3.1 C
London
Friday, November 17, 2017

RHBA-2014:0482-1: virt-viewer bug fix update

Updated virt-viewer packages that fix two bugs are now available for Red HatEnterprise Linux 6. The virt-viewer packages provide Virtual Machine Viewer, which is a lightweightinterface for interacting with the graphical display of a virtualized guest.Virtual Machine Viewer uses libvirt and is intended as a replacement fortraditional VNC or SPICE clients. The Simple Protocol for Independent ComputingEnvironments (SPICE) is a remote display protocol designed for virtualenvironments.This update fixes the following bugs: * Prior to this update, SPICE determined the scaling of windows incorrectly byusing the original desktop size instead of the host screen size. As aconsequence, when a guest window was open in SPICE, the screen could, undercertain circumstances, become blurry. With this update, the guest window scalinghas been fixed and this problem no longer occurs. (BZ#1081376)* Previously, the SPICE two-monitor setting did not function as intended.Consequently, when the guest was set up for two monitors, both of them used onlya single screen while in fullscreen mode. With this update, a fix for the SPICEtwo-monitor setting has been implemented and the guest monitors now correctlyappear on their own respective screens when in fullscreen mode. (BZ#1088921)Users of virt-viewer are advised to upgrade to these updated packages, which fixthis bug. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: virt-viewer-0.5.6-8.el6_5.2.src.rpmFile outdated by:  RHBA-2014:0492     MD5: ae18e64ea418aeddd64a18d86e16fff0SHA-256: 9453b137ac806ba38f7afe1f7250a1ca3b0be4b3109dc8f8ac64e7a9ccb1bcbe   IA-32: virt-viewer-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 59f7c493aea1dfa0c975819295d55c7dSHA-256: 225371a04a3970f7733340e13b6c091612e5d4804e1efb0858203bd4949a32b5 virt-viewer-debuginfo-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 00b2d0eb3c241e182f7d3dfa3cb8029cSHA-256: d4b8c72223f1ff951e39b38526f88acbeb4ad65009d04b636a923f49d4685e1a   x86_64: virt-viewer-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: 9a925513c1cf221e50459d7037caa28cSHA-256: f3d9e932d7d2e6b50d5b9e9f06ebb3bb611a611c69f300cd09fe74ffa0f49458 virt-viewer-debuginfo-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: be1f20eeb1de6544f25b4f96da9ac23bSHA-256: d688f6e6b3c8b2e676031197ebfd7f22e92a8af6e7ee7826ad0299153694e36e   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: virt-viewer-0.5.6-8.el6_5.2.src.rpmFile outdated by:  RHBA-2014:0492     MD5: ae18e64ea418aeddd64a18d86e16fff0SHA-256: 9453b137ac806ba38f7afe1f7250a1ca3b0be4b3109dc8f8ac64e7a9ccb1bcbe   x86_64: virt-viewer-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: 9a925513c1cf221e50459d7037caa28cSHA-256: f3d9e932d7d2e6b50d5b9e9f06ebb3bb611a611c69f300cd09fe74ffa0f49458 virt-viewer-debuginfo-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: be1f20eeb1de6544f25b4f96da9ac23bSHA-256: d688f6e6b3c8b2e676031197ebfd7f22e92a8af6e7ee7826ad0299153694e36e   Red Hat Enterprise Linux Server (v. 6) SRPMS: virt-viewer-0.5.6-8.el6_5.2.src.rpmFile outdated by:  RHBA-2014:0492     MD5: ae18e64ea418aeddd64a18d86e16fff0SHA-256: 9453b137ac806ba38f7afe1f7250a1ca3b0be4b3109dc8f8ac64e7a9ccb1bcbe   IA-32: virt-viewer-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 59f7c493aea1dfa0c975819295d55c7dSHA-256: 225371a04a3970f7733340e13b6c091612e5d4804e1efb0858203bd4949a32b5 virt-viewer-debuginfo-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 00b2d0eb3c241e182f7d3dfa3cb8029cSHA-256: d4b8c72223f1ff951e39b38526f88acbeb4ad65009d04b636a923f49d4685e1a   PPC: virt-viewer-0.5.6-8.el6_5.2.ppc64.rpmFile outdated by:  RHBA-2014:0492     MD5: 7c4fd148ea292a37d75c6cbf08db2661SHA-256: eb0725d467d45c13263721c1bfd1e46c940e967c5aece18551b283b51424de74 virt-viewer-debuginfo-0.5.6-8.el6_5.2.ppc64.rpmFile outdated by:  RHBA-2014:0492     MD5: 4d0178a9f5467a07a0a22112b5d2c123SHA-256: 4c52676351762f4c0240db6690d5b8fffd8d2751838a7128e30a5085d9a47df6   s390x: virt-viewer-0.5.6-8.el6_5.2.s390x.rpmFile outdated by:  RHBA-2014:0492     MD5: 5f26be90a8c22fac5b367260257a9d66SHA-256: 3b181d75dc339065b4f4102543366d2ba87ba95fe0d15d8f66c5e70cef0e70b1 virt-viewer-debuginfo-0.5.6-8.el6_5.2.s390x.rpmFile outdated by:  RHBA-2014:0492     MD5: 5eac01140abdde134db13ec01f7acc53SHA-256: 3496695091ea2167bf66c50bf57805f05606fe0b5163647c483c9461ba7914b0   x86_64: virt-viewer-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: 9a925513c1cf221e50459d7037caa28cSHA-256: f3d9e932d7d2e6b50d5b9e9f06ebb3bb611a611c69f300cd09fe74ffa0f49458 virt-viewer-debuginfo-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: be1f20eeb1de6544f25b4f96da9ac23bSHA-256: d688f6e6b3c8b2e676031197ebfd7f22e92a8af6e7ee7826ad0299153694e36e   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: virt-viewer-0.5.6-8.el6_5.2.src.rpmFile outdated by:  RHBA-2014:0492     MD5: ae18e64ea418aeddd64a18d86e16fff0SHA-256: 9453b137ac806ba38f7afe1f7250a1ca3b0be4b3109dc8f8ac64e7a9ccb1bcbe   x86_64: virt-viewer-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: 9a925513c1cf221e50459d7037caa28cSHA-256: f3d9e932d7d2e6b50d5b9e9f06ebb3bb611a611c69f300cd09fe74ffa0f49458 virt-viewer-debuginfo-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: be1f20eeb1de6544f25b4f96da9ac23bSHA-256: d688f6e6b3c8b2e676031197ebfd7f22e92a8af6e7ee7826ad0299153694e36e   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: virt-viewer-0.5.6-8.el6_5.2.src.rpmFile outdated by:  RHBA-2014:0492     MD5: ae18e64ea418aeddd64a18d86e16fff0SHA-256: 9453b137ac806ba38f7afe1f7250a1ca3b0be4b3109dc8f8ac64e7a9ccb1bcbe   IA-32: virt-viewer-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 59f7c493aea1dfa0c975819295d55c7dSHA-256: 225371a04a3970f7733340e13b6c091612e5d4804e1efb0858203bd4949a32b5 virt-viewer-debuginfo-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 00b2d0eb3c241e182f7d3dfa3cb8029cSHA-256: d4b8c72223f1ff951e39b38526f88acbeb4ad65009d04b636a923f49d4685e1a   PPC: virt-viewer-0.5.6-8.el6_5.2.ppc64.rpmFile outdated by:  RHBA-2014:0492     MD5: 7c4fd148ea292a37d75c6cbf08db2661SHA-256: eb0725d467d45c13263721c1bfd1e46c940e967c5aece18551b283b51424de74 virt-viewer-debuginfo-0.5.6-8.el6_5.2.ppc64.rpmFile outdated by:  RHBA-2014:0492     MD5: 4d0178a9f5467a07a0a22112b5d2c123SHA-256: 4c52676351762f4c0240db6690d5b8fffd8d2751838a7128e30a5085d9a47df6   s390x: virt-viewer-0.5.6-8.el6_5.2.s390x.rpmFile outdated by:  RHBA-2014:0492     MD5: 5f26be90a8c22fac5b367260257a9d66SHA-256: 3b181d75dc339065b4f4102543366d2ba87ba95fe0d15d8f66c5e70cef0e70b1 virt-viewer-debuginfo-0.5.6-8.el6_5.2.s390x.rpmFile outdated by:  RHBA-2014:0492     MD5: 5eac01140abdde134db13ec01f7acc53SHA-256: 3496695091ea2167bf66c50bf57805f05606fe0b5163647c483c9461ba7914b0   x86_64: virt-viewer-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: 9a925513c1cf221e50459d7037caa28cSHA-256: f3d9e932d7d2e6b50d5b9e9f06ebb3bb611a611c69f300cd09fe74ffa0f49458 virt-viewer-debuginfo-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: be1f20eeb1de6544f25b4f96da9ac23bSHA-256: d688f6e6b3c8b2e676031197ebfd7f22e92a8af6e7ee7826ad0299153694e36e   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: virt-viewer-0.5.6-8.el6_5.2.src.rpmFile outdated by:  RHBA-2014:0492     MD5: ae18e64ea418aeddd64a18d86e16fff0SHA-256: 9453b137ac806ba38f7afe1f7250a1ca3b0be4b3109dc8f8ac64e7a9ccb1bcbe   IA-32: virt-viewer-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 59f7c493aea1dfa0c975819295d55c7dSHA-256: 225371a04a3970f7733340e13b6c091612e5d4804e1efb0858203bd4949a32b5 virt-viewer-debuginfo-0.5.6-8.el6_5.2.i686.rpmFile outdated by:  RHBA-2014:0492     MD5: 00b2d0eb3c241e182f7d3dfa3cb8029cSHA-256: d4b8c72223f1ff951e39b38526f88acbeb4ad65009d04b636a923f49d4685e1a   x86_64: virt-viewer-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: 9a925513c1cf221e50459d7037caa28cSHA-256: f3d9e932d7d2e6b50d5b9e9f06ebb3bb611a611c69f300cd09fe74ffa0f49458 virt-viewer-debuginfo-0.5.6-8.el6_5.2.x86_64.rpmFile outdated by:  RHBA-2014:0492     MD5: be1f20eeb1de6544f25b4f96da9ac23bSHA-256: d688f6e6b3c8b2e676031197ebfd7f22e92a8af6e7ee7826ad0299153694e36e   (The unlinked packages above are only available from the Red Hat Network) 1081376 - Screen is blurry for some resolutions when spice window is maximized. These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:0486-1: Critical: java-1.7.0-ibm security update

Updated java-1.7.0-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 Supplementary.The Red Hat Security Response Team has rated this update as having Criticalsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,which give detailed severity ratings, are available for each vulnerabilityfrom the CVE links in the References section. IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBMJava Software Development Kit.This update fixes several vulnerabilities in the IBM Java RuntimeEnvironment and the IBM Java Software Development Kit. Detailedvulnerability descriptions are linked from the IBM Security alertspage, listed in the References section. (CVE-2014-0457, CVE-2014-2421,CVE-2014-0429, CVE-2014-0461, CVE-2014-0455, CVE-2014-2428, CVE-2014-0448,CVE-2014-0454, CVE-2014-0446, CVE-2014-0452, CVE-2014-0451, CVE-2014-2402,CVE-2014-2423, CVE-2014-2427, CVE-2014-0458, CVE-2014-2414, CVE-2014-2412,CVE-2014-2409, CVE-2014-0460, CVE-2013-6954, CVE-2013-6629, CVE-2014-2401,CVE-2014-0449, CVE-2014-0459, CVE-2014-0453, CVE-2014-2398, CVE-2014-1876,CVE-2014-2420)All users of java-1.7.0-ibm are advised to upgrade to these updatedpackages, containing the IBM Java SE 7 SR7 release. All running instancesof IBM Java must be restarted for the update to take effect. RHEL Desktop Supplementary (v. 5 client) IA-32: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 06f01cbefb8f5aee465469ca96d6257fSHA-256: 934cdc6dbf5d644880e87544adcb3468f79f180e3b955fe6d836f49da05fd887 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 4e76604fa65fa8f2c4693d96c8ddd8deSHA-256: 276a136a89bdfa1c1100c48ee98f00b17fb103223770516e1d1442dfe2ae60ef java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 5afcc4b2277e795656b17c30e98bfc3eSHA-256: 0e49f92550ce585eb795204a11e88173a948eaf79675b2e12ba0c41907d9f5be java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 2ff03e909679344266062073212ab447SHA-256: e98792b86770b6d10fd8f92c96d3c25c4de0efdc25dea0f29c781efed2b52a74 java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: de6bcbb3d09e2d22a7af62adae55bbe2SHA-256: b41d68a7c522f58ad3e8f6136d6c4e50f4feb85cd23c0bab2b7f16751b66f179 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: c50c650a29125113cb6725d401e40276SHA-256: dd8136710dac731cd13cdc485b77b874dd92f6cf84de28524cc8f52c547b6cb4   x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 06f01cbefb8f5aee465469ca96d6257fSHA-256: 934cdc6dbf5d644880e87544adcb3468f79f180e3b955fe6d836f49da05fd887 java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: 7232eca754447f7e32336f74e75e5e28SHA-256: bf20c76a8685774030c4ae264de72794b11c657fbdf7811d39da8774e0a3f549 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 4e76604fa65fa8f2c4693d96c8ddd8deSHA-256: 276a136a89bdfa1c1100c48ee98f00b17fb103223770516e1d1442dfe2ae60ef java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: b8112feac6e0b839095f725c768f4a26SHA-256: 19c3d0e61ce5c843e480560d4689459500e240a1900924c884f663231da04b38 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 5afcc4b2277e795656b17c30e98bfc3eSHA-256: 0e49f92550ce585eb795204a11e88173a948eaf79675b2e12ba0c41907d9f5be java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: a9a199ccb8c7e8ff3ca9ac8f70a7fbfeSHA-256: ae9be1f3fe38281c4a9220350809fb9fd6d26fcd4fd434fd792d7b4bb3f3f619 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 2ff03e909679344266062073212ab447SHA-256: e98792b86770b6d10fd8f92c96d3c25c4de0efdc25dea0f29c781efed2b52a74 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: 2facf5c51a539dca3a52a050cf726598SHA-256: d1966a7b0ca7d5af8e5e1b77d324da7b08318443ff70b762a0e646a3e6f09c32 java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: de6bcbb3d09e2d22a7af62adae55bbe2SHA-256: b41d68a7c522f58ad3e8f6136d6c4e50f4feb85cd23c0bab2b7f16751b66f179 java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: b431fe13ad4189e461f3b2c8d84e668eSHA-256: 3cd9d719216b8b126b02b76d5969ea8456fa4579d9b0cf59956757493e1502bb java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: c50c650a29125113cb6725d401e40276SHA-256: dd8136710dac731cd13cdc485b77b874dd92f6cf84de28524cc8f52c547b6cb4 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: ee1cfbb9088777a622b00cbbb279b3ecSHA-256: 36d87f0c3db6cb7990f6e7af5cefa3f66ae0356de2e010a35556c8a9e357c455   RHEL Supplementary (v. 5 server) IA-32: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 06f01cbefb8f5aee465469ca96d6257fSHA-256: 934cdc6dbf5d644880e87544adcb3468f79f180e3b955fe6d836f49da05fd887 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 4e76604fa65fa8f2c4693d96c8ddd8deSHA-256: 276a136a89bdfa1c1100c48ee98f00b17fb103223770516e1d1442dfe2ae60ef java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 5afcc4b2277e795656b17c30e98bfc3eSHA-256: 0e49f92550ce585eb795204a11e88173a948eaf79675b2e12ba0c41907d9f5be java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 2ff03e909679344266062073212ab447SHA-256: e98792b86770b6d10fd8f92c96d3c25c4de0efdc25dea0f29c781efed2b52a74 java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: de6bcbb3d09e2d22a7af62adae55bbe2SHA-256: b41d68a7c522f58ad3e8f6136d6c4e50f4feb85cd23c0bab2b7f16751b66f179 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: c50c650a29125113cb6725d401e40276SHA-256: dd8136710dac731cd13cdc485b77b874dd92f6cf84de28524cc8f52c547b6cb4   PPC: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.ppc.rpm     MD5: 269ba8da2973b0e02f09a793a81f8795SHA-256: d2ec0d516409669afeab20b661c24ee59e12c52411fea8a59314e1f67f804257 java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.ppc64.rpm     MD5: d684e6f1ec237b39b34a759be785045bSHA-256: cb2ebb8556797c0cda49fe462ef50790810351579e1073ebee0a9ad965642c85 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.ppc.rpm     MD5: 07de2b332d9212a9a725317c5713f19fSHA-256: 0e013d13c3412678f4b009481971a19ea1e2ed8d92c946c2c21bd60f48fe19b2 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.ppc64.rpm     MD5: 72da96449039b9be7745f750c54132c8SHA-256: 628ceb3ffd38a7b3d9d4a013a7f969da7b0667ae54748e39053fea5cb4d5a692 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.ppc.rpm     MD5: a76f2c829ca7a297ccce527beb26112eSHA-256: ea884656ef11a927b02c4dbfc0869b98266f0736607ede318dcc95a68640437b java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.ppc64.rpm     MD5: fb78ec080ac6aec48241afcb2f90ea9aSHA-256: e5d2de8a97ade31d26458986ab9ddf7164abebbe953509d689bb735c6f2a9856 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.ppc.rpm     MD5: be01df6347eaf8d0664f882e55c56e5fSHA-256: 088959456dd84abc4408bd0fe2d0ed5bb3ae0a8a6f77e3c1210c7a6307231774 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.ppc64.rpm     MD5: c2a92a3eeccebc354d1021d41a82638eSHA-256: ed37e09704634dabda464899fbb04af601e348b64a918a6b3d9fefb5644fa63a java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.ppc.rpm     MD5: 7cee0a85093d156522f71369a1848217SHA-256: 0f1b669400022ae6e00917969175f74e05ea2c8e7457c278c44e14aa7ffb1291 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.ppc.rpm     MD5: 23346de74312ae38043d93919d524d55SHA-256: d38ee9762f7bb36bc3f49f276cb3bcfade426420d68b4508115585943ac3c3ef java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.ppc64.rpm     MD5: 13052b8d6d93fa71e9879e030f1720f5SHA-256: 0996ab3897d6580e8c74837131e478f102ef58e6dce4c8e4fb3604f54e96c81a   s390x: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.s390.rpm     MD5: 6f43eb9065f1d50e860969afe5b11688SHA-256: 679641bcb59bae0ed0512f40bf01398fc3b2aa51ad22d15dd2c662bcd14c057d java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.s390x.rpm     MD5: 7ffd8c3e4c3c4d831ad26c59e5e8e002SHA-256: 7570ad68e786d3397859cae3426cbf3d595670b982d5d9e77de7a8b2ea722a4f java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.s390.rpm     MD5: 8728121bba43f5948b23ad7c97c45694SHA-256: dad3a69022686dd8cc1b167510c3c57a5bfcb23b5acaad1d1c390d6e131bc0f6 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.s390x.rpm     MD5: af91517ed45ea5cdd24609fff74062a1SHA-256: 4234aa60b61b4bd92662ee596be31deb85dc8c184522695ccd3bb4c9ee8b38c5 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.s390.rpm     MD5: 77ca7a023bc87be7f0d62fd15e75c775SHA-256: d0a213f2e3dbb94a5c0eae3d03f4074b0829adc2a526fb912778c72e4d1d0715 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.s390x.rpm     MD5: b3d3b28469da1e4c690871841fc7a0c8SHA-256: 734f03ca92e79b1c1d7e64da0efee209a47208f82b224ffdbfd152aff66ad0a1 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.s390.rpm     MD5: 139659eed8ab70ba7fc36499d12fe03cSHA-256: 67f434b438c123723cc08ad08df5752023bcf7b370f26686ab5c68452088c143 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.s390x.rpm     MD5: d769ff3ca68b4b0debff6e3c8f4d9711SHA-256: 8cff273b9250b2fefd61b3dd9012de2a810bc098b67323629f5d98ef87a0e52a java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.s390.rpm     MD5: 0e57c8b0634dc36e9d4fb4e64bb5c719SHA-256: c1582993cc6a3e304198f278bce54f5e6944ef6deb19fc01ceda724d9abd6136 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.s390x.rpm     MD5: 17711a22763dbdf9cbf291a69c6d79fbSHA-256: d365468a0ff6b0c3eca5779a43409017b09ceebc8f337cdb6cab11ee6fecc64f   x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 06f01cbefb8f5aee465469ca96d6257fSHA-256: 934cdc6dbf5d644880e87544adcb3468f79f180e3b955fe6d836f49da05fd887 java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: 7232eca754447f7e32336f74e75e5e28SHA-256: bf20c76a8685774030c4ae264de72794b11c657fbdf7811d39da8774e0a3f549 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 4e76604fa65fa8f2c4693d96c8ddd8deSHA-256: 276a136a89bdfa1c1100c48ee98f00b17fb103223770516e1d1442dfe2ae60ef java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: b8112feac6e0b839095f725c768f4a26SHA-256: 19c3d0e61ce5c843e480560d4689459500e240a1900924c884f663231da04b38 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 5afcc4b2277e795656b17c30e98bfc3eSHA-256: 0e49f92550ce585eb795204a11e88173a948eaf79675b2e12ba0c41907d9f5be java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: a9a199ccb8c7e8ff3ca9ac8f70a7fbfeSHA-256: ae9be1f3fe38281c4a9220350809fb9fd6d26fcd4fd434fd792d7b4bb3f3f619 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: 2ff03e909679344266062073212ab447SHA-256: e98792b86770b6d10fd8f92c96d3c25c4de0efdc25dea0f29c781efed2b52a74 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: 2facf5c51a539dca3a52a050cf726598SHA-256: d1966a7b0ca7d5af8e5e1b77d324da7b08318443ff70b762a0e646a3e6f09c32 java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: de6bcbb3d09e2d22a7af62adae55bbe2SHA-256: b41d68a7c522f58ad3e8f6136d6c4e50f4feb85cd23c0bab2b7f16751b66f179 java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: b431fe13ad4189e461f3b2c8d84e668eSHA-256: 3cd9d719216b8b126b02b76d5969ea8456fa4579d9b0cf59956757493e1502bb java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.i386.rpm     MD5: c50c650a29125113cb6725d401e40276SHA-256: dd8136710dac731cd13cdc485b77b874dd92f6cf84de28524cc8f52c547b6cb4 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el5_10.x86_64.rpm     MD5: ee1cfbb9088777a622b00cbbb279b3ecSHA-256: 36d87f0c3db6cb7990f6e7af5cefa3f66ae0356de2e010a35556c8a9e357c455   Red Hat Enterprise Linux Desktop Supplementary (v. 6) IA-32: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: fb35ae977ae84881f40997451ed165bfSHA-256: 80b9d1ce8d0a925f8e6f54c47ba43e93675a026c482ccf883c2c72f392779b1c java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 74935a39735d32a4cbc17a69656c88e7SHA-256: c33c26a4e907b40aa6c0c53d0b9a86f9070bbbcc095e75789ea73dc0b92585a4 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 9f54fb6b5be50dba118201cbfd056f2cSHA-256: 4080aebaa027f1695343f8041b0527d8e7b44ce4dc00c5ca063cf495407a7b1d java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 97ddbbd8fff7ac5ec6adfc3f3b139797SHA-256: d187f1ef4820bd79a49564c2355f15bb3e3bdc54eb450d2a4e82692b2bb67bba java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 7378c3624ab8ab0f3279c3ac11ac6e51SHA-256: 6ce62d14dfa5cf9caac739c50c93a6092acfb66d4b108dbca2a3878612e9acfe java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 17f3491ab8668819524f4e554d058f53SHA-256: 6be3350e8c881222542b9f7fc973bce196edcf3a6ed4111e151915dfbde935e2   x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9b69fab597db1ff2dfa64bfa812f70d1SHA-256: 28f200005b77c34775f1fdf8a35d2e2f17839e3251a21e90f7faf951832b4002 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9f14b29b1e2030f662d8cf5a21a1fd0aSHA-256: 57653d3e7873da3ab7757f77b2874e175fafb21e2c2f60334006676b2590482e java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 929af74ed6da3167e05fb0da548b574eSHA-256: 6c815a615f35c68d700664327314591d6a7558b331f43569e6882b836458bc91 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 0273d0ea91ebcf248224ad72a3089288SHA-256: 8a404bdc217a5f693dcf9704ee6febc0584789bb88f67370ec3d18e15140bbbb java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 7e1bb1e9c2b78326cd490064e7fcd602SHA-256: 476c54171084dcde4b9cb8521ffb7f8badad1f764cfefbf3bf0830eb07e21fa1 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: df989798fdc68a1699764bb85bd4cb68SHA-256: aa4a3cf3d03cfec174a620cfe1f1d218b7b3926c9e7da268b25e223d850d6900   Red Hat Enterprise Linux HPC Node Supplementary (v. 6) x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9b69fab597db1ff2dfa64bfa812f70d1SHA-256: 28f200005b77c34775f1fdf8a35d2e2f17839e3251a21e90f7faf951832b4002 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9f14b29b1e2030f662d8cf5a21a1fd0aSHA-256: 57653d3e7873da3ab7757f77b2874e175fafb21e2c2f60334006676b2590482e java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 929af74ed6da3167e05fb0da548b574eSHA-256: 6c815a615f35c68d700664327314591d6a7558b331f43569e6882b836458bc91 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: df989798fdc68a1699764bb85bd4cb68SHA-256: aa4a3cf3d03cfec174a620cfe1f1d218b7b3926c9e7da268b25e223d850d6900   Red Hat Enterprise Linux Server Supplementary (v. 6) IA-32: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: fb35ae977ae84881f40997451ed165bfSHA-256: 80b9d1ce8d0a925f8e6f54c47ba43e93675a026c482ccf883c2c72f392779b1c java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 74935a39735d32a4cbc17a69656c88e7SHA-256: c33c26a4e907b40aa6c0c53d0b9a86f9070bbbcc095e75789ea73dc0b92585a4 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 9f54fb6b5be50dba118201cbfd056f2cSHA-256: 4080aebaa027f1695343f8041b0527d8e7b44ce4dc00c5ca063cf495407a7b1d java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 97ddbbd8fff7ac5ec6adfc3f3b139797SHA-256: d187f1ef4820bd79a49564c2355f15bb3e3bdc54eb450d2a4e82692b2bb67bba java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 7378c3624ab8ab0f3279c3ac11ac6e51SHA-256: 6ce62d14dfa5cf9caac739c50c93a6092acfb66d4b108dbca2a3878612e9acfe java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 17f3491ab8668819524f4e554d058f53SHA-256: 6be3350e8c881222542b9f7fc973bce196edcf3a6ed4111e151915dfbde935e2   PPC: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.ppc64.rpm     MD5: f33500578034a8f4b9425eca5a7bf468SHA-256: bcac987b41acf69878ce2d63d8389947ffec4605cde6717adf8a44771bd647fd java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.ppc64.rpm     MD5: cfae464ba5fbe50d554c6d3cbf106d2aSHA-256: 71c61c896bb69d22bfcb1c7ee7a91c3a2dd535c232a220cfdb07dc526496aea3 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.ppc64.rpm     MD5: 590563591582f77aaf804d9a52857aa4SHA-256: 8c17113cdf917f5fcf0a6fd88da5e989aaa4bb8bafc627ba2edb507dd46ac4fb java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.ppc64.rpm     MD5: 9e6a6ae823106dc64f707b30361e8108SHA-256: 4e04c9f95e2a02cb31e5bfa90dd69cdf9641f9d41c00967d16c2a43a15f4a851 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.ppc64.rpm     MD5: a7b385b7f463812ab61faa45466847afSHA-256: a8fae25bd3cdeafb5e706ecc382457297f9b51ba5f20335a7f571082a2818abb   s390x: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: d541076fd698877aa4fea212b927e6d1SHA-256: e0852450dd7625c663d92653ad6a013e706ac10181710a08ee7cecd74c4a8746 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: 3cfa8fbddd53fd7787d37eb5089ed0d4SHA-256: ca5627c6ac6ffe53bdeee82580b0fee07361412f751e928b75b8bebced650d49 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: cee04d816f2700e30975c655494a4bb4SHA-256: 2047bb6a23ad31940a5cc1755e495e56ccea14ae9e9e9f407dc5f7c48faccb6a java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: 630e785a155b99df875b51e645602968SHA-256: 0c414e2745710f8be225bd32272641610001f3d68ccbac8dd3a1c251e45ad214 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: 48c7ca864e0e9ce5af951d5616313775SHA-256: 66b5b609f6f135b8f08073cf2bdbbb81a7b728751afa61249ad205acd1921c4c   x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9b69fab597db1ff2dfa64bfa812f70d1SHA-256: 28f200005b77c34775f1fdf8a35d2e2f17839e3251a21e90f7faf951832b4002 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9f14b29b1e2030f662d8cf5a21a1fd0aSHA-256: 57653d3e7873da3ab7757f77b2874e175fafb21e2c2f60334006676b2590482e java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 929af74ed6da3167e05fb0da548b574eSHA-256: 6c815a615f35c68d700664327314591d6a7558b331f43569e6882b836458bc91 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 0273d0ea91ebcf248224ad72a3089288SHA-256: 8a404bdc217a5f693dcf9704ee6febc0584789bb88f67370ec3d18e15140bbbb java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 7e1bb1e9c2b78326cd490064e7fcd602SHA-256: 476c54171084dcde4b9cb8521ffb7f8badad1f764cfefbf3bf0830eb07e21fa1 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: df989798fdc68a1699764bb85bd4cb68SHA-256: aa4a3cf3d03cfec174a620cfe1f1d218b7b3926c9e7da268b25e223d850d6900   Red Hat Enterprise Linux Server Supplementary AUS (v. 6.5) x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9b69fab597db1ff2dfa64bfa812f70d1SHA-256: 28f200005b77c34775f1fdf8a35d2e2f17839e3251a21e90f7faf951832b4002 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9f14b29b1e2030f662d8cf5a21a1fd0aSHA-256: 57653d3e7873da3ab7757f77b2874e175fafb21e2c2f60334006676b2590482e java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 929af74ed6da3167e05fb0da548b574eSHA-256: 6c815a615f35c68d700664327314591d6a7558b331f43569e6882b836458bc91 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 0273d0ea91ebcf248224ad72a3089288SHA-256: 8a404bdc217a5f693dcf9704ee6febc0584789bb88f67370ec3d18e15140bbbb java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 7e1bb1e9c2b78326cd490064e7fcd602SHA-256: 476c54171084dcde4b9cb8521ffb7f8badad1f764cfefbf3bf0830eb07e21fa1 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: df989798fdc68a1699764bb85bd4cb68SHA-256: aa4a3cf3d03cfec174a620cfe1f1d218b7b3926c9e7da268b25e223d850d6900   Red Hat Enterprise Linux Server Supplementary EUS (v. 6.5.z) IA-32: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: fb35ae977ae84881f40997451ed165bfSHA-256: 80b9d1ce8d0a925f8e6f54c47ba43e93675a026c482ccf883c2c72f392779b1c java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 74935a39735d32a4cbc17a69656c88e7SHA-256: c33c26a4e907b40aa6c0c53d0b9a86f9070bbbcc095e75789ea73dc0b92585a4 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 9f54fb6b5be50dba118201cbfd056f2cSHA-256: 4080aebaa027f1695343f8041b0527d8e7b44ce4dc00c5ca063cf495407a7b1d java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 97ddbbd8fff7ac5ec6adfc3f3b139797SHA-256: d187f1ef4820bd79a49564c2355f15bb3e3bdc54eb450d2a4e82692b2bb67bba java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 7378c3624ab8ab0f3279c3ac11ac6e51SHA-256: 6ce62d14dfa5cf9caac739c50c93a6092acfb66d4b108dbca2a3878612e9acfe java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 17f3491ab8668819524f4e554d058f53SHA-256: 6be3350e8c881222542b9f7fc973bce196edcf3a6ed4111e151915dfbde935e2   s390x: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: d541076fd698877aa4fea212b927e6d1SHA-256: e0852450dd7625c663d92653ad6a013e706ac10181710a08ee7cecd74c4a8746 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: 3cfa8fbddd53fd7787d37eb5089ed0d4SHA-256: ca5627c6ac6ffe53bdeee82580b0fee07361412f751e928b75b8bebced650d49 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: cee04d816f2700e30975c655494a4bb4SHA-256: 2047bb6a23ad31940a5cc1755e495e56ccea14ae9e9e9f407dc5f7c48faccb6a java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: 630e785a155b99df875b51e645602968SHA-256: 0c414e2745710f8be225bd32272641610001f3d68ccbac8dd3a1c251e45ad214 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.s390x.rpm     MD5: 48c7ca864e0e9ce5af951d5616313775SHA-256: 66b5b609f6f135b8f08073cf2bdbbb81a7b728751afa61249ad205acd1921c4c   x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9b69fab597db1ff2dfa64bfa812f70d1SHA-256: 28f200005b77c34775f1fdf8a35d2e2f17839e3251a21e90f7faf951832b4002 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9f14b29b1e2030f662d8cf5a21a1fd0aSHA-256: 57653d3e7873da3ab7757f77b2874e175fafb21e2c2f60334006676b2590482e java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 929af74ed6da3167e05fb0da548b574eSHA-256: 6c815a615f35c68d700664327314591d6a7558b331f43569e6882b836458bc91 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 0273d0ea91ebcf248224ad72a3089288SHA-256: 8a404bdc217a5f693dcf9704ee6febc0584789bb88f67370ec3d18e15140bbbb java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 7e1bb1e9c2b78326cd490064e7fcd602SHA-256: 476c54171084dcde4b9cb8521ffb7f8badad1f764cfefbf3bf0830eb07e21fa1 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: df989798fdc68a1699764bb85bd4cb68SHA-256: aa4a3cf3d03cfec174a620cfe1f1d218b7b3926c9e7da268b25e223d850d6900   Red Hat Enterprise Linux Workstation Supplementary (v. 6) IA-32: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: fb35ae977ae84881f40997451ed165bfSHA-256: 80b9d1ce8d0a925f8e6f54c47ba43e93675a026c482ccf883c2c72f392779b1c java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 74935a39735d32a4cbc17a69656c88e7SHA-256: c33c26a4e907b40aa6c0c53d0b9a86f9070bbbcc095e75789ea73dc0b92585a4 java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 9f54fb6b5be50dba118201cbfd056f2cSHA-256: 4080aebaa027f1695343f8041b0527d8e7b44ce4dc00c5ca063cf495407a7b1d java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 97ddbbd8fff7ac5ec6adfc3f3b139797SHA-256: d187f1ef4820bd79a49564c2355f15bb3e3bdc54eb450d2a4e82692b2bb67bba java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 7378c3624ab8ab0f3279c3ac11ac6e51SHA-256: 6ce62d14dfa5cf9caac739c50c93a6092acfb66d4b108dbca2a3878612e9acfe java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.i686.rpm     MD5: 17f3491ab8668819524f4e554d058f53SHA-256: 6be3350e8c881222542b9f7fc973bce196edcf3a6ed4111e151915dfbde935e2   x86_64: java-1.7.0-ibm-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9b69fab597db1ff2dfa64bfa812f70d1SHA-256: 28f200005b77c34775f1fdf8a35d2e2f17839e3251a21e90f7faf951832b4002 java-1.7.0-ibm-demo-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 9f14b29b1e2030f662d8cf5a21a1fd0aSHA-256: 57653d3e7873da3ab7757f77b2874e175fafb21e2c2f60334006676b2590482e java-1.7.0-ibm-devel-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 929af74ed6da3167e05fb0da548b574eSHA-256: 6c815a615f35c68d700664327314591d6a7558b331f43569e6882b836458bc91 java-1.7.0-ibm-jdbc-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 0273d0ea91ebcf248224ad72a3089288SHA-256: 8a404bdc217a5f693dcf9704ee6febc0584789bb88f67370ec3d18e15140bbbb java-1.7.0-ibm-plugin-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: 7e1bb1e9c2b78326cd490064e7fcd602SHA-256: 476c54171084dcde4b9cb8521ffb7f8badad1f764cfefbf3bf0830eb07e21fa1 java-1.7.0-ibm-src-1.7.0.7.0-1jpp.1.el6_5.x86_64.rpm     MD5: df989798fdc68a1699764bb85bd4cb68SHA-256: aa4a3cf3d03cfec174a620cfe1f1d218b7b3926c9e7da268b25e223d850d6900   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0485-1: kdesdk bug fix update

Updated kdesdk packages that fix two bugs are now available for Red HatEnterprise Linux 6. The kdesdk packages contain the KDE Software Development Kit (SDK) which is acollection of applications and tools used by developers. These applications andtools include - cervisia: a CVS frontend; kate: an advanced text editor;kbugbuster: a tool to manage the KDE bug report system; kcachegrind: a browserfor data produced by profiling tools (for example cachegrind); kompare: a difftool; kuiviewer: a tool for displaying a designer's UI files; lokalize: acomputer-aided translation system focusing on productivity and performance; andumbrello: a UML modeller and UML diagram tool.This update fixes the following bugs:* Previously, the umbrello UML modeller used logic based on recursive calls. Asa consequence if a user created a diagram that had dependency graph cycles,umbrello entered an infinite loop and terminated unexpectedly with asegmentation fault. With this update, the application logic has been changed touse stack-based parent resolution. As a result, umbrello no longer terminates inthe described scenario. (BZ#857002)* Prior to this update, the kompare utility hid underscore characters located atthe bottom of a highlighted difference block when using certain fonts. Thisupdate fixes this bug. As a result, kompare correctly displays underscorecharacters in the described situation. (BZ#908709)Users of kdesdk are advised to upgrade to these updated packages, which fixthese bugs. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Server FasTrack (v. 6) SRPMS: kdesdk-4.3.4-9.el6.src.rpm     MD5: 4598954b4c9ac1095b4d5cb9a7473ed3SHA-256: a108d8a3b484bb453cd6a45fbe5d506d872677e7de3f69db4b664e7e71adb784   IA-32: kdesdk-4.3.4-9.el6.i686.rpm     MD5: 88df302968a1dc376942ffb52723f7b8SHA-256: a8d6b782f080b13658baf938674e7cdc79fcf8533d90c7d34166457819093a1c kdesdk-debuginfo-4.3.4-9.el6.i686.rpm     MD5: 3d4096e0a1cf6769486b69806a41fcc9SHA-256: 630eecc6ba774715f9a4b09ca584142ad2ec2e2e035aa7af6ad0111c2060978c kdesdk-devel-4.3.4-9.el6.i686.rpm     MD5: 20b0a78c7bb602323e03f1ac8ba8bc6eSHA-256: 92f5aca5968ff66c08642820a601ae382045d9207bacc3c2d694ba6e769b04b5 kdesdk-libs-4.3.4-9.el6.i686.rpm     MD5: 20b1c96271c89e5b4ce6860e045102dfSHA-256: 988b87ad7c024732cc02fad57431f3889d1b72a74f598a5b81f7cc7f2e8668b7 kdesdk-utils-4.3.4-9.el6.i686.rpm     MD5: 1050a7eff64982a3dd01bc3ff4198f7fSHA-256: 5c8eeac07fec048cbe6f5629c29ecbb85011c0496c022d7aceffd45f41ec259d   PPC: kdesdk-4.3.4-9.el6.ppc64.rpm     MD5: 048ab697f02896ec6d79f0d4a9cc641dSHA-256: 81b55870ad610fd6bd04935c031e4b0f2e2181f342dfe32f6c935ed3e279b6f8 kdesdk-debuginfo-4.3.4-9.el6.ppc.rpm     MD5: 94e2c248da1ee1aa8d05fcb91caa57b7SHA-256: 61dba97e36e530781a9f0c0614ca6ffa4faf515f68a34aba517dda5424daa6dd kdesdk-debuginfo-4.3.4-9.el6.ppc64.rpm     MD5: ab6f6c5790a8962b30fba4c414c12ef6SHA-256: cf2318c1e20c0b731a221f5b8cb0cb1b348fbeeccbe368c98f3b783de7a954ba kdesdk-devel-4.3.4-9.el6.ppc.rpm     MD5: e8227888be4c4d4a5ccea4a5e9c7d44eSHA-256: 73abb576ba618363f93a5373800a82bfc96339f766ac99cb5b2494d077fd1af1 kdesdk-devel-4.3.4-9.el6.ppc64.rpm     MD5: 8ba10ec293a93f7c1570240351ba3bf8SHA-256: 44b7a8a073585a0396ad8b70964602843f3441e6ea3944069baf439e9b4da6f6 kdesdk-libs-4.3.4-9.el6.ppc.rpm     MD5: 1e610f6d92258904448a8ec6a409b0b3SHA-256: 8def02a579a14c6729d55221b74b3c3f81e93fd998ad4d7cdb3343799fed24a7 kdesdk-libs-4.3.4-9.el6.ppc64.rpm     MD5: 9f4777c73a66b88a03a9909ace9efc2fSHA-256: 87886fc62a0a2c13295640f15865f811d0357b4bcf828b2c23334a1d5d894d9d kdesdk-utils-4.3.4-9.el6.ppc.rpm     MD5: 5872a5505db9ebe20c954b78c1c85dcdSHA-256: 7efb88891fdd5677dbe9f8fb75e8b179d54cfc372094b905d2fe7a3b4462aca5 kdesdk-utils-4.3.4-9.el6.ppc64.rpm     MD5: 7520ca73e503661af5ca87b0682a5489SHA-256: 25e1732a9ee23cd98cc4cf9acd262a8b72949a9c534bc3564bbe03017b7f26a1   s390x: kdesdk-4.3.4-9.el6.s390x.rpm     MD5: 1ec3183c9c45e62aa0c507b9bfc64499SHA-256: f7630bb929bb1099a3043e6efcdeb4857ef69f55022255b1bd22c4220667b5ae kdesdk-debuginfo-4.3.4-9.el6.s390.rpm     MD5: c5aff29c7d51130a9eb7819234c5ef50SHA-256: 0b4ff2e20ec6dcec69656a404cea94357bf4097661a1cf069e4bd7021534d82d kdesdk-debuginfo-4.3.4-9.el6.s390x.rpm     MD5: b60872d6fb9c9131eb9afcb21527ff0aSHA-256: d184c218671cd67f3902112cb611965e78691f722edf19d875d0215e2b611b57 kdesdk-devel-4.3.4-9.el6.s390.rpm     MD5: 5bd93e7d81f6a3330219e2f041c53f8bSHA-256: e9149dbfc39d16a4072ecbf93fb9dddd7d23060d1c24ed45dff07634527f155f kdesdk-devel-4.3.4-9.el6.s390x.rpm     MD5: 84e406b21dbaac221e8e50abed2548c5SHA-256: c8455f3ed0bfca1db1a6cbfdf5714965a450805993dfbd54c8e082eca8c3deeb kdesdk-libs-4.3.4-9.el6.s390.rpm     MD5: 2a6eb929285afb7417ec6ecb5070f401SHA-256: 662dab78ade878dd527aa4209ff22be789c181faa8d122a9b5735423f5cb9b25 kdesdk-libs-4.3.4-9.el6.s390x.rpm     MD5: 1d34a0bbee35f59d10d1a0872de52fe8SHA-256: 81e72bb825c5b9dfad3d236b455699a14c63a3182a8b5386401a082431d873f0 kdesdk-utils-4.3.4-9.el6.s390.rpm     MD5: af0d604b1da54171e48dcaeb6d8a47b1SHA-256: 66c4eb7189df101333871920c68230e73765614aafed908547a524d5d4e8ee39 kdesdk-utils-4.3.4-9.el6.s390x.rpm     MD5: 30209fa641ed58459a4b9e9cb5177b37SHA-256: 78b052c541305e02cca2be596610c4bf032881c8d135cbf5c3d4cb42a8df2046   x86_64: kdesdk-4.3.4-9.el6.x86_64.rpm     MD5: 549617e1e5440688d0009ca083c4ed26SHA-256: 41d8633f7d093ff5d11d2aaabdb2d3d1217f18aebe401bb506d8ab33b0b9c4a8 kdesdk-debuginfo-4.3.4-9.el6.i686.rpm     MD5: 3d4096e0a1cf6769486b69806a41fcc9SHA-256: 630eecc6ba774715f9a4b09ca584142ad2ec2e2e035aa7af6ad0111c2060978c kdesdk-debuginfo-4.3.4-9.el6.x86_64.rpm     MD5: 7b95234ed3dd8aebc6ce9cd97f36609cSHA-256: 0c96b7add17b39a5b3ff06dc94332aadca111ce40fe7d13dfd72b3a9453153df kdesdk-devel-4.3.4-9.el6.i686.rpm     MD5: 20b0a78c7bb602323e03f1ac8ba8bc6eSHA-256: 92f5aca5968ff66c08642820a601ae382045d9207bacc3c2d694ba6e769b04b5 kdesdk-devel-4.3.4-9.el6.x86_64.rpm     MD5: 4dedfa7ea42f2cd7abf557cc790bbb93SHA-256: 2bf644d05c3fcf96ccfb065eb4b008c8fadc10682d8fc6e24fab10f33d9a1dc2 kdesdk-libs-4.3.4-9.el6.i686.rpm     MD5: 20b1c96271c89e5b4ce6860e045102dfSHA-256: 988b87ad7c024732cc02fad57431f3889d1b72a74f598a5b81f7cc7f2e8668b7 kdesdk-libs-4.3.4-9.el6.x86_64.rpm     MD5: 41065a552bb713a9104745d9d98bb6e7SHA-256: 4c6094ec665bd45ceb2f08acecd4565da74a53cd4c32d30ee9f14844fa5b2d7c kdesdk-utils-4.3.4-9.el6.i686.rpm     MD5: 1050a7eff64982a3dd01bc3ff4198f7fSHA-256: 5c8eeac07fec048cbe6f5629c29ecbb85011c0496c022d7aceffd45f41ec259d kdesdk-utils-4.3.4-9.el6.x86_64.rpm     MD5: 8a0c2679e1547ec8993982b6e2e1919bSHA-256: e1070294a3d2b82892410bc545205fd4bfcfb8f1b8db7b2a3a9c658d49f642e2   Red Hat Enterprise Linux Workstation FasTrack (v. 6) SRPMS: kdesdk-4.3.4-9.el6.src.rpm     MD5: 4598954b4c9ac1095b4d5cb9a7473ed3SHA-256: a108d8a3b484bb453cd6a45fbe5d506d872677e7de3f69db4b664e7e71adb784   IA-32: kdesdk-4.3.4-9.el6.i686.rpm     MD5: 88df302968a1dc376942ffb52723f7b8SHA-256: a8d6b782f080b13658baf938674e7cdc79fcf8533d90c7d34166457819093a1c kdesdk-debuginfo-4.3.4-9.el6.i686.rpm     MD5: 3d4096e0a1cf6769486b69806a41fcc9SHA-256: 630eecc6ba774715f9a4b09ca584142ad2ec2e2e035aa7af6ad0111c2060978c kdesdk-devel-4.3.4-9.el6.i686.rpm     MD5: 20b0a78c7bb602323e03f1ac8ba8bc6eSHA-256: 92f5aca5968ff66c08642820a601ae382045d9207bacc3c2d694ba6e769b04b5 kdesdk-libs-4.3.4-9.el6.i686.rpm     MD5: 20b1c96271c89e5b4ce6860e045102dfSHA-256: 988b87ad7c024732cc02fad57431f3889d1b72a74f598a5b81f7cc7f2e8668b7 kdesdk-utils-4.3.4-9.el6.i686.rpm     MD5: 1050a7eff64982a3dd01bc3ff4198f7fSHA-256: 5c8eeac07fec048cbe6f5629c29ecbb85011c0496c022d7aceffd45f41ec259d   x86_64: kdesdk-4.3.4-9.el6.x86_64.rpm     MD5: 549617e1e5440688d0009ca083c4ed26SHA-256: 41d8633f7d093ff5d11d2aaabdb2d3d1217f18aebe401bb506d8ab33b0b9c4a8 kdesdk-debuginfo-4.3.4-9.el6.i686.rpm     MD5: 3d4096e0a1cf6769486b69806a41fcc9SHA-256: 630eecc6ba774715f9a4b09ca584142ad2ec2e2e035aa7af6ad0111c2060978c kdesdk-debuginfo-4.3.4-9.el6.x86_64.rpm     MD5: 7b95234ed3dd8aebc6ce9cd97f36609cSHA-256: 0c96b7add17b39a5b3ff06dc94332aadca111ce40fe7d13dfd72b3a9453153df kdesdk-devel-4.3.4-9.el6.i686.rpm     MD5: 20b0a78c7bb602323e03f1ac8ba8bc6eSHA-256: 92f5aca5968ff66c08642820a601ae382045d9207bacc3c2d694ba6e769b04b5 kdesdk-devel-4.3.4-9.el6.x86_64.rpm     MD5: 4dedfa7ea42f2cd7abf557cc790bbb93SHA-256: 2bf644d05c3fcf96ccfb065eb4b008c8fadc10682d8fc6e24fab10f33d9a1dc2 kdesdk-libs-4.3.4-9.el6.i686.rpm     MD5: 20b1c96271c89e5b4ce6860e045102dfSHA-256: 988b87ad7c024732cc02fad57431f3889d1b72a74f598a5b81f7cc7f2e8668b7 kdesdk-libs-4.3.4-9.el6.x86_64.rpm     MD5: 41065a552bb713a9104745d9d98bb6e7SHA-256: 4c6094ec665bd45ceb2f08acecd4565da74a53cd4c32d30ee9f14844fa5b2d7c kdesdk-utils-4.3.4-9.el6.i686.rpm     MD5: 1050a7eff64982a3dd01bc3ff4198f7fSHA-256: 5c8eeac07fec048cbe6f5629c29ecbb85011c0496c022d7aceffd45f41ec259d kdesdk-utils-4.3.4-9.el6.x86_64.rpm     MD5: 8a0c2679e1547ec8993982b6e2e1919bSHA-256: e1070294a3d2b82892410bc545205fd4bfcfb8f1b8db7b2a3a9c658d49f642e2   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0484-1: cpupowerutils bug fix update

Updated cpupowerutils packages that fix one bug are now available for Red HatEnterprise Linux 6. The cpupowerutils packages provide a suite of tools to manage power states onappropriately enabled central processing units (CPU).This update fixes the following bug:* Prior to this update, if the turbostat utility was run on an Intel Haswell EPprocessor based system, the turbostat utility did not correctly access theenergy status registers. As a consequence, turbostat displayed the followingerror message:/dev/cpu/0/msr offset 0x641 read failedThis bug has been fixed by enabling access to the proper energy statusregisters. As a result, the turbostat utility now returns the expected data inthe described scenario. (BZ#1085869)Users of cpupowerutils are advised to upgrade to these updated packages, whichfix this bug. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: cpupowerutils-1.2-1.el6_5.1.src.rpm     MD5: ae112e28e3dd9c3b090d1f9cd4ccd95eSHA-256: 52c5b27c417316f2f458b39948537675278356927bc8b6c50d44e2a35517fb93   IA-32: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857   x86_64: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-1.2-1.el6_5.1.x86_64.rpm     MD5: e9bc9528b7f4c4f162b4cc90d89996b8SHA-256: 9a9bd617d2751ae0663295555f86f35963c066080325be716269a4abe4d6dfb0 cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-debuginfo-1.2-1.el6_5.1.x86_64.rpm     MD5: b1740ff20147eee54db87bedbe1359c6SHA-256: 1019d7b1fa32f9b9c57c555b1fd872f054c42ffd8f465f67fe74b20f9992679a cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857 cpupowerutils-devel-1.2-1.el6_5.1.x86_64.rpm     MD5: a6cc6856efbdbf6f2817cbc844e31f4dSHA-256: aee2c1ad9b64f0710dd831f61688e5b144bcd52905f81a8837a8129e879a1f2d   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: cpupowerutils-1.2-1.el6_5.1.src.rpm     MD5: ae112e28e3dd9c3b090d1f9cd4ccd95eSHA-256: 52c5b27c417316f2f458b39948537675278356927bc8b6c50d44e2a35517fb93   x86_64: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-1.2-1.el6_5.1.x86_64.rpm     MD5: e9bc9528b7f4c4f162b4cc90d89996b8SHA-256: 9a9bd617d2751ae0663295555f86f35963c066080325be716269a4abe4d6dfb0 cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-debuginfo-1.2-1.el6_5.1.x86_64.rpm     MD5: b1740ff20147eee54db87bedbe1359c6SHA-256: 1019d7b1fa32f9b9c57c555b1fd872f054c42ffd8f465f67fe74b20f9992679a cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857 cpupowerutils-devel-1.2-1.el6_5.1.x86_64.rpm     MD5: a6cc6856efbdbf6f2817cbc844e31f4dSHA-256: aee2c1ad9b64f0710dd831f61688e5b144bcd52905f81a8837a8129e879a1f2d   Red Hat Enterprise Linux Server (v. 6) SRPMS: cpupowerutils-1.2-1.el6_5.1.src.rpm     MD5: ae112e28e3dd9c3b090d1f9cd4ccd95eSHA-256: 52c5b27c417316f2f458b39948537675278356927bc8b6c50d44e2a35517fb93   IA-32: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857   PPC: cpupowerutils-1.2-1.el6_5.1.ppc.rpm     MD5: 058291700044f217ce70aa7aded316e5SHA-256: e1ab97533d4e4d4b80bf205b72ede3b78742e3f20275ade9c9b494a4f0734a3e cpupowerutils-1.2-1.el6_5.1.ppc64.rpm     MD5: 6f9085601635c40fb2e2949e7f9420a2SHA-256: 6b5fb6281cbd99f63c20ad918b2fd4488d07f622fe264cbce9ccb3c8ba9c2a85 cpupowerutils-debuginfo-1.2-1.el6_5.1.ppc.rpm     MD5: abc3e676dd6111c6c83894fe74a4571fSHA-256: 60530629d8f48fe954fd4ea88e114213d29ecd1d2292a3dedd3164778a9817d0 cpupowerutils-debuginfo-1.2-1.el6_5.1.ppc64.rpm     MD5: cd7a6ee613aa47f8d3a178627c1ea6a2SHA-256: 5f9586991b898a14b9e8bd6064244e1ca2d8903ae50b4500b74315a0a307798f cpupowerutils-devel-1.2-1.el6_5.1.ppc.rpm     MD5: 151766ca597db12433290b6351aaf4c2SHA-256: b4070208e246f63e36dbbcfcba75008910b58fd69ad177820fabc513d0c5fba5 cpupowerutils-devel-1.2-1.el6_5.1.ppc64.rpm     MD5: e88dec42d3c6495cdc8735b8d294eb66SHA-256: 1c160a8b1ee7490137cabcedd1c06fde724c94766f8bccec74e88a8226430a54   x86_64: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-1.2-1.el6_5.1.x86_64.rpm     MD5: e9bc9528b7f4c4f162b4cc90d89996b8SHA-256: 9a9bd617d2751ae0663295555f86f35963c066080325be716269a4abe4d6dfb0 cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-debuginfo-1.2-1.el6_5.1.x86_64.rpm     MD5: b1740ff20147eee54db87bedbe1359c6SHA-256: 1019d7b1fa32f9b9c57c555b1fd872f054c42ffd8f465f67fe74b20f9992679a cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857 cpupowerutils-devel-1.2-1.el6_5.1.x86_64.rpm     MD5: a6cc6856efbdbf6f2817cbc844e31f4dSHA-256: aee2c1ad9b64f0710dd831f61688e5b144bcd52905f81a8837a8129e879a1f2d   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: cpupowerutils-1.2-1.el6_5.1.src.rpm     MD5: ae112e28e3dd9c3b090d1f9cd4ccd95eSHA-256: 52c5b27c417316f2f458b39948537675278356927bc8b6c50d44e2a35517fb93   x86_64: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-1.2-1.el6_5.1.x86_64.rpm     MD5: e9bc9528b7f4c4f162b4cc90d89996b8SHA-256: 9a9bd617d2751ae0663295555f86f35963c066080325be716269a4abe4d6dfb0 cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-debuginfo-1.2-1.el6_5.1.x86_64.rpm     MD5: b1740ff20147eee54db87bedbe1359c6SHA-256: 1019d7b1fa32f9b9c57c555b1fd872f054c42ffd8f465f67fe74b20f9992679a cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857 cpupowerutils-devel-1.2-1.el6_5.1.x86_64.rpm     MD5: a6cc6856efbdbf6f2817cbc844e31f4dSHA-256: aee2c1ad9b64f0710dd831f61688e5b144bcd52905f81a8837a8129e879a1f2d   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: cpupowerutils-1.2-1.el6_5.1.src.rpm     MD5: ae112e28e3dd9c3b090d1f9cd4ccd95eSHA-256: 52c5b27c417316f2f458b39948537675278356927bc8b6c50d44e2a35517fb93   IA-32: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857   PPC: cpupowerutils-1.2-1.el6_5.1.ppc.rpm     MD5: 058291700044f217ce70aa7aded316e5SHA-256: e1ab97533d4e4d4b80bf205b72ede3b78742e3f20275ade9c9b494a4f0734a3e cpupowerutils-1.2-1.el6_5.1.ppc64.rpm     MD5: 6f9085601635c40fb2e2949e7f9420a2SHA-256: 6b5fb6281cbd99f63c20ad918b2fd4488d07f622fe264cbce9ccb3c8ba9c2a85 cpupowerutils-debuginfo-1.2-1.el6_5.1.ppc.rpm     MD5: abc3e676dd6111c6c83894fe74a4571fSHA-256: 60530629d8f48fe954fd4ea88e114213d29ecd1d2292a3dedd3164778a9817d0 cpupowerutils-debuginfo-1.2-1.el6_5.1.ppc64.rpm     MD5: cd7a6ee613aa47f8d3a178627c1ea6a2SHA-256: 5f9586991b898a14b9e8bd6064244e1ca2d8903ae50b4500b74315a0a307798f cpupowerutils-devel-1.2-1.el6_5.1.ppc.rpm     MD5: 151766ca597db12433290b6351aaf4c2SHA-256: b4070208e246f63e36dbbcfcba75008910b58fd69ad177820fabc513d0c5fba5 cpupowerutils-devel-1.2-1.el6_5.1.ppc64.rpm     MD5: e88dec42d3c6495cdc8735b8d294eb66SHA-256: 1c160a8b1ee7490137cabcedd1c06fde724c94766f8bccec74e88a8226430a54   x86_64: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-1.2-1.el6_5.1.x86_64.rpm     MD5: e9bc9528b7f4c4f162b4cc90d89996b8SHA-256: 9a9bd617d2751ae0663295555f86f35963c066080325be716269a4abe4d6dfb0 cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-debuginfo-1.2-1.el6_5.1.x86_64.rpm     MD5: b1740ff20147eee54db87bedbe1359c6SHA-256: 1019d7b1fa32f9b9c57c555b1fd872f054c42ffd8f465f67fe74b20f9992679a cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857 cpupowerutils-devel-1.2-1.el6_5.1.x86_64.rpm     MD5: a6cc6856efbdbf6f2817cbc844e31f4dSHA-256: aee2c1ad9b64f0710dd831f61688e5b144bcd52905f81a8837a8129e879a1f2d   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: cpupowerutils-1.2-1.el6_5.1.src.rpm     MD5: ae112e28e3dd9c3b090d1f9cd4ccd95eSHA-256: 52c5b27c417316f2f458b39948537675278356927bc8b6c50d44e2a35517fb93   IA-32: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857   x86_64: cpupowerutils-1.2-1.el6_5.1.i686.rpm     MD5: debc9934eecf04288a2e687188e33aafSHA-256: 2d161ff3efd943c55f34967afff0eccd9cc519438a63d219dc4de0bbf39b37ba cpupowerutils-1.2-1.el6_5.1.x86_64.rpm     MD5: e9bc9528b7f4c4f162b4cc90d89996b8SHA-256: 9a9bd617d2751ae0663295555f86f35963c066080325be716269a4abe4d6dfb0 cpupowerutils-debuginfo-1.2-1.el6_5.1.i686.rpm     MD5: fca325e3b0ea5b515d35c53d93fb3004SHA-256: 73e6ae50b527eb06bdafb3b9cb1f419e2953e6abab40dee2af179d5e30e339b5 cpupowerutils-debuginfo-1.2-1.el6_5.1.x86_64.rpm     MD5: b1740ff20147eee54db87bedbe1359c6SHA-256: 1019d7b1fa32f9b9c57c555b1fd872f054c42ffd8f465f67fe74b20f9992679a cpupowerutils-devel-1.2-1.el6_5.1.i686.rpm     MD5: 15fc1e4a1e888d3383505d687e9ed3b5SHA-256: ab2023e0370723c517f52d0065fd2526de63a82e57599efd18d9b48cb52e8857 cpupowerutils-devel-1.2-1.el6_5.1.x86_64.rpm     MD5: a6cc6856efbdbf6f2817cbc844e31f4dSHA-256: aee2c1ad9b64f0710dd831f61688e5b144bcd52905f81a8837a8129e879a1f2d   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Update for Disabling RC4 in .NET TLS – Version: 1.0

Revision Note: V1.0 (May 13, 2014): Advisory published.Summary: Microsoft is announcing the availability of an update for Microsoft .NET Framework that disables RC4 in Transport Layer Security (TLS) through the modification of the system registry. Use ...

Update Rollup of Revoked Non-Compliant UEFI Modules – Version: 1.0

Revision Note: V1.0 (May 13, 2014): Advisory published.Summary: With this advisory, Microsoft is revoking the digital signature for four private, third-party UEFI (Unified Extensible Firmware Interface) modules that could be loaded during UEFI Secure B...

Update for Vulnerabilities in Adobe Flash Player in Internet Explorer –...

Revision Note: V24.0 (May 13, 2014): Revised advisory to clarify that the 2961887 update is not cumulative and requires that the 2942844 update be installed for affected systems to be offered the update.Summary: Microsoft is announcing the availability...

Update to Improve Credentials Protection and Management – Version: 1.0

Revision Note: V1.0 (May 13, 2014): Advisory published.Summary: Microsoft is announcing the availability of an update for supported editions of Windows 8, Windows RT, Windows Server 2012, Windows 7, and Windows Server 2008 R2 that improves credential p...

Insecure Library Loading Could Allow Remote Code Execution – Version: 19.0

Revision Note: V19.0 (May 13, 2014): Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS14-023, "Vulnerabilities in Microsoft Office Could Allow Remote Code Execution.Summary: Microsoft is awa...

Update to Microsoft Update Client – Version: 1.0

Revision Note: V1.0 (May 13, 2014): Advisory published.Summary: Microsoft is announcing that it is updating the Microsoft Update client for all supported editions of Windows 7, Windows Server 2008 R2, Windows 8, Windows 8.1, Windows Server 2012, Window...