card init (CVE-2024-38605)
  • kernel: block: refine the EOF check in blkdev_iomap_begin (CVE-2024-38604)
  • kernel: ALSA: Fix deadlocks with kctl removals at disconnection (CVE-2024-38600)
  • kernel: md: fix resync softlockup when bitmap size is less than array size (CVE-2024-38598)
  • kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (CVE-2024-38596)
  • kernel: drm/amdgpu/mes: fix use-after-free issue (CVE-2024-38581)
  • kernel: net/mlx5: Discard command completions in internal error (CVE-2024-38555)
  • kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (CVE-2024-36477)
  • kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (CVE-2024-38388)
  • kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (CVE-2024-31076)
  • kernel: soundwire: cadence: fix invalid PDI offset (CVE-2024-38635)
  • kernel: vfio/pci: fix potential memory leak in vfio_intx_enable() (CVE-2024-38632)
  • kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida (CVE-2024-38629)
  • kernel: stm class: Fix a double free in stm_register_device() (CVE-2024-38627)
  • kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() (CVE-2024-39291)
  • kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages (CVE-2024-39298)
  • kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (CVE-2024-39276)
  • kernel: drm/amdgpu: add error handle to avoid out-of-bounds (CVE-2024-39471)
  • kernel: drm/i915/hwmon: Get rid of devm (CVE-2024-39479)
  • kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension (CVE-2024-39473)
  • kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL (CVE-2024-39474)
  • kernel: efi/unaccepted: touch soft lockup during memory accept (CVE-2024-36936)
  • kernel: drm/drm_file: Fix pid refcounting race (CVE-2024-39486)
  • kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (CVE-2024-39488)
  • kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance (CVE-2024-39491)
  • kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (CVE-2024-39497)
  • kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 (CVE-2024-39498)
  • kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() (CVE-2024-39499)
  • kernel: drivers: core: synchronize really_probe() and dev_uevent() (CVE-2024-39501)
  • kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type (CVE-2024-39503)
  • kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags (CVE-2024-39508)
  • kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (CVE-2024-40903)
  • kernel: net/mlx5: Always stop health timer during driver removal (CVE-2024-40906)
  • kernel: ionic: fix kernel panic in XDP_TX action (CVE-2024-40907)
  • kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds (CVE-2024-40913)
  • kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (CVE-2024-40919)
  • kernel: io_uring/rsrc: don't lock while !TASK_RUNNING (CVE-2024-40922)
  • kernel: vmxnet3: disable rx data ring on dma allocation failure (CVE-2024-40923)
  • kernel: drm/i915/dpt: Make DPT object unshrinkable (CVE-2024-40924)
  • kernel: block: fix request.queuelist usage in flush (CVE-2024-40925)
  • kernel: wifi: cfg80211: validate HE operation element parsing (CVE-2024-40930)
  • kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (CVE-2024-40940)
  • kernel: iommu: Return right value in iommu_sva_bind_device() (CVE-2024-40945)
  • kernel: mm/page_table_check: fix crash on ZONE_DEVICE (CVE-2024-40948)
  • kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer (CVE-2024-40965)
  • kernel: tty: add the option to have a tty reject a new ldisc (CVE-2024-40966)
  • kernel: serial: imx: Introduce timeout when waiting on transmitter empty (CVE-2024-40967)
  • kernel: drm/radeon: fix UBSAN warning in kv_dpm.c (CVE-2024-40988)
  • kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown (CVE-2024-40989)
  • kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (CVE-2024-40997)
  • kernel: io_uring/sqpoll: work around a potential audit memory leak (CVE-2024-41001)
  • kernel: net: hns3: fix kernel crash problem in concurrent scenario (CVE-2024-39507)
  • kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (CVE-2024-40901)
  • kernel: tcp: avoid too many retransmit packets (CVE-2024-41007)
  • kernel: drm/amdgpu: change vm->task_info handling (CVE-2024-41008)
  • kernel: vt_ioctl: fix array_index_nospec in vt_setactivate (CVE-2022-48804)
  • kernel: bluetooth: race condition in sniff_{min,max}_interval_set() (CVE-2024-24859)
  • kernel: filelock: Remove locks reliably when fcntl/close race is detected (CVE-2024-41012)
  • kernel: filelock: Fix fcntl/close race recovery compat path (CVE-2024-41020)
  • kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask (CVE-2024-41032)
  • kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (CVE-2024-41038)
  • kernel: firmware: cs_dsp: Fix overflow checking of wmfw header (CVE-2024-41039)
  • kernel: netfilter: nf_tables: prefer nft_chain_validate (CVE-2024-41042)
  • kernel: filelock: fix potential use-after-free in posix_lock_inode (CVE-2024-41049)
  • kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (CVE-2024-41056)
  • kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (CVE-2024-41057)
  • kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (CVE-2024-41058)
  • kernel: drm/radeon: check bo_va->bo is non-NULL before using it (CVE-2024-41060)
  • kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (CVE-2024-41063)
  • kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace (CVE-2024-41065)
  • kernel: null_blk: fix validation of block size (CVE-2024-41077)
  • kernel: nvmet: always initialize cqe.result (CVE-2024-41079)
  • kernel: nvme-fabrics: use reserved tag for reg read/write command (CVE-2024-41082)
  • kernel: cxl/region: Avoid null pointer dereference in region lookup (CVE-2024-41084)
  • kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling (CVE-2024-41085)
  • kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (CVE-2024-41089)
  • kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers (CVE-2024-41092)
  • kernel: drm/amdgpu: avoid using null object of framebuffer (CVE-2024-41093)
  • kernel: drm/fbdev-dma: Only set smem_start is enable per module option (CVE-2024-41094)
  • kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (CVE-2024-41095)
  • kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (CVE-2024-42070)
  • kernel: nfsd: initialise nfsd_info.mutex early. (CVE-2024-42078)
  • kernel: ftruncate: pass a signed offset (CVE-2024-42084)
  • kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (CVE-2024-42090)
  • kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (CVE-2024-42101)
  • kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (CVE-2024-42114)
  • kernel: drm/amdgpu: fix double free err_addr pointer warnings (CVE-2024-42123)
  • kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible (CVE-2024-42124)
  • kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband (CVE-2024-42125)
  • kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX (CVE-2024-42132)
  • kernel: Bluetooth: ISO: Check socket flag instead of hcon (CVE-2024-42141)
  • kernel: tcp_metrics: validate source addr length (CVE-2024-42154)
  • kernel: scsi: mpi3mr: Sanitise num_phys (CVE-2024-42159)
  • kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB (CVE-2024-42226)
  • kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (CVE-2024-42228)
  • kernel: firmware: cs_dsp: Validate payload length before processing block (CVE-2024-42237)
  • kernel: firmware: cs_dsp: Return error if block header overflows file (CVE-2024-42238)
  • kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation (CVE-2024-42240)
  • kernel: Revert "sched/fair: Make sure to try to detach at least one movable task" (CVE-2024-42245)
  • kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines (CVE-2024-42258)
  • kernel: net/mlx5: Fix missing lock on sync reset reload (CVE-2024-42268)
  • kernel: net/iucv: fix use after free in iucv_sock_close() (CVE-2024-42271)
  • kernel: nvme-pci: add missing condition check for existence of mapped data (CVE-2024-42276)
  • kernel: dev/parport: fix the array out-of-bounds risk (CVE-2024-42301)
  • kernel: net: missing check virtio (CVE-2024-43817)
  • kernel: nfs: pass explicit offset/count to trace events (CVE-2024-43826)
  • kernel: leds: trigger: Unregister sysfs attributes before calling deactivate() (CVE-2024-43830)
  • kernel: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (CVE-2024-43842)
  • kernel: dma: fix call order in dmam_free_coherent (CVE-2024-43856)
  • kernel: s390/fpu: Re-add exception handling in load_fpu_state() (CVE-2024-43865)
  • kernel: net/mlx5: Always drain health in shutdown callback (CVE-2024-43866)
  • kernel: perf: Fix event leak upon exec and file release (CVE-2024-43869)
  • kernel: perf: Fix event leak upon exit (CVE-2024-43870)
  • kernel: wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (CVE-2024-43879)
  • kernel: nommu: fix memory leak in do_mmap() error path (CVE-2023-52902)
  • kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. (CVE-2022-48929)
  • kernel: mm: list_lru: fix UAF for memory cgroup (CVE-2024-43888)
  • kernel: memcg: protect concurrent access to mem_cgroup_idr (CVE-2024-43892)
  • kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session (CVE-2024-43911)
  • kernel: fuse: Initialize beyond-EOF page contents before setting uptodate (CVE-2024-44947)
  • kernel: usb: gadget: core: Check for unset descriptor (CVE-2024-44960)
  • kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption (CVE-2024-44965)
  • kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (CVE-2024-44970)
  • kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT (CVE-2024-44984)
  • kernel: KVM: s390: fix validity interception issue when gisa is switched off (CVE-2024-45005)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390x

Fixes

  • BZ - 1832397 - CVE-2020-10135 kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS)
  • BZ - 2257406 - CVE-2024-0340 kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()
  • BZ - 2260038 - CVE-2024-23848 kernel: use-after-free in cec_queue_msg_fh
  • BZ - 2262241 - CVE-2024-1151 kernel: stack overflow problem in Open vSwitch kernel module leading to DoS
  • BZ - 2263879 - CVE-2024-25739 kernel: crash due to a missing check for leb_size
  • BZ - 2265648 - CVE-2024-26591 kernel: bpf: Fix re-attachment branch in bpf_tracing_prog_attach
  • BZ - 2265650 - CVE-2023-52451 kernel: powerpc: Fix access beyond end of drmem array
  • BZ - 2265654 - CVE-2023-52445 kernel: pvrusb2: fix use after free on context disconnection
  • BZ - 2265657 - CVE-2024-26589 kernel: bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS
  • BZ - 2265793 - CVE-2023-52455 kernel: iommu: Don't reserve 0-length IOVA region
  • BZ - 2265798 - CVE-2023-52462 kernel: bpf: fix check for attempt to corrupt spilled pointer
  • BZ - 2265800 - CVE-2023-52464 kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c
  • BZ - 2265831 - CVE-2024-26605 kernel: PCI/ASPM: Fix deadlock when enabling ASPM
  • BZ - 2265833 - CVE-2024-26603 kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever
  • BZ - 2265836 - CVE-2024-26601 kernel: ext4: regenerate buddy after block freeing failed if under fc replay
  • BZ - 2266210 - CVE-2023-52466 kernel: out-of-bounds read in pci_dev_for_each_resource()
  • BZ - 2266212 - CVE-2023-52467 kernel:null pointer dereference in of_syscon_register()
  • BZ - 2266247 - CVE-2024-24857 kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set()
  • BZ - 2266249 - CVE-2024-24858 kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function
  • BZ - 2266296 - CVE-2019-25162 kernel: use after free in i2c
  • BZ - 2266363 - CVE-2023-52473 kernel: NULL pointer dereference in zone registration error path
  • BZ - 2266916 - CVE-2023-52475 kernel: use-after-free in powermate_config_complete
  • BZ - 2267028 - CVE-2023-52482 kernel: x86/srso: Add SRSO mitigation for Hygon processors
  • BZ - 2267038 - CVE-2023-52477 kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors
  • BZ - 2267701 - CVE-2024-22099 kernel: NULL Pointer dereference bluetooth allows Overflow Buffers
  • BZ - 2267705 - CVE-2024-23307 kernel: Integer Overflow in raid5_cache_count
  • BZ - 2267724 - CVE-2023-52565 kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()
  • BZ - 2267730 - CVE-2023-52560 kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions()
  • BZ - 2267782 - CVE-2023-52501 kernel: ring-buffer: Do not attempt to read past "commit"
  • BZ - 2267789 - CVE-2023-52528 kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg
  • BZ - 2267797 - CVE-2023-52520 kernel: platform/x86: think-lmi: Fix reference leak
  • BZ - 2267804 - CVE-2023-52513 kernel: RDMA/siw: Fix connection failure handling
  • BZ - 2267916 - CVE-2021-47101 kernel: asix: fix uninit-value in asix_mdio_read()
  • BZ - 2267920 - CVE-2021-47098 kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
  • BZ - 2268293 - CVE-2023-52606 kernel: powerpc/lib: Validate size for vector operations
  • BZ - 2268315 - CVE-2023-52595 kernel: wifi: rt2x00: restart beacon queue when hardware reset
  • BZ - 2268317 - CVE-2023-52594 kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()
  • BZ - 2268335 - CVE-2023-52585 kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
  • BZ - 2269063 - CVE-2023-52498 kernel: PM: sleep: Fix possible deadlocks in core system-wide PM code
  • BZ - 2269183 - CVE-2023-52492 kernel: dmaengine: fix NULL pointer in channel unregistration function
  • BZ - 2269192 - CVE-2024-26618 hw: arm64/sme: Always exit sme_alloc() early with existing storage
  • BZ - 2269201 - CVE-2024-26612 kernel: netfs, fscache: Prevent Oops in fscache_put_cache()
  • BZ - 2269203 - CVE-2024-26611 kernel: xsk: fix usage of multi-buffer BPF helpers for ZC XDP
  • BZ - 2269211 - CVE-2024-26614 kernel: tcp: make sure init the accept_queue's spinlocks once
  • BZ - 2270071 - CVE-2023-52614 kernel: PM / devfreq: Fix buffer overflow in trans_stat_show
  • BZ - 2270084 - CVE-2023-52619 kernel: pstore/ram: Fix crash when setting number of cpus to an odd number
  • BZ - 2270093 - CVE-2023-52615 kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng
  • BZ - 2270097 - CVE-2024-26641 kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()
  • BZ - 2270103 - CVE-2024-26638 kernel: nbd: always initialize struct msghdr completely
  • BZ - 2270133 - CVE-2024-26631 kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
  • BZ - 2271648 - CVE-2024-26645 kernel: tracing: Ensure visibility when inserting an element into tracing_map
  • BZ - 2271682 - CVE-2023-52625 kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface
  • BZ - 2271684 - CVE-2023-52624 kernel: drm/amd/display: Wake DMCUB before executing GPINT commands
  • BZ - 2271688 - CVE-2023-52622 kernel: ext4: avoid online resizing failures due to oversized flex bg
  • BZ - 2271690 - CVE-2023-52621 kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
  • BZ - 2271788 - CVE-2024-26646 kernel: thermal: intel: hfi: Add syscore callbacks for system-wide PM
  • BZ - 2271795 - CVE-2024-26650 kernel: p2sb_bar() calls during PCI device probe
  • BZ - 2272692 - CVE-2024-26656 kernel: drm/amdgpu: use-after-free vulnerability
  • BZ - 2272782 - CVE-2024-26660 kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301
  • BZ - 2272784 - CVE-2024-26661 kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
  • BZ - 2272786 - CVE-2024-26662 kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()'
  • BZ - 2272788 - CVE-2024-26663 kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()
  • BZ - 2272791 - CVE-2024-26664 kernel: hwmon: (coretemp) Fix out-of-bounds memory access
  • BZ - 2272795 - CVE-2024-26669 kernel: net/sched: flower: Fix chain template offload
  • BZ - 2272800 - CVE-2024-26670 kernel: arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD
  • BZ - 2272804 - CVE-2023-52632 kernel: drm/amdkfd: lock dependency warning with srcu
  • BZ - 2272806 - CVE-2023-52634 kernel: drm/amd/display: Fix disable_otg_wa logic
  • BZ - 2272808 - CVE-2023-52635 kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop]
  • BZ - 2272814 - CVE-2024-26672 kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'
  • BZ - 2272818 - CVE-2024-26674 kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups
  • BZ - 2272829 - CVE-2024-26675 kernel: ppp_async: limit MRU to 64K
  • BZ - 2272836 - CVE-2024-26678 kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section
  • BZ - 2272839 - CVE-2024-26679 kernel: inet: read sk->sk_family once in inet_recv_error()
  • BZ - 2272842 - CVE-2024-26680 kernel: net: atlantic: Fix DMA mapping for PTP hwts ring
  • BZ - 2273085 - CVE-2023-52637 kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)
  • BZ - 2273098 - CVE-2024-26691 kernel: KVM: arm64: Fix circular locking dependency
  • BZ - 2273109 - CVE-2024-26686 kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats
  • BZ - 2273113 - CVE-2024-26700 kernel: drm/amd/display: Fix MST Null Ptr for RV
  • BZ - 2273130 - CVE-2024-26725 kernel: dpll: fix possible deadlock during netlink dump operation
  • BZ - 2273143 - CVE-2024-26719 kernel: nouveau: offload fence uevents work to workqueue
  • BZ - 2273148 - CVE-2024-26717 kernel: HID: i2c-hid-of: fix NULL-deref on failed power up
  • BZ - 2273158 - CVE-2024-26712 kernel: powerpc/kasan: Fix addr error caused by page alignment
  • BZ - 2273166 - CVE-2024-26708 kernel: mptcp: really cope with fastopen race
  • BZ - 2273168 - CVE-2024-26707 kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()
  • BZ - 2273174 - CVE-2024-26704 kernel: ext4: fix double-free of blocks due to wrong extents moved_len
  • BZ - 2273185 - CVE-2024-26767 kernel: drm/amd/display: fixed integer types and null check locations
  • BZ - 2273200 - CVE-2024-26761 kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window
  • BZ - 2273204 - CVE-2024-26759 kernel: mm/swap: fix race when skipping swapcache
  • BZ - 2273206 - CVE-2024-26758 kernel: md: Don't ignore suspended array in md_check_recovery()
  • BZ - 2273208 - CVE-2024-26757 kernel: md: Don't ignore read-only array in md_check_recovery()
  • BZ - 2273234 - CVE-2024-26774 kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt
  • BZ - 2273242 - CVE-2024-26772 kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
  • BZ - 2273247 - CVE-2024-26733 kernel: arp: Prevent overflow in arp_req_get().
  • BZ - 2273260 - CVE-2024-26744 kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter
  • BZ - 2273262 - CVE-2024-26743 kernel: RDMA/qedr: Fix qedr_create_user_qp error flow
  • BZ - 2273268 - CVE-2024-26740 kernel: net/sched: act_mirred: use the backlog for mirred ingress
  • BZ - 2273408 - CVE-2024-26746 kernel: dmaengine: idxd: Ensure safe user copy of completion record
  • BZ - 2273425 - CVE-2024-26803 kernel: net: veth: clear GRO when clearing XDP even when down
  • BZ - 2273459 - CVE-2024-26786 kernel: iommufd: Fix iopt_access_list_id overwrite bug
  • BZ - 2273461 - CVE-2024-26785 kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova
  • BZ - 2273468 - CVE-2024-26782 kernel: mptcp: fix double-free on socket dismantle
  • BZ - 2273650 - CVE-2024-26812 kernel: vfio/pci: Create persistent INTx handler
  • BZ - 2273657 - CVE-2024-27437 kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ
  • BZ - 2274478 - CVE-2024-26815 kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check
  • BZ - 2274624 - CVE-2021-47185 kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
  • BZ - 2275558 - CVE-2024-26846 kernel: nvme-fc: do not wait in vain when unloading module
  • BZ - 2275565 - CVE-2024-26843 kernel: efi: runtime: Fix potential overflow of soft-reserved region size
  • BZ - 2275573 - CVE-2024-26840 kernel: cachefiles: fix memory leak in cachefiles_add_cache()
  • BZ - 2275578 - CVE-2024-26838 kernel: RDMA/irdma: Fix KASAN issue with tasklet
  • BZ - 2275580 - CVE-2024-26837 kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload
  • BZ - 2275584 - CVE-2024-26835 kernel: netfilter: nf_tables: set dormant flag on hook register failure
  • BZ - 2275624 - CVE-2023-52643 kernel: iio: core: fix memleak in iio_device_register_sysfs
  • BZ - 2275633 - CVE-2024-26907 kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment
  • BZ - 2275635 - CVE-2024-26906 kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
  • BZ - 2275641 - CVE-2024-26903 kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
  • BZ - 2275645 - CVE-2024-26901 kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
  • BZ - 2275647 - CVE-2024-26900 kernel: md: fix kmemleak of rdev->serial
  • BZ - 2275650 - CVE-2024-26899 kernel: block: fix deadlock between bd_link_disk_holder and partition scan
  • BZ - 2275661 - CVE-2024-26894 kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()
  • BZ - 2275666 - CVE-2024-26892 kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq()
  • BZ - 2275670 - CVE-2024-26890 kernel: Bluetooth: btrtl: fix out of bounds memory access
  • BZ - 2275672 - CVE-2024-26889 kernel: Bluetooth: hci_core: Fix possible buffer overflow
  • BZ - 2275686 - CVE-2024-26882 kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()
  • BZ - 2275694 - CVE-2024-26878 kernel: quota: Fix potential NULL pointer dereference
  • BZ - 2275707 - CVE-2024-26872 kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup
  • BZ - 2275711 - CVE-2024-26870 kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102
  • BZ - 2275725 - CVE-2024-26863 kernel: hsr: Fix uninit-value access in hsr_get_node()
  • BZ - 2275727 - CVE-2024-26862 kernel: packet: annotate data-races around ignore_outgoing
  • BZ - 2275729 - CVE-2024-26861 kernel: wireguard: receive: annotate data-race around receiving_counter.counter
  • BZ - 2275737 - CVE-2024-26857 kernel: geneve: make sure to pull inner header in geneve_rx()
  • BZ - 2275775 - CVE-2024-26920 kernel: tracing/trigger: Fix to return error if failed to alloc snapshot
  • BZ - 2275790 - CVE-2024-26915 kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
  • BZ - 2275928 - CVE-2024-26921 kernel: inet: inet_defrag: prevent sk release while still in use
  • BZ - 2276665 - CVE-2024-26922 kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly
  • BZ - 2277168 - CVE-2024-26924 kernel: netfilter: nft_set_pipapo: do not free live element
  • BZ - 2277844 - CVE-2024-26927 kernel: ASoC: SOF: Add some bounds checking to firmware data
  • BZ - 2277937 - CVE-2024-26928 kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show()
  • BZ - 2278169 - CVE-2024-26964 kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma
  • BZ - 2278174 - CVE-2024-26962 kernel: dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape
  • BZ - 2278178 - CVE-2024-26960 kernel: mm: swap: fix race between free_swap_and_cache() and swapoff()
  • BZ - 2278182 - CVE-2024-26958 kernel: nfs: fix UAF in direct writes
  • BZ - 2278193 - CVE-2024-26953 kernel: net: esp: fix bad handling of pages from page_pool
  • BZ - 2278197 - CVE-2024-26951 kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list
  • BZ - 2278200 - CVE-2024-26950 kernel: wireguard: netlink: access device through ctx instead of peer
  • BZ - 2278218 - CVE-2024-26940 kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed
  • BZ - 2278220 - CVE-2024-26939 kernel: drm/i915/vma: Fix UAF on destroy against retire race
  • BZ - 2278229 - CVE-2024-26938 kernel: drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()
  • BZ - 2278231 - CVE-2024-26937 kernel: drm/i915/gt: Reset queue_priority_hint on parking
  • BZ - 2278237 - CVE-2024-26934 kernel: USB: core: Fix deadlock in usb_deauthorize_interface()
  • BZ - 2278240 - CVE-2024-26933 kernel: USB: core: Fix deadlock in port "disable" sysfs attribute
  • BZ - 2278262 - CVE-2024-27017 kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump
  • BZ - 2278266 - CVE-2024-27015 kernel: netfilter: flowtable: incorrect pppoe tuple
  • BZ - 2278268 - CVE-2024-27014 kernel: net/mlx5e: Prevent deadlock while disabling aRFS
  • BZ - 2278270 - CVE-2024-27013 kernel: tun: limit printing rate when illegal packet received by tun dev
  • BZ - 2278275 - CVE-2024-27012 kernel: netfilter: nf_tables: restore set elements when delete set fails
  • BZ - 2278277 - CVE-2024-27011 kernel: netfilter: nf_tables: fix memleak in map from abort path
  • BZ - 2278279 - CVE-2024-27010 kernel: net/sched: Fix mirred deadlock on device recursion
  • BZ - 2278291 - CVE-2024-27004 kernel: clk: Get runtime PM before walking tree during disable_unused
  • BZ - 2278293 - CVE-2024-27003 kernel: clk: Get runtime PM before walking tree for clk_summary
  • BZ - 2278316 - CVE-2024-26992 kernel: KVM: x86/pmu: Disable support for adaptive PEBS
  • BZ - 2278320 - CVE-2024-26990 kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status
  • BZ - 2278322 - CVE-2024-26989 kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save()
  • BZ - 2278324 - CVE-2024-26988 kernel: init/main.c: Fix potential static_command_line memory overflow
  • BZ - 2278327 - CVE-2024-26987 kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled
  • BZ - 2278333 - CVE-2024-26984 kernel: nouveau: fix instmem race condition around ptr stores
  • BZ - 2278350 - CVE-2024-26976 kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed
  • BZ - 2278352 - CVE-2024-26975 kernel: powercap: intel_rapl: Fix a NULL pointer dereference
  • BZ - 2278356 - CVE-2024-26973 kernel: fat: fix uninitialized field in nostale filehandles
  • BZ - 2278387 - CVE-2024-27062 kernel: nouveau: lock the client object tree.
  • BZ - 2278406 - CVE-2024-27057 kernel: ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend
  • BZ - 2278431 - CVE-2024-27048 kernel: wifi: brcm80211: handle pmk_op allocation failure
  • BZ - 2278447 - CVE-2024-27042 kernel: drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'
  • BZ - 2278456 - CVE-2024-27038 kernel: clk: Fix clk_core_get NULL dereference
  • BZ - 2278484 - CVE-2024-27025 kernel: nbd: null check for nla_nest_start
  • BZ - 2278488 - CVE-2024-27023 kernel: md: Fix missing release of 'active_io' for flush
  • BZ - 2278492 - CVE-2024-27079 kernel: iommu/vt-d: Fix NULL domain on device release
  • BZ - 2278522 - CVE-2023-52650 kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node
  • BZ - 2278524 - CVE-2023-52649 kernel: drm/vkms: Avoid reading beyond LUT array
  • BZ - 2278532 - CVE-2024-27389 kernel: pstore: inode: Only d_invalidate() is needed
  • BZ - 2278537 - CVE-2022-48669 kernel: powerpc/pseries: Fix potential memleak in papr_get_attr()
  • BZ - 2278539 - CVE-2023-52648 kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state
  • BZ - 2278939 - CVE-2022-48672 kernel: of: fdt: fix off-by-one error in unflatten_dt_nodes()
  • BZ - 2278960 - CVE-2022-48703 kernel: thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR
  • BZ - 2280440 - CVE-2024-27395 kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit
  • BZ - 2280444 - CVE-2023-52656 kernel: io_uring: drop any code related to SCM_RIGHTS
  • BZ - 2281045 - CVE-2024-35794 kernel: dm-raid: really frozen sync_thread during suspend
  • BZ - 2281061 - CVE-2024-35787 kernel: md/md-bitmap: fix incorrect usage for sb_index
  • BZ - 2281069 - CVE-2024-27431 kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program
  • BZ - 2281103 - CVE-2024-27414 kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back
  • BZ - 2281113 - CVE-2024-27410 kernel: wifi: nl80211: reject iftype change with mesh ID change
  • BZ - 2281125 - CVE-2024-27404 kernel: mptcp: fix data races on remote_id
  • BZ - 2281141 - CVE-2024-27436 kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found.
  • BZ - 2281145 - CVE-2023-52659 kernel: x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type
  • BZ - 2281155 - CVE-2024-35795 kernel: drm/amdgpu: fix deadlock while reading mqd from debugfs
  • BZ - 2281157 - CVE-2024-35838 kernel: wifi: mac80211: fix potential sta-link leak
  • BZ - 2281165 - CVE-2024-35835 kernel: net/mlx5e: fix a double-free in arfs_create_groups
  • BZ - 2281173 - CVE-2024-35831 kernel: io_uring: Fix release of pinned pages when __io_uaddr_map fails
  • BZ - 2281183 - CVE-2024-35827 kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep()
  • BZ - 2281189 - CVE-2024-35824 kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume
  • BZ - 2281192 - CVE-2024-35822 kernel: usb: udc: remove warning when queue disabled ep
  • BZ - 2281202 - CVE-2024-35817 kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag
  • BZ - 2281207 - CVE-2024-35814 kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling
  • BZ - 2281211 - CVE-2024-35812 kernel: usb: cdc-wdm: close race between read and workqueue
  • BZ - 2281215 - CVE-2024-35810 kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory
  • BZ - 2281217 - CVE-2024-35809 kernel: PCI/PM: Drain runtime-idle callbacks before driver removal
  • BZ - 2281219 - CVE-2024-35808 kernel: md/dm-raid: don't call md_reap_sync_thread() directly
  • BZ - 2281221 - CVE-2024-35807 kernel: ext4: fix corruption during on-line resize
  • BZ - 2281225 - CVE-2024-35805 kernel: dm snapshot: fix lockup in dm_exception_table_exit
  • BZ - 2281235 - CVE-2024-35801 kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD
  • BZ - 2281243 - CVE-2024-35859 kernel: block: fix module reference leakage from bdev_open_by_dev error path
  • BZ - 2281251 - CVE-2024-35855 kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update
  • BZ - 2281253 - CVE-2024-35854 kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash
  • BZ - 2281255 - CVE-2024-35853 kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash
  • BZ - 2281268 - CVE-2024-35847 kernel: irqchip/gic-v3-its: Prevent double free on error
  • BZ - 2281276 - CVE-2024-35843 kernel: iommu/vt-d: Use device rbtree in iopf reporting path
  • BZ - 2281282 - CVE-2024-35840 kernel: mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()
  • BZ - 2281286 - CVE-2023-52698 kernel: calipso: fix memory leak in netlbl_calipso_add_pass()
  • BZ - 2281288 - CVE-2023-52697 kernel: ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx->headset_codec_dev = NULL
  • BZ - 2281290 - CVE-2023-52696 kernel: powerpc/powernv: Add a null pointer check in opal_powercap_init()
  • BZ - 2281303 - CVE-2023-52690 kernel: powerpc/powernv: Add a null pointer check to scom_debug_init_one()
  • BZ - 2281305 - CVE-2023-52689 kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels
  • BZ - 2281311 - CVE-2023-52686 kernel: powerpc/powernv: Add a null pointer check in opal_event_init()
  • BZ - 2281317 - CVE-2023-52683 kernel: ACPI: LPIT: Avoid u32 multiplication overflow
  • BZ - 2281324 - CVE-2023-52680 kernel: ALSA: scarlett2: Add missing error checks to *_ctl_get()
  • BZ - 2281326 - CVE-2023-52679 kernel: of: Fix double free in of_parse_phandle_with_args_map
  • BZ - 2281332 - CVE-2023-52676 kernel: bpf: Guard stack limits against 32bit overflow
  • BZ - 2281336 - CVE-2023-52674 kernel: ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()
  • BZ - 2281356 - CVE-2023-52664 kernel: net: atlantic: eliminate double free in error handling logic
  • BZ - 2281358 - CVE-2023-52663 kernel: ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe()
  • BZ - 2281360 - CVE-2023-52662 kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node
  • BZ - 2281362 - CVE-2023-52661 kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()
  • BZ - 2281510 - CVE-2024-35947 kernel: dyndbg: fix old BUG_ON in >control parser
  • BZ - 2281517 - CVE-2024-35928 kernel: drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()
  • BZ - 2281519 - CVE-2024-35930 kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()
  • BZ - 2281523 - CVE-2024-35931 kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery
  • BZ - 2281526 - CVE-2024-35927 kernel: drm: Check output polling initialized before disabling
  • BZ - 2281634 - CVE-2024-35913 kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF
  • BZ - 2281636 - CVE-2024-35912 kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks
  • BZ - 2281645 - CVE-2024-35908 kernel: tls: get psock ref after taking rxlock to avoid leak
  • BZ - 2281651 - CVE-2024-35905 kernel: bpf: Protect against int overflow for stack access size
  • BZ - 2281655 - CVE-2024-35904 kernel: selinux: avoid dereference of garbage after mount failure
  • BZ - 2281664 - CVE-2024-35900 kernel: netfilter: nf_tables: reject new basechain after table flag update
  • BZ - 2281679 - CVE-2024-35894 kernel: mptcp: prevent BPF accessing lowat from a subflow socket.
  • BZ - 2281684 - CVE-2024-35892 kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()
  • BZ - 2281693 - CVE-2024-35888 kernel: erspan: make sure erspan_base_hdr is present in skb->head
  • BZ - 2281697 - CVE-2024-35886 kernel: ipv6: Fix infinite recursion in fib6_dump_done().
  • BZ - 2281713 - CVE-2024-35880 kernel: io_uring/kbuf: hold io_buffer_list reference over mmap
  • BZ - 2281718 - CVE-2024-35878 kernel: of: module: prevent NULL pointer dereference in vsnprintf()
  • BZ - 2281720 - CVE-2024-35877 kernel: x86/mm/pat: fix VM_PAT handling in COW mappings
  • BZ - 2281725 - CVE-2024-35876 kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()
  • BZ - 2281736 - CVE-2024-35872 kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios
  • BZ - 2281742 - CVE-2024-35869 kernel: smb: client: guarantee refcounted children from parent session
  • BZ - 2281752 - CVE-2024-35925 kernel: block: prevent division by zero in blk_rq_stat_sum()
  • BZ - 2281754 - CVE-2024-35867 kernel: smb: client: fix potential UAF in cifs_stats_proc_show()
  • BZ - 2281758 - CVE-2024-35924 kernel: usb: typec: ucsi: Limit read size on v1.2
  • BZ - 2281760 - CVE-2024-35866 kernel: smb: client: fix potential UAF in cifs_dump_full_key()
  • BZ - 2281762 - CVE-2024-35923 kernel: io_uring: clear opcode specific data for an early failure
  • BZ - 2281763 - CVE-2024-35865 kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break()
  • BZ - 2281769 - CVE-2024-35864 kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break()
  • BZ - 2281773 - CVE-2024-35863 kernel: smb: client: fix potential UAF in is_valid_oplock_break()
  • BZ - 2281781 - CVE-2024-35862 kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted()
  • BZ - 2281783 - CVE-2024-35918 kernel: randomize_kstack: Improve entropy diffusion
  • BZ - 2281786 - CVE-2024-35861 kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()
  • BZ - 2281807 - CVE-2024-35944 kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()
  • BZ - 2281811 - CVE-2024-35942 kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain
  • BZ - 2281817 - CVE-2024-35939 kernel: dma-direct: Leak pages on dma_set_decrypted() failure
  • BZ - 2281819 - CVE-2024-35938 kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB
  • BZ - 2281833 - CVE-2024-35946 kernel: wifi: rtw89: fix null pointer access when abort scan
  • BZ - 2281843 - CVE-2024-35991 kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue
  • BZ - 2281863 - CVE-2024-35983 kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS
  • BZ - 2281872 - CVE-2024-35979 kernel: raid1: fix use-after-free for original bio in raid1_write_request()
  • BZ - 2281884 - CVE-2024-35976 kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING
  • BZ - 2281891 - CVE-2024-35973 kernel: geneve: fix header validation in geneve[6]_xmit_skb
  • BZ - 2281923 - CVE-2024-35959 kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow
  • BZ - 2281927 - CVE-2024-35957 kernel: iommu/vt-d: Fix WARN_ON in iommu probe path
  • BZ - 2281933 - CVE-2024-35954 kernel: scsi: sg: Avoid sg device teardown race
  • BZ - 2281938 - CVE-2024-35952 kernel: drm/ast: Fix soft lockup
  • BZ - 2281942 - CVE-2024-35950 kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex
  • BZ - 2281989 - CVE-2024-36006 kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage
  • BZ - 2282088 - CVE-2024-35995 kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses
  • BZ - 2282302 - CVE-2021-47429 kernel: powerpc/64s: Fix unrecoverable MCE calling async handler from NMI
  • BZ - 2282304 - CVE-2021-47428 kernel: powerpc/64s: fix program check interrupt emergency stack path
  • BZ - 2282354 - CVE-2021-47386 kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
  • BZ - 2282356 - CVE-2021-47384 kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
  • BZ - 2282366 - CVE-2021-47432 kernel: lib/generic-radix-tree.c: Don't overflow in peek()
  • BZ - 2282612 - CVE-2023-52703 kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path
  • BZ - 2282622 - CVE-2023-52869 kernel: pstore/platform: Add check for kstrdup
  • BZ - 2282623 - CVE-2023-52762 kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size
  • BZ - 2282637 - CVE-2023-52837 kernel: nbd: fix uaf in nbd_open
  • BZ - 2282640 - CVE-2023-52730 kernel: mmc: sdio: fix possible resource leaks in some error paths
  • BZ - 2282641 - CVE-2023-52757 kernel: smb: client: fix potential deadlock when releasing mids
  • BZ - 2282646 - CVE-2023-52819 kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
  • BZ - 2282652 - CVE-2023-52788 kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls
  • BZ - 2282653 - CVE-2023-52813 kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET
  • BZ - 2282655 - CVE-2023-52814 kernel: drm/amdgpu: Fix potential null pointer derefernce
  • BZ - 2282670 - CVE-2023-52867 kernel: drm/radeon: possible buffer overflow
  • BZ - 2282676 - CVE-2023-52817 kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
  • BZ - 2282679 - CVE-2023-52749 kernel: spi: Fix null dereference on suspend
  • BZ - 2282680 - CVE-2023-52878 kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds
  • BZ - 2282690 - CVE-2023-52775 kernel: net/smc: avoid data corruption caused by decline
  • BZ - 2282740 - CVE-2023-52831 kernel: cpu/hotplug: Don't offline the last non-isolated CPU
  • BZ - 2282741 - CVE-2023-52740 kernel: powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch
  • BZ - 2282742 - CVE-2023-52756 kernel: pwm: Fix double shift bug
  • BZ - 2282743 - CVE-2023-52811 kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool
  • BZ - 2282744 - CVE-2023-52834 kernel: atl1c: Work around the DMA RX overflow issue
  • BZ - 2282745 - CVE-2023-52859 kernel: perf: hisi: Fix use-after-free when register pmu fails
  • BZ - 2282746 - CVE-2023-52758 kernel: i2c: dev: copy userspace array safely
  • BZ - 2282748 - CVE-2023-52751 kernel: smb: client: fix use-after-free in smb2_query_info_compound()
  • BZ - 2282757 - CVE-2023-52840 kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()
  • BZ - 2282762 - CVE-2023-52833 kernel: Bluetooth: btusb: Add date->evt_skb is NULL check
  • BZ - 2282763 - CVE-2023-52791 kernel: i2c: core: Run atomic i2c xfer when !preemptible
  • BZ - 2282772 - CVE-2023-52784 kernel: bonding: stop the device in bond_setup_by_slave()
  • BZ - 2282787 - CVE-2023-52731 kernel: fbdev: Fix invalid page access after closing deferred I/O devices
  • BZ - 2282901 - CVE-2021-47457 kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
  • BZ - 2282904 - CVE-2021-47454 kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline
  • BZ - 2282918 - CVE-2021-47497 kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
  • BZ - 2282920 - CVE-2021-47495 kernel: usbnet: sanity check for maxpacket
  • BZ - 2282950 - CVE-2024-36010 kernel: igb: Fix string truncation warnings in igb_set_fw_version
  • BZ - 2283448 - CVE-2021-47505 kernel: aio: fix use-after-free due to missing POLLFREE handling
  • BZ - 2283786 - CVE-2024-36015 kernel: ppdev: Add an error check in register_device
  • BZ - 2284265 - CVE-2024-36885 kernel: drm/nouveau/firmware: Fix SG_DEBUG error with nvkm_firmware_ctor()
  • BZ - 2284269 - CVE-2024-36884 kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()
  • BZ - 2284273 - CVE-2024-36882 kernel: mm: use memalloc_nofs_save() in page_cache_ra_order()
  • BZ - 2284277 - CVE-2024-36881 kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones
  • BZ - 2284295 - CVE-2024-36030 kernel: octeontx2-af: fix the double free in rvu_npc_freemem()
  • BZ - 2284410 - CVE-2024-36031 kernel: keys: Fix overwrite of key expiration on instantiation
  • BZ - 2284413 - CVE-2024-36028 kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio()
  • BZ - 2284427 - CVE-2024-36022 kernel: drm/amdgpu: Init zone device and drm client after mode-1 reset on reload
  • BZ - 2284465 - CVE-2024-36945 kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route()
  • BZ - 2284468 - CVE-2024-36944 kernel: Reapply "drm/qxl: simplify qxl_fence_wait"
  • BZ - 2284477 - CVE-2024-36940 kernel: pinctrl: core: delete incorrect free in pinctrl_enable()
  • BZ - 2284488 - CVE-2024-36933 kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().
  • BZ - 2284490 - CVE-2024-36932 kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal
  • BZ - 2284494 - CVE-2024-36930 kernel: spi: fix null pointer dereference within spi_sync
  • BZ - 2284500 - CVE-2024-36927 kernel: ipv4: Fix uninit-value access in __ip_make_skb()
  • BZ - 2284502 - CVE-2024-36926 kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE
  • BZ - 2284515 - CVE-2024-36920 kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
  • BZ - 2284519 - CVE-2024-36917 kernel: block: fix overflow in blk_ioctl_discard()
  • BZ - 2284539 - CVE-2024-36905 kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets
  • BZ - 2284545 - CVE-2024-36902 kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()
  • BZ - 2284556 - CVE-2024-36896 kernel: USB: core: Fix access violation during port device removal
  • BZ - 2284567 - CVE-2024-36891 kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference
  • BZ - 2284583 - CVE-2024-36956 kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal
  • BZ - 2284586 - CVE-2024-36955 kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
  • BZ - 2284628 - CVE-2024-36939 kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init().
  • BZ - 2284634 - CVE-2024-36901 kernel: ipv6: prevent NULL dereference in ip6_output()
  • BZ - 2290407 - CVE-2024-36961 kernel: thermal/debugfs: Fix two locking issues with thermal zone debug
  • BZ - 2290408 - CVE-2024-36960 kernel: drm/vmwgfx: Fix invalid reads in fence signaled events
  • BZ - 2292329 - CVE-2024-36967 kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode()
  • BZ - 2293000 - CVE-2024-36977 kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command
  • BZ - 2293003 - CVE-2024-36974 kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
  • BZ - 2293329 - CVE-2024-38618 kernel: ALSA: timer: Set lower bound of start tick time
  • BZ - 2293359 - CVE-2024-38605 kernel: ALSA: core: Fix NULL module pointer assignment at card init
  • BZ - 2293361 - CVE-2024-38604 kernel: block: refine the EOF check in blkdev_iomap_begin
  • BZ - 2293365 - CVE-2024-38600 kernel: ALSA: Fix deadlocks with kctl removals at disconnection
  • BZ - 2293367 - CVE-2024-38598 kernel: md: fix resync softlockup when bitmap size is less than array size
  • BZ - 2293371 - CVE-2024-38596 kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
  • BZ - 2293408 - CVE-2024-38581 kernel: drm/amdgpu/mes: fix use-after-free issue
  • BZ - 2293444 - CVE-2024-38555 kernel: net/mlx5: Discard command completions in internal error
  • BZ - 2293639 - CVE-2024-36477 kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
  • BZ - 2293656 - CVE-2024-38388 kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup
  • BZ - 2293684 - CVE-2024-31076 kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline
  • BZ - 2293693 - CVE-2024-38635 kernel: soundwire: cadence: fix invalid PDI offset
  • BZ - 2293696 - CVE-2024-38632 kernel: vfio/pci: fix potential memory leak in vfio_intx_enable()
  • BZ - 2293698 - CVE-2024-38629 kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida
  • BZ - 2293700 - CVE-2024-38627 kernel: stm class: Fix a double free in stm_register_device()
  • BZ - 2294223 - CVE-2024-39291 kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()
  • BZ - 2294268 - CVE-2024-39298 kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages
  • BZ - 2294274 - CVE-2024-39276 kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()
  • BZ - 2294313 - CVE-2024-39471 kernel: drm/amdgpu: add error handle to avoid out-of-bounds
  • BZ - 2296059 - CVE-2024-39479 kernel: drm/i915/hwmon: Get rid of devm
  • BZ - 2296064 - CVE-2024-39473 kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension
  • BZ - 2296066 - CVE-2024-39474 kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL
  • BZ - 2296278 - CVE-2024-36936 kernel: efi/unaccepted: touch soft lockup during memory accept
  • BZ - 2296383 - CVE-2024-39486 kernel: drm/drm_file: Fix pid refcounting race
  • BZ - 2297057 - CVE-2024-39488 kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
  • BZ - 2297061 - CVE-2024-39491 kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance
  • BZ - 2297469 - CVE-2024-39497 kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)
  • BZ - 2297470 - CVE-2024-39498 kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2
  • BZ - 2297471 - CVE-2024-39499 kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver()
  • BZ - 2297473 - CVE-2024-39501 kernel: drivers: core: synchronize really_probe() and dev_uevent()
  • BZ - 2297475 - CVE-2024-39503 kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type
  • BZ - 2297480 - CVE-2024-39508 kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags
  • BZ - 2297487 - CVE-2024-40903 kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps
  • BZ - 2297490 - CVE-2024-40906 kernel: net/mlx5: Always stop health timer during driver removal
  • BZ - 2297491 - CVE-2024-40907 kernel: ionic: fix kernel panic in XDP_TX action
  • BZ - 2297497 - CVE-2024-40913 kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds
  • BZ - 2297503 - CVE-2024-40919 kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()
  • BZ - 2297506 - CVE-2024-40922 kernel: io_uring/rsrc: don't lock while !TASK_RUNNING
  • BZ - 2297507 - CVE-2024-40923 kernel: vmxnet3: disable rx data ring on dma allocation failure
  • BZ - 2297508 - CVE-2024-40924 kernel: drm/i915/dpt: Make DPT object unshrinkable
  • BZ - 2297509 - CVE-2024-40925 kernel: block: fix request.queuelist usage in flush
  • BZ - 2297514 - CVE-2024-40930 kernel: wifi: cfg80211: validate HE operation element parsing
  • BZ - 2297524 - CVE-2024-40940 kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail
  • BZ - 2297529 - CVE-2024-40945 kernel: iommu: Return right value in iommu_sva_bind_device()
  • BZ - 2297532 - CVE-2024-40948 kernel: mm/page_table_check: fix crash on ZONE_DEVICE
  • BZ - 2297549 - CVE-2024-40965 kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer
  • BZ - 2297550 - CVE-2024-40966 kernel: tty: add the option to have a tty reject a new ldisc
  • BZ - 2297551 - CVE-2024-40967 kernel: serial: imx: Introduce timeout when waiting on transmitter empty
  • BZ - 2297572 - CVE-2024-40988 kernel: drm/radeon: fix UBSAN warning in kv_dpm.c
  • BZ - 2297573 - CVE-2024-40989 kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown
  • BZ - 2297581 - CVE-2024-40997 kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
  • BZ - 2297585 - CVE-2024-41001 kernel: io_uring/sqpoll: work around a potential audit memory leak
  • BZ - 2297702 - CVE-2024-39507 kernel: net: hns3: fix kernel crash problem in concurrent scenario
  • BZ - 2297706 - CVE-2024-40901 kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
  • BZ - 2297909 - CVE-2024-41007 kernel: tcp: avoid too many retransmit packets
  • BZ - 2298079 - CVE-2024-41008 kernel: drm/amdgpu: change vm->task_info handling
  • BZ - 2298140 - CVE-2022-48804 kernel: vt_ioctl: fix array_index_nospec in vt_setactivate
  • BZ - 2298817 - CVE-2024-24859 kernel: bluetooth: race condition in sniff_{min,max}_interval_set()
  • BZ - 2299452 - CVE-2024-41012 kernel: filelock: Remove locks reliably when fcntl/close race is detected
  • BZ - 2300363 - CVE-2024-41020 kernel: filelock: Fix fcntl/close race recovery compat path
  • BZ - 2300398 - CVE-2024-41032 kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask
  • BZ - 2300407 - CVE-2024-41038 kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
  • BZ - 2300408 - CVE-2024-41039 kernel: firmware: cs_dsp: Fix overflow checking of wmfw header
  • BZ - 2300412 - CVE-2024-41042 kernel: netfilter: nf_tables: prefer nft_chain_validate
  • BZ - 2300422 - CVE-2024-41049 kernel: filelock: fix potential use-after-free in posix_lock_inode
  • BZ - 2300430 - CVE-2024-41056 kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files
  • BZ - 2300431 - CVE-2024-41057 kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()
  • BZ - 2300432 - CVE-2024-41058 kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume()
  • BZ - 2300434 - CVE-2024-41060 kernel: drm/radeon: check bo_va->bo is non-NULL before using it
  • BZ - 2300438 - CVE-2024-41063 kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
  • BZ - 2300440 - CVE-2024-41065 kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace
  • BZ - 2300454 - CVE-2024-41077 kernel: null_blk: fix validation of block size
  • BZ - 2300456 - CVE-2024-41079 kernel: nvmet: always initialize cqe.result
  • BZ - 2300459 - CVE-2024-41082 kernel: nvme-fabrics: use reserved tag for reg read/write command
  • BZ - 2300480 - CVE-2024-41084 kernel: cxl/region: Avoid null pointer dereference in region lookup
  • BZ - 2300481 - CVE-2024-41085 kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling
  • BZ - 2300486 - CVE-2024-41089 kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
  • BZ - 2300487 - CVE-2024-41092 kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers
  • BZ - 2300488 - CVE-2024-41093 kernel: drm/amdgpu: avoid using null object of framebuffer
  • BZ - 2300489 - CVE-2024-41094 kernel: drm/fbdev-dma: Only set smem_start is enable per module option
  • BZ - 2300490 - CVE-2024-41095 kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
  • BZ - 2300508 - CVE-2024-42070 kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
  • BZ - 2300516 - CVE-2024-42078 kernel: nfsd: initialise nfsd_info.mutex early.
  • BZ - 2300533 - CVE-2024-42084 kernel: ftruncate: pass a signed offset
  • BZ - 2300552 - CVE-2024-42090 kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER
  • BZ - 2301464 - CVE-2024-42101 kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
  • BZ - 2301477 - CVE-2024-42114 kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
  • BZ - 2301488 - CVE-2024-42123 kernel: drm/amdgpu: fix double free err_addr pointer warnings
  • BZ - 2301489 - CVE-2024-42124 kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible
  • BZ - 2301490 - CVE-2024-42125 kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband
  • BZ - 2301497 - CVE-2024-42132 kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX
  • BZ - 2301506 - CVE-2024-42141 kernel: Bluetooth: ISO: Check socket flag instead of hcon
  • BZ - 2301522 - CVE-2024-42154 kernel: tcp_metrics: validate source addr length
  • BZ - 2301530 - CVE-2024-42159 kernel: scsi: mpi3mr: Sanitise num_phys
  • BZ - 2301544 - CVE-2024-42226 kernel: usb: xhci: prevent potential failure in handle_tx_event() for Transfer events without TRB
  • BZ - 2303077 - CVE-2024-42228 kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
  • BZ - 2304187 - CVE-2024-42258 kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines
  • BZ - 2306363 - CVE-2024-43869 kernel: perf: Fix event leak upon exec and file release
  • BZ - 2307861 - CVE-2024-43888 kernel: mm: list_lru: fix UAF for memory cgroup
  • BZ - 2307865 - CVE-2024-43892 kernel: memcg: protect concurrent access to mem_cgroup_idr
  • BZ - 2307884 - CVE-2024-43911 kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session
  • BZ - 2309273 - CVE-2024-44947 kernel: fuse: Initialize beyond-EOF page contents before setting uptodate
  • BZ - 2309791 - CVE-2024-44960 kernel: usb: gadget: core: Check for unset descriptor
  • BZ - 2309796 - CVE-2024-44965 kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption
  • BZ - 2309801 - CVE-2024-44970 kernel: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
  • BZ - 2309847 - CVE-2024-44984 kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
  • BZ - 2309868 - CVE-2024-45005 kernel: KVM: s390: fix validity interception issue when gisa is switched off
  • RHEL-26081 - [RHEL-9] bnx2i issues with cnic uio interface
  • RHEL-9148 - Interrupt thread not affined after interrupt reaffined
  • RHEL-17714 - During hotplug 416 vcpus hit "watchdog: BUG: soft lockup - CPU#9 stuck for 44s! [swapper/9:0]" issues
  • RHEL-23575 - Open vSwitch kernel module recursive DoS
  • RHEL-32199 - Rebase kexec/kdump to upstream kernel v6.5
  • RHEL-29437 - The kernel rejects programmed TSC offsets in the architectural MSRs
  • RHEL-36182 - idpf: "ethtool -G ... tcp-data-split off" is silently ignored
  • RHEL-36224 - Fix objtool warnings in kernel build
  • RHEL-7990 - "rpm -e" in libguestfs appliance (guest) triggers xfs_iunlink_lookup() WARNING [kernel-5.14.0-347.el9]
  • RHEL-9429 - [rhel-9 wwan] wwan core and drivers rebase to v6.9
  • RHEL-45158 - text console via virtio-gpu is not working on s390x anymore
  • RHEL-31876 - [OVS] per-flow sample optimization using psample (kernel)
  • RHEL-35853 - nfs: getcwd returns ENOENT in subdirectory of mount after upgrade from RHEL7 to RHEL9
  • RHEL-9096 - auditd fails to start with "Error setting audit daemon pid (No buffer space available)"

CVEs

  • CVE-2019-25162
  • CVE-2020-10135
  • CVE-2021-47098
  • CVE-2021-47101
  • CVE-2021-47185
  • CVE-2021-47384
  • CVE-2021-47386
  • CVE-2021-47428
  • CVE-2021-47429
  • CVE-2021-47432
  • CVE-2021-47454
  • CVE-2021-47457
  • CVE-2021-47495
  • CVE-2021-47497
  • CVE-2021-47505
  • CVE-2022-48669
  • CVE-2022-48672
  • CVE-2022-48703
  • CVE-2022-48804
  • CVE-2022-48929
  • CVE-2022-49078
  • CVE-2022-49124
  • CVE-2022-49197
  • CVE-2022-49226
  • CVE-2022-49267
  • CVE-2022-49329
  • CVE-2022-49430
  • CVE-2022-49549
  • CVE-2022-49675
  • CVE-2022-49787
  • CVE-2022-49860
  • CVE-2022-50177
  • CVE-2023-52445
  • CVE-2023-52451
  • CVE-2023-52455
  • CVE-2023-52462
  • CVE-2023-52464
  • CVE-2023-52466
  • CVE-2023-52467
  • CVE-2023-52473
  • CVE-2023-52475
  • CVE-2023-52477
  • CVE-2023-52482
  • CVE-2023-52486
  • CVE-2023-52492
  • CVE-2023-52498
  • CVE-2023-52501
  • CVE-2023-52513
  • CVE-2023-52520
  • CVE-2023-52528
  • CVE-2023-52560
  • CVE-2023-52565
  • CVE-2023-52585
  • CVE-2023-52594
  • CVE-2023-52595
  • CVE-2023-52606
  • CVE-2023-52614
  • CVE-2023-52615
  • CVE-2023-52619
  • CVE-2023-52621
  • CVE-2023-52622
  • CVE-2023-52624
  • CVE-2023-52625
  • CVE-2023-52632
  • CVE-2023-52634
  • CVE-2023-52635
  • CVE-2023-52637
  • CVE-2023-52643
  • CVE-2023-52648
  • CVE-2023-52649
  • CVE-2023-52650
  • CVE-2023-52656
  • CVE-2023-52659
  • CVE-2023-52661
  • CVE-2023-52662
  • CVE-2023-52663
  • CVE-2023-52664
  • CVE-2023-52674
  • CVE-2023-52676
  • CVE-2023-52679
  • CVE-2023-52680
  • CVE-2023-52683
  • CVE-2023-52686
  • CVE-2023-52689
  • CVE-2023-52690
  • CVE-2023-52696
  • CVE-2023-52697
  • CVE-2023-52698
  • CVE-2023-52703
  • CVE-2023-52730
  • CVE-2023-52731
  • CVE-2023-52740
  • CVE-2023-52749
  • CVE-2023-52751
  • CVE-2023-52756
  • CVE-2023-52757
  • CVE-2023-52758
  • CVE-2023-52762
  • CVE-2023-52775
  • CVE-2023-52784
  • CVE-2023-52788
  • CVE-2023-52791
  • CVE-2023-52811
  • CVE-2023-52813
  • CVE-2023-52814
  • CVE-2023-52817
  • CVE-2023-52819
  • CVE-2023-52831
  • CVE-2023-52833
  • CVE-2023-52834
  • CVE-2023-52837
  • CVE-2023-52840
  • CVE-2023-52859
  • CVE-2023-52867
  • CVE-2023-52869
  • CVE-2023-52878
  • CVE-2023-52902
  • CVE-2023-52932
  • CVE-2023-52935
  • CVE-2023-53059
  • CVE-2023-53068
  • CVE-2024-0340
  • CVE-2024-1151
  • CVE-2024-22099
  • CVE-2024-23307
  • CVE-2024-23848
  • CVE-2024-24857
  • CVE-2024-24858
  • CVE-2024-24859
  • CVE-2024-25739
  • CVE-2024-26589
  • CVE-2024-26591
  • CVE-2024-26601
  • CVE-2024-26603
  • CVE-2024-26605
  • CVE-2024-26611
  • CVE-2024-26612
  • CVE-2024-26614
  • CVE-2024-26618
  • CVE-2024-26631
  • CVE-2024-26638
  • CVE-2024-26641
  • CVE-2024-26645
  • CVE-2024-26646
  • CVE-2024-26650
  • CVE-2024-26656
  • CVE-2024-26660
  • CVE-2024-26661
  • CVE-2024-26662
  • CVE-2024-26663
  • CVE-2024-26664
  • CVE-2024-26669
  • CVE-2024-26670
  • CVE-2024-26672
  • CVE-2024-26674
  • CVE-2024-26675
  • CVE-2024-26678
  • CVE-2024-26679
  • CVE-2024-26680
  • CVE-2024-26686
  • CVE-2024-26691
  • CVE-2024-26700
  • CVE-2024-26704
  • CVE-2024-26707
  • CVE-2024-26708
  • CVE-2024-26712
  • CVE-2024-26717
  • CVE-2024-26719
  • CVE-2024-26725
  • CVE-2024-26733
  • CVE-2024-26734
  • CVE-2024-26740
  • CVE-2024-26743
  • CVE-2024-26744
  • CVE-2024-26746
  • CVE-2024-26757
  • CVE-2024-26758
  • CVE-2024-26759
  • CVE-2024-26761
  • CVE-2024-26767
  • CVE-2024-26772
  • CVE-2024-26774
  • CVE-2024-26782
  • CVE-2024-26785
  • CVE-2024-26786
  • CVE-2024-26803
  • CVE-2024-26812
  • CVE-2024-26815
  • CVE-2024-26835
  • CVE-2024-26837
  • CVE-2024-26838
  • CVE-2024-26840
  • CVE-2024-26843
  • CVE-2024-26846
  • CVE-2024-26857
  • CVE-2024-26861
  • CVE-2024-26862
  • CVE-2024-26863
  • CVE-2024-26870
  • CVE-2024-26872
  • CVE-2024-26878
  • CVE-2024-26882
  • CVE-2024-26889
  • CVE-2024-26890
  • CVE-2024-26892
  • CVE-2024-26894
  • CVE-2024-26899
  • CVE-2024-26900
  • CVE-2024-26901
  • CVE-2024-26903
  • CVE-2024-26906
  • CVE-2024-26907
  • CVE-2024-26915
  • CVE-2024-26920
  • CVE-2024-26921
  • CVE-2024-26922
  • CVE-2024-26924
  • CVE-2024-26927
  • CVE-2024-26928
  • CVE-2024-26933
  • CVE-2024-26934
  • CVE-2024-26937
  • CVE-2024-26938
  • CVE-2024-26939
  • CVE-2024-26940
  • CVE-2024-26950
  • CVE-2024-26951
  • CVE-2024-26953
  • CVE-2024-26958
  • CVE-2024-26960
  • CVE-2024-26962
  • CVE-2024-26964
  • CVE-2024-26973
  • CVE-2024-26975
  • CVE-2024-26976
  • CVE-2024-26984
  • CVE-2024-26987
  • CVE-2024-26988
  • CVE-2024-26989
  • CVE-2024-26990
  • CVE-2024-26992
  • CVE-2024-27003
  • CVE-2024-27004
  • CVE-2024-27010
  • CVE-2024-27011
  • CVE-2024-27012
  • CVE-2024-27013
  • CVE-2024-27014
  • CVE-2024-27015
  • CVE-2024-27017
  • CVE-2024-27023
  • CVE-2024-27025
  • CVE-2024-27038
  • CVE-2024-27042
  • CVE-2024-27048
  • CVE-2024-27057
  • CVE-2024-27062
  • CVE-2024-27079
  • CVE-2024-27389
  • CVE-2024-27395
  • CVE-2024-27404
  • CVE-2024-27410
  • CVE-2024-27414
  • CVE-2024-27431
  • CVE-2024-27436
  • CVE-2024-27437
  • CVE-2024-31076
  • CVE-2024-35787
  • CVE-2024-35794
  • CVE-2024-35795
  • CVE-2024-35801
  • CVE-2024-35805
  • CVE-2024-35807
  • CVE-2024-35808
  • CVE-2024-35809
  • CVE-2024-35810
  • CVE-2024-35812
  • CVE-2024-35814
  • CVE-2024-35817
  • CVE-2024-35822
  • CVE-2024-35824
  • CVE-2024-35827
  • CVE-2024-35831
  • CVE-2024-35835
  • CVE-2024-35838
  • CVE-2024-35840
  • CVE-2024-35843
  • CVE-2024-35847
  • CVE-2024-35853
  • CVE-2024-35854
  • CVE-2024-35855
  • CVE-2024-35859
  • CVE-2024-35861
  • CVE-2024-35862
  • CVE-2024-35863
  • CVE-2024-35864
  • CVE-2024-35865
  • CVE-2024-35866
  • CVE-2024-35867
  • CVE-2024-35869
  • CVE-2024-35872
  • CVE-2024-35876
  • CVE-2024-35877
  • CVE-2024-35878
  • CVE-2024-35880
  • CVE-2024-35886
  • CVE-2024-35888
  • CVE-2024-35892
  • CVE-2024-35894
  • CVE-2024-35900
  • CVE-2024-35904
  • CVE-2024-35905
  • CVE-2024-35908
  • CVE-2024-35912
  • CVE-2024-35913
  • CVE-2024-35918
  • CVE-2024-35923
  • CVE-2024-35924
  • CVE-2024-35925
  • CVE-2024-35927
  • CVE-2024-35928
  • CVE-2024-35930
  • CVE-2024-35931
  • CVE-2024-35938
  • CVE-2024-35939
  • CVE-2024-35942
  • CVE-2024-35944
  • CVE-2024-35946
  • CVE-2024-35947
  • CVE-2024-35950
  • CVE-2024-35952
  • CVE-2024-35954
  • CVE-2024-35957
  • CVE-2024-35959
  • CVE-2024-35973
  • CVE-2024-35976
  • CVE-2024-35979
  • CVE-2024-35983
  • CVE-2024-35991
  • CVE-2024-35995
  • CVE-2024-36002
  • CVE-2024-36006
  • CVE-2024-36010
  • CVE-2024-36015
  • CVE-2024-36022
  • CVE-2024-36028
  • CVE-2024-36030
  • CVE-2024-36031
  • CVE-2024-36477
  • CVE-2024-36881
  • CVE-2024-36882
  • CVE-2024-36884
  • CVE-2024-36885
  • CVE-2024-36891
  • CVE-2024-36896
  • CVE-2024-36901
  • CVE-2024-36902
  • CVE-2024-36905
  • CVE-2024-36917
  • CVE-2024-36920
  • CVE-2024-36926
  • CVE-2024-36927
  • CVE-2024-36928
  • CVE-2024-36930
  • CVE-2024-36932
  • CVE-2024-36933
  • CVE-2024-36936
  • CVE-2024-36939
  • CVE-2024-36940
  • CVE-2024-36944
  • CVE-2024-36945
  • CVE-2024-36955
  • CVE-2024-36956
  • CVE-2024-36960
  • CVE-2024-36961
  • CVE-2024-36967
  • CVE-2024-36974
  • CVE-2024-36977
  • CVE-2024-38388
  • CVE-2024-38555
  • CVE-2024-38581
  • CVE-2024-38596
  • CVE-2024-38598
  • CVE-2024-38600
  • CVE-2024-38604
  • CVE-2024-38605
  • cve-2024-38612
  • CVE-2024-38618
  • CVE-2024-38627
  • CVE-2024-38629
  • CVE-2024-38632
  • CVE-2024-38635
  • CVE-2024-39276
  • CVE-2024-39291
  • CVE-2024-39298
  • CVE-2024-39471
  • CVE-2024-39473
  • CVE-2024-39474
  • CVE-2024-39479
  • CVE-2024-39486
  • CVE-2024-39488
  • CVE-2024-39491
  • CVE-2024-39497
  • CVE-2024-39498
  • CVE-2024-39499
  • CVE-2024-39501
  • CVE-2024-39503
  • CVE-2024-39507
  • CVE-2024-39508
  • CVE-2024-40901
  • CVE-2024-40903
  • CVE-2024-40906
  • CVE-2024-40907
  • CVE-2024-40913
  • CVE-2024-40919
  • CVE-2024-40922
  • CVE-2024-40923
  • CVE-2024-40924
  • CVE-2024-40925
  • CVE-2024-40930
  • CVE-2024-40940
  • CVE-2024-40945
  • CVE-2024-40948
  • CVE-2024-40965
  • CVE-2024-40966
  • CVE-2024-40967
  • CVE-2024-40988
  • CVE-2024-40989
  • CVE-2024-40997
  • CVE-2024-41001
  • CVE-2024-41007
  • CVE-2024-41008
  • CVE-2024-41012
  • CVE-2024-41020
  • CVE-2024-41032
  • CVE-2024-41038
  • CVE-2024-41039
  • CVE-2024-41042
  • CVE-2024-41049
  • CVE-2024-41056
  • CVE-2024-41057
  • CVE-2024-41058
  • CVE-2024-41060
  • CVE-2024-41063
  • CVE-2024-41065
  • CVE-2024-41077
  • CVE-2024-41079
  • CVE-2024-41082
  • CVE-2024-41084
  • CVE-2024-41085
  • CVE-2024-41089
  • CVE-2024-41092
  • CVE-2024-41093
  • CVE-2024-41094
  • CVE-2024-41095
  • CVE-2024-42070
  • CVE-2024-42078
  • CVE-2024-42084
  • CVE-2024-42090
  • CVE-2024-42101
  • CVE-2024-42114
  • CVE-2024-42123
  • CVE-2024-42124
  • CVE-2024-42125
  • CVE-2024-42132
  • CVE-2024-42141
  • CVE-2024-42154
  • CVE-2024-42159
  • CVE-2024-42226
  • CVE-2024-42228
  • CVE-2024-42237
  • CVE-2024-42238
  • CVE-2024-42240
  • CVE-2024-42245
  • CVE-2024-42258
  • CVE-2024-42268
  • CVE-2024-42271
  • CVE-2024-42276
  • CVE-2024-42301
  • CVE-2024-43817
  • CVE-2024-43826
  • CVE-2024-43830
  • CVE-2024-43842
  • CVE-2024-43856
  • CVE-2024-43865
  • CVE-2024-43866
  • CVE-2024-43869
  • CVE-2024-43870
  • CVE-2024-43879
  • CVE-2024-43888
  • CVE-2024-43892
  • CVE-2024-43911
  • CVE-2024-44947
  • CVE-2024-44960
  • CVE-2024-44965
  • CVE-2024-44970
  • CVE-2024-44984
  • CVE-2024-45005

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 9

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
x86_64
bpftool-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: e1cee1a98de8075bebe457ffedb9a598f1db425f1d399298908bb62cfc3e4310
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
kernel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e65522701d74ee0124fb4c4f6f5c3ec271615eaeda9c997bd6e37f604987bd2e
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 865eb14ef393035d13f4771a9cb0dd637e9260cc9f58f6085c2a7e0d6f8c9d21
kernel-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bc34a39cbea07a1107af9480ef2bedb1fec3a6fba9fa33aedbb9d85a2ac73adc
kernel-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f04fc1e40c44fbb8aaca9a44dc512c4b4eb988edca6ccb5ab87d238ed5ccb886
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6079a2e1e5bdfcf6e3543717b0c0efd7c4bc13fec05172b496c8cc7d4580f4f7
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03c9b79a23f3e013e9de43cb9f8a14b6a14bac47c22681456e63684ab08b7eb2
kernel-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03a3dbbc8a1cb39ad7c915424819b1f35727ddb45b4ba0e577cac9c4694e184b
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 393c6893fcae8abaaf46ff04d1e600127b0f05a187b1f207b4680a69923b7517
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 5b4cd0c7ed93c6caaeaa83accb0cc5c89a93ed1fbf1d6317327f8d2251c374dd
kernel-debug-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 224907fb0c363e60eb4338415072f54c8f0592e1a0af6d1c34a058bcdb62389d
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 05bed7e417a6f9a8b83a827e82893a0e3f9a54884b3507a6f114014c85be0fbc
kernel-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4187eec9493c5298ca502ad004b88046e80a6a4d2182e18e1faac875c68432e5
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 854a873f372a26a898cec557cdf567c39da231733fbc407d3d76e2d7469ba265
kernel-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6e97cb58c97028f8f005239b625d657b2dc09df86b07e7178118c5c9ed84ace7
kernel-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 78007292f22918311ef2b86707c15dc7dfed147e2a0b9ddb190aedc97574f3d7
kernel-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 81d94339f8a59568ef31f207e01ccc4db48a195138c30b743fd090eb3a1c62b8
kernel-rt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e07f37d077eda7650dc8af8b5e1392baaef2d8310e736b7dfc08a730b99e3206
kernel-rt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e07f37d077eda7650dc8af8b5e1392baaef2d8310e736b7dfc08a730b99e3206
kernel-rt-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: ce65e9a2feb30d73a58abb19da04ad7683e59f53ef23a963a4dbd7b1cdb3bdec
kernel-rt-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: ce65e9a2feb30d73a58abb19da04ad7683e59f53ef23a963a4dbd7b1cdb3bdec
kernel-rt-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 1e4ea51ffdbe0d2b2a5506cc9a216b7ec645414a729f40a5163c7d8cb1f55aa2
kernel-rt-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 1e4ea51ffdbe0d2b2a5506cc9a216b7ec645414a729f40a5163c7d8cb1f55aa2
kernel-rt-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: b13cdd4673e50b27440d6ba4a17ca23562dcc887261b4281ed4e93bcd1bbfac3
kernel-rt-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: b13cdd4673e50b27440d6ba4a17ca23562dcc887261b4281ed4e93bcd1bbfac3
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: c9281cec83a1595ebc36173c4b03ed0eb0839ee1bae8a5723a7f94c42095e91c
kernel-rt-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: c9281cec83a1595ebc36173c4b03ed0eb0839ee1bae8a5723a7f94c42095e91c
kernel-rt-debug-kvm-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a61d323466152a17cd67a07dc30087f0beb18a98759247ee47ca88117dc803b7
kernel-rt-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0417faac72afa9badfaee932b811cf0d8f0d461966f0c28b259f38d1138c0ce6
kernel-rt-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0417faac72afa9badfaee932b811cf0d8f0d461966f0c28b259f38d1138c0ce6
kernel-rt-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 55c4d82d23d2ad866740f5bb088d9d96b6a84b722b1aa3dcdcb22484f4528399
kernel-rt-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 55c4d82d23d2ad866740f5bb088d9d96b6a84b722b1aa3dcdcb22484f4528399
kernel-rt-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 66fae4e6c639df3209af19d63f14bc61888639270a81fe9df9efb08260bfd860
kernel-rt-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 66fae4e6c639df3209af19d63f14bc61888639270a81fe9df9efb08260bfd860
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d62c7248f77691e792ba247a754f3495a2b7aaa92392c5af2404eae39200d4c2
kernel-rt-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d62c7248f77691e792ba247a754f3495a2b7aaa92392c5af2404eae39200d4c2
kernel-rt-kvm-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: aef7784a3a8fc00db7d69f810851a129aa4f6faf2b359246f2e4316bdbd3b4a6
kernel-rt-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 133f1b3b2f80a719b47032d99eb86f289168a28a53004c54e42e9a9d6e6d365d
kernel-rt-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 133f1b3b2f80a719b47032d99eb86f289168a28a53004c54e42e9a9d6e6d365d
kernel-rt-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 2526dffdd51bfc8c170d9c7ddb720c8e3a24cda4d4eed9335369444f6a9c7a8d
kernel-rt-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 2526dffdd51bfc8c170d9c7ddb720c8e3a24cda4d4eed9335369444f6a9c7a8d
kernel-rt-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f4897d95cc46ca9e99f5307c16e395a0bad5b9566aaef006acd90e6cc0c565e9
kernel-rt-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f4897d95cc46ca9e99f5307c16e395a0bad5b9566aaef006acd90e6cc0c565e9
kernel-tools-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: fae1216364267c740191d87c45868d02721f7c1c497a5d1980c70d21844e31c4
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-libs-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 27b7cf8b6a5fa3865ee2f7e3fcef9e13644c9d033dacfdc2786e80b4403b2b3f
kernel-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bfaa147612d329ed7d059129092daef6632d2bab8a2a37cc00d570a7ddaa7808
kernel-uki-virt-addons-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4a3b9f9690bb6f84e2686cf7b3cde0c482692fe4954f5f05870c247edb9c6da9
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d2c88aa040283a4f5cdbc69b9d6965e15242ce3cdf3bb7ea0aefb0207146cd05
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
python3-perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a357c9fdd1363389f17a3f60229fbb413febd2a3c488a1e72bb3217b8771ad5d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
rtla-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e7ce1f80f44533ddf6b684f3ca1049d79ea40a219683f696e218f4ad3bd588f5
rv-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 9f8b86435f5e333cc8257c1d434b0d81425e52db11f8c585416c7ab34fb72e68

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
x86_64
bpftool-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: e1cee1a98de8075bebe457ffedb9a598f1db425f1d399298908bb62cfc3e4310
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
kernel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e65522701d74ee0124fb4c4f6f5c3ec271615eaeda9c997bd6e37f604987bd2e
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 865eb14ef393035d13f4771a9cb0dd637e9260cc9f58f6085c2a7e0d6f8c9d21
kernel-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bc34a39cbea07a1107af9480ef2bedb1fec3a6fba9fa33aedbb9d85a2ac73adc
kernel-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f04fc1e40c44fbb8aaca9a44dc512c4b4eb988edca6ccb5ab87d238ed5ccb886
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6079a2e1e5bdfcf6e3543717b0c0efd7c4bc13fec05172b496c8cc7d4580f4f7
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03c9b79a23f3e013e9de43cb9f8a14b6a14bac47c22681456e63684ab08b7eb2
kernel-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03a3dbbc8a1cb39ad7c915424819b1f35727ddb45b4ba0e577cac9c4694e184b
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 393c6893fcae8abaaf46ff04d1e600127b0f05a187b1f207b4680a69923b7517
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 5b4cd0c7ed93c6caaeaa83accb0cc5c89a93ed1fbf1d6317327f8d2251c374dd
kernel-debug-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 224907fb0c363e60eb4338415072f54c8f0592e1a0af6d1c34a058bcdb62389d
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 05bed7e417a6f9a8b83a827e82893a0e3f9a54884b3507a6f114014c85be0fbc
kernel-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4187eec9493c5298ca502ad004b88046e80a6a4d2182e18e1faac875c68432e5
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 854a873f372a26a898cec557cdf567c39da231733fbc407d3d76e2d7469ba265
kernel-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6e97cb58c97028f8f005239b625d657b2dc09df86b07e7178118c5c9ed84ace7
kernel-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 78007292f22918311ef2b86707c15dc7dfed147e2a0b9ddb190aedc97574f3d7
kernel-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 81d94339f8a59568ef31f207e01ccc4db48a195138c30b743fd090eb3a1c62b8
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-tools-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: fae1216364267c740191d87c45868d02721f7c1c497a5d1980c70d21844e31c4
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-libs-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 27b7cf8b6a5fa3865ee2f7e3fcef9e13644c9d033dacfdc2786e80b4403b2b3f
kernel-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bfaa147612d329ed7d059129092daef6632d2bab8a2a37cc00d570a7ddaa7808
kernel-uki-virt-addons-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4a3b9f9690bb6f84e2686cf7b3cde0c482692fe4954f5f05870c247edb9c6da9
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d2c88aa040283a4f5cdbc69b9d6965e15242ce3cdf3bb7ea0aefb0207146cd05
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
python3-perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a357c9fdd1363389f17a3f60229fbb413febd2a3c488a1e72bb3217b8771ad5d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
rtla-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e7ce1f80f44533ddf6b684f3ca1049d79ea40a219683f696e218f4ad3bd588f5
rv-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 9f8b86435f5e333cc8257c1d434b0d81425e52db11f8c585416c7ab34fb72e68

Red Hat Enterprise Linux Server - AUS 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
x86_64
bpftool-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: e1cee1a98de8075bebe457ffedb9a598f1db425f1d399298908bb62cfc3e4310
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
kernel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e65522701d74ee0124fb4c4f6f5c3ec271615eaeda9c997bd6e37f604987bd2e
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 865eb14ef393035d13f4771a9cb0dd637e9260cc9f58f6085c2a7e0d6f8c9d21
kernel-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bc34a39cbea07a1107af9480ef2bedb1fec3a6fba9fa33aedbb9d85a2ac73adc
kernel-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f04fc1e40c44fbb8aaca9a44dc512c4b4eb988edca6ccb5ab87d238ed5ccb886
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6079a2e1e5bdfcf6e3543717b0c0efd7c4bc13fec05172b496c8cc7d4580f4f7
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03c9b79a23f3e013e9de43cb9f8a14b6a14bac47c22681456e63684ab08b7eb2
kernel-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03a3dbbc8a1cb39ad7c915424819b1f35727ddb45b4ba0e577cac9c4694e184b
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 393c6893fcae8abaaf46ff04d1e600127b0f05a187b1f207b4680a69923b7517
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 5b4cd0c7ed93c6caaeaa83accb0cc5c89a93ed1fbf1d6317327f8d2251c374dd
kernel-debug-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 224907fb0c363e60eb4338415072f54c8f0592e1a0af6d1c34a058bcdb62389d
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 05bed7e417a6f9a8b83a827e82893a0e3f9a54884b3507a6f114014c85be0fbc
kernel-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4187eec9493c5298ca502ad004b88046e80a6a4d2182e18e1faac875c68432e5
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 854a873f372a26a898cec557cdf567c39da231733fbc407d3d76e2d7469ba265
kernel-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6e97cb58c97028f8f005239b625d657b2dc09df86b07e7178118c5c9ed84ace7
kernel-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 78007292f22918311ef2b86707c15dc7dfed147e2a0b9ddb190aedc97574f3d7
kernel-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 81d94339f8a59568ef31f207e01ccc4db48a195138c30b743fd090eb3a1c62b8
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-tools-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: fae1216364267c740191d87c45868d02721f7c1c497a5d1980c70d21844e31c4
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-libs-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 27b7cf8b6a5fa3865ee2f7e3fcef9e13644c9d033dacfdc2786e80b4403b2b3f
kernel-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bfaa147612d329ed7d059129092daef6632d2bab8a2a37cc00d570a7ddaa7808
kernel-uki-virt-addons-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4a3b9f9690bb6f84e2686cf7b3cde0c482692fe4954f5f05870c247edb9c6da9
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d2c88aa040283a4f5cdbc69b9d6965e15242ce3cdf3bb7ea0aefb0207146cd05
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
python3-perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a357c9fdd1363389f17a3f60229fbb413febd2a3c488a1e72bb3217b8771ad5d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
rtla-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e7ce1f80f44533ddf6b684f3ca1049d79ea40a219683f696e218f4ad3bd588f5
rv-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 9f8b86435f5e333cc8257c1d434b0d81425e52db11f8c585416c7ab34fb72e68

Red Hat Enterprise Linux for IBM z Systems 9

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
s390x
bpftool-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 58258553917e9d699c7ad90de2ee3355c8e6ce659e7a7810f0f518360320937f
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
kernel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c3486c1e4d2297c697722d38bc40c6a501d6c5e7d03b92fbf78254daa42c6fe6
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 801e9fe9f15a18d9f52bd2d1b1cac02d28533eb13aced19e077939b0b3aba799
kernel-debug-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 45046393bf0023ca590e0d4e163ca4ca0c8547a93a2a62399df98f347c3db08b
kernel-debug-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6bc7a1f45952f7cf5e16eabafbebd74433a07ab0856b2557eaebf499e25a44b3
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debug-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 8cb812b499919d1de72ab78ba7940df301c5817ed41155fb636f1043c4a63dea
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 439c30128da1d4289b2a3227c6c6a75dac97670047e661f7590bc7a3dd7c5d46
kernel-debug-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: ff03f41959372389b43983eeb0aa02da3a7fc71df52538e85c916e926ce12f1f
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6ff15681f317d00e3854d23398d67a09bf86dd2f09440c4a5908c1b91cace418
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 31f049cbb1f0306cfac6401de7dc613ead0a1b8d6d8d9e1068af0bc726df2c39
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 74fb02296932965e9b971dbae0b0262726a30e46573e384c627a71f1716f4271
kernel-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: d4488c53dc44a1a3c76dc41370d012307fd60f0f899a861a0543808b8b0a0588
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 481496788f15df4f34be2ee92d97e702f9e818bbede2919c9d2736f4e9884458
kernel-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 12fbb76d854d75c6738e6030feafaab1c38ec65f0f2f362afc4686a683cc5a19
kernel-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 979d2d3bc8300c3df243f8a6f7590e9d6ccbc2505361bf174cb743b330a7c7ee
kernel-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: e043c034f8742c9cbd00cd218ea1b36156745af1a5b436e7d651d744c5763b0a
kernel-tools-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 49673cbfdfa567c1bf8e8e61edfbc04637b87c90c0298ed50ca311dc1467428c
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-zfcpdump-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 3daef7cc0220feaf30a29de591afeb3aea20dad0b74d05434b8593fd28f56727
kernel-zfcpdump-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: faa785798b45d046867863b47e017672d389b4edb341103d11645dc3735ea86e
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
kernel-zfcpdump-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: dffa64bbaa54b97643d71cf59cb274e37e0927be4b54545355847715ef5fa25f
kernel-zfcpdump-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2b9de186a62a6509c9235c4bafa27e6e960936781fd7263a2fdad15bd9fb205a
kernel-zfcpdump-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 7055a5539ce017e474d10951fdcdd162c021f40149f84e4723ced0c17fea18c7
kernel-zfcpdump-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 049988bf60c5911795e1851c2b442cf17a938aee4c082e63e6a20cbe0f6a07ea
kernel-zfcpdump-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 1f378fc71bdb6283b12326b6ae2858438bedb1092e13d6b2d7b27c71c5f082db
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
perf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 83206f8028c9986ff7b2f0225bb586451cbb9f0987cd2e8b73877ba7a1231a56
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
python3-perf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 843ca449722b2a2418daab83b018be2cd4f89c57d98a15a176330e67559ed78e
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9
rtla-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: b5be8e49a62bdfcf0837452cfbb920924ba877421659bdfe35759fccc65298df
rv-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: cfd0ab3fa0ef0ae0230209e7df702510485032cff79b012c0d44a64a3b691255

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
s390x
bpftool-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 58258553917e9d699c7ad90de2ee3355c8e6ce659e7a7810f0f518360320937f
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
kernel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c3486c1e4d2297c697722d38bc40c6a501d6c5e7d03b92fbf78254daa42c6fe6
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 801e9fe9f15a18d9f52bd2d1b1cac02d28533eb13aced19e077939b0b3aba799
kernel-debug-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 45046393bf0023ca590e0d4e163ca4ca0c8547a93a2a62399df98f347c3db08b
kernel-debug-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6bc7a1f45952f7cf5e16eabafbebd74433a07ab0856b2557eaebf499e25a44b3
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debug-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 8cb812b499919d1de72ab78ba7940df301c5817ed41155fb636f1043c4a63dea
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 439c30128da1d4289b2a3227c6c6a75dac97670047e661f7590bc7a3dd7c5d46
kernel-debug-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: ff03f41959372389b43983eeb0aa02da3a7fc71df52538e85c916e926ce12f1f
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6ff15681f317d00e3854d23398d67a09bf86dd2f09440c4a5908c1b91cace418
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 31f049cbb1f0306cfac6401de7dc613ead0a1b8d6d8d9e1068af0bc726df2c39
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 74fb02296932965e9b971dbae0b0262726a30e46573e384c627a71f1716f4271
kernel-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: d4488c53dc44a1a3c76dc41370d012307fd60f0f899a861a0543808b8b0a0588
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 481496788f15df4f34be2ee92d97e702f9e818bbede2919c9d2736f4e9884458
kernel-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 12fbb76d854d75c6738e6030feafaab1c38ec65f0f2f362afc4686a683cc5a19
kernel-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 979d2d3bc8300c3df243f8a6f7590e9d6ccbc2505361bf174cb743b330a7c7ee
kernel-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: e043c034f8742c9cbd00cd218ea1b36156745af1a5b436e7d651d744c5763b0a
kernel-tools-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 49673cbfdfa567c1bf8e8e61edfbc04637b87c90c0298ed50ca311dc1467428c
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-zfcpdump-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 3daef7cc0220feaf30a29de591afeb3aea20dad0b74d05434b8593fd28f56727
kernel-zfcpdump-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: faa785798b45d046867863b47e017672d389b4edb341103d11645dc3735ea86e
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
kernel-zfcpdump-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: dffa64bbaa54b97643d71cf59cb274e37e0927be4b54545355847715ef5fa25f
kernel-zfcpdump-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2b9de186a62a6509c9235c4bafa27e6e960936781fd7263a2fdad15bd9fb205a
kernel-zfcpdump-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 7055a5539ce017e474d10951fdcdd162c021f40149f84e4723ced0c17fea18c7
kernel-zfcpdump-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 049988bf60c5911795e1851c2b442cf17a938aee4c082e63e6a20cbe0f6a07ea
kernel-zfcpdump-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 1f378fc71bdb6283b12326b6ae2858438bedb1092e13d6b2d7b27c71c5f082db
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
perf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 83206f8028c9986ff7b2f0225bb586451cbb9f0987cd2e8b73877ba7a1231a56
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
python3-perf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 843ca449722b2a2418daab83b018be2cd4f89c57d98a15a176330e67559ed78e
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9
rtla-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: b5be8e49a62bdfcf0837452cfbb920924ba877421659bdfe35759fccc65298df
rv-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: cfd0ab3fa0ef0ae0230209e7df702510485032cff79b012c0d44a64a3b691255

Red Hat Enterprise Linux for Power, little endian 9

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
ppc64le
bpftool-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 330b20d1eea2a40c77bf7e37415e6d4e9d6c444f1a93899015ce058f7b576935
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
kernel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 859c8b1ddacc441e453aaf8b2bd6d3ca890540724dbec488d466deaf2fe7e43f
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: fd4f8ac2318a29e0ea8e83cd2b3e0f33002a40c965e68e9ce1ccdd10c26c6073
kernel-debug-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a3f6d9647e857787de50b64c19de0268b7d574d3c9aa7f5dccdabced61985d27
kernel-debug-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 9668eca54db4cd3596d7d9afdd073f266c2bf6287acc61c4803da0795ed9e50c
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debug-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 844fc64937074372a5f1095b434e029d4047b33abb75edaae125b9564eea6c69
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 7e655b7824bd1cdefe337a33c939052444d94c402bdd3f41698214ca709a4746
kernel-debug-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 35524024c0707f92c3cd4395909ed217600a476beb56ee58ae2e4d3da6f2b8e9
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 4cc9c5e9b4ba9b3cf92324a50bce6e3277bfffe64bd02e85ca5d78447bb3c68b
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 623cf98eeefbb08f318874045a7cc5a0e51d5ca9a8e930aa5a1f9614b53500d2
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 8199e4247736a3cb80d7338628d80974a31d0ccda9d38fe65131da83ca7b5a62
kernel-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 9e4599d50c054bc473f9d2e2b69ac5a7103d82dcee39dbc3e72cad4339e525c1
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d76d37ce3454c4f6c04d9f1a9b2e176820b5bd6444321ca2dbfd9cd9e5f5eba
kernel-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 000b8c62d1c7beb46771f8b2819706fe7a14aea856dc0183cce676560b428fd2
kernel-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: bded82aa257fd85c42d6cafe9ec7756e6921a5dec304e02125ca2788ea3976e9
kernel-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: bd3b72c316aec32ea0ce8e4ab0adada966a743d46ba0e7a62387c279ff87a447
kernel-tools-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: ad114c73d3294d69ee776fe6350f2109b0bf965f66143b808b5c467fea24ef58
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-libs-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 43ceb6c859070d82e97000b8805b4c7eac92c981ff9dab591bfc58a413685dad
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
perf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1f275b2190b24f70011595c82f2e42ce8bf4efead2ecac6a4f2b42887155db64
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
python3-perf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: f832861722c4ddff58a0f815cd63dc289fd0bfcc3843a8c8333905d3737b88b0
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d
rtla-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a8ca4a9798c83a972a5afca4690016d1806c722fb9f51fdc3c85692094b4dc41
rv-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 5debd0e484a9ccc6ee8cb948b6fd396126c884008fe6d273a25c261badec848a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
ppc64le
bpftool-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 330b20d1eea2a40c77bf7e37415e6d4e9d6c444f1a93899015ce058f7b576935
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
kernel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 859c8b1ddacc441e453aaf8b2bd6d3ca890540724dbec488d466deaf2fe7e43f
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: fd4f8ac2318a29e0ea8e83cd2b3e0f33002a40c965e68e9ce1ccdd10c26c6073
kernel-debug-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a3f6d9647e857787de50b64c19de0268b7d574d3c9aa7f5dccdabced61985d27
kernel-debug-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 9668eca54db4cd3596d7d9afdd073f266c2bf6287acc61c4803da0795ed9e50c
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debug-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 844fc64937074372a5f1095b434e029d4047b33abb75edaae125b9564eea6c69
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 7e655b7824bd1cdefe337a33c939052444d94c402bdd3f41698214ca709a4746
kernel-debug-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 35524024c0707f92c3cd4395909ed217600a476beb56ee58ae2e4d3da6f2b8e9
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 4cc9c5e9b4ba9b3cf92324a50bce6e3277bfffe64bd02e85ca5d78447bb3c68b
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 623cf98eeefbb08f318874045a7cc5a0e51d5ca9a8e930aa5a1f9614b53500d2
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 8199e4247736a3cb80d7338628d80974a31d0ccda9d38fe65131da83ca7b5a62
kernel-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 9e4599d50c054bc473f9d2e2b69ac5a7103d82dcee39dbc3e72cad4339e525c1
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d76d37ce3454c4f6c04d9f1a9b2e176820b5bd6444321ca2dbfd9cd9e5f5eba
kernel-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 000b8c62d1c7beb46771f8b2819706fe7a14aea856dc0183cce676560b428fd2
kernel-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: bded82aa257fd85c42d6cafe9ec7756e6921a5dec304e02125ca2788ea3976e9
kernel-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: bd3b72c316aec32ea0ce8e4ab0adada966a743d46ba0e7a62387c279ff87a447
kernel-tools-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: ad114c73d3294d69ee776fe6350f2109b0bf965f66143b808b5c467fea24ef58
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-libs-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 43ceb6c859070d82e97000b8805b4c7eac92c981ff9dab591bfc58a413685dad
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
perf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1f275b2190b24f70011595c82f2e42ce8bf4efead2ecac6a4f2b42887155db64
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
python3-perf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: f832861722c4ddff58a0f815cd63dc289fd0bfcc3843a8c8333905d3737b88b0
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d
rtla-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a8ca4a9798c83a972a5afca4690016d1806c722fb9f51fdc3c85692094b4dc41
rv-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 5debd0e484a9ccc6ee8cb948b6fd396126c884008fe6d273a25c261badec848a

Red Hat Enterprise Linux for ARM 64 9

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
aarch64
bpftool-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 7223bccc459f435a07905b5d897a7e486c7162da2e603e9530b8c40379be5411
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
kernel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fef062b0fea2033e1be550a65bf8c374ed0109514473e1390492285bbdbbcb72
kernel-64k-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 754e02a080b70a572d12bfcce7838a78a60bdafb65229d61e3a203aac8ee8608
kernel-64k-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f7bc356cf6fe6492cafb25b61f250060e88e710f18fca77ea34048f6ec2d6c49
kernel-64k-debug-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 660b0cc8bc3e2d8574468e4f4bb4e964d6cd9f3765251f0288e8576ad999a68a
kernel-64k-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e317f5f1edc2b755a4406498a714c00bb59b890250a0378c8b94300290d2c23b
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 5de01b632557320ae42a5302f6b0c17c4f797158010cf0ad4aa318e88d8b5a90
kernel-64k-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 62add628980b1524fce4454b9904dfc90427b4eab7af411c6264db7a41ecb06c
kernel-64k-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: d9be41d6a77730fc57b1e1d94c1bf3109d0735742bbb548825dfb53a19003e9a
kernel-64k-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6e73a208f0699e8bb8af6afe7e58efc1ccdb76c14cf234fe53f0c8d590360777
kernel-64k-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f09623b6ea079a3585094aa0b363dac7f4451166b1267ea6aa0fe8353acc3737
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-64k-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f59a9b76b35308cd2de95c6cee56d697f5d3bb0ba511de2c47ca3d97901cf37c
kernel-64k-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9f2f362e63f8cc337575970ef4bedcff124a67eeb7ac350d15c94a871cb5bdf9
kernel-64k-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6de06c8da1050ea61e5c310ea03cfb71afb8c68ecb7fd1992bb2f20ad95c626f
kernel-64k-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 56d5a2bb18e877adc296b8878c7ba03d6b6789509a446da947547d42eb4eb86f
kernel-64k-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: b7d969141b07cf66e2dc56ca9fb8289b3649c88e879e9e64f47ff8c50b322781
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 73de9f72a9393f1006d62eaa702fc4f9ef16f5911b81207ddd0e4caf858b43c2
kernel-debug-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f4cf563b6daf1f4b9e3f953e6471672ae5c01c0099122b3a84b15646c301a4a3
kernel-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 010f87d688501d2f9daa3f97c32a55bd246028a644d9afd7ac102b8da8efe10a
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: de456e48dd4b7b972312c89f8965c282d124b089aa9d97c8002adc7800dc8d5b
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ec12cdf28b864ded1af4c071e5824eb47250fd4f11ba8d40266c4e4cbf6b0a62
kernel-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: bffa5dced7c0d160e6c1b55b226087e098f0d2a58e587026a1cd933ecb2fe22e
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1d9a2ed53fe3cb5a2ee26ef7fc5af6603b6abc4df8b25be28ac681681fdab8c7
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9fcd8168ec6b3e93b91e64ed0cd07f74e7a092052635adc1afc337740c3be843
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ddf75722cad44a93e96cb588d7d9cc51ea2eb25425faea9128755341a3f20178
kernel-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 463ec90dc173812d6227b4e4860deedf45f93132333e8c3c5da552a3b010b823
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: cbb7258f68435f2b9ae66580abd493982375485c1833184e5148a2b2672239b8
kernel-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 953fc560348f3964c5cceef456558dd16a7c2e291e2aec6f64243f3542dba606
kernel-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 5103165deaef634ccfc9c2f0a6b8d80d7199ffe08a1a55009918ea8d89e92a09
kernel-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: d18293f47492e286de1d5f655d61b41f3da8ef9928a96ebe1bd4d8bbbaa6ba5c
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-tools-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f9a266a270a7f6614e3def0747b4723e7e2f7a0763ff8c6770c698aae9e3d675
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-libs-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9386197da4f3b072a63fd70c5a09878c81789fba943c2cab4ddf6c6997faba91
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
perf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 30b3a132e92150c02673cd7b4cd528f5fa9ebf94c12c534b21b2e558a61bce8a
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
python3-perf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3a9f68d2d1f667358e7de9e42470d0483c0e53bcfaafc8ab460c1ff0685ad1d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7
rtla-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 8354c6ae508666b840fae87f2137af09d254916c4b8f40a4166763ecb013c63a
rv-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: afb0e6f1c1eb06eb0d0729ab31e3744c29b54816cce2012fd36a631608772b66

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
aarch64
bpftool-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 7223bccc459f435a07905b5d897a7e486c7162da2e603e9530b8c40379be5411
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
kernel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fef062b0fea2033e1be550a65bf8c374ed0109514473e1390492285bbdbbcb72
kernel-64k-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 754e02a080b70a572d12bfcce7838a78a60bdafb65229d61e3a203aac8ee8608
kernel-64k-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f7bc356cf6fe6492cafb25b61f250060e88e710f18fca77ea34048f6ec2d6c49
kernel-64k-debug-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 660b0cc8bc3e2d8574468e4f4bb4e964d6cd9f3765251f0288e8576ad999a68a
kernel-64k-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e317f5f1edc2b755a4406498a714c00bb59b890250a0378c8b94300290d2c23b
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 5de01b632557320ae42a5302f6b0c17c4f797158010cf0ad4aa318e88d8b5a90
kernel-64k-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 62add628980b1524fce4454b9904dfc90427b4eab7af411c6264db7a41ecb06c
kernel-64k-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: d9be41d6a77730fc57b1e1d94c1bf3109d0735742bbb548825dfb53a19003e9a
kernel-64k-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6e73a208f0699e8bb8af6afe7e58efc1ccdb76c14cf234fe53f0c8d590360777
kernel-64k-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f09623b6ea079a3585094aa0b363dac7f4451166b1267ea6aa0fe8353acc3737
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-64k-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f59a9b76b35308cd2de95c6cee56d697f5d3bb0ba511de2c47ca3d97901cf37c
kernel-64k-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9f2f362e63f8cc337575970ef4bedcff124a67eeb7ac350d15c94a871cb5bdf9
kernel-64k-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6de06c8da1050ea61e5c310ea03cfb71afb8c68ecb7fd1992bb2f20ad95c626f
kernel-64k-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 56d5a2bb18e877adc296b8878c7ba03d6b6789509a446da947547d42eb4eb86f
kernel-64k-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: b7d969141b07cf66e2dc56ca9fb8289b3649c88e879e9e64f47ff8c50b322781
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 73de9f72a9393f1006d62eaa702fc4f9ef16f5911b81207ddd0e4caf858b43c2
kernel-debug-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f4cf563b6daf1f4b9e3f953e6471672ae5c01c0099122b3a84b15646c301a4a3
kernel-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 010f87d688501d2f9daa3f97c32a55bd246028a644d9afd7ac102b8da8efe10a
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: de456e48dd4b7b972312c89f8965c282d124b089aa9d97c8002adc7800dc8d5b
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ec12cdf28b864ded1af4c071e5824eb47250fd4f11ba8d40266c4e4cbf6b0a62
kernel-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: bffa5dced7c0d160e6c1b55b226087e098f0d2a58e587026a1cd933ecb2fe22e
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1d9a2ed53fe3cb5a2ee26ef7fc5af6603b6abc4df8b25be28ac681681fdab8c7
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9fcd8168ec6b3e93b91e64ed0cd07f74e7a092052635adc1afc337740c3be843
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ddf75722cad44a93e96cb588d7d9cc51ea2eb25425faea9128755341a3f20178
kernel-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 463ec90dc173812d6227b4e4860deedf45f93132333e8c3c5da552a3b010b823
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: cbb7258f68435f2b9ae66580abd493982375485c1833184e5148a2b2672239b8
kernel-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 953fc560348f3964c5cceef456558dd16a7c2e291e2aec6f64243f3542dba606
kernel-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 5103165deaef634ccfc9c2f0a6b8d80d7199ffe08a1a55009918ea8d89e92a09
kernel-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: d18293f47492e286de1d5f655d61b41f3da8ef9928a96ebe1bd4d8bbbaa6ba5c
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-tools-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f9a266a270a7f6614e3def0747b4723e7e2f7a0763ff8c6770c698aae9e3d675
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-libs-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9386197da4f3b072a63fd70c5a09878c81789fba943c2cab4ddf6c6997faba91
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
perf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 30b3a132e92150c02673cd7b4cd528f5fa9ebf94c12c534b21b2e558a61bce8a
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
python3-perf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3a9f68d2d1f667358e7de9e42470d0483c0e53bcfaafc8ab460c1ff0685ad1d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7
rtla-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 8354c6ae508666b840fae87f2137af09d254916c4b8f40a4166763ecb013c63a
rv-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: afb0e6f1c1eb06eb0d0729ab31e3744c29b54816cce2012fd36a631608772b66

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
ppc64le
bpftool-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 330b20d1eea2a40c77bf7e37415e6d4e9d6c444f1a93899015ce058f7b576935
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
kernel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 859c8b1ddacc441e453aaf8b2bd6d3ca890540724dbec488d466deaf2fe7e43f
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: fd4f8ac2318a29e0ea8e83cd2b3e0f33002a40c965e68e9ce1ccdd10c26c6073
kernel-debug-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a3f6d9647e857787de50b64c19de0268b7d574d3c9aa7f5dccdabced61985d27
kernel-debug-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 9668eca54db4cd3596d7d9afdd073f266c2bf6287acc61c4803da0795ed9e50c
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debug-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 844fc64937074372a5f1095b434e029d4047b33abb75edaae125b9564eea6c69
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 7e655b7824bd1cdefe337a33c939052444d94c402bdd3f41698214ca709a4746
kernel-debug-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 35524024c0707f92c3cd4395909ed217600a476beb56ee58ae2e4d3da6f2b8e9
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 4cc9c5e9b4ba9b3cf92324a50bce6e3277bfffe64bd02e85ca5d78447bb3c68b
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 623cf98eeefbb08f318874045a7cc5a0e51d5ca9a8e930aa5a1f9614b53500d2
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 8199e4247736a3cb80d7338628d80974a31d0ccda9d38fe65131da83ca7b5a62
kernel-devel-matched-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 9e4599d50c054bc473f9d2e2b69ac5a7103d82dcee39dbc3e72cad4339e525c1
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d76d37ce3454c4f6c04d9f1a9b2e176820b5bd6444321ca2dbfd9cd9e5f5eba
kernel-modules-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 000b8c62d1c7beb46771f8b2819706fe7a14aea856dc0183cce676560b428fd2
kernel-modules-core-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: bded82aa257fd85c42d6cafe9ec7756e6921a5dec304e02125ca2788ea3976e9
kernel-modules-extra-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: bd3b72c316aec32ea0ce8e4ab0adada966a743d46ba0e7a62387c279ff87a447
kernel-tools-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: ad114c73d3294d69ee776fe6350f2109b0bf965f66143b808b5c467fea24ef58
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-libs-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 43ceb6c859070d82e97000b8805b4c7eac92c981ff9dab591bfc58a413685dad
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
perf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1f275b2190b24f70011595c82f2e42ce8bf4efead2ecac6a4f2b42887155db64
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
python3-perf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: f832861722c4ddff58a0f815cd63dc289fd0bfcc3843a8c8333905d3737b88b0
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d
rtla-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a8ca4a9798c83a972a5afca4690016d1806c722fb9f51fdc3c85692094b4dc41
rv-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 5debd0e484a9ccc6ee8cb948b6fd396126c884008fe6d273a25c261badec848a

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
x86_64
bpftool-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: e1cee1a98de8075bebe457ffedb9a598f1db425f1d399298908bb62cfc3e4310
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
kernel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e65522701d74ee0124fb4c4f6f5c3ec271615eaeda9c997bd6e37f604987bd2e
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 865eb14ef393035d13f4771a9cb0dd637e9260cc9f58f6085c2a7e0d6f8c9d21
kernel-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bc34a39cbea07a1107af9480ef2bedb1fec3a6fba9fa33aedbb9d85a2ac73adc
kernel-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f04fc1e40c44fbb8aaca9a44dc512c4b4eb988edca6ccb5ab87d238ed5ccb886
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6079a2e1e5bdfcf6e3543717b0c0efd7c4bc13fec05172b496c8cc7d4580f4f7
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03c9b79a23f3e013e9de43cb9f8a14b6a14bac47c22681456e63684ab08b7eb2
kernel-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 03a3dbbc8a1cb39ad7c915424819b1f35727ddb45b4ba0e577cac9c4694e184b
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 393c6893fcae8abaaf46ff04d1e600127b0f05a187b1f207b4680a69923b7517
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 5b4cd0c7ed93c6caaeaa83accb0cc5c89a93ed1fbf1d6317327f8d2251c374dd
kernel-debug-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 224907fb0c363e60eb4338415072f54c8f0592e1a0af6d1c34a058bcdb62389d
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 05bed7e417a6f9a8b83a827e82893a0e3f9a54884b3507a6f114014c85be0fbc
kernel-devel-matched-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4187eec9493c5298ca502ad004b88046e80a6a4d2182e18e1faac875c68432e5
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 854a873f372a26a898cec557cdf567c39da231733fbc407d3d76e2d7469ba265
kernel-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 6e97cb58c97028f8f005239b625d657b2dc09df86b07e7178118c5c9ed84ace7
kernel-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 78007292f22918311ef2b86707c15dc7dfed147e2a0b9ddb190aedc97574f3d7
kernel-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 81d94339f8a59568ef31f207e01ccc4db48a195138c30b743fd090eb3a1c62b8
kernel-rt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e07f37d077eda7650dc8af8b5e1392baaef2d8310e736b7dfc08a730b99e3206
kernel-rt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e07f37d077eda7650dc8af8b5e1392baaef2d8310e736b7dfc08a730b99e3206
kernel-rt-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: ce65e9a2feb30d73a58abb19da04ad7683e59f53ef23a963a4dbd7b1cdb3bdec
kernel-rt-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: ce65e9a2feb30d73a58abb19da04ad7683e59f53ef23a963a4dbd7b1cdb3bdec
kernel-rt-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 1e4ea51ffdbe0d2b2a5506cc9a216b7ec645414a729f40a5163c7d8cb1f55aa2
kernel-rt-debug-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 1e4ea51ffdbe0d2b2a5506cc9a216b7ec645414a729f40a5163c7d8cb1f55aa2
kernel-rt-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: b13cdd4673e50b27440d6ba4a17ca23562dcc887261b4281ed4e93bcd1bbfac3
kernel-rt-debug-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: b13cdd4673e50b27440d6ba4a17ca23562dcc887261b4281ed4e93bcd1bbfac3
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: c9281cec83a1595ebc36173c4b03ed0eb0839ee1bae8a5723a7f94c42095e91c
kernel-rt-debug-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: c9281cec83a1595ebc36173c4b03ed0eb0839ee1bae8a5723a7f94c42095e91c
kernel-rt-debug-kvm-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a61d323466152a17cd67a07dc30087f0beb18a98759247ee47ca88117dc803b7
kernel-rt-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0417faac72afa9badfaee932b811cf0d8f0d461966f0c28b259f38d1138c0ce6
kernel-rt-debug-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0417faac72afa9badfaee932b811cf0d8f0d461966f0c28b259f38d1138c0ce6
kernel-rt-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 55c4d82d23d2ad866740f5bb088d9d96b6a84b722b1aa3dcdcb22484f4528399
kernel-rt-debug-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 55c4d82d23d2ad866740f5bb088d9d96b6a84b722b1aa3dcdcb22484f4528399
kernel-rt-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 66fae4e6c639df3209af19d63f14bc61888639270a81fe9df9efb08260bfd860
kernel-rt-debug-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 66fae4e6c639df3209af19d63f14bc61888639270a81fe9df9efb08260bfd860
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-rt-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d62c7248f77691e792ba247a754f3495a2b7aaa92392c5af2404eae39200d4c2
kernel-rt-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d62c7248f77691e792ba247a754f3495a2b7aaa92392c5af2404eae39200d4c2
kernel-rt-kvm-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: aef7784a3a8fc00db7d69f810851a129aa4f6faf2b359246f2e4316bdbd3b4a6
kernel-rt-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 133f1b3b2f80a719b47032d99eb86f289168a28a53004c54e42e9a9d6e6d365d
kernel-rt-modules-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 133f1b3b2f80a719b47032d99eb86f289168a28a53004c54e42e9a9d6e6d365d
kernel-rt-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 2526dffdd51bfc8c170d9c7ddb720c8e3a24cda4d4eed9335369444f6a9c7a8d
kernel-rt-modules-core-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 2526dffdd51bfc8c170d9c7ddb720c8e3a24cda4d4eed9335369444f6a9c7a8d
kernel-rt-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f4897d95cc46ca9e99f5307c16e395a0bad5b9566aaef006acd90e6cc0c565e9
kernel-rt-modules-extra-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f4897d95cc46ca9e99f5307c16e395a0bad5b9566aaef006acd90e6cc0c565e9
kernel-tools-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: fae1216364267c740191d87c45868d02721f7c1c497a5d1980c70d21844e31c4
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-libs-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 27b7cf8b6a5fa3865ee2f7e3fcef9e13644c9d033dacfdc2786e80b4403b2b3f
kernel-uki-virt-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: bfaa147612d329ed7d059129092daef6632d2bab8a2a37cc00d570a7ddaa7808
kernel-uki-virt-addons-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 4a3b9f9690bb6f84e2686cf7b3cde0c482692fe4954f5f05870c247edb9c6da9
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d2c88aa040283a4f5cdbc69b9d6965e15242ce3cdf3bb7ea0aefb0207146cd05
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
python3-perf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a357c9fdd1363389f17a3f60229fbb413febd2a3c488a1e72bb3217b8771ad5d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc
rtla-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e7ce1f80f44533ddf6b684f3ca1049d79ea40a219683f696e218f4ad3bd588f5
rv-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 9f8b86435f5e333cc8257c1d434b0d81425e52db11f8c585416c7ab34fb72e68

Red Hat CodeReady Linux Builder for x86_64 9

SRPM
x86_64
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
kernel-cross-headers-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 7d911b939e12bd2fda871411dafbdb454a3543cc95fdb8654ea7a8a2915c26ec
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 461b9f716dd29d8d00b1fc591f579367c55ec70dff65cf05ca2a9ea4ff0c0e3f
libperf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 99d36accfaf2b7dcd71a854431d49f3a4b3da19e58d534743d354a7143a1348d
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM
ppc64le
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
kernel-cross-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 2bc23910575f861cc3e7b0394c8c0ca76565c1f4dd540bfb1df259a75c41846b
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 697fac2e15b0dd00010bc8ae42afe7dcacbc39d8bdb296c072c251d21ba02f5b
libperf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: f9f932256f782053ce136ed433f85b18527fce4ebaebd1a0bb5524a99e0f1840
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM
aarch64
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-cross-headers-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 455f6ace43af2161b04aa27fca6d1b7b562e282312869e0d2309157f3aecd5f2
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 038cd3218556beb502ed4fafc5a122d47d0e0f63ba7a3d5129d06f5b99abe759
libperf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 51bbd68661f563c36b590054bd61d5d29be1bc8cad10b1fd67aa61fda0118bd4
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM
s390x
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
kernel-cross-headers-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 5920b79569000e49a45a7cd2e4a1302aa2fd454c5b51085bfe65ff3d822530b3
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
libperf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 8fa0c7299c5c3abef5accdd961904addd78d06a7b6364824499886fcee4c201d
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6

SRPM
x86_64
bpftool-debuginfo-7.4.0-503.11.1.el9_5.x86_64.rpm SHA-256: aa5c1b6085d5b37908c3fd1c256a5ad7281f14bb80ebe3bf471d1c97c5885b24
kernel-cross-headers-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 7d911b939e12bd2fda871411dafbdb454a3543cc95fdb8654ea7a8a2915c26ec
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e9684d0b15b05dc47f4d3eee6ea731a89d8fa79e28db15f47b86162d47b46431
kernel-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: f61293b585dcbb34032a419330263b430fb263b86ee1fefbe276292f6aa9ebd8
kernel-debuginfo-common-x86_64-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 028c52d157e535d5ed30ea95c60717b497f11ac7fb1ac0d6225c3c45192afcf6
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: e6d47beebf513ab9f4c132bc34972c0f72d61f56ef4ccba1402e1c9e0fecaf76
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 0913c03c8b37184588335895c8afb63c2119ad0f245b7d85b7ee485e63068773
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: edac32cf46390024300cdf1d8fbe626fd4e2d5aae5bfb00d01705c162745d1cd
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 461b9f716dd29d8d00b1fc591f579367c55ec70dff65cf05ca2a9ea4ff0c0e3f
libperf-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 99d36accfaf2b7dcd71a854431d49f3a4b3da19e58d534743d354a7143a1348d
libperf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: 10f5293e6e7b66c8dce0083d773a3ace840dd23d11aa2993a88fe7e0136f5c75
perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: d27375e0cf441857158241990a18f043926787aa32eda4474a8fcf6600854b53
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.x86_64.rpm SHA-256: a1ae9a42fde296cd21a503cce78301e53dd0623ae0b397ee4753621f3be0b2fc

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6

SRPM
ppc64le
bpftool-debuginfo-7.4.0-503.11.1.el9_5.ppc64le.rpm SHA-256: d2e86d8dae59a426cb3e1e0a041ae0a6421b8d0c0817a987e847517b5c770f87
kernel-cross-headers-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 2bc23910575f861cc3e7b0394c8c0ca76565c1f4dd540bfb1df259a75c41846b
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: abbd62e406e3d64f2acba6c782533597c574900fe50ea1138a345ab1e84431bd
kernel-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 1d2866475e7b4c1510254c2439241b4e32845ea0bdd4bd4fa658a00596108ce0
kernel-debuginfo-common-ppc64le-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: e16723e182c341b55c3ac2db5e43090e2eb048f08ab1152b95ee8302b6380713
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 495fcafe0a33836d0ad7d4006e4ce6c95a31c51c5d2e4855c45d7843a2c71119
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 697fac2e15b0dd00010bc8ae42afe7dcacbc39d8bdb296c072c251d21ba02f5b
libperf-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: f9f932256f782053ce136ed433f85b18527fce4ebaebd1a0bb5524a99e0f1840
libperf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 94427881b775410b47101538c7171c68869ef10d7e71600f39fd7b285edad584
perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: a36e970d2146327f0fcc79db1fa7d317c1bd52ade2d3c1e71cdc76295baa70b7
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.ppc64le.rpm SHA-256: 61fa909f4a26d0693ac4bb7f4ae0169a8691aaca72a585443be08b40d12c497d

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6

SRPM
s390x
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
kernel-cross-headers-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 5920b79569000e49a45a7cd2e4a1302aa2fd454c5b51085bfe65ff3d822530b3
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
libperf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 8fa0c7299c5c3abef5accdd961904addd78d06a7b6364824499886fcee4c201d
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6

SRPM
aarch64
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-cross-headers-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 455f6ace43af2161b04aa27fca6d1b7b562e282312869e0d2309157f3aecd5f2
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-libs-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 038cd3218556beb502ed4fafc5a122d47d0e0f63ba7a3d5129d06f5b99abe759
libperf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 51bbd68661f563c36b590054bd61d5d29be1bc8cad10b1fd67aa61fda0118bd4
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
aarch64
bpftool-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 7223bccc459f435a07905b5d897a7e486c7162da2e603e9530b8c40379be5411
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
bpftool-debuginfo-7.4.0-503.11.1.el9_5.aarch64.rpm SHA-256: 57d22da0e39eb5369e7948a8caf99dca6f4aa9c32a3968bc53a365b71225df1a
kernel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fef062b0fea2033e1be550a65bf8c374ed0109514473e1390492285bbdbbcb72
kernel-64k-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 754e02a080b70a572d12bfcce7838a78a60bdafb65229d61e3a203aac8ee8608
kernel-64k-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f7bc356cf6fe6492cafb25b61f250060e88e710f18fca77ea34048f6ec2d6c49
kernel-64k-debug-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 660b0cc8bc3e2d8574468e4f4bb4e964d6cd9f3765251f0288e8576ad999a68a
kernel-64k-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e317f5f1edc2b755a4406498a714c00bb59b890250a0378c8b94300290d2c23b
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ae34b426350c2508927bc4c40c6ad0fba63407e88b8b8d3d302c93e39bbda99e
kernel-64k-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 5de01b632557320ae42a5302f6b0c17c4f797158010cf0ad4aa318e88d8b5a90
kernel-64k-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 62add628980b1524fce4454b9904dfc90427b4eab7af411c6264db7a41ecb06c
kernel-64k-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: d9be41d6a77730fc57b1e1d94c1bf3109d0735742bbb548825dfb53a19003e9a
kernel-64k-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6e73a208f0699e8bb8af6afe7e58efc1ccdb76c14cf234fe53f0c8d590360777
kernel-64k-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f09623b6ea079a3585094aa0b363dac7f4451166b1267ea6aa0fe8353acc3737
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-64k-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 301b51cf0de5fa88b9205f6d0b1a73c094ec46942719cd5f50e0552c9b83fafe
kernel-64k-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f59a9b76b35308cd2de95c6cee56d697f5d3bb0ba511de2c47ca3d97901cf37c
kernel-64k-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9f2f362e63f8cc337575970ef4bedcff124a67eeb7ac350d15c94a871cb5bdf9
kernel-64k-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6de06c8da1050ea61e5c310ea03cfb71afb8c68ecb7fd1992bb2f20ad95c626f
kernel-64k-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 56d5a2bb18e877adc296b8878c7ba03d6b6789509a446da947547d42eb4eb86f
kernel-64k-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: b7d969141b07cf66e2dc56ca9fb8289b3649c88e879e9e64f47ff8c50b322781
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 73de9f72a9393f1006d62eaa702fc4f9ef16f5911b81207ddd0e4caf858b43c2
kernel-debug-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f4cf563b6daf1f4b9e3f953e6471672ae5c01c0099122b3a84b15646c301a4a3
kernel-debug-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 010f87d688501d2f9daa3f97c32a55bd246028a644d9afd7ac102b8da8efe10a
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ea6f4fd9d04f2ac76d727670053e69f5dba5be1e3df44e1faee045b9234c9519
kernel-debug-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: de456e48dd4b7b972312c89f8965c282d124b089aa9d97c8002adc7800dc8d5b
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ec12cdf28b864ded1af4c071e5824eb47250fd4f11ba8d40266c4e4cbf6b0a62
kernel-debug-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: bffa5dced7c0d160e6c1b55b226087e098f0d2a58e587026a1cd933ecb2fe22e
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1d9a2ed53fe3cb5a2ee26ef7fc5af6603b6abc4df8b25be28ac681681fdab8c7
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9fcd8168ec6b3e93b91e64ed0cd07f74e7a092052635adc1afc337740c3be843
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 49c1bea7dc754e4a1e0be8111746ba2a4d89805343eab9c3e3683e5e2a7cc2ec
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-debuginfo-common-aarch64-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3b6fc5c17a4d55639f7f11965b648d0164b841d33131ff35897aa1ac5f6c8e5
kernel-devel-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: ddf75722cad44a93e96cb588d7d9cc51ea2eb25425faea9128755341a3f20178
kernel-devel-matched-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 463ec90dc173812d6227b4e4860deedf45f93132333e8c3c5da552a3b010b823
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: cbb7258f68435f2b9ae66580abd493982375485c1833184e5148a2b2672239b8
kernel-modules-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 953fc560348f3964c5cceef456558dd16a7c2e291e2aec6f64243f3542dba606
kernel-modules-core-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 5103165deaef634ccfc9c2f0a6b8d80d7199ffe08a1a55009918ea8d89e92a09
kernel-modules-extra-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: d18293f47492e286de1d5f655d61b41f3da8ef9928a96ebe1bd4d8bbbaa6ba5c
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debug-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 1dbca423339a26f642e3e780c3eda6eefbc98b025101ee6085a0e626493a7346
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-rt-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 6c3036eb95779873ef3b0650e8b29cd287719dd475569f7b84031b2f45949edd
kernel-tools-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: f9a266a270a7f6614e3def0747b4723e7e2f7a0763ff8c6770c698aae9e3d675
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: fd1a2fa89aaf34a5ff23942c9f71aa8856c7502c282494d8031290071b1ecb20
kernel-tools-libs-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9386197da4f3b072a63fd70c5a09878c81789fba943c2cab4ddf6c6997faba91
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
libperf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: e42f153bb07e994da77109df29d94525614092b652148e2cc847018c3de59b26
perf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 30b3a132e92150c02673cd7b4cd528f5fa9ebf94c12c534b21b2e558a61bce8a
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 664604bb501e46834b16d18ab82c3b24cad2c413ddef34477411195794de1de4
python3-perf-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: a3a9f68d2d1f667358e7de9e42470d0483c0e53bcfaafc8ab460c1ff0685ad1d
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 9aa7e5b39b50541603252315f703919a8859edbc803732a561f48a9c261ec3a7
rtla-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: 8354c6ae508666b840fae87f2137af09d254916c4b8f40a4166763ecb013c63a
rv-5.14.0-503.11.1.el9_5.aarch64.rpm SHA-256: afb0e6f1c1eb06eb0d0729ab31e3744c29b54816cce2012fd36a631608772b66

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6

SRPM
kernel-5.14.0-503.11.1.el9_5.src.rpm SHA-256: 33fe2f07945c94874d4b0334d1e5667c160915ed975f147f8015d18ae8d8c377
s390x
bpftool-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 58258553917e9d699c7ad90de2ee3355c8e6ce659e7a7810f0f518360320937f
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
bpftool-debuginfo-7.4.0-503.11.1.el9_5.s390x.rpm SHA-256: 530ec5bf79ca0e918d8c3d66a26dc010c255649e4df8985c2c593c58a10ddaa7
kernel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c3486c1e4d2297c697722d38bc40c6a501d6c5e7d03b92fbf78254daa42c6fe6
kernel-abi-stablelists-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: 7c7be9598b92d437a5f1fe17a17afd2a7b6b0efd0dfe71e57a9b7a868f06c330
kernel-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 801e9fe9f15a18d9f52bd2d1b1cac02d28533eb13aced19e077939b0b3aba799
kernel-debug-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 45046393bf0023ca590e0d4e163ca4ca0c8547a93a2a62399df98f347c3db08b
kernel-debug-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6bc7a1f45952f7cf5e16eabafbebd74433a07ab0856b2557eaebf499e25a44b3
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debug-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: bcb3d382c44351057d0f7ff65cefa3a31e84d15f642bf1b6c36def3ff971e054
kernel-debug-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 8cb812b499919d1de72ab78ba7940df301c5817ed41155fb636f1043c4a63dea
kernel-debug-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 439c30128da1d4289b2a3227c6c6a75dac97670047e661f7590bc7a3dd7c5d46
kernel-debug-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: ff03f41959372389b43983eeb0aa02da3a7fc71df52538e85c916e926ce12f1f
kernel-debug-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6ff15681f317d00e3854d23398d67a09bf86dd2f09440c4a5908c1b91cace418
kernel-debug-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 31f049cbb1f0306cfac6401de7dc613ead0a1b8d6d8d9e1068af0bc726df2c39
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 114a3f272bd8d88f698fe4d49fd98cd65b1581289e87067289dad9bcdbd65719
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-debuginfo-common-s390x-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 22bc6b90bf061b0e88a42ff1b0b2e282b0f36c6149b8239896d2812a620ea764
kernel-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 74fb02296932965e9b971dbae0b0262726a30e46573e384c627a71f1716f4271
kernel-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: d4488c53dc44a1a3c76dc41370d012307fd60f0f899a861a0543808b8b0a0588
kernel-doc-5.14.0-503.11.1.el9_5.noarch.rpm SHA-256: a0526f8fb910737c006aa30dd9ea34484a7998a2febee1c3182b928d472cfb20
kernel-headers-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 481496788f15df4f34be2ee92d97e702f9e818bbede2919c9d2736f4e9884458
kernel-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 12fbb76d854d75c6738e6030feafaab1c38ec65f0f2f362afc4686a683cc5a19
kernel-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 979d2d3bc8300c3df243f8a6f7590e9d6ccbc2505361bf174cb743b330a7c7ee
kernel-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: e043c034f8742c9cbd00cd218ea1b36156745af1a5b436e7d651d744c5763b0a
kernel-tools-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 49673cbfdfa567c1bf8e8e61edfbc04637b87c90c0298ed50ca311dc1467428c
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-tools-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2c9ca4640419053b1be20c5c6ce0255e41a2a444367fe6519ae6877069554fdd
kernel-zfcpdump-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 3daef7cc0220feaf30a29de591afeb3aea20dad0b74d05434b8593fd28f56727
kernel-zfcpdump-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: faa785798b45d046867863b47e017672d389b4edb341103d11645dc3735ea86e
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
kernel-zfcpdump-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 6da73a872d2594205c70700baaa945459a9615e4bd7382c41bb938b8681c7d30
kernel-zfcpdump-devel-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: dffa64bbaa54b97643d71cf59cb274e37e0927be4b54545355847715ef5fa25f
kernel-zfcpdump-devel-matched-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 2b9de186a62a6509c9235c4bafa27e6e960936781fd7263a2fdad15bd9fb205a
kernel-zfcpdump-modules-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 7055a5539ce017e474d10951fdcdd162c021f40149f84e4723ced0c17fea18c7
kernel-zfcpdump-modules-core-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 049988bf60c5911795e1851c2b442cf17a938aee4c082e63e6a20cbe0f6a07ea
kernel-zfcpdump-modules-extra-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 1f378fc71bdb6283b12326b6ae2858438bedb1092e13d6b2d7b27c71c5f082db
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
libperf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 415f2eee92e7e89498ae454828b0f15f9594718fc4306932ea37010b523a9c7e
perf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 83206f8028c9986ff7b2f0225bb586451cbb9f0987cd2e8b73877ba7a1231a56
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: c82fbb13137c710462d31252e8ef7b4f94948856bc7ebd881c68f2754c3524cb
python3-perf-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 843ca449722b2a2418daab83b018be2cd4f89c57d98a15a176330e67559ed78e
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9
python3-perf-debuginfo-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: 144da1dfe0e7fe7a8927d7a52a64d8654ed0e03d41658f4fa0826fdac63cdba9
rtla-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: b5be8e49a62bdfcf0837452cfbb920924ba877421659bdfe35759fccc65298df
rv-5.14.0-503.11.1.el9_5.s390x.rpm SHA-256: cfd0ab3fa0ef0ae0230209e7df702510485032cff79b012c0d44a64a3b691255

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility