6 C
London
Monday, November 20, 2017

RHSA-2015:0869-1: Important: kvm security update

Updated kvm packages that fix two security issues are now available for RedHat Enterprise Linux 5.Red Hat Product Security has rated this update as having Important securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built forthe standard Red Hat Enterprise Linux kernel.It was found that KVM's Write to Model Specific Register (WRMSR)instruction emulation would write non-canonical values passed in by theguest to certain MSRs in the host's context. A privileged guest user coulduse this flaw to crash the host. (CVE-2014-3610)A race condition flaw was found in the way the Linux kernel's KVM subsystemhandled PIT (Programmable Interval Timer) emulation. A guest user who hasaccess to the PIT I/O ports could use this flaw to crash the host.(CVE-2014-3611)Red Hat would like to thank Lars Bull of Google and Nadav Amit forreporting the CVE-2014-3610 issue, and Lars Bull of Google for reportingthe CVE-2014-3611 issue.All kvm users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. Note: The procedure inthe Solution section must be performed before this update will take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258The following procedure must be performed before this update will takeeffect:1) Stop all KVM guest virtual machines.2) Either reboot the hypervisor machine or, as the root user, remove (using"modprobe -r [module]") and reload (using "modprobe [module]") all of thefollowing modules which are currently running (determined using "lsmod"):kvm, ksm, kvm-intel or kvm-amd.3) Restart the KVM guest virtual machines.RHEL Desktop Multi OS (v. 5 client) SRPMS: kvm-83-270.el5_11.src.rpm     MD5: 845613cff7a8597f7cc75183ffdc1179SHA-256: c629e6854dada09d3511669d18a3e631867ffc0274987530833a46c5286d41de   x86_64: kmod-kvm-83-270.el5_11.x86_64.rpm     MD5: 09b79bacf593383239313ea96dada5f6SHA-256: 9880466bf433b84828426b5116de8420d217d0902c78b5ce34837d27e4b20404 kmod-kvm-debug-83-270.el5_11.x86_64.rpm     MD5: e4fe9eb1d86bd327db43ee7ac673ffffSHA-256: 005690052bb02a193c85b8d1bbe5c39d0f553d90c8c3581749d5dd785a434534 kvm-83-270.el5_11.x86_64.rpm     MD5: 330a280aab93d5b99f0cdd30efdff6e0SHA-256: e1fce80ecb373158a5f3d06c71808fdbf8171f7c5da94a1cf228709216351f4f kvm-debuginfo-83-270.el5_11.x86_64.rpm     MD5: 1a06355d746344234aa30d28918b7debSHA-256: 8a18d860adeec65fd59d534d9df71416561e7c6aa381013fb8f76ba659988d09 kvm-qemu-img-83-270.el5_11.x86_64.rpm     MD5: ee96628a7ceda12decb5d9521d76b96cSHA-256: 6282d5d8e822b529df0a9ab0d08a50cb0fd3173c63b93c0d2b6776690406972e kvm-tools-83-270.el5_11.x86_64.rpm     MD5: 5581ca73f13bb9f09125c714c78b1ddcSHA-256: 5201ad6df83adcd9c9888b4b9f9ccdf0c01392703f00a97f5e755a1e0b6b4b78   RHEL Virtualization (v. 5 server) SRPMS: kvm-83-270.el5_11.src.rpm     MD5: 845613cff7a8597f7cc75183ffdc1179SHA-256: c629e6854dada09d3511669d18a3e631867ffc0274987530833a46c5286d41de   x86_64: kmod-kvm-83-270.el5_11.x86_64.rpm     MD5: 09b79bacf593383239313ea96dada5f6SHA-256: 9880466bf433b84828426b5116de8420d217d0902c78b5ce34837d27e4b20404 kmod-kvm-debug-83-270.el5_11.x86_64.rpm     MD5: e4fe9eb1d86bd327db43ee7ac673ffffSHA-256: 005690052bb02a193c85b8d1bbe5c39d0f553d90c8c3581749d5dd785a434534 kvm-83-270.el5_11.x86_64.rpm     MD5: 330a280aab93d5b99f0cdd30efdff6e0SHA-256: e1fce80ecb373158a5f3d06c71808fdbf8171f7c5da94a1cf228709216351f4f kvm-debuginfo-83-270.el5_11.x86_64.rpm     MD5: 1a06355d746344234aa30d28918b7debSHA-256: 8a18d860adeec65fd59d534d9df71416561e7c6aa381013fb8f76ba659988d09 kvm-qemu-img-83-270.el5_11.x86_64.rpm     MD5: ee96628a7ceda12decb5d9521d76b96cSHA-256: 6282d5d8e822b529df0a9ab0d08a50cb0fd3173c63b93c0d2b6776690406972e kvm-tools-83-270.el5_11.x86_64.rpm     MD5: 5581ca73f13bb9f09125c714c78b1ddcSHA-256: 5201ad6df83adcd9c9888b4b9f9ccdf0c01392703f00a97f5e755a1e0b6b4b78   (The unlinked packages above are only available from the Red Hat Network) 1144878 - CVE-2014-3611 kernel: kvm: PIT timer race condition1144883 - CVE-2014-3610 kernel: kvm: noncanonical MSR writes These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2015:0887-1: Satellite 5.7 bug fix update

Updated spacewalk-backend, spacewalk-java, spacewalk-web, and satellite-schemapackages that fix several bugs are now available for Red Hat Satellite 5.7. Red Hat Satellite is a systems management tool for Linux-based infrastructures.It allows for provisioning, remote management and monitoring of multiple Linuxdeployments with a single, centralized tool.This update fixes the following bugs:* Satellite has been updated to fix a Red Hat Proxy 5.7 bug related to operatingmultiple Proxies behind a load-balancer. (BZ#1206708) * Previously, a race condition occasionally occurred in Satellite, which causedservers with the Automatic Errata Updates feature enabled not to have theirupdate actions scheduled. The race condition has been fixed to ensure thatupdates are scheduled as expected. (BZ#1205306)* Satellite did not accept the user notification email preferences and alwayssent email if the repo-sync procedure failed. This bug has been fixed andSatellite now sends notifications according to the user preferences.(BZ#1128989)* Previously, subscribing multiple systems to a subscription channel from the"Target Systems" tab was very slow and could lead to connection timeouts. Thisupdate schedules the recalculation of which errata are applicable to theaffected servers to happen asynchronously after subscription, which greatlyspeeds up the subscription process. (BZ#1175939)* When applying a heterogeneous set of errata to a heterogeneous set of systems,for example Red Hat Enterprise Linux 5 and 6 errata to Red Hat Enterprise Linux5 and 6 systems, actions were scheduled for all errata on every system, evenwhen the base operating system did not match. This update ensures that Satelliteonly schedules actions for errata that apply to a given system. (BZ#1188954)* In case Satellite synchronized incorrect data from the Red Hat Network Hosted,the subsequent synchronizations of that channel failed with the followingmessage:duplicate key value violates unique constraint "rhn_package_file_pid_cid_uq"Satellite now correctly handles incorrect data to ensure successfulsynchronization or the channels. (BZ#989202)* The web UI has been modified to function correctly in Internet Explorercompatibility mode. (BZ#1196329)* Previously, using the System Set Manager to apply many errata to a largenumber of systems took a very long time. This update provides code changes thatspeed up the process. (BZ#1200162)* This update enables Satellite to respond properly to If-Modified-Sincerequests from the Proxy server. Proxy can now be configured to download updatedyum repodata from Satellite only when it is necessary, which reduces therequired bandwidth between Proxy and Satellite. This feature requires manualconfiguration, see https://access.redhat.com/articles/1396643 for instructions.(BZ#1203406)* The spacewalk-debug tool did not include logs from the new Postgresql 9.2location. This update ensures that spacewalk-debug includes the Postgresql logsfrom all possible locations. (BZ#1197765)Users of Red Hat Satellite are advised to upgrade to these updated packages,which fix these bugs. Application of this errata involves updating the database schema.For general instructions on the database schema upgrade, consult the followingdocument first: https://access.redhat.com/site/articles/273633Before applying this update, make sure all previously-released errata relevantto your system have been applied. To apply this erratum, take the followingsteps:* Shut down Red Hat Satellite by running the following command as root:rhn-satellite stop* Backup the database. For embedded or managed database variants, please consultRed Hat Satellite 5.6 documentation. For an external database, consult yourdatabase administrator.* Upgrade the errata packages available via Red Hat Network. Details on how touse Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258* Update the database schema using the spacewalk-schema-upgrade command. To doso, run as root:spacewalk-schema-upgradeThis process will update your database schema to the latest version. Thespacewalk-schema-upgrade command will inform you about the results of theupgrade and exact locations of schema upgrade log files.* Restart Red Hat Satellite by running the following as root:rhn-satellite startRed Hat Satellite (v. 5.7 for RHEL 6) SRPMS: satellite-schema-5.7.0.14-1.el6sat.src.rpm     MD5: f5f9d0a53c475705abcbf500df602cccSHA-256: 7cf39802f144ca943b544136b22beadc91f9fc795ef82076cf0926b0b3d4623d spacewalk-backend-2.3.3-25.el6sat.src.rpm     MD5: f138af09fa4444dad73834fa551c71acSHA-256: a346e9ca7eac7d5996422f7233183c707f15bd34752983a12b89bfa6a159ff4a spacewalk-java-2.3.8-102.el6sat.src.rpm     MD5: 8c2866adaf1da7f952a48bde7164a070SHA-256: 31b34ffd2fdd1a155b828bdba23f2d7fd15b708f25e89a29c04f9553d8f56c0a spacewalk-web-2.3.2-32.el6sat.src.rpm     MD5: bcd01f7a454b6f12f1bc6c34175592d1SHA-256: 5fb28b576564f3fee9bc6fb54b30947c70d9cb33771679751bef8d371c4c59a4   s390x: satellite-schema-5.7.0.14-1.el6sat.noarch.rpm     MD5: 71e43d41dd1e5dc42ae8952566375a12SHA-256: 93940400f3cac1b629ea2d3186ca55b4ed645322c4a3d553b1702d08e98f81b6 spacewalk-backend-2.3.3-25.el6sat.noarch.rpm     MD5: 76ef25e7cf5f517dca9628970ba435a0SHA-256: ad85c75d19d1f6b2215a7f66464bd23bc61782884af81d5c4f012e6250778045 spacewalk-backend-app-2.3.3-25.el6sat.noarch.rpm     MD5: 364c129858df906c185167b057bccd68SHA-256: 85df23eb86906df5221a232d66ef81db391513e811236039c423345ed54bc289 spacewalk-backend-applet-2.3.3-25.el6sat.noarch.rpm     MD5: 7efe529d0c9de421bf423fe2519c6384SHA-256: feeef68b735f4dc750397d646bbabba18f34dbd6ffce28710d34e3aff96601fb spacewalk-backend-config-files-2.3.3-25.el6sat.noarch.rpm     MD5: e94e89fbd1b9a652eeccafe4edc96b44SHA-256: a209bf1afefac4694c6913bace16bb377d64b98c5657a7e8202aaa8a194b53a4 spacewalk-backend-config-files-common-2.3.3-25.el6sat.noarch.rpm     MD5: 8b90b54f67d5c941e41df58994c438d6SHA-256: cf330ae9ef7b5969dc25b1233787c0c51fe9ede78ec81f55358d1289cb71f11c spacewalk-backend-config-files-tool-2.3.3-25.el6sat.noarch.rpm     MD5: 284d68f9c456ae7f6de6381b949ca385SHA-256: 9076c2ed703b6fa5b28b42717059e860ecd4a802fbdef21249641cc5666cb3c1 spacewalk-backend-iss-2.3.3-25.el6sat.noarch.rpm     MD5: c7713726754f4d9bbc96c3049669cb09SHA-256: 10316f43840430ea75a70dd6421b3786fade7001bdf20e621ee4363cfb540876 spacewalk-backend-iss-export-2.3.3-25.el6sat.noarch.rpm     MD5: cd3d0628890c3c534660dea060ed832fSHA-256: 488487dd3e3480aee087fb0305158a0a2492107935783935984d28cbb6883cef spacewalk-backend-libs-2.3.3-25.el6sat.noarch.rpm     MD5: e4901b138268e14d6c904b0adab9a45aSHA-256: 1b3564160de270451306194791f8770d137677b1730a1f64f419d8cd7b545495 spacewalk-backend-package-push-server-2.3.3-25.el6sat.noarch.rpm     MD5: 9b971fdc65083237068e7360eec6fa21SHA-256: dc3089c03ba1f70b5be090fa26bb8d972537d3fd223fe88ecb626625d559933d spacewalk-backend-server-2.3.3-25.el6sat.noarch.rpm     MD5: 03d661e0b016dbacd56fb5d3589664ddSHA-256: f774248369008b30d8b10eda16bef315293ec9a1c7136e7abf899359a726b4b4 spacewalk-backend-sql-2.3.3-25.el6sat.noarch.rpm     MD5: 9de498b40a27c0b6f6ae682384dcdf30SHA-256: 7fb68cfa43c454180c8ace09757fd1a693cc4285e19e9675f9d1a8c151829dfe spacewalk-backend-sql-oracle-2.3.3-25.el6sat.noarch.rpm     MD5: 5c2cad51322c3e66e662a8cbaf7360a8SHA-256: 01e2679da448eea2ca5d4c8cfb6aa374e7f4ad9e05657b2382db6fa721b2d3e5 spacewalk-backend-sql-postgresql-2.3.3-25.el6sat.noarch.rpm     MD5: f95f15c4e24c9dc42fd973cf49468bd1SHA-256: c7050854d5f5c8eec967f98b2c58a78283a2420d626d91c294bbb9f91288bbbe spacewalk-backend-tools-2.3.3-25.el6sat.noarch.rpm     MD5: dd9d23e3243b398b64564282d3b372daSHA-256: fcee9f4876a4903e809d2aefc4a9fe0076d882e3fb419ad87c025629d99f5d33 spacewalk-backend-xml-export-libs-2.3.3-25.el6sat.noarch.rpm     MD5: 78c4761ea1b2c228d5cef371751adafcSHA-256: dac09589c219e57cedcffd84d7951bb781181589e2ac6312e52b391d7844697a spacewalk-backend-xmlrpc-2.3.3-25.el6sat.noarch.rpm     MD5: ee275593b6ea4f7d8a2b7ef8a22d8d11SHA-256: 447d91e59be26f8fa53de981991bb24523038bb94f74f72667520c14b4327338 spacewalk-base-2.3.2-32.el6sat.noarch.rpm     MD5: cdff9bee1a7376679b80a513b10ff15cSHA-256: 63438e42484e41c50b5d042b6b4c5359e04f1778bb95858b3db22229847f3c95 spacewalk-base-minimal-2.3.2-32.el6sat.noarch.rpm     MD5: 3e240923b758067c5b5e06ffbfd695dfSHA-256: b615ea224419fe58756611b53f29e6a8102e0333094e3fb97c8ac95bb480db13 spacewalk-base-minimal-config-2.3.2-32.el6sat.noarch.rpm     MD5: 9d9058fdf92942ef016fbc820a86ce1fSHA-256: f162e2f9734c97269e909d26edb3809af95eafaac6f1e0207a64ff6be1b9fb56 spacewalk-dobby-2.3.2-32.el6sat.noarch.rpm     MD5: 24cea3a8bfc492d46b32713e3ab3689fSHA-256: a9913ac63cff3e53e5f6f6b52737aa2bc3966347685552ae3952261535879087 spacewalk-grail-2.3.2-32.el6sat.noarch.rpm     MD5: 3f45e6e38ca4e1d72b4b4a6d73ad3989SHA-256: ab9b0c635f269a9f3674b97c328f4afebb27c4c173945777fe8e83f307ec0c73 spacewalk-html-2.3.2-32.el6sat.noarch.rpm     MD5: 346c84c61ba44ac421d6f94fa603dc87SHA-256: 23aed2f93b39903a61d38aba559d57666e3f3e7112de8abd2a13c7fbba7a6874 spacewalk-java-2.3.8-102.el6sat.noarch.rpm     MD5: b1baf32adc09a329c506bada07a03b06SHA-256: 8f45a7846164a84950be4f29b84a996c5d5cc774086d347c9497979c4333f485 spacewalk-java-config-2.3.8-102.el6sat.noarch.rpm     MD5: 05f903f1efc8cd076037728ba4df6fffSHA-256: 732c20f137ca50771d69b06698952cc5742abf3e360ce007564ece67fc36cc5b spacewalk-java-lib-2.3.8-102.el6sat.noarch.rpm     MD5: f4eb21db1612ecc214db34a082a3e5f5SHA-256: 3afb5c00dfe7160b283f091bf3bd98142d4f2a653af3fe220c1586dde5b446a2 spacewalk-java-oracle-2.3.8-102.el6sat.noarch.rpm     MD5: 115dea7a5299fecdb8941088e92212dcSHA-256: 3bcd103832cd690427b66d0d5a7db5db8ebbc84669ff9e299ae0f546ea0926da spacewalk-java-postgresql-2.3.8-102.el6sat.noarch.rpm     MD5: 24f6002295d2853340dc4973171ebb5cSHA-256: dfacefd756a6c268a8c64549c9bc2154172eb762e70d60c6bd6c138f685c4546 spacewalk-pxt-2.3.2-32.el6sat.noarch.rpm     MD5: 0d7282b30836e78c5f9ca80db6bd2a90SHA-256: f2127ae2352c6c5d6417eb36feadde20fef77ce27d746359d1868c462a1d1168 spacewalk-sniglets-2.3.2-32.el6sat.noarch.rpm     MD5: cad6904373b1481418f215eea2ad36b7SHA-256: 9dfa11dbe49119f004bc018be6da0fbd19e8df8f3d624d75604205eca06a1506 spacewalk-taskomatic-2.3.8-102.el6sat.noarch.rpm     MD5: 542168b53c5416b5c54033e002d5f252SHA-256: 693df651e6a16ec978e06b81e323e21206628ae69d2f58790057dd530e563b95   x86_64: satellite-schema-5.7.0.14-1.el6sat.noarch.rpm     MD5: 71e43d41dd1e5dc42ae8952566375a12SHA-256: 93940400f3cac1b629ea2d3186ca55b4ed645322c4a3d553b1702d08e98f81b6 spacewalk-backend-2.3.3-25.el6sat.noarch.rpm     MD5: 76ef25e7cf5f517dca9628970ba435a0SHA-256: ad85c75d19d1f6b2215a7f66464bd23bc61782884af81d5c4f012e6250778045 spacewalk-backend-app-2.3.3-25.el6sat.noarch.rpm     MD5: 364c129858df906c185167b057bccd68SHA-256: 85df23eb86906df5221a232d66ef81db391513e811236039c423345ed54bc289 spacewalk-backend-applet-2.3.3-25.el6sat.noarch.rpm     MD5: 7efe529d0c9de421bf423fe2519c6384SHA-256: feeef68b735f4dc750397d646bbabba18f34dbd6ffce28710d34e3aff96601fb spacewalk-backend-config-files-2.3.3-25.el6sat.noarch.rpm     MD5: e94e89fbd1b9a652eeccafe4edc96b44SHA-256: a209bf1afefac4694c6913bace16bb377d64b98c5657a7e8202aaa8a194b53a4 spacewalk-backend-config-files-common-2.3.3-25.el6sat.noarch.rpm     MD5: 8b90b54f67d5c941e41df58994c438d6SHA-256: cf330ae9ef7b5969dc25b1233787c0c51fe9ede78ec81f55358d1289cb71f11c spacewalk-backend-config-files-tool-2.3.3-25.el6sat.noarch.rpm     MD5: 284d68f9c456ae7f6de6381b949ca385SHA-256: 9076c2ed703b6fa5b28b42717059e860ecd4a802fbdef21249641cc5666cb3c1 spacewalk-backend-iss-2.3.3-25.el6sat.noarch.rpm     MD5: c7713726754f4d9bbc96c3049669cb09SHA-256: 10316f43840430ea75a70dd6421b3786fade7001bdf20e621ee4363cfb540876 spacewalk-backend-iss-export-2.3.3-25.el6sat.noarch.rpm     MD5: cd3d0628890c3c534660dea060ed832fSHA-256: 488487dd3e3480aee087fb0305158a0a2492107935783935984d28cbb6883cef spacewalk-backend-libs-2.3.3-25.el6sat.noarch.rpm     MD5: e4901b138268e14d6c904b0adab9a45aSHA-256: 1b3564160de270451306194791f8770d137677b1730a1f64f419d8cd7b545495 spacewalk-backend-package-push-server-2.3.3-25.el6sat.noarch.rpm     MD5: 9b971fdc65083237068e7360eec6fa21SHA-256: dc3089c03ba1f70b5be090fa26bb8d972537d3fd223fe88ecb626625d559933d spacewalk-backend-server-2.3.3-25.el6sat.noarch.rpm     MD5: 03d661e0b016dbacd56fb5d3589664ddSHA-256: f774248369008b30d8b10eda16bef315293ec9a1c7136e7abf899359a726b4b4 spacewalk-backend-sql-2.3.3-25.el6sat.noarch.rpm     MD5: 9de498b40a27c0b6f6ae682384dcdf30SHA-256: 7fb68cfa43c454180c8ace09757fd1a693cc4285e19e9675f9d1a8c151829dfe spacewalk-backend-sql-oracle-2.3.3-25.el6sat.noarch.rpm     MD5: 5c2cad51322c3e66e662a8cbaf7360a8SHA-256: 01e2679da448eea2ca5d4c8cfb6aa374e7f4ad9e05657b2382db6fa721b2d3e5 spacewalk-backend-sql-postgresql-2.3.3-25.el6sat.noarch.rpm     MD5: f95f15c4e24c9dc42fd973cf49468bd1SHA-256: c7050854d5f5c8eec967f98b2c58a78283a2420d626d91c294bbb9f91288bbbe spacewalk-backend-tools-2.3.3-25.el6sat.noarch.rpm     MD5: dd9d23e3243b398b64564282d3b372daSHA-256: fcee9f4876a4903e809d2aefc4a9fe0076d882e3fb419ad87c025629d99f5d33 spacewalk-backend-xml-export-libs-2.3.3-25.el6sat.noarch.rpm     MD5: 78c4761ea1b2c228d5cef371751adafcSHA-256: dac09589c219e57cedcffd84d7951bb781181589e2ac6312e52b391d7844697a spacewalk-backend-xmlrpc-2.3.3-25.el6sat.noarch.rpm     MD5: ee275593b6ea4f7d8a2b7ef8a22d8d11SHA-256: 447d91e59be26f8fa53de981991bb24523038bb94f74f72667520c14b4327338 spacewalk-base-2.3.2-32.el6sat.noarch.rpm     MD5: cdff9bee1a7376679b80a513b10ff15cSHA-256: 63438e42484e41c50b5d042b6b4c5359e04f1778bb95858b3db22229847f3c95 spacewalk-base-minimal-2.3.2-32.el6sat.noarch.rpm     MD5: 3e240923b758067c5b5e06ffbfd695dfSHA-256: b615ea224419fe58756611b53f29e6a8102e0333094e3fb97c8ac95bb480db13 spacewalk-base-minimal-config-2.3.2-32.el6sat.noarch.rpm     MD5: 9d9058fdf92942ef016fbc820a86ce1fSHA-256: f162e2f9734c97269e909d26edb3809af95eafaac6f1e0207a64ff6be1b9fb56 spacewalk-dobby-2.3.2-32.el6sat.noarch.rpm     MD5: 24cea3a8bfc492d46b32713e3ab3689fSHA-256: a9913ac63cff3e53e5f6f6b52737aa2bc3966347685552ae3952261535879087 spacewalk-grail-2.3.2-32.el6sat.noarch.rpm     MD5: 3f45e6e38ca4e1d72b4b4a6d73ad3989SHA-256: ab9b0c635f269a9f3674b97c328f4afebb27c4c173945777fe8e83f307ec0c73 spacewalk-html-2.3.2-32.el6sat.noarch.rpm     MD5: 346c84c61ba44ac421d6f94fa603dc87SHA-256: 23aed2f93b39903a61d38aba559d57666e3f3e7112de8abd2a13c7fbba7a6874 spacewalk-java-2.3.8-102.el6sat.noarch.rpm     MD5: b1baf32adc09a329c506bada07a03b06SHA-256: 8f45a7846164a84950be4f29b84a996c5d5cc774086d347c9497979c4333f485 spacewalk-java-config-2.3.8-102.el6sat.noarch.rpm     MD5: 05f903f1efc8cd076037728ba4df6fffSHA-256: 732c20f137ca50771d69b06698952cc5742abf3e360ce007564ece67fc36cc5b spacewalk-java-lib-2.3.8-102.el6sat.noarch.rpm     MD5: f4eb21db1612ecc214db34a082a3e5f5SHA-256: 3afb5c00dfe7160b283f091bf3bd98142d4f2a653af3fe220c1586dde5b446a2 spacewalk-java-oracle-2.3.8-102.el6sat.noarch.rpm     MD5: 115dea7a5299fecdb8941088e92212dcSHA-256: 3bcd103832cd690427b66d0d5a7db5db8ebbc84669ff9e299ae0f546ea0926da spacewalk-java-postgresql-2.3.8-102.el6sat.noarch.rpm     MD5: 24f6002295d2853340dc4973171ebb5cSHA-256: dfacefd756a6c268a8c64549c9bc2154172eb762e70d60c6bd6c138f685c4546 spacewalk-pxt-2.3.2-32.el6sat.noarch.rpm     MD5: 0d7282b30836e78c5f9ca80db6bd2a90SHA-256: f2127ae2352c6c5d6417eb36feadde20fef77ce27d746359d1868c462a1d1168 spacewalk-sniglets-2.3.2-32.el6sat.noarch.rpm     MD5: cad6904373b1481418f215eea2ad36b7SHA-256: 9dfa11dbe49119f004bc018be6da0fbd19e8df8f3d624d75604205eca06a1506 spacewalk-taskomatic-2.3.8-102.el6sat.noarch.rpm     MD5: 542168b53c5416b5c54033e002d5f252SHA-256: 693df651e6a16ec978e06b81e323e21206628ae69d2f58790057dd530e563b95   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:0192-1: Red Hat Gluster Storage 3.1 update 2

Red Hat Gluster Storage 3.1 Update 2, which fixes several bugs,and adds various enhancements, is now available for Red HatEnterprise Linux 7. Red Hat Gluster Storage is a software only scale-out storage solution thatprovides flexible and affordable unstructured data storage.
It unifies datastorage and infrastructure, increases performance, and improvesavailability and manageability to meet enterprise-level storage challenges.This update also fixes numerous bugs and adds various enhancements.
Spaceprecludes documenting all of these changes in this advisory. Users aredirected to the Red Hat Gluster Storage 3.1 Technical Notes, linked to inthe References section, for information on the most significant of thesechanges.This advisory introduces the following new features and enhancements:* TieringRed Hat Gluster Storage now provides the ability to automatically classify andmigrate files based on how frequently those files are accessed.

This allowsfrequently accessed files to be migrated to higher performing disks (the hottier), and rarely accessed files to be stored on disks with lower performance(the cold tier).

This enables faster response times, reduced latency, greaterstorage efficiency, and reduced deployment and operating costs.

For moreinformation about tiering, see the Red Hat Gluster Storage 3.1 AdministrationGuide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/* Writable SnapshotsRed Hat Gluster Storage snapshots can now be cloned and made writable bycreating a new volume based on an existing snapshot.

Clones are space efficient,as the cloned volume and original snapshot share the same logical volume backend, only consuming additional space as the clone diverges from the snapshot.For more information, see the Red Hat Gluster Storage 3.1 Administration Guide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/.* RESTful Volume Management with Heketi [Technology Preview]Heketi provides a RESTful management interface for managing Red Hat GlusterStorage volume lifecycles.

This interface allows cloud services like OpenStackManila, Kubernetes, and OpenShift to dynamically provision Red Hat GlusterStorage volumes.

For details about this technology preview, see the Red HatGluster Storage 3.1 Administration Guide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/*Red Hat Gluster Storage for ContainersWith the Red Hat Gluster Storage 3.1 update 2 release a Red Hat Gluster Storageenvironment can be set up in a container.

Containers use shared operatingsystems and are much more efficient than hypervisors in system resource terms.Containers rest on top of a single Linux instance and allows applications to usethe same Linux kernel as the system that they're running on.

This improves theoverall efficiency and reduces the space consumption considerably.

For moreinformation, see the Red Hat Gluster Storage 3.1 Administration Guide:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/.* BitRot scrubber statusThe BitRot scrubber command (gluster volume bitrot VOLNAME scrub status) can nowdisplay scrub progress and list identified corrupted files, allowingadministrators to locate and repair corrupted files more easily.
See the Red HatGluster Storage 3.1 Administration Guide for details:https://access.redhat.com/documentation/en-US/Red_Hat_Storage/3.1/html/Administration_Guide/.* Samba Asynchronous I/OWith this release, asynchronous I/O from Samba to Red Hat Gluster Storage issupported.

The aio read size option is now enabled and set to 4096 by default.This increases the throughput when the client is multithreaded or there aremultiple programs accessing the same share.
If you have Linux clients using SMB2.0 or higher, Red Hat recommends disabling asynchronous I/O (setting aio readsize to 0).All users of Red Hat Gluster Storage are advised to apply this update. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Gluster Storage Server 3.1 on RHEL-7 SRPMS: gluster-nagios-common-0.2.3-1.el7rhgs.src.rpm     MD5: 2af397711ae094a6a50ff61083c597fcSHA-256: e84dcfed532ecbd2adadfe24d03438981d8c094641437a934fd610cddd8e05f9 glusterfs-3.7.5-19.el7rhgs.src.rpm     MD5: 5c8b1d819673aeb73d8d089047f11988SHA-256: 62f114e134d8d5bf6db2264bbfbcb3d7a0929f30d86d1e179a4b49e93bf0081a heketi-1.0.2-1.el7rhgs.src.rpm     MD5: 5a27592f83d6d90f58dd830c67e716d5SHA-256: da0029f6f59ec84b896c2dde111d2636233441df88fcca2bfb6eed2c3cb5452c nagios-server-addons-0.2.3-1.el7rhgs.src.rpm     MD5: fed2e385569e73d5200b488a9e4635a6SHA-256: c9908d0d14ab6a5598f338d7517a0b511b3e1323b5799b45a3d3a33283af7820 nfs-ganesha-2.2.0-12.el7rhgs.src.rpm     MD5: 22be0e110cff4c49bf3ead45964afc18SHA-256: 9a23d3cb27e257e2160ae62be55e1f471aa6b069aee484ecdbb71a95c4d696ba nrpe-2.15-4.2.el7rhgs.src.rpm     MD5: 8ac2c39922ae49543c4cc99c841e40ccSHA-256: f801f1c1e7f6205fab415d6976e82354d55e7d785eb220b5233c60f25c04f52e redhat-release-server-7.2-9.el7rhgs.src.rpm     MD5: 62d93d1321764f0f41fdf7cf2ea57095SHA-256: dce9d0213df46d443c0ce1d09957b6fa98a944f9c7abff46ae648ff5be04996c redhat-storage-server-3.1.2.0-1.el7rhgs.src.rpm     MD5: 32cb32d7111c394cd07bcaa1dd910c3fSHA-256: 4b8b3315f4c7af7e2465c0d5d55bda6d3dcd0c6c50e5fc325d80e68340f25cce vdsm-4.16.30-1.3.el7rhgs.src.rpm     MD5: 5cdef303e81558031332d68176a77ff5SHA-256: d62d80aa90aae5c89af96d7a4007c07a51e458aca4b7bd99267bdbadd135da30   x86_64: gluster-nagios-common-0.2.3-1.el7rhgs.noarch.rpm     MD5: 9a1b539740f3e480302ef141fb72196bSHA-256: 701bcfe6bd063c27c1db9c76643ed30a6e8d9e9158bdda047df3bddb031d3c34 glusterfs-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 95adf60a94c65c37655f2d99063e40b2SHA-256: 2b79de58d220b220fb77d9ceaf2f95af815ec7beb8081d1f8a999246860800de glusterfs-api-3.7.5-19.el7rhgs.x86_64.rpm     MD5: f00d902b6791225ed93e046065055376SHA-256: fa93429a39d43b843954f90fdf928ce3fc219b309e435a93cc8103e96b152e82 glusterfs-api-devel-3.7.5-19.el7rhgs.x86_64.rpm     MD5: a4143e3e787472d000a01b4ba443643cSHA-256: 1533801f31f586c26fe237b18bd52de48e178aa4cee729b1348870ead97c38f3 glusterfs-cli-3.7.5-19.el7rhgs.x86_64.rpm     MD5: bf203066fccef2cf7cf541fa0fc2ee4fSHA-256: 8e4b1c5af1526f9694fc7650ade665f15676788e2d92449f9d4be04e85bc9745 glusterfs-client-xlators-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 1c91ecfd359ae8dbfdc9779f260bf0f1SHA-256: 4e3c976f5d2a50aaeb0a5a88c7be70c33475f0621a096bf2fc2aaf390c9f1569 glusterfs-devel-3.7.5-19.el7rhgs.x86_64.rpm     MD5: d03a613fa4197e27f529dd853a00068bSHA-256: 7f1e3f36760804604eeb017df0d5f15200c92096cbc886b6f1c6303c9298ceb9 glusterfs-fuse-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 566d78403fcaebde13d1b56b7aaab0f5SHA-256: b6500ff40d06ae81b8f3876d8ef6f193acb7f5a8c30b22eb94d8f705d5e13ccd glusterfs-ganesha-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 8193570b5ea69cfa2207407e5bdb4e4fSHA-256: ca18588236b66cf04d3f77119296e1a22ecadea58ad2808677782a544cdf0ab6 glusterfs-geo-replication-3.7.5-19.el7rhgs.x86_64.rpm     MD5: a28b9210d76916202451ee0da2499dc3SHA-256: a3c2b9e83e46352bdb9c14ca4360ff9172cc9b2f5d2a0aaa57183040628f344d glusterfs-libs-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 11cdb7dd16d8c31d343133525e2a52ebSHA-256: 377d18698f3d81f11a25628bec41ddfeca531f5faf34c69f4aef473a8eaba85e glusterfs-rdma-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 696429babd83256df5e015f8c95af544SHA-256: 7f302e6f4c3f9cb145f42817b75c46a9bc23742aae5902a38015b9f270d9649d glusterfs-server-3.7.5-19.el7rhgs.x86_64.rpm     MD5: 2fd36425ce59b87a871e3dfd65a29145SHA-256: 131c1801f08658e3aa6dc3024b3a161755a878ad942ca754439c8cda01be4a37 heketi-1.0.2-1.el7rhgs.x86_64.rpm     MD5: 7e683b3ab47e1a4a4aa8eea09e681e5eSHA-256: 50feb507f111d1a226188511f6aac53eaed2fb8fc96c02737f149ae95d15675c heketi-devel-1.0.2-1.el7rhgs.noarch.rpm     MD5: b834d8a67d3663b3f596fc9437b1c9adSHA-256: 7314eceb61b9274826f6b8caaa2128a5d2dff2f1658084b6ea53e4c64e507018 heketi-unit-test-devel-1.0.2-1.el7rhgs.x86_64.rpm     MD5: 85d9b725aa19f81243c95248cbf8266fSHA-256: e1645e14626ca46aaed373d4688f9ec81f906f9ed61da53b6f04d738808e5f97 nagios-plugins-nrpe-2.15-4.2.el7rhgs.x86_64.rpm     MD5: b1e6cf8eed83c6503678f11382dff469SHA-256: fc479979498440d2acdadbe6a96398f610a9b44bc9ae456014af2a1aaea9004d nagios-server-addons-0.2.3-1.el7rhgs.x86_64.rpm     MD5: 8609ecb4a169bd1fbd15fa7661a21a23SHA-256: 0ccba191aece3206edcd7c065274d8ea2ebb4e2094915cf029fc3efc19643486 nfs-ganesha-2.2.0-12.el7rhgs.x86_64.rpm     MD5: 1919a3ec1829a381d797f1a7239c8265SHA-256: 9438e4125792ed90fb7f8e45e28ac167c31d5d6176f63d43ab9124fd38ceb67b nfs-ganesha-gluster-2.2.0-12.el7rhgs.x86_64.rpm     MD5: dbf2ea5af028afe7efbaa7736d009b2dSHA-256: a0d5560e7eb2aa87c11e4df9e3171f12586b7aea2042175662e942a94ab7b8e5 nrpe-2.15-4.2.el7rhgs.x86_64.rpm     MD5: 9f1adff7c0a03a28a3cff48fdc7fe22eSHA-256: b620a655cfa6a37b5f054773c9f06d194f7643cc59bc7c765cc31759674f821c python-gluster-3.7.5-19.el7rhgs.noarch.rpm     MD5: 3a5e461a0dc8ecabbcecb54f25e5400cSHA-256: 24062e98300db0bc2a1fa0dc8b735c3adc8c8ffba345c2465fc2362b4bb8d382 redhat-release-server-7.2-9.el7rhgs.x86_64.rpm     MD5: 804c7be917be297de71fc6121236455aSHA-256: 23ce68572e2a9f361d8aba78cbd7f6d1f82391ed9c7407f6e7296f51a3178f37 redhat-storage-server-3.1.2.0-1.el7rhgs.noarch.rpm     MD5: ba73f1f215a094cb0146dadec9f55c97SHA-256: 4063631a1956d1f1018b06e244d36afc47455e32b95fb5629770b2a7fedb541f vdsm-4.16.30-1.3.el7rhgs.x86_64.rpm     MD5: 2dd585da0780c7fd7a359a6b67b5da21SHA-256: 88119958112348ce6138d99eafb5540ceb93cd3806ff719d824c921cc50de3ff vdsm-cli-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 8bed4769739b8569e2f93b8f46472da3SHA-256: 6b23362fccae8b9ae638d9659167dbdff1f9d45798dee1877fce09f6b0541e31 vdsm-debug-plugin-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: c44021833ef08dae39a9c514fe93cd13SHA-256: f4b58d483d85d929bcbd66a754f58058fe84b25fbe1a4d4d46eaabc06860a568 vdsm-gluster-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 209fc484eb34e33b164a4bd4986a28cdSHA-256: 9faa77e54e452b7a80fdd23b08c09ed74ec175fad3fae8412928d8c47c2dbec8 vdsm-hook-ethtool-options-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 336d00eb982a105ced2c6104e60ce3c3SHA-256: ecc3db31957466725a2598b38829b27fc86101a1297a7d3b73e0b7f84b7c76f5 vdsm-hook-faqemu-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: b41f038cfe91b9546f4f975f234f8551SHA-256: c910b46a071d3ac81b9900e69ad1e6883249e5aad1016c0417fe7c4a6b128a8d vdsm-hook-openstacknet-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: f54375672928b0e4ce6a9aded7c6cc23SHA-256: ab5318888f94a19cb72a3b1811389cfeb68bae90ac620eaf0f142a42b18e815f vdsm-hook-qemucmdline-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: aa8660d06be7ccb76fd2567f1f5c1ee9SHA-256: 086ea4551418651c2ee5fc82b781a60f3e9a11cd199269f1f5ea005f496e3597 vdsm-jsonrpc-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 3969871426a6e3c86860e73139fe34f9SHA-256: 9988fcd1278550f7ce333a09f8256557a553f9a08bee51e8b3bb2d9776388bc2 vdsm-python-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 617960341204628002e15dc96aa4dde7SHA-256: 742596521004d285f8c86a1b4c41aad7117057e27b9990fa76e2df5bc4626fba vdsm-python-zombiereaper-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 4356a52dd698e2b137ee39ffea5ecdaeSHA-256: 0b5c1ff2a1cc5600c6f4ca5c8a47d66a5d315cc68eb6f56c64994bd8b0a9640f vdsm-reg-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 029ee41d68160a3b5c0ccb60575325d0SHA-256: b538fdb7900b9227f167b7ce0473ea6682722eed6fad14857b66a9a55f4e282b vdsm-tests-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 19580d462450e784a16633055731f848SHA-256: 09599a359a44f4bf14e18bed5eefd0c910559356f4d0cfb4e0e212829fce2cb0 vdsm-xmlrpc-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 5c5343bb15f2408f25e91e0a74772829SHA-256: c786cabec5d2dccd125e20bfa62cd210a7dadd472965fb3798fc8e305c5f8f66 vdsm-yajsonrpc-4.16.30-1.3.el7rhgs.noarch.rpm     MD5: 34d5faa4315369b2acbae60497e79fb7SHA-256: b4ccb730ff937d0d82baa83b096adad1dd90f925848d4c0da257707e0c8d1fba   (The unlinked packages above are only available from the Red Hat Network) 1262627 - RHEL7/systemd : can't have server in debug mode anymore1266824 - ntpd service does not start automatically on RHEL71292751 - (RHEL7) hook script for CTDB should not change Samba config1292762 - (RHEL7) S30Samba scripts do not work on systemd systems These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:1809-1: Important: thunderbird security update

An update for thunderbird is now available for Red Hat Enterprise Linux 5, RedHat Enterprise Linux 6, and Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Mozilla Thunderbird is a standalone mail and newsgroup client.This update upgrades Thunderbird to version 45.3.0.Security Fix(es):* Multiple flaws were found in the processing of malformed web content.

A webpage containing malicious content could cause Thunderbird to crash or,potentially, execute arbitrary code with the privileges of the user runningThunderbird. (CVE-2016-2836)Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Carsten Book, Christian Holler, Gary Kwong, JesseRuderman, Andrew McCreight, Phil Ringnalda, and Philipp as the originalreporters. For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258All running instances of Thunderbird must be restarted for the update to takeeffect.RHEL Optional Productivity Applications (v. 5 server) SRPMS: thunderbird-45.3.0-1.el5_11.src.rpm     MD5: cab485f1e4b19c470f57725ba9c11453SHA-256: 2b934187cf984b7ffe4d5354ee117dd385b516380b27c22d7b823ac7e7f540c8   IA-32: thunderbird-45.3.0-1.el5_11.i386.rpm     MD5: 923616e67c60cda581937e66f8add21aSHA-256: 7683d7901a6d2a7c7b650d9caffcba294d223619d52c84d7b34aafbb8e8d66f5 thunderbird-debuginfo-45.3.0-1.el5_11.i386.rpm     MD5: 53148e1564a738e557031cab7779b4f7SHA-256: 2723118e103a52c532f497305b0685afc7231073d901d62cbb3f5718830fbaf5   x86_64: thunderbird-45.3.0-1.el5_11.x86_64.rpm     MD5: 97eb608564fd5ce441ec1ca739215c92SHA-256: e2e942793b37e082f94ebee559ba0d162d73f4f361635fbb874334387e7772fd thunderbird-debuginfo-45.3.0-1.el5_11.x86_64.rpm     MD5: 5c9205bf349409ecbe5b75cf0e21ab2dSHA-256: b5330f8e6868651240f7d9565d9864d088e49dbb19a9040639a8aaf5bc401b33   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: thunderbird-45.3.0-1.el5_11.src.rpm     MD5: cab485f1e4b19c470f57725ba9c11453SHA-256: 2b934187cf984b7ffe4d5354ee117dd385b516380b27c22d7b823ac7e7f540c8   IA-32: thunderbird-45.3.0-1.el5_11.i386.rpm     MD5: 923616e67c60cda581937e66f8add21aSHA-256: 7683d7901a6d2a7c7b650d9caffcba294d223619d52c84d7b34aafbb8e8d66f5 thunderbird-debuginfo-45.3.0-1.el5_11.i386.rpm     MD5: 53148e1564a738e557031cab7779b4f7SHA-256: 2723118e103a52c532f497305b0685afc7231073d901d62cbb3f5718830fbaf5   x86_64: thunderbird-45.3.0-1.el5_11.x86_64.rpm     MD5: 97eb608564fd5ce441ec1ca739215c92SHA-256: e2e942793b37e082f94ebee559ba0d162d73f4f361635fbb874334387e7772fd thunderbird-debuginfo-45.3.0-1.el5_11.x86_64.rpm     MD5: 5c9205bf349409ecbe5b75cf0e21ab2dSHA-256: b5330f8e6868651240f7d9565d9864d088e49dbb19a9040639a8aaf5bc401b33   Red Hat Enterprise Linux Desktop (v. 6) SRPMS: thunderbird-45.3.0-1.el6_8.src.rpm     MD5: fa45706e416c4dac829a2d9de485003fSHA-256: fbac9c06ff946528b985f33bfc788d4d32653d2d2642ce77cea571f647968234   IA-32: thunderbird-45.3.0-1.el6_8.i686.rpm     MD5: ec629070c1313db1c3222df5cb043a3eSHA-256: 97cc93c6b940cf50ef6112e81b83926b091840972ccd09df567f923677175e1b thunderbird-debuginfo-45.3.0-1.el6_8.i686.rpm     MD5: 75de6165e27b727a7c39e1fcb34e3db9SHA-256: ad14faa09eaee7aa2dd5aaa030763e8687477d42bf6b68e3ac677f8ee1ae992a   x86_64: thunderbird-45.3.0-1.el6_8.x86_64.rpm     MD5: 9f849355b64915dd4d766c8155a8c839SHA-256: 7b1f15d054446f8d4d08977358a5c1fe19c9d359043537dfc93a61f744c652a8 thunderbird-debuginfo-45.3.0-1.el6_8.x86_64.rpm     MD5: 0b5b756b0d9934c9fc060d9ebee146deSHA-256: ac47d25c809c47b0b6b194347575dfc77b2001b559e978f4b4285a249c54335b   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: thunderbird-45.3.0-1.el7_2.src.rpm     MD5: 41a6beee0ee75cd6747b23eeb76e7dafSHA-256: a0efb1eb2d365379fc38989188d45b5518b310747518beafe91d22554dae8efc   x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm     MD5: f3ee6a5449472c80f9ce095d73aafb08SHA-256: 3a44781f7956a08b0e5e307c7bb4091573c93fbd8e1ae2b73031dabae7a37a9c thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm     MD5: 30804876d3a1e5ebd13b24f6358f1c0aSHA-256: d90120bac957096d4d3474489927151e06312ba13bd29f70db324ed33cc44797   Red Hat Enterprise Linux Server (v. 6) SRPMS: thunderbird-45.3.0-1.el6_8.src.rpm     MD5: fa45706e416c4dac829a2d9de485003fSHA-256: fbac9c06ff946528b985f33bfc788d4d32653d2d2642ce77cea571f647968234   IA-32: thunderbird-45.3.0-1.el6_8.i686.rpm     MD5: ec629070c1313db1c3222df5cb043a3eSHA-256: 97cc93c6b940cf50ef6112e81b83926b091840972ccd09df567f923677175e1b thunderbird-debuginfo-45.3.0-1.el6_8.i686.rpm     MD5: 75de6165e27b727a7c39e1fcb34e3db9SHA-256: ad14faa09eaee7aa2dd5aaa030763e8687477d42bf6b68e3ac677f8ee1ae992a   PPC: thunderbird-45.3.0-1.el6_8.ppc64.rpm     MD5: 8ae50071eb06f550dc978be1e2664262SHA-256: 385bed36467ba6b907caf549ee17605449198069412faf48c0c21df71fb3a024 thunderbird-debuginfo-45.3.0-1.el6_8.ppc64.rpm     MD5: f24007cfa9d6e8883a0930754334fd2bSHA-256: d7c07c9761848ec06277944b01becbe4095131de432ec5157c723b96b33738b7   s390x: thunderbird-45.3.0-1.el6_8.s390x.rpm     MD5: f71a6a6938c36d159916b8b43d29f0d4SHA-256: 388daf78e4d38fd8b16cff34bf920a4ac056060c1971c6a385c1059bbfa6cdc5 thunderbird-debuginfo-45.3.0-1.el6_8.s390x.rpm     MD5: a4e55f13169a592a22b6519fe398175bSHA-256: aef41e4e859f0ba74e981173dc333f08520ccad8e7adddb91d3a348fe31068f3   x86_64: thunderbird-45.3.0-1.el6_8.x86_64.rpm     MD5: 9f849355b64915dd4d766c8155a8c839SHA-256: 7b1f15d054446f8d4d08977358a5c1fe19c9d359043537dfc93a61f744c652a8 thunderbird-debuginfo-45.3.0-1.el6_8.x86_64.rpm     MD5: 0b5b756b0d9934c9fc060d9ebee146deSHA-256: ac47d25c809c47b0b6b194347575dfc77b2001b559e978f4b4285a249c54335b   Red Hat Enterprise Linux Server (v. 7) SRPMS: thunderbird-45.3.0-1.el7_2.src.rpm     MD5: 41a6beee0ee75cd6747b23eeb76e7dafSHA-256: a0efb1eb2d365379fc38989188d45b5518b310747518beafe91d22554dae8efc   PPC64LE: thunderbird-45.3.0-1.el7_2.ppc64le.rpm     MD5: a123b0f4114245bd0de3b86683706634SHA-256: 3a56bdeb4180f9a88680412d7ceb9bca07a606a63eee3b4514b9222acad2b072 thunderbird-debuginfo-45.3.0-1.el7_2.ppc64le.rpm     MD5: 3809c43302c1c425840c4a3b32de99b8SHA-256: 81d8f17b9574ac0e55c3c8db26cac5fc6675f31843e82d416c3ade8572bc2a1c   x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm     MD5: f3ee6a5449472c80f9ce095d73aafb08SHA-256: 3a44781f7956a08b0e5e307c7bb4091573c93fbd8e1ae2b73031dabae7a37a9c thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm     MD5: 30804876d3a1e5ebd13b24f6358f1c0aSHA-256: d90120bac957096d4d3474489927151e06312ba13bd29f70db324ed33cc44797   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: thunderbird-45.3.0-1.el7_2.src.rpm     MD5: 41a6beee0ee75cd6747b23eeb76e7dafSHA-256: a0efb1eb2d365379fc38989188d45b5518b310747518beafe91d22554dae8efc   x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm     MD5: f3ee6a5449472c80f9ce095d73aafb08SHA-256: 3a44781f7956a08b0e5e307c7bb4091573c93fbd8e1ae2b73031dabae7a37a9c thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm     MD5: 30804876d3a1e5ebd13b24f6358f1c0aSHA-256: d90120bac957096d4d3474489927151e06312ba13bd29f70db324ed33cc44797   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: thunderbird-45.3.0-1.el7_2.src.rpm     MD5: 41a6beee0ee75cd6747b23eeb76e7dafSHA-256: a0efb1eb2d365379fc38989188d45b5518b310747518beafe91d22554dae8efc   PPC64LE: thunderbird-45.3.0-1.el7_2.ppc64le.rpm     MD5: a123b0f4114245bd0de3b86683706634SHA-256: 3a56bdeb4180f9a88680412d7ceb9bca07a606a63eee3b4514b9222acad2b072 thunderbird-debuginfo-45.3.0-1.el7_2.ppc64le.rpm     MD5: 3809c43302c1c425840c4a3b32de99b8SHA-256: 81d8f17b9574ac0e55c3c8db26cac5fc6675f31843e82d416c3ade8572bc2a1c   x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm     MD5: f3ee6a5449472c80f9ce095d73aafb08SHA-256: 3a44781f7956a08b0e5e307c7bb4091573c93fbd8e1ae2b73031dabae7a37a9c thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm     MD5: 30804876d3a1e5ebd13b24f6358f1c0aSHA-256: d90120bac957096d4d3474489927151e06312ba13bd29f70db324ed33cc44797   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: thunderbird-45.3.0-1.el6_8.src.rpm     MD5: fa45706e416c4dac829a2d9de485003fSHA-256: fbac9c06ff946528b985f33bfc788d4d32653d2d2642ce77cea571f647968234   IA-32: thunderbird-45.3.0-1.el6_8.i686.rpm     MD5: ec629070c1313db1c3222df5cb043a3eSHA-256: 97cc93c6b940cf50ef6112e81b83926b091840972ccd09df567f923677175e1b thunderbird-debuginfo-45.3.0-1.el6_8.i686.rpm     MD5: 75de6165e27b727a7c39e1fcb34e3db9SHA-256: ad14faa09eaee7aa2dd5aaa030763e8687477d42bf6b68e3ac677f8ee1ae992a   x86_64: thunderbird-45.3.0-1.el6_8.x86_64.rpm     MD5: 9f849355b64915dd4d766c8155a8c839SHA-256: 7b1f15d054446f8d4d08977358a5c1fe19c9d359043537dfc93a61f744c652a8 thunderbird-debuginfo-45.3.0-1.el6_8.x86_64.rpm     MD5: 0b5b756b0d9934c9fc060d9ebee146deSHA-256: ac47d25c809c47b0b6b194347575dfc77b2001b559e978f4b4285a249c54335b   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: thunderbird-45.3.0-1.el7_2.src.rpm     MD5: 41a6beee0ee75cd6747b23eeb76e7dafSHA-256: a0efb1eb2d365379fc38989188d45b5518b310747518beafe91d22554dae8efc   x86_64: thunderbird-45.3.0-1.el7_2.x86_64.rpm     MD5: f3ee6a5449472c80f9ce095d73aafb08SHA-256: 3a44781f7956a08b0e5e307c7bb4091573c93fbd8e1ae2b73031dabae7a37a9c thunderbird-debuginfo-45.3.0-1.el7_2.x86_64.rpm     MD5: 30804876d3a1e5ebd13b24f6358f1c0aSHA-256: d90120bac957096d4d3474489927151e06312ba13bd29f70db324ed33cc44797   (The unlinked packages above are only available from the Red Hat Network) 1361974 - CVE-2016-2836 Mozilla: Miscellaneous memory safety hazards (rv:45.3) (MFSA 2016-62) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2015:1089-1: Important: qemu-kvm-rhev security update

Updated qemu-kvm-rhev packages that fix one security issue are nowavailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red HatEnterprise Linux 6.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides theuser-space component for running virtual machines using KVM.A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handledmulti-TMD packets with a length above 4096 bytes. A privileged guest userin a guest with an AMD PCNet ethernet card enabled could potentially usethis flaw to execute arbitrary code on the host with the privileges of thehosting QEMU process. (CVE-2015-3209)Red Hat would like to thank Matt Tait of Google's Project Zero securityteam for reporting this issue.All qemu-kvm-rhev users are advised to upgrade to these updated packages,which contain a backported patch to correct this issue. After installingthis update, shut down all running virtual machines. Once all virtualmachines have shut down, start them again for this update to take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat OpenStack 5.0 for RHEL 6 SRPMS: qemu-kvm-rhev-0.12.1.2-2.448.el6_6.4.src.rpm     MD5: 599699e5909f401fa3b62ba05ed5549bSHA-256: ac210c865a049dbbd56956ac97979266832bdc3ec357598dca970ca2f34b9cef   x86_64: qemu-img-rhev-0.12.1.2-2.448.el6_6.4.x86_64.rpm     MD5: 4284f791e6f1c8aed6418d3e0911f890SHA-256: e2cf7f0c3851a3c2dcfb4a4c02ce3667d5c5c11023ab3c3f6f1e67ab4d459291 qemu-kvm-rhev-0.12.1.2-2.448.el6_6.4.x86_64.rpm     MD5: 5c00d3fbfff4f3280922f04040935b7bSHA-256: 3389628f7edda6b985e33fe59e49badb4db9a08eedb3ea13fd29f2345be77590 qemu-kvm-rhev-debuginfo-0.12.1.2-2.448.el6_6.4.x86_64.rpm     MD5: e733d7635fe547e4e77594d466a03395SHA-256: 8e3d08456a951b46e392ab4e355c1eed56737e3f1f118b158cdb051a60e26b1c qemu-kvm-rhev-tools-0.12.1.2-2.448.el6_6.4.x86_64.rpm     MD5: d269569aaa4655068e7abe89417277e1SHA-256: db2701d2b089a7d2f743ee999f0faf71793b9c8180b6164d5f8a6773da8262d6   (The unlinked packages above are only available from the Red Hat Network) 1225882 - CVE-2015-3209 qemu: pcnet: multi-tmd buffer overflow in the tx path These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:0628-1: Important: openssl security update

Updated openssl packages that fix multiple security issues are nowavailable for Red Hat Storage 2.1.The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.It was found that OpenSSL clients and servers could be forced, via aspecially crafted handshake packet, to use weak keying material forcommunication. A man-in-the-middle attacker could use this flaw to decryptand modify traffic between a client and a server. (CVE-2014-0224)Note: In order to exploit this flaw, both the server and the client must beusing a vulnerable version of OpenSSL; the server must be using OpenSSLversion 1.0.1 and above, and the client must be using any version ofOpenSSL. For more information about this flaw, refer to:https://access.redhat.com/site/articles/904433A buffer overflow flaw was found in the way OpenSSL handled invalid DTLSpacket fragments. A remote attacker could possibly use this flaw to executearbitrary code on a DTLS client or server. (CVE-2014-0195)Multiple flaws were found in the way OpenSSL handled read and write bufferswhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client orserver using OpenSSL could crash or unexpectedly drop connections whenprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)A denial of service flaw was found in the way OpenSSL handled certain DTLSServerHello requests. A specially crafted DTLS handshake packet could causea DTLS client using OpenSSL to crash. (CVE-2014-0221)A NULL pointer dereference flaw was found in the way OpenSSL performedanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A speciallycrafted handshake packet could cause a TLS/SSL client that has theanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporterof CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195,Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and FelixGröbert and Ivan Fratrić of Google as the original reporters ofCVE-2014-3470.All OpenSSL users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library (such as httpd and otherSSL-enabled services) must be restarted or the system rebooted. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258 1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:1658-1: cman bug fix update

Updated cman packages that fix one bug are now available for Red Hat EnterpriseLinux 5. The Cluster Manager (cman) utility provides user-level services for managing aLinux cluster.This update fixes the following bug:* Due to security concerns, the Secure Sockets Layer version 3 (SSLv3)has been deprecated on the Cisco Unified Computing System (UCS) hardwarewith the UCS firmware. However, the prior version of the fence_cisco_ucs fenceagent did not allow the Transport Layer Security version 1 (TLSv1) protocolversion to be used instead.

As a consequence, fence_cisco_ucs did not work withCisco UCS devices running the latest firmware, which could cause securityissues.

The underlying code has been fixed so that fence_cisco_ucs now usesTLSv1.3 instead of SSLv3. Now, fence_cisco_ucs works as expected with Cisco UCShardware running the latest firmware. (BZ#1321592)* Fence agents that connected using the SSH protocol previously failed to log inif an identity file was used as the method of authentication.

The bug has beenfixed, and the aforementioned fence agents now successfully authenticate throughan identity file. (BZ#1206604)Users of cman are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client) SRPMS: cman-2.0.115-124.el5_11.4.src.rpm     MD5: 0cd4c310cb2d44a46705865d90546c0cSHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea   IA-32: cman-2.0.115-124.el5_11.4.i386.rpm     MD5: 2cc37de7a2acd4a5567fcf3a9d6a2fc5SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355 cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm     MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae cman-devel-2.0.115-124.el5_11.4.i386.rpm     MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9   x86_64: cman-2.0.115-124.el5_11.4.x86_64.rpm     MD5: 8237f89ba5aebcad80265e0781f1c74fSHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm     MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm     MD5: de0cf386fd1e17255a7f85badc10a714SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811 cman-devel-2.0.115-124.el5_11.4.i386.rpm     MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9 cman-devel-2.0.115-124.el5_11.4.x86_64.rpm     MD5: 7cc7e687fa963883c4542f96ca75a0d8SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90   Red Hat Enterprise Linux (v. 5 server) SRPMS: cman-2.0.115-124.el5_11.4.src.rpm     MD5: 0cd4c310cb2d44a46705865d90546c0cSHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea   IA-32: cman-2.0.115-124.el5_11.4.i386.rpm     MD5: 2cc37de7a2acd4a5567fcf3a9d6a2fc5SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355 cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm     MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae cman-devel-2.0.115-124.el5_11.4.i386.rpm     MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9   IA-64: cman-2.0.115-124.el5_11.4.ia64.rpm     MD5: d411a596435843a651ddb170e63bf9f1SHA-256: 432b80f6b44906b4a0741a23187b3bc924a14bf5002d2d2f7257bca5d85a3ffc cman-debuginfo-2.0.115-124.el5_11.4.ia64.rpm     MD5: c5f4ce9dfe0ddfb6edbd8303e9b82653SHA-256: 4fece127b75939db425a2b587a69141a2b155660a48188956f36372a72f9df8f cman-devel-2.0.115-124.el5_11.4.ia64.rpm     MD5: 24d9a949bd51cee244aa164dfea15080SHA-256: 241ee0a0e1a08e0660e7e283a34a7346f3c247f724c4e481e9afd99213a337c0   PPC: cman-2.0.115-124.el5_11.4.ppc.rpm     MD5: c3265f78836ce9161fbc4084e79db278SHA-256: 20df42c3fb5d9b815bef9f8b7fc43236b2fe39c7def1d2665c5594b8b7f9c513 cman-debuginfo-2.0.115-124.el5_11.4.ppc.rpm     MD5: e5872e47dc00db37c63d8c1c93022913SHA-256: 9d2a0baf2c4253b1a007d2be7ab374fa02c88d274520b64154d2855ff06d7cc5 cman-debuginfo-2.0.115-124.el5_11.4.ppc64.rpm     MD5: 8a82b20cedb4b7c2f849166182d1f756SHA-256: e497cb246dc08184858a5a183731c84df96fa76e2c9c8b3235129987f4b67dcd cman-devel-2.0.115-124.el5_11.4.ppc.rpm     MD5: 5b1c64eb8be181b66b751981a87b08d0SHA-256: 61961739df2cdc9ef4e91cadb55e439f4261580b1074f6d0746c280729395936 cman-devel-2.0.115-124.el5_11.4.ppc64.rpm     MD5: 4758506f7b83855ac30693dcd79d22ebSHA-256: 7bdaf482f4c1189bc7fba60f37cd9ee5993c1484e8782159d81bde0aa4ae36a3   x86_64: cman-2.0.115-124.el5_11.4.x86_64.rpm     MD5: 8237f89ba5aebcad80265e0781f1c74fSHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm     MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm     MD5: de0cf386fd1e17255a7f85badc10a714SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811 cman-devel-2.0.115-124.el5_11.4.i386.rpm     MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9 cman-devel-2.0.115-124.el5_11.4.x86_64.rpm     MD5: 7cc7e687fa963883c4542f96ca75a0d8SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHEA-2014:2007-1: coreutils Shift_JIS enhancement update

Updated coreutils Shift_JIS packages that add one enhancement are now availablefor Red Hat Enterprise Linux 6. The coreutils packages contain the GNU Core Utilities and represent acombination of the previously used GNU fileutils, sh-utils, and textutilspackages. Shift JIS (SJIS) is a character encoding for the Japanese language.The coreutils Shift_JIS packages provide coreutils support for SJIS.This update adds the following enhancement:* Previously, the tr command did not correctly handle the Shift JIS (SJIS)character encoding. As a consequence, when one byte of an SJIS double-bytecharacter was in the ASCII code range, tr incorrectly converted this SJIS byte,which corrupted the SJIS double-byte character. With this update, tr has beenmodified to skip SJIS-encoded characters when dealing with ASCII input, andSJIS-encoded characters are now displayed correctly. (BZ#1146792)All users requiring SJIS encoding support for coreutils should install theseupdated packages, which add this enhancement. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise S-JIS Service SRPMS: coreutils-8.4-37.el6_6.sjis.1.src.rpm     MD5: dfa197846fca1714502b042fa04e0a9bSHA-256: dff55f520d45a20d34b2e092720a979c9e03c5caaa6ae1242cc731ca79da0a5c   IA-32: coreutils-8.4-37.el6_6.sjis.1.i686.rpm     MD5: 06bde9aabbcb289039825ef77a1f292fSHA-256: 00e6bf0cdc3630fa93320c1e93a45ff42e1e3644edb06b2c9aa0b0d9190d05ab coreutils-debuginfo-8.4-37.el6_6.sjis.1.i686.rpm     MD5: c608c0e9a08e94889e29ba76cd38a0eaSHA-256: 1841f127827119fcaff06b90925f1b9aaa30ea3bd6ac11ce6d0caa503e3b135c coreutils-libs-8.4-37.el6_6.sjis.1.i686.rpm     MD5: 1fae7d9bcdd4b7bd935431c5b91fd52cSHA-256: d24c6760743d64e473263611aa02bf61be1666974498c9614fc9e66404207337   x86_64: coreutils-8.4-37.el6_6.sjis.1.x86_64.rpm     MD5: 751d6be28540737361c7cac3c12ac85cSHA-256: 130f6d2bbf6000171169417fd1d6dcc3283743411f5ea42fcadc8c62280f9088 coreutils-debuginfo-8.4-37.el6_6.sjis.1.x86_64.rpm     MD5: 96670ea2751c72cb1de3117d2f6f0228SHA-256: 0bffb67b7f07e5c39961705b6a7873f3be564f107484c2fc1ca24f6d3ab69899 coreutils-libs-8.4-37.el6_6.sjis.1.x86_64.rpm     MD5: 13daba39bfe19eb095485a4de22e2e92SHA-256: 98eb818d94fb7aeaae8342a41a7fd753bd286a46b5cd6f2eca3602ee15cf86e2   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2015:0681-1: Red Hat Storage Console 3.0 enhancement and bug fix update...

Updated rhsc-setup-plugins, org.ovirt.engine-root, otopi, nagios-server-addons,and rhsc-doc packages that fix multiple bugs and adds various enhancements arenow available for Red Hat Storage Console 3. Red Hat Storage Console is a powerful and simple web based Graphical UserInterface for managing a Red Hat Storage environment. It helps storageadministrators to easily create and manage multiple storage pools. This advisory fixes the following bugs: * Previously, incorrect status was displayed for disconnected network interface.With this fix, the Nagios plug-in checks whether the interface is up and runningand displays the correct status. (BZ#1110804)* Previously, disks that form bricks were monitored redundantly in both diskutilization and brick utilization service as Disk utilization service monitoredall the disks available in the system. With this fix, redundant monitoring ofdisks is avoided as disk utilization monitors only / , /boot , /home , /var,and /usr mount points. (BZ#1135983)* Previously, adding brick to pure replicate volume by increasing replica countfailed from Red Hat Storage Console. With this fix, the replica count of avolume can be increased in Add Bricks UI and new bricks can be added to thevolume. (BZ#1143828)* A new command 'configure-gluster-nagios' is added to create Nagiosconfigurations to monitor Red Hat Storage nodes. The 'configure-gluster-nagios'command can be used instead of running 'discovery.py' script. (BZ#1164682)* Previously, a warning message that support for creating replicate volume withreplica count=3 is in technology preview was displayed in Red Hat StorageConsole. With this fix, the warning message is removed as creation of replicatevolume with replica count=3 is now fully supported. (BZ#1186332)* Previously, during the initial set up of the Red Hat Storage Console setuptool, if you disable the monitoring feature and later enable it using'rhsc-monitoring enable' command, the answer file in the Red Hat Storage Consolesetup tool file did not get updated with the new value. Consequently, if youupgrade the Red Hat Storage Console and execute the Red Hat Storage Consolesetup again, it looks for the value in the answer file and finds that monitoringis not enabled and accordingly sets it to the disabled state. With this fix,during every run of 'rhsc-setup' command, a message is displayed asking if theuser wants to enable monitoring. (BZ#1166563)* Previously, Red Hat Storage 3.0.3 node could not be added to Red HatEnterprise Virtualization 3.5 cluster. With this fix, the vdsm packages areupdated to the latest version and now Red Hat Storage 3.0.4 node can be added in3.5 cluster version of Red Hat Enterprise Virtualization 3.5. But in Red HatStorage console 3.0.4, the maximum cluster version supported is 3.4 and Red HatStorage 3.0.4 node can be added as part of 3.4 cluster. (BZ#1181032)This update also adds the following enhancement: * An enhancement has been made to Brick Utilization service to monitor thin-poolmetadata utilization in case of thinly provisioned LVs. (BZ#1167771)All users of Red Hat Storage Console are advised to install these updatedpackages. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Storage Management Console 3.0 SRPMS: nagios-server-addons-0.1.14-1.el6rhs.src.rpm     MD5: ffe0795dd654b93eec9c3969a86e0ec9SHA-256: 985b71d4efffe43d2febaa7210224d6b19e1d88a26e3e1ddddb74a834fd2cbbe otopi-1.2.3-1.el6ev.src.rpm     MD5: 03e1c11186fea279bbb50b116bb8843fSHA-256: ccf2783fba9b4175f07d3d584b74968624945fcd8a88607cafca79aa60c23c41 python-pthreading-0.1.3-3.el6ev.src.rpm     MD5: e31c91ecab137adc9d40ef6bad6b955bSHA-256: c0cdc55d8c0c74ad27f33a2e9121c7281b5d6f8b6f3d09e17a87f2cd14a4f4f0 rhsc-3.0.4-1.25.el6rhs.src.rpm     MD5: ba1025ef1239fb3c46d71c010cd525dfSHA-256: 249e834cc84d912d8623c2503189f29211132fab7c383e6be745be5012fe0744 rhsc-doc-3.0.4-4.el6rhs.src.rpm     MD5: eb75c2cc33de9726df15da435dd0fcabSHA-256: 3e73789e806129a37486dcc18f0a36c619b1a393cca358269077a6cd20a168da rhsc-setup-plugins-3.0.4-1.2.el6rhs.src.rpm     MD5: c99fcc10b89fa6f566c2204d3f2b538eSHA-256: 757301a7f9740a2545d09939e09b8799a0948838299314ac72ce835b19b07341   x86_64: nagios-server-addons-0.1.14-1.el6rhs.noarch.rpm     MD5: d5f5a397cb41a796afe6964a2ab6b6adSHA-256: 256ab04e42fed3b5aa984711982f489156a73950480dcbbce50f8b4593c857dd otopi-1.2.3-1.el6ev.noarch.rpm     MD5: ef3f6996ec494a0907bc20d13ca31826SHA-256: 35f6f1567370c493513f9da496d87ede7b2b5b2d50c137a11faefb2787aa9d8f otopi-devtools-1.2.3-1.el6ev.noarch.rpm     MD5: d1b3d2f854f379d7f2bdf48d2221b30cSHA-256: c48bb9f8007b92d6a932cd8818e1d60cf38fb63f8e03037dbffedb2fbdae82d0 otopi-java-1.2.3-1.el6ev.noarch.rpm     MD5: 4e4232d632fa156686212459bb67819aSHA-256: bf51761ee6b2e5e5a5ccbfc3ea80db0e1e86fa1b47c05d265bdb8f59519975e6 otopi-repolib-1.2.3-1.el6ev.noarch.rpm     MD5: 15d1ff6f3bcd3e61a25a61a98d5099dfSHA-256: 7cc34542cb086f7d8485ce15d4b5f0a802d773ef6d419982d5c218aace3e90d7 python-pthreading-0.1.3-3.el6ev.noarch.rpm     MD5: c4599740c1b1553533355bc5239a1e6dSHA-256: 68981bef86a6b06417444736b11311dbcecf669bee725cbedf68c74867ea50b6 rhsc-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 4ce1f9e62249eb606fe07bc43a03163fSHA-256: c998cfcb344095ded7623c429661a1c6bc954e881968161db06d4cae649a034c rhsc-backend-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 805af7cf18cf5b8240e8aa71f9c27468SHA-256: 4728688e80424a160b667e73df451ea365bdf2f643bcfbe19f34a499eccbef0f rhsc-dbscripts-3.0.4-1.25.el6rhs.noarch.rpm     MD5: d56ed7de716a26de2c6b29bc7bdefd57SHA-256: 61a014350e57d4fa67d2d132ca164294a5d2e3c4365ef99f0c9b6ba74687900e rhsc-doc-3.0.4-4.el6rhs.noarch.rpm     MD5: 6f5f112dc4a9defd9209698581a6fb6cSHA-256: 908dc2c7af3c8f5d5e2471cc46f8b6b61ce351e4e9c07bb46527f9c4158850bb rhsc-lib-3.0.4-1.25.el6rhs.noarch.rpm     MD5: b6fac8be67b458483239c7ebc5033314SHA-256: f302dd06572af892e0646e165f1b58f036565e331b78e0eaebb22104aebd56c1 rhsc-restapi-3.0.4-1.25.el6rhs.noarch.rpm     MD5: f9d804a8afe8788680802c37fac826d4SHA-256: c469d521adf5031d76e8407a19460baabb6a3fa655deda1fae125b51978b35eb rhsc-setup-3.0.4-1.25.el6rhs.noarch.rpm     MD5: f3f8883348950789137ac640515d63c3SHA-256: f8eeb14e1dbbab47d14825385f1ab3f0e91fb5d04b31da927a2712b4f1c64f81 rhsc-setup-base-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 4b4d2f0d7f09087eafcb01ee2e89641eSHA-256: 80a1b0bd0e49bc666227b2d9cbdc7380647440e53d28a0a5547d1457bf9e7ffc rhsc-setup-plugin-ovirt-engine-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 58a05855f250c7ccca46c61756d2a4f1SHA-256: 800e258486a0e9ef637cb382543e377ea63402164f07df8b10dd921babb933e2 rhsc-setup-plugin-ovirt-engine-common-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 883e79ac53363aeee0223fb4db6ecf55SHA-256: da2ab4039601f45f96d01669e340ac9c8f480a936e99cdee8bdea9799a7aa268 rhsc-setup-plugins-3.0.4-1.2.el6rhs.noarch.rpm     MD5: eae256e79049c050100025f713b9ead1SHA-256: fbdb224bee095707a0e6c5179a105f4bf2682f9eb23aa0e03504368222e0903d rhsc-tools-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 467a2c0c92fc8827072ab87edca10deeSHA-256: ae8aa83dcd3fdf5c856a8cfcf948c049c9fcee49443f305042b55cc91e9bb502 rhsc-webadmin-portal-3.0.4-1.25.el6rhs.noarch.rpm     MD5: 000d0a221f8ecf63a35bbb868fdc4411SHA-256: e0d262a23779c9cc40d3ebc5a9c9adc835e6e5fb12367e3a042f8e5cc5890836   Red Hat Storage Server 3.0 SRPMS: ioprocess-0.14.0-3.el6ev.src.rpm     MD5: e4a10ff19aef6d1f7da532875587ec2aSHA-256: a16c3713d312787df912bd71c79bb9ba748dacdc3f6ec78192df702f4b6f71e8 python-pthreading-0.1.3-3.el6ev.src.rpm     MD5: e31c91ecab137adc9d40ef6bad6b955bSHA-256: c0cdc55d8c0c74ad27f33a2e9121c7281b5d6f8b6f3d09e17a87f2cd14a4f4f0   x86_64: ioprocess-0.14.0-3.el6ev.x86_64.rpm     MD5: eaaf69b7a3d625fd6ffc91b9ca660ff2SHA-256: ec7b66c001022b0932a27aa5fd4433e84618ab2b7806d9fb2ce0658ef2dd8fb2 python-ioprocess-0.14.0-3.el6ev.noarch.rpm     MD5: dfd0d6af94f55a7576b8334fa3cb28d1SHA-256: 12733f18e300a25106c1a8fde7c23d7f2819329147ef24b2a6471805c924c596 python-pthreading-0.1.3-3.el6ev.noarch.rpm     MD5: c4599740c1b1553533355bc5239a1e6dSHA-256: 68981bef86a6b06417444736b11311dbcecf669bee725cbedf68c74867ea50b6   (The unlinked packages above are only available from the Red Hat Network) 1110804 - [Nagios] Network interface is shown as up even if it is disconnected1135983 - [Nagios] Disk utilization service need not monitor disks that are already monitored as part of brick utilization service1143828 - [RHSC] Adding brick to pure replicate volume by increasing replica count fails from Console1164682 - [RFE] Add a command to run auto discovery and mention that command as part of rhsc-setup summary to the user.1166563 - [RHSC] rhsc-setup after upgrade does not check if monitoring is enabled or disabled currently, and configures monitoring as it was setup previously1167771 - [Nagios] RFE: Brick utilization service should monitor the thin-pool metadata utilization in case of thinly provisioned LVs1177883 - [New] - Missing help links for Add/Edit volume options, configure and About .1186332 - Remove the tech preview warning note when replica count is = 3.1197983 - rhsc-setup should restart nagios service, instead of starting it These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:1020-1: preupgrade-assistant-el6toel7 bug fix and enhancement update

An updated preupgrade-assistant-el6toel7 package that fixes several bugs andadds various enhancements is now available for the Extras channel of Red HatEnterprise Linux 6. Preupgrade Assistant is a set of scripts and plug-ins that can assess yoursyst...

RHSA-2015:1123-1: Important: cups security update

Red Hat Enterprise Linux Desktop (v. 6) SRPMS: cups-1.4.2-67.el6_6.1.src.rpm     MD5: e60ce72858fc53f211e1e6bd09b61844SHA-256: deafc729c2e04f86025e8439b569d00a80c3398837b67313c3d2333ce18375ca   IA-32: cups-1.4.2-67.el6_6.1.i686.rpm     MD5: 68e99c98c5e59df23e5714235701d821SHA-256: 81b2808e1cdbec7ce600b983de4c9e20b50c8102c8713f00b34eea88e50cbb68 cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-lpd-1.4.2-67.el6_6.1.i686.rpm     MD5: c8316ea5c4eb80846846aeeeaf0f39d1SHA-256: 8225f26947dcd63d6c26324bba443cc73f57d7c585f5e66e5927856908ec566d cups-php-1.4.2-67.el6_6.1.i686.rpm     MD5: d8a437a19d6d6b8bb064bb882dd2e1ecSHA-256: 44c4c994918493d87d19f3230b8d8c07ff60bf7710eae55f21c725d00dd9c387   x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b93d62a8046a91345b5a4c1e158f1ccdSHA-256: 535b9f63ec357e2c519fd13281947d632e7980634d6a60d21875fe4144aae47b cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm     MD5: a64c0d7a66b3b1c0f23a8c858145da25SHA-256: 0324e2f5d954d808705fc1ddb1bf42913acdab6930728bb1a869fd535b295c9e cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-devel-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 43465a9d4ead39edc32d3206644683f3SHA-256: 1cf6e54cd17ed06136e8446231bbc4daca89ff371dc3e381d2f213d8018b0206 cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-libs-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b0fb1e139522fb47c685b826a780ad12SHA-256: e3b130aa1bf2e673b5a645522a64fd4a103679cf66ebcbf1c05e1739113192c5 cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 8f5929857aebe6b09e0752f2b214dbeaSHA-256: b25a29370d3c5de385f659c0a5d87d318f8b52746caf2d36c95357e963d9919b cups-php-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 3095cb71428e18e49c2a58874f948d7dSHA-256: 74f2ff1daaf9eb01292768aeaa768c486f6ec7245b704d2552d64bcdaeea06cf   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: cups-1.6.3-17.el7_1.1.src.rpm     MD5: 15e06f19280e422e1546d7bf3c2c2279SHA-256: 71327c0dd7983ffd96b8248f04845e5a51f168f878c37d44af91d246c6962c8f   x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 2321bcfdb90f97b6a0e47cce24ebdb52SHA-256: fb9c0907e4a16a8c30e32bfcc01476e587c3404a5b360d9038b25a658ea0b646 cups-client-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 844345cfe6e05a5381f149f439707f2fSHA-256: 7166cd5548a42d31921d401cd26d7c6eb92e5393a30a765551f1f66f9867573a cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm     MD5: 32345c0820109fd29090739baeecc379SHA-256: 3ef4039df9fb223c0edcdbc523c18ce6287d8592508fbf57eb49e27fbf008943 cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8b3ee2bfe93eee6cef22115e81e34114SHA-256: e0aad51b431cd4f44c5c71ffa07f2a9f751925a50c48488a24044410b74ee06b cups-devel-1.6.3-17.el7_1.1.i686.rpm     MD5: ad8e9a28d676132cee011aa91ebfe316SHA-256: de46fcc051f5bbf3e96799fa8f59a91d619a99aff8250e652dc2badb86a2ddba cups-devel-1.6.3-17.el7_1.1.x86_64.rpm     MD5: a3b07f8bd2e417b4eea04d367c369c90SHA-256: 4a4291b6bc12bc7add66d7fcf3dfb3682cf51f293ddb2256696e7772a94ef68b cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm     MD5: 0e5a10c7ac4c450412f5a02abaf61a15SHA-256: 8cc496d027a26283c0c624fa5c328e19c7214796f95d7b229201e7394eded23a cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm     MD5: ebbf01291ca63a6b7f1b3eba2f65f6abSHA-256: 8e27b21a5e92f8f2ef9fdecd5cc59b366f3a395eadcef0332cc5b17059d2d9c6 cups-libs-1.6.3-17.el7_1.1.i686.rpm     MD5: 280f6c563c861e2130febd4565dbd962SHA-256: 4a92219695c63891e8d0c8df3ed3ef7431dc81ccb7aa6b52ad2eb455df2aaa04 cups-libs-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8970b605d3de328ff7b70d5ae82a33d2SHA-256: af2f3ff49ed871fb9084255ffa796ea99c30f66b72467822f1e159f6f71dfd08 cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 60ef123dd685f593f7669cbae2bbb736SHA-256: d8bf9a09eeff80b50cb9303f4df065ed0986b111f549f3e8c1d5b4621c91b0e3   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: cups-1.4.2-67.el6_6.1.src.rpm     MD5: e60ce72858fc53f211e1e6bd09b61844SHA-256: deafc729c2e04f86025e8439b569d00a80c3398837b67313c3d2333ce18375ca   x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b93d62a8046a91345b5a4c1e158f1ccdSHA-256: 535b9f63ec357e2c519fd13281947d632e7980634d6a60d21875fe4144aae47b cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm     MD5: a64c0d7a66b3b1c0f23a8c858145da25SHA-256: 0324e2f5d954d808705fc1ddb1bf42913acdab6930728bb1a869fd535b295c9e cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-devel-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 43465a9d4ead39edc32d3206644683f3SHA-256: 1cf6e54cd17ed06136e8446231bbc4daca89ff371dc3e381d2f213d8018b0206 cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-libs-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b0fb1e139522fb47c685b826a780ad12SHA-256: e3b130aa1bf2e673b5a645522a64fd4a103679cf66ebcbf1c05e1739113192c5 cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 8f5929857aebe6b09e0752f2b214dbeaSHA-256: b25a29370d3c5de385f659c0a5d87d318f8b52746caf2d36c95357e963d9919b cups-php-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 3095cb71428e18e49c2a58874f948d7dSHA-256: 74f2ff1daaf9eb01292768aeaa768c486f6ec7245b704d2552d64bcdaeea06cf   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: cups-1.6.3-17.el7_1.1.src.rpm     MD5: 15e06f19280e422e1546d7bf3c2c2279SHA-256: 71327c0dd7983ffd96b8248f04845e5a51f168f878c37d44af91d246c6962c8f   x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 2321bcfdb90f97b6a0e47cce24ebdb52SHA-256: fb9c0907e4a16a8c30e32bfcc01476e587c3404a5b360d9038b25a658ea0b646 cups-client-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 844345cfe6e05a5381f149f439707f2fSHA-256: 7166cd5548a42d31921d401cd26d7c6eb92e5393a30a765551f1f66f9867573a cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm     MD5: 32345c0820109fd29090739baeecc379SHA-256: 3ef4039df9fb223c0edcdbc523c18ce6287d8592508fbf57eb49e27fbf008943 cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8b3ee2bfe93eee6cef22115e81e34114SHA-256: e0aad51b431cd4f44c5c71ffa07f2a9f751925a50c48488a24044410b74ee06b cups-devel-1.6.3-17.el7_1.1.i686.rpm     MD5: ad8e9a28d676132cee011aa91ebfe316SHA-256: de46fcc051f5bbf3e96799fa8f59a91d619a99aff8250e652dc2badb86a2ddba cups-devel-1.6.3-17.el7_1.1.x86_64.rpm     MD5: a3b07f8bd2e417b4eea04d367c369c90SHA-256: 4a4291b6bc12bc7add66d7fcf3dfb3682cf51f293ddb2256696e7772a94ef68b cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm     MD5: 0e5a10c7ac4c450412f5a02abaf61a15SHA-256: 8cc496d027a26283c0c624fa5c328e19c7214796f95d7b229201e7394eded23a cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm     MD5: ebbf01291ca63a6b7f1b3eba2f65f6abSHA-256: 8e27b21a5e92f8f2ef9fdecd5cc59b366f3a395eadcef0332cc5b17059d2d9c6 cups-libs-1.6.3-17.el7_1.1.i686.rpm     MD5: 280f6c563c861e2130febd4565dbd962SHA-256: 4a92219695c63891e8d0c8df3ed3ef7431dc81ccb7aa6b52ad2eb455df2aaa04 cups-libs-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8970b605d3de328ff7b70d5ae82a33d2SHA-256: af2f3ff49ed871fb9084255ffa796ea99c30f66b72467822f1e159f6f71dfd08 cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 60ef123dd685f593f7669cbae2bbb736SHA-256: d8bf9a09eeff80b50cb9303f4df065ed0986b111f549f3e8c1d5b4621c91b0e3   Red Hat Enterprise Linux Server (v. 6) SRPMS: cups-1.4.2-67.el6_6.1.src.rpm     MD5: e60ce72858fc53f211e1e6bd09b61844SHA-256: deafc729c2e04f86025e8439b569d00a80c3398837b67313c3d2333ce18375ca   IA-32: cups-1.4.2-67.el6_6.1.i686.rpm     MD5: 68e99c98c5e59df23e5714235701d821SHA-256: 81b2808e1cdbec7ce600b983de4c9e20b50c8102c8713f00b34eea88e50cbb68 cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-lpd-1.4.2-67.el6_6.1.i686.rpm     MD5: c8316ea5c4eb80846846aeeeaf0f39d1SHA-256: 8225f26947dcd63d6c26324bba443cc73f57d7c585f5e66e5927856908ec566d cups-php-1.4.2-67.el6_6.1.i686.rpm     MD5: d8a437a19d6d6b8bb064bb882dd2e1ecSHA-256: 44c4c994918493d87d19f3230b8d8c07ff60bf7710eae55f21c725d00dd9c387   PPC: cups-1.4.2-67.el6_6.1.ppc64.rpm     MD5: 8c0d9f57daa1685672578a613c4185eeSHA-256: ded3fda43b56faa22f99c56699f3d29bd263e6e345079925f46f7329572ac9bf cups-debuginfo-1.4.2-67.el6_6.1.ppc.rpm     MD5: a5a53a40c508c66a6363bd38ccfb3f89SHA-256: fd8d657d56f7797dd0294eed242a8c3410fcfef7ff307ba3df64e5805852257f cups-debuginfo-1.4.2-67.el6_6.1.ppc64.rpm     MD5: 164e71ad13c20f34dae0a25e2ad896ecSHA-256: 6f80a901c3cdc7cdc7a406c4640441b0b46ea325e80101037c187e63f32a0794 cups-devel-1.4.2-67.el6_6.1.ppc.rpm     MD5: c71f9a23998cf7c4aa9e5cb306d01c01SHA-256: ebd9b707f5cff7baba44231f4e94c036507456457efbdcc7b8283b827a080d84 cups-devel-1.4.2-67.el6_6.1.ppc64.rpm     MD5: e2b12ba7100c356624d9cfaab25e5c92SHA-256: 933dcdad056c8ac265a325c472e1d5b73d4a57405062e262a70b9f4c812078fc cups-libs-1.4.2-67.el6_6.1.ppc.rpm     MD5: 41f983900669fed9eeef2ca8479674c1SHA-256: f83a6b45e3bc3e9528b789bfb0f2cd5857491c90da29f03dd36eeef56c3b240d cups-libs-1.4.2-67.el6_6.1.ppc64.rpm     MD5: a9829d5fc1bcfd64ac369cc59b989513SHA-256: d034d3eecb4284a9781b2224bc82ead22d2bfec3bae72f4c4e8b9b0e046d632e cups-lpd-1.4.2-67.el6_6.1.ppc64.rpm     MD5: a0f41f2730d613bd1e07370f58f1cd73SHA-256: a16812e2d03735c0a5c12b2dfc9e5b4791374e6d65bcd17de6512a049b3ba101 cups-php-1.4.2-67.el6_6.1.ppc64.rpm     MD5: 43b8ee74b0de0182c700485bf56b192eSHA-256: 49615e2f2fb523224af457f583dc48cd86406e506da46bde94e1b7b716a67df1   s390x: cups-1.4.2-67.el6_6.1.s390x.rpm     MD5: d0f25b7ac15cad4fd5c46785629c7bf6SHA-256: d52e4485a9ed5e9e4e4291066601c0b665d050137b6800e8285a30b393311485 cups-debuginfo-1.4.2-67.el6_6.1.s390.rpm     MD5: 6ca8875cb3080631ca1a2edea7725c12SHA-256: d59a8338fcf31f1d80cb3a5557703f17f43c7e04dc7355d2cd57c4dea1e4e165 cups-debuginfo-1.4.2-67.el6_6.1.s390x.rpm     MD5: f2522e5b3e816ada8524b72a9455a96cSHA-256: 78c4641649dea3f46970f7201a5ce679b73bc634ff73c4066da452ac299075e4 cups-devel-1.4.2-67.el6_6.1.s390.rpm     MD5: 37dc8052df30747a5861c12176a54356SHA-256: 9681d46336de905983d90737d8c6c7265b3cf980044de5f733d1edf9f141b234 cups-devel-1.4.2-67.el6_6.1.s390x.rpm     MD5: 5b5acea87a6455ffd619da7f6a191da5SHA-256: 1db6092cf781be6ded762600ec6fca5c1b86e7482512b3a3f0e72cfb6add3f48 cups-libs-1.4.2-67.el6_6.1.s390.rpm     MD5: cd1087bb3f2c73eff79c89ec60ba8758SHA-256: eedb6595d2de0fd2581f9106e5745575e09dfd274fdac512c870a622533a24b6 cups-libs-1.4.2-67.el6_6.1.s390x.rpm     MD5: 29f9e696c143a83d0892bbae06a4f173SHA-256: 5593c48a8326923c4ef38b6521bba8297f00eb1ff8b30ca522e98cba49e0d3e1 cups-lpd-1.4.2-67.el6_6.1.s390x.rpm     MD5: 2bea9a6ebbcd4d53dcd083b79095d106SHA-256: c39fa78f516f3a335cff40f5401936e7761254e2130ca31f9ae19b5ca85a2116 cups-php-1.4.2-67.el6_6.1.s390x.rpm     MD5: 5e50956c008f3b33c2f65fb65f361a10SHA-256: 59e1d78b8b9ada4b538b54115bb1b063065fd06dfe6652bc5d6fa0584e021942   x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b93d62a8046a91345b5a4c1e158f1ccdSHA-256: 535b9f63ec357e2c519fd13281947d632e7980634d6a60d21875fe4144aae47b cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm     MD5: a64c0d7a66b3b1c0f23a8c858145da25SHA-256: 0324e2f5d954d808705fc1ddb1bf42913acdab6930728bb1a869fd535b295c9e cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-devel-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 43465a9d4ead39edc32d3206644683f3SHA-256: 1cf6e54cd17ed06136e8446231bbc4daca89ff371dc3e381d2f213d8018b0206 cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-libs-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b0fb1e139522fb47c685b826a780ad12SHA-256: e3b130aa1bf2e673b5a645522a64fd4a103679cf66ebcbf1c05e1739113192c5 cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 8f5929857aebe6b09e0752f2b214dbeaSHA-256: b25a29370d3c5de385f659c0a5d87d318f8b52746caf2d36c95357e963d9919b cups-php-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 3095cb71428e18e49c2a58874f948d7dSHA-256: 74f2ff1daaf9eb01292768aeaa768c486f6ec7245b704d2552d64bcdaeea06cf   Red Hat Enterprise Linux Server (v. 7) SRPMS: cups-1.6.3-17.el7_1.1.src.rpm     MD5: 15e06f19280e422e1546d7bf3c2c2279SHA-256: 71327c0dd7983ffd96b8248f04845e5a51f168f878c37d44af91d246c6962c8f   PPC: cups-1.6.3-17.el7_1.1.ppc64.rpm     MD5: 37c22df7023393f26d260e802ee2df36SHA-256: 2c56db5fe710e8be4704bf5e2d4da982f12a9389cb390182a894ffa2922d134f cups-client-1.6.3-17.el7_1.1.ppc64.rpm     MD5: 508651e2b8adcacfd1bc097edb18e7feSHA-256: e07146569dab579864e68f73ccb498656af40b67a7bb0324dc16c02a15c23505 cups-debuginfo-1.6.3-17.el7_1.1.ppc.rpm     MD5: 468c41f5aca5b668b909ab342e6e5032SHA-256: b636300b2588652cca88e5761b69999bc96380fcc71c401c2467a623d3f3a539 cups-debuginfo-1.6.3-17.el7_1.1.ppc64.rpm     MD5: d26d551956f66c19312c2c251e33d033SHA-256: ddbfdc2ffd528ec9a993e57afe734a75c437c78e19d6c8c470cdf0d9fbaddb94 cups-devel-1.6.3-17.el7_1.1.ppc.rpm     MD5: 268bae59cf81922cf699de424591fb50SHA-256: cef1ffba241e5066198094fc26f9bae3cda28b054021c65f6a158ed8f7e913df cups-devel-1.6.3-17.el7_1.1.ppc64.rpm     MD5: e46452b6a9d61e6c237d2d21b89590a4SHA-256: a009a7499ccf531054a2103601fa1ee6d6fecebd9fbfe26cc9b5dbb1d8416fd4 cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm     MD5: 0e5a10c7ac4c450412f5a02abaf61a15SHA-256: 8cc496d027a26283c0c624fa5c328e19c7214796f95d7b229201e7394eded23a cups-ipptool-1.6.3-17.el7_1.1.ppc64.rpm     MD5: 75f9089786036a7b7bc5c066825e266dSHA-256: 7bcf63dd1dd903f1c3080146ce5e9386f849fae87c338a3482d288b688f837f3 cups-libs-1.6.3-17.el7_1.1.ppc.rpm     MD5: 9f9fa2bb1b931eee595f46c73afb8380SHA-256: f72ddd79b74a7c08769e3231dd18367b3a14888c6a4d5d2c39eb2a5e0b91e215 cups-libs-1.6.3-17.el7_1.1.ppc64.rpm     MD5: 15143f3cd4fc701fd03f5ed63dc056ccSHA-256: e1ed6d3b70a38a9d76920fda1c667812f823a7d6e276015eb8b136921e890bb4 cups-lpd-1.6.3-17.el7_1.1.ppc64.rpm     MD5: 67400395f8d01f8016ea455a12e129d8SHA-256: 81bf555e8275806221a72f09f805312a7f7c57a7714f1f2265bb98bd5e1c88f1   s390x: cups-1.6.3-17.el7_1.1.s390x.rpm     MD5: 08e60bfae75083862ad5adfb61849efeSHA-256: 1422e8ab8ba5ea70386fa9b397c48ca98030f7558f3e67e25291515cb4fe15e0 cups-client-1.6.3-17.el7_1.1.s390x.rpm     MD5: d9410cba78a74973d3d66a6d23f760d8SHA-256: 5c6f6f035531c1a63226136d72733c98fdb6fc171ea39e3e5f82607015e3b1bb cups-debuginfo-1.6.3-17.el7_1.1.s390.rpm     MD5: a08152654d87445b1104b4de821f5c3bSHA-256: a5e460b94ebc33e4d6f43e04e9fd96d25ea53a70b62eab4bc1ce81c3f9e39c5e cups-debuginfo-1.6.3-17.el7_1.1.s390x.rpm     MD5: bbb24b9fb4b7ce827fa4690c2321560bSHA-256: 2a18fba7cd14f872d202d717b8dcf52b9d05f761e6a3c8371b77c405c859af1c cups-devel-1.6.3-17.el7_1.1.s390.rpm     MD5: 04283c30c800f41d5f5915d05abdb83cSHA-256: d1c61b0f92bbe5807f9a9f4eb207e0453f6f553d3313ef5a5429707d875dc019 cups-devel-1.6.3-17.el7_1.1.s390x.rpm     MD5: 0930d8d5dc7cf957eb39f1079e807358SHA-256: a421838f371b496470eaffaf6d16faa674749549138d7e5c66581404f2474562 cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm     MD5: 0e5a10c7ac4c450412f5a02abaf61a15SHA-256: 8cc496d027a26283c0c624fa5c328e19c7214796f95d7b229201e7394eded23a cups-ipptool-1.6.3-17.el7_1.1.s390x.rpm     MD5: 871a254901101a7f34db6d491c6fb6bdSHA-256: 1367959410079b02f6477e9ad613def81334d09f87bc0e1e9fd7e229858e04a5 cups-libs-1.6.3-17.el7_1.1.s390.rpm     MD5: 26cb691561e53b72e2d494c207a44778SHA-256: 2d6c7fa042ac50b10a9a9ae407d2d4189bef15648b936821d7384571b0a54820 cups-libs-1.6.3-17.el7_1.1.s390x.rpm     MD5: 6dca51a1ede581731c35d366b1c380ceSHA-256: d1975debdb31801f2c4dc20e09f953b56b2534c4c4e7d5496a3f83ececf59816 cups-lpd-1.6.3-17.el7_1.1.s390x.rpm     MD5: 8569a0d6984fb15002b875baa1efa43fSHA-256: 978a1b6aba0a77fb03016f49d1d9aad3daae25f2f43fe6339ff83304049bb474   x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 2321bcfdb90f97b6a0e47cce24ebdb52SHA-256: fb9c0907e4a16a8c30e32bfcc01476e587c3404a5b360d9038b25a658ea0b646 cups-client-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 844345cfe6e05a5381f149f439707f2fSHA-256: 7166cd5548a42d31921d401cd26d7c6eb92e5393a30a765551f1f66f9867573a cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm     MD5: 32345c0820109fd29090739baeecc379SHA-256: 3ef4039df9fb223c0edcdbc523c18ce6287d8592508fbf57eb49e27fbf008943 cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8b3ee2bfe93eee6cef22115e81e34114SHA-256: e0aad51b431cd4f44c5c71ffa07f2a9f751925a50c48488a24044410b74ee06b cups-devel-1.6.3-17.el7_1.1.i686.rpm     MD5: ad8e9a28d676132cee011aa91ebfe316SHA-256: de46fcc051f5bbf3e96799fa8f59a91d619a99aff8250e652dc2badb86a2ddba cups-devel-1.6.3-17.el7_1.1.x86_64.rpm     MD5: a3b07f8bd2e417b4eea04d367c369c90SHA-256: 4a4291b6bc12bc7add66d7fcf3dfb3682cf51f293ddb2256696e7772a94ef68b cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm     MD5: 0e5a10c7ac4c450412f5a02abaf61a15SHA-256: 8cc496d027a26283c0c624fa5c328e19c7214796f95d7b229201e7394eded23a cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm     MD5: ebbf01291ca63a6b7f1b3eba2f65f6abSHA-256: 8e27b21a5e92f8f2ef9fdecd5cc59b366f3a395eadcef0332cc5b17059d2d9c6 cups-libs-1.6.3-17.el7_1.1.i686.rpm     MD5: 280f6c563c861e2130febd4565dbd962SHA-256: 4a92219695c63891e8d0c8df3ed3ef7431dc81ccb7aa6b52ad2eb455df2aaa04 cups-libs-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8970b605d3de328ff7b70d5ae82a33d2SHA-256: af2f3ff49ed871fb9084255ffa796ea99c30f66b72467822f1e159f6f71dfd08 cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 60ef123dd685f593f7669cbae2bbb736SHA-256: d8bf9a09eeff80b50cb9303f4df065ed0986b111f549f3e8c1d5b4621c91b0e3   Red Hat Enterprise Linux Server EUS (v. 6.6.z) SRPMS: cups-1.4.2-67.el6_6.1.src.rpm     MD5: e60ce72858fc53f211e1e6bd09b61844SHA-256: deafc729c2e04f86025e8439b569d00a80c3398837b67313c3d2333ce18375ca   IA-32: cups-1.4.2-67.el6_6.1.i686.rpm     MD5: 68e99c98c5e59df23e5714235701d821SHA-256: 81b2808e1cdbec7ce600b983de4c9e20b50c8102c8713f00b34eea88e50cbb68 cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-lpd-1.4.2-67.el6_6.1.i686.rpm     MD5: c8316ea5c4eb80846846aeeeaf0f39d1SHA-256: 8225f26947dcd63d6c26324bba443cc73f57d7c585f5e66e5927856908ec566d cups-php-1.4.2-67.el6_6.1.i686.rpm     MD5: d8a437a19d6d6b8bb064bb882dd2e1ecSHA-256: 44c4c994918493d87d19f3230b8d8c07ff60bf7710eae55f21c725d00dd9c387   PPC: cups-1.4.2-67.el6_6.1.ppc64.rpm     MD5: 8c0d9f57daa1685672578a613c4185eeSHA-256: ded3fda43b56faa22f99c56699f3d29bd263e6e345079925f46f7329572ac9bf cups-debuginfo-1.4.2-67.el6_6.1.ppc.rpm     MD5: a5a53a40c508c66a6363bd38ccfb3f89SHA-256: fd8d657d56f7797dd0294eed242a8c3410fcfef7ff307ba3df64e5805852257f cups-debuginfo-1.4.2-67.el6_6.1.ppc64.rpm     MD5: 164e71ad13c20f34dae0a25e2ad896ecSHA-256: 6f80a901c3cdc7cdc7a406c4640441b0b46ea325e80101037c187e63f32a0794 cups-devel-1.4.2-67.el6_6.1.ppc.rpm     MD5: c71f9a23998cf7c4aa9e5cb306d01c01SHA-256: ebd9b707f5cff7baba44231f4e94c036507456457efbdcc7b8283b827a080d84 cups-devel-1.4.2-67.el6_6.1.ppc64.rpm     MD5: e2b12ba7100c356624d9cfaab25e5c92SHA-256: 933dcdad056c8ac265a325c472e1d5b73d4a57405062e262a70b9f4c812078fc cups-libs-1.4.2-67.el6_6.1.ppc.rpm     MD5: 41f983900669fed9eeef2ca8479674c1SHA-256: f83a6b45e3bc3e9528b789bfb0f2cd5857491c90da29f03dd36eeef56c3b240d cups-libs-1.4.2-67.el6_6.1.ppc64.rpm     MD5: a9829d5fc1bcfd64ac369cc59b989513SHA-256: d034d3eecb4284a9781b2224bc82ead22d2bfec3bae72f4c4e8b9b0e046d632e cups-lpd-1.4.2-67.el6_6.1.ppc64.rpm     MD5: a0f41f2730d613bd1e07370f58f1cd73SHA-256: a16812e2d03735c0a5c12b2dfc9e5b4791374e6d65bcd17de6512a049b3ba101 cups-php-1.4.2-67.el6_6.1.ppc64.rpm     MD5: 43b8ee74b0de0182c700485bf56b192eSHA-256: 49615e2f2fb523224af457f583dc48cd86406e506da46bde94e1b7b716a67df1   s390x: cups-1.4.2-67.el6_6.1.s390x.rpm     MD5: d0f25b7ac15cad4fd5c46785629c7bf6SHA-256: d52e4485a9ed5e9e4e4291066601c0b665d050137b6800e8285a30b393311485 cups-debuginfo-1.4.2-67.el6_6.1.s390.rpm     MD5: 6ca8875cb3080631ca1a2edea7725c12SHA-256: d59a8338fcf31f1d80cb3a5557703f17f43c7e04dc7355d2cd57c4dea1e4e165 cups-debuginfo-1.4.2-67.el6_6.1.s390x.rpm     MD5: f2522e5b3e816ada8524b72a9455a96cSHA-256: 78c4641649dea3f46970f7201a5ce679b73bc634ff73c4066da452ac299075e4 cups-devel-1.4.2-67.el6_6.1.s390.rpm     MD5: 37dc8052df30747a5861c12176a54356SHA-256: 9681d46336de905983d90737d8c6c7265b3cf980044de5f733d1edf9f141b234 cups-devel-1.4.2-67.el6_6.1.s390x.rpm     MD5: 5b5acea87a6455ffd619da7f6a191da5SHA-256: 1db6092cf781be6ded762600ec6fca5c1b86e7482512b3a3f0e72cfb6add3f48 cups-libs-1.4.2-67.el6_6.1.s390.rpm     MD5: cd1087bb3f2c73eff79c89ec60ba8758SHA-256: eedb6595d2de0fd2581f9106e5745575e09dfd274fdac512c870a622533a24b6 cups-libs-1.4.2-67.el6_6.1.s390x.rpm     MD5: 29f9e696c143a83d0892bbae06a4f173SHA-256: 5593c48a8326923c4ef38b6521bba8297f00eb1ff8b30ca522e98cba49e0d3e1 cups-lpd-1.4.2-67.el6_6.1.s390x.rpm     MD5: 2bea9a6ebbcd4d53dcd083b79095d106SHA-256: c39fa78f516f3a335cff40f5401936e7761254e2130ca31f9ae19b5ca85a2116 cups-php-1.4.2-67.el6_6.1.s390x.rpm     MD5: 5e50956c008f3b33c2f65fb65f361a10SHA-256: 59e1d78b8b9ada4b538b54115bb1b063065fd06dfe6652bc5d6fa0584e021942   x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b93d62a8046a91345b5a4c1e158f1ccdSHA-256: 535b9f63ec357e2c519fd13281947d632e7980634d6a60d21875fe4144aae47b cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm     MD5: a64c0d7a66b3b1c0f23a8c858145da25SHA-256: 0324e2f5d954d808705fc1ddb1bf42913acdab6930728bb1a869fd535b295c9e cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-devel-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 43465a9d4ead39edc32d3206644683f3SHA-256: 1cf6e54cd17ed06136e8446231bbc4daca89ff371dc3e381d2f213d8018b0206 cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-libs-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b0fb1e139522fb47c685b826a780ad12SHA-256: e3b130aa1bf2e673b5a645522a64fd4a103679cf66ebcbf1c05e1739113192c5 cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 8f5929857aebe6b09e0752f2b214dbeaSHA-256: b25a29370d3c5de385f659c0a5d87d318f8b52746caf2d36c95357e963d9919b cups-php-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 3095cb71428e18e49c2a58874f948d7dSHA-256: 74f2ff1daaf9eb01292768aeaa768c486f6ec7245b704d2552d64bcdaeea06cf   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: cups-1.4.2-67.el6_6.1.src.rpm     MD5: e60ce72858fc53f211e1e6bd09b61844SHA-256: deafc729c2e04f86025e8439b569d00a80c3398837b67313c3d2333ce18375ca   IA-32: cups-1.4.2-67.el6_6.1.i686.rpm     MD5: 68e99c98c5e59df23e5714235701d821SHA-256: 81b2808e1cdbec7ce600b983de4c9e20b50c8102c8713f00b34eea88e50cbb68 cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-lpd-1.4.2-67.el6_6.1.i686.rpm     MD5: c8316ea5c4eb80846846aeeeaf0f39d1SHA-256: 8225f26947dcd63d6c26324bba443cc73f57d7c585f5e66e5927856908ec566d cups-php-1.4.2-67.el6_6.1.i686.rpm     MD5: d8a437a19d6d6b8bb064bb882dd2e1ecSHA-256: 44c4c994918493d87d19f3230b8d8c07ff60bf7710eae55f21c725d00dd9c387   x86_64: cups-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b93d62a8046a91345b5a4c1e158f1ccdSHA-256: 535b9f63ec357e2c519fd13281947d632e7980634d6a60d21875fe4144aae47b cups-debuginfo-1.4.2-67.el6_6.1.i686.rpm     MD5: dc71985a66308cc890b05b01fe909008SHA-256: 5c5a0a5bba0414b7871696abd307bb9fe27be65ce84ce17a2a38e82f2dbf25a5 cups-debuginfo-1.4.2-67.el6_6.1.x86_64.rpm     MD5: a64c0d7a66b3b1c0f23a8c858145da25SHA-256: 0324e2f5d954d808705fc1ddb1bf42913acdab6930728bb1a869fd535b295c9e cups-devel-1.4.2-67.el6_6.1.i686.rpm     MD5: 4a1cf1d95e0eab693dbc1be90ba134c2SHA-256: 733e7e1bdd6595ed2b702dd090876053c97dde7f10e0a08668142dc3db316a3c cups-devel-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 43465a9d4ead39edc32d3206644683f3SHA-256: 1cf6e54cd17ed06136e8446231bbc4daca89ff371dc3e381d2f213d8018b0206 cups-libs-1.4.2-67.el6_6.1.i686.rpm     MD5: dccf78add6b7bd8257666bc3e0af84adSHA-256: dcf4ac594db0234e8307339105e9ed2e605a32030859ee66286b4315dc86adfb cups-libs-1.4.2-67.el6_6.1.x86_64.rpm     MD5: b0fb1e139522fb47c685b826a780ad12SHA-256: e3b130aa1bf2e673b5a645522a64fd4a103679cf66ebcbf1c05e1739113192c5 cups-lpd-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 8f5929857aebe6b09e0752f2b214dbeaSHA-256: b25a29370d3c5de385f659c0a5d87d318f8b52746caf2d36c95357e963d9919b cups-php-1.4.2-67.el6_6.1.x86_64.rpm     MD5: 3095cb71428e18e49c2a58874f948d7dSHA-256: 74f2ff1daaf9eb01292768aeaa768c486f6ec7245b704d2552d64bcdaeea06cf   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: cups-1.6.3-17.el7_1.1.src.rpm     MD5: 15e06f19280e422e1546d7bf3c2c2279SHA-256: 71327c0dd7983ffd96b8248f04845e5a51f168f878c37d44af91d246c6962c8f   x86_64: cups-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 2321bcfdb90f97b6a0e47cce24ebdb52SHA-256: fb9c0907e4a16a8c30e32bfcc01476e587c3404a5b360d9038b25a658ea0b646 cups-client-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 844345cfe6e05a5381f149f439707f2fSHA-256: 7166cd5548a42d31921d401cd26d7c6eb92e5393a30a765551f1f66f9867573a cups-debuginfo-1.6.3-17.el7_1.1.i686.rpm     MD5: 32345c0820109fd29090739baeecc379SHA-256: 3ef4039df9fb223c0edcdbc523c18ce6287d8592508fbf57eb49e27fbf008943 cups-debuginfo-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8b3ee2bfe93eee6cef22115e81e34114SHA-256: e0aad51b431cd4f44c5c71ffa07f2a9f751925a50c48488a24044410b74ee06b cups-devel-1.6.3-17.el7_1.1.i686.rpm     MD5: ad8e9a28d676132cee011aa91ebfe316SHA-256: de46fcc051f5bbf3e96799fa8f59a91d619a99aff8250e652dc2badb86a2ddba cups-devel-1.6.3-17.el7_1.1.x86_64.rpm     MD5: a3b07f8bd2e417b4eea04d367c369c90SHA-256: 4a4291b6bc12bc7add66d7fcf3dfb3682cf51f293ddb2256696e7772a94ef68b cups-filesystem-1.6.3-17.el7_1.1.noarch.rpm     MD5: 0e5a10c7ac4c450412f5a02abaf61a15SHA-256: 8cc496d027a26283c0c624fa5c328e19c7214796f95d7b229201e7394eded23a cups-ipptool-1.6.3-17.el7_1.1.x86_64.rpm     MD5: ebbf01291ca63a6b7f1b3eba2f65f6abSHA-256: 8e27b21a5e92f8f2ef9fdecd5cc59b366f3a395eadcef0332cc5b17059d2d9c6 cups-libs-1.6.3-17.el7_1.1.i686.rpm     MD5: 280f6c563c861e2130febd4565dbd962SHA-256: 4a92219695c63891e8d0c8df3ed3ef7431dc81ccb7aa6b52ad2eb455df2aaa04 cups-libs-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 8970b605d3de328ff7b70d5ae82a33d2SHA-256: af2f3ff49ed871fb9084255ffa796ea99c30f66b72467822f1e159f6f71dfd08 cups-lpd-1.6.3-17.el7_1.1.x86_64.rpm     MD5: 60ef123dd685f593f7669cbae2bbb736SHA-256: d8bf9a09eeff80b50cb9303f4df065ed0986b111f549f3e8c1d5b4621c91b0e3   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:1224-1: Important: qemu-kvm-rhev security update

An update for qemu-kvm-rhev is now available for RHEV-H and Agents for RHEL-6.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

The qemu-kvm-rhev package provides the user-spacecomponent for running virtual machines using KVM in environments managed by RedHat Enterprise Virtualization Manager.Security Fix(es):* An out-of-bounds read/write access flaw was found in the way QEMU's VGAemulation with VESA BIOS Extensions (VBE) support performed read/writeoperations using I/O port methods.

A privileged guest user could use this flawto execute arbitrary code on the host with the privileges of the host's QEMUprocess. (CVE-2016-3710)Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360Marvel Team) for reporting this issue. For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, shut down all running virtual machines. Once allvirtual machines have shut down, start them again for this update to takeeffect.Red Hat Enterprise Virtualization 3 SRPMS: qemu-kvm-rhev-0.12.1.2-2.479.el6_7.5.src.rpm     MD5: 2afbf76aeaf500850ce21089ab0827a1SHA-256: ba4147116e4fa9d473aea1e976b11e06d762919a76e19738355578620a3925a6   x86_64: qemu-img-rhev-0.12.1.2-2.479.el6_7.5.x86_64.rpm     MD5: 6ed6deaf9832c5efffc0e9249aaae33aSHA-256: 641056376f8292abbdf13b1bd976a001a2c190418e2e9a3261cea6f05ab9405f qemu-kvm-rhev-0.12.1.2-2.479.el6_7.5.x86_64.rpm     MD5: 18ea43c052f77a41b0a8ef0d8b813b9aSHA-256: 47218c781001fa0042028408d2e379815d2a00ca462c1b05d615ee2f6153515e qemu-kvm-rhev-debuginfo-0.12.1.2-2.479.el6_7.5.x86_64.rpm     MD5: ca24aafcbe4329b96b9f9a6273dfbc7cSHA-256: df3eeed73a1354247f475a4a97ef809936eb958083fab5aca6e72322fa18ff16 qemu-kvm-rhev-tools-0.12.1.2-2.479.el6_7.5.x86_64.rpm     MD5: 5a16dca0d3a849a5405f59c6f1b8d605SHA-256: 36dd987e678c6a419afad88bb406d24d98722439930dd51e9ab056a2e44dd195   (The unlinked packages above are only available from the Red Hat Network) 1331401 - CVE-2016-3710 qemu: incorrect banked access bounds checking in vga module These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: