Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHEA-2009:1312 - Product Enhancement Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHEA-2009:1312 - Product Enhancement Advisory

  • Overview
  • Updated Packages

Synopsis

OpenIPMI bug fix and enhancement update

Type/Severity

Product Enhancement Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated OpenIPMI packages that fix several bugs and add various
enhancements are now available.

Description

OpenIPMI (Intelligent Platform Management Interface) provides graphical and
command line tools and utilities to access platform information, thus
facilitating system management and monitoring for system administrators.

These updated packages upgrade OpenIPMI to upstream version 2.0.16 and
ipmitool to version 1.8.11. (BZ#475542)

These updated OpenIPMI packages provide fixes for the following bugs:

  • some IPMI-enabled hardware makes use of UDP ports 623 (ASF Remote

Management and Control Protocol) and 664 (ASF Secure Remote Management and
Control Protocol), which corrupts other traffic on these ports, causing
symptoms such as autofs mounts hanging. The OpenIPMI package provides a
configuration file for xinetd that prevents other services from using these
ports, so that they do not interfere with IPMI. On affected systems, the
fix has to be enabled manually by setting "disabled = no" for the
appropriate port(s) in /etc/xinetd.d/rmcp and (re)starting the xinetd
service. (BZ#429329)

  • on the S/390 architecture, running "ipmicmd" to access the internal hash

table of open connections caused the utility to segmentation fault. With
this update, "ipmicmd" correctly handles the hash table and thus no longer
crashes. (BZ#437013)

  • the "rmcp_ping" utility did not perform checks on the arguments provided

to it on the command line, and would accept invalid port numbers and/or
start tags. (BZ#437256)

  • the ipmitool utility is shipped in the OpenIPMI-tools packages, and it

was not possible to have other packages depend on "ipmitool" directly.
These updated packages explicitly provide the "ipmitool" feature so that
other packages are now able to reference it. (BZ#442784)

  • several libraries in the OpenIPMI packages contained unnecessary RPATH

values, which have not been compiled in to these updated packages. (BZ#466119)

  • the OpenIPMI-devel packages contained manual pages which were already

provided by the OpenIPMI packages and have therefore been removed from the
OpenIPMI-devel packages. (BZ#466487)

  • the ipmievd daemon listens for events sent by the BMC to the SEL and logs

those events to syslog. Previously, the OpenIPMI-tools package did not
contain the init script for the "ipmievd" service. This init script is
included in these updated packages. (BZ#469979)

  • previously, it was not possible to query "ipmitool" to determine whether

SOL payloads were enabled or disabled for specific users. These updated
packages introduce a new "ipmitool sol payload status" query that
implements the "Gets User Payload Access Command" from the IPMI
specification, thus allowing users' SOL payload access privileges to be
queried. (BZ#470031)

  • the "ipmitool sel list" command displayed event IDs as hexadecimal

numbers. However, it was not possible to then provide these values as
parameters to other "ipmitool sel" commands. These packages include an
updated ipmitool whose various "ipmitool sel" commands accept both decimal
and hexadecimal ID values as parameters. (BZ#470805)

  • it was not possible to specify a Kg key with non-printable characters on

the ipmitool command line. With this update, a Kg key can now be specified
as a hexadecimal value using the '-y' command line option. (BZ#479252)

  • the "sensor list" section of the ipmitool(1) man page now describes each

columnar value of the command "ipmitool sensors list". (BZ#479702)

In addition, these updated packages provide the following enhancements:

  • new in this OpenIPMI 2.0.16 release is the OpenIPMI-gui package, which

contains a GUI that provides a tree-structured view of the IPMI domains it
is connected to. (BZ#504783)

  • the "ipmitool sol set" command now checks the values of arguments

provided on the command line. (BZ#311231)

  • the ipmitool(1) man page has been updated to include descriptions for

these commands: spd, picmg, hpm, firewall, fwum and kontronoem. (BZ#438539)

Users are advised to upgrade to these updated OpenIPMI packages, which
resolve these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 429329 - IPMI hardware steals ports; bind to these ports so that they are not used by accident
  • BZ - 437013 - ipmicmd crashed with Segmentation fault
  • BZ - 437256 - rmcp_ping badly handles cmd line arguments
  • BZ - 438539 - some commands are not documented in ipmitool man page
  • BZ - 442784 - LTC:5.3:201619:Add a Provides statement for ipmitool-1.8.9-1.xxx.rpm to openipmi package in RHEL5.3
  • BZ - 466119 - openipmi rpath problem
  • BZ - 466487 - package OpenIPMI-devel contains manpages already provided by OpenIPMI
  • BZ - 469979 - The init script of ipmievd is not Installed.
  • BZ - 470031 - ipmitool missing "Get User Payload Access Command"
  • BZ - 470805 - Allow passing hexadecimal ids to "ipmitool sel delete"
  • BZ - 475542 - [LTC 5.4 FEAT] OpenIPMI utilities and libraries update [201263]
  • BZ - 479252 - [RHEL5] ipmitool doesn't accept hex codes for k_g
  • BZ - 479702 - [RHEL5] ipmitool output for some sensors is not useful
  • BZ - 504783 - unpackaged files
  • BZ - 509490 - OpenIPMI and OpenIPMI-tools have incorrect default chkconfig and rpm dependencies

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
OpenIPMI-2.0.16-5.el5.src.rpm SHA-256: 2af2bc3d70c418143d51e249bc8bf2ec530080af5d7461f34bbf10d300a3f6e4
x86_64
OpenIPMI-2.0.16-5.el5.x86_64.rpm SHA-256: bde1faa9747db44d444e742d4045669d6d8ee87bb1eda8e8d9d6de5fac291059
OpenIPMI-devel-2.0.16-5.el5.i386.rpm SHA-256: cb0ed04973b01c1fb10093349bad3972aff1873086a71a982c5b92140381bc8a
OpenIPMI-devel-2.0.16-5.el5.x86_64.rpm SHA-256: 92971654bbf0a0d6db6281f4b87b7e49acc1aa24b3cf9230e8b1c1634b53f5ef
OpenIPMI-gui-2.0.16-5.el5.x86_64.rpm SHA-256: 27b2bb0094d632b31f984a31327a5ba42bb12fe95dbd49c11f9d9a90acbe684a
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-libs-2.0.16-5.el5.x86_64.rpm SHA-256: 433328e5315d1481480e9233edd557a449a5914958faa38b691109854d1fea7d
OpenIPMI-perl-2.0.16-5.el5.x86_64.rpm SHA-256: 2c2a1dd14ec104bdd575dabd6d85751e2c5153b92195b1d82cd38c95057c6651
OpenIPMI-python-2.0.16-5.el5.x86_64.rpm SHA-256: 79e5144118a194d8489247d6446f9350ecabfae6088274eb45c0a35def2ece18
OpenIPMI-tools-2.0.16-5.el5.x86_64.rpm SHA-256: 70067f9e4d029e9d7d1e7367a4698933d957317a7c07b315f68b3594126af496
ia64
OpenIPMI-2.0.16-5.el5.ia64.rpm SHA-256: 86b6034208a0eb3ef68b1e5af8a9a6fb6ae9bd3d0910a787b09420ee978009a7
OpenIPMI-devel-2.0.16-5.el5.ia64.rpm SHA-256: 30d8b8dbc09dc70bbeb3ac7564f91a625b1d3e5d8db6c26bc5653f96da594bf5
OpenIPMI-gui-2.0.16-5.el5.ia64.rpm SHA-256: 7a16f1115e452f1a5ea10ab4f20b02a791b9f603e5d4f1fbcca55956536b0e73
OpenIPMI-libs-2.0.16-5.el5.ia64.rpm SHA-256: 3c307cde9c0bca6ddd570630b7a5152fa2b8cc3ab3d44edec853f6b2315db9a9
OpenIPMI-perl-2.0.16-5.el5.ia64.rpm SHA-256: 11d64ddf5f02d473dc4eddac649725443fb6b91f9df405fa58cfe3f998e90462
OpenIPMI-python-2.0.16-5.el5.ia64.rpm SHA-256: 909b3e086304fa224ebc0be40c90afd85ca7999fe71c81f088a8b781c5351bf2
OpenIPMI-tools-2.0.16-5.el5.ia64.rpm SHA-256: adff5fcd6332bc672eee7f6aba29f4e503dd5413943eca3049009960405bc2f9
i386
OpenIPMI-2.0.16-5.el5.i386.rpm SHA-256: dbe6fb2df634fff07b5ddf285036536a2d4059e69fc6f9dc2a907a3d6bc544df
OpenIPMI-devel-2.0.16-5.el5.i386.rpm SHA-256: cb0ed04973b01c1fb10093349bad3972aff1873086a71a982c5b92140381bc8a
OpenIPMI-gui-2.0.16-5.el5.i386.rpm SHA-256: 5d712a05d39b8aa25542a5d4d59601adfbd175879256136f6a2c067fc458c802
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-perl-2.0.16-5.el5.i386.rpm SHA-256: 52101dc4b4db5290083ca7bc7e3e948fd1ffda781bc23e1a6c278e42dc7d9af4
OpenIPMI-python-2.0.16-5.el5.i386.rpm SHA-256: d25a65df9cd2931abfad478766ae499f9bd00be05428f49a747f3f3840622015
OpenIPMI-tools-2.0.16-5.el5.i386.rpm SHA-256: ea658f7be3f3498a5d4d3c11bb4952f4f30fd619c860cce3934d35adc625ec20

Red Hat Enterprise Linux Workstation 5

SRPM
OpenIPMI-2.0.16-5.el5.src.rpm SHA-256: 2af2bc3d70c418143d51e249bc8bf2ec530080af5d7461f34bbf10d300a3f6e4
x86_64
OpenIPMI-2.0.16-5.el5.x86_64.rpm SHA-256: bde1faa9747db44d444e742d4045669d6d8ee87bb1eda8e8d9d6de5fac291059
OpenIPMI-devel-2.0.16-5.el5.i386.rpm SHA-256: cb0ed04973b01c1fb10093349bad3972aff1873086a71a982c5b92140381bc8a
OpenIPMI-devel-2.0.16-5.el5.x86_64.rpm SHA-256: 92971654bbf0a0d6db6281f4b87b7e49acc1aa24b3cf9230e8b1c1634b53f5ef
OpenIPMI-gui-2.0.16-5.el5.x86_64.rpm SHA-256: 27b2bb0094d632b31f984a31327a5ba42bb12fe95dbd49c11f9d9a90acbe684a
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-libs-2.0.16-5.el5.x86_64.rpm SHA-256: 433328e5315d1481480e9233edd557a449a5914958faa38b691109854d1fea7d
OpenIPMI-perl-2.0.16-5.el5.x86_64.rpm SHA-256: 2c2a1dd14ec104bdd575dabd6d85751e2c5153b92195b1d82cd38c95057c6651
OpenIPMI-python-2.0.16-5.el5.x86_64.rpm SHA-256: 79e5144118a194d8489247d6446f9350ecabfae6088274eb45c0a35def2ece18
OpenIPMI-tools-2.0.16-5.el5.x86_64.rpm SHA-256: 70067f9e4d029e9d7d1e7367a4698933d957317a7c07b315f68b3594126af496
i386
OpenIPMI-2.0.16-5.el5.i386.rpm SHA-256: dbe6fb2df634fff07b5ddf285036536a2d4059e69fc6f9dc2a907a3d6bc544df
OpenIPMI-devel-2.0.16-5.el5.i386.rpm SHA-256: cb0ed04973b01c1fb10093349bad3972aff1873086a71a982c5b92140381bc8a
OpenIPMI-gui-2.0.16-5.el5.i386.rpm SHA-256: 5d712a05d39b8aa25542a5d4d59601adfbd175879256136f6a2c067fc458c802
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-perl-2.0.16-5.el5.i386.rpm SHA-256: 52101dc4b4db5290083ca7bc7e3e948fd1ffda781bc23e1a6c278e42dc7d9af4
OpenIPMI-python-2.0.16-5.el5.i386.rpm SHA-256: d25a65df9cd2931abfad478766ae499f9bd00be05428f49a747f3f3840622015
OpenIPMI-tools-2.0.16-5.el5.i386.rpm SHA-256: ea658f7be3f3498a5d4d3c11bb4952f4f30fd619c860cce3934d35adc625ec20

Red Hat Enterprise Linux Desktop 5

SRPM
OpenIPMI-2.0.16-5.el5.src.rpm SHA-256: 2af2bc3d70c418143d51e249bc8bf2ec530080af5d7461f34bbf10d300a3f6e4
x86_64
OpenIPMI-2.0.16-5.el5.x86_64.rpm SHA-256: bde1faa9747db44d444e742d4045669d6d8ee87bb1eda8e8d9d6de5fac291059
OpenIPMI-gui-2.0.16-5.el5.x86_64.rpm SHA-256: 27b2bb0094d632b31f984a31327a5ba42bb12fe95dbd49c11f9d9a90acbe684a
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-libs-2.0.16-5.el5.x86_64.rpm SHA-256: 433328e5315d1481480e9233edd557a449a5914958faa38b691109854d1fea7d
OpenIPMI-perl-2.0.16-5.el5.x86_64.rpm SHA-256: 2c2a1dd14ec104bdd575dabd6d85751e2c5153b92195b1d82cd38c95057c6651
OpenIPMI-python-2.0.16-5.el5.x86_64.rpm SHA-256: 79e5144118a194d8489247d6446f9350ecabfae6088274eb45c0a35def2ece18
OpenIPMI-tools-2.0.16-5.el5.x86_64.rpm SHA-256: 70067f9e4d029e9d7d1e7367a4698933d957317a7c07b315f68b3594126af496
i386
OpenIPMI-2.0.16-5.el5.i386.rpm SHA-256: dbe6fb2df634fff07b5ddf285036536a2d4059e69fc6f9dc2a907a3d6bc544df
OpenIPMI-gui-2.0.16-5.el5.i386.rpm SHA-256: 5d712a05d39b8aa25542a5d4d59601adfbd175879256136f6a2c067fc458c802
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-perl-2.0.16-5.el5.i386.rpm SHA-256: 52101dc4b4db5290083ca7bc7e3e948fd1ffda781bc23e1a6c278e42dc7d9af4
OpenIPMI-python-2.0.16-5.el5.i386.rpm SHA-256: d25a65df9cd2931abfad478766ae499f9bd00be05428f49a747f3f3840622015
OpenIPMI-tools-2.0.16-5.el5.i386.rpm SHA-256: ea658f7be3f3498a5d4d3c11bb4952f4f30fd619c860cce3934d35adc625ec20

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
OpenIPMI-2.0.16-5.el5.src.rpm SHA-256: 2af2bc3d70c418143d51e249bc8bf2ec530080af5d7461f34bbf10d300a3f6e4
s390x
OpenIPMI-2.0.16-5.el5.s390x.rpm SHA-256: 83dd068fa659e24a3b14cf76c594ef1384e1fd7584da8036992bce8aee37957a
OpenIPMI-devel-2.0.16-5.el5.s390.rpm SHA-256: 85012f7a24e9488819f0c517985d276c45296c041fd5b892cd73898303a02bac
OpenIPMI-devel-2.0.16-5.el5.s390x.rpm SHA-256: 175260b8be4d83a220c50e7b9943fbbdd8bf7e941e42462977591ce2ff95df8b
OpenIPMI-gui-2.0.16-5.el5.s390x.rpm SHA-256: d4a266f3bd3715550b0583a9b524eaa5841e0ab9e7ef520368c1cfe3de18e537
OpenIPMI-libs-2.0.16-5.el5.s390.rpm SHA-256: 59aa9a40bbc809cf0abf0f88b0afe75cfc81cc5c8a69ac8f7de9a3aed6f5414c
OpenIPMI-libs-2.0.16-5.el5.s390x.rpm SHA-256: 8362b0e6b942cce10d3c742d5322d00df0eab9a40308f1bf5c0c7921fa96f7f8
OpenIPMI-perl-2.0.16-5.el5.s390x.rpm SHA-256: a887775a7b903e209e2e7c313e812d2f2f53d7e10858e1e5d75a2b033ed6def5
OpenIPMI-python-2.0.16-5.el5.s390x.rpm SHA-256: baf9d7c2e83e7b08dfffaeda8e6026731bc352fdef4f7f92a2afa8d15f5af9ba
OpenIPMI-tools-2.0.16-5.el5.s390x.rpm SHA-256: 2b83ad3b2243ef81f71667c73288bdbeba020c785ee47ccf93776474a7e55800

Red Hat Enterprise Linux for Power, big endian 5

SRPM
OpenIPMI-2.0.16-5.el5.src.rpm SHA-256: 2af2bc3d70c418143d51e249bc8bf2ec530080af5d7461f34bbf10d300a3f6e4
ppc
OpenIPMI-2.0.16-5.el5.ppc.rpm SHA-256: 66ee6835532a13cc7cdbc56945238282b57305607f24368dfc8a15969f5d6dbf
OpenIPMI-devel-2.0.16-5.el5.ppc.rpm SHA-256: 2dc5b283346d36b08fdfd2565504bcc5141c12bc0ee5d874204a9f46c682ae63
OpenIPMI-devel-2.0.16-5.el5.ppc64.rpm SHA-256: a087228947e497d55d63477471324a8d70ec770288a0653b0de04fb1fdaee506
OpenIPMI-gui-2.0.16-5.el5.ppc.rpm SHA-256: 3d205cb66448697249494eca45d6e6f5da1d5278a6119851da896fef94aa7872
OpenIPMI-libs-2.0.16-5.el5.ppc.rpm SHA-256: 1734cc3f7e9ae384a15130f9d7e3e55f32e6c988f7662697c6a709347bd74d5b
OpenIPMI-libs-2.0.16-5.el5.ppc64.rpm SHA-256: d194b1f075fffac3ab47c920ccf3fe35e2f16e90164163518ac790085c3308c0
OpenIPMI-perl-2.0.16-5.el5.ppc.rpm SHA-256: 5eaa2645a7602a222c89cf082dbd07adfe2b88b6feb5693d46d672e91122b9f5
OpenIPMI-python-2.0.16-5.el5.ppc.rpm SHA-256: 74037bd0d731e6c6cce18d723ffd1d073ff3be29511871f0ca8a3a9ca595d63b
OpenIPMI-tools-2.0.16-5.el5.ppc.rpm SHA-256: 454262a75bdd5f9c7a6dfc21fbbfa7fe48e2ddb4702fd7c398667bef1a8167d7

Red Hat Enterprise Linux Server from RHUI 5

SRPM
OpenIPMI-2.0.16-5.el5.src.rpm SHA-256: 2af2bc3d70c418143d51e249bc8bf2ec530080af5d7461f34bbf10d300a3f6e4
x86_64
OpenIPMI-2.0.16-5.el5.x86_64.rpm SHA-256: bde1faa9747db44d444e742d4045669d6d8ee87bb1eda8e8d9d6de5fac291059
OpenIPMI-devel-2.0.16-5.el5.i386.rpm SHA-256: cb0ed04973b01c1fb10093349bad3972aff1873086a71a982c5b92140381bc8a
OpenIPMI-devel-2.0.16-5.el5.x86_64.rpm SHA-256: 92971654bbf0a0d6db6281f4b87b7e49acc1aa24b3cf9230e8b1c1634b53f5ef
OpenIPMI-gui-2.0.16-5.el5.x86_64.rpm SHA-256: 27b2bb0094d632b31f984a31327a5ba42bb12fe95dbd49c11f9d9a90acbe684a
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-libs-2.0.16-5.el5.x86_64.rpm SHA-256: 433328e5315d1481480e9233edd557a449a5914958faa38b691109854d1fea7d
OpenIPMI-perl-2.0.16-5.el5.x86_64.rpm SHA-256: 2c2a1dd14ec104bdd575dabd6d85751e2c5153b92195b1d82cd38c95057c6651
OpenIPMI-python-2.0.16-5.el5.x86_64.rpm SHA-256: 79e5144118a194d8489247d6446f9350ecabfae6088274eb45c0a35def2ece18
OpenIPMI-tools-2.0.16-5.el5.x86_64.rpm SHA-256: 70067f9e4d029e9d7d1e7367a4698933d957317a7c07b315f68b3594126af496
i386
OpenIPMI-2.0.16-5.el5.i386.rpm SHA-256: dbe6fb2df634fff07b5ddf285036536a2d4059e69fc6f9dc2a907a3d6bc544df
OpenIPMI-devel-2.0.16-5.el5.i386.rpm SHA-256: cb0ed04973b01c1fb10093349bad3972aff1873086a71a982c5b92140381bc8a
OpenIPMI-gui-2.0.16-5.el5.i386.rpm SHA-256: 5d712a05d39b8aa25542a5d4d59601adfbd175879256136f6a2c067fc458c802
OpenIPMI-libs-2.0.16-5.el5.i386.rpm SHA-256: 12c7b379b81bd5fc07e9a62ffb067ea57223d4438e6beb4f2efbcf97d10e9807
OpenIPMI-perl-2.0.16-5.el5.i386.rpm SHA-256: 52101dc4b4db5290083ca7bc7e3e948fd1ffda781bc23e1a6c278e42dc7d9af4
OpenIPMI-python-2.0.16-5.el5.i386.rpm SHA-256: d25a65df9cd2931abfad478766ae499f9bd00be05428f49a747f3f3840622015
OpenIPMI-tools-2.0.16-5.el5.i386.rpm SHA-256: ea658f7be3f3498a5d4d3c11bb4952f4f30fd619c860cce3934d35adc625ec20

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility