Home Tags Socket

Tag: Socket

10 JavaScript concepts Node.js programmers must master

Rahul Mhatre is technical architect at Built.io. With JavaScript and the V8 engine at the core, an event-driven architecture, and scalability out of the box, Node.js has quickly become the new de facto standard for creating web applications and Saa...

You only need 60 bytes to hose Linux’s rpcbind

Sigh ... people just leave it on without blocking the port world+dog knows it uses.
So patch it or close it, people A 60 byte payload sent to a UDP socket to the rpcbind service can crash its host by filling up the target's memory.…

Next-generation Xeons to come in “Gold” and “Platinum” versions

New naming scheme appears to be even less clear than the old one.

Dealmaster: Get $10 when you sign up for a 30-day Amazon...

$10 in Amazon money for trying out its music platform! What a deal.

Apple is completely redesigning the Mac Pro… again

New design coming sometime in 2018, along with a new Apple-made external display.

AMD Naples server processor: more cores, bandwidth, memory than Intel

Two-socket server chip coming in second quarter.

Dozens of popular iOS apps vulnerable to intercept of TLS-protected data

76 apps in Apple’s App Store still don’t use best practices to protect user data.

Firefox 51 Debuts with Patches for 24 Security Issues

Mozilla patches 24 security vulnerabilities in Firefox and now alerts users when they attempt to enter information into web forms that are not secure. Mozilla released its first new browser milestone of 2017 on Jan. 24, with the debut of Firefox 51.

T...

RHSA-2017:0065-1: Important: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 6.5 AdvancedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A use-after-free vulnerability was found in the kernels socket recvmmsgsubsystem.

This may allow remote attackers to corrupt memory and may allowexecution of arbitrary code.

This corruption takes place during the errorhandling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: kernel-2.6.32-431.77.1.el6.src.rpm     MD5: 3a075adc874ed1cad0cf0ad293f1eaafSHA-256: 32664ccccd3c3ffd4bfff6d46386b3b59509c6c05c021c14629c9eb89c4178d4   x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: ce35a58f0e130eb4cd9124faefcc26dcSHA-256: 854c61388182c9587b1f5b7bbb4ac3b977a50042ed693bb335c60b829e7e73ec kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm     MD5: 24c3931b1dc05ce406574b72dac495aaSHA-256: 33c775d3f08737045d3cbfbe4aaad5e6d16bf632ae2fdc1185803203f1bd5610 kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d2b71233bb4f7ded6ab582ea23053b55SHA-256: 2eb9804522ed1c767ef8a5bc6283fb41b2cbb2f05776cca308946b6ff3b7dcc3 kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 73b31b2381434d06793a29905edae217SHA-256: 0d53247daa69e80b6e2080e84f26d19822350b37394ad6c4eca3a79845385f8f kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1a825d636b4685776752377f6f0592f3SHA-256: 64a3b1fa8490a2589a61b366263d1c2751a1da652c83857f7256e56352a4b5ac kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 3e3f43ea080c524915e164cc1b2bfcd1SHA-256: 87a2657b8aa64a62ccc6bd659b00e5210d20c72018e94b4c7daa6e7c098ae8e2 kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 21d52ee9fc0f6cf9093603b65bba9fc3SHA-256: ad69bf3aeb18e4ed69624caef0457a0e7891ff079c5d5562dfa12f6c2db55a72 kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1b56ac1536479b3b21bb8ceb358c2a6eSHA-256: 985bb49475cdda19ad18963459320b46032d0b54d18359188527b129568483fe kernel-doc-2.6.32-431.77.1.el6.noarch.rpm     MD5: 902fa70945d6ee804637aa6b4fabd827SHA-256: 4b8823dffbed724a313d3b5ccdc3a9c1e31e808630510b7ae9e082b839ac1f9c kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm     MD5: b5b625bed3d9ccff8877db801bf06842SHA-256: db85c531b17efcf7464a668af2c62541b47476a7ab7f50c44fa99de5539d2b4b kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 16c7bc26d080ef3356c566baebd84266SHA-256: c3be05b0752b9c0cd20f48c458153238ebf2cb7603de60f68cedb4c56b9803ff perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 852c878b96af18015a7fcd03e2244bd2SHA-256: 72e2d6f1f775c9676ef7646f08bed60e0967e9986968e0fad05bb8958be45016 perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 83b12ed00d14fcb76d6e352b2a037c53SHA-256: 1447ee24b3d19c413f48790b88000a3efc6fa45f566303eab3b8c0a77da29cf3 python-perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d71a6a415842069a557a165234fe646cSHA-256: 73748b9e04ac1f8cca30997d8025ca150a2bd3e614feb4b4e9e1b98fd23e2929 python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 0405c7c80e61feccb72207cf153eab44SHA-256: fc92d5f09bea883e484292e5b1ba6f1b149f4c2c9dcd4f5519a219b7a7931a39   Red Hat Enterprise Linux Server TUS (v. 6.5) SRPMS: kernel-2.6.32-431.77.1.el6.src.rpm     MD5: 3a075adc874ed1cad0cf0ad293f1eaafSHA-256: 32664ccccd3c3ffd4bfff6d46386b3b59509c6c05c021c14629c9eb89c4178d4   x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: ce35a58f0e130eb4cd9124faefcc26dcSHA-256: 854c61388182c9587b1f5b7bbb4ac3b977a50042ed693bb335c60b829e7e73ec kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm     MD5: 24c3931b1dc05ce406574b72dac495aaSHA-256: 33c775d3f08737045d3cbfbe4aaad5e6d16bf632ae2fdc1185803203f1bd5610 kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d2b71233bb4f7ded6ab582ea23053b55SHA-256: 2eb9804522ed1c767ef8a5bc6283fb41b2cbb2f05776cca308946b6ff3b7dcc3 kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 73b31b2381434d06793a29905edae217SHA-256: 0d53247daa69e80b6e2080e84f26d19822350b37394ad6c4eca3a79845385f8f kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1a825d636b4685776752377f6f0592f3SHA-256: 64a3b1fa8490a2589a61b366263d1c2751a1da652c83857f7256e56352a4b5ac kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 3e3f43ea080c524915e164cc1b2bfcd1SHA-256: 87a2657b8aa64a62ccc6bd659b00e5210d20c72018e94b4c7daa6e7c098ae8e2 kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 21d52ee9fc0f6cf9093603b65bba9fc3SHA-256: ad69bf3aeb18e4ed69624caef0457a0e7891ff079c5d5562dfa12f6c2db55a72 kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1b56ac1536479b3b21bb8ceb358c2a6eSHA-256: 985bb49475cdda19ad18963459320b46032d0b54d18359188527b129568483fe kernel-doc-2.6.32-431.77.1.el6.noarch.rpm     MD5: 902fa70945d6ee804637aa6b4fabd827SHA-256: 4b8823dffbed724a313d3b5ccdc3a9c1e31e808630510b7ae9e082b839ac1f9c kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm     MD5: b5b625bed3d9ccff8877db801bf06842SHA-256: db85c531b17efcf7464a668af2c62541b47476a7ab7f50c44fa99de5539d2b4b kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 16c7bc26d080ef3356c566baebd84266SHA-256: c3be05b0752b9c0cd20f48c458153238ebf2cb7603de60f68cedb4c56b9803ff perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 852c878b96af18015a7fcd03e2244bd2SHA-256: 72e2d6f1f775c9676ef7646f08bed60e0967e9986968e0fad05bb8958be45016 perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 83b12ed00d14fcb76d6e352b2a037c53SHA-256: 1447ee24b3d19c413f48790b88000a3efc6fa45f566303eab3b8c0a77da29cf3 python-perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d71a6a415842069a557a165234fe646cSHA-256: 73748b9e04ac1f8cca30997d8025ca150a2bd3e614feb4b4e9e1b98fd23e2929 python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 0405c7c80e61feccb72207cf153eab44SHA-256: fc92d5f09bea883e484292e5b1ba6f1b149f4c2c9dcd4f5519a219b7a7931a39   (The unlinked packages above are only available from the Red Hat Network) 1382268 - CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2017:0033-1: ORBit2 bug fix update

Updated ORBit2 packages that fix one bug are now available for Red HatEnterprise Linux 6. The ORBit2 packages provide a high-performance Object Request Broker (ORB) forthe Common Object Request Broker Architecture (CORBA). ORBit allows programs tosend requests and receive replies from other programs, regardless of where theprograms are located.

CORBA is a standard that enables communication betweenprogram objects, regardless of the programming language and platform used.This update fixes the following bug:* Previously, when logging in and out, linc socket files accumulated in the/tmp/orbit-[username]/ directory.

Consequently, the /tmp file system quicklybecame full, which in some cases caused processes running on the system to fail.As a result, the described failures no longer occur. (BZ#1391976)Users of ORBit2 are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   IA-32: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   Red Hat Enterprise Linux Server (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   IA-32: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184   PPC: ORBit2-2.14.17-6.el6_8.ppc.rpm     MD5: ae42b03f828abacbdc8520dd51a01e2aSHA-256: cb1244b5b94dfa3cf339c33145d20606a8d75e30eb86e52652aff74113af65e5 ORBit2-2.14.17-6.el6_8.ppc64.rpm     MD5: c1486f11c5a1f9d912e041a7d38bff69SHA-256: eb52b129c6f79abb483d4f3d454b0b9604cee6098ea3b3508f53dc9ab9820d7b ORBit2-debuginfo-2.14.17-6.el6_8.ppc.rpm     MD5: 0d2619460a4304105eca4d32f5fbc5b8SHA-256: eea98b7604b14a293c8ad5844d09caa7ff3965443312e50087a6e6379c167c7f ORBit2-debuginfo-2.14.17-6.el6_8.ppc64.rpm     MD5: 62c3d2bf8d7679014526100420d345bbSHA-256: f22cff739c7287fba67b3d6f61e7278919e2e7a142b8a58d3178297dbf676d93 ORBit2-devel-2.14.17-6.el6_8.ppc.rpm     MD5: 15fa81d82a3da4395b48ab0837740891SHA-256: 250cacb8f8d53167edd4f1a10bd4147a3a8028a065111f92ca9ff28e08bc1217 ORBit2-devel-2.14.17-6.el6_8.ppc64.rpm     MD5: fd98d2ca3985493ad81b005dfe3cb49aSHA-256: 45f84ca0d0f345ffc526274d620c824cdb2d9860d40d66c3e5eea3feeb12acbf   s390x: ORBit2-2.14.17-6.el6_8.s390.rpm     MD5: 30f6023db9532745174e608c183a967aSHA-256: ab30c05fbb0592f9772b17ce1884ee2bd41c829aa9a2bb14f0caf07187e2cd43 ORBit2-2.14.17-6.el6_8.s390x.rpm     MD5: 02014dacecf0e5a8df601c53770ddffdSHA-256: 692073a78b4d5ae3588f21539cbe88d8025fb35b49ee7c54c22123ff7fa186fb ORBit2-debuginfo-2.14.17-6.el6_8.s390.rpm     MD5: 70d591d017336248428ed53b4e406ed5SHA-256: f3f7869591c5aad43b376669b1f4b65ffc1472d97aba7bfdf92a063ab45f3193 ORBit2-debuginfo-2.14.17-6.el6_8.s390x.rpm     MD5: 1653ac7dbf219d14fc18274381ffbc53SHA-256: e9eb251c0679270d679246469cfcc5a0f59ab42eff058f9b6d045f3235ab5ef5 ORBit2-devel-2.14.17-6.el6_8.s390.rpm     MD5: df9b3d68f8c3c8520dbb1ff521b5de87SHA-256: ae69e8e874677fb428c4b178cac7b7c744f75dc2fb3a3cce9d9ee2924ffc03b4 ORBit2-devel-2.14.17-6.el6_8.s390x.rpm     MD5: a8eb1d129b44034a720529a4417182c4SHA-256: 0a016de5a181657207af8b7129b9b66ae71729b3d974b6eee6b251f87bafc515   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   IA-32: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   (The unlinked packages above are only available from the Red Hat Network) 1391976 - Too many socket files in /tmp/orbit-user folder These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2017:0003-1: Moderate: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 7.1 ExtendedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The systemd packages contain systemd, a system and service manager for Linux,compatible with the SysV and LSB init scripts.
It provides aggressiveparallelism capabilities, uses socket and D-Bus activation for startingservices, offers on-demand starting of daemons, and keeps track of processesusing Linux cgroups.
In addition, it supports snapshotting and restoring of thesystem state, maintains mount and automount points, and implements an elaboratetransactional dependency-based service control logic.
It can also work as adrop-in replacement for sysvinit.Security Fix(es):* A flaw was found in the way systemd handled empty notification messages.

Alocal attacker could use this flaw to make systemd freeze its execution,preventing further management of system services, system shutdown, or zombieprocess collection via systemd. (CVE-2016-7796) Red Hat Enterprise Linux HPC Node EUS (v. 7.1) SRPMS: systemd-208-20.el7_1.9.src.rpm     MD5: 78f695a30355e41569098fcfd102efd0SHA-256: 02d9ea718d5a2a19e98fa851c472799d22d789c19ea5a9d8e1ca649177478dc6   x86_64: libgudev1-208-20.el7_1.9.i686.rpm     MD5: fd625b780dd51f4a3847bf6a80d2abaaSHA-256: f148607cd58eb0c360116e5fdb32e936227312466604ba798361bf37a47d7014 libgudev1-208-20.el7_1.9.x86_64.rpm     MD5: 45b8bdd5e2af6215188b3baf9777031bSHA-256: baaf3d70e45f6dd2dce4ecaed33446bc87ee494e6258d806cddbc360bffaa306 libgudev1-devel-208-20.el7_1.9.i686.rpm     MD5: 68cea3d3219095b1aea70b9fb98c490bSHA-256: b84ceee141b9b4b3cff718a7080fcb3f3a2ba04050ba483bb7bc25c173b259a3 libgudev1-devel-208-20.el7_1.9.x86_64.rpm     MD5: 4fa73ccf6fce0f46cc18e5099c7d3cbeSHA-256: 39a0d9376906c01916660cd79ed844996ef31c8f6dabc2334379429ced296314 systemd-208-20.el7_1.9.x86_64.rpm     MD5: c5605be1e59f0a3d4af0314ff03623c5SHA-256: f1a87ac3f3dd863b69f3c0261abbc09925ee7c09de880436f2787a2a9586ebfe systemd-debuginfo-208-20.el7_1.9.i686.rpm     MD5: 5c0d5919d59ecafa3af15dd00d60a797SHA-256: 8dbac60cba00664b5bffd6357012e8d10aa1fe78cf340a4a7ace4dad438478b7 systemd-debuginfo-208-20.el7_1.9.x86_64.rpm     MD5: 4221ee1263f07d3d5c3076863d071358SHA-256: 0809cae7c642ab62749ffe4675cbfe7dbbb6cbbcee4b00a1fee42b1dd4e9e0f6 systemd-devel-208-20.el7_1.9.i686.rpm     MD5: d8df9fa1c64b8fcf882f51622fc9e91dSHA-256: 433ea64bbf8588437420b710ca378336c6286af092e7fd00196fc1b60d5306d7 systemd-devel-208-20.el7_1.9.x86_64.rpm     MD5: 0a3bb0a86c8a4d9671d61ae486218da4SHA-256: a1d7c50bab81bebc5a76fb5b111ca4396f5211143e3ae7726bd5e2ebc4ddaf9e systemd-journal-gateway-208-20.el7_1.9.x86_64.rpm     MD5: d526dcc24c54b478d8406fdccfd5189fSHA-256: 5b715faca91b94815c5f4fbe7eb10fdb328bb225da5a509d01328109f6a78d94 systemd-libs-208-20.el7_1.9.i686.rpm     MD5: 7dd6e9b255cfbf37d597221084c28542SHA-256: fbe5669676648ca36fcb01cadc13ddd86f7ff2841a0b6037f018250230d33b5b systemd-libs-208-20.el7_1.9.x86_64.rpm     MD5: f404a98e1ce6b6622726b4fe72f293d8SHA-256: 4552471740a228850a5b6ee312d19addaf4040ee22bf775f4dfd4e5a3844c26b systemd-python-208-20.el7_1.9.x86_64.rpm     MD5: 75a05336562af9c0dd2b3da336a30540SHA-256: 8032d488626918742dd5d406eef96e3879348bbc052b1206afe0e24e457e99f1 systemd-sysv-208-20.el7_1.9.x86_64.rpm     MD5: 1a1ce7862c6f253d442cf3f895608a1bSHA-256: 79ce5e6f98d81216ec42e5506a73b9ad0b0f3f5115f3c8ed3ba8766c1a32803b   Red Hat Enterprise Linux Server EUS (v. 7.1) SRPMS: systemd-208-20.ael7b_1.9.src.rpm     MD5: 924089849b8731fd1f9ce953dfe777f6SHA-256: b1f9c5daa05aa31ca97d80f381136c40053e64b0b2af3e9423b9d43c254cf3ab systemd-208-20.el7_1.9.src.rpm     MD5: 78f695a30355e41569098fcfd102efd0SHA-256: 02d9ea718d5a2a19e98fa851c472799d22d789c19ea5a9d8e1ca649177478dc6   PPC: libgudev1-208-20.el7_1.9.ppc.rpm     MD5: 90a7f4cea6a64f8097f27d8c7535b45bSHA-256: 7f9427fabca9e58bab11acad503ea6b795d454cd7ff61b1c82ed4d63c9f55af9 libgudev1-208-20.el7_1.9.ppc64.rpm     MD5: 821dde6e81c88bae9da879c013751fdbSHA-256: 0c732d592f43cbef22dc7ff3513098d1b084fe59ff147ce8a6625a88ffd5fa68 libgudev1-devel-208-20.el7_1.9.ppc.rpm     MD5: 9fdf40251fdac8a695a39d1b07f1b396SHA-256: dc3cade10542a3febc2f6ef4c36744c94bd045d35db7e7ed5955aef310711928 libgudev1-devel-208-20.el7_1.9.ppc64.rpm     MD5: b35b64950b4e0e3ebeea1f671fc53bcbSHA-256: 0ececc7c3fede2dc02d8725982f30943006277865af2c02b328cbc03c8d0890f systemd-208-20.el7_1.9.ppc64.rpm     MD5: 1bb103e2e54c41fc963574aa672b16fcSHA-256: 9b76085021eac8db127f7d26dc0c1371ba5ccf36990900d9ae878c6d1852916d systemd-debuginfo-208-20.el7_1.9.ppc.rpm     MD5: 4691cd654394e93f25a41bd80854c8acSHA-256: 17dd5be4f37ade217048e8fd9b5603c3ff46667993467c61766be25c7c494396 systemd-debuginfo-208-20.el7_1.9.ppc64.rpm     MD5: f487b603cb2096d83a69d79cd8922c09SHA-256: 7c6108e3ac87fcb7191b3262d3e069a2d167ec5bfeb943d849f550d29ecdf1dd systemd-devel-208-20.el7_1.9.ppc.rpm     MD5: e018b74dc67044132ae8dafcb9df195aSHA-256: 90fd210af5379c3a4441d1ba651b18f9ce13fa7509958f109e564715a847acec systemd-devel-208-20.el7_1.9.ppc64.rpm     MD5: cf589e4fbc60e56f943d720e9f6dd803SHA-256: cfd727460e7b185ad87db2c8a45b8e052f43b749e812cf3c06f89656f80e8137 systemd-journal-gateway-208-20.el7_1.9.ppc64.rpm     MD5: 89b8876d5d53126f156bac8dd79df2a6SHA-256: 40bcf89850ca60c5c8998f047ed81435922bfd389580026d23b470a4d231edf5 systemd-libs-208-20.el7_1.9.ppc.rpm     MD5: a24d4978507a8477bd69963151ed3a29SHA-256: 485bc15144685e3cbce4a3834420d498b817c98923cb8000d00a3c34698269e3 systemd-libs-208-20.el7_1.9.ppc64.rpm     MD5: 8649109d5ff8e0b81c2db842721b8555SHA-256: 76b3bc4f4bd07f71e4f8e9b7afdd15375ef0dc2d1f7d78e08c6fa5e234734d42 systemd-python-208-20.el7_1.9.ppc64.rpm     MD5: 2613bf85155e9e6e7418bcdc725df6a9SHA-256: 22ffb5fcd2e48939c04f59e876539fff33e152ca3fd2e7ae3a1996f981a2fdee systemd-sysv-208-20.el7_1.9.ppc64.rpm     MD5: 0ee770db38334a1edc58451f4f2f3a28SHA-256: 0c2ac2f4b5af441c44c36a2ffb214ed81307cbfc57e9a347a4eeeb9064ee68aa   PPC64LE: libgudev1-208-20.ael7b_1.9.ppc64le.rpm     MD5: 4b4c301bdefd709253c8738c972de76aSHA-256: 47043d7fbf92776258673c84e3dee3d22fb988306ac88b62624af5dfa251a85e libgudev1-devel-208-20.ael7b_1.9.ppc64le.rpm     MD5: 7871c1e77097afe0743437f3c79ccf4fSHA-256: 2b2b1abe2bdc59bcab6835c5b9ce0604086eec92f22fe072755611db869833c3 systemd-208-20.ael7b_1.9.ppc64le.rpm     MD5: 21618d0caa714d9322705591ece996a4SHA-256: 62e9cdbe0db585416965eac31adbacced3f650f73420c9a431907ed49864a1bc systemd-debuginfo-208-20.ael7b_1.9.ppc64le.rpm     MD5: 355bd158ec94ee95b2357bd571a70122SHA-256: 8ee6c938cdb791560f7c9ba96582d6dcb7a6ee149f6f4c69a5f121dae1acab59 systemd-devel-208-20.ael7b_1.9.ppc64le.rpm     MD5: 358c7b344d166837a55bb4453830beaaSHA-256: 1149b929265ffdf7de1ed24e1b4a75101db0af882ad20dbb66948a79e0ec3f24 systemd-journal-gateway-208-20.ael7b_1.9.ppc64le.rpm     MD5: c9d30467339ec2da0d10136301702ff6SHA-256: 6a53e48145282ea9fd033ffe5bbb8ed5d99b5a43de25b955e9bbb96425e62eb4 systemd-libs-208-20.ael7b_1.9.ppc64le.rpm     MD5: 2f6d06cb1045e9fec6c5b7c95b3ead8dSHA-256: ff870b25f4d0156292bf7e1137df8f06b2ea6defbc59b6b8457531525922a9c4 systemd-python-208-20.ael7b_1.9.ppc64le.rpm     MD5: 5c12e7a5e15c665c477895e6703571d4SHA-256: 70e6982a503b43b81bfa3ff13838e0f1cd9b2caf6450476b8972e30bddfdea7c systemd-sysv-208-20.ael7b_1.9.ppc64le.rpm     MD5: ddc1694b3fd70deb4913a3c055185846SHA-256: cc05669e785f54099f4d93e93d4a7e935cff6b8ffbd86fe874620a5fd6857684   s390x: libgudev1-208-20.el7_1.9.s390.rpm     MD5: 5a0541b08c5ef4ac1fd358b22111b89aSHA-256: 54e5daa0d5ff1bc4368404e044c77e9a46519780ee7fdfd286f21d18b845e262 libgudev1-208-20.el7_1.9.s390x.rpm     MD5: 667de9720b5031a5a380ab6c7f425eaeSHA-256: 7ce3a65c27b10cfb26803788eea88a373c5ed37e04b0c237091b79e910741440 libgudev1-devel-208-20.el7_1.9.s390.rpm     MD5: 3f949f3f03684bb471b705f6d467606bSHA-256: 1dd9ab69968baef634b795700db559ee029a31bbf519aff4c44374fcdc39f385 libgudev1-devel-208-20.el7_1.9.s390x.rpm     MD5: 63b7a73199dd5bf68ee4658eb5f4b393SHA-256: a2ef16b02b398a4088a5002b3953cbbd5f86988bc64f2a29b12032223a5bdc23 systemd-208-20.el7_1.9.s390x.rpm     MD5: 9ba85aeb15b98fd02bee4e751f0f4502SHA-256: 29426f813b7747a73c04345202948bbb7f9573ec64ef1c83bb4d0dd8f9f3f04f systemd-debuginfo-208-20.el7_1.9.s390.rpm     MD5: a7e8dcb16a07601157fb1527805be175SHA-256: f0f793fb7486582ba98d765cb40b55d78d8538758b22ab4de6b8826f5da3f087 systemd-debuginfo-208-20.el7_1.9.s390x.rpm     MD5: 084e3625ff3d5f04bb7155b91e21313bSHA-256: ed4752479b2da64368df5f69a0c16d1522c5e8fccaddd33647c8a5f4e75dd542 systemd-devel-208-20.el7_1.9.s390.rpm     MD5: f73eba92aa6d572973fbd3e1296b3871SHA-256: 0a6ac2f1e344ecd654b9405b98b93227cfdd3bb6e1925a98bbf50da8cfe81c5b systemd-devel-208-20.el7_1.9.s390x.rpm     MD5: 95eb83188b03a6d1f8aa4e46900667bbSHA-256: 1d7b8c25d32ee533ccdbe6e645705628764893eb53fc4fe5201cdf8233454198 systemd-journal-gateway-208-20.el7_1.9.s390x.rpm     MD5: 618dd875638e2f8a0491b9de33275a1fSHA-256: 597272be20eb9613855df54cbcfb9d3f55de67d3ed99ff4125779eeae536e710 systemd-libs-208-20.el7_1.9.s390.rpm     MD5: ee7c68973a16ed7bbfe5e7e01b806157SHA-256: 62382df467dc2246aa650f16061e055c7c19536b0686909d027a90af77e6f8bb systemd-libs-208-20.el7_1.9.s390x.rpm     MD5: 399f592b9dc818382d8a650fae79c25aSHA-256: 0a41b6ddcd30a42c35c8155025436cb1d0031e4e563b19ef3f311f5541f8d811 systemd-python-208-20.el7_1.9.s390x.rpm     MD5: 0c19816b071c044b418791a7489f8e04SHA-256: 8a3a5e8eb5bb28a69a6d26d83da7ca8e7c993696186e9d7658b8ba6fabd60f82 systemd-sysv-208-20.el7_1.9.s390x.rpm     MD5: 51ff47e5116d459c6e6d6611d13c8c32SHA-256: b6b060fa08f6df80a61f902efe752e4e8280724d73c88663cd831abb627f0001   x86_64: libgudev1-208-20.el7_1.9.i686.rpm     MD5: fd625b780dd51f4a3847bf6a80d2abaaSHA-256: f148607cd58eb0c360116e5fdb32e936227312466604ba798361bf37a47d7014 libgudev1-208-20.el7_1.9.x86_64.rpm     MD5: 45b8bdd5e2af6215188b3baf9777031bSHA-256: baaf3d70e45f6dd2dce4ecaed33446bc87ee494e6258d806cddbc360bffaa306 libgudev1-devel-208-20.el7_1.9.i686.rpm     MD5: 68cea3d3219095b1aea70b9fb98c490bSHA-256: b84ceee141b9b4b3cff718a7080fcb3f3a2ba04050ba483bb7bc25c173b259a3 libgudev1-devel-208-20.el7_1.9.x86_64.rpm     MD5: 4fa73ccf6fce0f46cc18e5099c7d3cbeSHA-256: 39a0d9376906c01916660cd79ed844996ef31c8f6dabc2334379429ced296314 systemd-208-20.el7_1.9.x86_64.rpm     MD5: c5605be1e59f0a3d4af0314ff03623c5SHA-256: f1a87ac3f3dd863b69f3c0261abbc09925ee7c09de880436f2787a2a9586ebfe systemd-debuginfo-208-20.el7_1.9.i686.rpm     MD5: 5c0d5919d59ecafa3af15dd00d60a797SHA-256: 8dbac60cba00664b5bffd6357012e8d10aa1fe78cf340a4a7ace4dad438478b7 systemd-debuginfo-208-20.el7_1.9.x86_64.rpm     MD5: 4221ee1263f07d3d5c3076863d071358SHA-256: 0809cae7c642ab62749ffe4675cbfe7dbbb6cbbcee4b00a1fee42b1dd4e9e0f6 systemd-devel-208-20.el7_1.9.i686.rpm     MD5: d8df9fa1c64b8fcf882f51622fc9e91dSHA-256: 433ea64bbf8588437420b710ca378336c6286af092e7fd00196fc1b60d5306d7 systemd-devel-208-20.el7_1.9.x86_64.rpm     MD5: 0a3bb0a86c8a4d9671d61ae486218da4SHA-256: a1d7c50bab81bebc5a76fb5b111ca4396f5211143e3ae7726bd5e2ebc4ddaf9e systemd-journal-gateway-208-20.el7_1.9.x86_64.rpm     MD5: d526dcc24c54b478d8406fdccfd5189fSHA-256: 5b715faca91b94815c5f4fbe7eb10fdb328bb225da5a509d01328109f6a78d94 systemd-libs-208-20.el7_1.9.i686.rpm     MD5: 7dd6e9b255cfbf37d597221084c28542SHA-256: fbe5669676648ca36fcb01cadc13ddd86f7ff2841a0b6037f018250230d33b5b systemd-libs-208-20.el7_1.9.x86_64.rpm     MD5: f404a98e1ce6b6622726b4fe72f293d8SHA-256: 4552471740a228850a5b6ee312d19addaf4040ee22bf775f4dfd4e5a3844c26b systemd-python-208-20.el7_1.9.x86_64.rpm     MD5: 75a05336562af9c0dd2b3da336a30540SHA-256: 8032d488626918742dd5d406eef96e3879348bbc052b1206afe0e24e457e99f1 systemd-sysv-208-20.el7_1.9.x86_64.rpm     MD5: 1a1ce7862c6f253d442cf3f895608a1bSHA-256: 79ce5e6f98d81216ec42e5506a73b9ad0b0f3f5115f3c8ed3ba8766c1a32803b   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:2966-1: kernel bug fix update

Updated kernel packages that fix several bugs and add various enhancements arenow available for Red Hat Enterprise Linux 7. The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update fixes the following bugs:* Previously, a "NULL pointer dereference" problem in the pick_next_task_fair()function occurred.

This update fixes the bug by applying a set of patches on theCompletely Fair Scheduler (CFS) group scheduling.

As a result, the "NULL pointerdereference" problem no longer occurs. (BZ#1373820)* When repetitively shutting down and powering on the Chrony Network TimeProtocol (NTP) client, the following error occurred on the Hyper-V servers:"Adjusting Time Stamp Counter (TSC) more than 11%." This update limits themaximum adjustment cap in the internal steering to 11%, and the error no longeroccurs under the described circumstances. (BZ#1375599)* Previously, tasks writing to a NFS file in some cases became unresponsive,because they waited for the PG_BUSY flag to be cleared.

This update fixes theproblem by ignoring the zero-length requests at the page I/O layer.

As a result,writing to affected NFS files now proceeds as expected. (BZ#1378916)* Prior to this update, if a Red Hat Enterprise Linux 6 guest running on aHyper-V hypervisor took a long time to boot, the hypervkvpd daemon in some casesfailed to start.

As a consequence, the guest could not use the services providedby these daemons, including online backup, file copy, and network settings.

Thisupdate fixes the problem by refactoring the hv_util service corresponding tohypervkvpd.

As a result, hypervkvpd starts properly in the described scenario,which makes the affected services available as expected regardless of thevirtual machine's boot time. (BZ#1380305)* In some cases, mounting a new file system to a slave mount tree caused theoperating system to terminate unexpectedly.

This update modifies handling of themnt_group_id parameter in the propagate_one() function, and the operating systemno longer crashes in the described situation. (BZ#1381319)* Previously, an XFS metadata buffer reference counting race error sometimescaused soft lockups in the filesystem freeze path.

For example, this problemoccurred when creating device mapper snapshots.

This update fixes the bufferreference counting, and all buffers are now reclaimed correctly during afilesystem freeze.

As a result, the kernel soft lockup no longer occurs underthe described circumstances. (BZ#1381563)* Previously, changing the speed of a network device with the "ethtool -s"command in the mlx5 driver did not work correctly. Running the command switchedthe speed to unknown and caused mlx5 to become unresponsive.

This updateenforces the transition of the speed regardless of the port's current operationstate.

As a result, speed change of a network device in mlx5 now works asexpected. (BZ#1385479)* When rebinding a PF_PACKET socket with the same protocol and device as in theprevious bind, the use count of the interface was not decreased.

As aconsequence, the deletion of the interface failed with the following errormessage: "unregister_netdevice: waiting for dummy0 to become free. Usage count =1".

This update removes the race condition in the packet_bind() function.

As aresult, the deletion of the interface now proceeds as expected, and the errormessage no longer occurs. (BZ#1388615)All users are advised to upgrade to these updated packages, which fix these bugsand add these enhancements.

The system must be rebooted for this update to takeeffect. Red Hat Enterprise Linux HPC Node EUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   PPC: kernel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 4df8233d7db890ca98ef3a6f793d11b4SHA-256: d137e012c26ba092a1d32e4b982a8e14d8ab9a56ad0315cf06442b60832c37ff kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-bootwrapper-3.10.0-327.44.2.el7.ppc64.rpm     MD5: b3ec6a440c65d103dd6e7c53a911eadaSHA-256: 71072d348e8309e20ceace23a1cbf1b74387066d318bce88e9b010b8ff1f03a2 kernel-debug-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 3f1237b3339d458509267a2187083d71SHA-256: 1dfa062090650d92cca32ce8db838830b5f695b6bc5f8ab51dc3a91839a89bb6 kernel-debug-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 0a70038f32441f83cfafd9d00e40b07bSHA-256: ab408d48c76cfee3329a099f1e963ca002921542d3c97ca686a226cbb91fedd0 kernel-debug-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 6ecc0bb5971cb6e120a0408f51a983efSHA-256: 1c9868f14e92ccba285da1ea2a48480abfe9dacea17e1860cabb073227c2046e kernel-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 4e8e5eb74975b79f1fc98c8d0322a2fcSHA-256: da744709f3483adc6dac3fd01d5ec9b2ec8069f9990859ff637f84ef62bb46c2 kernel-debuginfo-common-ppc64-3.10.0-327.44.2.el7.ppc64.rpm     MD5: cd1f2c27c025a8ef531ace742705e15aSHA-256: b2265eebaed3e4d82d0ece6a52d3bb4cb53a7798fa68a4badb43469235fe6959 kernel-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 2367b8f09b7ae853631355c3dcd0f750SHA-256: f42b87fc55c45288c343f430266a0befb4b102683eb2e6efd2f80cbf2aa363e3 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 495bafaa9d1469dfca47b12b7c825678SHA-256: 86a7a911a0153c842ee57477793c867fc2a012eb27244dd0c9b17c2a7c942f2a kernel-tools-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 0f76456d19a7c416a802ee663926b4f6SHA-256: 66c5cfcd166f095aee6f43dd5848a680418e173be76e4d5f312cece5edf76602 kernel-tools-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 8fee8e420763dd6e42842393eccbc052SHA-256: 2de8f54ed6a75d04f9ecd4dd437a088b2e4bd00ebd71da2a818ae393f496cc5f kernel-tools-libs-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 146e4cfaec200d19f936eae4f65c4690SHA-256: d5dbda879cae52c550f6d75e7ba72f0709686d82d2616d20a07ed18f64fbc6a0 kernel-tools-libs-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 025c4c9864e94af61a184873848b8047SHA-256: 5531f4740235def51dae267d5b0b33095915f801928c45979c0bce14712b43b3 perf-3.10.0-327.44.2.el7.ppc64.rpm     MD5: f4d9aa726d2c07f1df968f39a634acaaSHA-256: 1d1e0164bf964507e2655fbb9725d508cf02136e8fd15af23fa005c8dff3617c perf-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 88074317c5674a28773b9fbe8e5e9734SHA-256: ccc18eaaade349219a4541bee2e1b829d56b4b335c59ac94344631a1ed40e318 python-perf-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 54382f0de5ea46608065fa1028ed19a6SHA-256: 4fc206606cefc8f2ffea2a5b606d384222f874b8bf56f6709fbd5c03703d5372 python-perf-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 40d37ff77387d7d3410df92a0f946ce9SHA-256: dde73ced4f51c0fad3ab0caa5df8036c27b589c06ec412698e1f2696f4d324e6   PPC64LE: kernel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 05fe4cfb8048a77e9f0da6e18f246f63SHA-256: cf55da30873fb765ad1220cdb779ad621fcbed2d33dc0c966d387a83edb4b37c kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-bootwrapper-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: a416b983d18af9a5909c6466d7fdf5c5SHA-256: 3b3c1f0f4107cbbde671dc4b24e79f21e85ff1c1f34bd9bc785b40805dd212e2 kernel-debug-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 2e3a1cf0bf1621abc98f0dffb05c0487SHA-256: 03bba1c1ea18689027e99d75306a08dd4f9e14ca9712bab01ae29b4eba551099 kernel-debug-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 21fdcb33e6b1b5bad7d046c7b7c26e83SHA-256: 6105f355d853263ba54a13a1fae55771a50278f3583098d5ecdffc4ef686db41 kernel-debug-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 90315d59617179451c5ba6cbd9c0528cSHA-256: dc090261a2187ad813aef1fb7c2e5d473ee0c064331e1f73af21f363e459ccc1 kernel-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 59f7efeed14601d22ad6e9d96cdbc5afSHA-256: 3e3eb1b6963efc4b5b997dfc7e535544f730cc4301c58263f8abc66ac67402be kernel-debuginfo-common-ppc64le-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: b42629e4d5b925922de3e9341e2ec2bdSHA-256: 8473c757d3050f7666768d0d81917b2ce4dbbce476bd733738f664ea9c388246 kernel-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 14586917d5b11fd64dd07555d561f7baSHA-256: 88a8cc851324c8f9dfc1e1c47a8bede7416e90b6acd8724fe7bbb0e1b3b3a930 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: df6b0b5d3906dc001796c9ae0997cd4fSHA-256: 4c3655df7e17d9fb4e0d7a9390db6a11183312f7b7e6db1a0ff310fcf329f8db kernel-tools-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: acc0597127ee2cd308ed99ccf1e890fcSHA-256: 680fa85318aa416bda211772ec45a21a95e2a463bf22aa11a79a495595be3b2c kernel-tools-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 347cb4f882a2b71a79e05cbf7516c6ceSHA-256: 9fa859a8f741554233ca1daa01f70c2217c8f3d926913a3a80b209056370714b kernel-tools-libs-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: c7ad5dfc40a2e4cbc638b712de7dc0b5SHA-256: 7a1ea167f9c1257f301d7d24413672f0707630e9d3f3757b02e7a72002006eb8 kernel-tools-libs-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 2ab03b1887e2fb4a5ed8915850755f2cSHA-256: 621934ffd4759bd928d77115f15ac3802850a7c494f4497a3f89f49229331ef6 perf-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 9619e6b32539ad03e15f33b1bf3372ddSHA-256: 1d14124102fb6cf43eec950b179cbce9a0031749c59f116a99246afceca5f11e perf-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: c782ecffb5c65292613eac2c69d46e0fSHA-256: a7148caca8de2989083e031d68f926fe2a50ac20475505f3113b0f1f8042584c python-perf-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 3fd385ba567b308184492d6d446a6207SHA-256: 3d63d1f17d7095122f9854c6584b79d0063e6adaf0983c05ad3d4448a76ab675 python-perf-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 8934bee4ab9358bc688698baa74c27b2SHA-256: e41fae24fb23e59ff284c8489fddecf08916c58b240b616c487412edc782685b   s390x: kernel-3.10.0-327.44.2.el7.s390x.rpm     MD5: 0067494c986edc0cf12d975ef947d20cSHA-256: f63c8a7e8dcc339f269d92e30ea5f553648ea65eccae7fa9910786257f3c6fbc kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.s390x.rpm     MD5: 06befb7126f33f90d296a68f5421066dSHA-256: 1cd968c89ae087a6fe682202a9b88d97135d271cf7645754c01215e3a69068ec kernel-debug-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 5c6e2c58b1d00d035bda471c342b2da3SHA-256: ef2d092261095ede2547fded65c1ece9e7e3fc2653f657adbf29470601da1b84 kernel-debug-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: d30f0091829743c87c27b90a4e91bca3SHA-256: 89282c5822e8556c9604d1470e7b05873e412ce5dfeda91cf090de94af0b60b1 kernel-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 390afd8e51ddbff727cc7255de283fdfSHA-256: 9f0f3416c7e48038b746ea5701dd9a255cf8c996bd5e58447f26d5cd69b7a320 kernel-debuginfo-common-s390x-3.10.0-327.44.2.el7.s390x.rpm     MD5: b7f2eaff996ff8703f213d0ace10f917SHA-256: 8aafb3609a9447f108ff278570742b1718a4eddd53818dbcf5c6d946c70566de kernel-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: 41304b6b8195f344aca3620e27953c6eSHA-256: ba587789d46d3e19735cff91055e3f7c658028987d1e7dc63079373ca6540f3e kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.s390x.rpm     MD5: 8fee99fba3ec7f0da660096b0aa3abbeSHA-256: 2a7b5b336c7ea5d4041b8546e1eeb72861549a59ebe2019127a612e7c8ac9898 kernel-kdump-3.10.0-327.44.2.el7.s390x.rpm     MD5: 4683c9de892bef90bc4b5062c91fa0cfSHA-256: bd53c7240a9b35c7b50e33676a596b3caeb41855287cfcaac8e2e809623c88e7 kernel-kdump-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 2a8b878d21d90b0ce0b9bced32756a19SHA-256: 2faf7c261c6323c8b3d70ff77a0c9fbb71fb584fea8b53a32a22ef9056ebbc41 kernel-kdump-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: fd4cdb952b95b689158be55dc5d2786aSHA-256: 4d7b00a9ad306bd080e27b13a929299016cbd303df5c85c1a8441ba3a225b435 perf-3.10.0-327.44.2.el7.s390x.rpm     MD5: 75c2cec355e72f0a44c896df0c9f1b96SHA-256: c2e9eb817ac28eb14e70f7579045ca445c294fe3b1618887c0b9fd53bb7c5464 perf-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: dd637c6f2647a466c21f3d9c6d80d834SHA-256: e01937eeb1c3a29424c1c85e8139969e8e12fda53bde53bb372970de5d48cfcc python-perf-3.10.0-327.44.2.el7.s390x.rpm     MD5: df07171e68dd1274e36ef00cc497baffSHA-256: 25b2f4d4c33a9385162f5df2a1bb9559a02b284f22130b74d937570718817bad python-perf-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: eeee69ebf797c00581ac97884132d414SHA-256: 0e0d8e69220797eb4eb42cd213356fa18ee9089f6d9d608c9eceae3cef200179   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server TUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: