Vulnerabilities

RHSA-2015:0116-1: Moderate: mysql55-mysql security update

Updated mysql55-mysql packages that fix several security issues are nowavailable for Red Hat Software Collections 1.Red Hat Product Security has rated this update as having Moderate securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section. MySQL is a multi-user, multi-threaded SQL database server. It consists ofthe MySQL server daemon (mysqld) and many client programs and libraries.This update fixes several vulnerabilities in the MySQL database server.Information about these flaws can be found on the Oracle Critical PatchUpdate Advisory page, listed in the References section. (CVE-2015-0381,CVE-2015-0382, CVE-2015-0391, CVE-2015-0411, CVE-2015-0432, CVE-2014-6568,CVE-2015-0374)These updated packages upgrade MySQL to version 5.5.41. Refer to the MySQLRelease Notes listed in the References section for a complete list ofchanges.All MySQL users should upgrade to these updated packages, which correctthese issues. After installing this update, the MySQL server daemon(mysqld) will be restarted automatically. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: mysql55-mysql-5.5.41-2.el6.src.rpm     MD5: 30d7ef115e474ea9970448fd50d726c0SHA-256: e846736af3bf7e5077bb37c73eab64527d793ee71861e9ad909a17666e702705   x86_64: mysql55-mysql-5.5.41-2.el6.x86_64.rpm     MD5: c526c61449eb3d923d48e0e2b596b02aSHA-256: 4709067560739d801046c1fbdd1ddfd49a0857278122924eed59c4e6856524ca mysql55-mysql-bench-5.5.41-2.el6.x86_64.rpm     MD5: 9fef821640bf007221ce16b312cc491bSHA-256: cd1ada1dbfbc180186cebe5233740fd6c9c6a82f4dfb09882c826f928be2b989 mysql55-mysql-debuginfo-5.5.41-2.el6.x86_64.rpm     MD5: 6af0a5cdd7dc84319e68e7b92f9d923fSHA-256: bd057cb91029737bb95c9601ff110c92bebdb26863191d017b97dd53cc9c2896 mysql55-mysql-devel-5.5.41-2.el6.x86_64.rpm     MD5: 0c495c1619b9cbb08190e5bb80e50ef1SHA-256: e2a71c636e7189e764a878fcbf9786f5180dba174bfd014ff916c6d12c8f0466 mysql55-mysql-libs-5.5.41-2.el6.x86_64.rpm     MD5: 0e69985b9f542ac8f869a933b27f26c1SHA-256: 7741880317d333ccce93f1c53366a55054adee3bd193837adcb2f30891cd9da6 mysql55-mysql-server-5.5.41-2.el6.x86_64.rpm     MD5: 6c66bb5bb786263425e2351b9e0afec5SHA-256: bec8712e60ba41d631efce27d1bd03ff9f7b48358f63780cd688ff5f77cd011a mysql55-mysql-test-5.5.41-2.el6.x86_64.rpm     MD5: 86186c9293bb5c143b5dfb07879ad59eSHA-256: 57f0a2a9448ec48518660d13aed185114437bb553c29051d1140939ada7dff20   Red Hat Software Collections 1 for RHEL 7 SRPMS: mysql55-mysql-5.5.41-2.el7.src.rpm     MD5: 0f65d92a6a4706114c5d6b63647900f1SHA-256: c7467b944b2242a6d6557a5f651b598d0f400c6d6fe38a216c334a916934fa87   x86_64: mysql55-mysql-5.5.41-2.el7.x86_64.rpm     MD5: 34c604240cc9eb6ddbd352d6e6c169caSHA-256: 92c4b16e9fa2a25c32ea61b058009d02566b1407b1d4faf99ff0842f7842cf72 mysql55-mysql-bench-5.5.41-2.el7.x86_64.rpm     MD5: d5f5015c7015ff7bfcd43ff778f1aa84SHA-256: 7e0616bc1da3645b0c55c46b7213d9d45579d167ec55d99af0bcd97ebbe1a36b mysql55-mysql-debuginfo-5.5.41-2.el7.x86_64.rpm     MD5: e085db765d6ea1f42c162906813b4044SHA-256: fd34bf877357bc78db0288796112e5fa01a5e8cc05d110199ae1fb8093d36f8d mysql55-mysql-devel-5.5.41-2.el7.x86_64.rpm     MD5: f2c76ab021176651fb76ec0e35975034SHA-256: 2d6cb07dfdf307ed1560cdba8ac74f9d1d428746ff8b877bf650d18605ae8f11 mysql55-mysql-libs-5.5.41-2.el7.x86_64.rpm     MD5: 873a15710c5a7fa775035154c49fd34dSHA-256: 95efba60f11e920575a95d3c7a5fd2fd79e2fe7605ccede62139fabe1f3ed0cf mysql55-mysql-server-5.5.41-2.el7.x86_64.rpm     MD5: 5bfa70c32ffa9150436ca0214b6c9bd7SHA-256: cd7ab527201900129e4275b8560c312a2d1acae4e9b7eadac32bafcd29a26a77 mysql55-mysql-test-5.5.41-2.el7.x86_64.rpm     MD5: 56e53c159451d3f734456a05e7670fa1SHA-256: f7551d6b149c7289ff987fdbe89522546b890ff160a368516271c34ba11a01df   (The unlinked packages above are only available from the Red Hat Network) 1184552 - CVE-2014-6568 mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)1184553 - CVE-2015-0374 mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)1184554 - CVE-2015-0381 mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)1184555 - CVE-2015-0382 mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)1184557 - CVE-2015-0391 mysql: unspecified vulnerability related to Server:DDL (CPU Jan 2015)1184560 - CVE-2015-0411 mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)1184561 - CVE-2015-0432 mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:0098-1: Critical: java-1.8.0-ibm security update

Updated java-1.8.0-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 7 Supplementary.Red Hat Product Security has rated this update as having Critical securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section. IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBMJava Software Development Kit.This update fixes several vulnerabilities in the IBM Java RuntimeEnvironment and the IBM Java Software Development Kit. Further informationabout these flaws can be found on the IBM Java Security alerts page, listedin the References section. (CVE-2015-5041, CVE-2015-7575, CVE-2015-8126,CVE-2015-8472, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0475,CVE-2016-0483, CVE-2016-0494)Note: This update also disallows the use of the MD5 hash algorithm in thecertification path processing. The use of MD5 can be re-enabled by removingMD5 from the jdk.certpath.disabledAlgorithms security property defined inthe java.security file.All users of java-1.8.0-ibm are advised to upgrade to these updatedpackages, containing the IBM Java SE 8 SR2-FP10 release. All runninginstances of IBM Java must be restarted for the update to take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 7) x86_64: java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 257e77ef5fe84b83bf9fa39da916a838SHA-256: 8ed5b43025b8980d51bdf565bec21576d0fb6122db013c02aa97362d973994b2 java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 25125ce1dd33ca63c8a84233067c62a9SHA-256: 35d5db3bb16d1ad98b04bac3011955f1ae57df2c9da45ae1e3e979ac2cbe6954 java-1.8.0-ibm-demo-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 57924654c13e3ad587ea1bbce29ff1aaSHA-256: 1ee6514da54170a561d87a17a2b4cce960b0f00d32169d6f015ef35569a0bf71 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 4b02e18ac171bc915c4a1117d19a7b3aSHA-256: ceb5084e5f0137545a2685ed5ecf3ae4ba88aa5ca569eec78ba9f4ab98c51552 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: e3379fa68ed6916850666c992522f918SHA-256: 3e2849869690e8072628be043d26f90a70df8716642d4d528d29e85c3db30b41 java-1.8.0-ibm-jdbc-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 1f2ee47691df783b3f9fad18fa1387c1SHA-256: e070df74e70d78bf7d258b319309e9601ab781204a2646858c9a1e44bff497f2 java-1.8.0-ibm-plugin-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 209111d88d83d7151b8c35aba738d84aSHA-256: 22a6012f34edf0d1b17bec1976b3781bb9cca770c26f9ce747e0badc746f293c java-1.8.0-ibm-src-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 316e4bac2d2d871ad63fbd1840c04455SHA-256: 272c552c1fcc493e603c5869d98e79e255b3b986ba39731abe9c8a7c4b88c6e7   Red Hat Enterprise Linux HPC Node Supplementary (v. 7) x86_64: java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 257e77ef5fe84b83bf9fa39da916a838SHA-256: 8ed5b43025b8980d51bdf565bec21576d0fb6122db013c02aa97362d973994b2 java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 25125ce1dd33ca63c8a84233067c62a9SHA-256: 35d5db3bb16d1ad98b04bac3011955f1ae57df2c9da45ae1e3e979ac2cbe6954 java-1.8.0-ibm-demo-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 57924654c13e3ad587ea1bbce29ff1aaSHA-256: 1ee6514da54170a561d87a17a2b4cce960b0f00d32169d6f015ef35569a0bf71 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 4b02e18ac171bc915c4a1117d19a7b3aSHA-256: ceb5084e5f0137545a2685ed5ecf3ae4ba88aa5ca569eec78ba9f4ab98c51552 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: e3379fa68ed6916850666c992522f918SHA-256: 3e2849869690e8072628be043d26f90a70df8716642d4d528d29e85c3db30b41 java-1.8.0-ibm-src-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 316e4bac2d2d871ad63fbd1840c04455SHA-256: 272c552c1fcc493e603c5869d98e79e255b3b986ba39731abe9c8a7c4b88c6e7   Red Hat Enterprise Linux Server Supplementary (v. 7) PPC: java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.ppc.rpm     MD5: 4abde89c9c8aeaf20287ca3f24ee8839SHA-256: cd955b59cd091e122bdf40a16cca1a299c73cad994b529c5f309c40ba3cb5a5e java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.ppc64.rpm     MD5: 65d4f2a94f884cb0f4d79f5c9e30e71dSHA-256: 7c1884cf688af7cd4a58c7b39e94ce8aa7ea72a3aab4bff4e8e83fb2a8d91520 java-1.8.0-ibm-demo-1.8.0.2.10-1jpp.1.el7.ppc64.rpm     MD5: b268f9763a708fd3485d5baf3ce758d4SHA-256: 8215fe6eb8c048b866cd396d334bfb324339fc8d60cfb56ebb3bc647fff277b9 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.ppc.rpm     MD5: ca4e047da084a48aad82ba9b779bb8a7SHA-256: 96081c98b1224ebeb5c48274db31cf3ef796e80e4e4bb7641f87940ff83d22ee java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.ppc64.rpm     MD5: 9750b1fcfec74eaeecac038e25907612SHA-256: c25447ec0124464fa6cacf05253ced51fe0d7d6c160b3be11fdc215a98b76e8a java-1.8.0-ibm-jdbc-1.8.0.2.10-1jpp.1.el7.ppc64.rpm     MD5: d13b462091a49371bd6d8da6b5e8e592SHA-256: 77d6b0abb9ed049b20c45a596d767668b9c693ea626e0e4e26b497e013cb6aeb java-1.8.0-ibm-plugin-1.8.0.2.10-1jpp.1.el7.ppc64.rpm     MD5: ba7ed833f3281040cfafc8eae2b0b034SHA-256: 0f164911f967bc9027831250b6aed672fbf41e63f079061224781cc0a7d82be3 java-1.8.0-ibm-src-1.8.0.2.10-1jpp.1.el7.ppc64.rpm     MD5: ca9712c098d5ad53d290b0a649c26e3eSHA-256: b8a0f776b60697bc18b962f3ceb0c941245b44580d0cbe489e3404cc5bc502b3   s390x: java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.s390.rpm     MD5: 1e1830ea9b56d8dfaf0f9c586592b70aSHA-256: e342af72178693b2ed58c2396c9461998f8765ecd3219e479f796c465c85afad java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.s390x.rpm     MD5: 1fcc9be0dc5594bc0ce1ab7c0abb23adSHA-256: f2a19789b2072a3b289a492996403940a5e900d9e0d6d2a2d5a06b6185ecf36d java-1.8.0-ibm-demo-1.8.0.2.10-1jpp.1.el7.s390x.rpm     MD5: c0a3812114b0597180b1aeb80842edbbSHA-256: 3791318288ba2ea4bd782a5c79adfe1be5e2f426c9f763813f40e04d9adf8b12 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.s390.rpm     MD5: 627bfe9444d7a8088a96805edbeb00f4SHA-256: b968ead8865c4b5fa99f23777c5da1ce261bb8a2848753c6542b11ba3f910a0d java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.s390x.rpm     MD5: 15d2f82471e440a07621e07aff6e1b87SHA-256: eed66ad51a21fa23019fd7edc0f20ffcbca9a8c17c28519ac9301f8e3461a9e5 java-1.8.0-ibm-jdbc-1.8.0.2.10-1jpp.1.el7.s390x.rpm     MD5: ff460ca27cac02d0fe11894bbc70de53SHA-256: b1dd144f73636cb35272ae43f81bb7f2a9833ad581b07ccc7eb23b85ce54e453 java-1.8.0-ibm-src-1.8.0.2.10-1jpp.1.el7.s390x.rpm     MD5: 6e1ddd33c888fac2f4b80b96e380d2b6SHA-256: bdf97f1466b15c7eae3d2984fcc0f6e1acb0ab7559706bdf198a990943b6174c   x86_64: java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 257e77ef5fe84b83bf9fa39da916a838SHA-256: 8ed5b43025b8980d51bdf565bec21576d0fb6122db013c02aa97362d973994b2 java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 25125ce1dd33ca63c8a84233067c62a9SHA-256: 35d5db3bb16d1ad98b04bac3011955f1ae57df2c9da45ae1e3e979ac2cbe6954 java-1.8.0-ibm-demo-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 57924654c13e3ad587ea1bbce29ff1aaSHA-256: 1ee6514da54170a561d87a17a2b4cce960b0f00d32169d6f015ef35569a0bf71 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 4b02e18ac171bc915c4a1117d19a7b3aSHA-256: ceb5084e5f0137545a2685ed5ecf3ae4ba88aa5ca569eec78ba9f4ab98c51552 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: e3379fa68ed6916850666c992522f918SHA-256: 3e2849869690e8072628be043d26f90a70df8716642d4d528d29e85c3db30b41 java-1.8.0-ibm-jdbc-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 1f2ee47691df783b3f9fad18fa1387c1SHA-256: e070df74e70d78bf7d258b319309e9601ab781204a2646858c9a1e44bff497f2 java-1.8.0-ibm-plugin-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 209111d88d83d7151b8c35aba738d84aSHA-256: 22a6012f34edf0d1b17bec1976b3781bb9cca770c26f9ce747e0badc746f293c java-1.8.0-ibm-src-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 316e4bac2d2d871ad63fbd1840c04455SHA-256: 272c552c1fcc493e603c5869d98e79e255b3b986ba39731abe9c8a7c4b88c6e7   Red Hat Enterprise Linux Workstation Supplementary (v. 7) x86_64: java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 257e77ef5fe84b83bf9fa39da916a838SHA-256: 8ed5b43025b8980d51bdf565bec21576d0fb6122db013c02aa97362d973994b2 java-1.8.0-ibm-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 25125ce1dd33ca63c8a84233067c62a9SHA-256: 35d5db3bb16d1ad98b04bac3011955f1ae57df2c9da45ae1e3e979ac2cbe6954 java-1.8.0-ibm-demo-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 57924654c13e3ad587ea1bbce29ff1aaSHA-256: 1ee6514da54170a561d87a17a2b4cce960b0f00d32169d6f015ef35569a0bf71 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.i686.rpm     MD5: 4b02e18ac171bc915c4a1117d19a7b3aSHA-256: ceb5084e5f0137545a2685ed5ecf3ae4ba88aa5ca569eec78ba9f4ab98c51552 java-1.8.0-ibm-devel-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: e3379fa68ed6916850666c992522f918SHA-256: 3e2849869690e8072628be043d26f90a70df8716642d4d528d29e85c3db30b41 java-1.8.0-ibm-jdbc-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 1f2ee47691df783b3f9fad18fa1387c1SHA-256: e070df74e70d78bf7d258b319309e9601ab781204a2646858c9a1e44bff497f2 java-1.8.0-ibm-plugin-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 209111d88d83d7151b8c35aba738d84aSHA-256: 22a6012f34edf0d1b17bec1976b3781bb9cca770c26f9ce747e0badc746f293c java-1.8.0-ibm-src-1.8.0.2.10-1jpp.1.el7.x86_64.rpm     MD5: 316e4bac2d2d871ad63fbd1840c04455SHA-256: 272c552c1fcc493e603c5869d98e79e255b3b986ba39731abe9c8a7c4b88c6e7   (The unlinked packages above are only available from the Red Hat Network) 1281756 - CVE-2015-8126 CVE-2015-8472 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions1289841 - CVE-2015-7575 TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)1298906 - CVE-2016-0494 ICU: integer signedness issue in IndicRearrangementProcessor (OpenJDK 2D, 8140543)1298949 - CVE-2016-0475 OpenJDK: PBE incorrect key lengths (Libraries, 8138589)1298957 - CVE-2016-0402 OpenJDK: URL deserialization inconsistencies (Networking, 8059054)1299073 - CVE-2016-0448 OpenJDK: logging of RMI connection secrets (JMX, 8130710)1299385 - CVE-2016-0466 OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962)1299441 - CVE-2016-0483 OpenJDK: incorrect boundary check in JPEG decoder (AWT, 8139017)1302689 - CVE-2015-5041 IBM JDK: J9 JVM allows code to invoke non-public interface methods These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2015:0859-1: virt-who bug fix update

An updated virt-who package that fixes several bugs is now available for Red HatEnterprise Linux 6. The virt-who package provides an agent that collects information about virtualguests present in the system and reports them to the subscription manager.This update fixes the following bugs:* Previously, the virt-who agent was too slow when reading the associationbetween hosts and guests from VMWare ESX systems. As a consequence, whencommunicating with large ESX (or vCenter) deployments, it took a lot of time tosend updates about virtual guests to the Subscription Asset Manager (SAM) andRed Hat Satellite. With this update, virt-who uses an improved method to obtainhost-guest association, which accelerates the aforementioned process.(BZ#1197596)* Prior to this update, the virt-who agent was not able to decrypt a passwordthat was encrypted by the virt-who-password utility. As a consequence, virt-whocould not authenticate against the remote virtualization server. With thisupdate, virt-who is able to decrypt the encrypted password correctly, and thusconnects to the virtualization server properly. (BZ#1197597)* Prior to this update, the virt-who agent ignored the HTTP proxy configurationin the ESX virtualization back end. As a consequence, virt-who did not use theproxy server when connecting to the ESX server, and the connection could fail.With this update, virt-who uses the http_proxy environment variable in ESX mode,thus fixing this bug. (BZ#1201157)* Previously, virt-who used the value of the "--esx-server" command-line optioninstead of the "--satellite-server" option value. As a consequence, virt-whoattempted to report a host-guest association to the ESX server instead ofsatellite, and thus failed. With this update, "--satellite-server" works asintended, and virt-who uses the correct server when connecting to Red HatSatellite. (BZ#1205520) Users of virt-who are advised to upgrade to this updated package, which fixesthese bugs. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: virt-who-0.10-8.el6_6.3.src.rpm     MD5: c13594cd0ce03b208fadec6164788d14SHA-256: 5365887cfc60035fd9b7642d6f57651c53d966aa2dda9cc7c4f16cc16a913f67   IA-32: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   x86_64: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: virt-who-0.10-8.el6_6.3.src.rpm     MD5: c13594cd0ce03b208fadec6164788d14SHA-256: 5365887cfc60035fd9b7642d6f57651c53d966aa2dda9cc7c4f16cc16a913f67   x86_64: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   Red Hat Enterprise Linux Server (v. 6) SRPMS: virt-who-0.10-8.el6_6.3.src.rpm     MD5: c13594cd0ce03b208fadec6164788d14SHA-256: 5365887cfc60035fd9b7642d6f57651c53d966aa2dda9cc7c4f16cc16a913f67   IA-32: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   PPC: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   s390x: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   x86_64: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   Red Hat Enterprise Linux Server EUS (v. 6.6.z) SRPMS: virt-who-0.10-8.el6_6.3.src.rpm     MD5: c13594cd0ce03b208fadec6164788d14SHA-256: 5365887cfc60035fd9b7642d6f57651c53d966aa2dda9cc7c4f16cc16a913f67   IA-32: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   PPC: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   s390x: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   x86_64: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: virt-who-0.10-8.el6_6.3.src.rpm     MD5: c13594cd0ce03b208fadec6164788d14SHA-256: 5365887cfc60035fd9b7642d6f57651c53d966aa2dda9cc7c4f16cc16a913f67   IA-32: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   x86_64: virt-who-0.10-8.el6_6.3.noarch.rpm     MD5: b88658def1f3d220fff1698679b97512SHA-256: 2c9ef98fdbc2080edc3aae5a68dca9a4a033f6d8eab79f8eb9af6ec14bf7980f   (The unlinked packages above are only available from the Red Hat Network) 1197596 - virt-who performance issue for large ESX installation1205520 - virt-who uses wrong server when connecting to satellite These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

VU#544527: OpenELEC and RasPlex have a hard-coded SSH root password

OpenELEC and derivatives utilize a hard-coded default root password,and enable SSH root access by default.

RHSA-2014:1061-1: Low: Transition Red Hat Network Classic Hosted to Red Hat...

[unable to retrieve full-text content]This is the 3-year notification of the target date to migrate systems from Red Hat Network Classic Hosted to Red Hat Subscription Management. All systems using Red Hat Network Classic Hosted must be migrated to Red...

RHEA-2015:0893-1: spacewalk-proxy-installer enhancement update

Updated spacewalk-proxy-installer package is now available for Red Hat NetworkTools. Red Hat Network Tools provide programs and libraries that allow your system touse provisioning, monitoring, and configuration management capabilities providedby Red Hat Network and Red Hat Network Satellite.This update adds the following enhancement:* Now that Satellite is able to respond properly to If-Modified-Since requests(as of spacewalk-backend-2.3.3-25-sat), Proxy can take advantage of thiscapability to improve its communication with Satellite. Newly installed Proxy isnow configured to download updated yum repodata from Satellite only when it isnecessary, which reduces the required bandwidth between Proxy and Satellite.Enabling this feature on existing Proxies requires manual configuration, seehttps://access.redhat.com/articles/1396643 for instructions. (BZ#1191253)All users of spacewalk-proxy-installer are advised to use this updated package,which adds this enhancement. Before applying this update, make sure that all previously-released erratarelevant to your system have been applied.This update is available via Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/kb/docs/DOC-11259Red Hat Network Tools SRPMS: spacewalk-proxy-installer-2.3.0-5.el6sat.src.rpm     MD5: b4de1368ebd1ebf7afcde00878d8dc63SHA-256: b10f24f1a54d89119f00b4831279703e53c743a16bf96b1eb10c412e46c1918e   IA-32: spacewalk-proxy-installer-2.3.0-5.el6sat.noarch.rpm     MD5: 35d5798cf5e855ffd83f6bf7ec3066feSHA-256: 0a932c0ffbec6431f94ff708611059710fed3772c75adbf44b9f2b94e3418805   PPC: spacewalk-proxy-installer-2.3.0-5.el6sat.noarch.rpm     MD5: 35d5798cf5e855ffd83f6bf7ec3066feSHA-256: 0a932c0ffbec6431f94ff708611059710fed3772c75adbf44b9f2b94e3418805   s390x: spacewalk-proxy-installer-2.3.0-5.el6sat.noarch.rpm     MD5: 35d5798cf5e855ffd83f6bf7ec3066feSHA-256: 0a932c0ffbec6431f94ff708611059710fed3772c75adbf44b9f2b94e3418805   x86_64: spacewalk-proxy-installer-2.3.0-5.el6sat.noarch.rpm     MD5: 35d5798cf5e855ffd83f6bf7ec3066feSHA-256: 0a932c0ffbec6431f94ff708611059710fed3772c75adbf44b9f2b94e3418805   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:0433-1: openstack-neutron bug fix advisory

Updated OpenStack Networking packages that resolve various issues are nowavailable for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse)for RHEL 7. Red Hat Enterprise Linux OpenStack Platform provides the facilities forbuilding a private or public infrastructure-as-a-service (IaaS) cloudrunning on commonly available physical hardware.

This advisory includespackages for:* OpenStack Networking serviceOpenStack Networking (neutron) is a virtual network service for OpenStack.Just as OpenStack Compute (nova) provides an API to dynamically request andconfigure virtual servers, OpenStack Networking provides an API todynamically request and configure virtual networks.

These networks connect'interfaces' from other OpenStack services (e.g. virtual NICs from ComputeVMs).

The OpenStack Networking API supports extensions to provide advancednetwork capabilities (e.g. QoS, ACLs, network monitoring, etc.) Before applying this update, ensure all previously released errata relevantto your system have been applied.Red Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat EnterpriseLinux 7.2.The Red Hat Enterprise Linux OpenStack Platform 5 Release Notes contain thefollowing:* An explanation of the way in which the provided components interact toform a working cloud computing environment.* Technology Previews, Recommended Practices, and Known Issues.* The channels required for Red Hat Enterprise Linux OpenStack Platform 5,including which channels need to be enabled and disabled.The Release Notes are available at:https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.htmlThis update is available through the Red Hat Network.

Details on how to usethe Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat OpenStack 5.0 for RHEL 7 SRPMS: openstack-neutron-2014.1.5-12.el7ost.src.rpm     MD5: df53a6cbcc739343511a7edc77200c14SHA-256: a76429a6483e3e151ca5c9be097fa49e7df4c7d5847148ab2ff6f5633d7106e7   x86_64: openstack-neutron-2014.1.5-12.el7ost.noarch.rpm     MD5: 48e82a27c020bcbe3e4214f789826ceeSHA-256: dac258c0ba54e435989cc0a9c7210d64802b555f3a5f29d58f95719e3293bfc3 openstack-neutron-bigswitch-2014.1.5-12.el7ost.noarch.rpm     MD5: 3a5186960e670669846bbc758549b4bcSHA-256: 2f8b2c68aca2e6488e47d80b4a3bf9a5634c6b85c102e98b8d444c018bbe3518 openstack-neutron-brocade-2014.1.5-12.el7ost.noarch.rpm     MD5: c2b1bfd91c1d5f2c29814f6323cef069SHA-256: eb41f6bad85dc190bbbda3e5e42a1aba37acb0e1ca5667f32ebd6296998b8d1e openstack-neutron-cisco-2014.1.5-12.el7ost.noarch.rpm     MD5: 6195ed6ece7828f370e631f0d947ceccSHA-256: cd5509c8daea4f80d46bb016e784e8040b9b3c72959657dbe7e08869f5ece39f openstack-neutron-embrane-2014.1.5-12.el7ost.noarch.rpm     MD5: c3e836202b2563b3702c22c52f9a1892SHA-256: 67be876a9aa6f72fdd7a51ae35c83820c7137d5cbb550052e6b945736cfb8318 openstack-neutron-hyperv-2014.1.5-12.el7ost.noarch.rpm     MD5: 5c558777142dbb13005d71e5150ed835SHA-256: af5761ad6347be046983055df580cdc92d2290da55c15091b1754624293d7d92 openstack-neutron-ibm-2014.1.5-12.el7ost.noarch.rpm     MD5: dc739093eda68f97989749e4322ab86dSHA-256: 39ad90eafdf6588cb30c82c5dc2c38e4baa0cabc81746aeca101170052d663ae openstack-neutron-linuxbridge-2014.1.5-12.el7ost.noarch.rpm     MD5: 41d8a5bb007d05f04280b448355fb447SHA-256: 148e9e14291411d5b929d2029cba3f3633585d2077f02420759c72ebcdb9b6d6 openstack-neutron-mellanox-2014.1.5-12.el7ost.noarch.rpm     MD5: 11ce3aae5676381c6af84032d89a0fe0SHA-256: eced0546a342810f6803a803ba7eaeeb1ee2915247dace1a6a92bc1e3be3b87a openstack-neutron-metaplugin-2014.1.5-12.el7ost.noarch.rpm     MD5: a38a66c46c548a4578067dc4ccaec3d1SHA-256: bcad2e87f1f27c67a6b76cdf1fba5eb49ad743c03735e54a30aadb0a8a7aaca8 openstack-neutron-metering-agent-2014.1.5-12.el7ost.noarch.rpm     MD5: d1d43dc7f985c4c89505af05d6aeb948SHA-256: 8c3af5d8798707a68ce1fc1ea08f6df0559b92e6d502ee5ca578a3226babebfd openstack-neutron-midonet-2014.1.5-12.el7ost.noarch.rpm     MD5: 82e69e9652585afa6b58e72d986b04a8SHA-256: 1404de60ef5f680745a8f513eed2d5f5321ced5fe46fdbac750aacbc886a23d3 openstack-neutron-ml2-2014.1.5-12.el7ost.noarch.rpm     MD5: e9e0be0117bf5dd7de20ca5473e1cf8eSHA-256: e20316140eab2629d292b71d2942946c0d3c3e219348b22694d5330f52b7979d openstack-neutron-nec-2014.1.5-12.el7ost.noarch.rpm     MD5: f3f75c562c0f0b65fedf202582468e12SHA-256: 6d0cd23f352d164d786f668181dcb990b800f84802509243f839d73e8ccf7f7e openstack-neutron-nuage-2014.1.5-12.el7ost.noarch.rpm     MD5: e959dd3bb5070d14fc5bf99d36c08991SHA-256: 71cc6a3ae3fb1adf796eb2c41e66b5f0f6e172bd788a5ebb9da41b24d2f6e008 openstack-neutron-ofagent-2014.1.5-12.el7ost.noarch.rpm     MD5: 5081c20df20374c4adc98086d3fb6228SHA-256: 59c1b28120b5e0b5663f083cdd2d67eaf60b3279acb88fe1eec4a11b5df31cdb openstack-neutron-oneconvergence-nvsd-2014.1.5-12.el7ost.noarch.rpm     MD5: 1924ee2d5e47d5b899ccfe34de5abc5dSHA-256: 596dfa5b66d7e69f698352db37bf6b72a82947595339cdaa1a2f46a94c55c4f8 openstack-neutron-openvswitch-2014.1.5-12.el7ost.noarch.rpm     MD5: 3180cc187e99c51d291aad1b4497b851SHA-256: 707944d809e458f6a7a8a88f01ec1750e84169badeb1680e846084287f100a7b openstack-neutron-plumgrid-2014.1.5-12.el7ost.noarch.rpm     MD5: 591579b13a1013dad059fc66ac0c93efSHA-256: e40715612588d948b21e8ad01a162792a68ce666fbe332e3468dfc00df7ebe05 openstack-neutron-ryu-2014.1.5-12.el7ost.noarch.rpm     MD5: 4e4c4a45578a507ea13ac696923a391eSHA-256: 213157ff0b3b3ce335c65a769d5c4678bcc5cc118bc93d6154c76f7193fce81f openstack-neutron-vmware-2014.1.5-12.el7ost.noarch.rpm     MD5: f61e2d3292dbbb91a1d9f71fcec63624SHA-256: 63b223323c328e91c1be5f0ccfd94898733dd34e00b9fb0bc2570c5057c6946d openstack-neutron-vpn-agent-2014.1.5-12.el7ost.noarch.rpm     MD5: d9eaaec9bc9e956e03d732441c370c71SHA-256: acbc9240f24024f94b8e3d0c4e21131478bd50b6e5d8db1373afd86e48c7849f python-neutron-2014.1.5-12.el7ost.noarch.rpm     MD5: 96ec21a8ffd16b3654edd99d76f574f7SHA-256: 110b4ca71c3322d27f2b6d44aebe3cf1d693e5f59d291499cf1131b681048dfc   (The unlinked packages above are only available from the Red Hat Network) 1304079 - [neutron] oslo.messaging holds connections when replies fail1312652 - Neutron agents can not connect to rabbitmq These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:0674-1: gluster-smb bug fix update

Red Hat Enterprise Linux: Updated Samba package that adds one enhancement is now available for Red Hat Gluster Storage 3.1 update 2.

RHEA-2015:0874-1: devtoolset-3-memstomp enhancement update

Updated devtoolset-3-memstomp packages that add one enhancement are nowavailable for Red Hat Developer Toolset 3.1. The memstomp utility can be used to identify places in source code that cancause undefined behavior due to overlapping memory arguments to certain librarycalls. The devtoolset-3-memstomp packages provide the Red Hat Developer Toolsetversion of memstomp.The devtoolset-3-memstomp packages have been upgraded to a later version that isrequired by Red Hat Developer Toolset 3.1.This update adds the following enhancement:* This update introduces additional checking of function parameters. Inparticular, the memstomp utility detects if a NULL pointer is passed to certainmemory and string functions that require a valid pointer, as specified by theISO standard. (BZ#1175280)Users of devtoolset-3-memstomp are advised to upgrade to these updated packages,which add this enhancement. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: devtoolset-3-memstomp-0.1.5-3.el6.src.rpm     MD5: ac55becbe849eacaafad3ce98202e3d1SHA-256: a85df22f7da8ca081d3c09faf1cbeb7a3b0a0fd78c15ca3e5b95fab97063189b   x86_64: devtoolset-3-memstomp-0.1.5-3.el6.i686.rpm     MD5: 456d96e50c1e1ee4d6de5dad8da5c342SHA-256: 95a0706ed0448181b8829b3918a4841592ffcca941fdc3c50b31ec6f3bc051ca devtoolset-3-memstomp-0.1.5-3.el6.x86_64.rpm     MD5: 5cce05e77c2a5e4e4ad8069185ea41baSHA-256: e9d54f0d3e1d552a4c40c78c66151e8638e456505b6a4fe64f5eeb6f5e0d8a5f devtoolset-3-memstomp-debuginfo-0.1.5-3.el6.i686.rpm     MD5: 0e826d301ccd3dc9d8f66fd6a261e75bSHA-256: c9deabea137a2bd99ceacaea5d16c197a806adf9ae9a9a3c7a0612c126fcf7ad devtoolset-3-memstomp-debuginfo-0.1.5-3.el6.x86_64.rpm     MD5: 1bd3f18033cf5303e86a8d79461024a7SHA-256: 3ad596b287c6aa29a5452fc766fde2bd3ad1046db62089d539245f8273bd5b18   Red Hat Software Collections 1 for RHEL 7 SRPMS: devtoolset-3-memstomp-0.1.5-3.el7.src.rpm     MD5: 58caaf53d016eb7f0115c6a4ba1cc916SHA-256: a5abf45666b3cacf88e897a78e44af168aaeaba78e8b4f14d00cff2b2fbc20a7   x86_64: devtoolset-3-memstomp-0.1.5-3.el7.i686.rpm     MD5: 1d23b003c1f311773794660bc9706a59SHA-256: 7e917b24a9e40dfc845df0a1a4d12755abbbc36531d07b198184a2bf446c20fe devtoolset-3-memstomp-0.1.5-3.el7.x86_64.rpm     MD5: 28a06d9a1d8de8788cd259b00a97e0d8SHA-256: 79102f53d3f7cd70d0ec1170146559a342b951d7ad17f25f16f43e740976ee60 devtoolset-3-memstomp-debuginfo-0.1.5-3.el7.i686.rpm     MD5: 60626005365ae43bea626078aa8f8ae3SHA-256: a514e5e1bebe4dfbdc7037d534ff0ab0f444ec928f88b94c388b58c565353225 devtoolset-3-memstomp-debuginfo-0.1.5-3.el7.x86_64.rpm     MD5: f8c97c313b2c5918a6aa7517c96d4096SHA-256: e40ef10ee65090d54fdcad69fdda7d8ef2d06e89b319d60bb6b188093f6a3bf5   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

20 Linksys Router Models Vulnerable To Attack

Researchers say more than 100,000 Linksys routers in use today could be vulnerable to 10 flaws found in 20 separate router models made by the company.

RHSA-2014:2009-1: Important: kernel security update

Updated kernel packages that fix one security issue are now available forRed Hat Enterprise Linux 6.5 Extended Update Support.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The kernel packages contain the Linux kernel, the core of any Linuxoperating system.* A flaw was found in the way the Linux kernel handled GS segment registerbase switching when recovering from a #SS (stack segment) fault on anerroneous return to user space. A local, unprivileged user could use thisflaw to escalate their privileges on the system. (CVE-2014-9322, Important)Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect. Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: kernel-2.6.32-431.40.2.el6.src.rpm     MD5: c64ee782d6bd43e0360c8b810b578600SHA-256: f67dd0ac2e823722f2a9f7559436b507e65953bb7a0764c8bd03dc7a7de71b85   x86_64: kernel-2.6.32-431.40.2.el6.x86_64.rpm     MD5: e1c115a0de048768f71cea8573e2efddSHA-256: 0f72e19311afd753af0ee1e70d36ca47e17deb8c40d0c8c6f8acc6385909824c kernel-abi-whitelists-2.6.32-431.40.2.el6.noarch.rpm     MD5: f4d22174bbc15af41259f8eee0bcbd0fSHA-256: 2006ab9f06e460f0fdf3e7818fd14d8db18fdd0844ba8b4b1080b060429d9cff kernel-debug-2.6.32-431.40.2.el6.x86_64.rpm     MD5: ce8d6741b4c36acc2068437c277fc71eSHA-256: 939e83b60a58d6806607dafe0aa703486fe381599c24f3dff945e12550312bb9 kernel-debug-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 532759e2ac78c0f8e502b3bc30a14919SHA-256: 6f1ba8f0988d7cb25df74be29924f2137bc12c48824a417afb1c8435cc7605a9 kernel-debug-devel-2.6.32-431.40.2.el6.x86_64.rpm     MD5: c1744f72bc7c0c9874dd31cacc3418dbSHA-256: 5c630a8aab70672618c65061e029c5d96aa59d3b19c95e06fdd6d5fd84065b0b kernel-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 6543ec5037291785d8cd5fdec9bb96bfSHA-256: 9e625df9878017f61492e05cfa2a3eb53e188d9210f6e8d132c922a3893fab6a kernel-debuginfo-common-x86_64-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 9beaf75689f8732095386e34a4398681SHA-256: b5b0bd052c08b16dac0727e2939a95edeb0bccdf0046b4dfbe43e2e41d7a3bf5 kernel-devel-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 74e830627f1bfbc9cf59759cd8324289SHA-256: 2ad36696affbd48a76bc104226767567c83e090d1eeba2b6d08a49497be0a251 kernel-doc-2.6.32-431.40.2.el6.noarch.rpm     MD5: a50ac274c1658ff709c73283b93c5128SHA-256: 93dc5b55eefcac4ac040e2ff57c45cde94e50dc167c6059f9f305842c3637f95 kernel-firmware-2.6.32-431.40.2.el6.noarch.rpm     MD5: 69b506cff7aae0decc7b326210134b52SHA-256: 01d4da2b18661f67b9044ec98b88f9d3303c98134d50528196070cef1e5b6649 kernel-headers-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 4e259faa39d1faa83d8e6675591cc245SHA-256: 8569c50655d8960fba24b3d1395cba805825b2d7fadd14e71ce2c04e1b868ccf perf-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 775b65f388819ff93b7427ff3cab89c5SHA-256: d2e49f7f8c92dafaefacf4f9049317ec40569f0c79cc0ac7d2af26b3d5417f25 perf-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 0886d8603f7c88951e1322b35ccecc92SHA-256: ed879d45edfe9dc60b67c6b03a643c4a26da8ad44a0547954a21a51ccb356ae8 python-perf-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 65e9a2b1d2f7b75ff9f611fc71d99b86SHA-256: 26e73bb65a159043b7e5964b2ef291d1f025059d5d6bbfdd02408ab2a09ab8fd python-perf-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 6968bd6a40bbe0de27bce69526b09f26SHA-256: 558f1810c52784fb122d559a7ae1ea523f7ec3e225ebb131f7469d8dd0765931   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: kernel-2.6.32-431.40.2.el6.src.rpm     MD5: c64ee782d6bd43e0360c8b810b578600SHA-256: f67dd0ac2e823722f2a9f7559436b507e65953bb7a0764c8bd03dc7a7de71b85   IA-32: kernel-2.6.32-431.40.2.el6.i686.rpm     MD5: e4d10ee9f0a6a8a9ca9b386db5ba0b29SHA-256: 889a6859efca777cc13f4cfa6a9bbf4845025257b6d80036381fa956877852c6 kernel-abi-whitelists-2.6.32-431.40.2.el6.noarch.rpm     MD5: f4d22174bbc15af41259f8eee0bcbd0fSHA-256: 2006ab9f06e460f0fdf3e7818fd14d8db18fdd0844ba8b4b1080b060429d9cff kernel-debug-2.6.32-431.40.2.el6.i686.rpm     MD5: b48f872678f622f795679c76013ce5e6SHA-256: 457cc6c8344201f45f64361442d7aa658f14a8bd73de1986f7b52eff5563af97 kernel-debug-debuginfo-2.6.32-431.40.2.el6.i686.rpm     MD5: 404964daab1fcff6f9aad1c32215054aSHA-256: 5e8de76775df4382b75fc3c432d95dfb79b4ea539aca1c81ec1e90d72f27548d kernel-debug-devel-2.6.32-431.40.2.el6.i686.rpm     MD5: 986f37e95dd181ee2841798b09e5c731SHA-256: 5605650d1451dadec61a6a76adabba4142e36dc6c24bd9a7eeef8859a6817ae4 kernel-debuginfo-2.6.32-431.40.2.el6.i686.rpm     MD5: 111d26a89393baa6f96911f2253af844SHA-256: 8fbd1fb450e60500d3433664b85e138dfacd6b68e77ed317a5b5b6b739521b4b kernel-debuginfo-common-i686-2.6.32-431.40.2.el6.i686.rpm     MD5: c6210df2900963a87c4891c0ae254fa4SHA-256: e29dc5179e8bb196a1bf2165bbc75dca27a5755a6489107178aed7ae9688e822 kernel-devel-2.6.32-431.40.2.el6.i686.rpm     MD5: 1cd58d04ebebac8383eaa32ab3e0c1a4SHA-256: fa35f4d16a0e4155551e0fb84adb6c0ab50c92b4ac2666a4945fb29e3d4ae1f8 kernel-doc-2.6.32-431.40.2.el6.noarch.rpm     MD5: a50ac274c1658ff709c73283b93c5128SHA-256: 93dc5b55eefcac4ac040e2ff57c45cde94e50dc167c6059f9f305842c3637f95 kernel-firmware-2.6.32-431.40.2.el6.noarch.rpm     MD5: 69b506cff7aae0decc7b326210134b52SHA-256: 01d4da2b18661f67b9044ec98b88f9d3303c98134d50528196070cef1e5b6649 kernel-headers-2.6.32-431.40.2.el6.i686.rpm     MD5: 8a0d38f445fbfcdbb517c7662221227fSHA-256: 3bfef9b32b0ef995053df089f45b34de7974a337b56d4adb5d0918eeccec14c0 perf-2.6.32-431.40.2.el6.i686.rpm     MD5: 4be9a889d52249589a075f0458f69e8bSHA-256: 4608dbe389cc41058526aef50c488699c332605249fc84f236e1c4412006d37a perf-debuginfo-2.6.32-431.40.2.el6.i686.rpm     MD5: 7ef51997474418e58fdd2bf73133b251SHA-256: 12749321a8fab0e41592173b4a39a8a2c0373fb8dad1df2519a29b1b3a1e2b03 python-perf-2.6.32-431.40.2.el6.i686.rpm     MD5: b11c1a9bb5318068dc1c178994b67314SHA-256: 063605939dafdfb330193ff3445267d6fd372ba9674098be0fff5356c9d7f6bd python-perf-debuginfo-2.6.32-431.40.2.el6.i686.rpm     MD5: 7ee1fbcbf8bb9247adc07f26114c6e2bSHA-256: 047898d96408b4ec5fce2c385bfa8c102e64ed3a320c3123fb62979030b36124   PPC: kernel-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 8c23aa40a04473f6204e92a00424009eSHA-256: fc51831adac0b3dd281f55ac14af82970d4a8c6fb06fbff2a245bc7b4ea1bbca kernel-abi-whitelists-2.6.32-431.40.2.el6.noarch.rpm     MD5: f4d22174bbc15af41259f8eee0bcbd0fSHA-256: 2006ab9f06e460f0fdf3e7818fd14d8db18fdd0844ba8b4b1080b060429d9cff kernel-bootwrapper-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 110eb4bc078fff19b162e1695c89b465SHA-256: 1bf82ccbf995c6c0ca817db0ee6d2653babb823b2803b8e60758e02b5c2c18e3 kernel-debug-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 883b086529d58306261f05718e0c2fccSHA-256: b324b0254ddee8dc99c8eb95d1c1b4ffcce62df294930356c6d00a1c13002e32 kernel-debug-debuginfo-2.6.32-431.40.2.el6.ppc64.rpm     MD5: a92be1d9a4346454ac15dceca511fba0SHA-256: e8f56c5616850f1b2d2a7502263ff2ae2b5f62fad8ad9f370199a4b513b0ec51 kernel-debug-devel-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 35d5a343ad0e2825e7e4810f61521868SHA-256: d48abc138597f0562e82af9edd77e346bb0dc12f2cc03c31ce347edeb63a86e1 kernel-debuginfo-2.6.32-431.40.2.el6.ppc64.rpm     MD5: e123b7ce5701cb6807c4afe12433d4dfSHA-256: 0366d1f3a74f56401f843dcb4b1376698bfba89c773f960dd5d43355cef90a35 kernel-debuginfo-common-ppc64-2.6.32-431.40.2.el6.ppc64.rpm     MD5: c425d3755a456ad8124bcd6497bf80aeSHA-256: 38f54a42f3fbc3b3af18da3f3dd452490d71e8c11815644bcc8cf56afd8562bf kernel-devel-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 8d33776f57f1a45197b4e21d7c330c71SHA-256: b23db1cc3d6d791d2cedf30799407ffc10f20889a2c3d8a70aab32673528c554 kernel-doc-2.6.32-431.40.2.el6.noarch.rpm     MD5: a50ac274c1658ff709c73283b93c5128SHA-256: 93dc5b55eefcac4ac040e2ff57c45cde94e50dc167c6059f9f305842c3637f95 kernel-firmware-2.6.32-431.40.2.el6.noarch.rpm     MD5: 69b506cff7aae0decc7b326210134b52SHA-256: 01d4da2b18661f67b9044ec98b88f9d3303c98134d50528196070cef1e5b6649 kernel-headers-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 1d895db0ad5864c654e4b35169736b75SHA-256: df7487faca6482031e01575ad4e5bce91dde926b00abb5a4d4abf31f460f7d21 perf-2.6.32-431.40.2.el6.ppc64.rpm     MD5: c1695dee84d75fdadb821dbae370d775SHA-256: f295365d17dd0ae6760ced6dea1c503d2be28d78eb622db090a5a7274ce9f06d perf-debuginfo-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 6a54757de8fa92b1a48c0bf0f1c2c837SHA-256: baa05b0ac0aade60c7fb80a63d2cc473f4e9f21b08b3577972acfe59cc863af5 python-perf-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 7a0e043cc8f4321060d9c343996b551eSHA-256: fbaeff256d0392155193e5a90cee9a0286e6eb6182c82711ee6ecfdbf21da107 python-perf-debuginfo-2.6.32-431.40.2.el6.ppc64.rpm     MD5: 70a7426b38178058b028a258422dbb14SHA-256: d568a5795bbfbbf60020d54a26cda88712375aea795bef0645245066b7f7d907   s390x: kernel-2.6.32-431.40.2.el6.s390x.rpm     MD5: bd35d0f5e00311a62558c007f993cddcSHA-256: 8a2eb5dfa38ad0a3c8934455d0e809fa2f57d798dee7486097af39d940618368 kernel-abi-whitelists-2.6.32-431.40.2.el6.noarch.rpm     MD5: f4d22174bbc15af41259f8eee0bcbd0fSHA-256: 2006ab9f06e460f0fdf3e7818fd14d8db18fdd0844ba8b4b1080b060429d9cff kernel-debug-2.6.32-431.40.2.el6.s390x.rpm     MD5: 3e52fa9f79e03dac9f438248f8bfc740SHA-256: 25023ca00cf21204890d2ad61b7a7d05f389806e5747c3af34fe6d90b36d142c kernel-debug-debuginfo-2.6.32-431.40.2.el6.s390x.rpm     MD5: ea32d0da2634c9e8122aa29c0508e28dSHA-256: eed88ab8bcce5e999165e85e48e88a6c164c48f7610688f1d5a278c9ff5d9849 kernel-debug-devel-2.6.32-431.40.2.el6.s390x.rpm     MD5: 420a01acd73f028fd67b1be525835cd0SHA-256: 2916785e92100cddcda1a61d4d12fd5a18ba48159e698561a9f1095b43a2d11a kernel-debuginfo-2.6.32-431.40.2.el6.s390x.rpm     MD5: 77fd089a642337e0c251bb0f424c746fSHA-256: e875240098c71101f40d71fb27fd23852ae1a61af66405e7047ce25d1e49c0ea kernel-debuginfo-common-s390x-2.6.32-431.40.2.el6.s390x.rpm     MD5: a8520b9f9044ae2b9f221a7eb90f63eeSHA-256: a4777a0418611941b850797c18d635969a092dabbbce6e1ec357aa55437906e5 kernel-devel-2.6.32-431.40.2.el6.s390x.rpm     MD5: ea17c5e00d99b0ff2baebfa928e7aac4SHA-256: 2dfd63bfc2f51df038e85b7c7ba3b5fd6e9174aeb60b201a381e2cad52c335d6 kernel-doc-2.6.32-431.40.2.el6.noarch.rpm     MD5: a50ac274c1658ff709c73283b93c5128SHA-256: 93dc5b55eefcac4ac040e2ff57c45cde94e50dc167c6059f9f305842c3637f95 kernel-firmware-2.6.32-431.40.2.el6.noarch.rpm     MD5: 69b506cff7aae0decc7b326210134b52SHA-256: 01d4da2b18661f67b9044ec98b88f9d3303c98134d50528196070cef1e5b6649 kernel-headers-2.6.32-431.40.2.el6.s390x.rpm     MD5: bed64c8e0dc1c8e4ab6317651b629cc7SHA-256: a8e65489f9bc8e6c848a0d66cc245756d06cede07e81544fa6a33d62340bf5d8 kernel-kdump-2.6.32-431.40.2.el6.s390x.rpm     MD5: 82cdd6f4a198d9a02a7ed20245da34c8SHA-256: aabbb6ab66cfbe6ef6bee51f41fa6f5ef8e713823ebabdcc2ff447bf1cfbcd0e kernel-kdump-debuginfo-2.6.32-431.40.2.el6.s390x.rpm     MD5: 4aaf9b73df9ed43e50b481cd2bdd33ddSHA-256: a5a4f43ac73b0d9cbf13e11242eeaf81086a39985871ac6c9e90e0c72b5d8755 kernel-kdump-devel-2.6.32-431.40.2.el6.s390x.rpm     MD5: 2f85f17db77eecfda27ace8f6a95cf9bSHA-256: 52b051c87118b2d8b566647ddb42c0ec6579837cd6f6e20df1a8d8103ceaddc0 perf-2.6.32-431.40.2.el6.s390x.rpm     MD5: 209834fdc798300d8ca6baec32de30c0SHA-256: de89a0ee4043ce6ae82b74d47b8dd7b79af94e8c4a9e9b5b3ec1e5a71c8fab94 perf-debuginfo-2.6.32-431.40.2.el6.s390x.rpm     MD5: 9e8cef79fc5c7c0830b7a077b1878b16SHA-256: 8b72744fe0ceb9377e0a0b3b338c140b11ec0c825f21aa083e17c84cf3a523b2 python-perf-2.6.32-431.40.2.el6.s390x.rpm     MD5: 93cf2873f5de077f1cfafe9f9145ecd2SHA-256: 6bd75c11e4797909e6a316c323406a30981bf1e6ab97d1886164d09f1184ad85 python-perf-debuginfo-2.6.32-431.40.2.el6.s390x.rpm     MD5: 250d33bd7ce2bebc53337b9572adbc96SHA-256: 085055a4526ce309a6f948b34fd60023435e8429bce1fda6aaff165f124a79ae   x86_64: kernel-2.6.32-431.40.2.el6.x86_64.rpm     MD5: e1c115a0de048768f71cea8573e2efddSHA-256: 0f72e19311afd753af0ee1e70d36ca47e17deb8c40d0c8c6f8acc6385909824c kernel-abi-whitelists-2.6.32-431.40.2.el6.noarch.rpm     MD5: f4d22174bbc15af41259f8eee0bcbd0fSHA-256: 2006ab9f06e460f0fdf3e7818fd14d8db18fdd0844ba8b4b1080b060429d9cff kernel-debug-2.6.32-431.40.2.el6.x86_64.rpm     MD5: ce8d6741b4c36acc2068437c277fc71eSHA-256: 939e83b60a58d6806607dafe0aa703486fe381599c24f3dff945e12550312bb9 kernel-debug-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 532759e2ac78c0f8e502b3bc30a14919SHA-256: 6f1ba8f0988d7cb25df74be29924f2137bc12c48824a417afb1c8435cc7605a9 kernel-debug-devel-2.6.32-431.40.2.el6.x86_64.rpm     MD5: c1744f72bc7c0c9874dd31cacc3418dbSHA-256: 5c630a8aab70672618c65061e029c5d96aa59d3b19c95e06fdd6d5fd84065b0b kernel-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 6543ec5037291785d8cd5fdec9bb96bfSHA-256: 9e625df9878017f61492e05cfa2a3eb53e188d9210f6e8d132c922a3893fab6a kernel-debuginfo-common-x86_64-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 9beaf75689f8732095386e34a4398681SHA-256: b5b0bd052c08b16dac0727e2939a95edeb0bccdf0046b4dfbe43e2e41d7a3bf5 kernel-devel-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 74e830627f1bfbc9cf59759cd8324289SHA-256: 2ad36696affbd48a76bc104226767567c83e090d1eeba2b6d08a49497be0a251 kernel-doc-2.6.32-431.40.2.el6.noarch.rpm     MD5: a50ac274c1658ff709c73283b93c5128SHA-256: 93dc5b55eefcac4ac040e2ff57c45cde94e50dc167c6059f9f305842c3637f95 kernel-firmware-2.6.32-431.40.2.el6.noarch.rpm     MD5: 69b506cff7aae0decc7b326210134b52SHA-256: 01d4da2b18661f67b9044ec98b88f9d3303c98134d50528196070cef1e5b6649 kernel-headers-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 4e259faa39d1faa83d8e6675591cc245SHA-256: 8569c50655d8960fba24b3d1395cba805825b2d7fadd14e71ce2c04e1b868ccf perf-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 775b65f388819ff93b7427ff3cab89c5SHA-256: d2e49f7f8c92dafaefacf4f9049317ec40569f0c79cc0ac7d2af26b3d5417f25 perf-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 0886d8603f7c88951e1322b35ccecc92SHA-256: ed879d45edfe9dc60b67c6b03a643c4a26da8ad44a0547954a21a51ccb356ae8 python-perf-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 65e9a2b1d2f7b75ff9f611fc71d99b86SHA-256: 26e73bb65a159043b7e5964b2ef291d1f025059d5d6bbfdd02408ab2a09ab8fd python-perf-debuginfo-2.6.32-431.40.2.el6.x86_64.rpm     MD5: 6968bd6a40bbe0de27bce69526b09f26SHA-256: 558f1810c52784fb122d559a7ae1ea523f7ec3e225ebb131f7469d8dd0765931   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:1698-1: kexec-tools bug fix update

Updated kexec-tools packages that fix one bug are now available for Red HatEnterprise Linux 7. The kexec-tools packages contain the /sbin/kexec binary and utilities thattogether form the user-space component of the kernel's kexec feature. The/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexecfeature either on a normal or a panic reboot. The kexec fastboot mechanismallows booting a Linux kernel from the context of an already running kernel.This update fixes the following bug:* Due to the "ip" parameter duplication, the kdump kernel failed to boot in theiSCSI boot environment. This update fixes the underlying source code, and thekdump utility now succeeds and produces a vmcore file as intended in theaforementioned situation. (BZ#1149584)Users of kexec-tools are advised to upgrade to these updated packages, which fixthis bug. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7) SRPMS: kexec-tools-2.0.4-32.el7_0.5.src.rpm     MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89   x86_64: kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm     MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm     MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298 kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm     MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: kexec-tools-2.0.4-32.el7_0.5.src.rpm     MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89   x86_64: kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm     MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm     MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298 kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm     MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577   Red Hat Enterprise Linux Server (v. 7) SRPMS: kexec-tools-2.0.4-32.el7_0.5.src.rpm     MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89   PPC: kexec-tools-2.0.4-32.el7_0.5.ppc64.rpm     MD5: 62e93972d344f1678a79565fc8bc60adSHA-256: 8839edf6aa33c728028454e4864745512cd96e3fcf70bb180c22f68f2360bb91 kexec-tools-debuginfo-2.0.4-32.el7_0.5.ppc64.rpm     MD5: 8339fab9e9a94eb423ec3ad1b97eb66bSHA-256: 83af6b42688f3f7ed13527d6acce6a56fe2599e21e9fcbb50ed76a2e9845af63 kexec-tools-eppic-2.0.4-32.el7_0.5.ppc64.rpm     MD5: 96fd24667231ac5a9f9e2187b2e819eaSHA-256: 61c43f8d3a0b16f84d76773658e4d92a25059c4a23e2cb150d8d8a07f339e972   s390x: kexec-tools-2.0.4-32.el7_0.5.s390x.rpm     MD5: d2af927fd5540bbbf060b22b437adabbSHA-256: a3501de5adea5e7233f4d3e44afda902dec85559544e8a045dfa098395c01cbe kexec-tools-debuginfo-2.0.4-32.el7_0.5.s390x.rpm     MD5: 0c09616154e775c8d18b5153f57f6bd4SHA-256: d67a4637e546a80d80b994c60b49c1fa90baa1d6f5f138b7348cfe23ee56fe9a kexec-tools-eppic-2.0.4-32.el7_0.5.s390x.rpm     MD5: 5c9e30d8f86d357109e692bd8099bec3SHA-256: 5953898baa9b8bbdeecbd3991f89170593b87a03b5bfcc477f3d5d27087fef12   x86_64: kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm     MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm     MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298 kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm     MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: kexec-tools-2.0.4-32.el7_0.5.src.rpm     MD5: b3bb9220d12d9ea6fee8a678d6b74912SHA-256: 196374550f46cc3cb486ecd6e69849e8e86eccca3e588bbe37bf857761c67e89   x86_64: kexec-tools-2.0.4-32.el7_0.5.x86_64.rpm     MD5: eb9aeab54c7a13f847c1cd429d3e7d43SHA-256: b37e883674b22c42096daad84f0860ff07c424f2c8c86067626b55bc9b3c90db kexec-tools-debuginfo-2.0.4-32.el7_0.5.x86_64.rpm     MD5: f11c5dd4451598269e212664207844f7SHA-256: 40bf736cd66354cf251d0992687812eacdff5e1c461e8675bb023962c45ed298 kexec-tools-eppic-2.0.4-32.el7_0.5.x86_64.rpm     MD5: a2a984c023f1b6de260c517f6c83878fSHA-256: 56319ae1a24918019c75bd951fbc1b2b15ce4ff91a758685b9904b27f8827577   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: