Home Tags Socket

Tag: Socket

Dealmaster: Get $10 when you sign up for a 30-day Amazon...

$10 in Amazon money for trying out its music platform! What a deal.

Apple is completely redesigning the Mac Pro… again

New design coming sometime in 2018, along with a new Apple-made external display.

AMD Naples server processor: more cores, bandwidth, memory than Intel

Two-socket server chip coming in second quarter.

Dozens of popular iOS apps vulnerable to intercept of TLS-protected data

76 apps in Apple’s App Store still don’t use best practices to protect user data.

Firefox 51 Debuts with Patches for 24 Security Issues

Mozilla patches 24 security vulnerabilities in Firefox and now alerts users when they attempt to enter information into web forms that are not secure. Mozilla released its first new browser milestone of 2017 on Jan. 24, with the debut of Firefox 51.

T...

RHSA-2017:0065-1: Important: kernel security update

An update for kernel is now available for Red Hat Enterprise Linux 6.5 AdvancedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A use-after-free vulnerability was found in the kernels socket recvmmsgsubsystem.

This may allow remote attackers to corrupt memory and may allowexecution of arbitrary code.

This corruption takes place during the errorhandling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258The system must be rebooted for this update to take effect.Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: kernel-2.6.32-431.77.1.el6.src.rpm     MD5: 3a075adc874ed1cad0cf0ad293f1eaafSHA-256: 32664ccccd3c3ffd4bfff6d46386b3b59509c6c05c021c14629c9eb89c4178d4   x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: ce35a58f0e130eb4cd9124faefcc26dcSHA-256: 854c61388182c9587b1f5b7bbb4ac3b977a50042ed693bb335c60b829e7e73ec kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm     MD5: 24c3931b1dc05ce406574b72dac495aaSHA-256: 33c775d3f08737045d3cbfbe4aaad5e6d16bf632ae2fdc1185803203f1bd5610 kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d2b71233bb4f7ded6ab582ea23053b55SHA-256: 2eb9804522ed1c767ef8a5bc6283fb41b2cbb2f05776cca308946b6ff3b7dcc3 kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 73b31b2381434d06793a29905edae217SHA-256: 0d53247daa69e80b6e2080e84f26d19822350b37394ad6c4eca3a79845385f8f kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1a825d636b4685776752377f6f0592f3SHA-256: 64a3b1fa8490a2589a61b366263d1c2751a1da652c83857f7256e56352a4b5ac kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 3e3f43ea080c524915e164cc1b2bfcd1SHA-256: 87a2657b8aa64a62ccc6bd659b00e5210d20c72018e94b4c7daa6e7c098ae8e2 kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 21d52ee9fc0f6cf9093603b65bba9fc3SHA-256: ad69bf3aeb18e4ed69624caef0457a0e7891ff079c5d5562dfa12f6c2db55a72 kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1b56ac1536479b3b21bb8ceb358c2a6eSHA-256: 985bb49475cdda19ad18963459320b46032d0b54d18359188527b129568483fe kernel-doc-2.6.32-431.77.1.el6.noarch.rpm     MD5: 902fa70945d6ee804637aa6b4fabd827SHA-256: 4b8823dffbed724a313d3b5ccdc3a9c1e31e808630510b7ae9e082b839ac1f9c kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm     MD5: b5b625bed3d9ccff8877db801bf06842SHA-256: db85c531b17efcf7464a668af2c62541b47476a7ab7f50c44fa99de5539d2b4b kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 16c7bc26d080ef3356c566baebd84266SHA-256: c3be05b0752b9c0cd20f48c458153238ebf2cb7603de60f68cedb4c56b9803ff perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 852c878b96af18015a7fcd03e2244bd2SHA-256: 72e2d6f1f775c9676ef7646f08bed60e0967e9986968e0fad05bb8958be45016 perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 83b12ed00d14fcb76d6e352b2a037c53SHA-256: 1447ee24b3d19c413f48790b88000a3efc6fa45f566303eab3b8c0a77da29cf3 python-perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d71a6a415842069a557a165234fe646cSHA-256: 73748b9e04ac1f8cca30997d8025ca150a2bd3e614feb4b4e9e1b98fd23e2929 python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 0405c7c80e61feccb72207cf153eab44SHA-256: fc92d5f09bea883e484292e5b1ba6f1b149f4c2c9dcd4f5519a219b7a7931a39   Red Hat Enterprise Linux Server TUS (v. 6.5) SRPMS: kernel-2.6.32-431.77.1.el6.src.rpm     MD5: 3a075adc874ed1cad0cf0ad293f1eaafSHA-256: 32664ccccd3c3ffd4bfff6d46386b3b59509c6c05c021c14629c9eb89c4178d4   x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: ce35a58f0e130eb4cd9124faefcc26dcSHA-256: 854c61388182c9587b1f5b7bbb4ac3b977a50042ed693bb335c60b829e7e73ec kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm     MD5: 24c3931b1dc05ce406574b72dac495aaSHA-256: 33c775d3f08737045d3cbfbe4aaad5e6d16bf632ae2fdc1185803203f1bd5610 kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d2b71233bb4f7ded6ab582ea23053b55SHA-256: 2eb9804522ed1c767ef8a5bc6283fb41b2cbb2f05776cca308946b6ff3b7dcc3 kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 73b31b2381434d06793a29905edae217SHA-256: 0d53247daa69e80b6e2080e84f26d19822350b37394ad6c4eca3a79845385f8f kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1a825d636b4685776752377f6f0592f3SHA-256: 64a3b1fa8490a2589a61b366263d1c2751a1da652c83857f7256e56352a4b5ac kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 3e3f43ea080c524915e164cc1b2bfcd1SHA-256: 87a2657b8aa64a62ccc6bd659b00e5210d20c72018e94b4c7daa6e7c098ae8e2 kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 21d52ee9fc0f6cf9093603b65bba9fc3SHA-256: ad69bf3aeb18e4ed69624caef0457a0e7891ff079c5d5562dfa12f6c2db55a72 kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 1b56ac1536479b3b21bb8ceb358c2a6eSHA-256: 985bb49475cdda19ad18963459320b46032d0b54d18359188527b129568483fe kernel-doc-2.6.32-431.77.1.el6.noarch.rpm     MD5: 902fa70945d6ee804637aa6b4fabd827SHA-256: 4b8823dffbed724a313d3b5ccdc3a9c1e31e808630510b7ae9e082b839ac1f9c kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm     MD5: b5b625bed3d9ccff8877db801bf06842SHA-256: db85c531b17efcf7464a668af2c62541b47476a7ab7f50c44fa99de5539d2b4b kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 16c7bc26d080ef3356c566baebd84266SHA-256: c3be05b0752b9c0cd20f48c458153238ebf2cb7603de60f68cedb4c56b9803ff perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 852c878b96af18015a7fcd03e2244bd2SHA-256: 72e2d6f1f775c9676ef7646f08bed60e0967e9986968e0fad05bb8958be45016 perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 83b12ed00d14fcb76d6e352b2a037c53SHA-256: 1447ee24b3d19c413f48790b88000a3efc6fa45f566303eab3b8c0a77da29cf3 python-perf-2.6.32-431.77.1.el6.x86_64.rpm     MD5: d71a6a415842069a557a165234fe646cSHA-256: 73748b9e04ac1f8cca30997d8025ca150a2bd3e614feb4b4e9e1b98fd23e2929 python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm     MD5: 0405c7c80e61feccb72207cf153eab44SHA-256: fc92d5f09bea883e484292e5b1ba6f1b149f4c2c9dcd4f5519a219b7a7931a39   (The unlinked packages above are only available from the Red Hat Network) 1382268 - CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2017:0033-1: ORBit2 bug fix update

Updated ORBit2 packages that fix one bug are now available for Red HatEnterprise Linux 6. The ORBit2 packages provide a high-performance Object Request Broker (ORB) forthe Common Object Request Broker Architecture (CORBA). ORBit allows programs tosend requests and receive replies from other programs, regardless of where theprograms are located.

CORBA is a standard that enables communication betweenprogram objects, regardless of the programming language and platform used.This update fixes the following bug:* Previously, when logging in and out, linc socket files accumulated in the/tmp/orbit-[username]/ directory.

Consequently, the /tmp file system quicklybecame full, which in some cases caused processes running on the system to fail.As a result, the described failures no longer occur. (BZ#1391976)Users of ORBit2 are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   IA-32: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   Red Hat Enterprise Linux Server (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   IA-32: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184   PPC: ORBit2-2.14.17-6.el6_8.ppc.rpm     MD5: ae42b03f828abacbdc8520dd51a01e2aSHA-256: cb1244b5b94dfa3cf339c33145d20606a8d75e30eb86e52652aff74113af65e5 ORBit2-2.14.17-6.el6_8.ppc64.rpm     MD5: c1486f11c5a1f9d912e041a7d38bff69SHA-256: eb52b129c6f79abb483d4f3d454b0b9604cee6098ea3b3508f53dc9ab9820d7b ORBit2-debuginfo-2.14.17-6.el6_8.ppc.rpm     MD5: 0d2619460a4304105eca4d32f5fbc5b8SHA-256: eea98b7604b14a293c8ad5844d09caa7ff3965443312e50087a6e6379c167c7f ORBit2-debuginfo-2.14.17-6.el6_8.ppc64.rpm     MD5: 62c3d2bf8d7679014526100420d345bbSHA-256: f22cff739c7287fba67b3d6f61e7278919e2e7a142b8a58d3178297dbf676d93 ORBit2-devel-2.14.17-6.el6_8.ppc.rpm     MD5: 15fa81d82a3da4395b48ab0837740891SHA-256: 250cacb8f8d53167edd4f1a10bd4147a3a8028a065111f92ca9ff28e08bc1217 ORBit2-devel-2.14.17-6.el6_8.ppc64.rpm     MD5: fd98d2ca3985493ad81b005dfe3cb49aSHA-256: 45f84ca0d0f345ffc526274d620c824cdb2d9860d40d66c3e5eea3feeb12acbf   s390x: ORBit2-2.14.17-6.el6_8.s390.rpm     MD5: 30f6023db9532745174e608c183a967aSHA-256: ab30c05fbb0592f9772b17ce1884ee2bd41c829aa9a2bb14f0caf07187e2cd43 ORBit2-2.14.17-6.el6_8.s390x.rpm     MD5: 02014dacecf0e5a8df601c53770ddffdSHA-256: 692073a78b4d5ae3588f21539cbe88d8025fb35b49ee7c54c22123ff7fa186fb ORBit2-debuginfo-2.14.17-6.el6_8.s390.rpm     MD5: 70d591d017336248428ed53b4e406ed5SHA-256: f3f7869591c5aad43b376669b1f4b65ffc1472d97aba7bfdf92a063ab45f3193 ORBit2-debuginfo-2.14.17-6.el6_8.s390x.rpm     MD5: 1653ac7dbf219d14fc18274381ffbc53SHA-256: e9eb251c0679270d679246469cfcc5a0f59ab42eff058f9b6d045f3235ab5ef5 ORBit2-devel-2.14.17-6.el6_8.s390.rpm     MD5: df9b3d68f8c3c8520dbb1ff521b5de87SHA-256: ae69e8e874677fb428c4b178cac7b7c744f75dc2fb3a3cce9d9ee2924ffc03b4 ORBit2-devel-2.14.17-6.el6_8.s390x.rpm     MD5: a8eb1d129b44034a720529a4417182c4SHA-256: 0a016de5a181657207af8b7129b9b66ae71729b3d974b6eee6b251f87bafc515   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ORBit2-2.14.17-6.el6_8.src.rpm     MD5: 418b3d4f7a246b1df0bec6ed70684d74SHA-256: 36afe46628195b27eb06180ffc018c186a22d9f0c24f5392786338273585547b   IA-32: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184   x86_64: ORBit2-2.14.17-6.el6_8.i686.rpm     MD5: ec510f79aff6d861c7e1606aacb58940SHA-256: ffe0b53ddebb443af49274c99d71835c0b6e6124b99a4bee03036f18ab158a0e ORBit2-2.14.17-6.el6_8.x86_64.rpm     MD5: ec367d55013a022d46d4450c62868e1cSHA-256: 78c94a07cf5d9331a2ad7cac1b1c423c0485f4310f510eefae4940a859aa90ec ORBit2-debuginfo-2.14.17-6.el6_8.i686.rpm     MD5: 79c3cc22828c89549a111bd38cd260a6SHA-256: 87e46067d453f77e6567ed12e586619b55d2eca11f284b002cb73fd57d4bf4be ORBit2-debuginfo-2.14.17-6.el6_8.x86_64.rpm     MD5: 0f309d4b425367410beb223f8d01e81fSHA-256: a1a904633fedba2bd99c609de100896b0a6696e8139bac660d3113e1e24ae262 ORBit2-devel-2.14.17-6.el6_8.i686.rpm     MD5: c2482a7c773724278e8c5fae60f0092aSHA-256: 8b2175e175587e0a254399cb6c0822863acac86772bbae5a384903ccb3767184 ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm     MD5: d346bd06c42e0cc607f6696f638e705fSHA-256: 091b1b4824ad36a37e2411787d3a7261e4d95f0406693e5821ef5fcaa9f9e3f7   (The unlinked packages above are only available from the Red Hat Network) 1391976 - Too many socket files in /tmp/orbit-user folder These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2017:0003-1: Moderate: systemd security update

An update for systemd is now available for Red Hat Enterprise Linux 7.1 ExtendedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The systemd packages contain systemd, a system and service manager for Linux,compatible with the SysV and LSB init scripts.
It provides aggressiveparallelism capabilities, uses socket and D-Bus activation for startingservices, offers on-demand starting of daemons, and keeps track of processesusing Linux cgroups.
In addition, it supports snapshotting and restoring of thesystem state, maintains mount and automount points, and implements an elaboratetransactional dependency-based service control logic.
It can also work as adrop-in replacement for sysvinit.Security Fix(es):* A flaw was found in the way systemd handled empty notification messages.

Alocal attacker could use this flaw to make systemd freeze its execution,preventing further management of system services, system shutdown, or zombieprocess collection via systemd. (CVE-2016-7796) Red Hat Enterprise Linux HPC Node EUS (v. 7.1) SRPMS: systemd-208-20.el7_1.9.src.rpm     MD5: 78f695a30355e41569098fcfd102efd0SHA-256: 02d9ea718d5a2a19e98fa851c472799d22d789c19ea5a9d8e1ca649177478dc6   x86_64: libgudev1-208-20.el7_1.9.i686.rpm     MD5: fd625b780dd51f4a3847bf6a80d2abaaSHA-256: f148607cd58eb0c360116e5fdb32e936227312466604ba798361bf37a47d7014 libgudev1-208-20.el7_1.9.x86_64.rpm     MD5: 45b8bdd5e2af6215188b3baf9777031bSHA-256: baaf3d70e45f6dd2dce4ecaed33446bc87ee494e6258d806cddbc360bffaa306 libgudev1-devel-208-20.el7_1.9.i686.rpm     MD5: 68cea3d3219095b1aea70b9fb98c490bSHA-256: b84ceee141b9b4b3cff718a7080fcb3f3a2ba04050ba483bb7bc25c173b259a3 libgudev1-devel-208-20.el7_1.9.x86_64.rpm     MD5: 4fa73ccf6fce0f46cc18e5099c7d3cbeSHA-256: 39a0d9376906c01916660cd79ed844996ef31c8f6dabc2334379429ced296314 systemd-208-20.el7_1.9.x86_64.rpm     MD5: c5605be1e59f0a3d4af0314ff03623c5SHA-256: f1a87ac3f3dd863b69f3c0261abbc09925ee7c09de880436f2787a2a9586ebfe systemd-debuginfo-208-20.el7_1.9.i686.rpm     MD5: 5c0d5919d59ecafa3af15dd00d60a797SHA-256: 8dbac60cba00664b5bffd6357012e8d10aa1fe78cf340a4a7ace4dad438478b7 systemd-debuginfo-208-20.el7_1.9.x86_64.rpm     MD5: 4221ee1263f07d3d5c3076863d071358SHA-256: 0809cae7c642ab62749ffe4675cbfe7dbbb6cbbcee4b00a1fee42b1dd4e9e0f6 systemd-devel-208-20.el7_1.9.i686.rpm     MD5: d8df9fa1c64b8fcf882f51622fc9e91dSHA-256: 433ea64bbf8588437420b710ca378336c6286af092e7fd00196fc1b60d5306d7 systemd-devel-208-20.el7_1.9.x86_64.rpm     MD5: 0a3bb0a86c8a4d9671d61ae486218da4SHA-256: a1d7c50bab81bebc5a76fb5b111ca4396f5211143e3ae7726bd5e2ebc4ddaf9e systemd-journal-gateway-208-20.el7_1.9.x86_64.rpm     MD5: d526dcc24c54b478d8406fdccfd5189fSHA-256: 5b715faca91b94815c5f4fbe7eb10fdb328bb225da5a509d01328109f6a78d94 systemd-libs-208-20.el7_1.9.i686.rpm     MD5: 7dd6e9b255cfbf37d597221084c28542SHA-256: fbe5669676648ca36fcb01cadc13ddd86f7ff2841a0b6037f018250230d33b5b systemd-libs-208-20.el7_1.9.x86_64.rpm     MD5: f404a98e1ce6b6622726b4fe72f293d8SHA-256: 4552471740a228850a5b6ee312d19addaf4040ee22bf775f4dfd4e5a3844c26b systemd-python-208-20.el7_1.9.x86_64.rpm     MD5: 75a05336562af9c0dd2b3da336a30540SHA-256: 8032d488626918742dd5d406eef96e3879348bbc052b1206afe0e24e457e99f1 systemd-sysv-208-20.el7_1.9.x86_64.rpm     MD5: 1a1ce7862c6f253d442cf3f895608a1bSHA-256: 79ce5e6f98d81216ec42e5506a73b9ad0b0f3f5115f3c8ed3ba8766c1a32803b   Red Hat Enterprise Linux Server EUS (v. 7.1) SRPMS: systemd-208-20.ael7b_1.9.src.rpm     MD5: 924089849b8731fd1f9ce953dfe777f6SHA-256: b1f9c5daa05aa31ca97d80f381136c40053e64b0b2af3e9423b9d43c254cf3ab systemd-208-20.el7_1.9.src.rpm     MD5: 78f695a30355e41569098fcfd102efd0SHA-256: 02d9ea718d5a2a19e98fa851c472799d22d789c19ea5a9d8e1ca649177478dc6   PPC: libgudev1-208-20.el7_1.9.ppc.rpm     MD5: 90a7f4cea6a64f8097f27d8c7535b45bSHA-256: 7f9427fabca9e58bab11acad503ea6b795d454cd7ff61b1c82ed4d63c9f55af9 libgudev1-208-20.el7_1.9.ppc64.rpm     MD5: 821dde6e81c88bae9da879c013751fdbSHA-256: 0c732d592f43cbef22dc7ff3513098d1b084fe59ff147ce8a6625a88ffd5fa68 libgudev1-devel-208-20.el7_1.9.ppc.rpm     MD5: 9fdf40251fdac8a695a39d1b07f1b396SHA-256: dc3cade10542a3febc2f6ef4c36744c94bd045d35db7e7ed5955aef310711928 libgudev1-devel-208-20.el7_1.9.ppc64.rpm     MD5: b35b64950b4e0e3ebeea1f671fc53bcbSHA-256: 0ececc7c3fede2dc02d8725982f30943006277865af2c02b328cbc03c8d0890f systemd-208-20.el7_1.9.ppc64.rpm     MD5: 1bb103e2e54c41fc963574aa672b16fcSHA-256: 9b76085021eac8db127f7d26dc0c1371ba5ccf36990900d9ae878c6d1852916d systemd-debuginfo-208-20.el7_1.9.ppc.rpm     MD5: 4691cd654394e93f25a41bd80854c8acSHA-256: 17dd5be4f37ade217048e8fd9b5603c3ff46667993467c61766be25c7c494396 systemd-debuginfo-208-20.el7_1.9.ppc64.rpm     MD5: f487b603cb2096d83a69d79cd8922c09SHA-256: 7c6108e3ac87fcb7191b3262d3e069a2d167ec5bfeb943d849f550d29ecdf1dd systemd-devel-208-20.el7_1.9.ppc.rpm     MD5: e018b74dc67044132ae8dafcb9df195aSHA-256: 90fd210af5379c3a4441d1ba651b18f9ce13fa7509958f109e564715a847acec systemd-devel-208-20.el7_1.9.ppc64.rpm     MD5: cf589e4fbc60e56f943d720e9f6dd803SHA-256: cfd727460e7b185ad87db2c8a45b8e052f43b749e812cf3c06f89656f80e8137 systemd-journal-gateway-208-20.el7_1.9.ppc64.rpm     MD5: 89b8876d5d53126f156bac8dd79df2a6SHA-256: 40bcf89850ca60c5c8998f047ed81435922bfd389580026d23b470a4d231edf5 systemd-libs-208-20.el7_1.9.ppc.rpm     MD5: a24d4978507a8477bd69963151ed3a29SHA-256: 485bc15144685e3cbce4a3834420d498b817c98923cb8000d00a3c34698269e3 systemd-libs-208-20.el7_1.9.ppc64.rpm     MD5: 8649109d5ff8e0b81c2db842721b8555SHA-256: 76b3bc4f4bd07f71e4f8e9b7afdd15375ef0dc2d1f7d78e08c6fa5e234734d42 systemd-python-208-20.el7_1.9.ppc64.rpm     MD5: 2613bf85155e9e6e7418bcdc725df6a9SHA-256: 22ffb5fcd2e48939c04f59e876539fff33e152ca3fd2e7ae3a1996f981a2fdee systemd-sysv-208-20.el7_1.9.ppc64.rpm     MD5: 0ee770db38334a1edc58451f4f2f3a28SHA-256: 0c2ac2f4b5af441c44c36a2ffb214ed81307cbfc57e9a347a4eeeb9064ee68aa   PPC64LE: libgudev1-208-20.ael7b_1.9.ppc64le.rpm     MD5: 4b4c301bdefd709253c8738c972de76aSHA-256: 47043d7fbf92776258673c84e3dee3d22fb988306ac88b62624af5dfa251a85e libgudev1-devel-208-20.ael7b_1.9.ppc64le.rpm     MD5: 7871c1e77097afe0743437f3c79ccf4fSHA-256: 2b2b1abe2bdc59bcab6835c5b9ce0604086eec92f22fe072755611db869833c3 systemd-208-20.ael7b_1.9.ppc64le.rpm     MD5: 21618d0caa714d9322705591ece996a4SHA-256: 62e9cdbe0db585416965eac31adbacced3f650f73420c9a431907ed49864a1bc systemd-debuginfo-208-20.ael7b_1.9.ppc64le.rpm     MD5: 355bd158ec94ee95b2357bd571a70122SHA-256: 8ee6c938cdb791560f7c9ba96582d6dcb7a6ee149f6f4c69a5f121dae1acab59 systemd-devel-208-20.ael7b_1.9.ppc64le.rpm     MD5: 358c7b344d166837a55bb4453830beaaSHA-256: 1149b929265ffdf7de1ed24e1b4a75101db0af882ad20dbb66948a79e0ec3f24 systemd-journal-gateway-208-20.ael7b_1.9.ppc64le.rpm     MD5: c9d30467339ec2da0d10136301702ff6SHA-256: 6a53e48145282ea9fd033ffe5bbb8ed5d99b5a43de25b955e9bbb96425e62eb4 systemd-libs-208-20.ael7b_1.9.ppc64le.rpm     MD5: 2f6d06cb1045e9fec6c5b7c95b3ead8dSHA-256: ff870b25f4d0156292bf7e1137df8f06b2ea6defbc59b6b8457531525922a9c4 systemd-python-208-20.ael7b_1.9.ppc64le.rpm     MD5: 5c12e7a5e15c665c477895e6703571d4SHA-256: 70e6982a503b43b81bfa3ff13838e0f1cd9b2caf6450476b8972e30bddfdea7c systemd-sysv-208-20.ael7b_1.9.ppc64le.rpm     MD5: ddc1694b3fd70deb4913a3c055185846SHA-256: cc05669e785f54099f4d93e93d4a7e935cff6b8ffbd86fe874620a5fd6857684   s390x: libgudev1-208-20.el7_1.9.s390.rpm     MD5: 5a0541b08c5ef4ac1fd358b22111b89aSHA-256: 54e5daa0d5ff1bc4368404e044c77e9a46519780ee7fdfd286f21d18b845e262 libgudev1-208-20.el7_1.9.s390x.rpm     MD5: 667de9720b5031a5a380ab6c7f425eaeSHA-256: 7ce3a65c27b10cfb26803788eea88a373c5ed37e04b0c237091b79e910741440 libgudev1-devel-208-20.el7_1.9.s390.rpm     MD5: 3f949f3f03684bb471b705f6d467606bSHA-256: 1dd9ab69968baef634b795700db559ee029a31bbf519aff4c44374fcdc39f385 libgudev1-devel-208-20.el7_1.9.s390x.rpm     MD5: 63b7a73199dd5bf68ee4658eb5f4b393SHA-256: a2ef16b02b398a4088a5002b3953cbbd5f86988bc64f2a29b12032223a5bdc23 systemd-208-20.el7_1.9.s390x.rpm     MD5: 9ba85aeb15b98fd02bee4e751f0f4502SHA-256: 29426f813b7747a73c04345202948bbb7f9573ec64ef1c83bb4d0dd8f9f3f04f systemd-debuginfo-208-20.el7_1.9.s390.rpm     MD5: a7e8dcb16a07601157fb1527805be175SHA-256: f0f793fb7486582ba98d765cb40b55d78d8538758b22ab4de6b8826f5da3f087 systemd-debuginfo-208-20.el7_1.9.s390x.rpm     MD5: 084e3625ff3d5f04bb7155b91e21313bSHA-256: ed4752479b2da64368df5f69a0c16d1522c5e8fccaddd33647c8a5f4e75dd542 systemd-devel-208-20.el7_1.9.s390.rpm     MD5: f73eba92aa6d572973fbd3e1296b3871SHA-256: 0a6ac2f1e344ecd654b9405b98b93227cfdd3bb6e1925a98bbf50da8cfe81c5b systemd-devel-208-20.el7_1.9.s390x.rpm     MD5: 95eb83188b03a6d1f8aa4e46900667bbSHA-256: 1d7b8c25d32ee533ccdbe6e645705628764893eb53fc4fe5201cdf8233454198 systemd-journal-gateway-208-20.el7_1.9.s390x.rpm     MD5: 618dd875638e2f8a0491b9de33275a1fSHA-256: 597272be20eb9613855df54cbcfb9d3f55de67d3ed99ff4125779eeae536e710 systemd-libs-208-20.el7_1.9.s390.rpm     MD5: ee7c68973a16ed7bbfe5e7e01b806157SHA-256: 62382df467dc2246aa650f16061e055c7c19536b0686909d027a90af77e6f8bb systemd-libs-208-20.el7_1.9.s390x.rpm     MD5: 399f592b9dc818382d8a650fae79c25aSHA-256: 0a41b6ddcd30a42c35c8155025436cb1d0031e4e563b19ef3f311f5541f8d811 systemd-python-208-20.el7_1.9.s390x.rpm     MD5: 0c19816b071c044b418791a7489f8e04SHA-256: 8a3a5e8eb5bb28a69a6d26d83da7ca8e7c993696186e9d7658b8ba6fabd60f82 systemd-sysv-208-20.el7_1.9.s390x.rpm     MD5: 51ff47e5116d459c6e6d6611d13c8c32SHA-256: b6b060fa08f6df80a61f902efe752e4e8280724d73c88663cd831abb627f0001   x86_64: libgudev1-208-20.el7_1.9.i686.rpm     MD5: fd625b780dd51f4a3847bf6a80d2abaaSHA-256: f148607cd58eb0c360116e5fdb32e936227312466604ba798361bf37a47d7014 libgudev1-208-20.el7_1.9.x86_64.rpm     MD5: 45b8bdd5e2af6215188b3baf9777031bSHA-256: baaf3d70e45f6dd2dce4ecaed33446bc87ee494e6258d806cddbc360bffaa306 libgudev1-devel-208-20.el7_1.9.i686.rpm     MD5: 68cea3d3219095b1aea70b9fb98c490bSHA-256: b84ceee141b9b4b3cff718a7080fcb3f3a2ba04050ba483bb7bc25c173b259a3 libgudev1-devel-208-20.el7_1.9.x86_64.rpm     MD5: 4fa73ccf6fce0f46cc18e5099c7d3cbeSHA-256: 39a0d9376906c01916660cd79ed844996ef31c8f6dabc2334379429ced296314 systemd-208-20.el7_1.9.x86_64.rpm     MD5: c5605be1e59f0a3d4af0314ff03623c5SHA-256: f1a87ac3f3dd863b69f3c0261abbc09925ee7c09de880436f2787a2a9586ebfe systemd-debuginfo-208-20.el7_1.9.i686.rpm     MD5: 5c0d5919d59ecafa3af15dd00d60a797SHA-256: 8dbac60cba00664b5bffd6357012e8d10aa1fe78cf340a4a7ace4dad438478b7 systemd-debuginfo-208-20.el7_1.9.x86_64.rpm     MD5: 4221ee1263f07d3d5c3076863d071358SHA-256: 0809cae7c642ab62749ffe4675cbfe7dbbb6cbbcee4b00a1fee42b1dd4e9e0f6 systemd-devel-208-20.el7_1.9.i686.rpm     MD5: d8df9fa1c64b8fcf882f51622fc9e91dSHA-256: 433ea64bbf8588437420b710ca378336c6286af092e7fd00196fc1b60d5306d7 systemd-devel-208-20.el7_1.9.x86_64.rpm     MD5: 0a3bb0a86c8a4d9671d61ae486218da4SHA-256: a1d7c50bab81bebc5a76fb5b111ca4396f5211143e3ae7726bd5e2ebc4ddaf9e systemd-journal-gateway-208-20.el7_1.9.x86_64.rpm     MD5: d526dcc24c54b478d8406fdccfd5189fSHA-256: 5b715faca91b94815c5f4fbe7eb10fdb328bb225da5a509d01328109f6a78d94 systemd-libs-208-20.el7_1.9.i686.rpm     MD5: 7dd6e9b255cfbf37d597221084c28542SHA-256: fbe5669676648ca36fcb01cadc13ddd86f7ff2841a0b6037f018250230d33b5b systemd-libs-208-20.el7_1.9.x86_64.rpm     MD5: f404a98e1ce6b6622726b4fe72f293d8SHA-256: 4552471740a228850a5b6ee312d19addaf4040ee22bf775f4dfd4e5a3844c26b systemd-python-208-20.el7_1.9.x86_64.rpm     MD5: 75a05336562af9c0dd2b3da336a30540SHA-256: 8032d488626918742dd5d406eef96e3879348bbc052b1206afe0e24e457e99f1 systemd-sysv-208-20.el7_1.9.x86_64.rpm     MD5: 1a1ce7862c6f253d442cf3f895608a1bSHA-256: 79ce5e6f98d81216ec42e5506a73b9ad0b0f3f5115f3c8ed3ba8766c1a32803b   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:2966-1: kernel bug fix update

Updated kernel packages that fix several bugs and add various enhancements arenow available for Red Hat Enterprise Linux 7. The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update fixes the following bugs:* Previously, a "NULL pointer dereference" problem in the pick_next_task_fair()function occurred.

This update fixes the bug by applying a set of patches on theCompletely Fair Scheduler (CFS) group scheduling.

As a result, the "NULL pointerdereference" problem no longer occurs. (BZ#1373820)* When repetitively shutting down and powering on the Chrony Network TimeProtocol (NTP) client, the following error occurred on the Hyper-V servers:"Adjusting Time Stamp Counter (TSC) more than 11%." This update limits themaximum adjustment cap in the internal steering to 11%, and the error no longeroccurs under the described circumstances. (BZ#1375599)* Previously, tasks writing to a NFS file in some cases became unresponsive,because they waited for the PG_BUSY flag to be cleared.

This update fixes theproblem by ignoring the zero-length requests at the page I/O layer.

As a result,writing to affected NFS files now proceeds as expected. (BZ#1378916)* Prior to this update, if a Red Hat Enterprise Linux 6 guest running on aHyper-V hypervisor took a long time to boot, the hypervkvpd daemon in some casesfailed to start.

As a consequence, the guest could not use the services providedby these daemons, including online backup, file copy, and network settings.

Thisupdate fixes the problem by refactoring the hv_util service corresponding tohypervkvpd.

As a result, hypervkvpd starts properly in the described scenario,which makes the affected services available as expected regardless of thevirtual machine's boot time. (BZ#1380305)* In some cases, mounting a new file system to a slave mount tree caused theoperating system to terminate unexpectedly.

This update modifies handling of themnt_group_id parameter in the propagate_one() function, and the operating systemno longer crashes in the described situation. (BZ#1381319)* Previously, an XFS metadata buffer reference counting race error sometimescaused soft lockups in the filesystem freeze path.

For example, this problemoccurred when creating device mapper snapshots.

This update fixes the bufferreference counting, and all buffers are now reclaimed correctly during afilesystem freeze.

As a result, the kernel soft lockup no longer occurs underthe described circumstances. (BZ#1381563)* Previously, changing the speed of a network device with the "ethtool -s"command in the mlx5 driver did not work correctly. Running the command switchedthe speed to unknown and caused mlx5 to become unresponsive.

This updateenforces the transition of the speed regardless of the port's current operationstate.

As a result, speed change of a network device in mlx5 now works asexpected. (BZ#1385479)* When rebinding a PF_PACKET socket with the same protocol and device as in theprevious bind, the use count of the interface was not decreased.

As aconsequence, the deletion of the interface failed with the following errormessage: "unregister_netdevice: waiting for dummy0 to become free. Usage count =1".

This update removes the race condition in the packet_bind() function.

As aresult, the deletion of the interface now proceeds as expected, and the errormessage no longer occurs. (BZ#1388615)All users are advised to upgrade to these updated packages, which fix these bugsand add these enhancements.

The system must be rebooted for this update to takeeffect. Red Hat Enterprise Linux HPC Node EUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   PPC: kernel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 4df8233d7db890ca98ef3a6f793d11b4SHA-256: d137e012c26ba092a1d32e4b982a8e14d8ab9a56ad0315cf06442b60832c37ff kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-bootwrapper-3.10.0-327.44.2.el7.ppc64.rpm     MD5: b3ec6a440c65d103dd6e7c53a911eadaSHA-256: 71072d348e8309e20ceace23a1cbf1b74387066d318bce88e9b010b8ff1f03a2 kernel-debug-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 3f1237b3339d458509267a2187083d71SHA-256: 1dfa062090650d92cca32ce8db838830b5f695b6bc5f8ab51dc3a91839a89bb6 kernel-debug-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 0a70038f32441f83cfafd9d00e40b07bSHA-256: ab408d48c76cfee3329a099f1e963ca002921542d3c97ca686a226cbb91fedd0 kernel-debug-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 6ecc0bb5971cb6e120a0408f51a983efSHA-256: 1c9868f14e92ccba285da1ea2a48480abfe9dacea17e1860cabb073227c2046e kernel-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 4e8e5eb74975b79f1fc98c8d0322a2fcSHA-256: da744709f3483adc6dac3fd01d5ec9b2ec8069f9990859ff637f84ef62bb46c2 kernel-debuginfo-common-ppc64-3.10.0-327.44.2.el7.ppc64.rpm     MD5: cd1f2c27c025a8ef531ace742705e15aSHA-256: b2265eebaed3e4d82d0ece6a52d3bb4cb53a7798fa68a4badb43469235fe6959 kernel-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 2367b8f09b7ae853631355c3dcd0f750SHA-256: f42b87fc55c45288c343f430266a0befb4b102683eb2e6efd2f80cbf2aa363e3 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 495bafaa9d1469dfca47b12b7c825678SHA-256: 86a7a911a0153c842ee57477793c867fc2a012eb27244dd0c9b17c2a7c942f2a kernel-tools-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 0f76456d19a7c416a802ee663926b4f6SHA-256: 66c5cfcd166f095aee6f43dd5848a680418e173be76e4d5f312cece5edf76602 kernel-tools-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 8fee8e420763dd6e42842393eccbc052SHA-256: 2de8f54ed6a75d04f9ecd4dd437a088b2e4bd00ebd71da2a818ae393f496cc5f kernel-tools-libs-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 146e4cfaec200d19f936eae4f65c4690SHA-256: d5dbda879cae52c550f6d75e7ba72f0709686d82d2616d20a07ed18f64fbc6a0 kernel-tools-libs-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 025c4c9864e94af61a184873848b8047SHA-256: 5531f4740235def51dae267d5b0b33095915f801928c45979c0bce14712b43b3 perf-3.10.0-327.44.2.el7.ppc64.rpm     MD5: f4d9aa726d2c07f1df968f39a634acaaSHA-256: 1d1e0164bf964507e2655fbb9725d508cf02136e8fd15af23fa005c8dff3617c perf-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 88074317c5674a28773b9fbe8e5e9734SHA-256: ccc18eaaade349219a4541bee2e1b829d56b4b335c59ac94344631a1ed40e318 python-perf-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 54382f0de5ea46608065fa1028ed19a6SHA-256: 4fc206606cefc8f2ffea2a5b606d384222f874b8bf56f6709fbd5c03703d5372 python-perf-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 40d37ff77387d7d3410df92a0f946ce9SHA-256: dde73ced4f51c0fad3ab0caa5df8036c27b589c06ec412698e1f2696f4d324e6   PPC64LE: kernel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 05fe4cfb8048a77e9f0da6e18f246f63SHA-256: cf55da30873fb765ad1220cdb779ad621fcbed2d33dc0c966d387a83edb4b37c kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-bootwrapper-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: a416b983d18af9a5909c6466d7fdf5c5SHA-256: 3b3c1f0f4107cbbde671dc4b24e79f21e85ff1c1f34bd9bc785b40805dd212e2 kernel-debug-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 2e3a1cf0bf1621abc98f0dffb05c0487SHA-256: 03bba1c1ea18689027e99d75306a08dd4f9e14ca9712bab01ae29b4eba551099 kernel-debug-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 21fdcb33e6b1b5bad7d046c7b7c26e83SHA-256: 6105f355d853263ba54a13a1fae55771a50278f3583098d5ecdffc4ef686db41 kernel-debug-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 90315d59617179451c5ba6cbd9c0528cSHA-256: dc090261a2187ad813aef1fb7c2e5d473ee0c064331e1f73af21f363e459ccc1 kernel-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 59f7efeed14601d22ad6e9d96cdbc5afSHA-256: 3e3eb1b6963efc4b5b997dfc7e535544f730cc4301c58263f8abc66ac67402be kernel-debuginfo-common-ppc64le-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: b42629e4d5b925922de3e9341e2ec2bdSHA-256: 8473c757d3050f7666768d0d81917b2ce4dbbce476bd733738f664ea9c388246 kernel-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 14586917d5b11fd64dd07555d561f7baSHA-256: 88a8cc851324c8f9dfc1e1c47a8bede7416e90b6acd8724fe7bbb0e1b3b3a930 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: df6b0b5d3906dc001796c9ae0997cd4fSHA-256: 4c3655df7e17d9fb4e0d7a9390db6a11183312f7b7e6db1a0ff310fcf329f8db kernel-tools-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: acc0597127ee2cd308ed99ccf1e890fcSHA-256: 680fa85318aa416bda211772ec45a21a95e2a463bf22aa11a79a495595be3b2c kernel-tools-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 347cb4f882a2b71a79e05cbf7516c6ceSHA-256: 9fa859a8f741554233ca1daa01f70c2217c8f3d926913a3a80b209056370714b kernel-tools-libs-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: c7ad5dfc40a2e4cbc638b712de7dc0b5SHA-256: 7a1ea167f9c1257f301d7d24413672f0707630e9d3f3757b02e7a72002006eb8 kernel-tools-libs-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 2ab03b1887e2fb4a5ed8915850755f2cSHA-256: 621934ffd4759bd928d77115f15ac3802850a7c494f4497a3f89f49229331ef6 perf-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 9619e6b32539ad03e15f33b1bf3372ddSHA-256: 1d14124102fb6cf43eec950b179cbce9a0031749c59f116a99246afceca5f11e perf-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: c782ecffb5c65292613eac2c69d46e0fSHA-256: a7148caca8de2989083e031d68f926fe2a50ac20475505f3113b0f1f8042584c python-perf-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 3fd385ba567b308184492d6d446a6207SHA-256: 3d63d1f17d7095122f9854c6584b79d0063e6adaf0983c05ad3d4448a76ab675 python-perf-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 8934bee4ab9358bc688698baa74c27b2SHA-256: e41fae24fb23e59ff284c8489fddecf08916c58b240b616c487412edc782685b   s390x: kernel-3.10.0-327.44.2.el7.s390x.rpm     MD5: 0067494c986edc0cf12d975ef947d20cSHA-256: f63c8a7e8dcc339f269d92e30ea5f553648ea65eccae7fa9910786257f3c6fbc kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.s390x.rpm     MD5: 06befb7126f33f90d296a68f5421066dSHA-256: 1cd968c89ae087a6fe682202a9b88d97135d271cf7645754c01215e3a69068ec kernel-debug-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 5c6e2c58b1d00d035bda471c342b2da3SHA-256: ef2d092261095ede2547fded65c1ece9e7e3fc2653f657adbf29470601da1b84 kernel-debug-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: d30f0091829743c87c27b90a4e91bca3SHA-256: 89282c5822e8556c9604d1470e7b05873e412ce5dfeda91cf090de94af0b60b1 kernel-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 390afd8e51ddbff727cc7255de283fdfSHA-256: 9f0f3416c7e48038b746ea5701dd9a255cf8c996bd5e58447f26d5cd69b7a320 kernel-debuginfo-common-s390x-3.10.0-327.44.2.el7.s390x.rpm     MD5: b7f2eaff996ff8703f213d0ace10f917SHA-256: 8aafb3609a9447f108ff278570742b1718a4eddd53818dbcf5c6d946c70566de kernel-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: 41304b6b8195f344aca3620e27953c6eSHA-256: ba587789d46d3e19735cff91055e3f7c658028987d1e7dc63079373ca6540f3e kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.s390x.rpm     MD5: 8fee99fba3ec7f0da660096b0aa3abbeSHA-256: 2a7b5b336c7ea5d4041b8546e1eeb72861549a59ebe2019127a612e7c8ac9898 kernel-kdump-3.10.0-327.44.2.el7.s390x.rpm     MD5: 4683c9de892bef90bc4b5062c91fa0cfSHA-256: bd53c7240a9b35c7b50e33676a596b3caeb41855287cfcaac8e2e809623c88e7 kernel-kdump-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 2a8b878d21d90b0ce0b9bced32756a19SHA-256: 2faf7c261c6323c8b3d70ff77a0c9fbb71fb584fea8b53a32a22ef9056ebbc41 kernel-kdump-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: fd4cdb952b95b689158be55dc5d2786aSHA-256: 4d7b00a9ad306bd080e27b13a929299016cbd303df5c85c1a8441ba3a225b435 perf-3.10.0-327.44.2.el7.s390x.rpm     MD5: 75c2cec355e72f0a44c896df0c9f1b96SHA-256: c2e9eb817ac28eb14e70f7579045ca445c294fe3b1618887c0b9fd53bb7c5464 perf-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: dd637c6f2647a466c21f3d9c6d80d834SHA-256: e01937eeb1c3a29424c1c85e8139969e8e12fda53bde53bb372970de5d48cfcc python-perf-3.10.0-327.44.2.el7.s390x.rpm     MD5: df07171e68dd1274e36ef00cc497baffSHA-256: 25b2f4d4c33a9385162f5df2a1bb9559a02b284f22130b74d937570718817bad python-perf-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: eeee69ebf797c00581ac97884132d414SHA-256: 0e0d8e69220797eb4eb42cd213356fa18ee9089f6d9d608c9eceae3cef200179   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server TUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:2965-1: systemd enhancement update

Updated systemd packages that add one enhancement are now available for Red HatEnterprise Linux 7.2 Extended Update Support. The systemd packages contain systemd, a system and service manager for Linux,compatible with the SysV and LSB init scripts.
It provides aggressiveparallelism capabilities, uses socket and D-Bus activation for startingservices, offers on-demand starting of daemons, and keeps track of processesusing Linux cgroups.
In addition, it supports snapshotting and restoring of thesystem state, maintains mount and automount points, and implements an elaboratetransactional dependency-based service control logic.
It can also work as adrop-in replacement for sysvinit.This update adds the following enhancement:* The /dev/disk/by-id/ directory now contains symlinks to Non-volatile MemoryExpress (NVMe) drives that are present on the system. With this update, symlinksbased on device World Wide Name, model number, and serial number are created.This allows the administrator to use persistent device names in configurationfiles, for example in /etc/fstab. (BZ#1388900)Users of systemd are advised to upgrade to these updated packages, which addthis enhancement. Red Hat Enterprise Linux HPC Node EUS (v. 7.2) SRPMS: systemd-219-19.el7_2.20.src.rpm     MD5: 312dc54e3eb56bdf12e7f28e8fa1d145SHA-256: 119e1e8c6ea397ec889a70e5010e0546cbc84bb77dff7ef01812a0b731960019   x86_64: libgudev1-219-19.el7_2.20.i686.rpm     MD5: e2062fc438aa8771c1fb12540b8f3032SHA-256: 1b8ad753a7aa4b7ed4284783bdf3086ae614519d447844c91e6be2fd1b0c87e2 libgudev1-219-19.el7_2.20.x86_64.rpm     MD5: 6f6126ccecd5250803d0e838468f80cdSHA-256: 2307d986bb946972307b02f25dda901d36336dfec923557ef75792a62db94ff9 libgudev1-devel-219-19.el7_2.20.i686.rpm     MD5: a5a66f54e78314d5a180f7477d2c0626SHA-256: af324020b96677f27ad8bced6b17c2d461480923ae4e806260ab29658cde57e7 libgudev1-devel-219-19.el7_2.20.x86_64.rpm     MD5: d69c4a3e58dc615d3c0c8724c72af241SHA-256: fd2a0068e135fe5bec4e6f0105c524fbd6969a572e46f6a80646af5244a08eef systemd-219-19.el7_2.20.x86_64.rpm     MD5: 22f0e14ee4c4c7ae5285f6dcc4eb79cdSHA-256: a4db40131f872c784d201f67420b81fa490372b54f1379f86be31d5f8799ad61 systemd-debuginfo-219-19.el7_2.20.i686.rpm     MD5: 1089a3296406c210a9fc81a529ed777dSHA-256: 19c892a60b815d2d384ed66b42c92c30c1078255f161809780ec338f6172f558 systemd-debuginfo-219-19.el7_2.20.x86_64.rpm     MD5: f36211561052454ad7a1656def3f2886SHA-256: ddc97bf19feba297aadcf70c84bc0049597c3276cdb71b2d0c42ebb72ddb58e5 systemd-devel-219-19.el7_2.20.i686.rpm     MD5: c3f806b70e29d7fb3c7d59e324f10081SHA-256: af7d4d6bb102933c49a98326896b28395bc11bb45d96b67a3c8f898151dd9cd2 systemd-devel-219-19.el7_2.20.x86_64.rpm     MD5: 603ac3facb70b405f9d7f80edb274bc2SHA-256: 24d5018f64a9ea6f57983c4062733cdd34cd9fd6cf3218e1b04fa1a008aad0da systemd-journal-gateway-219-19.el7_2.20.x86_64.rpm     MD5: c78eaa783105677f57f1a8fec1d15b37SHA-256: 28c909366f77a0f4b3ce870d0a0239c16592a1d28f85e73a55bf3af2d7bff8d0 systemd-libs-219-19.el7_2.20.i686.rpm     MD5: f1fcaad2c3445e11a07e3b6108d7f543SHA-256: 5918d399104996ee6b3a873c08e7c0ae17bf104743108f2f0c4b008d6de5d241 systemd-libs-219-19.el7_2.20.x86_64.rpm     MD5: d1d289df0f08f8ebb17d4b851f9b7761SHA-256: 6dd143ac08e92733fc6632514f53f6f8215317ff2337d363c901c3395c43d04f systemd-networkd-219-19.el7_2.20.x86_64.rpm     MD5: 34fdc1c27a14a7bb9701499caa938a6dSHA-256: a5136d06872044b15fade3065ca6a85dc57634f09cb44c0ac1b7ab8b895d2737 systemd-python-219-19.el7_2.20.x86_64.rpm     MD5: aac0887924e7042c83716d552d5dd80eSHA-256: 65f553f57587c39a6a6a2d31a5021923bc47f0f4c94c9e284bc4e53fb8f4d1c8 systemd-resolved-219-19.el7_2.20.i686.rpm     MD5: efe2a4820e521eb977ce55e049ce5b66SHA-256: e94ecf11e02a77f170e62828cc94e851a5d3bf51ff33455186c1d1ad09b8e1b3 systemd-resolved-219-19.el7_2.20.x86_64.rpm     MD5: 4fa6c0852a30d060885cd562daad5158SHA-256: 86f97b49857a83b9d8645702201f392031da2462418d3136fc7882d3fc29a500 systemd-sysv-219-19.el7_2.20.x86_64.rpm     MD5: d5b4a04ed01c44b56e00ae98ab1d8df1SHA-256: 76a5a8eef3f12e60e12409ab6759a5859ee90ce6aafe635d535291016a5988af   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: systemd-219-19.el7_2.20.src.rpm     MD5: 312dc54e3eb56bdf12e7f28e8fa1d145SHA-256: 119e1e8c6ea397ec889a70e5010e0546cbc84bb77dff7ef01812a0b731960019   x86_64: libgudev1-219-19.el7_2.20.i686.rpm     MD5: e2062fc438aa8771c1fb12540b8f3032SHA-256: 1b8ad753a7aa4b7ed4284783bdf3086ae614519d447844c91e6be2fd1b0c87e2 libgudev1-219-19.el7_2.20.x86_64.rpm     MD5: 6f6126ccecd5250803d0e838468f80cdSHA-256: 2307d986bb946972307b02f25dda901d36336dfec923557ef75792a62db94ff9 libgudev1-devel-219-19.el7_2.20.i686.rpm     MD5: a5a66f54e78314d5a180f7477d2c0626SHA-256: af324020b96677f27ad8bced6b17c2d461480923ae4e806260ab29658cde57e7 libgudev1-devel-219-19.el7_2.20.x86_64.rpm     MD5: d69c4a3e58dc615d3c0c8724c72af241SHA-256: fd2a0068e135fe5bec4e6f0105c524fbd6969a572e46f6a80646af5244a08eef systemd-219-19.el7_2.20.x86_64.rpm     MD5: 22f0e14ee4c4c7ae5285f6dcc4eb79cdSHA-256: a4db40131f872c784d201f67420b81fa490372b54f1379f86be31d5f8799ad61 systemd-debuginfo-219-19.el7_2.20.i686.rpm     MD5: 1089a3296406c210a9fc81a529ed777dSHA-256: 19c892a60b815d2d384ed66b42c92c30c1078255f161809780ec338f6172f558 systemd-debuginfo-219-19.el7_2.20.x86_64.rpm     MD5: f36211561052454ad7a1656def3f2886SHA-256: ddc97bf19feba297aadcf70c84bc0049597c3276cdb71b2d0c42ebb72ddb58e5 systemd-devel-219-19.el7_2.20.i686.rpm     MD5: c3f806b70e29d7fb3c7d59e324f10081SHA-256: af7d4d6bb102933c49a98326896b28395bc11bb45d96b67a3c8f898151dd9cd2 systemd-devel-219-19.el7_2.20.x86_64.rpm     MD5: 603ac3facb70b405f9d7f80edb274bc2SHA-256: 24d5018f64a9ea6f57983c4062733cdd34cd9fd6cf3218e1b04fa1a008aad0da systemd-journal-gateway-219-19.el7_2.20.x86_64.rpm     MD5: c78eaa783105677f57f1a8fec1d15b37SHA-256: 28c909366f77a0f4b3ce870d0a0239c16592a1d28f85e73a55bf3af2d7bff8d0 systemd-libs-219-19.el7_2.20.i686.rpm     MD5: f1fcaad2c3445e11a07e3b6108d7f543SHA-256: 5918d399104996ee6b3a873c08e7c0ae17bf104743108f2f0c4b008d6de5d241 systemd-libs-219-19.el7_2.20.x86_64.rpm     MD5: d1d289df0f08f8ebb17d4b851f9b7761SHA-256: 6dd143ac08e92733fc6632514f53f6f8215317ff2337d363c901c3395c43d04f systemd-networkd-219-19.el7_2.20.x86_64.rpm     MD5: 34fdc1c27a14a7bb9701499caa938a6dSHA-256: a5136d06872044b15fade3065ca6a85dc57634f09cb44c0ac1b7ab8b895d2737 systemd-python-219-19.el7_2.20.x86_64.rpm     MD5: aac0887924e7042c83716d552d5dd80eSHA-256: 65f553f57587c39a6a6a2d31a5021923bc47f0f4c94c9e284bc4e53fb8f4d1c8 systemd-resolved-219-19.el7_2.20.i686.rpm     MD5: efe2a4820e521eb977ce55e049ce5b66SHA-256: e94ecf11e02a77f170e62828cc94e851a5d3bf51ff33455186c1d1ad09b8e1b3 systemd-resolved-219-19.el7_2.20.x86_64.rpm     MD5: 4fa6c0852a30d060885cd562daad5158SHA-256: 86f97b49857a83b9d8645702201f392031da2462418d3136fc7882d3fc29a500 systemd-sysv-219-19.el7_2.20.x86_64.rpm     MD5: d5b4a04ed01c44b56e00ae98ab1d8df1SHA-256: 76a5a8eef3f12e60e12409ab6759a5859ee90ce6aafe635d535291016a5988af   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: systemd-219-19.el7_2.20.src.rpm     MD5: 312dc54e3eb56bdf12e7f28e8fa1d145SHA-256: 119e1e8c6ea397ec889a70e5010e0546cbc84bb77dff7ef01812a0b731960019   PPC: libgudev1-219-19.el7_2.20.ppc.rpm     MD5: 240eb1e9aff923e1d1e12c0cf980c017SHA-256: e7b9d2824e1546e5a42e9eab04f324c3b0d25857817e308370bde2a2ae6698e5 libgudev1-219-19.el7_2.20.ppc64.rpm     MD5: 65a9151bb40995b62b80e609272e79ccSHA-256: cfdc2b2d272e3569f414275fb35c6d5ec378659892adf32ba98b1d4604b4de2d libgudev1-devel-219-19.el7_2.20.ppc.rpm     MD5: 6f1cbab86748220fbd90d0e59e02e7d9SHA-256: 8b35d0215969392f95f0e13e476e1b6269ae958b83473d11e7a43ffe53436d01 libgudev1-devel-219-19.el7_2.20.ppc64.rpm     MD5: eabf9d1bbe8f0595652bff85a907fd15SHA-256: 156f11dcf7b8459dfa391b7c4a19609f8c86d5960b44a683624694589b8bf54f systemd-219-19.el7_2.20.ppc64.rpm     MD5: c6a5594957bd3f3e40e0760d49e8f007SHA-256: 9a59ed4291d1fb272c5b424fcb45c3acb72ef2f85da1fc215bbecb1f4d4457dc systemd-debuginfo-219-19.el7_2.20.ppc.rpm     MD5: e9b799ace9181d43e0df4faf2e35e0c4SHA-256: 153b96f3b0a7218a2c90def345349779861c19301f141d271afba9d4d6036149 systemd-debuginfo-219-19.el7_2.20.ppc64.rpm     MD5: 2b8a614f9526ca956370fdd5aab8e5edSHA-256: 1983c9d6cb9c35e12f0ce14ba462f983b2a758b12bc3f2eac27b6d0b34bbde2c systemd-devel-219-19.el7_2.20.ppc.rpm     MD5: 5ce56f71736a8a5d6d16556ad15a97ceSHA-256: 60624816c6811adeab015e8441c4ac11b32bc8371b9bcb99386e7be415e44f1a systemd-devel-219-19.el7_2.20.ppc64.rpm     MD5: 8e44c1220b09a88addb133e9ce853e95SHA-256: 2a4474edf07c31a31d4f6bdac15a00159c3630b5153d4f7feba01276c5db7bfe systemd-journal-gateway-219-19.el7_2.20.ppc64.rpm     MD5: 370609e4caeb49ae30ad861eb35f6486SHA-256: 8a798b02201c74d5d8419636b0052f415740091c8ec6994947c1213f7a476c29 systemd-libs-219-19.el7_2.20.ppc.rpm     MD5: 370a10a572ceca160bcec06afcbab6a4SHA-256: 2f83b2cb67967a15847d490c690e4b0e77ab236eaf076df55e58bc7702ef21ef systemd-libs-219-19.el7_2.20.ppc64.rpm     MD5: 7aa2d136786773913b0b339d660c139fSHA-256: f4556cec34f7e543af726e0150c0002152dd2ea11f6ebc4f29e6502123c5282c systemd-networkd-219-19.el7_2.20.ppc64.rpm     MD5: f1d3cca9c7bd84a4bd666c2fea73a324SHA-256: 5d5cdea43298b04e227a8f401a7e491aba333cc17f8cf9feeaa2cb57c1212dbe systemd-python-219-19.el7_2.20.ppc64.rpm     MD5: 2bfdcb44c1c0227702de26a48a005696SHA-256: 53820fc1ff57c8ed8f5c3767373961733896fb66022db65755c8d0802c4cacd3 systemd-resolved-219-19.el7_2.20.ppc.rpm     MD5: ac5a2be397144e518c6b2119e9474d6cSHA-256: 761911a2c8025f417f2344c2dc71227712416c18c8a572861c11827ee31c86a9 systemd-resolved-219-19.el7_2.20.ppc64.rpm     MD5: 1d3fbe63eff91d742e0ba98b2a46ce93SHA-256: 6b92102438e8994ba95323d093109acb3465164003db6c74ddda62cc190b29c3 systemd-sysv-219-19.el7_2.20.ppc64.rpm     MD5: c832ec2509a9484bd80b850f30a0cf03SHA-256: 872ccc6712416dc66f31c5d8ee8f32056232d28db8bf6e73c63c12535154bd71   PPC64LE: libgudev1-219-19.el7_2.20.ppc64le.rpm     MD5: deb743297266c796eed3deefd1ebf4c7SHA-256: 4c1f0b7e68bcd8d91bdab5531ccd9d7d01f0866cc18d2245a53f935b022203e6 libgudev1-devel-219-19.el7_2.20.ppc64le.rpm     MD5: 67cce5cf519e0f9155c0b6d27cb9eb47SHA-256: 7de24568b565c135e03f26a1967124649ad59796a8e347f758643a8c21822f2d systemd-219-19.el7_2.20.ppc64le.rpm     MD5: e2a3fe0b688a043f8b6660d0a667f867SHA-256: 22ff76bffe146b9d4e263fa3406954c2ef8d30732acab06b58583b058f447ef8 systemd-debuginfo-219-19.el7_2.20.ppc64le.rpm     MD5: 9188f1db74e2321d21d25962467ccb9dSHA-256: 7cca548c872c3e8a505eaac0afc691ad497931b01fe602fe110360bb3b466be0 systemd-devel-219-19.el7_2.20.ppc64le.rpm     MD5: 5040c24745fa2ab91c3bb4341f4daf31SHA-256: 423d073671d221471e4a349ee647c5d28f16bea7806c3958b715dedae7293d08 systemd-journal-gateway-219-19.el7_2.20.ppc64le.rpm     MD5: 47ef31bcc6e9bca6be706c1f97aeed95SHA-256: b817bccf540edb5aaf1184a4620017e69224e4edf707f5bc265cd3e922068793 systemd-libs-219-19.el7_2.20.ppc64le.rpm     MD5: 49393866259a30ebc57caf2315ee2b0aSHA-256: 74a2e488fbe566aa7422c3a777e00dc95865eb859440126f0b0ed314d866de04 systemd-networkd-219-19.el7_2.20.ppc64le.rpm     MD5: 06a542afee0d141835b05c4fca24233bSHA-256: 317cf00bfc5170683b498286571d81f10b190a1aab0758a499f882f0b47b5040 systemd-python-219-19.el7_2.20.ppc64le.rpm     MD5: eb9fef27c0adff391edad84fd9a6d928SHA-256: 96b8440ccb08eddfd0afdfa87ebf700a48e8320f9a740257422e96ab730593ff systemd-resolved-219-19.el7_2.20.ppc64le.rpm     MD5: 92176a998dc5cd909c65eda81e57d600SHA-256: 177d0b8fd20cb78212d0990f50245bd04429fd99b25d3233e8741e0347d17ba7 systemd-sysv-219-19.el7_2.20.ppc64le.rpm     MD5: 7dd8fcdd1869bbda87ebc7685edd6a10SHA-256: a5ba8654baafc0ce740d3ceb8c129c23f07f8641a74df07413210459f353cc7e   s390x: libgudev1-219-19.el7_2.20.s390.rpm     MD5: 9f473309db950d12be8e2ac627c3c147SHA-256: 055784b88ff7304bb3252873d9c83d856658377850b7d907c1a6b3c4561fee0d libgudev1-219-19.el7_2.20.s390x.rpm     MD5: 07fbfab3b175febb74fc8d5e5a404ffdSHA-256: 4bde7159d1f723537f2facaa4bbe1bcc5be2565e1803c9dacaebfe47ec138bbb libgudev1-devel-219-19.el7_2.20.s390.rpm     MD5: 9edc8c26ecf790e973817c9f7bb41f6aSHA-256: 1b6d142d65eafacd66f55c9152cfeefa822e9da05d29e141da45860462ab59c8 libgudev1-devel-219-19.el7_2.20.s390x.rpm     MD5: bc89981d01f9aa0496c4557062f984d8SHA-256: 1746bec962df46ff334aed1d1aeb60670cccfdfe31026f29276f7fe70544e459 systemd-219-19.el7_2.20.s390x.rpm     MD5: 31a3e9aa41948233b4e83a6f48c4b56aSHA-256: f8b0d9e3135cb25934dd32cc33c2600592e8a8ae29f1d73be74020b84bbe1eb8 systemd-debuginfo-219-19.el7_2.20.s390.rpm     MD5: 964b45906f0f01943ca9e632b79d8fd5SHA-256: 56130eef43fd957e59652bf554b9c7833b9f3885e75b3fedb726fb70566e0d12 systemd-debuginfo-219-19.el7_2.20.s390x.rpm     MD5: c7bdfbf46f7e4377550a3c55bb65c865SHA-256: fc56c2fff077681ed2cffae87eb6c49a3559f6431cafa09d118560f28883c1e3 systemd-devel-219-19.el7_2.20.s390.rpm     MD5: 9c29cbb3c1a5dc4d8f0d638e6032d6e9SHA-256: 6f7e217cbaded7ab219a2c213cf56debc2072a7fd18b8b4b5ce91f25813f38ff systemd-devel-219-19.el7_2.20.s390x.rpm     MD5: fe57707807ac62cb011c79ba6b80c8f1SHA-256: 981a26a8ce480dd852e4ff981f0783bad73283e84161f55cfd562369ce1183f9 systemd-journal-gateway-219-19.el7_2.20.s390x.rpm     MD5: 76872cea2e26e5cb67d44f20108d6ee0SHA-256: a40c4089632dee318733029cf958ef552338fb84189da134a9a917ea0bfb9327 systemd-libs-219-19.el7_2.20.s390.rpm     MD5: fd95e111141315077b8d3406ee9f407bSHA-256: cd00af8ff47bffb8cf48b0cebd9d891d9a6304b728e1a2721800103a29ce85f1 systemd-libs-219-19.el7_2.20.s390x.rpm     MD5: 67c4e80bd4809033875a82a01daada57SHA-256: 3e2e23addaa9e97de4fb8e1aac0a999ee33672e617cc71d320da4aeff8a6d8ad systemd-networkd-219-19.el7_2.20.s390x.rpm     MD5: 7878c6462c5d5add9028801d26efd71dSHA-256: 5832de9ccd7582f2940698de294bbd2747ef07c00ccaf6b68f843b3014462a53 systemd-python-219-19.el7_2.20.s390x.rpm     MD5: 49a2d4f4256f6ffea8188d285fb3fee9SHA-256: 7beae3add6360569ddf7b17af49b96619d6b0a4385ffd2be7199e6eafef6ccd3 systemd-resolved-219-19.el7_2.20.s390.rpm     MD5: b287a2c874a6c3fec4a2a75447853f27SHA-256: f6cae2d6032f92ceb5d6ce0ba1178d53e09dded7c56bd984f520aed677bee89a systemd-resolved-219-19.el7_2.20.s390x.rpm     MD5: 55d873618b01d79dc51c3f3eea6c6f30SHA-256: b006c4614563fa5c3ba7846ea45df8765cdf83829dc476d1c40f9fdc2b7cf135 systemd-sysv-219-19.el7_2.20.s390x.rpm     MD5: 6b533eba04ce60cf6e6dc5d83a9ee4e5SHA-256: 4049dfcc45b7d757c796f61b8219b179f5300987280b96dbc0242d2951d09342   x86_64: libgudev1-219-19.el7_2.20.i686.rpm     MD5: e2062fc438aa8771c1fb12540b8f3032SHA-256: 1b8ad753a7aa4b7ed4284783bdf3086ae614519d447844c91e6be2fd1b0c87e2 libgudev1-219-19.el7_2.20.x86_64.rpm     MD5: 6f6126ccecd5250803d0e838468f80cdSHA-256: 2307d986bb946972307b02f25dda901d36336dfec923557ef75792a62db94ff9 libgudev1-devel-219-19.el7_2.20.i686.rpm     MD5: a5a66f54e78314d5a180f7477d2c0626SHA-256: af324020b96677f27ad8bced6b17c2d461480923ae4e806260ab29658cde57e7 libgudev1-devel-219-19.el7_2.20.x86_64.rpm     MD5: d69c4a3e58dc615d3c0c8724c72af241SHA-256: fd2a0068e135fe5bec4e6f0105c524fbd6969a572e46f6a80646af5244a08eef systemd-219-19.el7_2.20.x86_64.rpm     MD5: 22f0e14ee4c4c7ae5285f6dcc4eb79cdSHA-256: a4db40131f872c784d201f67420b81fa490372b54f1379f86be31d5f8799ad61 systemd-debuginfo-219-19.el7_2.20.i686.rpm     MD5: 1089a3296406c210a9fc81a529ed777dSHA-256: 19c892a60b815d2d384ed66b42c92c30c1078255f161809780ec338f6172f558 systemd-debuginfo-219-19.el7_2.20.x86_64.rpm     MD5: f36211561052454ad7a1656def3f2886SHA-256: ddc97bf19feba297aadcf70c84bc0049597c3276cdb71b2d0c42ebb72ddb58e5 systemd-devel-219-19.el7_2.20.i686.rpm     MD5: c3f806b70e29d7fb3c7d59e324f10081SHA-256: af7d4d6bb102933c49a98326896b28395bc11bb45d96b67a3c8f898151dd9cd2 systemd-devel-219-19.el7_2.20.x86_64.rpm     MD5: 603ac3facb70b405f9d7f80edb274bc2SHA-256: 24d5018f64a9ea6f57983c4062733cdd34cd9fd6cf3218e1b04fa1a008aad0da systemd-journal-gateway-219-19.el7_2.20.x86_64.rpm     MD5: c78eaa783105677f57f1a8fec1d15b37SHA-256: 28c909366f77a0f4b3ce870d0a0239c16592a1d28f85e73a55bf3af2d7bff8d0 systemd-libs-219-19.el7_2.20.i686.rpm     MD5: f1fcaad2c3445e11a07e3b6108d7f543SHA-256: 5918d399104996ee6b3a873c08e7c0ae17bf104743108f2f0c4b008d6de5d241 systemd-libs-219-19.el7_2.20.x86_64.rpm     MD5: d1d289df0f08f8ebb17d4b851f9b7761SHA-256: 6dd143ac08e92733fc6632514f53f6f8215317ff2337d363c901c3395c43d04f systemd-networkd-219-19.el7_2.20.x86_64.rpm     MD5: 34fdc1c27a14a7bb9701499caa938a6dSHA-256: a5136d06872044b15fade3065ca6a85dc57634f09cb44c0ac1b7ab8b895d2737 systemd-python-219-19.el7_2.20.x86_64.rpm     MD5: aac0887924e7042c83716d552d5dd80eSHA-256: 65f553f57587c39a6a6a2d31a5021923bc47f0f4c94c9e284bc4e53fb8f4d1c8 systemd-resolved-219-19.el7_2.20.i686.rpm     MD5: efe2a4820e521eb977ce55e049ce5b66SHA-256: e94ecf11e02a77f170e62828cc94e851a5d3bf51ff33455186c1d1ad09b8e1b3 systemd-resolved-219-19.el7_2.20.x86_64.rpm     MD5: 4fa6c0852a30d060885cd562daad5158SHA-256: 86f97b49857a83b9d8645702201f392031da2462418d3136fc7882d3fc29a500 systemd-sysv-219-19.el7_2.20.x86_64.rpm     MD5: d5b4a04ed01c44b56e00ae98ab1d8df1SHA-256: 76a5a8eef3f12e60e12409ab6759a5859ee90ce6aafe635d535291016a5988af   Red Hat Enterprise Linux Server TUS (v. 7.2) SRPMS: systemd-219-19.el7_2.20.src.rpm     MD5: 312dc54e3eb56bdf12e7f28e8fa1d145SHA-256: 119e1e8c6ea397ec889a70e5010e0546cbc84bb77dff7ef01812a0b731960019   x86_64: libgudev1-219-19.el7_2.20.i686.rpm     MD5: e2062fc438aa8771c1fb12540b8f3032SHA-256: 1b8ad753a7aa4b7ed4284783bdf3086ae614519d447844c91e6be2fd1b0c87e2 libgudev1-219-19.el7_2.20.x86_64.rpm     MD5: 6f6126ccecd5250803d0e838468f80cdSHA-256: 2307d986bb946972307b02f25dda901d36336dfec923557ef75792a62db94ff9 libgudev1-devel-219-19.el7_2.20.i686.rpm     MD5: a5a66f54e78314d5a180f7477d2c0626SHA-256: af324020b96677f27ad8bced6b17c2d461480923ae4e806260ab29658cde57e7 libgudev1-devel-219-19.el7_2.20.x86_64.rpm     MD5: d69c4a3e58dc615d3c0c8724c72af241SHA-256: fd2a0068e135fe5bec4e6f0105c524fbd6969a572e46f6a80646af5244a08eef systemd-219-19.el7_2.20.x86_64.rpm     MD5: 22f0e14ee4c4c7ae5285f6dcc4eb79cdSHA-256: a4db40131f872c784d201f67420b81fa490372b54f1379f86be31d5f8799ad61 systemd-debuginfo-219-19.el7_2.20.i686.rpm     MD5: 1089a3296406c210a9fc81a529ed777dSHA-256: 19c892a60b815d2d384ed66b42c92c30c1078255f161809780ec338f6172f558 systemd-debuginfo-219-19.el7_2.20.x86_64.rpm     MD5: f36211561052454ad7a1656def3f2886SHA-256: ddc97bf19feba297aadcf70c84bc0049597c3276cdb71b2d0c42ebb72ddb58e5 systemd-devel-219-19.el7_2.20.i686.rpm     MD5: c3f806b70e29d7fb3c7d59e324f10081SHA-256: af7d4d6bb102933c49a98326896b28395bc11bb45d96b67a3c8f898151dd9cd2 systemd-devel-219-19.el7_2.20.x86_64.rpm     MD5: 603ac3facb70b405f9d7f80edb274bc2SHA-256: 24d5018f64a9ea6f57983c4062733cdd34cd9fd6cf3218e1b04fa1a008aad0da systemd-journal-gateway-219-19.el7_2.20.x86_64.rpm     MD5: c78eaa783105677f57f1a8fec1d15b37SHA-256: 28c909366f77a0f4b3ce870d0a0239c16592a1d28f85e73a55bf3af2d7bff8d0 systemd-libs-219-19.el7_2.20.i686.rpm     MD5: f1fcaad2c3445e11a07e3b6108d7f543SHA-256: 5918d399104996ee6b3a873c08e7c0ae17bf104743108f2f0c4b008d6de5d241 systemd-libs-219-19.el7_2.20.x86_64.rpm     MD5: d1d289df0f08f8ebb17d4b851f9b7761SHA-256: 6dd143ac08e92733fc6632514f53f6f8215317ff2337d363c901c3395c43d04f systemd-networkd-219-19.el7_2.20.x86_64.rpm     MD5: 34fdc1c27a14a7bb9701499caa938a6dSHA-256: a5136d06872044b15fade3065ca6a85dc57634f09cb44c0ac1b7ab8b895d2737 systemd-python-219-19.el7_2.20.x86_64.rpm     MD5: aac0887924e7042c83716d552d5dd80eSHA-256: 65f553f57587c39a6a6a2d31a5021923bc47f0f4c94c9e284bc4e53fb8f4d1c8 systemd-resolved-219-19.el7_2.20.i686.rpm     MD5: efe2a4820e521eb977ce55e049ce5b66SHA-256: e94ecf11e02a77f170e62828cc94e851a5d3bf51ff33455186c1d1ad09b8e1b3 systemd-resolved-219-19.el7_2.20.x86_64.rpm     MD5: 4fa6c0852a30d060885cd562daad5158SHA-256: 86f97b49857a83b9d8645702201f392031da2462418d3136fc7882d3fc29a500 systemd-sysv-219-19.el7_2.20.x86_64.rpm     MD5: d5b4a04ed01c44b56e00ae98ab1d8df1SHA-256: 76a5a8eef3f12e60e12409ab6759a5859ee90ce6aafe635d535291016a5988af   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:2962-1: Important: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A use-after-free vulnerability was found in the kernels socket recvmmsgsubsystem.

This may allows remote attackers to corrupt memory and may allowexecution of arbitrary code.

This corruption takes place during the errorhandling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)Bug Fix(es):* Previously, guest virtual machines (VMs) on a Hyper-V server cluster got insome cases rebooted during the graceful node failover test, because the hostkept sending heartbeat packets independently of guests responding to them.

Thisupdate fixes the bug by properly responding to all the heartbeat messages in thequeue, even if they are pending.

As a result, guest VMs no longer get rebootedunder the described circumstances. (BZ#1391167) Red Hat Enterprise Linux (v. 5 server) SRPMS: kernel-2.6.18-417.el5.src.rpm     MD5: 4283c50e1a723ddc186ac3f49dcd7d00SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae   IA-32: kernel-2.6.18-417.el5.i686.rpm     MD5: bb944ac235b5ca2fc2061144c1b5f08dSHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb kernel-PAE-2.6.18-417.el5.i686.rpm     MD5: 7b9f6e09489554062456a615e25f0630SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm     MD5: f9016bb5143a48556359c32903ba473aSHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc kernel-PAE-devel-2.6.18-417.el5.i686.rpm     MD5: ec97f1c345b9a15ff815543c4b9f484aSHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400 kernel-debug-2.6.18-417.el5.i686.rpm     MD5: f0b0d829e80765c0d70e5c273fb18532SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878 kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 7e8691ab43cd599a963dd69b3f5853d6SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774 kernel-debug-devel-2.6.18-417.el5.i686.rpm     MD5: 974b760d657b1bfb101e6e13cd4dd372SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47 kernel-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 84217c363e695b4612041ce45b984cf5SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c kernel-debuginfo-common-2.6.18-417.el5.i686.rpm     MD5: 2649996e4544ee7ea50d1620b6562352SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef kernel-devel-2.6.18-417.el5.i686.rpm     MD5: 53a61e0bdb479f061db8c01eab3c492cSHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.i386.rpm     MD5: 663994d90e10d5975d87b21d9aa24063SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692 kernel-xen-2.6.18-417.el5.i686.rpm     MD5: 9e601ffa9436b8d5d602d8dfb8ac5628SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 4f2c346c65b7826c3f315b0e71a63af0SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5 kernel-xen-devel-2.6.18-417.el5.i686.rpm     MD5: d7402b006fe49104c2bbfda929c45532SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b   IA-64: kernel-2.6.18-417.el5.ia64.rpm     MD5: 7e47451f92c89524f33e4038b41a06c7SHA-256: 3014a80b82b27dfa97cbf55ef55d1e2f3248b030ca7271d13d2442c0bfca9639 kernel-debug-2.6.18-417.el5.ia64.rpm     MD5: 0455bf805ae4a8883596c4c0ae27b4baSHA-256: 1fa665f0c9b0355bcb0f0fa753fe75774e030cee4e9763412ac338f9a888c635 kernel-debug-debuginfo-2.6.18-417.el5.ia64.rpm     MD5: 8df7d6570bedc8c7df41d1b07896ef8fSHA-256: 5f96e8557fe252c0648a431275124aa799ca5ea93fe0492eed50e6dfccf7ff4f kernel-debug-devel-2.6.18-417.el5.ia64.rpm     MD5: b81da843259cb09426320d01532987c7SHA-256: 4bf8020f398eab3e4a38f31638806a176c77dfe45bdeed7e9c42d8f7b73db409 kernel-debuginfo-2.6.18-417.el5.ia64.rpm     MD5: db94264290fe35ebf2328ac9ea897c48SHA-256: c3812826acaa2d0c555feb066fbef8427b960f804caf5445bcb9533480949c2c kernel-debuginfo-common-2.6.18-417.el5.ia64.rpm     MD5: 67a185a5a35ab276fd1ff2ba9d5b21b7SHA-256: 51a1210e6a5d890f22a7849eadf76639150ffe4ce37914deca2169e1d537072c kernel-devel-2.6.18-417.el5.ia64.rpm     MD5: 3df3b9e57127ed87cbb7e689153098caSHA-256: b20b36fb75d2d616800165ea6372e3176add8d0dc609828880711cb523f2c5d6 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.ia64.rpm     MD5: af94ef5b11ae1b54dcf8999b9ed98ce5SHA-256: f44c2e763d2e801f77b22d490260832fd4e0a356fc6331e53daa6676b7f56d5d kernel-xen-2.6.18-417.el5.ia64.rpm     MD5: 82ba7cd9006e25bdecb8ff1d8814b221SHA-256: bf86b4ad9c3007cf6dd65240821e9eab231fead49787b194338a716ae595e5eb kernel-xen-debuginfo-2.6.18-417.el5.ia64.rpm     MD5: f30b693eb1fbe21e9bf861fa66c257f8SHA-256: 555bd486c735662d6963a9838a53cd4616a28e01b3f81a689ede438bd0d5abcd kernel-xen-devel-2.6.18-417.el5.ia64.rpm     MD5: a0e6d40dcd8f42dc14e3b177d7f105aeSHA-256: 420601aa5da611f105fbcdd03ce2a847282f931bc126d37b92ec9a675e85c6e5   PPC: kernel-2.6.18-417.el5.ppc64.rpm     MD5: ff7e18cc1bd707f1894a454704871bd0SHA-256: b11eb0b05b660c6899265977a88293065c4373eb4a2ab2d296abb679401a0cb6 kernel-debug-2.6.18-417.el5.ppc64.rpm     MD5: cd978e7dde536f805a5ded685bbee1e7SHA-256: eafb8e04795a6a89f3d6aba404144344efeccec35bd3dba1775db5301425b1e9 kernel-debug-debuginfo-2.6.18-417.el5.ppc64.rpm     MD5: 75ad5a4e56b19cb8df4daba4d162475dSHA-256: 7243086506781eb3e2957a1f99e7fcb08971002d82f2783fd386d90d03e9df70 kernel-debug-devel-2.6.18-417.el5.ppc64.rpm     MD5: 53a4c5bdd3e6ffd5fb5bb00e109fff59SHA-256: 7a61cc02ca3c7ca72985b8a251ed7d2e50771bb8aa3ecef424a41020d1cac80e kernel-debuginfo-2.6.18-417.el5.ppc64.rpm     MD5: 9ec962b636c810983307cc4dce7032c9SHA-256: d40f2e1234d3543e43e4745bd26f041680f6f88b92ea10a0f2643696099b4c7a kernel-debuginfo-common-2.6.18-417.el5.ppc64.rpm     MD5: f6e1467258c690c9df567aedaba23533SHA-256: ac12bf953bed6868a63123321098735b4c6400a414eca87f4c6e9655d3a9540d kernel-devel-2.6.18-417.el5.ppc64.rpm     MD5: 7ffd212e07a4cb887e8b9fd9acc182e5SHA-256: c270974da1cd73d99bbad4044d90ec5d9f45bc19d97c584aad2d23ff5b1cc395 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.ppc.rpm     MD5: 046ac592d7bf7bb54521cdceff7c8739SHA-256: e7202e0b1cd8034a012110bd583a4d7ff7b8928055a228a344648ef35efce76e kernel-headers-2.6.18-417.el5.ppc64.rpm     MD5: e2e6fd6320d98b2f3b87d11be02f48e1SHA-256: a6fa3c2ad51c1335c470ec1b798c4f7751f043f04a1b0108347205b2a67e2cd5 kernel-kdump-2.6.18-417.el5.ppc64.rpm     MD5: bc74a3290013c789f2b48d8b5f629943SHA-256: f3e4be9dc783d3ae2448f06dcde90ba34078deb375665bb651ae898d9f5a8c57 kernel-kdump-debuginfo-2.6.18-417.el5.ppc64.rpm     MD5: 17c7d7ebcf83df645cdc9367b0e41481SHA-256: dbae6a913737083c15accd4183e413b0cc2f4a5a4df1a0d9f09d94e15ddcbc17 kernel-kdump-devel-2.6.18-417.el5.ppc64.rpm     MD5: 3ea2f143432588110a56af82dddec8c7SHA-256: 514d3aba1839f5e5cd0803aae7a21dcfc55c7c636d5836e2c17183131e52e2b5   s390x: kernel-2.6.18-417.el5.s390x.rpm     MD5: ede1de60dafef9c92cb5a09bfb3fca50SHA-256: c4077989884d658a1e36ddb8d14d3b58a229162b4aea47540d9d81c5fb0d882b kernel-debug-2.6.18-417.el5.s390x.rpm     MD5: 1f4be3d76d87be74fa21a19560d87d47SHA-256: fd4b9fc46c6dba6ed3d79c220492b9cb8ebe6a72f764a8778e72e814329b95a0 kernel-debug-debuginfo-2.6.18-417.el5.s390x.rpm     MD5: a5bca4f20326c273abea3107fbc7fe1dSHA-256: 2a15116d66a7b4bca57503aab44141e03d92c7812d1b40288287d3f0f7b45a8c kernel-debug-devel-2.6.18-417.el5.s390x.rpm     MD5: 66bb6b0565bbbb35868362f943727e99SHA-256: 3559b4e8f238d975b3fe6b015be0d366d942dff0fcab125ee299cf87c66dcbea kernel-debuginfo-2.6.18-417.el5.s390x.rpm     MD5: 4a068f590d12ccedc1b321355ec17eb5SHA-256: eeefa8904b06a4f25a8a277fe7464b55ada2bf21922db7f6dbe7b8220fe68292 kernel-debuginfo-common-2.6.18-417.el5.s390x.rpm     MD5: 924c6be198499b65e39915ff7686bd78SHA-256: cc1499f45de64772383e6d24dc39d17e3e864010217c36b8c7f8311346785b7d kernel-devel-2.6.18-417.el5.s390x.rpm     MD5: 4d1086c73a4c087f9c9a944f79fbdd2eSHA-256: 59a659fbb1a1570b2d452217962f795e5184f9aeddc659f14a26b5d86a33863b kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.s390x.rpm     MD5: 280ac8c543abc23417365b56ef5723eeSHA-256: 3aab5af416a7b21f3a157992e5a0d83cc3106579a5ef46f9f9d63f8220d7ee20 kernel-kdump-2.6.18-417.el5.s390x.rpm     MD5: 2f1ff67d6558c3b2408072ae48912ec9SHA-256: 9153696399fea10b9300f40577e498937919ac95cd821f320b9588842af3c6f9 kernel-kdump-debuginfo-2.6.18-417.el5.s390x.rpm     MD5: 5ce517795316b7ff41a2843e9e9edc83SHA-256: 2480ea5a5f66da7354cb1c36ae7f269912696ed6d1013a84971d4e8042b4e695 kernel-kdump-devel-2.6.18-417.el5.s390x.rpm     MD5: d6a020feedfbd72c222d9a116cbe3343SHA-256: d4618cb122854ff60aca29b866778f90d4b1362c9ebe5f114dd42266226ad0f2   x86_64: kernel-2.6.18-417.el5.x86_64.rpm     MD5: c24b71dacf966c2b69a5a75f91be918cSHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38 kernel-debug-2.6.18-417.el5.x86_64.rpm     MD5: ab9aa06254d17c4c9548b1ea7804ef19SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: c188e6ea712aa61762e3ed7b87f9a161SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa kernel-debug-devel-2.6.18-417.el5.x86_64.rpm     MD5: 94fb13187d4b899c2049b939e68560adSHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531 kernel-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: ac108d9259693dfae83706a8c49579bfSHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm     MD5: 606c7830ccb272249f5aab62ec7e0efcSHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c kernel-devel-2.6.18-417.el5.x86_64.rpm     MD5: e2aa6bf6f609c1835d99e39fee2a4290SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.x86_64.rpm     MD5: 5d1275a9c97dbdb1e54056396ff88037SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7 kernel-xen-2.6.18-417.el5.x86_64.rpm     MD5: 8f5ce4954dbc2116ced9725d3548d9cdSHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965 kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: f2a4f4836f82189f922b3d2e86ba1b7cSHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2 kernel-xen-devel-2.6.18-417.el5.x86_64.rpm     MD5: a6412f869bb51a8267a9706e4262b33bSHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: kernel-2.6.18-417.el5.src.rpm     MD5: 4283c50e1a723ddc186ac3f49dcd7d00SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae   IA-32: kernel-2.6.18-417.el5.i686.rpm     MD5: bb944ac235b5ca2fc2061144c1b5f08dSHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb kernel-PAE-2.6.18-417.el5.i686.rpm     MD5: 7b9f6e09489554062456a615e25f0630SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm     MD5: f9016bb5143a48556359c32903ba473aSHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc kernel-PAE-devel-2.6.18-417.el5.i686.rpm     MD5: ec97f1c345b9a15ff815543c4b9f484aSHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400 kernel-debug-2.6.18-417.el5.i686.rpm     MD5: f0b0d829e80765c0d70e5c273fb18532SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878 kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 7e8691ab43cd599a963dd69b3f5853d6SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774 kernel-debug-devel-2.6.18-417.el5.i686.rpm     MD5: 974b760d657b1bfb101e6e13cd4dd372SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47 kernel-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 84217c363e695b4612041ce45b984cf5SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c kernel-debuginfo-common-2.6.18-417.el5.i686.rpm     MD5: 2649996e4544ee7ea50d1620b6562352SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef kernel-devel-2.6.18-417.el5.i686.rpm     MD5: 53a61e0bdb479f061db8c01eab3c492cSHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.i386.rpm     MD5: 663994d90e10d5975d87b21d9aa24063SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692 kernel-xen-2.6.18-417.el5.i686.rpm     MD5: 9e601ffa9436b8d5d602d8dfb8ac5628SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 4f2c346c65b7826c3f315b0e71a63af0SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5 kernel-xen-devel-2.6.18-417.el5.i686.rpm     MD5: d7402b006fe49104c2bbfda929c45532SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b   x86_64: kernel-2.6.18-417.el5.x86_64.rpm     MD5: c24b71dacf966c2b69a5a75f91be918cSHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38 kernel-debug-2.6.18-417.el5.x86_64.rpm     MD5: ab9aa06254d17c4c9548b1ea7804ef19SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: c188e6ea712aa61762e3ed7b87f9a161SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa kernel-debug-devel-2.6.18-417.el5.x86_64.rpm     MD5: 94fb13187d4b899c2049b939e68560adSHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531 kernel-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: ac108d9259693dfae83706a8c49579bfSHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm     MD5: 606c7830ccb272249f5aab62ec7e0efcSHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c kernel-devel-2.6.18-417.el5.x86_64.rpm     MD5: e2aa6bf6f609c1835d99e39fee2a4290SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.x86_64.rpm     MD5: 5d1275a9c97dbdb1e54056396ff88037SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7 kernel-xen-2.6.18-417.el5.x86_64.rpm     MD5: 8f5ce4954dbc2116ced9725d3548d9cdSHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965 kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: f2a4f4836f82189f922b3d2e86ba1b7cSHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2 kernel-xen-devel-2.6.18-417.el5.x86_64.rpm     MD5: a6412f869bb51a8267a9706e4262b33bSHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

What can you do with a billion Yahoo passwords? Lots of...

An image sent by DNC staffer Alexandra Chalupa shows a warning message she received from Yahoo Mail.
She may have been targeted using data from one of the Yahoo breaches or a forged cookie based on stolen Yahoo code.Alexandra Chalupa reader comments 28 Share this story In October of 2013, as a result of documents leaked by Edward Snowden, we learned the National Security Agency tapped straight into the connections between data centers at Yahoo and Google as part of a program called MUSCULAR.

A month later, Yahoo announced it would encrypt all of its internal networks between data centers and add Secure Socket Layer encryption and secure (HTTPS) Web connections to all its services. That move, however, failed to prevent two major breaches of user data: a breach affecting user data from more than 500 million user accounts late in 2014 (revealed in September) and the breach revealed yesterday involving data from more than 1 billion accounts.

The recent break took place in August of 2013—before the barn door was closed.
In addition, Yahoo's chief information security officer, Bob Lord, said that the parties behind the 2014 breach had stolen some of Yahoo's code and used it to forge Web "cookies" that gave access to users' accounts without the need to use login credentials. Evidence of the August 2013 breach was given to Yahoo by "law enforcement officials," according to Lord, but it was likely discovered by a security researcher watching for data on underground markets.

That suggests the data was in circulation in underground marketplaces in one form or another and actively in use by Internet criminal rings for a variety of purposes.
If that's the case, then practically all of Yahoo's users who set up accounts prior to 2013 may have had details from their accounts used in targeted attacks, attempts to gain access to other Web accounts and cloud services, or any number of other scams. Given that the data exposed included the name, birth date, personal details shared as security questions, additional e-mail addresses, and in some cases phone numbers, the account data could be used to identify and target individuals in a number of ways.

And that information is likely to have been combined with other breached data to provide a powerful tool to hackers looking to target specific individuals. For example, there's the case of Alexandra Chalupa, a consultant who had been working for the Democratic National Committee.

Despite frequent password changes, she received numerous pop-up messages from Yahoo Mail stating, "We strongly suspect your account has been the target of state-sponsored actors." Chalupa sent a message to DNC Communications Director Luis Miranda about the alerts on May 3 as the DNC began to become aware of its serious security issues. The incidents began while she was researching former Donald Trump Campaign Chairman Paul Manafort's work for former Ukraine President Viktor Yanukovich (whose government was toppled by protests in Ukraine, leading to the current conflict between Ukraine and Russia-backed separatists).

Chalupa, who was using her personal Apple computer with an older version of the MacOS X operating system and the Safari browser, may have been targeted using forged cookies. Yahoo would not comment on Chalupa's case, though the company confirmed that the message she shared was consistent with what users believed to have been subjected to a state-sponsored or advanced persistent threat attack would have seen. The exposure for Chalupa went beyond hacking.

According to her sister, she was targeted personally in more physical ways.
In a July Facebook post, Andrea Chalupa said: This just breaking, so since it's family, I'll share finally that my sister has been personally harassed, including her car broken into, an attempt to break into her house in the middle of the night, her personal e-mail hacked ever since she began, many months ago, investigating Trumps ties to Putin/Russia. Chalupa's case is an extreme instance, but it highlights some of the risks users may face if their account data was used to target them. Foreign Intelligence agencies could use the data from the Yahoo breach to help with other efforts targeted at government employees. As Bloomberg reported last night, the data from the 2013 breach included personal data of more than 150,000 US government employees and members of the military. Whether or not that information gets combined with data pulled from the hack of the Office of Management and Budget attributed to China earlier this year, the information could be used in spear-phishing campaigns—especially if government e-mail addresses or other data identifies an account owner as affiliated with the government or military. That's not to minimize the danger associated with the information being in the hands of criminals, who are just as capable of using data for targeted attacks.

The passwords alone are a major hazard. While they were protected barely obscured by an MD5 hash, the security of those passwords depends greatly on the strength of the hash key and of the password—and many of the weaker passwords in the exposed accounts may have been easily cracked. Note: there are tools online that can easily crack many MD5 hashes. "If the billion password hashes have been broken," said Richard Henderson, global security strategist at end-point security software provider Absolute Software, "then that provides a ton of ammunition for attackers to attempt to get into other accounts belonging to the same target." What is perhaps most unsettling about the breach is that Yahoo and the forensics experts brought in did not discover the earlier breach when investigating the 2014 incident.

And Yahoo still does not know the means by which this compromise occurred.

To boot, there's no telling how much personal data has been exposed in the meantime as a result of that data exposure.