Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2015:2587 - Security Advisory
Issued:
2015-12-09
Updated:
2015-12-09

RHSA-2015:2587 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Topic

Updated kernel packages that fix three security issues, several bugs, and
one enhancement are now available for Red Hat Enterprise Linux 7.1 Extended
Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel's file system implementation
    handled rename operations in which the source was inside and the
    destination was outside of a bind mount. A privileged user inside a
    container could use this flaw to escape the bind mount and, potentially,
    escalate their privileges on the system. (CVE-2015-2925, Important)
  • It was found that the x86 ISA (Instruction Set Architecture) is prone to
    a denial of service attack inside a virtualized environment in the form of
    an infinite loop in the microcode due to the way (sequential) delivering of
    benign exceptions such as #AC (alignment check exception) is handled.
    A privileged user inside a guest could use this flaw to create denial of
    service conditions on the host kernel. (CVE-2015-5307, Important)
  • A race condition flaw was found in the way the Linux kernel's IPC
    subsystem initialized certain fields in an IPC object structure that were
    later used for permission checking before inserting the object into a
    globally visible list. A local, unprivileged user could potentially use
    this flaw to elevate their privileges on the system. (CVE-2015-7613,
    Important)

Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the
CVE-2015-5307 issue.

This update also fixes the following bugs and adds one enhancement:

  • When setting up an ESP IPsec connection, the aes_ctr algorithm did not
    work for ESP on a Power little endian VM host. As a consequence, a kernel
    error was previously returned and the connection failed to be established.
    A set of patches has been provided to fix this bug, and aes_ctr works for
    ESP in the described situation as expected. (BZ#1247127)
  • The redistribute3() function distributed entries across 3 nodes. However,
    some entries were moved an incorrect way, breaking the ordering. As a
    result, BUG() in the dm-btree-remove.c:shift() function occurred when
    entries were removed from the btree. A patch has been provided to fix this
    bug, and redistribute3() now works as expected. (BZ#1263945)
  • When booting an mpt2sas adapter in a huge DDW enabled slot on Power, the
    kernel previously generated a warning followed by a call trace.
    The provided patch set enhances the Power kernel to be able to support
    IOMMU as a fallback for the cases where the coherent mask of the device is
    not suitable for direct DMA. As a result, neither the warning nor the call
    trace occur in this scenario. (BZ#1267133)
  • If the client mounted /exports and tried to execute the "chown -R"
    command across the entire mountpoint, a warning about a circular directory
    structure was previously returned because mount points all had the same
    inode number. A set of patches has been provided to fix this bug, and mount
    points are now assigned with unique inode numbers as expected. (BZ#1273239)
  • Due to a validation error of in-kernel MMIO tracing, a VM became
    previously unresponsive when connected to Red Hat Enterprise Virtualization
    Hypervisor. The provided patch fixes this bug by dropping the check in MMIO
    handler, and a VM continues running as expected. (BZ#1275149)
  • The NFS client could previously fail to send a CLOSE operation if the
    file was opened with O_WRONLY and the server restarted after the OPEN.
    Consequently, the server appeared in a state that could block other NFS
    operations from completing. The client's state flags have been modified to
    catch this condition and correctly CLOSE the file. (BZ#1275298)
  • This update sets multicast filters for multicast packets when the
    interface is not in promiscuous mode. This change has an impact on the RAR
    usage such that SR-IOV has some RARs reserved for its own usage as well.
    (BZ#1265091)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server - Extended Update Support 7.1 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1 ppc64
  • Red Hat Enterprise Linux EUS Compute Node 7.1 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1 ppc64le

Fixes

  • BZ - 1209367 - CVE-2015-2925 Kernel: vfs: Do not allow escaping from bind mounts
  • BZ - 1268270 - CVE-2015-7613 kernel: Unauthorized access to IPC objects with SysV shm
  • BZ - 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception

CVEs

  • CVE-2015-2925
  • CVE-2015-5307
  • CVE-2015-7613

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
x86_64
kernel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 51ff46460e37b9e61624d750882d27c8427d9cf813a50a84068090ebb407bd8a
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-debug-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 37d03aa7b2679252d9468b2aca34f050abdabd21d898e348b90b2ddf72536c8a
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c1304e3693e839f681e7b3853d775d8e032920e3317b214792a1784cfb509cf3
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c724034e4d2be561a6e562ede447033db7d915e40be41cc58abb25681a960e45
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: a59d77395ea9b6b444e5bd3f2bd0ec24e157617740f350cacf27fb383b7c1c69
kernel-tools-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 44d07744bac1144e81a0f2f63f5ce7a9391dca1458cd89d973e7b7a98bc864ee
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-libs-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 61ecb77a009acca788f9aff4cc59bc08bd0d785599fb80db5c3e147a7963adc7
kernel-tools-libs-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c5e0866254c181263abb1097015cf853d2320b40e5b676ed8085b963cdb8b498
perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 9c99f76b8542adbd231590181342f6bdff119df7e6e3d8e6d71460b2d1fc3273
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
python-perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 4a6c9b5770c2a358b1ff92d3f663de6f52f534429686982c48a874f11b33ed2e
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
s390x
kernel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 02e122dd81f2b5b341d77942f69514b767ba367dd10c898051d6285e0977e137
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-debug-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 3ac8bd1686ade0fd13ab152aa66972df82ebd7342ab0975cc39dfc0a1a7ea0e9
kernel-debug-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a5ab85fe35a116eaa636b31c8cd995083438c6e22f99ee6c92881dd14ba3b007
kernel-debug-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a5ab85fe35a116eaa636b31c8cd995083438c6e22f99ee6c92881dd14ba3b007
kernel-debug-devel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: af7f6bb47b7bf4920aef90d8b62076b84759de55b3fa7f144abc3c9bfaed6f1a
kernel-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 82a0073cdd9fbffab5def55feb28773f4c29f479d0049fd12e965636890de78f
kernel-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 82a0073cdd9fbffab5def55feb28773f4c29f479d0049fd12e965636890de78f
kernel-debuginfo-common-s390x-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a6cdecb3cee0f3067a6533d4d9172fc22009f8b099f86b9a1c14e531d243ea61
kernel-debuginfo-common-s390x-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a6cdecb3cee0f3067a6533d4d9172fc22009f8b099f86b9a1c14e531d243ea61
kernel-devel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 802be9ea588a5d8ef310e8b5a0133f37b1b47480db425ed84527108231d8f383
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 7f40d9af7d3261b8edf305102f65813784bf1da1cbe96a12854b1fa99bf32f82
kernel-kdump-3.10.0-229.24.2.el7.s390x.rpm SHA-256: adfe42cf641775741f3098fb7141693d4712a8a302d00e09ab63ad51a331b903
kernel-kdump-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1de5d3401c3bc8a5afac62379c3c38fb1107aec95ba6de90ed3708980ee25c84
kernel-kdump-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1de5d3401c3bc8a5afac62379c3c38fb1107aec95ba6de90ed3708980ee25c84
kernel-kdump-devel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 923fa32ac151db69299e2427c2cd46d363329014925359902db932dfda107ca9
perf-3.10.0-229.24.2.el7.s390x.rpm SHA-256: cdfb9d777fe112f9c1099b612fe77bd8b6f8b0402524e285c66c8626ad9132cd
perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 3602f07607cdf58b4db722c4976e2d6b861b7eabb6cd08029eef2e24926db4b7
perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 3602f07607cdf58b4db722c4976e2d6b861b7eabb6cd08029eef2e24926db4b7
python-perf-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 47561eeab3f161bedca104315944f9ffebd37d7794596befc47e147943ac99ee
python-perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1c96ce0bf011223e3fde8177bc0b765936f3581061441fdd0b522026ef935990
python-perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1c96ce0bf011223e3fde8177bc0b765936f3581061441fdd0b522026ef935990

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
ppc64
kernel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: b8bd02f7533be1c1334fe9d677926c43ba2eda539baa4529fd4ad9c98a62fec4
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-bootwrapper-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 47637bbd833fe00145c49f4de60d062ba7b3eeb6d24eb2413b9d88d4bdf2f3c5
kernel-debug-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: b4fe72a8314cf426e2bb5261aac42900f2e278d4585e7ac5fac28bd017661efc
kernel-debug-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 9b34b35b152e8c5e105bb1673ebccba59584bfbb038dd608df8e705fe2603431
kernel-debug-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 9b34b35b152e8c5e105bb1673ebccba59584bfbb038dd608df8e705fe2603431
kernel-debug-devel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: fd84109352a02dbcb7d2e35efceaaaefd1628bd336cd7f676a5cca15afe9de4d
kernel-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 0d88f03ab196456767995be85dc2178b95bdb5cfb9c7f6c229fe9ced396a4ab4
kernel-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 0d88f03ab196456767995be85dc2178b95bdb5cfb9c7f6c229fe9ced396a4ab4
kernel-debuginfo-common-ppc64-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 4afcf0c7200ea4f414cc9f3f1e31b28a7b4661c470d52164866129e56e55cde9
kernel-debuginfo-common-ppc64-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 4afcf0c7200ea4f414cc9f3f1e31b28a7b4661c470d52164866129e56e55cde9
kernel-devel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: a15658d87f80fd7dbb2b0ea18a33cbd5c3378cd3927ed68518a306aaca461fa4
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 68685d526dd7ad11ce7bf2130bbd26ba53572b63a5a91f28453eb3090fea1e44
kernel-tools-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 41f83e7aa10cc280229c3f0fb85171409addf9140fd34fc27bfeedfdbfe83327
kernel-tools-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 3092c2f741471489265aadca1a547d7619c2af78e677086f60336804bb0aae2f
kernel-tools-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 3092c2f741471489265aadca1a547d7619c2af78e677086f60336804bb0aae2f
kernel-tools-libs-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: bea90165f253eed7ff16a4caa62d183e7e818de5cfdf1645c09a965e508e68ae
kernel-tools-libs-devel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 42a87510096537f26bc52606713737ba07e5cf7bef8c4002ca45f502af3d3127
perf-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 9aec33098d7313509f3704f61de626c4dffeec55889e91efb0740af07c6c2589
perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 07e790d1562224823a6057910ea55be8807f6cdc2f8b2077edce6b12de13686d
perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 07e790d1562224823a6057910ea55be8807f6cdc2f8b2077edce6b12de13686d
python-perf-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 6d40aaf8db1d817f82a8fdab800e5401006dcd6c538ce1e0c6dd95b5c52b0847
python-perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 7622159ca5b6ecc334f9773ee06995e18386ed1a7d20edafd8307b684b09b81d
python-perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 7622159ca5b6ecc334f9773ee06995e18386ed1a7d20edafd8307b684b09b81d

Red Hat Enterprise Linux EUS Compute Node 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
x86_64
kernel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 51ff46460e37b9e61624d750882d27c8427d9cf813a50a84068090ebb407bd8a
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-debug-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 37d03aa7b2679252d9468b2aca34f050abdabd21d898e348b90b2ddf72536c8a
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c1304e3693e839f681e7b3853d775d8e032920e3317b214792a1784cfb509cf3
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c724034e4d2be561a6e562ede447033db7d915e40be41cc58abb25681a960e45
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: a59d77395ea9b6b444e5bd3f2bd0ec24e157617740f350cacf27fb383b7c1c69
kernel-tools-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 44d07744bac1144e81a0f2f63f5ce7a9391dca1458cd89d973e7b7a98bc864ee
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-libs-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 61ecb77a009acca788f9aff4cc59bc08bd0d785599fb80db5c3e147a7963adc7
kernel-tools-libs-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c5e0866254c181263abb1097015cf853d2320b40e5b676ed8085b963cdb8b498
perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 9c99f76b8542adbd231590181342f6bdff119df7e6e3d8e6d71460b2d1fc3273
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
python-perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 4a6c9b5770c2a358b1ff92d3f663de6f52f534429686982c48a874f11b33ed2e
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.ael7b.src.rpm SHA-256: b3fcf31f16c610f19a562c9dbe863f8ce3210bcc8580b3a41f50888cc464ccec
ppc64le
kernel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 8a205a09fab98fb2a2eacbe62f9a1702ad12ea6db4a069234a6fb8a7f626e697
kernel-abi-whitelists-3.10.0-229.24.2.ael7b.noarch.rpm SHA-256: 7016dd99007a1f19b97ae934735b3968da8582d1e22f54c61ec34a05c2e437b0
kernel-bootwrapper-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 2ebc6e56cbfdf592e7850ccf9c4208e939b55ec71abfa3fbea9675623ce697b8
kernel-debug-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: a02b627f42823122d75076c165c22257cc182926e8bdd8eee030a611fc90049d
kernel-debug-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 5781408af20b0647b84fde40cfb9bc698c098dda7686ed0625db9aa03a9efeaf
kernel-debug-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 5781408af20b0647b84fde40cfb9bc698c098dda7686ed0625db9aa03a9efeaf
kernel-debug-devel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: f356532dfa1fcda66908d7e594239b7a4af27b16863a3958ca5113eca82e5656
kernel-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 8e40e41b52b59cf67408ff6a31ebdbc9a89436a538f0e83fc750d8e94ad0825b
kernel-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 8e40e41b52b59cf67408ff6a31ebdbc9a89436a538f0e83fc750d8e94ad0825b
kernel-debuginfo-common-ppc64le-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 1dc65aa51d1d3eaaaa54a7e5ce8cf95eee915ada589ad2ff02c15915341f14a3
kernel-debuginfo-common-ppc64le-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 1dc65aa51d1d3eaaaa54a7e5ce8cf95eee915ada589ad2ff02c15915341f14a3
kernel-devel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 2d61a1e4d4cc653f15c5077e07438532fddf05ab76c8d5625ab79e2e3ceff440
kernel-doc-3.10.0-229.24.2.ael7b.noarch.rpm SHA-256: 2f74bf5f886cdc5649141f27f44b98a15702641a22503e530b607e5b09fc94cd
kernel-headers-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 738897c0344d47a0a03345ebf09cb9f56fb9540f7148c4fb5028f52d292f5a28
kernel-tools-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 5bcbaf02329c90cc79b97166b7fea3f74d9b46e0e5f2b0a9a751ef6730ed9a9f
kernel-tools-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 6d9492a927352e13529b47ec2b3843ac0b57ca41ccb9e7634a601f47707d027a
kernel-tools-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 6d9492a927352e13529b47ec2b3843ac0b57ca41ccb9e7634a601f47707d027a
kernel-tools-libs-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: ce3f615e0226fa14e1d482cc9d5eb0ed675974e3abf27d32b8bc59639f0b2160
kernel-tools-libs-devel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: c60094b073edb3df38e4637b71debe2f53207740162b89a28b59dd37eaafee4d
perf-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 125d22e4f47ee84df0a82f260872e2f1abc9c7f47916288ae3e1675d86afe3f1
perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d8210cbb07e0e908f0cfe2ac46e97a20d689a05c21258c5f73840d05eed20615
perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d8210cbb07e0e908f0cfe2ac46e97a20d689a05c21258c5f73840d05eed20615
python-perf-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 6e4671e6b3de4946154c8ac8b0307122f669542a12700b372fb6176d8e03e1c7
python-perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d3c17ad20603bd00852e5d6945b8f0a1a237bb5733e4af55c02f15e6278c382f
python-perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d3c17ad20603bd00852e5d6945b8f0a1a237bb5733e4af55c02f15e6278c382f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+