Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:2587 - Security Advisory
Issued:
2015-12-09
Updated:
2015-12-09

RHSA-2015:2587 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues, several bugs, and
one enhancement are now available for Red Hat Enterprise Linux 7.1 Extended
Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • A flaw was found in the way the Linux kernel's file system implementation

handled rename operations in which the source was inside and the
destination was outside of a bind mount. A privileged user inside a
container could use this flaw to escape the bind mount and, potentially,
escalate their privileges on the system. (CVE-2015-2925, Important)

  • It was found that the x86 ISA (Instruction Set Architecture) is prone to

a denial of service attack inside a virtualized environment in the form of
an infinite loop in the microcode due to the way (sequential) delivering of
benign exceptions such as #AC (alignment check exception) is handled.
A privileged user inside a guest could use this flaw to create denial of
service conditions on the host kernel. (CVE-2015-5307, Important)

  • A race condition flaw was found in the way the Linux kernel's IPC

subsystem initialized certain fields in an IPC object structure that were
later used for permission checking before inserting the object into a
globally visible list. A local, unprivileged user could potentially use
this flaw to elevate their privileges on the system. (CVE-2015-7613,
Important)

Red Hat would like to thank Ben Serebrin of Google Inc. for reporting the
CVE-2015-5307 issue.

This update also fixes the following bugs and adds one enhancement:

  • When setting up an ESP IPsec connection, the aes_ctr algorithm did not

work for ESP on a Power little endian VM host. As a consequence, a kernel
error was previously returned and the connection failed to be established.
A set of patches has been provided to fix this bug, and aes_ctr works for
ESP in the described situation as expected. (BZ#1247127)

  • The redistribute3() function distributed entries across 3 nodes. However,

some entries were moved an incorrect way, breaking the ordering. As a
result, BUG() in the dm-btree-remove.c:shift() function occurred when
entries were removed from the btree. A patch has been provided to fix this
bug, and redistribute3() now works as expected. (BZ#1263945)

  • When booting an mpt2sas adapter in a huge DDW enabled slot on Power, the

kernel previously generated a warning followed by a call trace.
The provided patch set enhances the Power kernel to be able to support
IOMMU as a fallback for the cases where the coherent mask of the device is
not suitable for direct DMA. As a result, neither the warning nor the call
trace occur in this scenario. (BZ#1267133)

  • If the client mounted /exports and tried to execute the "chown -R"

command across the entire mountpoint, a warning about a circular directory
structure was previously returned because mount points all had the same
inode number. A set of patches has been provided to fix this bug, and mount
points are now assigned with unique inode numbers as expected. (BZ#1273239)

  • Due to a validation error of in-kernel MMIO tracing, a VM became

previously unresponsive when connected to Red Hat Enterprise Virtualization
Hypervisor. The provided patch fixes this bug by dropping the check in MMIO
handler, and a VM continues running as expected. (BZ#1275149)

  • The NFS client could previously fail to send a CLOSE operation if the

file was opened with O_WRONLY and the server restarted after the OPEN.
Consequently, the server appeared in a state that could block other NFS
operations from completing. The client's state flags have been modified to
catch this condition and correctly CLOSE the file. (BZ#1275298)

  • This update sets multicast filters for multicast packets when the

interface is not in promiscuous mode. This change has an impact on the RAR
usage such that SR-IOV has some RARs reserved for its own usage as well.
(BZ#1265091)

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1 ppc64le
  • Red Hat Enterprise Linux EUS Compute Node 7.1 x86_64

Fixes

  • BZ - 1209367 - CVE-2015-2925 Kernel: vfs: Do not allow escaping from bind mounts
  • BZ - 1268270 - CVE-2015-7613 kernel: Unauthorized access to IPC objects with SysV shm
  • BZ - 1277172 - CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception

CVEs

  • CVE-2015-2925
  • CVE-2015-5307
  • CVE-2015-7613

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
x86_64
kernel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 51ff46460e37b9e61624d750882d27c8427d9cf813a50a84068090ebb407bd8a
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-debug-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 37d03aa7b2679252d9468b2aca34f050abdabd21d898e348b90b2ddf72536c8a
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c1304e3693e839f681e7b3853d775d8e032920e3317b214792a1784cfb509cf3
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c724034e4d2be561a6e562ede447033db7d915e40be41cc58abb25681a960e45
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: a59d77395ea9b6b444e5bd3f2bd0ec24e157617740f350cacf27fb383b7c1c69
kernel-tools-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 44d07744bac1144e81a0f2f63f5ce7a9391dca1458cd89d973e7b7a98bc864ee
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-libs-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 61ecb77a009acca788f9aff4cc59bc08bd0d785599fb80db5c3e147a7963adc7
kernel-tools-libs-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c5e0866254c181263abb1097015cf853d2320b40e5b676ed8085b963cdb8b498
perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 9c99f76b8542adbd231590181342f6bdff119df7e6e3d8e6d71460b2d1fc3273
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
python-perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 4a6c9b5770c2a358b1ff92d3f663de6f52f534429686982c48a874f11b33ed2e
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
s390x
kernel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 02e122dd81f2b5b341d77942f69514b767ba367dd10c898051d6285e0977e137
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-debug-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 3ac8bd1686ade0fd13ab152aa66972df82ebd7342ab0975cc39dfc0a1a7ea0e9
kernel-debug-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a5ab85fe35a116eaa636b31c8cd995083438c6e22f99ee6c92881dd14ba3b007
kernel-debug-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a5ab85fe35a116eaa636b31c8cd995083438c6e22f99ee6c92881dd14ba3b007
kernel-debug-devel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: af7f6bb47b7bf4920aef90d8b62076b84759de55b3fa7f144abc3c9bfaed6f1a
kernel-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 82a0073cdd9fbffab5def55feb28773f4c29f479d0049fd12e965636890de78f
kernel-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 82a0073cdd9fbffab5def55feb28773f4c29f479d0049fd12e965636890de78f
kernel-debuginfo-common-s390x-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a6cdecb3cee0f3067a6533d4d9172fc22009f8b099f86b9a1c14e531d243ea61
kernel-debuginfo-common-s390x-3.10.0-229.24.2.el7.s390x.rpm SHA-256: a6cdecb3cee0f3067a6533d4d9172fc22009f8b099f86b9a1c14e531d243ea61
kernel-devel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 802be9ea588a5d8ef310e8b5a0133f37b1b47480db425ed84527108231d8f383
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 7f40d9af7d3261b8edf305102f65813784bf1da1cbe96a12854b1fa99bf32f82
kernel-kdump-3.10.0-229.24.2.el7.s390x.rpm SHA-256: adfe42cf641775741f3098fb7141693d4712a8a302d00e09ab63ad51a331b903
kernel-kdump-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1de5d3401c3bc8a5afac62379c3c38fb1107aec95ba6de90ed3708980ee25c84
kernel-kdump-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1de5d3401c3bc8a5afac62379c3c38fb1107aec95ba6de90ed3708980ee25c84
kernel-kdump-devel-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 923fa32ac151db69299e2427c2cd46d363329014925359902db932dfda107ca9
perf-3.10.0-229.24.2.el7.s390x.rpm SHA-256: cdfb9d777fe112f9c1099b612fe77bd8b6f8b0402524e285c66c8626ad9132cd
perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 3602f07607cdf58b4db722c4976e2d6b861b7eabb6cd08029eef2e24926db4b7
perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 3602f07607cdf58b4db722c4976e2d6b861b7eabb6cd08029eef2e24926db4b7
python-perf-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 47561eeab3f161bedca104315944f9ffebd37d7794596befc47e147943ac99ee
python-perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1c96ce0bf011223e3fde8177bc0b765936f3581061441fdd0b522026ef935990
python-perf-debuginfo-3.10.0-229.24.2.el7.s390x.rpm SHA-256: 1c96ce0bf011223e3fde8177bc0b765936f3581061441fdd0b522026ef935990

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
ppc64
kernel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: b8bd02f7533be1c1334fe9d677926c43ba2eda539baa4529fd4ad9c98a62fec4
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-bootwrapper-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 47637bbd833fe00145c49f4de60d062ba7b3eeb6d24eb2413b9d88d4bdf2f3c5
kernel-debug-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: b4fe72a8314cf426e2bb5261aac42900f2e278d4585e7ac5fac28bd017661efc
kernel-debug-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 9b34b35b152e8c5e105bb1673ebccba59584bfbb038dd608df8e705fe2603431
kernel-debug-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 9b34b35b152e8c5e105bb1673ebccba59584bfbb038dd608df8e705fe2603431
kernel-debug-devel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: fd84109352a02dbcb7d2e35efceaaaefd1628bd336cd7f676a5cca15afe9de4d
kernel-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 0d88f03ab196456767995be85dc2178b95bdb5cfb9c7f6c229fe9ced396a4ab4
kernel-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 0d88f03ab196456767995be85dc2178b95bdb5cfb9c7f6c229fe9ced396a4ab4
kernel-debuginfo-common-ppc64-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 4afcf0c7200ea4f414cc9f3f1e31b28a7b4661c470d52164866129e56e55cde9
kernel-debuginfo-common-ppc64-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 4afcf0c7200ea4f414cc9f3f1e31b28a7b4661c470d52164866129e56e55cde9
kernel-devel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: a15658d87f80fd7dbb2b0ea18a33cbd5c3378cd3927ed68518a306aaca461fa4
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 68685d526dd7ad11ce7bf2130bbd26ba53572b63a5a91f28453eb3090fea1e44
kernel-tools-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 41f83e7aa10cc280229c3f0fb85171409addf9140fd34fc27bfeedfdbfe83327
kernel-tools-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 3092c2f741471489265aadca1a547d7619c2af78e677086f60336804bb0aae2f
kernel-tools-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 3092c2f741471489265aadca1a547d7619c2af78e677086f60336804bb0aae2f
kernel-tools-libs-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: bea90165f253eed7ff16a4caa62d183e7e818de5cfdf1645c09a965e508e68ae
kernel-tools-libs-devel-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 42a87510096537f26bc52606713737ba07e5cf7bef8c4002ca45f502af3d3127
perf-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 9aec33098d7313509f3704f61de626c4dffeec55889e91efb0740af07c6c2589
perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 07e790d1562224823a6057910ea55be8807f6cdc2f8b2077edce6b12de13686d
perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 07e790d1562224823a6057910ea55be8807f6cdc2f8b2077edce6b12de13686d
python-perf-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 6d40aaf8db1d817f82a8fdab800e5401006dcd6c538ce1e0c6dd95b5c52b0847
python-perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 7622159ca5b6ecc334f9773ee06995e18386ed1a7d20edafd8307b684b09b81d
python-perf-debuginfo-3.10.0-229.24.2.el7.ppc64.rpm SHA-256: 7622159ca5b6ecc334f9773ee06995e18386ed1a7d20edafd8307b684b09b81d

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.24.2.ael7b.src.rpm SHA-256: b3fcf31f16c610f19a562c9dbe863f8ce3210bcc8580b3a41f50888cc464ccec
ppc64le
kernel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 8a205a09fab98fb2a2eacbe62f9a1702ad12ea6db4a069234a6fb8a7f626e697
kernel-abi-whitelists-3.10.0-229.24.2.ael7b.noarch.rpm SHA-256: 7016dd99007a1f19b97ae934735b3968da8582d1e22f54c61ec34a05c2e437b0
kernel-bootwrapper-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 2ebc6e56cbfdf592e7850ccf9c4208e939b55ec71abfa3fbea9675623ce697b8
kernel-debug-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: a02b627f42823122d75076c165c22257cc182926e8bdd8eee030a611fc90049d
kernel-debug-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 5781408af20b0647b84fde40cfb9bc698c098dda7686ed0625db9aa03a9efeaf
kernel-debug-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 5781408af20b0647b84fde40cfb9bc698c098dda7686ed0625db9aa03a9efeaf
kernel-debug-devel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: f356532dfa1fcda66908d7e594239b7a4af27b16863a3958ca5113eca82e5656
kernel-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 8e40e41b52b59cf67408ff6a31ebdbc9a89436a538f0e83fc750d8e94ad0825b
kernel-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 8e40e41b52b59cf67408ff6a31ebdbc9a89436a538f0e83fc750d8e94ad0825b
kernel-debuginfo-common-ppc64le-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 1dc65aa51d1d3eaaaa54a7e5ce8cf95eee915ada589ad2ff02c15915341f14a3
kernel-debuginfo-common-ppc64le-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 1dc65aa51d1d3eaaaa54a7e5ce8cf95eee915ada589ad2ff02c15915341f14a3
kernel-devel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 2d61a1e4d4cc653f15c5077e07438532fddf05ab76c8d5625ab79e2e3ceff440
kernel-doc-3.10.0-229.24.2.ael7b.noarch.rpm SHA-256: 2f74bf5f886cdc5649141f27f44b98a15702641a22503e530b607e5b09fc94cd
kernel-headers-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 738897c0344d47a0a03345ebf09cb9f56fb9540f7148c4fb5028f52d292f5a28
kernel-tools-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 5bcbaf02329c90cc79b97166b7fea3f74d9b46e0e5f2b0a9a751ef6730ed9a9f
kernel-tools-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 6d9492a927352e13529b47ec2b3843ac0b57ca41ccb9e7634a601f47707d027a
kernel-tools-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 6d9492a927352e13529b47ec2b3843ac0b57ca41ccb9e7634a601f47707d027a
kernel-tools-libs-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: ce3f615e0226fa14e1d482cc9d5eb0ed675974e3abf27d32b8bc59639f0b2160
kernel-tools-libs-devel-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: c60094b073edb3df38e4637b71debe2f53207740162b89a28b59dd37eaafee4d
perf-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 125d22e4f47ee84df0a82f260872e2f1abc9c7f47916288ae3e1675d86afe3f1
perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d8210cbb07e0e908f0cfe2ac46e97a20d689a05c21258c5f73840d05eed20615
perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d8210cbb07e0e908f0cfe2ac46e97a20d689a05c21258c5f73840d05eed20615
python-perf-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: 6e4671e6b3de4946154c8ac8b0307122f669542a12700b372fb6176d8e03e1c7
python-perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d3c17ad20603bd00852e5d6945b8f0a1a237bb5733e4af55c02f15e6278c382f
python-perf-debuginfo-3.10.0-229.24.2.ael7b.ppc64le.rpm SHA-256: d3c17ad20603bd00852e5d6945b8f0a1a237bb5733e4af55c02f15e6278c382f

Red Hat Enterprise Linux EUS Compute Node 7.1

SRPM
kernel-3.10.0-229.24.2.el7.src.rpm SHA-256: 9e2e3037e715763968dcca68a56e97648d56067373f0df8a2c1f72e133e7a99f
x86_64
kernel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 51ff46460e37b9e61624d750882d27c8427d9cf813a50a84068090ebb407bd8a
kernel-abi-whitelists-3.10.0-229.24.2.el7.noarch.rpm SHA-256: ebe8e9417e044dc0dbba5a465e63aa6bbb7cf8ffc017fdc36345706e4a6fbe36
kernel-debug-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 37d03aa7b2679252d9468b2aca34f050abdabd21d898e348b90b2ddf72536c8a
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 41f76140bf28b6a4ebeb730ae373f0bfdbbda022e94b41c7a24859837394da17
kernel-debug-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c1304e3693e839f681e7b3853d775d8e032920e3317b214792a1784cfb509cf3
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 384d3385567e7e2d61dfae99e6177ecb9a5652b5ca0becaec9593625dd0b49e4
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-debuginfo-common-x86_64-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 81b0b5beae9fcc7ce55023e7f563113810cdfe5ef7fa4809c99f3a14f0f9eec3
kernel-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c724034e4d2be561a6e562ede447033db7d915e40be41cc58abb25681a960e45
kernel-doc-3.10.0-229.24.2.el7.noarch.rpm SHA-256: 8887d2a2aee6425e588ec95e38ca10e1b48ee3afbe03b5ccad64c0cd5a96e4be
kernel-headers-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: a59d77395ea9b6b444e5bd3f2bd0ec24e157617740f350cacf27fb383b7c1c69
kernel-tools-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 44d07744bac1144e81a0f2f63f5ce7a9391dca1458cd89d973e7b7a98bc864ee
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 98223a710dfdf1cdb3ebdd7accc0825dadeccf388d6125f27c31935519ae6268
kernel-tools-libs-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 61ecb77a009acca788f9aff4cc59bc08bd0d785599fb80db5c3e147a7963adc7
kernel-tools-libs-devel-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: c5e0866254c181263abb1097015cf853d2320b40e5b676ed8085b963cdb8b498
perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 9c99f76b8542adbd231590181342f6bdff119df7e6e3d8e6d71460b2d1fc3273
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 0d55455002f6ff419350302566e010194f9cb417c65b486bfa7092fb33b8346d
python-perf-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 4a6c9b5770c2a358b1ff92d3f663de6f52f534429686982c48a874f11b33ed2e
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a
python-perf-debuginfo-3.10.0-229.24.2.el7.x86_64.rpm SHA-256: 479aa3068b76f1241673ca277b00e86828dfd6c1b2c3a343670b29b06eeb7d2a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility