Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2016:0103 - Security Advisory
Issued:
2016-02-02
Updated:
2016-02-02

RHSA-2016:0103 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security, bug fix, and enhancement update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix three security issues, multiple bugs, and
one enhancement are now available for Red Hat Enterprise Linux 7.1 Extended
Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

  • It was found that the x86 ISA (Instruction Set Architecture) is prone to

a denial of service attack inside a virtualized environment in the form of
an infinite loop in the microcode due to the way (sequential) delivering of
benign exceptions such as #DB (debug exception) is handled. A privileged
user inside a guest could use this flaw to create denial of service
conditions on the host kernel. (CVE-2015-8104, Important)

  • A use-after-free flaw was found in the way the Linux kernel's key

management subsystem handled keyring object reference counting in certain
error path of the join_session_keyring() function. A local, unprivileged
user could use this flaw to escalate their privileges on the system.
(CVE-2016-0728, Important)

  • It was found that the fix for CVE-2015-1805 incorrectly kept buffer

offset and buffer length in sync on a failed atomic read, potentially
resulting in a pipe buffer state corruption. A local, unprivileged user
could use this flaw to crash the system or leak kernel memory to user
space. (CVE-2016-0774, Moderate)

Red Hat would like to thank the Perception Point research team for
reporting the CVE-2016-0728 issue. The security impact of the CVE-2016-0774
issue was discovered by Red Hat.

Bug fixes:

  • NMI watchdog of guests using legacy LVT0-based NMI delivery did not work

with APICv. Now, NMI works with LVT0 regardless of APICv. (BZ#1244726)

  • Parallel file-extending direct I/O writes could previously race to update

the size of the file. If they executed out-of-order, the file size could
move backwards and push a previously completed write beyond the end of the
file, causing it to be lost. (BZ#1258942)

  • The GHES NMI handler had a global spin lock that significantly increased

the latency of each perf sample collection. This update simplifies locking
inside the handler. (BZ#1280200)

  • Sometimes, iptables rules are updated along with ip rules, and routes are

reloaded. Previously, skb->sk was mistakenly attached to some IPv6
forwarding traffic packets, which could cause kernel panic. Now, such
packets are checked and not processed. (BZ#1281700)

  • The NUMA node was not reported for PCI adapters, which affected every

POWER system deployed with Red Hat Enterprise Linux 7 and caused
significant decrease in the system performance. (BZ#1283525)

  • Processing packets with a lot of different IPv6 source addresses caused

the kernel to return warnings concerning soft-lockups due to high lock
contention and latency increase. (BZ#1285369)

  • Running edge triggered interrupts with an ack notifier when

simultaneously reconfiguring the Intel I/O IOAPIC did not work correctly,
so EOI in the interrupt did not cause a VM to exit if APICv was enabled.
Consequently, the VM sometimes became unresponsive. (BZ#1287001)

  • Block device readahead was artificially limited, so the read performance

was poor, especially on RAID devices. Now, per-device readahead limits are
used for each device, which has improved read performance. (BZ#1287548)

  • Identical expectations could not be tracked simultaneously even if they

resided in different connection tracking zones. Now, an expectation insert
attempt is rejected only if the zone is also identical. (BZ#1290093)

  • The storvsc kernel driver for Microsoft Hyper-V storage was setting

incorrect SRB flags, and Red Hat Enterprise Linux 7 guests running on
Microsoft Hyper-V were experiencing slow I/O as well as I/O failures when
they were connected to a virtual SAN. Now, SRB flags are set correctly.
(BZ#1290095)

  • When a NUMA system with no memory in node 0 was used, the system

terminated unexpectedly during boot or when using OpenVSwitch. Now, the
kernel tries to allocate memory from other nodes when node 0 is not
present. (BZ#1300950)

Enhancement:

  • IPsec has been updated to provide many fixes and some enhancements.

Of particular note is the ability to match on outgoing interfaces.
(BZ#1287407)

Solution

All kernel users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add this
enhancement. The system must be rebooted for this update to take effect.

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1 ppc64
  • Red Hat Enterprise Linux EUS Compute Node 7.1 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1 ppc64le

Fixes

  • BZ - 1278496 - CVE-2015-8104 virt: guest to host DoS by triggering an infinite loop in microcode via #DB exception
  • BZ - 1297475 - CVE-2016-0728 kernel: Possible use-after-free vulnerability in keyring facility
  • BZ - 1303961 - CVE-2016-0774 kernel: pipe buffer state corruption after unsuccessful atomic read from pipe

CVEs

  • CVE-2015-8104
  • CVE-2016-0728
  • CVE-2016-0774

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.26.2.el7.src.rpm SHA-256: 4fe2a0bbe371c5739045e00820d5a769dc780e4b00c0c0d584d5671015e92b70
x86_64
kernel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 3c4734a045dad57b6d01228793c9250bf5839a7664d510150b59f83235a4e5b9
kernel-abi-whitelists-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 74dd3ba949aefe59cda815ef06a5b7e22b750e9811e59bf4d230645ce11496f3
kernel-debug-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: c58f9623ce62ee8edf13c31dfcde048d1bd009c3f5eb6dddd8732b51f7a8b971
kernel-debug-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 9233c64c63975816d8174de97628bb9fbbf6eacc7dc0b8fa8468420c1ef94585
kernel-debug-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 9233c64c63975816d8174de97628bb9fbbf6eacc7dc0b8fa8468420c1ef94585
kernel-debug-devel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: cee603a7c1c135624bbefd744c6236d86ea42aeac73acb0cd666d273c0b54bed
kernel-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: c3a624027ce79c26e5396e17b7eb95f4d9fb522719e95231f515db76c94c2504
kernel-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: c3a624027ce79c26e5396e17b7eb95f4d9fb522719e95231f515db76c94c2504
kernel-debuginfo-common-x86_64-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 482450a3e51becda0a40d406540fa073d737fd52d94abe5e465b4b0f12d63df6
kernel-debuginfo-common-x86_64-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 482450a3e51becda0a40d406540fa073d737fd52d94abe5e465b4b0f12d63df6
kernel-devel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: a73d4decc9742cb7d91e42caa20b00f1476140c91a29a50da4a487c8cbb07684
kernel-doc-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 796b35e5ecac923e5517ffd98679e9a1586701d4f36b72b211a92209466ab444
kernel-headers-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 83bd5eb3fc50ffebdec317f40c11a05c83e79b14ec9b8916fe4b75fcd8e9de39
kernel-tools-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 0bf42830c51f4a8447288d55c71fcb03584e763ee89266c32b14e228fccb434f
kernel-tools-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 253e7dba740590e123ebed985a78d1575cd49e0d378b9d2601e38b3d2a899e6f
kernel-tools-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 253e7dba740590e123ebed985a78d1575cd49e0d378b9d2601e38b3d2a899e6f
kernel-tools-libs-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 1d9b45aea12b8f5ec235b93f1bd9a24443145540594c7779bf1184e29ef8e068
kernel-tools-libs-devel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 5c3c5816b7690833b508c33566be19af513339cf0246f6de0f7f18ff1f141dc4
perf-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 4f164e7ed42149d20e40e29383f2b347466096ab217ef273ebcab6abbe364aea
perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: e0526229887bfb7244f8952657451bf20346ed19937d01e3e2e8da34a2ba0c66
perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: e0526229887bfb7244f8952657451bf20346ed19937d01e3e2e8da34a2ba0c66
python-perf-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 531caacada0a10e009ac26e30e79d620609379ae974cbdd82cc16030428b741f
python-perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 8e76c99257753d3542af628ab6d6272555f93821fc2649345cb7564e96427eb8
python-perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 8e76c99257753d3542af628ab6d6272555f93821fc2649345cb7564e96427eb8

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.26.2.el7.src.rpm SHA-256: 4fe2a0bbe371c5739045e00820d5a769dc780e4b00c0c0d584d5671015e92b70
s390x
kernel-3.10.0-229.26.2.el7.s390x.rpm SHA-256: af0fad803fa2e086cd6773a35f181a4ea38158d1c6eb22b2ce2e9f07ff5856a5
kernel-abi-whitelists-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 74dd3ba949aefe59cda815ef06a5b7e22b750e9811e59bf4d230645ce11496f3
kernel-debug-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 8a244010048f62f3c92d1cc91789d52bbf646b57b072eeb8df92929853b82bb8
kernel-debug-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: d5fe942ec8c1fce172ef88105ba49f422e795a84c6be4fdb08f3f1d4db860584
kernel-debug-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: d5fe942ec8c1fce172ef88105ba49f422e795a84c6be4fdb08f3f1d4db860584
kernel-debug-devel-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 4613fdc5490541bc2a3f2ce832c18151724a5c4d0b702485ebbe7fea1d7f8e7b
kernel-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: df7d1a7c33f40b2910db7de58dacd1b6797ed0d45980bfd9a8b1d6cf9e3599fd
kernel-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: df7d1a7c33f40b2910db7de58dacd1b6797ed0d45980bfd9a8b1d6cf9e3599fd
kernel-debuginfo-common-s390x-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 7ab32f3ffc5f39f9e75826863ea2c87469997a5b21bebe45027eb6628610424a
kernel-debuginfo-common-s390x-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 7ab32f3ffc5f39f9e75826863ea2c87469997a5b21bebe45027eb6628610424a
kernel-devel-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 65d32bdf907c4f74fc23b6254179e8a64d3a65f60009d6b1358164d190a69347
kernel-doc-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 796b35e5ecac923e5517ffd98679e9a1586701d4f36b72b211a92209466ab444
kernel-headers-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 6fdfdf2ae41fd2ea292281b33a195521a83c0446b14c9375b1a85725545d1139
kernel-kdump-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 4a2fc11a13547cef64d8cd23b966f5a39c4c8149ae5f062587a99e6e5aad25bd
kernel-kdump-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 6b485368c16bd28c28ab07b30206e274fccfca16bce96135e70faca43653d46e
kernel-kdump-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 6b485368c16bd28c28ab07b30206e274fccfca16bce96135e70faca43653d46e
kernel-kdump-devel-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 70bcad4eca3c36ef4a19717bf49086cc7530edc52bb4936998d6e4649bbfac37
perf-3.10.0-229.26.2.el7.s390x.rpm SHA-256: 534929fa6924dc8634fb1fbb1975066b10224d7df7fb03c24ec47d1c1a6c831e
perf-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: d65671e148444fabd550f3d5749503da268de9f4ff57a1f6148df2c56c2ff411
perf-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: d65671e148444fabd550f3d5749503da268de9f4ff57a1f6148df2c56c2ff411
python-perf-3.10.0-229.26.2.el7.s390x.rpm SHA-256: b2b69f1cdff42f7076655812498b19d860ba52ce9a7fc184e6f953f97f6d693e
python-perf-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: de66d69752c0adfe5b938400db3a49e15d0355cf7597dabe90f82b9e2709d508
python-perf-debuginfo-3.10.0-229.26.2.el7.s390x.rpm SHA-256: de66d69752c0adfe5b938400db3a49e15d0355cf7597dabe90f82b9e2709d508

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.26.2.el7.src.rpm SHA-256: 4fe2a0bbe371c5739045e00820d5a769dc780e4b00c0c0d584d5671015e92b70
ppc64
kernel-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: a39769c3eca5a8edf3c4b2a96b8fbc2698cad91dd78fcb4192ecdd3f04422c5d
kernel-abi-whitelists-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 74dd3ba949aefe59cda815ef06a5b7e22b750e9811e59bf4d230645ce11496f3
kernel-bootwrapper-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: ef7d5ced072167042028d0cb74797ae247fe8ae576ab78fd0b4cdfdffe8269ad
kernel-debug-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 64adbdcc30175e2ec015f073b7d9698b519579444fc4574785aa40cc1e2a8be5
kernel-debug-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 2cef640a550569aa371e95e90c49a3d2c8da46b1c00e61caffae4f888f5bec52
kernel-debug-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 2cef640a550569aa371e95e90c49a3d2c8da46b1c00e61caffae4f888f5bec52
kernel-debug-devel-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 4080f0e1cc1cad4296a049a3590771367e8f5b411a5e9f5fa12e170c1269f82a
kernel-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 6e4e2282a894cd2f9627c19a97e8e6289c5f9d9bce8c9975feb14b1d0349b02c
kernel-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 6e4e2282a894cd2f9627c19a97e8e6289c5f9d9bce8c9975feb14b1d0349b02c
kernel-debuginfo-common-ppc64-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 146c51330bef68ec6c711ce5be005fa55fe627b8a1694e8319d5f8e1e06674e9
kernel-debuginfo-common-ppc64-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 146c51330bef68ec6c711ce5be005fa55fe627b8a1694e8319d5f8e1e06674e9
kernel-devel-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: aff59223a31dd8ac7abb1c6abadeb57f467dd720ccd9165bc61d41c70605e71f
kernel-doc-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 796b35e5ecac923e5517ffd98679e9a1586701d4f36b72b211a92209466ab444
kernel-headers-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: e730aee134e7420ce2d5aad12e2411fa86a65bc8731e12a4e47dd76cafcf962f
kernel-tools-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 0a7fe230953adb85dbb228de420c5058f875f068a85e8806528d922ad926e208
kernel-tools-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 5e06f0e46804d3295d8a9660721a81e2331fa4c656fc41d49e738a41ef0027d7
kernel-tools-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 5e06f0e46804d3295d8a9660721a81e2331fa4c656fc41d49e738a41ef0027d7
kernel-tools-libs-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 034b9927545fcbd7a8ef40bca54358dc587b60e02859943389c6a261bd1718ed
kernel-tools-libs-devel-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: dd0ea2ff00c8fc343b22e35009948a6c82b85361121a716afdb5a64c7f4164ed
perf-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 73f293184fadf2fcb740cd895925887d8b7dbc54ba583f809bae5900e8e5387b
perf-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: dd9963d0f374534334c9e29f114334be0416aa8fb5b84d4e948654bc5596176c
perf-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: dd9963d0f374534334c9e29f114334be0416aa8fb5b84d4e948654bc5596176c
python-perf-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 8452e6705f69ac6309283213b98798d271fd65d4e4cf645bcc5a18cdc82a77d0
python-perf-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 31aa1faa541a394fa98bfef3ff628053b69343ee044cf3685f8aca3d3a495a43
python-perf-debuginfo-3.10.0-229.26.2.el7.ppc64.rpm SHA-256: 31aa1faa541a394fa98bfef3ff628053b69343ee044cf3685f8aca3d3a495a43

Red Hat Enterprise Linux EUS Compute Node 7.1

SRPM
kernel-3.10.0-229.26.2.el7.src.rpm SHA-256: 4fe2a0bbe371c5739045e00820d5a769dc780e4b00c0c0d584d5671015e92b70
x86_64
kernel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 3c4734a045dad57b6d01228793c9250bf5839a7664d510150b59f83235a4e5b9
kernel-abi-whitelists-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 74dd3ba949aefe59cda815ef06a5b7e22b750e9811e59bf4d230645ce11496f3
kernel-debug-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: c58f9623ce62ee8edf13c31dfcde048d1bd009c3f5eb6dddd8732b51f7a8b971
kernel-debug-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 9233c64c63975816d8174de97628bb9fbbf6eacc7dc0b8fa8468420c1ef94585
kernel-debug-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 9233c64c63975816d8174de97628bb9fbbf6eacc7dc0b8fa8468420c1ef94585
kernel-debug-devel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: cee603a7c1c135624bbefd744c6236d86ea42aeac73acb0cd666d273c0b54bed
kernel-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: c3a624027ce79c26e5396e17b7eb95f4d9fb522719e95231f515db76c94c2504
kernel-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: c3a624027ce79c26e5396e17b7eb95f4d9fb522719e95231f515db76c94c2504
kernel-debuginfo-common-x86_64-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 482450a3e51becda0a40d406540fa073d737fd52d94abe5e465b4b0f12d63df6
kernel-debuginfo-common-x86_64-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 482450a3e51becda0a40d406540fa073d737fd52d94abe5e465b4b0f12d63df6
kernel-devel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: a73d4decc9742cb7d91e42caa20b00f1476140c91a29a50da4a487c8cbb07684
kernel-doc-3.10.0-229.26.2.el7.noarch.rpm SHA-256: 796b35e5ecac923e5517ffd98679e9a1586701d4f36b72b211a92209466ab444
kernel-headers-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 83bd5eb3fc50ffebdec317f40c11a05c83e79b14ec9b8916fe4b75fcd8e9de39
kernel-tools-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 0bf42830c51f4a8447288d55c71fcb03584e763ee89266c32b14e228fccb434f
kernel-tools-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 253e7dba740590e123ebed985a78d1575cd49e0d378b9d2601e38b3d2a899e6f
kernel-tools-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 253e7dba740590e123ebed985a78d1575cd49e0d378b9d2601e38b3d2a899e6f
kernel-tools-libs-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 1d9b45aea12b8f5ec235b93f1bd9a24443145540594c7779bf1184e29ef8e068
kernel-tools-libs-devel-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 5c3c5816b7690833b508c33566be19af513339cf0246f6de0f7f18ff1f141dc4
perf-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 4f164e7ed42149d20e40e29383f2b347466096ab217ef273ebcab6abbe364aea
perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: e0526229887bfb7244f8952657451bf20346ed19937d01e3e2e8da34a2ba0c66
perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: e0526229887bfb7244f8952657451bf20346ed19937d01e3e2e8da34a2ba0c66
python-perf-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 531caacada0a10e009ac26e30e79d620609379ae974cbdd82cc16030428b741f
python-perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 8e76c99257753d3542af628ab6d6272555f93821fc2649345cb7564e96427eb8
python-perf-debuginfo-3.10.0-229.26.2.el7.x86_64.rpm SHA-256: 8e76c99257753d3542af628ab6d6272555f93821fc2649345cb7564e96427eb8

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1

SRPM
kernel-3.10.0-229.26.2.ael7b.src.rpm SHA-256: bacb5c85ee65b1d99433608620a2d171dc780b0174646c721a4f9ba31a728525
ppc64le
kernel-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: e4e52d2000576867e3061ee482e909a7b510797b227845c6f788dc7961215909
kernel-abi-whitelists-3.10.0-229.26.2.ael7b.noarch.rpm SHA-256: a7a7b37590fc4ac71212ace3f13cb5066045aeb8b4e5be2bc081fd197ad2c60e
kernel-bootwrapper-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 93ada7dda5ae69ae51b136c83f2118d60b9be93aa46e46fa728e9054860e81fa
kernel-debug-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 2fc054f5473bc4744beddbdddf9330cce395fc39d48cc22c380bf301d81dbdfb
kernel-debug-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 014b06ceba08c30c50fda268cd16d7d705afde2c0239716753f6dace4e294076
kernel-debug-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 014b06ceba08c30c50fda268cd16d7d705afde2c0239716753f6dace4e294076
kernel-debug-devel-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 6d9be64ecf749ebbb38c27171d32225a2e89b92c275b9a97dfa9b207877f42d1
kernel-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: cd3bd12d8ddc907a1cbae2c0652b08213849922e8eaf77e1d8406b32c161066a
kernel-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: cd3bd12d8ddc907a1cbae2c0652b08213849922e8eaf77e1d8406b32c161066a
kernel-debuginfo-common-ppc64le-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 082566d34c8c73864fadb714e396d7f958b519ff3f6793814dda3c8ee25ac4bc
kernel-debuginfo-common-ppc64le-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 082566d34c8c73864fadb714e396d7f958b519ff3f6793814dda3c8ee25ac4bc
kernel-devel-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 456486427c07d989f1c29ae65043795a6eca0e23277ff248024210107b8527d8
kernel-doc-3.10.0-229.26.2.ael7b.noarch.rpm SHA-256: 0d5d132d5ecd8ab058d0c4a98a5e7b40783a452fd83a4ed9b65be887655f77b8
kernel-headers-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 57f6fa1019e566b22902689fafd7725a7f5378fb1a6d89c84e082a8e77974d71
kernel-tools-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: c240f1f3babad6cd033a817a3aa6c43576993a91ddb9dd9d08d2a15ebb16c0e3
kernel-tools-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 22eba0178f35d4f3668b75e375303b89b6a74645d7a89cab388d494ab0a9c1fb
kernel-tools-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 22eba0178f35d4f3668b75e375303b89b6a74645d7a89cab388d494ab0a9c1fb
kernel-tools-libs-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 9e8e3c44196ad866d0b30745b6fbd3ea34b10afb12d1acff0e32538cad4d8e47
kernel-tools-libs-devel-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 6aeab792b0e13043195a2ab0013d13e9d0855bcb8f7be108e1b6926103b0243a
perf-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: f0508366b578653bd1c492a85450e13f338de91f8d15a7a00dda336527f6f273
perf-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: bf45c118887efed3b2148dc8c35b3866c5eb178b8d54299675f604d40cb6200f
perf-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: bf45c118887efed3b2148dc8c35b3866c5eb178b8d54299675f604d40cb6200f
python-perf-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: 5792050da39d8c9d1edca2b32293cf142327a78e85ca1c447aa498ec234bb16e
python-perf-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: d11541de5c0ddd1ab92a3c83f069351184e2df006d37a7292bcfaa55e3d056e2
python-perf-debuginfo-3.10.0-229.26.2.ael7b.ppc64le.rpm SHA-256: d11541de5c0ddd1ab92a3c83f069351184e2df006d37a7292bcfaa55e3d056e2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter