Updated initscripts packages that fix one bug are now available for Red HatEnterprise Linux 6.

The initscripts packages contain basic system scripts to boot the system, changerunlevels, activate and deactivate most network interfaces, and shut down thesystem cleanly.This update fixes the following bug:* Due to a race condition in the initscripts utility, the multicast_snoopingbridging option failed to be applied before creating a bridge device. With thisupdate, multicast_snooping is instead applied after the bridge is up, and theoption now works as intended. (BZ#1156364)Users of initscripts are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
initscripts-9.03.46-1.el6_6.1.src.rpm
    MD5: 9ecc7a355256e1fe4155d01e7c8c992cSHA-256: 1c7c7ed1412b4026a1c1192ed67e5aaa7f511dbcfa0943f9dc5368402e9b8f9e
 
IA-32:
debugmode-9.03.46-1.el6_6.1.i686.rpm
    MD5: 345f2d181339e854f82ae83884254c39SHA-256: 54c2f0c75f1ae77ada07c96192af4c513215962c8108c091ec89dc5d9f78c473
initscripts-9.03.46-1.el6_6.1.i686.rpm
    MD5: c588e3d1f84bf79b24de18c03726e343SHA-256: 1b07795f9f9d023b018e2d23974b8bf70dd39572b0827d312ac23b75f5b13037
initscripts-debuginfo-9.03.46-1.el6_6.1.i686.rpm
    MD5: b16726c529fae9094c15c75884720d7bSHA-256: a07d8f2ae00bd4242627b61034ccdbcaea39d2defffc9a081707e5ea8ba48693
 
x86_64:
debugmode-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 0f56ab8961f7b3bdcc579cea99e6abf6SHA-256: dd79b8f44b723497bf82dfa6b83309049e710dbc81ec8906e84d3d297d48438f
initscripts-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 1a9eb8e9e2b91c642598dc75d1703063SHA-256: 21f9ccd3215b267d654724a8a2c5e074505bd56c4cf34575bb89fedc4370e6f1
initscripts-debuginfo-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: fb0a5170f82a065c6bd5a0e0508acd1cSHA-256: 44f79a9ee4c2cd3e52b6ea658d68b1fece90c3dfacffc96446e865fe337b9444
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
initscripts-9.03.46-1.el6_6.1.src.rpm
    MD5: 9ecc7a355256e1fe4155d01e7c8c992cSHA-256: 1c7c7ed1412b4026a1c1192ed67e5aaa7f511dbcfa0943f9dc5368402e9b8f9e
 
x86_64:
debugmode-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 0f56ab8961f7b3bdcc579cea99e6abf6SHA-256: dd79b8f44b723497bf82dfa6b83309049e710dbc81ec8906e84d3d297d48438f
initscripts-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 1a9eb8e9e2b91c642598dc75d1703063SHA-256: 21f9ccd3215b267d654724a8a2c5e074505bd56c4cf34575bb89fedc4370e6f1
initscripts-debuginfo-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: fb0a5170f82a065c6bd5a0e0508acd1cSHA-256: 44f79a9ee4c2cd3e52b6ea658d68b1fece90c3dfacffc96446e865fe337b9444
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
initscripts-9.03.46-1.el6_6.1.src.rpm
    MD5: 9ecc7a355256e1fe4155d01e7c8c992cSHA-256: 1c7c7ed1412b4026a1c1192ed67e5aaa7f511dbcfa0943f9dc5368402e9b8f9e
 
IA-32:
debugmode-9.03.46-1.el6_6.1.i686.rpm
    MD5: 345f2d181339e854f82ae83884254c39SHA-256: 54c2f0c75f1ae77ada07c96192af4c513215962c8108c091ec89dc5d9f78c473
initscripts-9.03.46-1.el6_6.1.i686.rpm
    MD5: c588e3d1f84bf79b24de18c03726e343SHA-256: 1b07795f9f9d023b018e2d23974b8bf70dd39572b0827d312ac23b75f5b13037
initscripts-debuginfo-9.03.46-1.el6_6.1.i686.rpm
    MD5: b16726c529fae9094c15c75884720d7bSHA-256: a07d8f2ae00bd4242627b61034ccdbcaea39d2defffc9a081707e5ea8ba48693
 
PPC:
debugmode-9.03.46-1.el6_6.1.ppc64.rpm
    MD5: c289b7ca11de095b65dc114e7c5cf6f8SHA-256: 4b8e75990a0f83dcf6588c8599023e00635a1dde58b5121fbb2b97e51afba56f
initscripts-9.03.46-1.el6_6.1.ppc64.rpm
    MD5: 301fb6dc0d8c9d487ff7778060554481SHA-256: cd185261ae4aec853ff298291fbc029f6145d2fc429869ef23f2f551caa9b337
initscripts-debuginfo-9.03.46-1.el6_6.1.ppc64.rpm
    MD5: 3f620fd8ce0445faedf2d4e8f58d1218SHA-256: 57cee4a41c5356775346b5a77c3bd473d1f3e9da52c3bd23e9bb47beed97dd0f
 
s390x:
debugmode-9.03.46-1.el6_6.1.s390x.rpm
    MD5: c77fd8ce8ae41d876d29cc67a928ce2cSHA-256: 5d7279d119ffc9e0ee68afab251d08feb75df12fb6c0c48964a580ad0078fd6e
initscripts-9.03.46-1.el6_6.1.s390x.rpm
    MD5: 69e56f29d632d592a273cff695b02c4cSHA-256: 41a51895081b55a723d70039b3ef27b5efd8790b3d3fecd967e17355c7fe647a
initscripts-debuginfo-9.03.46-1.el6_6.1.s390x.rpm
    MD5: 8974d85c5468ac4c6b2e0e30505fa536SHA-256: 1acb7e7f35fe7076dac803a9832d9e00d9b9bf21678db1d7b4cd30ec3457e834
 
x86_64:
debugmode-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 0f56ab8961f7b3bdcc579cea99e6abf6SHA-256: dd79b8f44b723497bf82dfa6b83309049e710dbc81ec8906e84d3d297d48438f
initscripts-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 1a9eb8e9e2b91c642598dc75d1703063SHA-256: 21f9ccd3215b267d654724a8a2c5e074505bd56c4cf34575bb89fedc4370e6f1
initscripts-debuginfo-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: fb0a5170f82a065c6bd5a0e0508acd1cSHA-256: 44f79a9ee4c2cd3e52b6ea658d68b1fece90c3dfacffc96446e865fe337b9444
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
initscripts-9.03.46-1.el6_6.1.src.rpm
    MD5: 9ecc7a355256e1fe4155d01e7c8c992cSHA-256: 1c7c7ed1412b4026a1c1192ed67e5aaa7f511dbcfa0943f9dc5368402e9b8f9e
 
IA-32:
debugmode-9.03.46-1.el6_6.1.i686.rpm
    MD5: 345f2d181339e854f82ae83884254c39SHA-256: 54c2f0c75f1ae77ada07c96192af4c513215962c8108c091ec89dc5d9f78c473
initscripts-9.03.46-1.el6_6.1.i686.rpm
    MD5: c588e3d1f84bf79b24de18c03726e343SHA-256: 1b07795f9f9d023b018e2d23974b8bf70dd39572b0827d312ac23b75f5b13037
initscripts-debuginfo-9.03.46-1.el6_6.1.i686.rpm
    MD5: b16726c529fae9094c15c75884720d7bSHA-256: a07d8f2ae00bd4242627b61034ccdbcaea39d2defffc9a081707e5ea8ba48693
 
PPC:
debugmode-9.03.46-1.el6_6.1.ppc64.rpm
    MD5: c289b7ca11de095b65dc114e7c5cf6f8SHA-256: 4b8e75990a0f83dcf6588c8599023e00635a1dde58b5121fbb2b97e51afba56f
initscripts-9.03.46-1.el6_6.1.ppc64.rpm
    MD5: 301fb6dc0d8c9d487ff7778060554481SHA-256: cd185261ae4aec853ff298291fbc029f6145d2fc429869ef23f2f551caa9b337
initscripts-debuginfo-9.03.46-1.el6_6.1.ppc64.rpm
    MD5: 3f620fd8ce0445faedf2d4e8f58d1218SHA-256: 57cee4a41c5356775346b5a77c3bd473d1f3e9da52c3bd23e9bb47beed97dd0f
 
s390x:
initscripts-9.03.46-1.el6_6.1.s390x.rpm
    MD5: 69e56f29d632d592a273cff695b02c4cSHA-256: 41a51895081b55a723d70039b3ef27b5efd8790b3d3fecd967e17355c7fe647a
initscripts-debuginfo-9.03.46-1.el6_6.1.s390x.rpm
    MD5: 8974d85c5468ac4c6b2e0e30505fa536SHA-256: 1acb7e7f35fe7076dac803a9832d9e00d9b9bf21678db1d7b4cd30ec3457e834
 
x86_64:
initscripts-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 1a9eb8e9e2b91c642598dc75d1703063SHA-256: 21f9ccd3215b267d654724a8a2c5e074505bd56c4cf34575bb89fedc4370e6f1
initscripts-debuginfo-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: fb0a5170f82a065c6bd5a0e0508acd1cSHA-256: 44f79a9ee4c2cd3e52b6ea658d68b1fece90c3dfacffc96446e865fe337b9444
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
initscripts-9.03.46-1.el6_6.1.src.rpm
    MD5: 9ecc7a355256e1fe4155d01e7c8c992cSHA-256: 1c7c7ed1412b4026a1c1192ed67e5aaa7f511dbcfa0943f9dc5368402e9b8f9e
 
IA-32:
debugmode-9.03.46-1.el6_6.1.i686.rpm
    MD5: 345f2d181339e854f82ae83884254c39SHA-256: 54c2f0c75f1ae77ada07c96192af4c513215962c8108c091ec89dc5d9f78c473
initscripts-9.03.46-1.el6_6.1.i686.rpm
    MD5: c588e3d1f84bf79b24de18c03726e343SHA-256: 1b07795f9f9d023b018e2d23974b8bf70dd39572b0827d312ac23b75f5b13037
initscripts-debuginfo-9.03.46-1.el6_6.1.i686.rpm
    MD5: b16726c529fae9094c15c75884720d7bSHA-256: a07d8f2ae00bd4242627b61034ccdbcaea39d2defffc9a081707e5ea8ba48693
 
x86_64:
debugmode-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 0f56ab8961f7b3bdcc579cea99e6abf6SHA-256: dd79b8f44b723497bf82dfa6b83309049e710dbc81ec8906e84d3d297d48438f
initscripts-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: 1a9eb8e9e2b91c642598dc75d1703063SHA-256: 21f9ccd3215b267d654724a8a2c5e074505bd56c4cf34575bb89fedc4370e6f1
initscripts-debuginfo-9.03.46-1.el6_6.1.x86_64.rpm
    MD5: fb0a5170f82a065c6bd5a0e0508acd1cSHA-256: 44f79a9ee4c2cd3e52b6ea658d68b1fece90c3dfacffc96446e865fe337b9444
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply