18.3 C
London
Tuesday, August 22, 2017

RHBA-2015:0129-1: device-mapper-multipath bug fix update

Updated device-mapper-multipath packages that fix one bug are now available forRed Hat Enterprise Linux 6. The device-mapper-multipath packages provide tools that use the device-mappermultipath kernel module to manage multipath devices.This update fixes the following bug:* Previously, the libmultipath utility was keeping a global cache of sysfs datafor all programs, even though this was only necessary for the multipathd daemon.As a consequence, a memory error could occur when multiple threads were usinglibmultipath without locking. This led to unexpected termination ofmultithreaded programs using the mpath_persistent_reserve_in() ormpath_persistent_reserve_out() functions. With this update, only multipathd usesthe global sysfs data cache, and the described crashes are thus avoided.(BZ#1187217)Users of device-mapper-multipath are advised to upgrade to these updatedpackages, which fix this bug. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: device-mapper-multipath-0.4.9-80.el6_6.3.src.rpm     MD5: 38fbf520676ee368fd798820a8e25595SHA-256: 272b8447de08ba845213538ce84ef421be7640bce9bfe82c802ef3fa868629e0   IA-32: device-mapper-multipath-0.4.9-80.el6_6.3.i686.rpm     MD5: 134c70e1000c04966f5540ca8997cce7SHA-256: b52db9523c888ba25d9182289c0388b6e5075f04f7ec82eeb89ed7852e065409 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 kpartx-0.4.9-80.el6_6.3.i686.rpm     MD5: a8a602c1a1bf5cc1be7db1b24ccb7ce4SHA-256: e7571c34961faf197ebd4843988e538eb24ca4d47e68605b015d4821f790a4cb   x86_64: device-mapper-multipath-0.4.9-80.el6_6.3.x86_64.rpm     MD5: a26c89837d7d6447eb7f7642befb71edSHA-256: da4d67dd4da5ebcba122dcdc0fdd9a9882cda93757564348853d767da80e7b78 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 0a07fed9d056316650e541c6b97737e1SHA-256: 375f90f87620826548ba82a1b0535692d385d79c982ffb935d79ed4f7bce37ed device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 device-mapper-multipath-libs-0.4.9-80.el6_6.3.x86_64.rpm     MD5: fbb6ee3842e92bee152efaeb036760bcSHA-256: 5a5f9c152ec48c74ec8b8706613f96797584a0f00f764bb1fdb5262cf56fb2e3 kpartx-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 4941eeea6481618e29389f980b5c1dd6SHA-256: 42bc754583e879ea7966be0fcc90d5b3722ea93346fdac74aa78a2e77fa9f16b   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: device-mapper-multipath-0.4.9-80.el6_6.3.src.rpm     MD5: 38fbf520676ee368fd798820a8e25595SHA-256: 272b8447de08ba845213538ce84ef421be7640bce9bfe82c802ef3fa868629e0   x86_64: device-mapper-multipath-0.4.9-80.el6_6.3.x86_64.rpm     MD5: a26c89837d7d6447eb7f7642befb71edSHA-256: da4d67dd4da5ebcba122dcdc0fdd9a9882cda93757564348853d767da80e7b78 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 0a07fed9d056316650e541c6b97737e1SHA-256: 375f90f87620826548ba82a1b0535692d385d79c982ffb935d79ed4f7bce37ed device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 device-mapper-multipath-libs-0.4.9-80.el6_6.3.x86_64.rpm     MD5: fbb6ee3842e92bee152efaeb036760bcSHA-256: 5a5f9c152ec48c74ec8b8706613f96797584a0f00f764bb1fdb5262cf56fb2e3 kpartx-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 4941eeea6481618e29389f980b5c1dd6SHA-256: 42bc754583e879ea7966be0fcc90d5b3722ea93346fdac74aa78a2e77fa9f16b   Red Hat Enterprise Linux Server (v. 6) SRPMS: device-mapper-multipath-0.4.9-80.el6_6.3.src.rpm     MD5: 38fbf520676ee368fd798820a8e25595SHA-256: 272b8447de08ba845213538ce84ef421be7640bce9bfe82c802ef3fa868629e0   IA-32: device-mapper-multipath-0.4.9-80.el6_6.3.i686.rpm     MD5: 134c70e1000c04966f5540ca8997cce7SHA-256: b52db9523c888ba25d9182289c0388b6e5075f04f7ec82eeb89ed7852e065409 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 kpartx-0.4.9-80.el6_6.3.i686.rpm     MD5: a8a602c1a1bf5cc1be7db1b24ccb7ce4SHA-256: e7571c34961faf197ebd4843988e538eb24ca4d47e68605b015d4821f790a4cb   PPC: device-mapper-multipath-0.4.9-80.el6_6.3.ppc64.rpm     MD5: 21516ccfcab5ab3071d51df128a6d68eSHA-256: 7342b5e150528955374983c295d44ca05016aacb6d26688ff1d0d169ca7fa599 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.ppc.rpm     MD5: 5d51460ebf236e9476843750e6b8db2fSHA-256: e308cb8324bb843aeeaa2c48079b5c4335c2ab752fdad775d75c73b6c32d58b5 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.ppc64.rpm     MD5: 4bb766795255c52026786364c6813bc5SHA-256: 9e9db6248139b3d804a7735048b78bc54c7c72806a4cd32cd65cd47a4649e185 device-mapper-multipath-libs-0.4.9-80.el6_6.3.ppc.rpm     MD5: a4a21848b2a6104f2952689510d88f99SHA-256: 603cf5b4dd4abe994644637524859822b6c1a41ad3f74b74fa670a8f3acbe43c device-mapper-multipath-libs-0.4.9-80.el6_6.3.ppc64.rpm     MD5: fadac0368b45652a99c128b15e0ac364SHA-256: fffbe4ab3a4f966d772a7650017228cdd77ec92038a0b8c08c784d1a77466589 kpartx-0.4.9-80.el6_6.3.ppc64.rpm     MD5: b82ab9713ec34a5bd1097361aa85966fSHA-256: 9c4c1b770bdf616edcd51f48ed18c7d9dc13aa3f3c83354eb877b604e9fd224f   s390x: device-mapper-multipath-0.4.9-80.el6_6.3.s390x.rpm     MD5: 53f4f1e7a2bb517f77da0ddd70092387SHA-256: 40bda7b55690369eb71554d52e4965533bcc0e18562c0a7115470b182789ce25 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.s390.rpm     MD5: 393bf7f93cc8ce678648e953fe6666b3SHA-256: f50b1029414c6cfce2c29886bb03094f1176fda24cd504ece9d8bb453a441b32 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.s390x.rpm     MD5: fa7e7ae6420f369d11a3821b0d9ebbd1SHA-256: cd29b42453f1e39856b081ad02f0223ce2df58eb7f0f20123a79a6b38b598809 device-mapper-multipath-libs-0.4.9-80.el6_6.3.s390.rpm     MD5: 349f2f5181cc91bda6ffacffd2798b01SHA-256: 2363461402817d4be0f927c90f77b619fc91df906343334928d4311621d9f607 device-mapper-multipath-libs-0.4.9-80.el6_6.3.s390x.rpm     MD5: cb3d0a08f4e2ed59c00b83d5878a963fSHA-256: 68ef9b03d5962278e746c36668d36ea28548133ba086fc627ef61be0483d9e05 kpartx-0.4.9-80.el6_6.3.s390x.rpm     MD5: 5e1eea357a54723a25ce78ba301f1e9eSHA-256: 5641390fcfbe15a4fe8a9dda5dbf1eecf257e9de84bb5c30acd99b3926f0c575   x86_64: device-mapper-multipath-0.4.9-80.el6_6.3.x86_64.rpm     MD5: a26c89837d7d6447eb7f7642befb71edSHA-256: da4d67dd4da5ebcba122dcdc0fdd9a9882cda93757564348853d767da80e7b78 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 0a07fed9d056316650e541c6b97737e1SHA-256: 375f90f87620826548ba82a1b0535692d385d79c982ffb935d79ed4f7bce37ed device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 device-mapper-multipath-libs-0.4.9-80.el6_6.3.x86_64.rpm     MD5: fbb6ee3842e92bee152efaeb036760bcSHA-256: 5a5f9c152ec48c74ec8b8706613f96797584a0f00f764bb1fdb5262cf56fb2e3 kpartx-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 4941eeea6481618e29389f980b5c1dd6SHA-256: 42bc754583e879ea7966be0fcc90d5b3722ea93346fdac74aa78a2e77fa9f16b   Red Hat Enterprise Linux Server EUS (v. 6.6.z) SRPMS: device-mapper-multipath-0.4.9-80.el6_6.3.src.rpm     MD5: 38fbf520676ee368fd798820a8e25595SHA-256: 272b8447de08ba845213538ce84ef421be7640bce9bfe82c802ef3fa868629e0   IA-32: device-mapper-multipath-0.4.9-80.el6_6.3.i686.rpm     MD5: 134c70e1000c04966f5540ca8997cce7SHA-256: b52db9523c888ba25d9182289c0388b6e5075f04f7ec82eeb89ed7852e065409 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 kpartx-0.4.9-80.el6_6.3.i686.rpm     MD5: a8a602c1a1bf5cc1be7db1b24ccb7ce4SHA-256: e7571c34961faf197ebd4843988e538eb24ca4d47e68605b015d4821f790a4cb   PPC: device-mapper-multipath-0.4.9-80.el6_6.3.ppc64.rpm     MD5: 21516ccfcab5ab3071d51df128a6d68eSHA-256: 7342b5e150528955374983c295d44ca05016aacb6d26688ff1d0d169ca7fa599 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.ppc.rpm     MD5: 5d51460ebf236e9476843750e6b8db2fSHA-256: e308cb8324bb843aeeaa2c48079b5c4335c2ab752fdad775d75c73b6c32d58b5 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.ppc64.rpm     MD5: 4bb766795255c52026786364c6813bc5SHA-256: 9e9db6248139b3d804a7735048b78bc54c7c72806a4cd32cd65cd47a4649e185 device-mapper-multipath-libs-0.4.9-80.el6_6.3.ppc.rpm     MD5: a4a21848b2a6104f2952689510d88f99SHA-256: 603cf5b4dd4abe994644637524859822b6c1a41ad3f74b74fa670a8f3acbe43c device-mapper-multipath-libs-0.4.9-80.el6_6.3.ppc64.rpm     MD5: fadac0368b45652a99c128b15e0ac364SHA-256: fffbe4ab3a4f966d772a7650017228cdd77ec92038a0b8c08c784d1a77466589 kpartx-0.4.9-80.el6_6.3.ppc64.rpm     MD5: b82ab9713ec34a5bd1097361aa85966fSHA-256: 9c4c1b770bdf616edcd51f48ed18c7d9dc13aa3f3c83354eb877b604e9fd224f   s390x: device-mapper-multipath-0.4.9-80.el6_6.3.s390x.rpm     MD5: 53f4f1e7a2bb517f77da0ddd70092387SHA-256: 40bda7b55690369eb71554d52e4965533bcc0e18562c0a7115470b182789ce25 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.s390.rpm     MD5: 393bf7f93cc8ce678648e953fe6666b3SHA-256: f50b1029414c6cfce2c29886bb03094f1176fda24cd504ece9d8bb453a441b32 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.s390x.rpm     MD5: fa7e7ae6420f369d11a3821b0d9ebbd1SHA-256: cd29b42453f1e39856b081ad02f0223ce2df58eb7f0f20123a79a6b38b598809 device-mapper-multipath-libs-0.4.9-80.el6_6.3.s390.rpm     MD5: 349f2f5181cc91bda6ffacffd2798b01SHA-256: 2363461402817d4be0f927c90f77b619fc91df906343334928d4311621d9f607 device-mapper-multipath-libs-0.4.9-80.el6_6.3.s390x.rpm     MD5: cb3d0a08f4e2ed59c00b83d5878a963fSHA-256: 68ef9b03d5962278e746c36668d36ea28548133ba086fc627ef61be0483d9e05 kpartx-0.4.9-80.el6_6.3.s390x.rpm     MD5: 5e1eea357a54723a25ce78ba301f1e9eSHA-256: 5641390fcfbe15a4fe8a9dda5dbf1eecf257e9de84bb5c30acd99b3926f0c575   x86_64: device-mapper-multipath-0.4.9-80.el6_6.3.x86_64.rpm     MD5: a26c89837d7d6447eb7f7642befb71edSHA-256: da4d67dd4da5ebcba122dcdc0fdd9a9882cda93757564348853d767da80e7b78 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 0a07fed9d056316650e541c6b97737e1SHA-256: 375f90f87620826548ba82a1b0535692d385d79c982ffb935d79ed4f7bce37ed device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 device-mapper-multipath-libs-0.4.9-80.el6_6.3.x86_64.rpm     MD5: fbb6ee3842e92bee152efaeb036760bcSHA-256: 5a5f9c152ec48c74ec8b8706613f96797584a0f00f764bb1fdb5262cf56fb2e3 kpartx-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 4941eeea6481618e29389f980b5c1dd6SHA-256: 42bc754583e879ea7966be0fcc90d5b3722ea93346fdac74aa78a2e77fa9f16b   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: device-mapper-multipath-0.4.9-80.el6_6.3.src.rpm     MD5: 38fbf520676ee368fd798820a8e25595SHA-256: 272b8447de08ba845213538ce84ef421be7640bce9bfe82c802ef3fa868629e0   IA-32: device-mapper-multipath-0.4.9-80.el6_6.3.i686.rpm     MD5: 134c70e1000c04966f5540ca8997cce7SHA-256: b52db9523c888ba25d9182289c0388b6e5075f04f7ec82eeb89ed7852e065409 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 kpartx-0.4.9-80.el6_6.3.i686.rpm     MD5: a8a602c1a1bf5cc1be7db1b24ccb7ce4SHA-256: e7571c34961faf197ebd4843988e538eb24ca4d47e68605b015d4821f790a4cb   x86_64: device-mapper-multipath-0.4.9-80.el6_6.3.x86_64.rpm     MD5: a26c89837d7d6447eb7f7642befb71edSHA-256: da4d67dd4da5ebcba122dcdc0fdd9a9882cda93757564348853d767da80e7b78 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.i686.rpm     MD5: 557f04981db8c5de491ca9be992629daSHA-256: 3026b4ec610915a5c7208cfa2560060903da830ba44ef027da8a27c2c5c57f55 device-mapper-multipath-debuginfo-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 0a07fed9d056316650e541c6b97737e1SHA-256: 375f90f87620826548ba82a1b0535692d385d79c982ffb935d79ed4f7bce37ed device-mapper-multipath-libs-0.4.9-80.el6_6.3.i686.rpm     MD5: 92f9d791781b8168ede667a3cebf8d97SHA-256: d1509f380bf2c8fcd8ea92cdf674e7e9f4be85bc859363d5b33d14fb6ec114c9 device-mapper-multipath-libs-0.4.9-80.el6_6.3.x86_64.rpm     MD5: fbb6ee3842e92bee152efaeb036760bcSHA-256: 5a5f9c152ec48c74ec8b8706613f96797584a0f00f764bb1fdb5262cf56fb2e3 kpartx-0.4.9-80.el6_6.3.x86_64.rpm     MD5: 4941eeea6481618e29389f980b5c1dd6SHA-256: 42bc754583e879ea7966be0fcc90d5b3722ea93346fdac74aa78a2e77fa9f16b   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Clever Gmail Hack Let Attackers Take Over Accounts

Google patched a hole in its Gmail verification system last week that allowed an attacker to hijack a targeted Google Gmail account. The discovery was made by Ahmed Mehtab, a security researcher and founder of Security Fuse.

The hack is simple to execute and requires less than dozen steps to pull off. The hack exploits an authentication or verification bypass vulnerability in a Gmail feature that allows you to send email from a second Gmail account. Mehtab said the attack is “similar to account takeover but here I — as an attacker — can hijack email addresses by confirming the ownership of email (account).” Exploiting the hack, an attacker can send email as if it was being sent from the compromised account.
In addition, the attacker could have email forwarded to the compromised Gmail address. The hack has one big prerequisite, however.

The Gmail account targeted for hijacking must either be blocking emails sent from the attacker’s account, or be deactivated or be tied to a nonexistent Gmail account. Under these scenarios, Mehtab was able to send email as google@gmail.com and gmail@gmail.com. Google confirmed with Threatpost both the vulnerability and  fixing the flaw. What the attack did not appear to allow Mehtab to do, based on a technical description of the hack posted by Mehtab, is access the contents of the targeted Gmail account or access related Google Account services such as Google Drive, Photos and Play where personal and financial information is stored.
The hack is tied to the way Google handles linking a primary Gmail account to another email address to allow the function of message forwarding and using email aliases.
In a video, above, Mehtab shows how he was able to trick Google into adding an email account to an existing account. To pull off the hack, Mehtab first went to his Gmail’s Settings menu and selected the “Send Mail As” option and selecting the “Use Gmail to send from your other email addresses” and select “Treat as an alias.” From here, as the video shows, Mehtab forces Google to send a verification email to add the Gmail address to his account to the nonexistent Gmail address that delivers a bounce back email message. Now Mehtab can access that bounce back message and pluck out the verification code number and successfully add the account to his Gmail account. “Any Gmail address which is associated or connected with Gmail’s SMTP was vulnerable to this security issue,” Mehtab wrote.

That includes @gmail.com, @googlemail.com or @googleemail.com, according to Mehtab. “There is a scenario where attacker can trick victim in deactivating his account or attacker can also trick victim in blocking his email address,” he said. “Once he does that we can hijack his email address easily.” Mehtab disclosed the bug to Google on Oct. 20.

Google addressed the flaw the same day. On Nov. 1, Google added the bug to its “Hall of Fame,” according to Mehtab. “One of the sad part in this research is that, i was not rewarded for such a serious security issue but they acknowledged my research and listed me in Hall of fame,” he noted in his blog outlining his research.

RHBA-2015:1126-1: tzdata enhancement update

Updated tzdata packages that add one enhancement are now available forRed Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux5.6 Long Life, Red Hat Enterprise Linux 5.11, Red Hat Enterprise Linux 5.9Advanced Update Support, Red Hat Enterprise Linux 6.2 Advanced Update Support,Red Hat Enterprise Linux 6.4 Extended Update Support, Red Hat Enterprise Linux6.5 Extended Update Support, Red Hat Enterprise Linux 6.6, Red Hat EnterpriseLinux 7.1, and Red Hat Enterprise Linux 7.1 Little Endian. The tzdata packages contain data files with rules for various time zones.This update adds the following enhancement:* Morocco will suspend Daylight Saving Time (DST) from 2015-06-14 03:00 through2015-07-19 02:00, not 2015-06-13 and 2015-07-18 as predicted. The tzdatapackages have been adjusted to reflect this change. (BZ#1229775, BZ#1229777,BZ#1229783, BZ#1229786) Users of tzdata are advised to upgrade to these updated packages, which add thisenhancement. Red Hat Enterprise Linux (v. 5 server) SRPMS: tzdata-2015e-1.el5.src.rpm     MD5: f1b5479c51c25e8135655f35ed111429SHA-256: b95749881ee97c810fda0ff71286020a60275f7df0ad3b45281235e24f4775a9   IA-32: tzdata-2015e-1.el5.i386.rpm     MD5: 254f9ed09c30510eb0a2a1b1ca62a1d3SHA-256: 49502f70628c77d2361b132be7be1475ad64674566f5844cb0fe57e6624a5cd8 tzdata-java-2015e-1.el5.i386.rpm     MD5: 7a54dd588926aa905ef6fcf38572fbf7SHA-256: 46430caec5756738cb90a205756305b0a9f553e7d43cf35b73913aaef7409a4b   IA-64: tzdata-2015e-1.el5.ia64.rpm     MD5: 7764126355d6c27c05f5a7cf8c902ed6SHA-256: 2c43c2ee54ed283df983042d830eacc50b5ef5bbde67fca5e3adb3a84184bdf9   PPC: tzdata-2015e-1.el5.ppc.rpm     MD5: 1cfea50b16e1c42175e6abbf2f01876fSHA-256: a650d7c05cc3f734ebee13fa914c7dec371767a7391688ce8a60dfc79ae6db21   s390x: tzdata-2015e-1.el5.s390x.rpm     MD5: d6417d7fd0783c9a57dcc96ecf702487SHA-256: 02957b5ad6ecdbab9944e32d8d8117fa4c2685cd0ffdacec6ea304cac05a41fc   x86_64: tzdata-2015e-1.el5.x86_64.rpm     MD5: d6ee9c484f3db9060b155cd4ab9c47ddSHA-256: 04e316832028843fd31e14e0d4dde0b4dfc778b3cce45d26c63659afd1de6474 tzdata-java-2015e-1.el5.x86_64.rpm     MD5: 1eae98595372bc90bca8f94b5a00de8aSHA-256: a2b4ed1ec364d04379341e54f554c177ec93605be6996b1f4e769481fa789500   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: tzdata-2015e-1.el5.src.rpm     MD5: f1b5479c51c25e8135655f35ed111429SHA-256: b95749881ee97c810fda0ff71286020a60275f7df0ad3b45281235e24f4775a9   IA-32: tzdata-2015e-1.el5.i386.rpm     MD5: 254f9ed09c30510eb0a2a1b1ca62a1d3SHA-256: 49502f70628c77d2361b132be7be1475ad64674566f5844cb0fe57e6624a5cd8 tzdata-java-2015e-1.el5.i386.rpm     MD5: 7a54dd588926aa905ef6fcf38572fbf7SHA-256: 46430caec5756738cb90a205756305b0a9f553e7d43cf35b73913aaef7409a4b   x86_64: tzdata-2015e-1.el5.x86_64.rpm     MD5: d6ee9c484f3db9060b155cd4ab9c47ddSHA-256: 04e316832028843fd31e14e0d4dde0b4dfc778b3cce45d26c63659afd1de6474 tzdata-java-2015e-1.el5.x86_64.rpm     MD5: 1eae98595372bc90bca8f94b5a00de8aSHA-256: a2b4ed1ec364d04379341e54f554c177ec93605be6996b1f4e769481fa789500   Red Hat Enterprise Linux Desktop (v. 6) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   IA-32: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: tzdata-2015e-1.el7.src.rpm     MD5: 229cd4454b4dcfd512a08904e8d4166bSHA-256: 56192c292500dd7b2285aeacb34d21c2d230fc69694a229c6bd10715968e90ff   x86_64: tzdata-2015e-1.el7.noarch.rpm     MD5: 00710a23165aed23083327fe817ae619SHA-256: e16365aac50227668b262573f92c50887ea50e3ab987dde4c5a87e17a6aaf730 tzdata-java-2015e-1.el7.noarch.rpm     MD5: de1ab7503165230be40fd879952d259eSHA-256: ea73de143f9e79c8bec5b5e8cae698790cc76152003ed9007ea3c94d9dca74f6   Red Hat Enterprise Linux ELS (v. 4) SRPMS: tzdata-2015e-1.el4.src.rpm     MD5: 8a5972c1576adb8b12afe3af684dc683SHA-256: fe12bb3a15e3bb029e8677d544aff4763a35511ffce076a3f21300f255c56561   IA-32: tzdata-2015e-1.el4.noarch.rpm     MD5: 0fab181f157a30b388afafd2ef23f936SHA-256: 67b0b2d676c1a1afdfe60593b7b7598df99f07472bd637279b3cbc698f2751e3   IA-64: tzdata-2015e-1.el4.noarch.rpm     MD5: 0fab181f157a30b388afafd2ef23f936SHA-256: 67b0b2d676c1a1afdfe60593b7b7598df99f07472bd637279b3cbc698f2751e3   x86_64: tzdata-2015e-1.el4.noarch.rpm     MD5: 0fab181f157a30b388afafd2ef23f936SHA-256: 67b0b2d676c1a1afdfe60593b7b7598df99f07472bd637279b3cbc698f2751e3   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: tzdata-2015e-1.el7.src.rpm     MD5: 229cd4454b4dcfd512a08904e8d4166bSHA-256: 56192c292500dd7b2285aeacb34d21c2d230fc69694a229c6bd10715968e90ff   x86_64: tzdata-2015e-1.el7.noarch.rpm     MD5: 00710a23165aed23083327fe817ae619SHA-256: e16365aac50227668b262573f92c50887ea50e3ab987dde4c5a87e17a6aaf730 tzdata-java-2015e-1.el7.noarch.rpm     MD5: de1ab7503165230be40fd879952d259eSHA-256: ea73de143f9e79c8bec5b5e8cae698790cc76152003ed9007ea3c94d9dca74f6   Red Hat Enterprise Linux Long Life (v. 5.6 server) SRPMS: tzdata-2015e-1.el5.src.rpm     MD5: f1b5479c51c25e8135655f35ed111429SHA-256: b95749881ee97c810fda0ff71286020a60275f7df0ad3b45281235e24f4775a9   IA-32: tzdata-2015e-1.el5.i386.rpm     MD5: 254f9ed09c30510eb0a2a1b1ca62a1d3SHA-256: 49502f70628c77d2361b132be7be1475ad64674566f5844cb0fe57e6624a5cd8 tzdata-java-2015e-1.el5.i386.rpm     MD5: 7a54dd588926aa905ef6fcf38572fbf7SHA-256: 46430caec5756738cb90a205756305b0a9f553e7d43cf35b73913aaef7409a4b   IA-64: tzdata-2015e-1.el5.ia64.rpm     MD5: 7764126355d6c27c05f5a7cf8c902ed6SHA-256: 2c43c2ee54ed283df983042d830eacc50b5ef5bbde67fca5e3adb3a84184bdf9   x86_64: tzdata-2015e-1.el5.x86_64.rpm     MD5: d6ee9c484f3db9060b155cd4ab9c47ddSHA-256: 04e316832028843fd31e14e0d4dde0b4dfc778b3cce45d26c63659afd1de6474 tzdata-java-2015e-1.el5.x86_64.rpm     MD5: 1eae98595372bc90bca8f94b5a00de8aSHA-256: a2b4ed1ec364d04379341e54f554c177ec93605be6996b1f4e769481fa789500   Red Hat Enterprise Linux Long Life (v. 5.9 server) SRPMS: tzdata-2015e-1.el5.src.rpm     MD5: f1b5479c51c25e8135655f35ed111429SHA-256: b95749881ee97c810fda0ff71286020a60275f7df0ad3b45281235e24f4775a9   IA-32: tzdata-2015e-1.el5.i386.rpm     MD5: 254f9ed09c30510eb0a2a1b1ca62a1d3SHA-256: 49502f70628c77d2361b132be7be1475ad64674566f5844cb0fe57e6624a5cd8 tzdata-java-2015e-1.el5.i386.rpm     MD5: 7a54dd588926aa905ef6fcf38572fbf7SHA-256: 46430caec5756738cb90a205756305b0a9f553e7d43cf35b73913aaef7409a4b   IA-64: tzdata-2015e-1.el5.ia64.rpm     MD5: 7764126355d6c27c05f5a7cf8c902ed6SHA-256: 2c43c2ee54ed283df983042d830eacc50b5ef5bbde67fca5e3adb3a84184bdf9   x86_64: tzdata-2015e-1.el5.x86_64.rpm     MD5: d6ee9c484f3db9060b155cd4ab9c47ddSHA-256: 04e316832028843fd31e14e0d4dde0b4dfc778b3cce45d26c63659afd1de6474 tzdata-java-2015e-1.el5.x86_64.rpm     MD5: 1eae98595372bc90bca8f94b5a00de8aSHA-256: a2b4ed1ec364d04379341e54f554c177ec93605be6996b1f4e769481fa789500   Red Hat Enterprise Linux Server (v. 6) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   IA-32: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   PPC: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   s390x: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Server (v. 7) SRPMS: tzdata-2015e-1.el7.src.rpm     MD5: 229cd4454b4dcfd512a08904e8d4166bSHA-256: 56192c292500dd7b2285aeacb34d21c2d230fc69694a229c6bd10715968e90ff   PPC: tzdata-2015e-1.el7.noarch.rpm     MD5: 00710a23165aed23083327fe817ae619SHA-256: e16365aac50227668b262573f92c50887ea50e3ab987dde4c5a87e17a6aaf730 tzdata-java-2015e-1.el7.noarch.rpm     MD5: de1ab7503165230be40fd879952d259eSHA-256: ea73de143f9e79c8bec5b5e8cae698790cc76152003ed9007ea3c94d9dca74f6   s390x: tzdata-2015e-1.el7.noarch.rpm     MD5: 00710a23165aed23083327fe817ae619SHA-256: e16365aac50227668b262573f92c50887ea50e3ab987dde4c5a87e17a6aaf730 tzdata-java-2015e-1.el7.noarch.rpm     MD5: de1ab7503165230be40fd879952d259eSHA-256: ea73de143f9e79c8bec5b5e8cae698790cc76152003ed9007ea3c94d9dca74f6   x86_64: tzdata-2015e-1.el7.noarch.rpm     MD5: 00710a23165aed23083327fe817ae619SHA-256: e16365aac50227668b262573f92c50887ea50e3ab987dde4c5a87e17a6aaf730 tzdata-java-2015e-1.el7.noarch.rpm     MD5: de1ab7503165230be40fd879952d259eSHA-256: ea73de143f9e79c8bec5b5e8cae698790cc76152003ed9007ea3c94d9dca74f6   Red Hat Enterprise Linux Server AUS (v. 6.2) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Server AUS (v. 6.4) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   IA-32: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   PPC: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   s390x: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Server EUS (v. 6.6.z) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   IA-32: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   PPC: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   s390x: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: tzdata-2015e-1.el6.src.rpm     MD5: 7fcdaa5f64c9d507f5888202490e8a0fSHA-256: 593c748ed1cf6300064fc6ba1c4841377af8de175cf57f14496f6cc5eeaa4dc8   IA-32: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   x86_64: tzdata-2015e-1.el6.noarch.rpm     MD5: 1be7f23359a642d585aabb17a69e7fe2SHA-256: fa9d7bd55e16418ac3cc1ad6cde5dde581d7bb03860a02953dacf27faae0e877 tzdata-java-2015e-1.el6.noarch.rpm     MD5: da900bd8a237267513326d65c2d14639SHA-256: 182a59128539f4fcac5ba4bd0382703500f481b4b25cffca03a3ee5e2217bb3b   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: tzdata-2015e-1.el7.src.rpm     MD5: 229cd4454b4dcfd512a08904e8d4166bSHA-256: 56192c292500dd7b2285aeacb34d21c2d230fc69694a229c6bd10715968e90ff   x86_64: tzdata-2015e-1.el7.noarch.rpm     MD5: 00710a23165aed23083327fe817ae619SHA-256: e16365aac50227668b262573f92c50887ea50e3ab987dde4c5a87e17a6aaf730 tzdata-java-2015e-1.el7.noarch.rpm     MD5: de1ab7503165230be40fd879952d259eSHA-256: ea73de143f9e79c8bec5b5e8cae698790cc76152003ed9007ea3c94d9dca74f6   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

VU#690343: Acer Portal app for Android does not properly validate SSL...

Acer Portal app for Android does not properly validate SSL certificates Original Release date: 05 Jul 2016 | Last revised: 05 Jul 2016 Overview The Acer Portal app for Android allows customers to connect to the Acer Cloud.

The Acer Portal app, from v...

RHBA-2015:0686-1: chromium-browser bug fix and enhancement update

Updated chromium-browser packages that fix several bugs and add variousenhancements are now available for Red Hat Enterprise Linux 6. Chromium is an open-source web browser, powered by WebKit (Blink).The chromium-browser packages have been upgraded to upstream version41.0.2272.89, which provides a number of bug fixes and enhancements over theprevious version. (BZ#1200828)Users of chromium-browser are advised to upgrade to these updated packages,which fix these bugs and add these enhancements. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 6) SRPMS: chromium-browser-41.0.2272.89-1.el6_6.src.rpm     MD5: 42492c3f62414ce2eed73e764522e384SHA-256: e78c08d67bcd5bbc8f54fcb39df32c501f9c60496add9ca5927ca4c771500548   IA-32: chromium-browser-41.0.2272.89-1.el6_6.i686.rpm     MD5: 13ff6df23a6ac06909d1e890e2960f62SHA-256: c2bfae7d19fe7ffa5b15743b17e4d505739745e92ca3a802750ad5b7db328de6 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.i686.rpm     MD5: 731e2f64df725b1bf193c0d44ce3d700SHA-256: 35367a3a5f0e9384f08638924fc254fa0616965981a47c93e9b016fd78f82d8f   x86_64: chromium-browser-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: f4d8a92f35df6350c9e352c5e3a8d823SHA-256: 6811e02afd152f7b3667b25a070129cac88845165da1ed6170ee63b5b9bf6d26 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: c7414f75cc4219ec96282d6abcea0f72SHA-256: a4e6d20fbc703c66aad562ac945d80172d18c05fa13f84f5ea8da53e1e5b2a7a   Red Hat Enterprise Linux Server Supplementary (v. 6) SRPMS: chromium-browser-41.0.2272.89-1.el6_6.src.rpm     MD5: 42492c3f62414ce2eed73e764522e384SHA-256: e78c08d67bcd5bbc8f54fcb39df32c501f9c60496add9ca5927ca4c771500548   IA-32: chromium-browser-41.0.2272.89-1.el6_6.i686.rpm     MD5: 13ff6df23a6ac06909d1e890e2960f62SHA-256: c2bfae7d19fe7ffa5b15743b17e4d505739745e92ca3a802750ad5b7db328de6 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.i686.rpm     MD5: 731e2f64df725b1bf193c0d44ce3d700SHA-256: 35367a3a5f0e9384f08638924fc254fa0616965981a47c93e9b016fd78f82d8f   x86_64: chromium-browser-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: f4d8a92f35df6350c9e352c5e3a8d823SHA-256: 6811e02afd152f7b3667b25a070129cac88845165da1ed6170ee63b5b9bf6d26 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: c7414f75cc4219ec96282d6abcea0f72SHA-256: a4e6d20fbc703c66aad562ac945d80172d18c05fa13f84f5ea8da53e1e5b2a7a   Red Hat Enterprise Linux Server Supplementary EUS (v. 6.6.z) SRPMS: chromium-browser-41.0.2272.89-1.el6_6.src.rpm     MD5: 42492c3f62414ce2eed73e764522e384SHA-256: e78c08d67bcd5bbc8f54fcb39df32c501f9c60496add9ca5927ca4c771500548   IA-32: chromium-browser-41.0.2272.89-1.el6_6.i686.rpm     MD5: 13ff6df23a6ac06909d1e890e2960f62SHA-256: c2bfae7d19fe7ffa5b15743b17e4d505739745e92ca3a802750ad5b7db328de6 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.i686.rpm     MD5: 731e2f64df725b1bf193c0d44ce3d700SHA-256: 35367a3a5f0e9384f08638924fc254fa0616965981a47c93e9b016fd78f82d8f   x86_64: chromium-browser-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: f4d8a92f35df6350c9e352c5e3a8d823SHA-256: 6811e02afd152f7b3667b25a070129cac88845165da1ed6170ee63b5b9bf6d26 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: c7414f75cc4219ec96282d6abcea0f72SHA-256: a4e6d20fbc703c66aad562ac945d80172d18c05fa13f84f5ea8da53e1e5b2a7a   Red Hat Enterprise Linux Workstation Supplementary (v. 6) SRPMS: chromium-browser-41.0.2272.89-1.el6_6.src.rpm     MD5: 42492c3f62414ce2eed73e764522e384SHA-256: e78c08d67bcd5bbc8f54fcb39df32c501f9c60496add9ca5927ca4c771500548   IA-32: chromium-browser-41.0.2272.89-1.el6_6.i686.rpm     MD5: 13ff6df23a6ac06909d1e890e2960f62SHA-256: c2bfae7d19fe7ffa5b15743b17e4d505739745e92ca3a802750ad5b7db328de6 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.i686.rpm     MD5: 731e2f64df725b1bf193c0d44ce3d700SHA-256: 35367a3a5f0e9384f08638924fc254fa0616965981a47c93e9b016fd78f82d8f   x86_64: chromium-browser-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: f4d8a92f35df6350c9e352c5e3a8d823SHA-256: 6811e02afd152f7b3667b25a070129cac88845165da1ed6170ee63b5b9bf6d26 chromium-browser-debuginfo-41.0.2272.89-1.el6_6.x86_64.rpm     MD5: c7414f75cc4219ec96282d6abcea0f72SHA-256: a4e6d20fbc703c66aad562ac945d80172d18c05fa13f84f5ea8da53e1e5b2a7a   (The unlinked packages above are only available from the Red Hat Network) 1200828 - Update chromium-browser to 41.0.2272.89 These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Update for Vulnerability in Juniper Networks Windows In-Box Junos Pulse Client...

Revision Note: V1.0 (May 5, 2014): Advisory published.Summary: Microsoft is announcing the availability of an update for the Juniper Networks Windows In-Box Junos Pulse Client for Windows 8.1 and Windows RT 8.1. The update addresses a vulnerability in ...

Travel Routers, NAS Devices Among Easily Hacked IoT Devices

A researcher poked holes in seven different IoT devices at last week's Security Analyst Summit, including a host of travel routers, NAS devices, and an IP-enabled camera.

MS16-140 – Important: Security Update for Boot Manager (3193479) – Version:...

Security Update for Boot Manager (3193479)Published: November 8, 2016 | Updated: December 13, 2016Version: 2.0This security update resolves a vulnerability in Microsoft Windows.

The vulnerability could allow security feature bypass if a physically-present attacker installs an affected boot policy.This security update is rated Important for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.

For more information, see the Affected Software and Vulnerability Severity Ratings section.The security update addresses the vulnerability by revoking affected boot policies in the firmware.

For more information about the vulnerability see the Vulnerability Information section.For more information about this update, see Microsoft Knowledge Base Article 3193479.The following software versions or editions are affected.
Versions or editions that are not listed are either past their support life cycle or are not affected.

To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.The following severity ratings assume the potential maximum impact of the vulnerability.

For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the November bulletin summary.[1]This update is only available via Windows Update.[2]Windows 10 updates are cumulative.

The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates.

The updates are available via the Microsoft Update Catalog.[3]Beginning with the October 2016 release, Microsoft is changing the update servicing model for Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2.

For more information, please see this Microsoft TechNet article.*The Updates Replaced column shows only the latest update in any chain of superseded updates.

For a comprehensive list of updates replaced, go to the Microsoft Update Catalog, search for the update KB number, and then view update details (updates replaced information is provided on the Package Details tab).Note The vulnerability discussed in this bulletin affects Windows Server 2016 Technical Preview 5.

To be protected from the vulnerability, Microsoft recommends that customers running this operating system apply the current update, which is available from Windows Update. Secure Boot Component Vulnerability – CVE-2016-7247A security feature bypass vulnerability exists when Windows Secure Boot improperly loads a boot policy that is affected by the vulnerability.

An attacker who successfully exploited this vulnerability could disable code integrity checks, allowing test-signed executables and drivers to be loaded onto a target device.The security update addresses the vulnerability by revoking affected boot policies in the firmware.

The revocation protection level depends upon platform firmware.

The Windows event channel Microsoft-Windows-Kernel-Boot may be used to determine the protection level provided. Note that an additional reboot is needed to view the event:Windows versions prior to Windows 10 do not log the event by default. You must enable “analytic” logging for this channel prior to installation of the patch.Windows versions 10 and higher log the event by default.

Event ID 155 indicates baseline protection.

Event ID 154 indicates enhanced protection.For systems that provide baseline protection, firmware updates from your OEM may be available which upgrade systems to enhanced protection.

The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Secure Boot Component Vulnerability CVE-2016-7247 No No Mitigating Factors Microsoft has not identified any mitigating factor for this vulnerability.WorkaroundsMicrosoft has not identified any workarounds for this vulnerability.For Security Update Deployment information see the Microsoft Knowledge Base article referenced here in the Executive Summary.Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See Acknowledgments for more information.The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose.
In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages.
Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.V1.0 (November 8, 2016): Bulletin published. V1.1 (November 23, 2016) Revised bulletin to announce a detection change for certain servers running Windows Servers 2012, Windows Server 2012 R2, and Windows Server 2016.

Affected servers will not automatically receive the security update.

For more information about the servers affected by this detection change, see Knowledge Base Article 3193479. V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates. These are detection changes only.

There were no changes to the update files.

Customers who have already successfully installed any of these updates do not need to take any action.

For more information, see the Microsoft Knowledge Base article for the respective update. Page generated 2016-12-12 11:24-08:00.

RHBA-2015:1032-1: pam bug fix update

Updated pam packages that fix one bug are now available for Red Hat EnterpriseLinux 5. Pluggable Authentication Modules (PAM) provide a system to set up authenticationpolicies without the need to recompile programs to handle authentication.This update fixes the following bug:* Previously, when a system with a large .rhosts file used the rsh shell toconnect to a rlogind server, the authentication took very long to process orfailed due to a timeout. This update adjusts the pam_rhosts_auth module so thatit performs DNS lookups for host names only in .rhosts entries with matchingusers. As a result, rlogind authentication with large .rhosts files is in mostcases significantly faster, and no longer times out. (BZ#1217181)Users of PAM are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client) SRPMS: pam-0.99.6.2-14.el5_11.src.rpm     MD5: 99c6d91bd97186c10ced10901d3d0552SHA-256: 7199834bf7144f383346ead14bc06f6bcc671e0cd883308c9b09c081db49a979   IA-32: pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5 pam-devel-0.99.6.2-14.el5_11.i386.rpm     MD5: c884576ab5a9185f7ba7565ff7e2e9d4SHA-256: dcad04c812ed543f33714464c16d5ba31fb77043ffba0ca596e2480739c622f5   x86_64: pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5 pam-debuginfo-0.99.6.2-14.el5_11.x86_64.rpm     MD5: dee4f0afe6675b5705ef9a66c7e218edSHA-256: 9a09b7d383fda7f6a6a2549d01f7abb7bfc44e69d45829a8f7b3b91f2a8eb549 pam-devel-0.99.6.2-14.el5_11.i386.rpm     MD5: c884576ab5a9185f7ba7565ff7e2e9d4SHA-256: dcad04c812ed543f33714464c16d5ba31fb77043ffba0ca596e2480739c622f5 pam-devel-0.99.6.2-14.el5_11.x86_64.rpm     MD5: 10d9256dc95e26c2edb65301b6f8e31dSHA-256: 58fb9a7fd9e235980ff7ec7f37919f1faa5b7a537224192ff3289d9aa49fcab6   Red Hat Enterprise Linux (v. 5 server) SRPMS: pam-0.99.6.2-14.el5_11.src.rpm     MD5: 99c6d91bd97186c10ced10901d3d0552SHA-256: 7199834bf7144f383346ead14bc06f6bcc671e0cd883308c9b09c081db49a979   IA-32: pam-0.99.6.2-14.el5_11.i386.rpm     MD5: 3380eeee3ffaef49b3dc9db225534a35SHA-256: 6aaf4c7e3a963d688fe2d3e5ca8aaa9b1cb2678ae3793c07d8f229a575d37c7a pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5 pam-devel-0.99.6.2-14.el5_11.i386.rpm     MD5: c884576ab5a9185f7ba7565ff7e2e9d4SHA-256: dcad04c812ed543f33714464c16d5ba31fb77043ffba0ca596e2480739c622f5   IA-64: pam-0.99.6.2-14.el5_11.i386.rpm     MD5: 3380eeee3ffaef49b3dc9db225534a35SHA-256: 6aaf4c7e3a963d688fe2d3e5ca8aaa9b1cb2678ae3793c07d8f229a575d37c7a pam-0.99.6.2-14.el5_11.ia64.rpm     MD5: 39d80c2c1bdca1cc25b5f1c6a7ef9a95SHA-256: 84996472fda7ffbb48503a9ab50ebd79c9e239f4d151f52d909b2b3736c7b497 pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5 pam-debuginfo-0.99.6.2-14.el5_11.ia64.rpm     MD5: 0a87bff29b35c2e7a320e3ff78d7185cSHA-256: d72c41fe443178384695cd03c70e113c0ea5ac1a5654e318cfc13def32c94746 pam-devel-0.99.6.2-14.el5_11.ia64.rpm     MD5: a2c04d0a0f66aeaf1850556ff50b9510SHA-256: dccd1542cec5d994ca995c070bfee9a3d65d009d49257cc09390fd16aa99e253   PPC: pam-0.99.6.2-14.el5_11.ppc.rpm     MD5: 022f33582fca9da91896520c188dea40SHA-256: 49646bf973172691675178511e2afdef2f318ea222693b9c471d08717523ac84 pam-0.99.6.2-14.el5_11.ppc64.rpm     MD5: f60a7de32f7b919ab5c6e43d1b483080SHA-256: 9c4fc1ce2971d8ef21695965207568a5bd9fa643f394ed4d7a9753a854801797 pam-debuginfo-0.99.6.2-14.el5_11.ppc.rpm     MD5: f3e7b97020545cd5e4dd2976f8dea4dbSHA-256: 61c47ebfdba2c6450bb25b79efe5f58d97a8d8966cbfea4f727a07c36d5fa7dc pam-debuginfo-0.99.6.2-14.el5_11.ppc64.rpm     MD5: a649b0c4bd2542a862f4fd78514828faSHA-256: 8e6a057ad28db8dd9ec1d1e4111dea6c5ab39b809c50979130db3e8cfd6e8031 pam-devel-0.99.6.2-14.el5_11.ppc.rpm     MD5: 8f8a2eea843ef0cfa8c62f4e97a50bf7SHA-256: 80cb9a722d11bbfee6a43076ba96a3aefcd0ee55ff1f6b034de3459f1655e789 pam-devel-0.99.6.2-14.el5_11.ppc64.rpm     MD5: 4278696fe962f19afa05700c91085578SHA-256: 9805872123b4a46a4ce2308d02833eceaaaa26866eb3bab9a930512c72c34e10   s390x: pam-0.99.6.2-14.el5_11.s390.rpm     MD5: 853d082c87418c583b4d9bb01ccec11dSHA-256: 2e0f0918085e28aa0cef7b640a6e5fc55994d4e13a6934a36d9b847a1568e0c5 pam-0.99.6.2-14.el5_11.s390x.rpm     MD5: e4f7c9b2ed810d7c541fe1dc21488d55SHA-256: 05ab600a254e667d173a14243e8fedce1e362197838ba7cf6335faa3a04f0db6 pam-debuginfo-0.99.6.2-14.el5_11.s390.rpm     MD5: 509aeb84e3ad1fbc6614efbc9f85fd01SHA-256: b87ab1435f7421d7028dcfb43d204a7a7d99f2a6d1d41f410cb0d9ee98c59ef0 pam-debuginfo-0.99.6.2-14.el5_11.s390x.rpm     MD5: a6c2f94507bc7467791425993ad368f3SHA-256: ceb8dda55c26aa60e77e3eea0dc078f71228df762eb750a3eee0fb1dcf59ec7e pam-devel-0.99.6.2-14.el5_11.s390.rpm     MD5: 62b1290066e95df0ea9ab8f2256e7b9fSHA-256: 765d607f2efbaba88f2fb46e631f438b179f6a8d11e2c622901ceb733a222924 pam-devel-0.99.6.2-14.el5_11.s390x.rpm     MD5: 4ac9ac4c1eb7ae96c87ff368043b5315SHA-256: 4c16119af9a69c143cd90390ce192be4d3c04a24ddeeedf63b481c8c24e125f9   x86_64: pam-0.99.6.2-14.el5_11.i386.rpm     MD5: 3380eeee3ffaef49b3dc9db225534a35SHA-256: 6aaf4c7e3a963d688fe2d3e5ca8aaa9b1cb2678ae3793c07d8f229a575d37c7a pam-0.99.6.2-14.el5_11.x86_64.rpm     MD5: e15c606377df8e50219d8ad342c72511SHA-256: 6cfb883412edca4b1bd3b3cbc38dbd72512bcba95c46f95cb5cffb3180fe80cc pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5 pam-debuginfo-0.99.6.2-14.el5_11.x86_64.rpm     MD5: dee4f0afe6675b5705ef9a66c7e218edSHA-256: 9a09b7d383fda7f6a6a2549d01f7abb7bfc44e69d45829a8f7b3b91f2a8eb549 pam-devel-0.99.6.2-14.el5_11.i386.rpm     MD5: c884576ab5a9185f7ba7565ff7e2e9d4SHA-256: dcad04c812ed543f33714464c16d5ba31fb77043ffba0ca596e2480739c622f5 pam-devel-0.99.6.2-14.el5_11.x86_64.rpm     MD5: 10d9256dc95e26c2edb65301b6f8e31dSHA-256: 58fb9a7fd9e235980ff7ec7f37919f1faa5b7a537224192ff3289d9aa49fcab6   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: pam-0.99.6.2-14.el5_11.src.rpm     MD5: 99c6d91bd97186c10ced10901d3d0552SHA-256: 7199834bf7144f383346ead14bc06f6bcc671e0cd883308c9b09c081db49a979   IA-32: pam-0.99.6.2-14.el5_11.i386.rpm     MD5: 3380eeee3ffaef49b3dc9db225534a35SHA-256: 6aaf4c7e3a963d688fe2d3e5ca8aaa9b1cb2678ae3793c07d8f229a575d37c7a pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5   x86_64: pam-0.99.6.2-14.el5_11.i386.rpm     MD5: 3380eeee3ffaef49b3dc9db225534a35SHA-256: 6aaf4c7e3a963d688fe2d3e5ca8aaa9b1cb2678ae3793c07d8f229a575d37c7a pam-0.99.6.2-14.el5_11.x86_64.rpm     MD5: e15c606377df8e50219d8ad342c72511SHA-256: 6cfb883412edca4b1bd3b3cbc38dbd72512bcba95c46f95cb5cffb3180fe80cc pam-debuginfo-0.99.6.2-14.el5_11.i386.rpm     MD5: 0df584cc4d21387b983a3db08c50cdcaSHA-256: cca5572f3cca7b2aac55d3856ebcf0a16bea320e5168e27518eb23260fbabdc5 pam-debuginfo-0.99.6.2-14.el5_11.x86_64.rpm     MD5: dee4f0afe6675b5705ef9a66c7e218edSHA-256: 9a09b7d383fda7f6a6a2549d01f7abb7bfc44e69d45829a8f7b3b91f2a8eb549   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Google Pleads for Better Cross-Border Exchange of Digital Evidence

Google asked for MLAT reform, and released its biannual Transparency Report revealing it received a record number of government requests for user data.

RHBA-2014:0577-1: Red Hat Enterprise Linux OpenStack Platform 4 Bug Fix and...

Updated packages for Red Hat Enterprise Linux OpenStack Platform 4.0 (Havana),which fix bugs and add enhancements, are now available. Red Hat Enterprise Linux OpenStack Platform provides the facilities for buildinga private or public infrastructure-as-a-service (IaaS) cloud running on commonlyavailable physical hardware. Services provided by these packages include:* OpenStack Block Storage service ("cinder").* OpenStack Compute service ("nova").* OpenStack Dashboard ("horizon").* OpenStack Image service ("glance").* OpenStack Identity ("keystone").* OpenStack Networking service ("neutron").* OpenStack Object Storage service ("swift").* OpenStack Orchestration service ("heat").* OpenStack Telemetry service ("ceilometer").Red Hat Enterprise Linux OpenStack Platform also includes these supportingtechnologies:* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStackclouds.* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.* Open vSwitch, an implementation of the OpenFlow protocol for remote per flowcontrol of network traffic.For information on the scope and support implications of the Technology Previewdesignation applied to some included components refer to:https://access.redhat.com/support/offerings/techpreview/These updated packages also fix various bugs. Documentation for these bug fixesis available in the Technical Notes document:https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/4/html/Technical_Notes/index.htmlThis errata includes rebases for the following components:* Rebase openstack-ceilometer to 2013.2.3* Rebase openstack-neutron to 2013.2.3 (requires python-neutronclient >=2.3.4)* Rebase openstack-heat to 2013.2.3* Rebase mongodb to 2.4* Rebase openstack-glance to 2013.2.3 Before applying this update, ensure all previously released erratarelevant to your system have been applied.Red Hat Enterprise Linux OpenStack Platform 4 runs on the latest availableversion of Red Hat Enterprise Linux 6.The Red Hat Enterprise Linux OpenStack Platform 4 Release Notes contain thefollowing:* An explanation of the way in which the provided components interact to form aworking cloud computing environment.* Technology Previews, Recommended Practices, Known Issues and DeprecatedFunctionality.* The channels required for Red Hat Enterprise Linux OpenStack Platform 4,including which channels need to be enabled and disabled.* Information about upgrading from the Grizzly release.The Release Notes are available at:https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/4/html/Release_Notes/index.htmlThis update is available through the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat OpenStack 4.0 SRPMS: foreman-1.3.0.4-1.el6sat.src.rpm     MD5: 68de87b46d9a88036a88cd5780909d38SHA-256: ed8a57260cfd4affb87e184a6a031c0cbdcc027e5e3c4077aa7a19bb1439e9c2 mongodb-2.4.6-4.el6ost.src.rpm     MD5: c0c33b8146678ba5d23c5412eff3a6c6SHA-256: 0b03248bbb3028051fca70a843fb08716bd1a57446fcdd48763095594d86e120 openstack-ceilometer-2013.2.3-1.el6ost.src.rpm     MD5: 35685679651444cae93d8b8445408848SHA-256: 1f26106a719700b9af44715495307865a52fba4f5ff9cfbebf676a808914c3c1 openstack-cinder-2013.2.3-2.el6ost.src.rpm     MD5: 51ebaaecca25f28e02e3998fe4baa8ffSHA-256: 25e35a45cc3d74a30f4b14d81340991872911a725b43c2cedd32f63812ab07c1 openstack-glance-2013.2.3-3.el6ost.src.rpm     MD5: 951117acf42cbfe6e3fb22e6933ece0cSHA-256: 7a89d5d8fcd61abf6972621b5334275a3acbc05a9954b3a51b3926f5800b482d openstack-heat-2013.2.3-1.el6ost.src.rpm     MD5: 399e4adc18747daa5559bd6bab3e5a8dSHA-256: 2ab93bc52ae9fb6c97673a43abf451ee62b8640f9b5726b02f106f2bf6d8ded4 openstack-packstack-2013.2.1-0.32.dev1018.el6ost.src.rpm     MD5: 4022ad352ef33f431d2d2d31365e22e0SHA-256: 75f00fed479c1a56c95dd1e578c723b31ae85651b22225a32b11eb370e49a94f openstack-puppet-modules-2013.2-9.1.el6ost.src.rpm     MD5: 2acfc2ef634a2f06e086e9faa0dccda3SHA-256: 0affdb18154c40a83839953deb35cfa66e0375d0b6ef8d9115d190d42537cf27 python-crypto-2.6.1-1.el6ost.src.rpm     MD5: 211fab41fab590175609337fca9c2c7cSHA-256: 394181270b998719b482ab3b54d0c5f9e351f5e3096a761dffed03e8ec41cc31 python-glanceclient-0.12.0-2.el6ost.src.rpm     MD5: ea938aa7c47fbfbada71e49f5229485eSHA-256: 5213b0447cd7c6e8044565054cd5575aa46f75fe129e5c6792cd3bbf2f029826 python-neutronclient-2.3.4-1.el6ost.src.rpm     MD5: d957a597583e29f87708fd86db0233e8SHA-256: cf2d08dc792b2bec8652d8f1f2e32d79d31d2505f42995c0134cfe7120b2e0cb python-novaclient-2.15.0-4.el6ost.src.rpm     MD5: 62df8ed4f4cf1d1f90b801ca5bfb92d5SHA-256: 38235aab9f56b81bb3e31c789edbf8ba1f736b4e389f07c8f46906ca1538cdeb python-oauthlib-0.6.0-3.el6ost.src.rpm     MD5: 3dd508b2854b49e9f275afc96eb92bebSHA-256: 79ad09b18ca81c872d18fc589d32f0e60673447bbe0bff9ae894abadf9f0ae1a   x86_64: foreman-1.3.0.4-1.el6sat.noarch.rpm     MD5: c4f2ed4f88cfd43281451307f9e826c8SHA-256: 6834cadf150d4e8d1f221ffbbf59972900b958ee61628a49c6da5414a25aed0f foreman-mysql-1.3.0.4-1.el6sat.noarch.rpm     MD5: ff37ed63c359a46a104a989dfab4ec4bSHA-256: 4f6520984f8020f7ac126cd53b1e7481b5f4450a42511ff4f2e328e9e09ed359 foreman-mysql2-1.3.0.4-1.el6sat.noarch.rpm     MD5: 297487492ef38b2e7773a8977e5cce5fSHA-256: 578e17f5c28df2aff802a5e985577cade524ccdaf3ab4235610305dbcc64b20b foreman-postgresql-1.3.0.4-1.el6sat.noarch.rpm     MD5: b6c777ce30582e7e27ea3d31c47392fcSHA-256: 863f04667dfc2e7b52d147d09cdcce2dbce1fcb061a6724816fc3edb9a710618 libmongodb-2.4.6-4.el6ost.x86_64.rpm     MD5: 697ebbf67d67ae7c9f9f5e3c5a3383e3SHA-256: 0d89ce01f23ae03c06af5a2dd43fceea6167fae3ed6b58eee8be7d37f8041423 mongodb-2.4.6-4.el6ost.x86_64.rpm     MD5: 46b746a014df3d01a04f8792b410f512SHA-256: 61613ae33364a852d6f03d088f43bef22f4d3541173f7afff6f911bad02c3a5e mongodb-debuginfo-2.4.6-4.el6ost.x86_64.rpm     MD5: 41734e2f4c863a70ea4078a6036c3357SHA-256: a4cf10a8ceb8d4ae2872da8cda89f7e22a6fd3dcdbb011b365d6beb1221ed74f mongodb-server-2.4.6-4.el6ost.x86_64.rpm     MD5: c1236cb015e00050ea530589161c3d34SHA-256: f4ddde487e346bbcf50108dabfec3a555ddb3e786a75ca94f561526d47894fde openstack-ceilometer-alarm-2013.2.3-1.el6ost.noarch.rpm     MD5: f18a1dadfac9eaccb8ae34b9263ed516SHA-256: 4ac8323e8950540b718177c12f7d970621b2f292b70fd90373de6970b4145047 openstack-ceilometer-api-2013.2.3-1.el6ost.noarch.rpm     MD5: c3afa63fd08adbb6ef219305186d661fSHA-256: 413ee3605f94b4f3239ef7014917c7214c4cb822ec134ce30e1e65b8bdbcfb54 openstack-ceilometer-central-2013.2.3-1.el6ost.noarch.rpm     MD5: 591e6688ab74cec565f69c8c9877ff49SHA-256: 2f16ea1061412a270c3d9510daa5491078deb4849427570263ebf9f4dff5c1f5 openstack-ceilometer-collector-2013.2.3-1.el6ost.noarch.rpm     MD5: cb05c83623c029191ddfed8d442c11d6SHA-256: f01080f888a60727999d01e5e1e72bd3dada2a2c5038713214269c26c2d94113 openstack-ceilometer-common-2013.2.3-1.el6ost.noarch.rpm     MD5: bd61d2ffb4bf3793ea495fb118c12244SHA-256: b6ca0bb5055089c8ddcf31208895c1ec4b3b1db68cfcb1be107366bcbfb475c9 openstack-ceilometer-compute-2013.2.3-1.el6ost.noarch.rpm     MD5: 476e789dcac45098d43eeeace49bce4dSHA-256: bcfcfdc5a8ea25f5048202eb59a443c8c9dd5d639ade26d3f3ff416da2f7eecb openstack-cinder-2013.2.3-2.el6ost.noarch.rpm     MD5: dcd7d9d1ff6a53ff7efeb4b09efe1641SHA-256: 3bd58ec1da86fdc0861fe7b03e39663ac8b90ec9acbb6b2c8c911edc32c2e0e3 openstack-cinder-doc-2013.2.3-2.el6ost.noarch.rpm     MD5: 551444bd668fc153239138b470b9c72fSHA-256: adaa8dbe59d9be8c86f51bd6a455c01d93c4183bab0a25402759ed861fb48cfb openstack-glance-2013.2.3-3.el6ost.noarch.rpm     MD5: 8f38204eaabf47e6092a82d9c09b7bc9SHA-256: 57d1c151d9951ae5418acd01dc89625271e1f853e815be8ad7319bc724f2cc47 openstack-glance-doc-2013.2.3-3.el6ost.noarch.rpm     MD5: b7ea0ea6f357606d84c8da290367e673SHA-256: 99d78202d5725a662e1b84221e6f6f657a716e4dd5d2bbe394ce0c2856e39be7 openstack-heat-api-2013.2.3-1.el6ost.noarch.rpm     MD5: 6a2c2d9bbb90d5ab1ad12d8c5b239582SHA-256: 5d09d6c9e435afa1553c1db830aba012bbb94b63660e2a2651e3ac03bf806ee3 openstack-heat-api-cfn-2013.2.3-1.el6ost.noarch.rpm     MD5: 5861fefa212a933120733afc78702addSHA-256: 62db41e7c93127ff082bcfcdde0b897c916cb779e1ec99070a04fda031aa6627 openstack-heat-api-cloudwatch-2013.2.3-1.el6ost.noarch.rpm     MD5: 812264c5eab5203548371c4a3ef6cd40SHA-256: a6538a4c2a359f3fef6a59171660ab18f4c30748089edd4f851d9a3d846530ba openstack-heat-common-2013.2.3-1.el6ost.noarch.rpm     MD5: 709396f1acc3f42ea487c21e257b7ee9SHA-256: 58512e3a41127eefd642382f2860591be421132734da4048c1ba85e11823e069 openstack-heat-engine-2013.2.3-1.el6ost.noarch.rpm     MD5: fd1d0ffb7a9d62d51ce7952476902c1bSHA-256: e28cdeae6c6105ee31aa5907b9e9c26e531abea2d3c9b7c45daeb2954f93e19e openstack-packstack-2013.2.1-0.32.dev1018.el6ost.noarch.rpm     MD5: b858c866f6faa1e38409f50610331438SHA-256: ef07bcbb02ae5ab451c9749f830d51371d40196999ea9b8f0f24903970886455 openstack-packstack-doc-2013.2.1-0.32.dev1018.el6ost.noarch.rpm     MD5: ef7a163b08e915069031edaf03984d08SHA-256: 93b864278cff206fa1541f4184888df4437db4d7ba4567433547311c4307c24b openstack-packstack-puppet-2013.2.1-0.32.dev1018.el6ost.noarch.rpm     MD5: 0e4f3eb6f0c7f643a8c24c27bd8ae440SHA-256: f75e3211ba4305c7c51ff838e1bbb6acda3aa72ea9cf423ac92286d546192e99 openstack-puppet-modules-2013.2-9.1.el6ost.noarch.rpm     MD5: bad9bbe18faf67d51d9222401e3bd720SHA-256: 80f3f756274f83ad1dc01be50db8745b63bc92422c1fb9622d8cf3a3b7f3a126 python-ceilometer-2013.2.3-1.el6ost.noarch.rpm     MD5: 406cca79a77d7134178785423d96dc27SHA-256: 3c408655feb3bb3449001c57d5e8ee3d22244b16cedbb667fd395ef930a65e1e python-cinder-2013.2.3-2.el6ost.noarch.rpm     MD5: db4cd184470001a05c9194bbd865b1b1SHA-256: 357c89540d414ebd4b14fd72b530dd8f3dd4a84bb38875a5f50a18eb657e607f python-crypto-2.6.1-1.el6ost.x86_64.rpm     MD5: 2d0d83c91e0840e9cf27f1cb558fcba8SHA-256: 40ba27f0d6921957f0ba5ae4461edae0293201595d721b8cd250fe92855f66a2 python-crypto-debuginfo-2.6.1-1.el6ost.x86_64.rpm     MD5: 6d0a231ae577b49f7277f51b28b1528dSHA-256: c17e484faf85e80df55f2367806a641e969c3d0399d2a1c955143497269cf4d0 python-glance-2013.2.3-3.el6ost.noarch.rpm     MD5: 32aa01d8b0f88b2de1c99c2a6d101fdcSHA-256: 48bda0a9129dff9ba21fd6b996023a8f6caf8263deec07915b25420e2011f149 python-glanceclient-0.12.0-2.el6ost.noarch.rpm     MD5: bfca1ec94a0c4c96bde5deb433276f40SHA-256: c53a06415c08fc341e32107388bd3a8e6315d19a80a849d16248b00ddca03896 python-glanceclient-doc-0.12.0-2.el6ost.noarch.rpm     MD5: 590365baf56c7af76498b91d3d4f34dcSHA-256: 02746a0bdf5a04ef18195631ea91ee289a5c5de38bd7060b6310700dadb3b85d python-neutronclient-2.3.4-1.el6ost.noarch.rpm     MD5: a10792021e4aaac5f750e09483184cacSHA-256: e5cd62d63b8f5e4abfa57e1f505880b258bf429fda03da0d03b8b4bce9d72ae6 python-novaclient-2.15.0-4.el6ost.noarch.rpm     MD5: 73c299be5287176b053110274dad208dSHA-256: 28e4708813aa85d497cb40036ec8604a07c31c3b97de9fc97727c48cb5583042 python-novaclient-doc-2.15.0-4.el6ost.noarch.rpm     MD5: 786f37d40f70fefea3a7f2a1b402cf54SHA-256: 4d1876359bb791754ef82de7fb9f0c7e7ad1e655664af8a184f164d288f6fd16 python-oauthlib-0.6.0-3.el6ost.noarch.rpm     MD5: c67b9b5f51d93045ce66063fc463cc44SHA-256: 1af91800f75ae8b3b0e3d7f496313607855794e9557df531416df7f04479b0b9   (The unlinked packages above are only available from the Red Hat Network) 1020480 - swift-init exits with 0 even if the service fails to start1036515 - Fix some OpenStack init scripts to return non-zero if service cannot start1037449 - glanceclient: image-create fails with the flags --location / --copy-from with the --progress flag1039910 - [RFE] Use subscription-manager in kickstart template, not rhnreg_ks1049079 - Use openstack-puppet-modules package1056689 - Packstack allinone install swift and nagios by default1060687 - DB connection error code 2013 not handled1060689 - cinder qpid reconnection delay must be more accurate1060783 - heat does not read sql db config option1061372 - [RFE]: Add PackStack support for vCenter driver.1063334 - [RFE] Make Ceilometer service Highly available ( Support Ceilometer to use MongoDB replica )1063982 - Change packstack to use openstack-puppet-modules1066408 - mongodb init script returns OK even if service is not fully operational1066549 - openstack-puppet-modules: puppet fail deploy neutron-controller when vlan_range value without '#:#' .1070460 - IPTABLES rules not created during packstack install for distributed environment1071674 - Packstack fails due to permission issues with /var/log/keystone/keystone.log1073324 - Cost of computing first & last sample timestamps is excessive in mongo for unconstrained /v2/resources queries1073408 - samples from notifications for autoscaled instances cannot be persisted in mongo1075630 - Rebase mongodb to 2.41077908 - VMware: upload-to-image failure1078130 - Packstack configured Horizon to listen both to port 80 and 4431078284 - Need later puppet-neutron1080424 - nova is missing dep: python-suds1080534 - nova can't change vifs MTU1082505 - Default dhcp_lease_duration is 120 sec1082736 - GlusterFS: Rebased snapshot volume file is not deleted1083414 - ceilometer qpid reconnection delay must be more accurate1084201 - Update Heat module to something modern1084565 - Rebase openstack-neutron to 2013.2.3 requires python-neutronclient >=2.3.41085482 - Rebase openstack-heat to 2013.2.31086948 - Rebase openstack-ceilometer to 2013.2.31087873 - Rebase openstack-glance to 2013.2.31092054 - openstack-packstack spec file should be updated to reflect that openstack-puppet-modules obsoletes packstack-modules-puppet999695 - packstack doesn't open DHCP ports on host These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2015:0168-1: Red Hat Storage Console 3.0 bug fix async update

Updated Red Hat Storage Console packages are now available for use with RedHat Storage Server 3. Red Hat Storage Console is a powerful and simple web based Graphical User Interface for managing a Red Hat Storage environment. It helps Storage Administrators to easily create and manage multiple storage pools. This includes features such as expanding and shrinking atrusted storage pool and volume management.This advisory addresses the following bug:Previously, the Red Hat Storage Console displayed the status of the RedHat Storage nodes as non-operational as the Console was unable tocommunicate with the nodes as the SSLv3 protocol is not supported by thelatest JDK version java-1.7.0-openjdk-1.7.0.75-2.5.4.0.el6_6.x86_64. Withthis fix, the Red Hat Storage Console uses the TLSv1 protocol tocommunicate with the Red Hat Storage nodes (BZ#1154536)Users of Red Hat Storage Console are advised to upgrade to this updatedpackage, which fix this issue. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Storage Management Console 3.0 SRPMS: rhsc-3.0.3-1.21.el6rhs.src.rpm     MD5: dceb51b031d688c16651c58f2d86cc44SHA-256: 16093ed0d67507dba7421320c4cb9783ad1975fb4121fa23dad0206cf6ef8266   x86_64: rhsc-3.0.3-1.21.el6rhs.noarch.rpm     MD5: 25c487d2404ce344b1bc0ed7f61c249aSHA-256: bfcbd1bfe4026934ec3f484c956a8f15e9978116ed540b2c3d8736ce69fcb3c1 rhsc-backend-3.0.3-1.21.el6rhs.noarch.rpm     MD5: ae25a72b47e09cf93317e88593849579SHA-256: 9325910a2c71fd179e78bc438172dabdc55b2678ca802962f29754d0412702f9 rhsc-dbscripts-3.0.3-1.21.el6rhs.noarch.rpm     MD5: e05d659414550bee562d43415b06eb75SHA-256: 37ab4a77cfe6dc69f1d48f72ab496779d1d43e16cd2cd738ab0065dd1ac55965 rhsc-lib-3.0.3-1.21.el6rhs.noarch.rpm     MD5: 3f59cbdc9fc2bb5a420add72bd694610SHA-256: 5c2b31792ceaf03bc20941295f729fe8b516a3b5bfcac5185c97ef8fc8d173df rhsc-restapi-3.0.3-1.21.el6rhs.noarch.rpm     MD5: 17c84fc352c01b3f97760d653fff17fdSHA-256: 718a4196517509c7473de4e2f5fd1a1127127d2c805412276ee947db8ef167ee rhsc-setup-3.0.3-1.21.el6rhs.noarch.rpm     MD5: 5eefc18aeaacb7a228a8cf8f4ccfdd95SHA-256: eb0d960c4887bc11f00e762e7648f034c8f18ebcf009fca60c791d855930b99e rhsc-setup-base-3.0.3-1.21.el6rhs.noarch.rpm     MD5: d158da3378769d7b65035298ae92384fSHA-256: 62b3e6b3bd33d724b7e9d6c5d9a167714b37978ef18c4e4e1bea7df225ce4e0a rhsc-setup-plugin-ovirt-engine-3.0.3-1.21.el6rhs.noarch.rpm     MD5: f63fc3729396982f1f04af67e5d02af3SHA-256: db15c691cd2d56b91a16d04bbbf23c221be9b86f6d9a0ae50dc76c69e0e9c116 rhsc-setup-plugin-ovirt-engine-common-3.0.3-1.21.el6rhs.noarch.rpm     MD5: 2c9b1d32c86aade373352b2818295efeSHA-256: 8f6886c63d25c4e771e27da6cf9ed6817c878f15e86feb9296ee419bba503c3f rhsc-tools-3.0.3-1.21.el6rhs.noarch.rpm     MD5: 9076a806eea0f3e83983a537e4c15d1fSHA-256: 83d07482b4c1355cd0db386e9c4b8535a7d1044ce0015f3e5130130712acfe5d rhsc-webadmin-portal-3.0.3-1.21.el6rhs.noarch.rpm     MD5: c4696c2eb909ff43745939caf64200ecSHA-256: d71bc67e59df7211bdac010dc404fc840e4ecd17005172af57628731d3104885   (The unlinked packages above are only available from the Red Hat Network) 1154536 - [3.0.z] OpenJDK update that disables SSLv3 breaks RHSC functionality to manage storage nodes These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: