2. Setting up
Express5800/R320e-E4, R320e-M4 Installation Guide (Linux)
18
Chapter 1 Installing Operating System
2.2.4
Preparation for software
(1)
Requirements for Setup
To be obtained from Red Hat, Inc.
Note Download the file from Red Hat Network (https://rhn.redhat.com/). Check that the
SHA256 check sum of the downloaded file matches the SHA256 check sum described
in the download page by using the following command.
# sha256sum <filename>
If the registration number (RHN-ID) is not registered, register it by referring to Chapter 1
(2.2.3 (2) Registration to Red Hat Network) of this manual.
– RHEL7.2 installation media (ISO image file)
Tips Create the installation media from the Red Hat Enterprise Linux 7.2 (x86_64) ISO image
file.
It is not required to create the installation media in the following cases.
- The installation media has been already created.
- Correction package
kernel-3.10.0-327.18.2.el7.x86_64.rpm
kernel-devel-3.10.0-327.18.2.el7.x86_64.rpm
kernel-doc-3.10.0-327.18.2.el7.noarch.rpm
Important For the ft server, the combination of the kernel version and ft control software
version has been determined. Apply kernel-3.10.0-327.18.2.el7.
glibc-2.17-106.el7_2.4.x86_64.rpm
glibc-common-2.17-106.el7_2.4.x86_64.rpm
glibc-devel-2.17-106.el7_2.4.x86_64.rpm
glibc-headers-2.17-106.el7_2.4.x86_64.rpm
Important In glibc (GNU C library) included in the RHEL7.2 installation media, the vulnerability
(CVE-2015-7547) that has an extremely serious impact has been found out. If this
vulnerability is misused, the getaddrinfo() function may be used for illegal
processing, and the desired code may be executed in some cases. This problem has
been corrected in glibc-2.17-106.el7_2.4 or later.
openssl-1.0.1e-51.el7_2.4.x86_64.rpm
openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpm
Important In OpenSSL included in the RHEL7.2 installation media, the vulnerability
(CVE-2016-0800, known as DROWN) that has an extremely serious impact has been
found out. If this vulnerability is misused, the TLS session may be decrypted
(decoded), and the information may be leaked. This problem has been corrected in
openssl-1.0.1e-51.el7_2.4 or later.