Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
红帽产品勘误 RHSA-2026:3685 - Security Advisory
发布:
2026-03-03
已更新:
2026-03-03

RHSA-2026:3685 - Security Advisory

  • 概述
  • 更新的软件包

概述

Important: kernel security update

类型/严重性

Security Advisory: Important

Red Hat Lightspeed patch analysis

识别并修复受此公告影响的系统。

查看受影响的系统

标题

An update for kernel is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

描述

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation (CVE-2025-38415)
  • kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion (CVE-2025-38459)
  • kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing (CVE-2025-39760)
  • kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (CVE-2025-39817)
  • kernel: media: rc: fix races with imon_disconnect() (CVE-2025-39993)
  • kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service. (CVE-2025-40271)
  • kernel: ext4: fix use-after-free in ext4_orphan_cleanup (CVE-2022-50673)
  • kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (CVE-2025-68349)
  • kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation (CVE-2026-23074)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

解决方案

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

受影响的产品

  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390x
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64le

修复

  • BZ - 2383404 - CVE-2025-38415 kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation
  • BZ - 2383487 - CVE-2025-38459 kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion
  • BZ - 2394601 - CVE-2025-39760 kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing
  • BZ - 2395805 - CVE-2025-39817 kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
  • BZ - 2404121 - CVE-2025-39993 kernel: media: rc: fix races with imon_disconnect()
  • BZ - 2419837 - CVE-2025-40271 kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.
  • BZ - 2420347 - CVE-2022-50673 kernel: ext4: fix use-after-free in ext4_orphan_cleanup
  • BZ - 2424880 - CVE-2025-68349 kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
  • BZ - 2436791 - CVE-2026-23074 kernel: Linux kernel: Use-after-free in teql queueing discipline can lead to privilege escalation

CVE

  • CVE-2022-50673
  • CVE-2025-38415
  • CVE-2025-38459
  • CVE-2025-39760
  • CVE-2025-39817
  • CVE-2025-39993
  • CVE-2025-40271
  • CVE-2025-68349
  • CVE-2026-23074

参考

  • https://access.redhat.com/security/updates/classification/#important
注:: 可能有这些软件包的更新版本。 点击软件包名称查看详情。

Red Hat Enterprise Linux Server - Extended Life Cycle Support 7

SRPM
kernel-3.10.0-1160.147.1.el7.src.rpm SHA-256: 0772816011d85b39cf9b036c58c012c4efaab55225a692f8e2023079a3812b23
x86_64
bpftool-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 493ef7010a8ac27ed8ba09a78eb8b467b701596c644b17df1a2f5572cadccdf6
bpftool-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 909c90ffcc29435033403b1aa1de0add82e308159db1e8fd87b890bb9456806a
bpftool-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 909c90ffcc29435033403b1aa1de0add82e308159db1e8fd87b890bb9456806a
kernel-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 0947ec38b01bbda62bef96a03d9ba5444553089cbfbf28380baeeca9b0dbe8fb
kernel-abi-whitelists-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 71805b29b8518dfec5f9398bcc6c2594ffb6f4bb9585fe88056957c26db983fb
kernel-debug-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 43c1678a0a53fa7313a7a6295d2315d010c3c11f2a9c6809f975e033fa0319c6
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 726d707ecffd7c2541f15f6a999b7ead5d009a729d7869cc21a232eb412de1a8
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 726d707ecffd7c2541f15f6a999b7ead5d009a729d7869cc21a232eb412de1a8
kernel-debug-devel-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: ff6d4b3d56444b13326379e68b1b28305d1970c59031545ee9826a5b88f54b3a
kernel-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: bc3c2b2b7dd677ba0d7b5cc07f2ceec8dcf431984410cf0c6eac7f0532ec17e6
kernel-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: bc3c2b2b7dd677ba0d7b5cc07f2ceec8dcf431984410cf0c6eac7f0532ec17e6
kernel-debuginfo-common-x86_64-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 70d2c97441f08a4c5a4f57f8c90a9f901c3a135c898e7cee1957f1fae5af4416
kernel-debuginfo-common-x86_64-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 70d2c97441f08a4c5a4f57f8c90a9f901c3a135c898e7cee1957f1fae5af4416
kernel-devel-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: dec6aa0997a605d16779f8edd57cb8b4ecf90c188667b9247e4133fcb6acb7cd
kernel-doc-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 1c4662d16d96dd25e4875ba0b3fda8c1db0b7ac1dadb68be0c0cfdac0347618b
kernel-headers-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 78e622ae934a8e7846f33ec46ad9287dfacfad1811892283f248d23ccda96a1c
kernel-tools-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: d974316d34075d670ae776d76ca42aa399df3282ce9bce2922e626bd5833abee
kernel-tools-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 767f4700156e18f564dab54c7931116d5cc629bfadb025f9bd43110f785b1a3a
kernel-tools-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 767f4700156e18f564dab54c7931116d5cc629bfadb025f9bd43110f785b1a3a
kernel-tools-libs-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 485653b7773d73a78fc74f419cb45a0ca23bd130da7b7872e2aafe02a0626be6
kernel-tools-libs-devel-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 35a855b721d916f9679b4e761b0e3440b9a2e8b1b987e3b5676ed5073aae0f50
perf-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: d9cb63d22b6d62ae6b3922148c16f840253879f0997af3b3f4a86c31600c83e3
perf-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 3c004c56f233dc1f9daefa74b0a22508058118a6f832f4eeda34cf650f2d9b06
perf-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 3c004c56f233dc1f9daefa74b0a22508058118a6f832f4eeda34cf650f2d9b06
python-perf-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 3020d5e0bff4098ef42180d9319db241cf02b1b9ba763740484ff319528c9b67
python-perf-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 3f0159e3cff6e8965b491dd210d82e01af9638b31fa0c0b5f78ac177fc35ed91
python-perf-debuginfo-3.10.0-1160.147.1.el7.x86_64.rpm SHA-256: 3f0159e3cff6e8965b491dd210d82e01af9638b31fa0c0b5f78ac177fc35ed91

Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7

SRPM
kernel-3.10.0-1160.147.1.el7.src.rpm SHA-256: 0772816011d85b39cf9b036c58c012c4efaab55225a692f8e2023079a3812b23
s390x
bpftool-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: e13dc6bc6c9c0499260086d00e6dd96df9448c88a82e0d9a0f80bfdba99c1eac
bpftool-debuginfo-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 4bf7dc2f5ef104d70fa9f996dbe6ba9ed08ab338423ed5b101d6dddac5a048ee
kernel-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: da330048964aab9ca49936260e135ffb857f2c266da50c87920363ba2f77bbe0
kernel-abi-whitelists-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 71805b29b8518dfec5f9398bcc6c2594ffb6f4bb9585fe88056957c26db983fb
kernel-debug-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 3aeaab2bbb2cd46a8db6d11952e892b54656d25b0788f828cd12a9f5578c76cf
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 48d4849cae05e074268487f5ab2de2566f970c1fb9fd8cc5457d59f5ea698ee8
kernel-debug-devel-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: c28e8427bfd14fc84b536fde6d0fa526ffc6a4eba22ac7910d8583bd4f3c7079
kernel-debuginfo-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: e12ae5cc02a60064b6d71ae2962d952622aa6826e3d7840361ecabfbcf03cf8f
kernel-debuginfo-common-s390x-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: fa8b421ad079373b8fe0c5574a5238df6ddc421ea0a67227c0f29d8713095181
kernel-devel-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: d19f0c952024f718b518f930546a06f6789326b055d102f036e75c45fc37ed85
kernel-doc-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 1c4662d16d96dd25e4875ba0b3fda8c1db0b7ac1dadb68be0c0cfdac0347618b
kernel-headers-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 1ba662dd8a3ca88a0c7aaa0aa2e4a77ac8071944ae0fc9a123639b12bf1bf726
kernel-kdump-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 2d4b1a1aa07cfa00078bfc5450064efa33d9ccd58aab1d7aa7cb0f6a43205371
kernel-kdump-debuginfo-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 4db9d797aa98f1fa0cdf0f31461f615b108bda62b06b8bc1ee80b838005fb95d
kernel-kdump-devel-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 7dc735dabeb819b3d1430c777004709a63af9a1b2fc1c27aa6524f5a6116fb6a
perf-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: a623a68b198043aecce6fbad488b33d56e5eb34c17122c8ea9a21ccf635b095c
perf-debuginfo-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 1eb1ca9cbd4017aa8ab35d8427e23741822c4459a752500c78e79052356f948c
python-perf-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: 72078e1fab87a59dd5f78abdb6ee56716b9e28da29e7ae422e26a918c2413403
python-perf-debuginfo-3.10.0-1160.147.1.el7.s390x.rpm SHA-256: f5cee3c02de3581903ecf8ce112332e9ea10567259444351a2f737db468faf9f

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7

SRPM
kernel-3.10.0-1160.147.1.el7.src.rpm SHA-256: 0772816011d85b39cf9b036c58c012c4efaab55225a692f8e2023079a3812b23
ppc64
bpftool-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 13a4ed283f73d148a9dc34f3396e234f07d337f70695ff0be0e592ce0c386dd7
bpftool-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 39a272714bb6d21ed552e27e67955e90cc21a5859f726d525a2bf499bef47f7d
bpftool-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 39a272714bb6d21ed552e27e67955e90cc21a5859f726d525a2bf499bef47f7d
kernel-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: d2a45b41164fd229a97746d084aac971398f61143e1238479fbb9ef15e0ed098
kernel-abi-whitelists-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 71805b29b8518dfec5f9398bcc6c2594ffb6f4bb9585fe88056957c26db983fb
kernel-bootwrapper-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 215941d540fedd5b5ba9c50f04d7ecaca99b6cd4658d41fa2c1c2c6c334f83b1
kernel-debug-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 9a6d430af99d51303e1d75aa579afc99f31d8d51d4881849e9bc48931d963506
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: a521bf624fc8c4d38b694f6db5b4aa694103d42c38ac2aab4e7b8a37017a37d4
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: a521bf624fc8c4d38b694f6db5b4aa694103d42c38ac2aab4e7b8a37017a37d4
kernel-debug-devel-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 12b34b15e5cb45ffd28dbc1f6acc9ecd98abe652739967219565028a997f3fa6
kernel-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 803a0b5126abe0a7f8b1bf50c776f43ee387b06624597b779c7b5b0b0fc54a39
kernel-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 803a0b5126abe0a7f8b1bf50c776f43ee387b06624597b779c7b5b0b0fc54a39
kernel-debuginfo-common-ppc64-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: a417c64699b147dd388671fd934cf364bd44e43de79b28acf784e5a77694d30f
kernel-debuginfo-common-ppc64-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: a417c64699b147dd388671fd934cf364bd44e43de79b28acf784e5a77694d30f
kernel-devel-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 92b007b32e238c6368b03f0606c98d4bcc9a7ad15b29851c226c9110c5efaa68
kernel-doc-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 1c4662d16d96dd25e4875ba0b3fda8c1db0b7ac1dadb68be0c0cfdac0347618b
kernel-headers-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 9ad77cbab15b47e1ef31668b78dd86bc4c4c958cf98b817e488dd053d6398eb8
kernel-tools-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: d3646e7548d734ed47bce2ee0584fe3001859f5490c06d07eb34d7b662b8605f
kernel-tools-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 1ee59b04f7cd73274434ba5fa436c0b795a3d9a318a802442ca60c3f094fde31
kernel-tools-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 1ee59b04f7cd73274434ba5fa436c0b795a3d9a318a802442ca60c3f094fde31
kernel-tools-libs-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 64ab629623746da559a8a5fe58ed46e59e2808112381879db95d9f680c7be93b
kernel-tools-libs-devel-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 0e068594dbebb5484596428e30995db98d594b0e78a7d9837b1c351418f0d245
perf-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: c9e0cd7df06d24474ab7c0d494a99c351d2ea5032e4d21901b393bc407fd29f7
perf-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 586b744ba25c3578df1c6ad7b7afed89eb645588d52dde9c10d67039779efe19
perf-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 586b744ba25c3578df1c6ad7b7afed89eb645588d52dde9c10d67039779efe19
python-perf-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: a9a384fc94d78b8c371782423ee6746b8937e9f4e52a04ebff2b01b44adc6006
python-perf-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 92b265fe54044bffed3f8c997a5f058dcda0dda78b916f73aa908622fd0de263
python-perf-debuginfo-3.10.0-1160.147.1.el7.ppc64.rpm SHA-256: 92b265fe54044bffed3f8c997a5f058dcda0dda78b916f73aa908622fd0de263

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7

SRPM
kernel-3.10.0-1160.147.1.el7.src.rpm SHA-256: 0772816011d85b39cf9b036c58c012c4efaab55225a692f8e2023079a3812b23
ppc64le
bpftool-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 4851da9789b981e973a2993f27e6be29396032f8e111333a579259d041bf0ae3
bpftool-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 6c1562284c17904bb3c56bb175202fd6ba2926583b243b0bf8a78f6b047d7f13
bpftool-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 6c1562284c17904bb3c56bb175202fd6ba2926583b243b0bf8a78f6b047d7f13
kernel-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: f6c94bdad595d596024838b4694de7e6dbcefc2bea736d5aac5db6be66068dce
kernel-abi-whitelists-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 71805b29b8518dfec5f9398bcc6c2594ffb6f4bb9585fe88056957c26db983fb
kernel-bootwrapper-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 1d72510cdc0efc3dd9c49eb5b89b81e33c7bf185f5fa8ea087cc6247225699e8
kernel-debug-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 7a8efe0432eb06773baaa4a75258a57153acffdac4130fe4077eb8e90dfbe704
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: b429f563aef8c79044dea83e81dbda336005249508beea981324bd5e86dff998
kernel-debug-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: b429f563aef8c79044dea83e81dbda336005249508beea981324bd5e86dff998
kernel-debug-devel-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: b91a5c4eff7ac94bbf7b2eac426757110d284d349d370baa4a9214adf1569f27
kernel-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 6a6b2a46ac5c7df8776d0d0b1a237c7b078d55214522a730b61335cb133603f3
kernel-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 6a6b2a46ac5c7df8776d0d0b1a237c7b078d55214522a730b61335cb133603f3
kernel-debuginfo-common-ppc64le-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 6eee93a5dca3535835959b18b23859d6a63f5cc2acd0b28fdd75031fb0f01be2
kernel-debuginfo-common-ppc64le-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 6eee93a5dca3535835959b18b23859d6a63f5cc2acd0b28fdd75031fb0f01be2
kernel-devel-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 0b120cb6340b8d4d77c580e540446465e973054373d7509c7ddb5a12f10dd0f0
kernel-doc-3.10.0-1160.147.1.el7.noarch.rpm SHA-256: 1c4662d16d96dd25e4875ba0b3fda8c1db0b7ac1dadb68be0c0cfdac0347618b
kernel-headers-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 2c96ec3d2d2a40017a970c00e415965775e09b720a6e3180dc5b215cbbc34ade
kernel-tools-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 1ba78fc461d30139976ca137dffb1572a76f27c004f597d6e6b1f89c1ccffa59
kernel-tools-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 60b61c79bf877afb2ce252500207ba438e3f4cad9b7ecbf4b35f069d18f7d8ae
kernel-tools-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 60b61c79bf877afb2ce252500207ba438e3f4cad9b7ecbf4b35f069d18f7d8ae
kernel-tools-libs-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 549835c6787daeda701e0ff20319db7da29250925b9b6054caf98557dab933a6
kernel-tools-libs-devel-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 10b507f7a85eab2034a80b97d17a48be483e6a3792589648eebe77c720c4a595
perf-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: d785f3b4d8de27f7d93bdcca5d701f4a5072eafff3e9f066505c54022a3b86c7
perf-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 759414710445ed901c160473c7392298722b668bdef9f596a96c65852f45df49
perf-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: 759414710445ed901c160473c7392298722b668bdef9f596a96c65852f45df49
python-perf-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: af894b79930c2b69d662868dedcee72821e09f34daaaa3523bd2551eb439f916
python-perf-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: a3f1d8466b85891c222208075e3e376e57d46f061c3143b646b2fc0b37146305
python-perf-debuginfo-3.10.0-1160.147.1.el7.ppc64le.rpm SHA-256: a3f1d8466b85891c222208075e3e376e57d46f061c3143b646b2fc0b37146305

Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility