RedHat Vulnerabilities

RHBA-2014:1723-1: Red Hat Storage Console 2.1 bug fix update

Updated Red Hat Storage Console packages are now available for use with Red HatStorage Server 2.1. Red Hat Storage Console is a powerful and simple web based Graphical User Interface for managing a Red Hat Storage environment. It helps Storage Administrators to easily create and manage multiple storage pools. This includes features such as expanding and shrinking atrusted storage pool and volume management. This advisory addresses the following bug:Previously, the migrate-rhs-classic-to-rhsm script failed and users were unable to migrate from Red Hat Storage 2.1 to Red Hat Storage 3.0. With this fix, the migrate-rhs-classic-to-rhsm script runs successfully on both Red Hat Enterprise Linux 6.5 and Red Hat Enterprise Linux 6.6 environments and the migration is successful. (BZ#1145134)Users of Red Hat Storage Console are advised to upgrade to this updated package, which fixes this bug. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Storage Management Console 2.1 SRPMS: rhsc-2.1.2-0.41.el6rhs.src.rpm     MD5: a848ffde58f106650c83aa138bda2192SHA-256: afa1fff99cbfa1b82760ce3e422878c045ee9f1f30d7170870847bfee5a19f56 rhsc-branding-rhs-2.1.6-1.0.el6rhs.src.rpm     MD5: e4297fb70e1cd59744e562f461b2e680SHA-256: 2d9b90df7b2e72689750a7d25b750454a0c12fb5f03971226837977e393a7364   x86_64: rhsc-2.1.2-0.41.el6rhs.noarch.rpm     MD5: a5643da8cb2340b5bb0319f391f863b2SHA-256: e8ade77204035e8b71e8128e57cae045a0919ec320102c72741b96cb6760c4d7 rhsc-backend-2.1.2-0.41.el6rhs.noarch.rpm     MD5: 2b164ef5488a46e369b2bd0bd7bc8be2SHA-256: da0b0cc6cd182e035a2c364c5eb4737faee8bb7a3c6b660203ff31d1549833bc rhsc-branding-rhs-2.1.6-1.0.el6rhs.noarch.rpm     MD5: dc6cc26345de4c8b12ea2a53589c91e8SHA-256: d73a2f892af109e7d69689c9d8c836532f425a70d9be37a8ed91836f9803f82e rhsc-dbscripts-2.1.2-0.41.el6rhs.noarch.rpm     MD5: 2390ff1621ddb61b8b07fd91f709221bSHA-256: 81fa665d060a33f87d2cd1eb3db069a6f24740b74d5c28e6b556e7be3716ef9e rhsc-lib-2.1.2-0.41.el6rhs.noarch.rpm     MD5: 71f5367026f07fe4ab7a64806f2aee2cSHA-256: dbc339401f9665e7f0fba37a7c069b98bc2d65f4b3f164b364e4f5dd7bede11d rhsc-restapi-2.1.2-0.41.el6rhs.noarch.rpm     MD5: 23cd1865064896976c4d2e946d6b9d4fSHA-256: 0eb15046c1f90914d8bc2392060f5116c2eb7ad579c1043965146e42617cf371 rhsc-setup-2.1.2-0.41.el6rhs.noarch.rpm     MD5: 0ca1c71ccb08cfe4b1fb6e96c25e01f3SHA-256: a174fa60c61260679a565e0ffff7d4cfac540f740394cff9762424b428e70408 rhsc-tools-2.1.2-0.41.el6rhs.noarch.rpm     MD5: c0d8df0897c8c5f6c47bdd184819d66bSHA-256: 389008ac0fa4f685b0cfe1d3cb9698f0c47da51e47750ee415acdf119e22b721 rhsc-webadmin-portal-2.1.2-0.41.el6rhs.noarch.rpm     MD5: 3662f3d8645ae498d1f02ffd077f32d5SHA-256: bd5a31eec4524eff6fbf50e67b371b5465887fd301e6e4997062a5a5e2f0f12a   (The unlinked packages above are only available from the Red Hat Network) 1145134 - migrate-rhs-classic-to-rhsm --rhn-to-rhsm is broken These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0524-1: tsclient bug fix update

Updated tsclient packages that fix two bugs are now available for Red HatEnterprise Linux 6. The Terminal Server Client (tsclient) is a GTK2 front end that makes it easy touse the Remote Desktop Protocol client (rdesktop) and vncviewer utilities.This update fixes the following bugs:* Previously, the tsclient user interface did not offer an option to set the32-bit color depth in the "Advanced Options" menu for the "Windows TerminalService" connection type. Consequently, the 32-bit color depth could not beselected even though it was supported on the system, and connection to Windowssystems could not be established with more than 16-bit color depth. With thisupdate, the error in the "Advanced Options" menu has been fixed, and the 32-bitcolor depth option now functions as intended. (BZ#798631)* Prior to this update, tsclient was not fully compatible with the RemoteDesktop Protocol (RDP). Consequently, tsclient could, under certaincircumstances, terminate unexpectedly when the user was connected to a remotesystem over RDP. This update addresses the problems with RDP compatibility, andtsclient no longer crashes when using RDP for remote connection. (BZ#848526)Users of tsclient are advised to upgrade to these updated packages, which fixthese bugs. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6) SRPMS: tsclient-2.0.2-10.el6.src.rpm     MD5: 34b97424e71af3dafefe8cc765e11c23SHA-256: 17756847e355fd3f15787174bcad323748e9755b581e20d16534bd629d20fcc7   IA-32: tsclient-2.0.2-10.el6.i686.rpm     MD5: e9db54efcb7da402b6b0fd62417df1f8SHA-256: fc05653753586c365238d403f351b7eef11dcdbb06ba9814db9f8ecc12b6bf65 tsclient-debuginfo-2.0.2-10.el6.i686.rpm     MD5: 3923a4f862b63bd8aa1d50963b8ae6e5SHA-256: df7cf0558bfb550c30e90f04f3911857d0d9e427d63403a59461813dfa6443fc tsclient-devel-2.0.2-10.el6.i686.rpm     MD5: 9438acd0f1410a2349a8a1bed0187ce1SHA-256: e7a6225bc2659d624c76a55ef33c7be9837e408945e131a28ee4b4d5132d070e   x86_64: tsclient-2.0.2-10.el6.x86_64.rpm     MD5: 4bceb57a002e4c3d7061785ccb3bd3f6SHA-256: b17d38aad067344d0b7ba9d9641dee160c35f6bb20b4bb9e3c30180830aa0260 tsclient-debuginfo-2.0.2-10.el6.i686.rpm     MD5: 3923a4f862b63bd8aa1d50963b8ae6e5SHA-256: df7cf0558bfb550c30e90f04f3911857d0d9e427d63403a59461813dfa6443fc tsclient-debuginfo-2.0.2-10.el6.x86_64.rpm     MD5: 6aa22216c17e3f18026298cc2b283b05SHA-256: f69feda2eb3f611ccedd94a5f46f6ffd5bcf72a67bfb938942570cf74039dd66 tsclient-devel-2.0.2-10.el6.i686.rpm     MD5: 9438acd0f1410a2349a8a1bed0187ce1SHA-256: e7a6225bc2659d624c76a55ef33c7be9837e408945e131a28ee4b4d5132d070e tsclient-devel-2.0.2-10.el6.x86_64.rpm     MD5: 5605dcef0c4391fbdd75a296b7720c8aSHA-256: 42840941f9b75cac48a948b75e59ea40d83dbe92b7e82b3de4573be141ecc12c   Red Hat Enterprise Linux Server FasTrack (v. 6) SRPMS: tsclient-2.0.2-10.el6.src.rpm     MD5: 34b97424e71af3dafefe8cc765e11c23SHA-256: 17756847e355fd3f15787174bcad323748e9755b581e20d16534bd629d20fcc7   IA-32: tsclient-2.0.2-10.el6.i686.rpm     MD5: e9db54efcb7da402b6b0fd62417df1f8SHA-256: fc05653753586c365238d403f351b7eef11dcdbb06ba9814db9f8ecc12b6bf65 tsclient-debuginfo-2.0.2-10.el6.i686.rpm     MD5: 3923a4f862b63bd8aa1d50963b8ae6e5SHA-256: df7cf0558bfb550c30e90f04f3911857d0d9e427d63403a59461813dfa6443fc tsclient-devel-2.0.2-10.el6.i686.rpm     MD5: 9438acd0f1410a2349a8a1bed0187ce1SHA-256: e7a6225bc2659d624c76a55ef33c7be9837e408945e131a28ee4b4d5132d070e   PPC: tsclient-2.0.2-10.el6.ppc64.rpm     MD5: bdea65be10c528731ab5d0bae5aa4eaaSHA-256: 5e364a6364b3152d7d645bd81c7ea7b594c0f46f8795b51c3a114b37a0b7145f tsclient-debuginfo-2.0.2-10.el6.ppc.rpm     MD5: 9761f6f84b6e3d246bcb57d65a275c51SHA-256: fbe52eb03e69a1d5523a7e5b38663fcd4dae21e141814690a99b9e42f39e7b7f tsclient-debuginfo-2.0.2-10.el6.ppc64.rpm     MD5: c4e6e8392fdfed644c8be9dfe4858aa8SHA-256: 1450aa82b5b9a11d0e4c02dce7b529ec984f6e69b0d96a7273cc5c8016bbe79c tsclient-devel-2.0.2-10.el6.ppc.rpm     MD5: b8e27c6536dd986155f8662b67d02913SHA-256: 1b752bacabf7c2ccf5dd8b8bdc3a91d02eeed930dafb88865a91030e4b967c05 tsclient-devel-2.0.2-10.el6.ppc64.rpm     MD5: e328843e8b205b1d9a54bb480371c2ecSHA-256: 44c3f1976727ae306f80afaacf8659ef2bfa1f0641d615375c1511cc362916a1   s390x: tsclient-2.0.2-10.el6.s390x.rpm     MD5: 35f31f3ab4f9a835596e745cd7ec7511SHA-256: 85b726ab2c1d197871a4f78b947f47a4924f917d9c3686620e6ba1615bda8372 tsclient-debuginfo-2.0.2-10.el6.s390.rpm     MD5: badd6d66e9c0a8e582cd62dbd9d8bce1SHA-256: 0888fd2a0e9f019a82d38a16ec11c7b97bf04ad84f879746b82f896988bb1785 tsclient-debuginfo-2.0.2-10.el6.s390x.rpm     MD5: 58fc49c8b545c1f6ea586b2b3c23103aSHA-256: 36b3e24b8a1eaccf0f0014f8c99c3db62b9aeccfe2004657600f0c96cb75790e tsclient-devel-2.0.2-10.el6.s390.rpm     MD5: b1c7ee65a14b4a5fc5831894ad2c2300SHA-256: a03f268e263716ac601a6a0da32994816226775f988c753ae6b155faddf8cf55 tsclient-devel-2.0.2-10.el6.s390x.rpm     MD5: a3d392b7e126720169c31bad9dc39442SHA-256: ddb2ae26040af1027d39d1d3c6292976f5a819b5a981a005a2a858494badfae4   x86_64: tsclient-2.0.2-10.el6.x86_64.rpm     MD5: 4bceb57a002e4c3d7061785ccb3bd3f6SHA-256: b17d38aad067344d0b7ba9d9641dee160c35f6bb20b4bb9e3c30180830aa0260 tsclient-debuginfo-2.0.2-10.el6.i686.rpm     MD5: 3923a4f862b63bd8aa1d50963b8ae6e5SHA-256: df7cf0558bfb550c30e90f04f3911857d0d9e427d63403a59461813dfa6443fc tsclient-debuginfo-2.0.2-10.el6.x86_64.rpm     MD5: 6aa22216c17e3f18026298cc2b283b05SHA-256: f69feda2eb3f611ccedd94a5f46f6ffd5bcf72a67bfb938942570cf74039dd66 tsclient-devel-2.0.2-10.el6.i686.rpm     MD5: 9438acd0f1410a2349a8a1bed0187ce1SHA-256: e7a6225bc2659d624c76a55ef33c7be9837e408945e131a28ee4b4d5132d070e tsclient-devel-2.0.2-10.el6.x86_64.rpm     MD5: 5605dcef0c4391fbdd75a296b7720c8aSHA-256: 42840941f9b75cac48a948b75e59ea40d83dbe92b7e82b3de4573be141ecc12c   Red Hat Enterprise Linux Workstation FasTrack (v. 6) SRPMS: tsclient-2.0.2-10.el6.src.rpm     MD5: 34b97424e71af3dafefe8cc765e11c23SHA-256: 17756847e355fd3f15787174bcad323748e9755b581e20d16534bd629d20fcc7   IA-32: tsclient-2.0.2-10.el6.i686.rpm     MD5: e9db54efcb7da402b6b0fd62417df1f8SHA-256: fc05653753586c365238d403f351b7eef11dcdbb06ba9814db9f8ecc12b6bf65 tsclient-debuginfo-2.0.2-10.el6.i686.rpm     MD5: 3923a4f862b63bd8aa1d50963b8ae6e5SHA-256: df7cf0558bfb550c30e90f04f3911857d0d9e427d63403a59461813dfa6443fc tsclient-devel-2.0.2-10.el6.i686.rpm     MD5: 9438acd0f1410a2349a8a1bed0187ce1SHA-256: e7a6225bc2659d624c76a55ef33c7be9837e408945e131a28ee4b4d5132d070e   x86_64: tsclient-2.0.2-10.el6.x86_64.rpm     MD5: 4bceb57a002e4c3d7061785ccb3bd3f6SHA-256: b17d38aad067344d0b7ba9d9641dee160c35f6bb20b4bb9e3c30180830aa0260 tsclient-debuginfo-2.0.2-10.el6.i686.rpm     MD5: 3923a4f862b63bd8aa1d50963b8ae6e5SHA-256: df7cf0558bfb550c30e90f04f3911857d0d9e427d63403a59461813dfa6443fc tsclient-debuginfo-2.0.2-10.el6.x86_64.rpm     MD5: 6aa22216c17e3f18026298cc2b283b05SHA-256: f69feda2eb3f611ccedd94a5f46f6ffd5bcf72a67bfb938942570cf74039dd66 tsclient-devel-2.0.2-10.el6.i686.rpm     MD5: 9438acd0f1410a2349a8a1bed0187ce1SHA-256: e7a6225bc2659d624c76a55ef33c7be9837e408945e131a28ee4b4d5132d070e tsclient-devel-2.0.2-10.el6.x86_64.rpm     MD5: 5605dcef0c4391fbdd75a296b7720c8aSHA-256: 42840941f9b75cac48a948b75e59ea40d83dbe92b7e82b3de4573be141ecc12c   (The unlinked packages above are only available from the Red Hat Network) 848526 - symbol lookup error: /usr/lib64/tsclient/plugins/libtsc-default.so: undefined symbol: notify_is_initted These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:0126-1: Moderate: openstack-swift security update

Updated openstack-swift packages that fix two security issues are nowavailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 6.Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. OpenStack Object Storage (swift) provides object storage in virtualcontainers, which allows users to store and retrieve files (arbitrarydata). The service's distributed architecture supports horizontal scaling;redundancy as failure-proofing is provided through software-based datareplication. Because Object Storage supports asynchronous eventualconsistency replication, it is well suited to multiple data-centerdeployment.A memory-leak issue was found in OpenStack Object Storage (swift), in theproxy-to-server connection. An OpenStack-authenticated attacker couldremotely trigger this flaw to cause denial of service through excess memoryconsumption. (CVE-2016-0738)A memory-leak issue was found in OpenStack Object Storage (swift), in theclient-to-proxy connection. An OpenStack-authenticated attacker couldremotely trigger this flaw to cause denial of service through excess memoryconsumption. (CVE-2016-0737)Red Hat would like to thank the OpenStack project for reporting these issues. Upstream acknowledges Romain Le Disez from OVH and Örjan Perssonfrom Kiliaro as the original reporters.All users of openstack-swift are advised to upgrade to these updatedpackages, which correct these issues. After installing this update, theOpenStack Object Storage services will be restarted automatically. Red Hat OpenStack 5.0 for RHEL 6 SRPMS: openstack-swift-1.13.1-8.el6ost.src.rpm     MD5: 851c948565aa5af3eb98dfa8327860d5SHA-256: 18d3130ee4e4fda4bf4067c57d83c0f513e37de83bd298428b14ec26984ac9b9   x86_64: openstack-swift-1.13.1-8.el6ost.noarch.rpm     MD5: 15452bb0c36e05de6b9dda2356018aeeSHA-256: 1bec3aff2d0122a9c9088ef68164e93113d891b44a4110799708bf2d91d44392 openstack-swift-account-1.13.1-8.el6ost.noarch.rpm     MD5: f3a2c5ca8634f9f01b382d276311a0b7SHA-256: f1e5a8f9540e836d0b6f60b7ff0a0dac5278e77466bb5742b1dd5991bde45ea3 openstack-swift-container-1.13.1-8.el6ost.noarch.rpm     MD5: 7be420aff6102db3e0670f885301739eSHA-256: a47257654d58de7501a7b61bbfb70d7c28ba0470abc3ac1304d43c879ba1b87c openstack-swift-doc-1.13.1-8.el6ost.noarch.rpm     MD5: f44b7f3e7090cb172a87e69b208f1e1bSHA-256: 2632773d6341f6a21e31687084f2ca85f29e6f0ae447ffa386df856735216682 openstack-swift-object-1.13.1-8.el6ost.noarch.rpm     MD5: f8523e17e85ea8c0eb62634945a474b2SHA-256: ecd7963389ef04e4a037bd362f25c5f63c4581d8e7f8044ea9a3c60412a517e4 openstack-swift-proxy-1.13.1-8.el6ost.noarch.rpm     MD5: f3fc48852324a5346cd95aef9a555abbSHA-256: 69631a5077373b493fd9e0e00b43dd609aa5dd951eb0079850e8b9ed3b5a7091   (The unlinked packages above are only available from the Red Hat Network) 1298905 - CVE-2016-0738 openstack-swift: Proxy to server DoS through Large Objects1298924 - CVE-2016-0737 openstack-swift: Client to proxy DoS through Large Objects These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:1294-1: Critical: bash security update

Updated bash packages that fix one security issue are now available for RedHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat EnterpriseLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red HatEnterprise Linux 6.4 Extended Update Support.Red Hat Product Security has rated this update as having Critical securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The GNU Bourne Again shell (Bash) is a shell and command languageinterpreter compatible with the Bourne shell (sh). Bash is the defaultshell for Red Hat Enterprise Linux.A flaw was found in the way Bash evaluated certain specially craftedenvironment variables. An attacker could use this flaw to override orbypass environment restrictions to execute shell commands. Certainservices and applications allow remote unauthenticated attackers toprovide environment variables, allowing them to exploit this issue.(CVE-2014-6271)For additional information on the CVE-2014-6271 flaw, refer to theKnowledgebase article at https://access.redhat.com/articles/1200223Red Hat would like to thank Stephane Chazelas for reporting this issue.All bash users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. Before applying this update, make sure all previously released errata relevant to your system have been applied.This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258Red Hat Enterprise Linux ELS (v. 4) SRPMS: bash-3.0-27.el4.2.src.rpm     MD5: 46513142d0bcec11c7e1b66b16368ae1SHA-256: ddfa1244deb1d1a7ae90d83ceec291abdbe83f218c0266fabc96b15cc7fa6c2a   IA-32: bash-3.0-27.el4.2.i386.rpm     MD5: 44a88cb076d84c1639cdbc5598d1ffa2SHA-256: 4e9525774fcdd451d71c1940a2276e23ec98b0617a813e1e80ef8de9784d22ad   IA-64: bash-3.0-27.el4.2.i386.rpm     MD5: 44a88cb076d84c1639cdbc5598d1ffa2SHA-256: 4e9525774fcdd451d71c1940a2276e23ec98b0617a813e1e80ef8de9784d22ad bash-3.0-27.el4.2.ia64.rpm     MD5: a7f73c3ebac478456cecb0641bb31838SHA-256: 85aa44707853f5881330b8baf4ddf537a9eea5a323b4bf46238c697d82db82de   x86_64: bash-3.0-27.el4.2.x86_64.rpm     MD5: 9e6774098a4d6fe7b389170b45be828eSHA-256: b5c788167f3fa5fabf9e0efcdb78a391a670b0026ce11ba657ac87a679084a86   Red Hat Enterprise Linux EUS (v. 5.9.z server) SRPMS: bash-3.2-32.el5_9.2.src.rpm     MD5: 91f49bcf5c9b2446d0591848bb7730bdSHA-256: 8b4359d4050424fe967c17455f4434488a1122531e2c909ae4f61a96bc7fca38   IA-32: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5   IA-64: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-3.2-32.el5_9.2.ia64.rpm     MD5: 476f9191b9a1bf27969f04e1194e4658SHA-256: 4637dde859e70feae066fd7ee578fd496e1d3378a5e84c11caafa52884095b95 bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5 bash-debuginfo-3.2-32.el5_9.2.ia64.rpm     MD5: 653aed4c04b0e40a0135365f1ebe4936SHA-256: 75189926eb4077ac6fef9a8c14bd797b0c1df8ea5dde55d3eaef343bb2133e83   PPC: bash-3.2-32.el5_9.2.ppc.rpm     MD5: b2fc481289790fecd97d60ae736a5138SHA-256: d7a436d1fdbc68de6adb09bf242c9ad9829bfdbfa382c9a09d7e4fc5281f93cf bash-debuginfo-3.2-32.el5_9.2.ppc.rpm     MD5: 7a27cde2dc4f35f1d3786a70b6146416SHA-256: 6a5d6e573da12dac02f55d1bd1f550769a3570b29d6455409f1dc339dbb676fe   s390x: bash-3.2-32.el5_9.2.s390x.rpm     MD5: ab46a3621a8b726d43a55d7b814652abSHA-256: 548b97e62a6cdf8ac2094f1d6d23070c8868242ee6a4bc9e1c08334de643748a bash-debuginfo-3.2-32.el5_9.2.s390x.rpm     MD5: 4562850755ede5f685397b7ac5ec36bbSHA-256: 696f50eb41bafd82d14395186748e3f3ac9a5d74fc52081118e20314cc37701b   x86_64: bash-3.2-32.el5_9.2.x86_64.rpm     MD5: 3adf3d9675dabede987d59e633d922edSHA-256: 8a7bc45406007938a390399ce3ec8a9244814eabc04e9ff8dc21a37b66f6bffb bash-debuginfo-3.2-32.el5_9.2.x86_64.rpm     MD5: 6a2b084fdd5d04edaf2a099011a10d33SHA-256: f27907cf3708f48ae92f77cc38711c7f2335d719c9c3ebf550046f769cd66b8f   Red Hat Enterprise Linux Long Life (v. 5.6 server) SRPMS: bash-3.2-24.el5_6.1.src.rpm     MD5: 00d1bf030a43ee2d25619bb6fcd2b527SHA-256: 35d6252f1b01db8d330591d5be2ae41ad6bbdc71939509e68c8fa717f36ed6ca   IA-32: bash-3.2-24.el5_6.1.i386.rpm     MD5: f1e61f3eb2918733ee418fe08eedf4ccSHA-256: e3264238ad7effececabee181433b599941e5c7a1e33a315b0a8b664f6d5e725 bash-debuginfo-3.2-24.el5_6.1.i386.rpm     MD5: 717dbef51bd199fa9642d8caed3a5338SHA-256: 73ea4005c82744684392e35db2d96fd0505cdcc7769e4eb82708880db0b74e1a   IA-64: bash-3.2-24.el5_6.1.i386.rpm     MD5: f1e61f3eb2918733ee418fe08eedf4ccSHA-256: e3264238ad7effececabee181433b599941e5c7a1e33a315b0a8b664f6d5e725 bash-3.2-24.el5_6.1.ia64.rpm     MD5: ee5764456404f2bac2751e4aa812aa2bSHA-256: a2a1beb99735263c01e744a95a19c46ff1b9fc0481f11d7f7ca462d8c1221ebd bash-debuginfo-3.2-24.el5_6.1.i386.rpm     MD5: 717dbef51bd199fa9642d8caed3a5338SHA-256: 73ea4005c82744684392e35db2d96fd0505cdcc7769e4eb82708880db0b74e1a bash-debuginfo-3.2-24.el5_6.1.ia64.rpm     MD5: 984089a0ce85e1e072773f66ada20af4SHA-256: 57db77022719dbc2462c50d7643d3bdd8c1bfed4ed053b0fd011a006e7af5d95   x86_64: bash-3.2-24.el5_6.1.x86_64.rpm     MD5: 78198169084d0e3a44cc80e6bca84d4eSHA-256: f83f3724931258bb01e704e3c696b3731e9cb2577f1d691ffc1b66097b8db854 bash-debuginfo-3.2-24.el5_6.1.x86_64.rpm     MD5: 63cdfc99d680236569506b64d5d01298SHA-256: 68d0b0f7c833a7f6aa90f6fb6b6e69d68a853945da2ce595737870b40bf7a527   Red Hat Enterprise Linux Long Life (v. 5.9 server) SRPMS: bash-3.2-32.el5_9.2.src.rpm     MD5: 91f49bcf5c9b2446d0591848bb7730bdSHA-256: 8b4359d4050424fe967c17455f4434488a1122531e2c909ae4f61a96bc7fca38   IA-32: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5   IA-64: bash-3.2-32.el5_9.2.i386.rpm     MD5: f0a1e58eda0b90a6bb470b93171636ffSHA-256: f85cff9bd9b3dc0665bd3b3d298ab1877cab135e6f20d29e094cec2b0c8b0f5a bash-3.2-32.el5_9.2.ia64.rpm     MD5: 476f9191b9a1bf27969f04e1194e4658SHA-256: 4637dde859e70feae066fd7ee578fd496e1d3378a5e84c11caafa52884095b95 bash-debuginfo-3.2-32.el5_9.2.i386.rpm     MD5: 0067d14d017c63655805b8ff58792563SHA-256: a324305ceb3015712d67c9bb6e3a3b8cf90a4f1b445c494691d6b15f0f485fc5 bash-debuginfo-3.2-32.el5_9.2.ia64.rpm     MD5: 653aed4c04b0e40a0135365f1ebe4936SHA-256: 75189926eb4077ac6fef9a8c14bd797b0c1df8ea5dde55d3eaef343bb2133e83   x86_64: bash-3.2-32.el5_9.2.x86_64.rpm     MD5: 3adf3d9675dabede987d59e633d922edSHA-256: 8a7bc45406007938a390399ce3ec8a9244814eabc04e9ff8dc21a37b66f6bffb bash-debuginfo-3.2-32.el5_9.2.x86_64.rpm     MD5: 6a2b084fdd5d04edaf2a099011a10d33SHA-256: f27907cf3708f48ae92f77cc38711c7f2335d719c9c3ebf550046f769cd66b8f   Red Hat Enterprise Linux Server AUS (v. 6.2) SRPMS: bash-4.1.2-9.el6_2.1.src.rpm     MD5: a53b3946a8a3aeec8f7ad1ec4c29033fSHA-256: 6090ac4a03c5a01fe8a4202db69367312789ab8f91351a01acdf1e1b2b1efb9d   x86_64: bash-4.1.2-9.el6_2.1.x86_64.rpm     MD5: 0ec1a23c3b9656f05aaa996c8a64c62aSHA-256: 322e5fe859661034fae06051e4e0aedb72f1b2ba4c555a9d70e19f3c48e2c67f bash-debuginfo-4.1.2-9.el6_2.1.x86_64.rpm     MD5: 003b7b678a79320f9eb66ff59969c088SHA-256: dc16b43a27ec4efa5a217be2ea89496bfe62246b02f8c5d9c0e216f6bdca7f89 bash-doc-4.1.2-9.el6_2.1.x86_64.rpm     MD5: 4b7834fc2c19b0010c62a3c70edda69aSHA-256: 9c2c3eb9e77c84d62ea9c28487316b0d326d61bb5278ec7dd84220a522c046aa   Red Hat Enterprise Linux Server AUS (v. 6.4) SRPMS: bash-4.1.2-15.el6_4.1.src.rpm     MD5: 6a9a43ea30ea878f34829f77617e6bcfSHA-256: f36913f96ac8feced1d5583818e953607177287f639798da033b5709d4d814b7   x86_64: bash-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 2203a61b70470c0d769554f6bb1d5595SHA-256: a5eeb15d911ffea3eec36569ab260e74a34b9c1b53e41fdddebb7d2aa538a3be bash-debuginfo-4.1.2-15.el6_4.1.x86_64.rpm     MD5: cdbc91c3364e6a7b452fcb9cdb5927aaSHA-256: 45a4dad9016ba0ca01dde6039651a6dd67a649463247102de8f37bfaccef0e20 bash-doc-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 6575e7208030b9e516f781494378cfc0SHA-256: 5caea45de01c9d87274bba825e8637ae5605169e0f376e2ca7236c2866e274ac   Red Hat Enterprise Linux Server EUS (v. 6.4.z) SRPMS: bash-4.1.2-15.el6_4.1.src.rpm     MD5: 6a9a43ea30ea878f34829f77617e6bcfSHA-256: f36913f96ac8feced1d5583818e953607177287f639798da033b5709d4d814b7   IA-32: bash-4.1.2-15.el6_4.1.i686.rpm     MD5: e20adee273c65d2e6bde6b762ffbb4c3SHA-256: fee27cdafd664504c36c13ce752d9893eb987e9b16b6705ddd64849ae899d9b8 bash-debuginfo-4.1.2-15.el6_4.1.i686.rpm     MD5: e1cdb8fd8af5f66687614ca80c1e3435SHA-256: e5d67ab0a4d863ecb4ba015d0e1152eb61dbe7082e3bcb757548f1564210ca50 bash-doc-4.1.2-15.el6_4.1.i686.rpm     MD5: fd297708497fa5314b1743607ccef25aSHA-256: f843dbe375c7d0afce2e0d689c38e38465ac709fe254520d29a4113aefa03205   PPC: bash-4.1.2-15.el6_4.1.ppc64.rpm     MD5: a174af1349730837b1ea0c4bab1740cbSHA-256: d89519c8cf33c425d45fccd019d8afccd5c600f197d55ef91431de24975e807a bash-debuginfo-4.1.2-15.el6_4.1.ppc64.rpm     MD5: a11867a584636ba543cdddbc835e2134SHA-256: 9a000c48a2965d334b13419de5cae361d15d13ced0d939c946eebd3fc9bee70f bash-doc-4.1.2-15.el6_4.1.ppc64.rpm     MD5: cb1c5e42b4e5618c5d60312d6fa58af0SHA-256: f1ae58da6cc551644f76fe124b91c4eaf9abdff67eb3ea46de4ae0db3dbbdfec   s390x: bash-4.1.2-15.el6_4.1.s390x.rpm     MD5: 664beaae98005e91c595875633a4c702SHA-256: 4a2c86cd2df099bf887a1f6a599633228fa00c6ae2e9971c0f6055d72a80f1ad bash-debuginfo-4.1.2-15.el6_4.1.s390x.rpm     MD5: bb10e0e05ec8d377cf42c0440856bfaeSHA-256: d4fc1f76ee1764880e09b2b7e0bd7e325058ca2e7d213da9ae7ea147716f5cc7 bash-doc-4.1.2-15.el6_4.1.s390x.rpm     MD5: 652b335a5d0e12e497749fb6f3fdd726SHA-256: 53ed241961a634ff3e7fc39bd1f7877480e3d2deca4ed8957a661c828159f1a8   x86_64: bash-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 2203a61b70470c0d769554f6bb1d5595SHA-256: a5eeb15d911ffea3eec36569ab260e74a34b9c1b53e41fdddebb7d2aa538a3be bash-debuginfo-4.1.2-15.el6_4.1.x86_64.rpm     MD5: cdbc91c3364e6a7b452fcb9cdb5927aaSHA-256: 45a4dad9016ba0ca01dde6039651a6dd67a649463247102de8f37bfaccef0e20 bash-doc-4.1.2-15.el6_4.1.x86_64.rpm     MD5: 6575e7208030b9e516f781494378cfc0SHA-256: 5caea45de01c9d87274bba825e8637ae5605169e0f376e2ca7236c2866e274ac   (The unlinked packages above are only available from the Red Hat Network) 1141597 - CVE-2014-6271 bash: specially-crafted environment variables can be used to inject shell commands These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2015:0049-1: tree bug fix update

Updated tree packages that fix one bug are now available for Red Hat EnterpriseLinux 6. The tree package contains the tree utility that recursively displays thecontents of directories in a tree-like format. Tree is basically a UNIX port ofthe DOS tree utility.This update fixes the following bug:* Previously, buffer overflows could occur in the uidtoname() and gidtoname()functions of the tree utility. As a consequence, using the "tree" command insome cases failed and the following error message was displayed to the user:*** buffer overflow detected ***: tree terminatedAn upstream patch has been backported to fix the problem, and the tree utilitynow lists files as expected. (BZ#1110559)Users of tree are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux HPC Node FasTrack (v. 6) SRPMS: tree-1.5.3-3.el6.src.rpm     MD5: 980df97dc62c503821d77010aba0fb75SHA-256: 5fb94f51450ebb8d62d104929aee5ae86177a6ae72774728930cbefc1673fc99   x86_64: tree-1.5.3-3.el6.x86_64.rpm     MD5: 40c2a5f42f24140634e6f96a5a3cac71SHA-256: a2878b47fd434f1159e2b9afcec45e77f504b57697e8a745e960f27a9d3c2e3f tree-debuginfo-1.5.3-3.el6.x86_64.rpm     MD5: 2f7141b7c16c4b9bebca09240c3849e5SHA-256: 528a6e9bf1c568ce22e0a834cb6d9ca0e77d812d6ed259193e402f9b4b51b0a5   Red Hat Enterprise Linux Server FasTrack (v. 6) SRPMS: tree-1.5.3-3.el6.src.rpm     MD5: 980df97dc62c503821d77010aba0fb75SHA-256: 5fb94f51450ebb8d62d104929aee5ae86177a6ae72774728930cbefc1673fc99   IA-32: tree-1.5.3-3.el6.i686.rpm     MD5: 4cc4cce4de99b5e833e797afbbe51788SHA-256: 5bb1e6ba886763832e61ea5faec052f0158f5cbb7ac22235e6ce12257388d04e tree-debuginfo-1.5.3-3.el6.i686.rpm     MD5: 7872877024afb5e7e0cb5dd5eb6569ebSHA-256: 3a8d01a1f419e1afcc880faf99b020c001ec08d5eb36faee15a56f1b94082b17   PPC: tree-1.5.3-3.el6.ppc64.rpm     MD5: 11c4e97495ee589ad46d8b92cce42901SHA-256: 6f3665111bbce0a13556f823d08172018a8559622da889b07def28aa561a1751 tree-debuginfo-1.5.3-3.el6.ppc64.rpm     MD5: 4bb26cee8ffd1205358e2fc71929b5ffSHA-256: 1f369df9c84fc3ea2f1ad176bcc0d02507267cf0bffb8a7bd14068a0965b741d   s390x: tree-1.5.3-3.el6.s390x.rpm     MD5: 480283992e893d9ee1c544ca51c35680SHA-256: 9930ab00e23d41e9b0f07f8eff281f71eae2368a1bae3a599939f98f500756ad tree-debuginfo-1.5.3-3.el6.s390x.rpm     MD5: 78f4d3fef439f04f9806d0cb1d32d2a6SHA-256: e90e3348086b300afdb790795c7929659f3864bf2f82ae3e5c35db85656a5335   x86_64: tree-1.5.3-3.el6.x86_64.rpm     MD5: 40c2a5f42f24140634e6f96a5a3cac71SHA-256: a2878b47fd434f1159e2b9afcec45e77f504b57697e8a745e960f27a9d3c2e3f tree-debuginfo-1.5.3-3.el6.x86_64.rpm     MD5: 2f7141b7c16c4b9bebca09240c3849e5SHA-256: 528a6e9bf1c568ce22e0a834cb6d9ca0e77d812d6ed259193e402f9b4b51b0a5   Red Hat Enterprise Linux Workstation FasTrack (v. 6) SRPMS: tree-1.5.3-3.el6.src.rpm     MD5: 980df97dc62c503821d77010aba0fb75SHA-256: 5fb94f51450ebb8d62d104929aee5ae86177a6ae72774728930cbefc1673fc99   IA-32: tree-1.5.3-3.el6.i686.rpm     MD5: 4cc4cce4de99b5e833e797afbbe51788SHA-256: 5bb1e6ba886763832e61ea5faec052f0158f5cbb7ac22235e6ce12257388d04e tree-debuginfo-1.5.3-3.el6.i686.rpm     MD5: 7872877024afb5e7e0cb5dd5eb6569ebSHA-256: 3a8d01a1f419e1afcc880faf99b020c001ec08d5eb36faee15a56f1b94082b17   x86_64: tree-1.5.3-3.el6.x86_64.rpm     MD5: 40c2a5f42f24140634e6f96a5a3cac71SHA-256: a2878b47fd434f1159e2b9afcec45e77f504b57697e8a745e960f27a9d3c2e3f tree-debuginfo-1.5.3-3.el6.x86_64.rpm     MD5: 2f7141b7c16c4b9bebca09240c3849e5SHA-256: 528a6e9bf1c568ce22e0a834cb6d9ca0e77d812d6ed259193e402f9b4b51b0a5   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHEA-2015:1097-1: tcsh Shift_JIS enhancement update

Updated tcsh Shift_JIS packages that add one enhancement are now available forRed Hat Enterprise Linux 6. The tcsh packages provide an enhanced and widely compatible version of the Cshell (csh). Tcsh is a command language interpreter, which can be used as aninteractive login shell, as well as a shell script command processor. Shift JIS(SJIS) is a character encoding for the Japanese language. The "tcsh Shift_JIS"packages provide tcsh support for the SJIS encoding.This update adds the following enhancement:* To ensure mutual compatibility, the "tcsh Shift_JIS" packages have beenbrought up to date with the latest release of the base packages in Red HatEnterprise Linux 6. (BZ#1211103)All users who require SJIS encoding support with tcsh are advised to upgrade tothese updated packages, which add this enhancement. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise S-JIS Service SRPMS: tcsh-6.17-25.el6_6.sjis.1.src.rpm     MD5: af42b27e42cd9b241c3cd686b36b1b16SHA-256: c4d6f7161efc5e22c85f0584cdee709bf7ea7aed47561df84e05dde147d78a7d   IA-32: tcsh-6.17-25.el6_6.sjis.1.i686.rpm     MD5: 9525b553af4d45ccd26025fb025b493bSHA-256: 2cc09781ff08ddfaffc99da2f530c702f9f9cfc738516e10cab869a967f89960 tcsh-debuginfo-6.17-25.el6_6.sjis.1.i686.rpm     MD5: adfd5974964073df1b09faa4f5e103fdSHA-256: 1bb78cb8931a6d7d35334f4071bbf63698ad0d9edada18e60c97dfeb7478cf41   x86_64: tcsh-6.17-25.el6_6.sjis.1.x86_64.rpm     MD5: b406e4c10aba163419bcf4943a5249f3SHA-256: f22e0b9f0e10a7fe68ddcaabb5be9c42b049e33dc976b860ea4bcc31554b335c tcsh-debuginfo-6.17-25.el6_6.sjis.1.x86_64.rpm     MD5: 83efe1a233c85f8b7d8f49fead157dd5SHA-256: 31a2363274db98d30d1efc910a6bb7ae2a5fdf8cbefe3304eaab10b151f5ea32   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2015:0752-1: Moderate: openssl security update

Updated openssl packages that fix multiple security issues are nowavailable for Red Hat Storage 2.1.Red Hat Product Security has rated this update as having Moderate securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.An invalid pointer use flaw was found in OpenSSL's ASN1_TYPE_cmp()function. A remote attacker could crash a TLS/SSL client or server usingOpenSSL via a specially crafted X.509 certificate when theattacker-supplied certificate was verified by the application.(CVE-2015-0286)An integer underflow flaw, leading to a buffer overflow, was found in theway OpenSSL decoded malformed Base64-encoded inputs. An attacker able tomake an application using OpenSSL decode a specially crafted Base64-encodedinput (such as a PEM file) could use this flaw to cause the application tocrash. Note: this flaw is not exploitable via the TLS/SSL protocol becausethe data being transferred is not Base64-encoded. (CVE-2015-0292)A denial of service flaw was found in the way OpenSSL handled SSLv2handshake messages. A remote attacker could use this flaw to cause aTLS/SSL server using OpenSSL to exit on a failed assertion if it had boththe SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293)A use-after-free flaw was found in the way OpenSSL imported malformedElliptic Curve private keys. A specially crafted key file could cause anapplication using OpenSSL to crash when imported. (CVE-2015-0209)An out-of-bounds write flaw was found in the way OpenSSL reused certainASN.1 structures. A remote attacker could possibly use a specially craftedASN.1 structure that, when parsed by an application, would cause thatapplication to crash. (CVE-2015-0287)A NULL pointer dereference flaw was found in OpenSSL's X.509 certificatehandling implementation. A specially crafted X.509 certificate could causean application using OpenSSL to crash if the application attempted toconvert the certificate to a certificate request. (CVE-2015-0288)A NULL pointer dereference was found in the way OpenSSL handled certainPKCS#7 inputs. An attacker able to make an application using OpenSSLverify, decrypt, or parse a specially crafted PKCS#7 input could cause thatapplication to crash. TLS/SSL clients and servers using OpenSSL were notaffected by this flaw. (CVE-2015-0289)Red Hat would like to thank the OpenSSL project for reportingCVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292,and CVE-2015-0293. Upstream acknowledges Stephen Henson of the OpenSSLdevelopment team as the original reporter of CVE-2015-0286, Emilia Käsperof the OpenSSL development team as the original reporter of CVE-2015-0287,Brian Carpenter as the original reporter of CVE-2015-0288, Michal Zalewskiof Google as the original reporter of CVE-2015-0289, Robert Dugal and DavidRamos as the original reporters of CVE-2015-0292, and Sean Burford ofGoogle and Emilia Käsper of the OpenSSL development team as the originalreporters of CVE-2015-0293.All openssl users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library must be restarted, orthe system rebooted. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258 1196737 - CVE-2015-0209 openssl: use-after-free on invalid EC private key import1202366 - CVE-2015-0286 openssl: invalid pointer use in ASN1_TYPE_cmp()1202380 - CVE-2015-0287 openssl: ASN.1 structure reuse memory corruption1202384 - CVE-2015-0289 openssl: PKCS7 NULL pointer dereference1202395 - CVE-2015-0292 openssl: integer underflow leading to buffer overflow in base64 decoding1202404 - CVE-2015-0293 openssl: assertion failure in SSLv2 servers1202418 - CVE-2015-0288 openssl: X509_to_X509_REQ NULL pointer dereference These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2015:0736-1: sssd bug fix update

Red Hat Enterprise Linux Desktop (v. 7) SRPMS: sssd-1.12.2-58.el7_1.6.src.rpm     MD5: 2de5c951b13caff27020ee4bfeecbb31SHA-256: 746a398b0d0988b211467dfae7983ff1be8c5218c60c084b69dea058643f20cf   x86_64: libipa_hbac-1.12.2-58.el7_1.6.i686.rpm     MD5: 7cdfef2dbd5ed279c21a9092e120f55dSHA-256: b4ea342d580fb0cb6440aee918f9d093ed35dc87bb8bb9c0a5beadc20fcd0e28 libipa_hbac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 29d4cc4426b780643848ea094c1f09daSHA-256: c18c9f2845a01d45cfbb31f84ac103f5949ee241dbb2f9831523ecc12ca1d628 libipa_hbac-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: acd6601972c6d69af29fa92f117e18e9SHA-256: b5d5c68a2fcc33dbe48cb712b29fc030d502864fc446b9f0512ef4eac9481bb8 libipa_hbac-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c3bc98b6b5db713dd54c84fc3e304a4aSHA-256: b52893a2c389c30dee379778e2ccde77ea9212dc961acba9735a46c8c747860b libipa_hbac-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dabf7d1e2439dc85827eedc4f06a8c29SHA-256: 30a13344c9083a68b89e3804e7d6bd4da29bbc37c0b323514e3206ce5c1c3412 libsss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 1ac806a3be09d6a5d6c1b93bdfbc52fbSHA-256: 1aa066351850aedea973c8c5c4625798a85a77584ce3c7a220aebda68981812d libsss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 87955cccc505995c71da0aeee8d1f633SHA-256: a15375081dcb0984b59ce0730a0bf6a45b697223bfb495e33444ef2cabd4ff66 libsss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: f6290c995a6a5eb4de889da94c29f62cSHA-256: 8bc64bada2ac92ea95f8c71a465d3cc726c2c39b519b1196608bf145aabbaedc libsss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f5824db5325a66a0212abc6dc7674064SHA-256: 8f5cdff070d02816c45e6ab8abe866808ed8108087ee0a067c3c092bedf69384 libsss_nss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 820b546301c383e9d1e3e7083ebda499SHA-256: 1f390383e9b767bae16d37d1ae50e58b15edca56c2470a8f8422e454df0176ef libsss_nss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 6d3d649dec4a1c8ca85920d2a2901b02SHA-256: 31b61050b0aa70c2860f95fa2fee39ca498cf01dd7abd3bdb1a7f9796b40a3ac libsss_nss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: d2301255bcb9c8139835a173895b1addSHA-256: 2ad945dc0025b58ba23cadba61e156edfca890c30baaafe2d078aa9400eae4a6 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 03baea9825da45f421ecf9321bb1e7c1SHA-256: 6ab4d5255e1728f0a4f7c8ae4b61edf45afe518759d663d6bab338b2353b6feb libsss_nss_idmap-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 14e4f54092360d87fd6ecfc685cf8864SHA-256: 11960ade7b303d4866601513fcf478a76db75df5f34510a1379525a0a85b4b2c libsss_simpleifp-1.12.2-58.el7_1.6.i686.rpm     MD5: eaee55f735d1e1c21613712eb8709f26SHA-256: 0203ca7a1e52b0b7da0065d19907a1605773a633fe2192d5d409de3ddbc874e3 libsss_simpleifp-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bc7ba6aaecf0a3cc8df173f27d98bd8dSHA-256: 3bbfda26ea87b46ab244fe92fd0972b2c29924c4e89243ab75a57d5502bda87c libsss_simpleifp-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: c00fbfab47db14adc430ca9516429c3dSHA-256: be1ddc1cb7c552be9505fa6b68032ac28203b82eaabe8e6fe19471a2726ed45d libsss_simpleifp-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 997e6ebd2147a3f35f600b2d447de9a8SHA-256: c96d9ca583dbb71d450f7d3aa796ee7c2dcf541ad01c3ce0b4695181d0d40c03 python-sssdconfig-1.12.2-58.el7_1.6.noarch.rpm     MD5: f42cca7a4afe855b66c199be950f2775SHA-256: a976cd9706c574c62a83c85911c0ede3b816f49fd9e3d21231d14e25b09b60db sssd-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b267c072b1d2c4bf3fd299570015af5eSHA-256: 08e46bacf0ca528dcdbb7c9a8bff371275b8beeb672630abbbc2ae20497c6f63 sssd-ad-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dd377245a3ed36ec2d02797352ff0b3bSHA-256: e26d651d14aac894de26e52437b6944405f4dfd538970afca400cb883707c453 sssd-client-1.12.2-58.el7_1.6.i686.rpm     MD5: c8824834d4ca8b0e34944ca9761dc855SHA-256: cf8af5b85ebe9a10ae4340da225d39e8fecb9884f35b642aed374219e68dfbc9 sssd-client-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 3bcd2eeff9ace5e569195ef9bb5f93e3SHA-256: af2d395092399dcfd64be173822a2bd5596533afb7d10f57981737197f2dfd6c sssd-common-1.12.2-58.el7_1.6.i686.rpm     MD5: 32bf39efa3c939484ffec0f7fdabbc97SHA-256: 87602f1106accab04f9f6604ce1173e1fc5049e07ca78573d70e1bf112579b94 sssd-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 93ca54666bae2b7fc5d653111025d24eSHA-256: f3ee7c05cf7d431b277b7d8690db00dde495a357218dfcf2628e63f0093b59fe sssd-common-pac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 100abe3a4e2240b99184f0515317add4SHA-256: 460d171642015db8425c67a2b0e9220c6e9e4d11c96999ba83c0d8d8f0b7e14b sssd-dbus-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 2e28a45fbabeb4d1d9c28db326754d0dSHA-256: 780f3ad66ba0d65ec7843aa09ad628c6fa9bcc627431fc2c3dfd7d32ff8fafc8 sssd-debuginfo-1.12.2-58.el7_1.6.i686.rpm     MD5: 3b3de2cf2f3ac4d5b2da07cd8501accfSHA-256: 7e111ff5bb612e405a003e94ea9eb4213d783547bdce9356fa1a6b0f61b42aeb sssd-debuginfo-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b44f66da3f30672ce346d23d545cc971SHA-256: 4100d57c7e777bbd2aaac5df2f8f41eb0a42c6ceb40aad8daafe681f0dabcf0f sssd-ipa-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bfa50fffb90c7f95a4ddaec6b3a75317SHA-256: bf33eae76aabe7fa196b7a7918f375ab8f1f0f70d46b701cbb9a534044d12aca sssd-krb5-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b3db8e6c932eed74adc165defcaee508SHA-256: 01d4ca878a0cb2fe2e839e216c788722d96194633f5aad0fd4a0f015366eebbd sssd-krb5-common-1.12.2-58.el7_1.6.i686.rpm     MD5: f5dc5dde1cfb251e7e60d703e5783457SHA-256: e944b9595ae454e5de874fa56aef951b3e2e13e3d98e1c73dd46c17d44f43c36 sssd-krb5-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f46fc671d42ba07f1413313d0c1ae6b3SHA-256: 42ef65266f205916a5abf72c68d8b407a74779b2e0e232f6748ca947ca072646 sssd-ldap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 1b8f6bcd0615d381ce80808b704d7764SHA-256: fe20c4ba8cbf31a1783384f94a38fc908b1be26aeffbb59df446db9db5146913 sssd-libwbclient-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 408e866ab3749befb38307b711cbf325SHA-256: 2ce5830e45604b20ac0fb38a635889a34dce345c80279c15efef1125cd74f0ad sssd-libwbclient-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: 8f068e41d057b9d85895f9c1fc812c75SHA-256: 2c5b79ea71e2782dcffc77af158e908e01969399f20ef5d733963f346b563108 sssd-libwbclient-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 5a7f07af32a0cb88cd01698952e55883SHA-256: c898f9a813fe3bd892755407538250909174c4b88cfc75330c4112f2d7eadc61 sssd-proxy-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 223028293b2428e7e93de8c4f5729b39SHA-256: a8bbc4a272cf2901af50ad6ca6ce77567a1bb92f77b599259768a1745c2e2c85 sssd-tools-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c06b4559a2683df47939fde4264cb926SHA-256: 89ca189e67a43f0c2bc512e7fedc7106ea76b9c6ea5a8c864ebf1836ec2602a5   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: sssd-1.12.2-58.el7_1.6.src.rpm     MD5: 2de5c951b13caff27020ee4bfeecbb31SHA-256: 746a398b0d0988b211467dfae7983ff1be8c5218c60c084b69dea058643f20cf   x86_64: libipa_hbac-1.12.2-58.el7_1.6.i686.rpm     MD5: 7cdfef2dbd5ed279c21a9092e120f55dSHA-256: b4ea342d580fb0cb6440aee918f9d093ed35dc87bb8bb9c0a5beadc20fcd0e28 libipa_hbac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 29d4cc4426b780643848ea094c1f09daSHA-256: c18c9f2845a01d45cfbb31f84ac103f5949ee241dbb2f9831523ecc12ca1d628 libipa_hbac-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: acd6601972c6d69af29fa92f117e18e9SHA-256: b5d5c68a2fcc33dbe48cb712b29fc030d502864fc446b9f0512ef4eac9481bb8 libipa_hbac-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c3bc98b6b5db713dd54c84fc3e304a4aSHA-256: b52893a2c389c30dee379778e2ccde77ea9212dc961acba9735a46c8c747860b libipa_hbac-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dabf7d1e2439dc85827eedc4f06a8c29SHA-256: 30a13344c9083a68b89e3804e7d6bd4da29bbc37c0b323514e3206ce5c1c3412 libsss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 1ac806a3be09d6a5d6c1b93bdfbc52fbSHA-256: 1aa066351850aedea973c8c5c4625798a85a77584ce3c7a220aebda68981812d libsss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 87955cccc505995c71da0aeee8d1f633SHA-256: a15375081dcb0984b59ce0730a0bf6a45b697223bfb495e33444ef2cabd4ff66 libsss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: f6290c995a6a5eb4de889da94c29f62cSHA-256: 8bc64bada2ac92ea95f8c71a465d3cc726c2c39b519b1196608bf145aabbaedc libsss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f5824db5325a66a0212abc6dc7674064SHA-256: 8f5cdff070d02816c45e6ab8abe866808ed8108087ee0a067c3c092bedf69384 libsss_nss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 820b546301c383e9d1e3e7083ebda499SHA-256: 1f390383e9b767bae16d37d1ae50e58b15edca56c2470a8f8422e454df0176ef libsss_nss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 6d3d649dec4a1c8ca85920d2a2901b02SHA-256: 31b61050b0aa70c2860f95fa2fee39ca498cf01dd7abd3bdb1a7f9796b40a3ac libsss_nss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: d2301255bcb9c8139835a173895b1addSHA-256: 2ad945dc0025b58ba23cadba61e156edfca890c30baaafe2d078aa9400eae4a6 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 03baea9825da45f421ecf9321bb1e7c1SHA-256: 6ab4d5255e1728f0a4f7c8ae4b61edf45afe518759d663d6bab338b2353b6feb libsss_nss_idmap-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 14e4f54092360d87fd6ecfc685cf8864SHA-256: 11960ade7b303d4866601513fcf478a76db75df5f34510a1379525a0a85b4b2c libsss_simpleifp-1.12.2-58.el7_1.6.i686.rpm     MD5: eaee55f735d1e1c21613712eb8709f26SHA-256: 0203ca7a1e52b0b7da0065d19907a1605773a633fe2192d5d409de3ddbc874e3 libsss_simpleifp-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bc7ba6aaecf0a3cc8df173f27d98bd8dSHA-256: 3bbfda26ea87b46ab244fe92fd0972b2c29924c4e89243ab75a57d5502bda87c libsss_simpleifp-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: c00fbfab47db14adc430ca9516429c3dSHA-256: be1ddc1cb7c552be9505fa6b68032ac28203b82eaabe8e6fe19471a2726ed45d libsss_simpleifp-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 997e6ebd2147a3f35f600b2d447de9a8SHA-256: c96d9ca583dbb71d450f7d3aa796ee7c2dcf541ad01c3ce0b4695181d0d40c03 python-sssdconfig-1.12.2-58.el7_1.6.noarch.rpm     MD5: f42cca7a4afe855b66c199be950f2775SHA-256: a976cd9706c574c62a83c85911c0ede3b816f49fd9e3d21231d14e25b09b60db sssd-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b267c072b1d2c4bf3fd299570015af5eSHA-256: 08e46bacf0ca528dcdbb7c9a8bff371275b8beeb672630abbbc2ae20497c6f63 sssd-ad-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dd377245a3ed36ec2d02797352ff0b3bSHA-256: e26d651d14aac894de26e52437b6944405f4dfd538970afca400cb883707c453 sssd-client-1.12.2-58.el7_1.6.i686.rpm     MD5: c8824834d4ca8b0e34944ca9761dc855SHA-256: cf8af5b85ebe9a10ae4340da225d39e8fecb9884f35b642aed374219e68dfbc9 sssd-client-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 3bcd2eeff9ace5e569195ef9bb5f93e3SHA-256: af2d395092399dcfd64be173822a2bd5596533afb7d10f57981737197f2dfd6c sssd-common-1.12.2-58.el7_1.6.i686.rpm     MD5: 32bf39efa3c939484ffec0f7fdabbc97SHA-256: 87602f1106accab04f9f6604ce1173e1fc5049e07ca78573d70e1bf112579b94 sssd-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 93ca54666bae2b7fc5d653111025d24eSHA-256: f3ee7c05cf7d431b277b7d8690db00dde495a357218dfcf2628e63f0093b59fe sssd-common-pac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 100abe3a4e2240b99184f0515317add4SHA-256: 460d171642015db8425c67a2b0e9220c6e9e4d11c96999ba83c0d8d8f0b7e14b sssd-dbus-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 2e28a45fbabeb4d1d9c28db326754d0dSHA-256: 780f3ad66ba0d65ec7843aa09ad628c6fa9bcc627431fc2c3dfd7d32ff8fafc8 sssd-debuginfo-1.12.2-58.el7_1.6.i686.rpm     MD5: 3b3de2cf2f3ac4d5b2da07cd8501accfSHA-256: 7e111ff5bb612e405a003e94ea9eb4213d783547bdce9356fa1a6b0f61b42aeb sssd-debuginfo-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b44f66da3f30672ce346d23d545cc971SHA-256: 4100d57c7e777bbd2aaac5df2f8f41eb0a42c6ceb40aad8daafe681f0dabcf0f sssd-ipa-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bfa50fffb90c7f95a4ddaec6b3a75317SHA-256: bf33eae76aabe7fa196b7a7918f375ab8f1f0f70d46b701cbb9a534044d12aca sssd-krb5-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b3db8e6c932eed74adc165defcaee508SHA-256: 01d4ca878a0cb2fe2e839e216c788722d96194633f5aad0fd4a0f015366eebbd sssd-krb5-common-1.12.2-58.el7_1.6.i686.rpm     MD5: f5dc5dde1cfb251e7e60d703e5783457SHA-256: e944b9595ae454e5de874fa56aef951b3e2e13e3d98e1c73dd46c17d44f43c36 sssd-krb5-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f46fc671d42ba07f1413313d0c1ae6b3SHA-256: 42ef65266f205916a5abf72c68d8b407a74779b2e0e232f6748ca947ca072646 sssd-ldap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 1b8f6bcd0615d381ce80808b704d7764SHA-256: fe20c4ba8cbf31a1783384f94a38fc908b1be26aeffbb59df446db9db5146913 sssd-libwbclient-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 408e866ab3749befb38307b711cbf325SHA-256: 2ce5830e45604b20ac0fb38a635889a34dce345c80279c15efef1125cd74f0ad sssd-libwbclient-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: 8f068e41d057b9d85895f9c1fc812c75SHA-256: 2c5b79ea71e2782dcffc77af158e908e01969399f20ef5d733963f346b563108 sssd-libwbclient-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 5a7f07af32a0cb88cd01698952e55883SHA-256: c898f9a813fe3bd892755407538250909174c4b88cfc75330c4112f2d7eadc61 sssd-proxy-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 223028293b2428e7e93de8c4f5729b39SHA-256: a8bbc4a272cf2901af50ad6ca6ce77567a1bb92f77b599259768a1745c2e2c85 sssd-tools-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c06b4559a2683df47939fde4264cb926SHA-256: 89ca189e67a43f0c2bc512e7fedc7106ea76b9c6ea5a8c864ebf1836ec2602a5   Red Hat Enterprise Linux Server (v. 7) SRPMS: sssd-1.12.2-58.el7_1.6.src.rpm     MD5: 2de5c951b13caff27020ee4bfeecbb31SHA-256: 746a398b0d0988b211467dfae7983ff1be8c5218c60c084b69dea058643f20cf   PPC: libipa_hbac-1.12.2-58.el7_1.6.ppc.rpm     MD5: 079c0634593eda125ffc1564087c170fSHA-256: 2781b7336c07a466a582420db71adb7169618ed7b7d26fd2590f195c7421c0c0 libipa_hbac-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 9520da15fe70b50a2a6a4e339042f571SHA-256: 62fc9fa9235d34787b906c3fc16ac67d52c1c4f849c2dfcee546fd0ca92d7672 libipa_hbac-devel-1.12.2-58.el7_1.6.ppc.rpm     MD5: 3a9eb9729ecc819bdd986acb62306fb5SHA-256: 3e1d9bc2f19474c81891056016885649202d2a9c6c250b1bc5ab42978e2ad305 libipa_hbac-devel-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 52e2377b365fb71d03638f05337ad710SHA-256: 26f96f6cc5fc59a449df3a75390fdf02391e2bb2ebf769980d7ebb33e3f86f40 libipa_hbac-python-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 264aba6c687b47dcd8f477b60f4fb2aeSHA-256: e1c09db06d75c0ce6914065e9fe431a8b6159fd17596361cc51f9c952289d23f libsss_idmap-1.12.2-58.el7_1.6.ppc.rpm     MD5: c4d37f12940c71cb31e0a49cec663ab4SHA-256: 0bff17b357e73351155d40f21b9403b843ba459d09bea77933350d2c21d04ce6 libsss_idmap-1.12.2-58.el7_1.6.ppc64.rpm     MD5: e2c272d01810d164d362fe0d1bf7ba55SHA-256: 25d8fc7b3d7a6ff9872df1d9976b35d4c25d41273bc327d5f11136bc9b25c011 libsss_idmap-devel-1.12.2-58.el7_1.6.ppc.rpm     MD5: 76aff3e176f1c7c8f873e2d4641d0f20SHA-256: f18500f0089c696c77757e897675f5f791bea0fe849fd116b9e39853d9e7ce4c libsss_idmap-devel-1.12.2-58.el7_1.6.ppc64.rpm     MD5: a498e7a2e8314140842db7527bf062a6SHA-256: 668947986b898630299a296819b2409dc713abc9cb3c2fd16aab8e4cd4f76ec0 libsss_nss_idmap-1.12.2-58.el7_1.6.ppc.rpm     MD5: dd3efc9e34a88a2cb05288f3fb71e156SHA-256: d00a11bd4bb0ebb885a441bf99e46b12b60edbfb7ece83382adea9d451b00dc9 libsss_nss_idmap-1.12.2-58.el7_1.6.ppc64.rpm     MD5: d6ab4d217f7d3a0ed317eda83da6c70eSHA-256: 3928a81e47c3c2e6105b8e5762f5edac29940dcf278f3911f7e6e4b89568a1bd libsss_nss_idmap-devel-1.12.2-58.el7_1.6.ppc.rpm     MD5: ef3698feecadda20eca961423ef7bdc1SHA-256: 8bdb854c01599ad4245826e0fa856a6d929463e9dae537a9e521e95abc9814d6 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.ppc64.rpm     MD5: bef41ed53198f9cc986c73ee5cffc072SHA-256: 2ed85ab9969cadaadf914d307ea4dd6e22c79fc7a4d69e37316fecfd6da12897 libsss_nss_idmap-python-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 7c73346c1ad58ee128bdcd2916f552c3SHA-256: 405de2f051b53a0e2ee18055e43d93b0e3c0d1d245088a7b7ac4ad5c96e43c73 libsss_simpleifp-1.12.2-58.el7_1.6.ppc.rpm     MD5: 25e606d534b86651f055b29d17503664SHA-256: f6199028a51b49730b2a32f9a4045e4bd75737c3ed1e19d01578db390a9de23b libsss_simpleifp-1.12.2-58.el7_1.6.ppc64.rpm     MD5: fcc732ec41d1e922c4129be079a488dcSHA-256: 6f5c52891f0fa0d9bab41943f321b2ec6e4d98de00299161bb8ff0f33b264161 libsss_simpleifp-devel-1.12.2-58.el7_1.6.ppc.rpm     MD5: 459324848e050d5e0508041ff42a166fSHA-256: 47cc897e61c26efb821290bd1becdbf99e231fe80e3cbe2dfea9e0ad85fc75f0 libsss_simpleifp-devel-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 1ef1093b5e0e41cec38252286176ce48SHA-256: c96ad7927b38c791861fea49339de519eab0a4a7d98c00ba40ba444e50a04318 python-sssdconfig-1.12.2-58.el7_1.6.noarch.rpm     MD5: f42cca7a4afe855b66c199be950f2775SHA-256: a976cd9706c574c62a83c85911c0ede3b816f49fd9e3d21231d14e25b09b60db sssd-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 94fad314a917f0b91ceb4c39f23f671cSHA-256: 15ec082af54c26b3449e40368bfc894954394e9b2b312eb9969dc5b2920756fd sssd-ad-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 977151738638d855702f0f85d99b8603SHA-256: 306fdeabae7788882623303f4b3d537cdbbfe08c0cc3a3810a5a0a640cd66bef sssd-client-1.12.2-58.el7_1.6.ppc.rpm     MD5: 2395fa87d49f099b0a2b4a847bdf712dSHA-256: 08df549a22a425bc247683ad8deb223415d6e38ef0c90dcf2c8b7d5cce12f26f sssd-client-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 80a367295b601c0200cd43dcc3c01139SHA-256: 7cd0c3580a7939017b2994620f9e2b332535d75d1b2eeec61810cd37c1948b3a sssd-common-1.12.2-58.el7_1.6.ppc.rpm     MD5: ea830cc46d1d31f1ea625fe61bef3cb6SHA-256: 07d880615f878ac368338c35617551cece03e631f97042f3913b779a9d9d7757 sssd-common-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 6ba6b0240feb126c8a8b4806557e5ed1SHA-256: c4b051ab819386ff22ddd61b2f4224fbbc10aafec772de63ef763103ad1b865a sssd-common-pac-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 974ae70e0e3fc6b6ddbcd5a2f019fde0SHA-256: 0dd728a0265997c33c80107311f942bb344a8bb76df496715e13732ce78642f4 sssd-dbus-1.12.2-58.el7_1.6.ppc64.rpm     MD5: d25655a15537a5b08c79ae535acc6fe0SHA-256: 907a9ecd392a5e513c6f554e97eefa515e7cdcf32f62023a3da480a2909e973c sssd-debuginfo-1.12.2-58.el7_1.6.ppc.rpm     MD5: e0f6144c159a09842afa15fc3e12d987SHA-256: 6a5142768426cbe945e8a8c15219b2da57a377b75fae49a3045b645df7940850 sssd-debuginfo-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 29b7f2d6b6dfe5869bda5f7a70581297SHA-256: f07e5a8ade7a6613988710e7effdd8ba0b5e38c30b88a65fa93561e324aa95f0 sssd-ipa-1.12.2-58.el7_1.6.ppc64.rpm     MD5: a9aebca3b86323d05e56daaaaad851d4SHA-256: 936b53a2ce96ebb70dd91e999a73840f3d96ba3b73eeec0a5360c9f88206d320 sssd-krb5-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 369b695f6b77b25640f1ca98f4c6efffSHA-256: a70771ee1346e01e61bb0788b649261c7c60835611fbdda1eed193ffcbb47e7f sssd-krb5-common-1.12.2-58.el7_1.6.ppc.rpm     MD5: 9211e366d1849225ecb093f56f28670aSHA-256: 9d29703ca16cc2a1dc44d5f9d9ccc30a63695e3f0f4a4684992d89eb6b832309 sssd-krb5-common-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 6d4fb65c245490e6dfb0d1e0b7d6426cSHA-256: f0e5a0ec4eba5e303c382ef11c5bd81e5fa5309d36f107f9da7a048078fc94a9 sssd-ldap-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 408726f1a966d91449ecc0d0ac0339a1SHA-256: dad9e42fbab9101516154fda9cabf854ce1a97c1791290f094eddc163ba819c3 sssd-libwbclient-1.12.2-58.el7_1.6.ppc64.rpm     MD5: d5da981742099107f2cbea13570a8bf1SHA-256: 3bb783ecb74c873848504ec9cda159d418ae73b9e91729e28c5a1a194ac68432 sssd-libwbclient-devel-1.12.2-58.el7_1.6.ppc.rpm     MD5: 60ffb94f31e78a7e8cc2957ab9fb4b51SHA-256: b6756af9379e28952c73bde238672be2256fbd8313c459da237f919d64a6a913 sssd-libwbclient-devel-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 6964a0eee8f40a0f0443f7ed58a95720SHA-256: e13d46546b47127df5f00563034766bd8630504555447f06a28ed701679b9e93 sssd-proxy-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 7af977efca125b51cc934ff56b77eb59SHA-256: e23d5bc4bb0313c79ef13faec5385d6568b19a5f0843579f394da64b50c16bde sssd-tools-1.12.2-58.el7_1.6.ppc64.rpm     MD5: 7cce2416efcc55e3e2c2fec300449769SHA-256: ac8f3c6655cc26081eadcb9fc9de2fd87305f9318b9c3765661624bcde7e46d7   s390x: libipa_hbac-1.12.2-58.el7_1.6.s390.rpm     MD5: d2c4c9737c6b8afdd9adb87d5a8a1b0bSHA-256: 74a7aa8839c88d820bacc56c4be0a8f2697967199a4f36f06ad594e5af798251 libipa_hbac-1.12.2-58.el7_1.6.s390x.rpm     MD5: 51b02c1a0a5e25a95a79227bb15e0ca9SHA-256: 1ce3b4728e5f025ab6555cce4c6e749d43f64cca9777250e70e3840ade1a32e3 libipa_hbac-devel-1.12.2-58.el7_1.6.s390.rpm     MD5: 2ef8cef56ba23d5640fec20bf39b6862SHA-256: 2fb9ae70b6c3d794a118b2810d3b99b5737e713c4322efb14849b7bd98749dfb libipa_hbac-devel-1.12.2-58.el7_1.6.s390x.rpm     MD5: 608324f4f09c6db4621136fdb8506141SHA-256: cdc8d62ffa60b52e7161ac943c8e595f7342a21b530dfe02c3b89f30adb2a188 libipa_hbac-python-1.12.2-58.el7_1.6.s390x.rpm     MD5: 5349cd4870dd74b81eb4e4c51edf80c8SHA-256: 5de04d072de11927e08919ca360fd2217a262492c68e7d3737f50fe6fa011eab libsss_idmap-1.12.2-58.el7_1.6.s390.rpm     MD5: b6bbacf67b613e6421698993d63e73aaSHA-256: 56f11c4eb6e7480fe7df7ae03ab61bd3016359dde110e23a5be0ab21d77c6555 libsss_idmap-1.12.2-58.el7_1.6.s390x.rpm     MD5: 5f183a1c0406d9c9312f1f89dc999324SHA-256: 31c2c2328fe232a0695effed9201ebe808c4e3f2f780a721b388694e1a1d4fc1 libsss_idmap-devel-1.12.2-58.el7_1.6.s390.rpm     MD5: 52d8def1598233259eb3d306a3503923SHA-256: 926fdbdffa85f140455eb0f29f311af992d53c32a54fa643da467918c7ca3301 libsss_idmap-devel-1.12.2-58.el7_1.6.s390x.rpm     MD5: beff48e60240389b24062881bf4a9710SHA-256: d98820cc9d5091a56cabea0ba824324be5d4b1b54f6c020d356ced0aedb9da75 libsss_nss_idmap-1.12.2-58.el7_1.6.s390.rpm     MD5: 1889bbe40f55a3eb6cffcc2818e5c2c6SHA-256: fca378e6df8976f9bf5480dc6d458deb6bdb16bd3c46c2b2267fd908c2419c64 libsss_nss_idmap-1.12.2-58.el7_1.6.s390x.rpm     MD5: 9ffd5fd21d7259a40ddb1656490d6bf8SHA-256: d8a4eaa5930e827cb3f5912081e9ea54fe302f30305b6feaf5a22fe0cafe8061 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.s390.rpm     MD5: cd5d431caf4050dc079ee473e2e301e1SHA-256: e42c91dc3acef17773c45adb75816ba8cba7c45c15d10c5b224c371eed7d3df9 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.s390x.rpm     MD5: 80cba014a5888b71a1a01f21060b3b77SHA-256: e726956a9cc2d3597f4d945dc1c4e1c4641dc5134ff20815774263ada14bf00a libsss_nss_idmap-python-1.12.2-58.el7_1.6.s390x.rpm     MD5: 3cbb3eedaa9e03528b4979ccebbbf960SHA-256: 39c038d0a507e8cd8701dd8b04acab39cd3866ab21ea9b13ade4289a90d67b2e libsss_simpleifp-1.12.2-58.el7_1.6.s390.rpm     MD5: 87a950d0da628726943f075c252936b2SHA-256: f827d160fa738b885959e315ab03a29cb606de6d362dea3c9fe98644b0fa52f9 libsss_simpleifp-1.12.2-58.el7_1.6.s390x.rpm     MD5: c04353e5b6bf1d99e26200bbc584acb2SHA-256: 516dcb774a558ab0703be84fcea2b491621272fa22e1a70f695f39b47cd68573 libsss_simpleifp-devel-1.12.2-58.el7_1.6.s390.rpm     MD5: 3e91023e7329f9920703f265340754dcSHA-256: d6a5429e07c47bc18766d339f156a6b1a3d361503a8b9ea573dca5232efe0219 libsss_simpleifp-devel-1.12.2-58.el7_1.6.s390x.rpm     MD5: d71203e63be449dffb56046418b82a2dSHA-256: 9034ceb0a0cd4e5248696edce83f9121926f77a808d0c4dd5435c102cb82ba4d python-sssdconfig-1.12.2-58.el7_1.6.noarch.rpm     MD5: f42cca7a4afe855b66c199be950f2775SHA-256: a976cd9706c574c62a83c85911c0ede3b816f49fd9e3d21231d14e25b09b60db sssd-1.12.2-58.el7_1.6.s390x.rpm     MD5: d2c3398b9985003a03e2b8188eecad87SHA-256: 38fde0cb6d1456b0ee7dfdc123fb14e53b8259b460e809d7c7f6776d58afbca6 sssd-ad-1.12.2-58.el7_1.6.s390x.rpm     MD5: 5544948ea582bb6b2ca0fa08f70ee5a3SHA-256: eab6a9d28cca3cec98b2aaaeafa0b6e72bba14b0701ad129d13af7f743693edc sssd-client-1.12.2-58.el7_1.6.s390.rpm     MD5: 2a920265a21dc1a055fbe15a5a6521a7SHA-256: befadc2e5d71c508cae7117e606b280a4d9ce3ceef9bdb62cb065a677fae10e2 sssd-client-1.12.2-58.el7_1.6.s390x.rpm     MD5: 01e7e76541fc4a2fa532f415a9d8924aSHA-256: c83599b10bc0a79b4cef9355027e2ccda184064000bc8adea2bbb1212b6720e0 sssd-common-1.12.2-58.el7_1.6.s390.rpm     MD5: 75a144ec1b45929872d62ebfcd4f38bbSHA-256: 71748195755ac610e66dfe7036109e6cf2ba5b000e754cbb691e7b085dcfc39e sssd-common-1.12.2-58.el7_1.6.s390x.rpm     MD5: 093f5d41279a4049db6bf5e4e3f1fe8fSHA-256: 75db212ed6e8163edb3f64bad6dde10549ff158bf0f16dbea121941def2d2a6b sssd-common-pac-1.12.2-58.el7_1.6.s390x.rpm     MD5: 0e13fd9674811b799b77b4fbe54fb6ebSHA-256: 1c4bb15a692dbdebca5f60ace7c9bd19215a3e38704677789fcadb8ff7585a69 sssd-dbus-1.12.2-58.el7_1.6.s390x.rpm     MD5: 0543ce24e6c77f308ea481005e7e4874SHA-256: 031a4abd703bb97366854aaba698646fd673d03b8bacb4145b70aba34b0c2374 sssd-debuginfo-1.12.2-58.el7_1.6.s390.rpm     MD5: ff0c60e23d6ee4de1036e64a879fa416SHA-256: fa0419769f5dee6fcf363ad9e58d786b5146bbfe82d7b7c02a7228431f7e5435 sssd-debuginfo-1.12.2-58.el7_1.6.s390x.rpm     MD5: 78634fa47d0d44d289c71aa87f8bc711SHA-256: ce71b53e694b2f7976847e3c035dc239052b7143a08a31ea40d913cea4e12c81 sssd-ipa-1.12.2-58.el7_1.6.s390x.rpm     MD5: 81872d520d353b6a23fcbb02514afa59SHA-256: e505c0cb252ec94499f34977e5cf7e2cdc96705a3ef7a11e296bdd2a3e21728e sssd-krb5-1.12.2-58.el7_1.6.s390x.rpm     MD5: f291f526da935f1e1af484d531878312SHA-256: 01cfcb856c8fec604027fdb397e3c9af1fda4cd42df5cf8d9c0370401f436451 sssd-krb5-common-1.12.2-58.el7_1.6.s390.rpm     MD5: 160935564ea0b9d27c79ea0e66f35955SHA-256: 08b0daa0b28feef524a7aa5d9581a3fe61fa44930865987309a70d08634bb8ff sssd-krb5-common-1.12.2-58.el7_1.6.s390x.rpm     MD5: ada01295baa497afc18d15c209024741SHA-256: 257b39d318fcde6d4ee15fb37aa764b03b355387642a78ed78027123a437c925 sssd-ldap-1.12.2-58.el7_1.6.s390x.rpm     MD5: ef00daada11ca4e278beb6721754a5a9SHA-256: 544b08edc7d38bd102dfe2d26af41aa3eadd97946de7f424979158eff6b23417 sssd-libwbclient-1.12.2-58.el7_1.6.s390x.rpm     MD5: 8ba879441f66a41ae619beaeeab44b5dSHA-256: 2330190b67cc23758160c5e3f5f81f89967e08fa47ad4ea3edeeaf4ce4d57358 sssd-libwbclient-devel-1.12.2-58.el7_1.6.s390.rpm     MD5: 2865d5b0f05e338d9c97a42ced3c4132SHA-256: af6308153b0e2cc074452e61a54330ebd972b15f08c985743841a1fb8b0d41e8 sssd-libwbclient-devel-1.12.2-58.el7_1.6.s390x.rpm     MD5: a30701c3ad3d19af2fc33f5711dfb8b5SHA-256: 4a091a000a5cf3a13f97b58dcd07187d332d609dc65bf06c2cb2448bab979928 sssd-proxy-1.12.2-58.el7_1.6.s390x.rpm     MD5: 4b3179009840f36fc98406c0f31eec17SHA-256: a39d92d89d8670b29f0eda48a9ce5496356dd0b0199c1d8180cd3e6d9162e1e0 sssd-tools-1.12.2-58.el7_1.6.s390x.rpm     MD5: 7c28b109c79a29d1c6a19a3d69c9e7eeSHA-256: 7d1643540be6aaa50ebd84ea2cddba2cfa84e8c080dbf468efcb7e5cb3ae032c   x86_64: libipa_hbac-1.12.2-58.el7_1.6.i686.rpm     MD5: 7cdfef2dbd5ed279c21a9092e120f55dSHA-256: b4ea342d580fb0cb6440aee918f9d093ed35dc87bb8bb9c0a5beadc20fcd0e28 libipa_hbac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 29d4cc4426b780643848ea094c1f09daSHA-256: c18c9f2845a01d45cfbb31f84ac103f5949ee241dbb2f9831523ecc12ca1d628 libipa_hbac-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: acd6601972c6d69af29fa92f117e18e9SHA-256: b5d5c68a2fcc33dbe48cb712b29fc030d502864fc446b9f0512ef4eac9481bb8 libipa_hbac-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c3bc98b6b5db713dd54c84fc3e304a4aSHA-256: b52893a2c389c30dee379778e2ccde77ea9212dc961acba9735a46c8c747860b libipa_hbac-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dabf7d1e2439dc85827eedc4f06a8c29SHA-256: 30a13344c9083a68b89e3804e7d6bd4da29bbc37c0b323514e3206ce5c1c3412 libsss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 1ac806a3be09d6a5d6c1b93bdfbc52fbSHA-256: 1aa066351850aedea973c8c5c4625798a85a77584ce3c7a220aebda68981812d libsss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 87955cccc505995c71da0aeee8d1f633SHA-256: a15375081dcb0984b59ce0730a0bf6a45b697223bfb495e33444ef2cabd4ff66 libsss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: f6290c995a6a5eb4de889da94c29f62cSHA-256: 8bc64bada2ac92ea95f8c71a465d3cc726c2c39b519b1196608bf145aabbaedc libsss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f5824db5325a66a0212abc6dc7674064SHA-256: 8f5cdff070d02816c45e6ab8abe866808ed8108087ee0a067c3c092bedf69384 libsss_nss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 820b546301c383e9d1e3e7083ebda499SHA-256: 1f390383e9b767bae16d37d1ae50e58b15edca56c2470a8f8422e454df0176ef libsss_nss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 6d3d649dec4a1c8ca85920d2a2901b02SHA-256: 31b61050b0aa70c2860f95fa2fee39ca498cf01dd7abd3bdb1a7f9796b40a3ac libsss_nss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: d2301255bcb9c8139835a173895b1addSHA-256: 2ad945dc0025b58ba23cadba61e156edfca890c30baaafe2d078aa9400eae4a6 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 03baea9825da45f421ecf9321bb1e7c1SHA-256: 6ab4d5255e1728f0a4f7c8ae4b61edf45afe518759d663d6bab338b2353b6feb libsss_nss_idmap-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 14e4f54092360d87fd6ecfc685cf8864SHA-256: 11960ade7b303d4866601513fcf478a76db75df5f34510a1379525a0a85b4b2c libsss_simpleifp-1.12.2-58.el7_1.6.i686.rpm     MD5: eaee55f735d1e1c21613712eb8709f26SHA-256: 0203ca7a1e52b0b7da0065d19907a1605773a633fe2192d5d409de3ddbc874e3 libsss_simpleifp-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bc7ba6aaecf0a3cc8df173f27d98bd8dSHA-256: 3bbfda26ea87b46ab244fe92fd0972b2c29924c4e89243ab75a57d5502bda87c libsss_simpleifp-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: c00fbfab47db14adc430ca9516429c3dSHA-256: be1ddc1cb7c552be9505fa6b68032ac28203b82eaabe8e6fe19471a2726ed45d libsss_simpleifp-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 997e6ebd2147a3f35f600b2d447de9a8SHA-256: c96d9ca583dbb71d450f7d3aa796ee7c2dcf541ad01c3ce0b4695181d0d40c03 python-sssdconfig-1.12.2-58.el7_1.6.noarch.rpm     MD5: f42cca7a4afe855b66c199be950f2775SHA-256: a976cd9706c574c62a83c85911c0ede3b816f49fd9e3d21231d14e25b09b60db sssd-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b267c072b1d2c4bf3fd299570015af5eSHA-256: 08e46bacf0ca528dcdbb7c9a8bff371275b8beeb672630abbbc2ae20497c6f63 sssd-ad-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dd377245a3ed36ec2d02797352ff0b3bSHA-256: e26d651d14aac894de26e52437b6944405f4dfd538970afca400cb883707c453 sssd-client-1.12.2-58.el7_1.6.i686.rpm     MD5: c8824834d4ca8b0e34944ca9761dc855SHA-256: cf8af5b85ebe9a10ae4340da225d39e8fecb9884f35b642aed374219e68dfbc9 sssd-client-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 3bcd2eeff9ace5e569195ef9bb5f93e3SHA-256: af2d395092399dcfd64be173822a2bd5596533afb7d10f57981737197f2dfd6c sssd-common-1.12.2-58.el7_1.6.i686.rpm     MD5: 32bf39efa3c939484ffec0f7fdabbc97SHA-256: 87602f1106accab04f9f6604ce1173e1fc5049e07ca78573d70e1bf112579b94 sssd-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 93ca54666bae2b7fc5d653111025d24eSHA-256: f3ee7c05cf7d431b277b7d8690db00dde495a357218dfcf2628e63f0093b59fe sssd-common-pac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 100abe3a4e2240b99184f0515317add4SHA-256: 460d171642015db8425c67a2b0e9220c6e9e4d11c96999ba83c0d8d8f0b7e14b sssd-dbus-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 2e28a45fbabeb4d1d9c28db326754d0dSHA-256: 780f3ad66ba0d65ec7843aa09ad628c6fa9bcc627431fc2c3dfd7d32ff8fafc8 sssd-debuginfo-1.12.2-58.el7_1.6.i686.rpm     MD5: 3b3de2cf2f3ac4d5b2da07cd8501accfSHA-256: 7e111ff5bb612e405a003e94ea9eb4213d783547bdce9356fa1a6b0f61b42aeb sssd-debuginfo-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b44f66da3f30672ce346d23d545cc971SHA-256: 4100d57c7e777bbd2aaac5df2f8f41eb0a42c6ceb40aad8daafe681f0dabcf0f sssd-ipa-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bfa50fffb90c7f95a4ddaec6b3a75317SHA-256: bf33eae76aabe7fa196b7a7918f375ab8f1f0f70d46b701cbb9a534044d12aca sssd-krb5-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b3db8e6c932eed74adc165defcaee508SHA-256: 01d4ca878a0cb2fe2e839e216c788722d96194633f5aad0fd4a0f015366eebbd sssd-krb5-common-1.12.2-58.el7_1.6.i686.rpm     MD5: f5dc5dde1cfb251e7e60d703e5783457SHA-256: e944b9595ae454e5de874fa56aef951b3e2e13e3d98e1c73dd46c17d44f43c36 sssd-krb5-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f46fc671d42ba07f1413313d0c1ae6b3SHA-256: 42ef65266f205916a5abf72c68d8b407a74779b2e0e232f6748ca947ca072646 sssd-ldap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 1b8f6bcd0615d381ce80808b704d7764SHA-256: fe20c4ba8cbf31a1783384f94a38fc908b1be26aeffbb59df446db9db5146913 sssd-libwbclient-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 408e866ab3749befb38307b711cbf325SHA-256: 2ce5830e45604b20ac0fb38a635889a34dce345c80279c15efef1125cd74f0ad sssd-libwbclient-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: 8f068e41d057b9d85895f9c1fc812c75SHA-256: 2c5b79ea71e2782dcffc77af158e908e01969399f20ef5d733963f346b563108 sssd-libwbclient-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 5a7f07af32a0cb88cd01698952e55883SHA-256: c898f9a813fe3bd892755407538250909174c4b88cfc75330c4112f2d7eadc61 sssd-proxy-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 223028293b2428e7e93de8c4f5729b39SHA-256: a8bbc4a272cf2901af50ad6ca6ce77567a1bb92f77b599259768a1745c2e2c85 sssd-tools-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c06b4559a2683df47939fde4264cb926SHA-256: 89ca189e67a43f0c2bc512e7fedc7106ea76b9c6ea5a8c864ebf1836ec2602a5   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: sssd-1.12.2-58.el7_1.6.src.rpm     MD5: 2de5c951b13caff27020ee4bfeecbb31SHA-256: 746a398b0d0988b211467dfae7983ff1be8c5218c60c084b69dea058643f20cf   x86_64: libipa_hbac-1.12.2-58.el7_1.6.i686.rpm     MD5: 7cdfef2dbd5ed279c21a9092e120f55dSHA-256: b4ea342d580fb0cb6440aee918f9d093ed35dc87bb8bb9c0a5beadc20fcd0e28 libipa_hbac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 29d4cc4426b780643848ea094c1f09daSHA-256: c18c9f2845a01d45cfbb31f84ac103f5949ee241dbb2f9831523ecc12ca1d628 libipa_hbac-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: acd6601972c6d69af29fa92f117e18e9SHA-256: b5d5c68a2fcc33dbe48cb712b29fc030d502864fc446b9f0512ef4eac9481bb8 libipa_hbac-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c3bc98b6b5db713dd54c84fc3e304a4aSHA-256: b52893a2c389c30dee379778e2ccde77ea9212dc961acba9735a46c8c747860b libipa_hbac-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dabf7d1e2439dc85827eedc4f06a8c29SHA-256: 30a13344c9083a68b89e3804e7d6bd4da29bbc37c0b323514e3206ce5c1c3412 libsss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 1ac806a3be09d6a5d6c1b93bdfbc52fbSHA-256: 1aa066351850aedea973c8c5c4625798a85a77584ce3c7a220aebda68981812d libsss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 87955cccc505995c71da0aeee8d1f633SHA-256: a15375081dcb0984b59ce0730a0bf6a45b697223bfb495e33444ef2cabd4ff66 libsss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: f6290c995a6a5eb4de889da94c29f62cSHA-256: 8bc64bada2ac92ea95f8c71a465d3cc726c2c39b519b1196608bf145aabbaedc libsss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f5824db5325a66a0212abc6dc7674064SHA-256: 8f5cdff070d02816c45e6ab8abe866808ed8108087ee0a067c3c092bedf69384 libsss_nss_idmap-1.12.2-58.el7_1.6.i686.rpm     MD5: 820b546301c383e9d1e3e7083ebda499SHA-256: 1f390383e9b767bae16d37d1ae50e58b15edca56c2470a8f8422e454df0176ef libsss_nss_idmap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 6d3d649dec4a1c8ca85920d2a2901b02SHA-256: 31b61050b0aa70c2860f95fa2fee39ca498cf01dd7abd3bdb1a7f9796b40a3ac libsss_nss_idmap-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: d2301255bcb9c8139835a173895b1addSHA-256: 2ad945dc0025b58ba23cadba61e156edfca890c30baaafe2d078aa9400eae4a6 libsss_nss_idmap-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 03baea9825da45f421ecf9321bb1e7c1SHA-256: 6ab4d5255e1728f0a4f7c8ae4b61edf45afe518759d663d6bab338b2353b6feb libsss_nss_idmap-python-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 14e4f54092360d87fd6ecfc685cf8864SHA-256: 11960ade7b303d4866601513fcf478a76db75df5f34510a1379525a0a85b4b2c libsss_simpleifp-1.12.2-58.el7_1.6.i686.rpm     MD5: eaee55f735d1e1c21613712eb8709f26SHA-256: 0203ca7a1e52b0b7da0065d19907a1605773a633fe2192d5d409de3ddbc874e3 libsss_simpleifp-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bc7ba6aaecf0a3cc8df173f27d98bd8dSHA-256: 3bbfda26ea87b46ab244fe92fd0972b2c29924c4e89243ab75a57d5502bda87c libsss_simpleifp-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: c00fbfab47db14adc430ca9516429c3dSHA-256: be1ddc1cb7c552be9505fa6b68032ac28203b82eaabe8e6fe19471a2726ed45d libsss_simpleifp-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 997e6ebd2147a3f35f600b2d447de9a8SHA-256: c96d9ca583dbb71d450f7d3aa796ee7c2dcf541ad01c3ce0b4695181d0d40c03 python-sssdconfig-1.12.2-58.el7_1.6.noarch.rpm     MD5: f42cca7a4afe855b66c199be950f2775SHA-256: a976cd9706c574c62a83c85911c0ede3b816f49fd9e3d21231d14e25b09b60db sssd-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b267c072b1d2c4bf3fd299570015af5eSHA-256: 08e46bacf0ca528dcdbb7c9a8bff371275b8beeb672630abbbc2ae20497c6f63 sssd-ad-1.12.2-58.el7_1.6.x86_64.rpm     MD5: dd377245a3ed36ec2d02797352ff0b3bSHA-256: e26d651d14aac894de26e52437b6944405f4dfd538970afca400cb883707c453 sssd-client-1.12.2-58.el7_1.6.i686.rpm     MD5: c8824834d4ca8b0e34944ca9761dc855SHA-256: cf8af5b85ebe9a10ae4340da225d39e8fecb9884f35b642aed374219e68dfbc9 sssd-client-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 3bcd2eeff9ace5e569195ef9bb5f93e3SHA-256: af2d395092399dcfd64be173822a2bd5596533afb7d10f57981737197f2dfd6c sssd-common-1.12.2-58.el7_1.6.i686.rpm     MD5: 32bf39efa3c939484ffec0f7fdabbc97SHA-256: 87602f1106accab04f9f6604ce1173e1fc5049e07ca78573d70e1bf112579b94 sssd-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 93ca54666bae2b7fc5d653111025d24eSHA-256: f3ee7c05cf7d431b277b7d8690db00dde495a357218dfcf2628e63f0093b59fe sssd-common-pac-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 100abe3a4e2240b99184f0515317add4SHA-256: 460d171642015db8425c67a2b0e9220c6e9e4d11c96999ba83c0d8d8f0b7e14b sssd-dbus-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 2e28a45fbabeb4d1d9c28db326754d0dSHA-256: 780f3ad66ba0d65ec7843aa09ad628c6fa9bcc627431fc2c3dfd7d32ff8fafc8 sssd-debuginfo-1.12.2-58.el7_1.6.i686.rpm     MD5: 3b3de2cf2f3ac4d5b2da07cd8501accfSHA-256: 7e111ff5bb612e405a003e94ea9eb4213d783547bdce9356fa1a6b0f61b42aeb sssd-debuginfo-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b44f66da3f30672ce346d23d545cc971SHA-256: 4100d57c7e777bbd2aaac5df2f8f41eb0a42c6ceb40aad8daafe681f0dabcf0f sssd-ipa-1.12.2-58.el7_1.6.x86_64.rpm     MD5: bfa50fffb90c7f95a4ddaec6b3a75317SHA-256: bf33eae76aabe7fa196b7a7918f375ab8f1f0f70d46b701cbb9a534044d12aca sssd-krb5-1.12.2-58.el7_1.6.x86_64.rpm     MD5: b3db8e6c932eed74adc165defcaee508SHA-256: 01d4ca878a0cb2fe2e839e216c788722d96194633f5aad0fd4a0f015366eebbd sssd-krb5-common-1.12.2-58.el7_1.6.i686.rpm     MD5: f5dc5dde1cfb251e7e60d703e5783457SHA-256: e944b9595ae454e5de874fa56aef951b3e2e13e3d98e1c73dd46c17d44f43c36 sssd-krb5-common-1.12.2-58.el7_1.6.x86_64.rpm     MD5: f46fc671d42ba07f1413313d0c1ae6b3SHA-256: 42ef65266f205916a5abf72c68d8b407a74779b2e0e232f6748ca947ca072646 sssd-ldap-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 1b8f6bcd0615d381ce80808b704d7764SHA-256: fe20c4ba8cbf31a1783384f94a38fc908b1be26aeffbb59df446db9db5146913 sssd-libwbclient-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 408e866ab3749befb38307b711cbf325SHA-256: 2ce5830e45604b20ac0fb38a635889a34dce345c80279c15efef1125cd74f0ad sssd-libwbclient-devel-1.12.2-58.el7_1.6.i686.rpm     MD5: 8f068e41d057b9d85895f9c1fc812c75SHA-256: 2c5b79ea71e2782dcffc77af158e908e01969399f20ef5d733963f346b563108 sssd-libwbclient-devel-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 5a7f07af32a0cb88cd01698952e55883SHA-256: c898f9a813fe3bd892755407538250909174c4b88cfc75330c4112f2d7eadc61 sssd-proxy-1.12.2-58.el7_1.6.x86_64.rpm     MD5: 223028293b2428e7e93de8c4f5729b39SHA-256: a8bbc4a272cf2901af50ad6ca6ce77567a1bb92f77b599259768a1745c2e2c85 sssd-tools-1.12.2-58.el7_1.6.x86_64.rpm     MD5: c06b4559a2683df47939fde4264cb926SHA-256: 89ca189e67a43f0c2bc512e7fedc7106ea76b9c6ea5a8c864ebf1836ec2602a5   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:1027-1: device-mapper-multipath bug fix update

Updated device-mapper-multipath packages that fix one bug are now available forRed Hat Enterprise Linux 7. The device-mapper-multipath packages provide tools that use the device-mappermultipath kernel module to manage multipath devices.This update fixes the following bug:* Previously, the kpartx tool was by default returning without waiting fordevices to be created.

As a consequence, the devices did not exist immediatelyafter kpartx returned, which was unexpected. With this update, kpartx by defaultwaits until the devices are created before returning, and the described problemno longer occurs. (BZ#1330480)Users of device-mapper-multipath are advised to upgrade to these updatedpackages, which fix this bug. Red Hat Enterprise Linux Desktop (v. 7) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   Red Hat Enterprise Linux HPC Node EUS (v. 7.2) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   Red Hat Enterprise Linux Server (v. 7) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   PPC: device-mapper-multipath-0.4.9-85.el7_2.4.ppc64.rpm     MD5: b4ad4f28c5703a9ae7199389b77c1552SHA-256: d0a86116c288b3e0f2b969abea3b46cf0aead0cd7ed31d14c234bc3587eaf8e8 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.ppc.rpm     MD5: bfd024d756bbc30559c97e0220e19a35SHA-256: 43a8e387671a374c61434e8a9bd0fcd085cf486b3d3df36eb87c257e9074c87e device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 23a9f557fe9b406e3f6e4ec313008db9SHA-256: 7e56490d6fd29389b466155cd8188016a12f3ebee49c07c7c23400fd4579753d device-mapper-multipath-libs-0.4.9-85.el7_2.4.ppc.rpm     MD5: a2b605ab028b37f5e7650d4e0c4a6603SHA-256: 769150ea4cf4bd1e2cf9e4719faf21fcbe90e7078c001e46e0dac656c172cda7 device-mapper-multipath-libs-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 6a483901bf8ff6e7ce586117adc2b03aSHA-256: 6c9cedd8f97c3bd37fc2066def989caae8d922674b30c910313324ad14aab514 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 526575701aa659b220e6e53288653e4aSHA-256: 17fec0e03beaacd3c1d57ab07f60c57fcb0bcb172a071845503adbb5f2a5b044 kpartx-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 87170731e033b9aa2f0468b4034b5eabSHA-256: 1278808cdab415f4e07176324994d04d0a1aa6d90ffaf01ade21c4e31af3acd0   PPC64LE: device-mapper-multipath-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 3f5ac766831669c8419a09de2b90a7fcSHA-256: c9772f824f3236aa41b162dced9ab6e2796d2ee2d4fc5af7d6c5856a89bc437c device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 6f1cd81e978c0e2765b9a10f70b25f0cSHA-256: f4bbd90b9d07f16806d175b7f2d1d181e4307a5e43be8602bcd9a25bb98912eb device-mapper-multipath-libs-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 5eb551253da7607fadd155df97a84f08SHA-256: f827c1d8c038c443f64e4bd1bfe35938ead023a81bad77fc0a571dc66ff2512c device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: ca3dbb3bf137b1052813ff6d9a13ca1cSHA-256: 8a972ac226278447c899811bfbaf3dbf72c5f92c7ec0c4895e5e020d04eed359 kpartx-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 6a0a3d2f1277a4d762b07870b3479a34SHA-256: b78f9fb2345610cf34c0d6e45520337eadff68e1f5e2814da537f3651a2c6345   s390x: device-mapper-multipath-0.4.9-85.el7_2.4.s390x.rpm     MD5: c441ef4b33edfd916539a6cb475d036aSHA-256: d5181dae8eb1889a547ad3ff329bcdc57cadf09242e9be738e15dc19ff7f7096 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.s390.rpm     MD5: 5e7346c95c2ee98eabf19b7731dd7489SHA-256: 75fe37d76db4682eea9a522d1301743c83adcfded25799819c9004349bf5860e device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.s390x.rpm     MD5: 281b3640222578b4aeae2f45f97e5f5eSHA-256: 47a4e080790f0cdff640dc6d33513a17d0fa8eeac25631bff727009fd83c52bb device-mapper-multipath-libs-0.4.9-85.el7_2.4.s390.rpm     MD5: 2c8bf0d916aecaf8e65ca83cf336fb51SHA-256: f2af5dfe144e6ef6a0164a88c5b285308f56bb5cd578f08c109c75d694621f52 device-mapper-multipath-libs-0.4.9-85.el7_2.4.s390x.rpm     MD5: fe0d994cb7a42a84e61e8b25bb38bc58SHA-256: 08401454238da2f3fc70928f0f86cc63cb3a83b98000014551494ffabcbe7905 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.s390x.rpm     MD5: 3407be1c85289acf359286118842b817SHA-256: 55f677f7c6d52ca9be1303513b974b264658f466fdf8b1357a9e5a794c06458a kpartx-0.4.9-85.el7_2.4.s390x.rpm     MD5: 8594fa302f148157a1f1a6ad963a7125SHA-256: 5fe90121be5499a4b343b0579ac121a8fcf607454aa100adf3f701e4a9f95fed   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   PPC: device-mapper-multipath-0.4.9-85.el7_2.4.ppc64.rpm     MD5: b4ad4f28c5703a9ae7199389b77c1552SHA-256: d0a86116c288b3e0f2b969abea3b46cf0aead0cd7ed31d14c234bc3587eaf8e8 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.ppc.rpm     MD5: bfd024d756bbc30559c97e0220e19a35SHA-256: 43a8e387671a374c61434e8a9bd0fcd085cf486b3d3df36eb87c257e9074c87e device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 23a9f557fe9b406e3f6e4ec313008db9SHA-256: 7e56490d6fd29389b466155cd8188016a12f3ebee49c07c7c23400fd4579753d device-mapper-multipath-libs-0.4.9-85.el7_2.4.ppc.rpm     MD5: a2b605ab028b37f5e7650d4e0c4a6603SHA-256: 769150ea4cf4bd1e2cf9e4719faf21fcbe90e7078c001e46e0dac656c172cda7 device-mapper-multipath-libs-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 6a483901bf8ff6e7ce586117adc2b03aSHA-256: 6c9cedd8f97c3bd37fc2066def989caae8d922674b30c910313324ad14aab514 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 526575701aa659b220e6e53288653e4aSHA-256: 17fec0e03beaacd3c1d57ab07f60c57fcb0bcb172a071845503adbb5f2a5b044 kpartx-0.4.9-85.el7_2.4.ppc64.rpm     MD5: 87170731e033b9aa2f0468b4034b5eabSHA-256: 1278808cdab415f4e07176324994d04d0a1aa6d90ffaf01ade21c4e31af3acd0   PPC64LE: device-mapper-multipath-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 3f5ac766831669c8419a09de2b90a7fcSHA-256: c9772f824f3236aa41b162dced9ab6e2796d2ee2d4fc5af7d6c5856a89bc437c device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 6f1cd81e978c0e2765b9a10f70b25f0cSHA-256: f4bbd90b9d07f16806d175b7f2d1d181e4307a5e43be8602bcd9a25bb98912eb device-mapper-multipath-libs-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 5eb551253da7607fadd155df97a84f08SHA-256: f827c1d8c038c443f64e4bd1bfe35938ead023a81bad77fc0a571dc66ff2512c device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: ca3dbb3bf137b1052813ff6d9a13ca1cSHA-256: 8a972ac226278447c899811bfbaf3dbf72c5f92c7ec0c4895e5e020d04eed359 kpartx-0.4.9-85.el7_2.4.ppc64le.rpm     MD5: 6a0a3d2f1277a4d762b07870b3479a34SHA-256: b78f9fb2345610cf34c0d6e45520337eadff68e1f5e2814da537f3651a2c6345   s390x: device-mapper-multipath-0.4.9-85.el7_2.4.s390x.rpm     MD5: c441ef4b33edfd916539a6cb475d036aSHA-256: d5181dae8eb1889a547ad3ff329bcdc57cadf09242e9be738e15dc19ff7f7096 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.s390.rpm     MD5: 5e7346c95c2ee98eabf19b7731dd7489SHA-256: 75fe37d76db4682eea9a522d1301743c83adcfded25799819c9004349bf5860e device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.s390x.rpm     MD5: 281b3640222578b4aeae2f45f97e5f5eSHA-256: 47a4e080790f0cdff640dc6d33513a17d0fa8eeac25631bff727009fd83c52bb device-mapper-multipath-libs-0.4.9-85.el7_2.4.s390.rpm     MD5: 2c8bf0d916aecaf8e65ca83cf336fb51SHA-256: f2af5dfe144e6ef6a0164a88c5b285308f56bb5cd578f08c109c75d694621f52 device-mapper-multipath-libs-0.4.9-85.el7_2.4.s390x.rpm     MD5: fe0d994cb7a42a84e61e8b25bb38bc58SHA-256: 08401454238da2f3fc70928f0f86cc63cb3a83b98000014551494ffabcbe7905 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.s390x.rpm     MD5: 3407be1c85289acf359286118842b817SHA-256: 55f677f7c6d52ca9be1303513b974b264658f466fdf8b1357a9e5a794c06458a kpartx-0.4.9-85.el7_2.4.s390x.rpm     MD5: 8594fa302f148157a1f1a6ad963a7125SHA-256: 5fe90121be5499a4b343b0579ac121a8fcf607454aa100adf3f701e4a9f95fed   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: device-mapper-multipath-0.4.9-85.el7_2.4.src.rpm     MD5: ca3e0ef97f1187f8270240b0b8fa59a9SHA-256: 0debbf3d8dc3fe3e284c9b83b793022d3b3d72ee448060ee3feedf1f554142e1   x86_64: device-mapper-multipath-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ba4eec6e8f01034987aaa2309f35588SHA-256: 257da96bf6d5760f49a91c96d15ea3a611e3c7cd07eb7e9e99491885c756210f device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.i686.rpm     MD5: b46e7f4dc40fc35e7e118bf94651dd80SHA-256: 7bb9985ed1956f5f701cf555d3d7c022f373e0b457fb3aa98ae835cfffb3e438 device-mapper-multipath-debuginfo-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 374a58b0dc403ac8e08ccb014a20410bSHA-256: 913953381a4c6dac4a54950cc81c9c8f460ee6e5634ba61f4dd3dc39592cb221 device-mapper-multipath-libs-0.4.9-85.el7_2.4.i686.rpm     MD5: 73c5b398167b980990cd6bbf41f6a756SHA-256: 386f5534bbeb47411c678ce9596c3e2582f9eede0ffd532d0f5b62745d09b825 device-mapper-multipath-libs-0.4.9-85.el7_2.4.x86_64.rpm     MD5: eb49f05df13f4222163e383a0a3b0230SHA-256: a8544e55b8644757ef52b9b518c69d2a4b3d154d15318ced844c67693f2e23f4 device-mapper-multipath-sysvinit-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 23800409b841ebb162be1b95a42e9ff4SHA-256: 7b3c770f1591988bfa272dc5473f9402cb875893cf74e0542a6b22ba7f502f49 kpartx-0.4.9-85.el7_2.4.x86_64.rpm     MD5: 5ad7b9e3b936a63d0299ef4a54fa9e96SHA-256: a5e733ea99dc0a2490ee6eb025d1af63eb75445284036f4cc4754808ad3e91e0   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:2024-1: Important: ntp security update

Updated ntp packages that fix several security issues are now availablefor Red Hat Enterprise Linux 6 and 7.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section. The Network Time Protocol (NTP) is used to synchronize a computer's timewith a referenced time source.Multiple buffer overflow flaws were discovered in ntpd's crypto_recv(),ctl_putdata(), and configure() functions. A remote attacker could useeither of these flaws to send a specially crafted request packet that couldcrash ntpd or, potentially, execute arbitrary code with the privileges ofthe ntp user. Note: the crypto_recv() flaw requires non-defaultconfigurations to be active, while the ctl_putdata() flaw, by default, canonly be exploited via local attackers, and the configure() flaw requiresadditional authentication to exploit. (CVE-2014-9295)It was found that ntpd automatically generated weak keys for its internaluse if no ntpdc request authentication key was specified in the ntp.confconfiguration file. A remote attacker able to match the configured IPrestrictions could guess the generated key, and possibly use it to sendntpdc query or configuration requests. (CVE-2014-9293)It was found that ntp-keygen used a weak method for generating MD5 keys.This could possibly allow an attacker to guess generated MD5 keys thatcould then be used to spoof an NTP client or server. Note: it isrecommended to regenerate any MD5 keys that had explicitly been generatedwith ntp-keygen; the default installation does not contain such keys).(CVE-2014-9294)A missing return statement in the receive() function could potentiallyallow a remote attacker to bypass NTP's authentication mechanism.(CVE-2014-9296)All ntp users are advised to upgrade to this updated package, whichcontains backported patches to resolve these issues. After installing theupdate, the ntpd daemon will restart automatically. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: ntp-4.2.6p5-2.el6_6.src.rpm     MD5: c43a4992551d804881f30bdf2b836b12SHA-256: 991f3fd6e8d1a9f88229830502c0a81a45e08fa53ae3de8347b623974c8e823e   IA-32: ntp-4.2.6p5-2.el6_6.i686.rpm     MD5: a429d2ee07a531a88e2a0786ef7ab04cSHA-256: ad39068b6784100616363dcf167fc780544a50a9e567c8c07fe2b6a72d79665d ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm     MD5: 4985093284e3dcf57dba0c17a14c1b3dSHA-256: 62b84a647fdd2e42ad46f2129e0ae798b1bde479119de1f74cd875291fde6b2e ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.i686.rpm     MD5: f37def2e09c744265d75b838b5d90767SHA-256: 8ea2ce10d59b7ed254ae5ad25a2246dac6a4f79aa428a258867f5e2e99e6bef2 ntpdate-4.2.6p5-2.el6_6.i686.rpm     MD5: 3afee755408229631a1e4bae4955739aSHA-256: 44d2489562e94acf3ecef7ad5fa36473ecf52b14f90d18d6d5ba27961a2bbb5b   x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 3682c34da2b4fb88da8a78379e09ed54SHA-256: f00526fd00a82a6f235b0e875b2d4711542de8b002bee23c883b47059559940f ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm     MD5: ac3b539f1922d77a38226af801af2c44SHA-256: 93a633b60ea6c211a8aab03f20dfa09c3a63ab103d008505a1fe9bdb0a507ebb ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm     MD5: c0c1c5e69a831a3ed41bf9cef97a2324SHA-256: e312f3c21e886a2db401e9a934e5cd5724c117e2ec67df1436de591310a50450 ntpdate-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 8e83bcdfbe27d6cc35bdc18c92b14203SHA-256: 3fc36171cbb7c074d5620337db36e8d00d6a3e6141792e8721aa6030180cb6b7   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: ntp-4.2.6p5-19.el7_0.src.rpm     MD5: 93fafe986a4c5c3ec52fc78814c6bfccSHA-256: a07994d76bcf200a5e2dbd34bb8c06cf9484f8738582be74e2ef7be2fe0cfc69   x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: f8c1dd1cc5073491e2e3f80984d91f8cSHA-256: 24a55b7b7ff5948037be9051dabbcff871aa55039cd957f6ad06586010cf1e71 ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm     MD5: b9dfbb0f36b645988e12bb18e964b8e4SHA-256: 50306ed87fb83e9a8d040e5f79e8e1d1b999b8a42addb868ebf67f730c64d67c ntp-doc-4.2.6p5-19.el7_0.noarch.rpm     MD5: 708357bce96072ab649a4a0e503af6aaSHA-256: fcc8581f0e999dd4fb4e2d44ed46013e34cbd16b51d34b8df1575dc55e15080c ntp-perl-4.2.6p5-19.el7_0.noarch.rpm     MD5: ed30c7d74afee80ae58a3dd6860dec5dSHA-256: f994d20f29f2d278d5c69640050122411e83e8212ad4beafc4ca88063e072c44 ntpdate-4.2.6p5-19.el7_0.x86_64.rpm     MD5: d3306ae037f4f26a2eda853ff33c9290SHA-256: dbd13802372e2dbb0ca554302e1b229b89436e587ab91f36124daf4b74fb22d8 sntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: da9224cd5a75da093b137fb48f3a4d16SHA-256: 3860ea7946e2c2e0d153773bf46f600a63b3fecf297cc905cfa6e413ae6cd345   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: ntp-4.2.6p5-2.el6_6.src.rpm     MD5: c43a4992551d804881f30bdf2b836b12SHA-256: 991f3fd6e8d1a9f88229830502c0a81a45e08fa53ae3de8347b623974c8e823e   x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 3682c34da2b4fb88da8a78379e09ed54SHA-256: f00526fd00a82a6f235b0e875b2d4711542de8b002bee23c883b47059559940f ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm     MD5: ac3b539f1922d77a38226af801af2c44SHA-256: 93a633b60ea6c211a8aab03f20dfa09c3a63ab103d008505a1fe9bdb0a507ebb ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm     MD5: c0c1c5e69a831a3ed41bf9cef97a2324SHA-256: e312f3c21e886a2db401e9a934e5cd5724c117e2ec67df1436de591310a50450 ntpdate-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 8e83bcdfbe27d6cc35bdc18c92b14203SHA-256: 3fc36171cbb7c074d5620337db36e8d00d6a3e6141792e8721aa6030180cb6b7   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: ntp-4.2.6p5-19.el7_0.src.rpm     MD5: 93fafe986a4c5c3ec52fc78814c6bfccSHA-256: a07994d76bcf200a5e2dbd34bb8c06cf9484f8738582be74e2ef7be2fe0cfc69   x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: f8c1dd1cc5073491e2e3f80984d91f8cSHA-256: 24a55b7b7ff5948037be9051dabbcff871aa55039cd957f6ad06586010cf1e71 ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm     MD5: b9dfbb0f36b645988e12bb18e964b8e4SHA-256: 50306ed87fb83e9a8d040e5f79e8e1d1b999b8a42addb868ebf67f730c64d67c ntp-doc-4.2.6p5-19.el7_0.noarch.rpm     MD5: 708357bce96072ab649a4a0e503af6aaSHA-256: fcc8581f0e999dd4fb4e2d44ed46013e34cbd16b51d34b8df1575dc55e15080c ntp-perl-4.2.6p5-19.el7_0.noarch.rpm     MD5: ed30c7d74afee80ae58a3dd6860dec5dSHA-256: f994d20f29f2d278d5c69640050122411e83e8212ad4beafc4ca88063e072c44 ntpdate-4.2.6p5-19.el7_0.x86_64.rpm     MD5: d3306ae037f4f26a2eda853ff33c9290SHA-256: dbd13802372e2dbb0ca554302e1b229b89436e587ab91f36124daf4b74fb22d8 sntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: da9224cd5a75da093b137fb48f3a4d16SHA-256: 3860ea7946e2c2e0d153773bf46f600a63b3fecf297cc905cfa6e413ae6cd345   Red Hat Enterprise Linux Server (v. 6) SRPMS: ntp-4.2.6p5-2.el6_6.src.rpm     MD5: c43a4992551d804881f30bdf2b836b12SHA-256: 991f3fd6e8d1a9f88229830502c0a81a45e08fa53ae3de8347b623974c8e823e   IA-32: ntp-4.2.6p5-2.el6_6.i686.rpm     MD5: a429d2ee07a531a88e2a0786ef7ab04cSHA-256: ad39068b6784100616363dcf167fc780544a50a9e567c8c07fe2b6a72d79665d ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm     MD5: 4985093284e3dcf57dba0c17a14c1b3dSHA-256: 62b84a647fdd2e42ad46f2129e0ae798b1bde479119de1f74cd875291fde6b2e ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.i686.rpm     MD5: f37def2e09c744265d75b838b5d90767SHA-256: 8ea2ce10d59b7ed254ae5ad25a2246dac6a4f79aa428a258867f5e2e99e6bef2 ntpdate-4.2.6p5-2.el6_6.i686.rpm     MD5: 3afee755408229631a1e4bae4955739aSHA-256: 44d2489562e94acf3ecef7ad5fa36473ecf52b14f90d18d6d5ba27961a2bbb5b   PPC: ntp-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 48e6af2fb24389dfab66b2cac4c77947SHA-256: 45911d46c3f1c7b1cf193dcfb676574d22226c91c92d058fb70b6187c5bd1469 ntp-debuginfo-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 9f8a07b4027ceb8dc55889949016c0abSHA-256: 7036c684cdf5e9fcdba7efb77b78c2c669653dea44f5bd47a86d8faf44b7a6b2 ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 688a243c58e2033e90e7ceb060e7915cSHA-256: e33ef76b1892628ad8279d146cb1ca83cbf6faa581a82091eb04f6293c5a7213 ntpdate-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 7bc69540303a4e0b4838232fa4bc7ac6SHA-256: f2b645720f2bd53c4e598d9394bb2271088cd5495c84565e93fa5f689482a040   s390x: ntp-4.2.6p5-2.el6_6.s390x.rpm     MD5: 05d75dc94b84dcbbe44260dfa0884b33SHA-256: 7188dfcd883eecd58c4bc00f5a7343c3995fa80e4571ada9ac698d47a86cdd2f ntp-debuginfo-4.2.6p5-2.el6_6.s390x.rpm     MD5: 51d7089e514422394fb9acd9f5c697c5SHA-256: 0245221bff507aa6df2006d9f5005840810e16555947b9dc3bcb15e7d22e9c8f ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.s390x.rpm     MD5: f7e3ccc7f1a377f05f084a4d1decef88SHA-256: 74e6986c9d3efcf7497615d12a505e7ed7b47e828b4db7bb115aeb78d7bf9365 ntpdate-4.2.6p5-2.el6_6.s390x.rpm     MD5: 80bca2591a1b8de2c7023013ed360335SHA-256: e3fab7703590f7ba87ef84f8f07cdfde9987b800767b734ef732000543cff93f   x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 3682c34da2b4fb88da8a78379e09ed54SHA-256: f00526fd00a82a6f235b0e875b2d4711542de8b002bee23c883b47059559940f ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm     MD5: ac3b539f1922d77a38226af801af2c44SHA-256: 93a633b60ea6c211a8aab03f20dfa09c3a63ab103d008505a1fe9bdb0a507ebb ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm     MD5: c0c1c5e69a831a3ed41bf9cef97a2324SHA-256: e312f3c21e886a2db401e9a934e5cd5724c117e2ec67df1436de591310a50450 ntpdate-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 8e83bcdfbe27d6cc35bdc18c92b14203SHA-256: 3fc36171cbb7c074d5620337db36e8d00d6a3e6141792e8721aa6030180cb6b7   Red Hat Enterprise Linux Server (v. 7) SRPMS: ntp-4.2.6p5-19.el7_0.src.rpm     MD5: 93fafe986a4c5c3ec52fc78814c6bfccSHA-256: a07994d76bcf200a5e2dbd34bb8c06cf9484f8738582be74e2ef7be2fe0cfc69   PPC: ntp-4.2.6p5-19.el7_0.ppc64.rpm     MD5: a2e713790434c7fdb547c3fa75241cceSHA-256: 3a1221c178fe989f3336d19c2109b9f561ba6d5678a7b03f3849996fec3c7771 ntp-debuginfo-4.2.6p5-19.el7_0.ppc64.rpm     MD5: 14317dd6d4ef3b100ebd18a5b40cc33bSHA-256: 83818a36ec7f1eb49759264e564014f052414b2390aa2f25f198c698bd9caa12 ntp-doc-4.2.6p5-19.el7_0.noarch.rpm     MD5: 708357bce96072ab649a4a0e503af6aaSHA-256: fcc8581f0e999dd4fb4e2d44ed46013e34cbd16b51d34b8df1575dc55e15080c ntp-perl-4.2.6p5-19.el7_0.noarch.rpm     MD5: ed30c7d74afee80ae58a3dd6860dec5dSHA-256: f994d20f29f2d278d5c69640050122411e83e8212ad4beafc4ca88063e072c44 ntpdate-4.2.6p5-19.el7_0.ppc64.rpm     MD5: 450c5fdf6f3443c0b70daeab2c00eebbSHA-256: d66a4f1c0f4a21891901b39bedf7af096ce6795e3e449b926b107911a4dbce73 sntp-4.2.6p5-19.el7_0.ppc64.rpm     MD5: 12bcf5ae3c4527651a0fa218237e4875SHA-256: d26da92d7b1104ae4ee7f4fe46d4e30638b77495ab7916bbb8b577ed905361ea   s390x: ntp-4.2.6p5-19.el7_0.s390x.rpm     MD5: a3e0b4b1e864f2fbcdb5e71275abe406SHA-256: f3bc7ff98c1c1b92954b21221d3773885334b617df3609572133857f23c6ecac ntp-debuginfo-4.2.6p5-19.el7_0.s390x.rpm     MD5: fa87b1bdce2acc09bae9eb135442c4faSHA-256: 005b6d37e3ba8d18d370f1b88cf42abf1408481c6e41a3be40774017b3d5df4d ntp-doc-4.2.6p5-19.el7_0.noarch.rpm     MD5: 708357bce96072ab649a4a0e503af6aaSHA-256: fcc8581f0e999dd4fb4e2d44ed46013e34cbd16b51d34b8df1575dc55e15080c ntp-perl-4.2.6p5-19.el7_0.noarch.rpm     MD5: ed30c7d74afee80ae58a3dd6860dec5dSHA-256: f994d20f29f2d278d5c69640050122411e83e8212ad4beafc4ca88063e072c44 ntpdate-4.2.6p5-19.el7_0.s390x.rpm     MD5: a3d971acb48367c01b4f35e154e78749SHA-256: 5be5b70b4db0a4c619ab0253b7ef5fe691a19ec72ef63345d188d21c681e6839 sntp-4.2.6p5-19.el7_0.s390x.rpm     MD5: 33a677e6e9c7eff4be08fb86e61d90beSHA-256: 568f27eadfba8775cbb2564cfc0885e4222ff3c8f3ad0123658cd9924bb02538   x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: f8c1dd1cc5073491e2e3f80984d91f8cSHA-256: 24a55b7b7ff5948037be9051dabbcff871aa55039cd957f6ad06586010cf1e71 ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm     MD5: b9dfbb0f36b645988e12bb18e964b8e4SHA-256: 50306ed87fb83e9a8d040e5f79e8e1d1b999b8a42addb868ebf67f730c64d67c ntp-doc-4.2.6p5-19.el7_0.noarch.rpm     MD5: 708357bce96072ab649a4a0e503af6aaSHA-256: fcc8581f0e999dd4fb4e2d44ed46013e34cbd16b51d34b8df1575dc55e15080c ntp-perl-4.2.6p5-19.el7_0.noarch.rpm     MD5: ed30c7d74afee80ae58a3dd6860dec5dSHA-256: f994d20f29f2d278d5c69640050122411e83e8212ad4beafc4ca88063e072c44 ntpdate-4.2.6p5-19.el7_0.x86_64.rpm     MD5: d3306ae037f4f26a2eda853ff33c9290SHA-256: dbd13802372e2dbb0ca554302e1b229b89436e587ab91f36124daf4b74fb22d8 sntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: da9224cd5a75da093b137fb48f3a4d16SHA-256: 3860ea7946e2c2e0d153773bf46f600a63b3fecf297cc905cfa6e413ae6cd345   Red Hat Enterprise Linux Server EUS (v. 6.6.z) SRPMS: ntp-4.2.6p5-2.el6_6.src.rpm     MD5: c43a4992551d804881f30bdf2b836b12SHA-256: 991f3fd6e8d1a9f88229830502c0a81a45e08fa53ae3de8347b623974c8e823e   IA-32: ntp-4.2.6p5-2.el6_6.i686.rpm     MD5: a429d2ee07a531a88e2a0786ef7ab04cSHA-256: ad39068b6784100616363dcf167fc780544a50a9e567c8c07fe2b6a72d79665d ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm     MD5: 4985093284e3dcf57dba0c17a14c1b3dSHA-256: 62b84a647fdd2e42ad46f2129e0ae798b1bde479119de1f74cd875291fde6b2e ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.i686.rpm     MD5: f37def2e09c744265d75b838b5d90767SHA-256: 8ea2ce10d59b7ed254ae5ad25a2246dac6a4f79aa428a258867f5e2e99e6bef2 ntpdate-4.2.6p5-2.el6_6.i686.rpm     MD5: 3afee755408229631a1e4bae4955739aSHA-256: 44d2489562e94acf3ecef7ad5fa36473ecf52b14f90d18d6d5ba27961a2bbb5b   PPC: ntp-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 48e6af2fb24389dfab66b2cac4c77947SHA-256: 45911d46c3f1c7b1cf193dcfb676574d22226c91c92d058fb70b6187c5bd1469 ntp-debuginfo-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 9f8a07b4027ceb8dc55889949016c0abSHA-256: 7036c684cdf5e9fcdba7efb77b78c2c669653dea44f5bd47a86d8faf44b7a6b2 ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 688a243c58e2033e90e7ceb060e7915cSHA-256: e33ef76b1892628ad8279d146cb1ca83cbf6faa581a82091eb04f6293c5a7213 ntpdate-4.2.6p5-2.el6_6.ppc64.rpm     MD5: 7bc69540303a4e0b4838232fa4bc7ac6SHA-256: f2b645720f2bd53c4e598d9394bb2271088cd5495c84565e93fa5f689482a040   s390x: ntp-4.2.6p5-2.el6_6.s390x.rpm     MD5: 05d75dc94b84dcbbe44260dfa0884b33SHA-256: 7188dfcd883eecd58c4bc00f5a7343c3995fa80e4571ada9ac698d47a86cdd2f ntp-debuginfo-4.2.6p5-2.el6_6.s390x.rpm     MD5: 51d7089e514422394fb9acd9f5c697c5SHA-256: 0245221bff507aa6df2006d9f5005840810e16555947b9dc3bcb15e7d22e9c8f ntpdate-4.2.6p5-2.el6_6.s390x.rpm     MD5: 80bca2591a1b8de2c7023013ed360335SHA-256: e3fab7703590f7ba87ef84f8f07cdfde9987b800767b734ef732000543cff93f   x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 3682c34da2b4fb88da8a78379e09ed54SHA-256: f00526fd00a82a6f235b0e875b2d4711542de8b002bee23c883b47059559940f ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm     MD5: ac3b539f1922d77a38226af801af2c44SHA-256: 93a633b60ea6c211a8aab03f20dfa09c3a63ab103d008505a1fe9bdb0a507ebb ntpdate-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 8e83bcdfbe27d6cc35bdc18c92b14203SHA-256: 3fc36171cbb7c074d5620337db36e8d00d6a3e6141792e8721aa6030180cb6b7   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: ntp-4.2.6p5-2.el6_6.src.rpm     MD5: c43a4992551d804881f30bdf2b836b12SHA-256: 991f3fd6e8d1a9f88229830502c0a81a45e08fa53ae3de8347b623974c8e823e   IA-32: ntp-4.2.6p5-2.el6_6.i686.rpm     MD5: a429d2ee07a531a88e2a0786ef7ab04cSHA-256: ad39068b6784100616363dcf167fc780544a50a9e567c8c07fe2b6a72d79665d ntp-debuginfo-4.2.6p5-2.el6_6.i686.rpm     MD5: 4985093284e3dcf57dba0c17a14c1b3dSHA-256: 62b84a647fdd2e42ad46f2129e0ae798b1bde479119de1f74cd875291fde6b2e ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.i686.rpm     MD5: f37def2e09c744265d75b838b5d90767SHA-256: 8ea2ce10d59b7ed254ae5ad25a2246dac6a4f79aa428a258867f5e2e99e6bef2 ntpdate-4.2.6p5-2.el6_6.i686.rpm     MD5: 3afee755408229631a1e4bae4955739aSHA-256: 44d2489562e94acf3ecef7ad5fa36473ecf52b14f90d18d6d5ba27961a2bbb5b   x86_64: ntp-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 3682c34da2b4fb88da8a78379e09ed54SHA-256: f00526fd00a82a6f235b0e875b2d4711542de8b002bee23c883b47059559940f ntp-debuginfo-4.2.6p5-2.el6_6.x86_64.rpm     MD5: ac3b539f1922d77a38226af801af2c44SHA-256: 93a633b60ea6c211a8aab03f20dfa09c3a63ab103d008505a1fe9bdb0a507ebb ntp-doc-4.2.6p5-2.el6_6.noarch.rpm     MD5: 8e9929c54498e2e507294ca00ca6205dSHA-256: 24d3723039a5f2c2aa96e04fbdc09031da080db7789cd95934f7aaf2a4ee719a ntp-perl-4.2.6p5-2.el6_6.x86_64.rpm     MD5: c0c1c5e69a831a3ed41bf9cef97a2324SHA-256: e312f3c21e886a2db401e9a934e5cd5724c117e2ec67df1436de591310a50450 ntpdate-4.2.6p5-2.el6_6.x86_64.rpm     MD5: 8e83bcdfbe27d6cc35bdc18c92b14203SHA-256: 3fc36171cbb7c074d5620337db36e8d00d6a3e6141792e8721aa6030180cb6b7   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: ntp-4.2.6p5-19.el7_0.src.rpm     MD5: 93fafe986a4c5c3ec52fc78814c6bfccSHA-256: a07994d76bcf200a5e2dbd34bb8c06cf9484f8738582be74e2ef7be2fe0cfc69   x86_64: ntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: f8c1dd1cc5073491e2e3f80984d91f8cSHA-256: 24a55b7b7ff5948037be9051dabbcff871aa55039cd957f6ad06586010cf1e71 ntp-debuginfo-4.2.6p5-19.el7_0.x86_64.rpm     MD5: b9dfbb0f36b645988e12bb18e964b8e4SHA-256: 50306ed87fb83e9a8d040e5f79e8e1d1b999b8a42addb868ebf67f730c64d67c ntp-doc-4.2.6p5-19.el7_0.noarch.rpm     MD5: 708357bce96072ab649a4a0e503af6aaSHA-256: fcc8581f0e999dd4fb4e2d44ed46013e34cbd16b51d34b8df1575dc55e15080c ntp-perl-4.2.6p5-19.el7_0.noarch.rpm     MD5: ed30c7d74afee80ae58a3dd6860dec5dSHA-256: f994d20f29f2d278d5c69640050122411e83e8212ad4beafc4ca88063e072c44 ntpdate-4.2.6p5-19.el7_0.x86_64.rpm     MD5: d3306ae037f4f26a2eda853ff33c9290SHA-256: dbd13802372e2dbb0ca554302e1b229b89436e587ab91f36124daf4b74fb22d8 sntp-4.2.6p5-19.el7_0.x86_64.rpm     MD5: da9224cd5a75da093b137fb48f3a4d16SHA-256: 3860ea7946e2c2e0d153773bf46f600a63b3fecf297cc905cfa6e413ae6cd345   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0614-1: mariadb55 bug fix and enhancement update

Updated mariadb55 packages that fix several bugs are now available for Red HatSoftware Collections 1.1 for Red Hat Enterprise Linux. MariaDB is a multi-user, multi-threaded SQL database server that isbinary-compatible with MySQL.The mariadb55 packages have been upgraded to upstream version 5.5.36, whichprovides a number of bug fixes and enhancements over the previous version.(BZ#1023010)This update also fixes the following bugs:* Prior to this update, the MySQL server attempted to verify if the MySQL socketexisted, but did not take into consideration whether any processes were usingit. As a consequence, if the MySQL server terminated unexpectedly, the MySQLsocket was not reset after the reboot, and thus prevented the MySQL server fromrestarting correctly. With this update, the MySQL server no longer attempts toverify the existence of a MySQL socket when the socket is not being used by anyprocesses. As a result, the MySQL server can now be successfully restarted aftera crash occurs. (BZ#1037748)* Previously, not all files in an RPM package were correctly owned by thecorresponding collection. As a consequence, when the mariadb55 SoftwareCollection was removed, some files remained in the /opt/rh/mariadb55/root/directory. With this update, all files in the mariadb55 collection are ownedproperly and no redundant files are left after the collection is removed.(BZ#1079913)In addition, this update adds the following enhancement:* The Pluggable Authentication Modules (PAM) plug-in has been added to themariadb55 Software Collection. PAM allows a system to set up authenticationpolicies without the need to recompile programs to handle authentication. Theplug-in also includes a number of authentication features, such as enforcingpassword expiration. (BZ#1019868)Users of mariadb55 are advised to upgrade to these updated packages, which fixthese bugs and add these enhancements. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: mariadb55-1.1-17.el6.src.rpm     MD5: a032adfdbf0e9bbf597aa408c13d634dSHA-256: 58f114d0b4a82d46cf6ad0f3f525849a26f560b6800404aecda6254943603a22 mariadb55-mariadb-5.5.37-9.el6.src.rpm     MD5: 72dad5dfaf56ca25b4920f70c3d03074SHA-256: 404d263261ca4f5a52e22cfa994d29e21cee678de36481c65c5112faa07d8399   x86_64: mariadb55-1.1-17.el6.x86_64.rpm     MD5: 0e822aee78c3882a54434a01d30883aaSHA-256: 859699fc0e7f94750cf2ac9cb792912dbe227b55412aa2ea62d83222a876ac2a mariadb55-mariadb-5.5.37-9.el6.x86_64.rpm     MD5: e1bfa828c3f17c701d828e6ee0984bc2SHA-256: 29aeecc2caa462b80a492c791b85a6292af2604f81aa81efb70d9dc14cd37f12 mariadb55-mariadb-bench-5.5.37-9.el6.x86_64.rpm     MD5: 5696794fc126ddcce12f176094fd6575SHA-256: e92a2fd404fb5b2e2bc18e687ffc457a2f1d270ff4d8b53b21d130768ee67843 mariadb55-mariadb-debuginfo-5.5.37-9.el6.x86_64.rpm     MD5: d6e57128d8ed9269b97401509c67acd2SHA-256: 48981a1e5e8e29c2789e9a2ae413a117912b2dda07223d340180ae43e9ac2e99 mariadb55-mariadb-devel-5.5.37-9.el6.x86_64.rpm     MD5: 3a488aaaec2357cadf3e42ae922bf4a0SHA-256: 10262d82cbccecd48f7b00387404023352c6e677c112299b8303c6fbe7c8b6e6 mariadb55-mariadb-libs-5.5.37-9.el6.x86_64.rpm     MD5: f55d35d343ffbc850a96ff1ed8771138SHA-256: 43208213b56e5560ee8730090e78fbf80294583a2d5e8c8911da712b29032145 mariadb55-mariadb-server-5.5.37-9.el6.x86_64.rpm     MD5: 96f3bdf5a822dc5e34b0b282c14bcc49SHA-256: 485f4230f4e9a6d11255161027dd06808782ad177d1af2d130cd89146f1e0605 mariadb55-mariadb-test-5.5.37-9.el6.x86_64.rpm     MD5: 00d2747bcdb66b17cde542b63579bf8bSHA-256: 37fc407ad08e663eee8e6fb3a9dc7cf89b48742fc3d44d09082eca9a5f693502 mariadb55-runtime-1.1-17.el6.x86_64.rpm     MD5: 067a2f0ce0bda930ae32135f92ada2b4SHA-256: a72f9097809f9b1232340a19fcccdfeeadb4ee9e96ea13c7b7c15257646569e8 mariadb55-scldevel-1.1-17.el6.x86_64.rpm     MD5: e28fcf0c746399d0f6fa90a873a26a93SHA-256: 7cc482b19c003da13019e9b8b391c1a47d2de39ab47068d6cdeb824049249d09   (The unlinked packages above are only available from the Red Hat Network) 1019868 - [RFE] Please include PAM authentication plugin for MariaDB1025280 - mariadb55-mariadb-server installation error: cannot touch ‘/var/log/mariadb55-mariadb/mariadb.log’1042873 - Potential issues caused by non-namespaced RPM provides and libraries1053393 - Use policycoreutils-python in meta package1061444 - mariadb55 meta package should include LICENSE, README and mariadb55 man page files1072958 - systemctl restart mariadb55-mariadb behaves randomly1079973 - Man page has incorrect service name on rhel7 These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:0359-1: Important: chromium-browser security update

Updated chromium-browser packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6 Supplementary.Red Hat Product Security has rated this update as having Important securityimpact.

Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section. Chromium is an open-source web browser, powered by WebKit (Blink).Several flaws were found in the processing of malformed web content.

A webpage containing malicious content could cause Chromium to crash, executearbitrary code, or disclose sensitive information when visited by thevictim. (CVE-2016-1630, CVE-2016-1631, CVE-2016-1632, CVE-2016-1633,CVE-2016-1634, CVE-2016-1635, CVE-2016-1636, CVE-2016-1637, CVE-2016-1638,CVE-2016-1639, CVE-2016-1640, CVE-2016-1641, CVE-2016-1642)All Chromium users should upgrade to these updated packages, whichcontain Chromium version 49.0.2623.75, which corrects these issues.After installing the update, Chromium must be restarted for the changesto take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop Supplementary (v. 6) IA-32: chromium-browser-49.0.2623.75-1.el6.i686.rpm     MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm     MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34   x86_64: chromium-browser-49.0.2623.75-1.el6.x86_64.rpm     MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232 chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm     MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0   Red Hat Enterprise Linux Server Supplementary (v. 6) IA-32: chromium-browser-49.0.2623.75-1.el6.i686.rpm     MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm     MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34   x86_64: chromium-browser-49.0.2623.75-1.el6.x86_64.rpm     MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232 chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm     MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0   Red Hat Enterprise Linux Server Supplementary EUS (v. 6.7.z) IA-32: chromium-browser-49.0.2623.75-1.el6.i686.rpm     MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm     MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34   x86_64: chromium-browser-49.0.2623.75-1.el6.x86_64.rpm     MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232 chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm     MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0   Red Hat Enterprise Linux Workstation Supplementary (v. 6) IA-32: chromium-browser-49.0.2623.75-1.el6.i686.rpm     MD5: 267cab2b6d22958d0f50d49821f5ab88SHA-256: 5a3c2f5d25f061a4a5408de4c701c71309d5b57217d6d90b422cae66af92762c chromium-browser-debuginfo-49.0.2623.75-1.el6.i686.rpm     MD5: 3d98755969663fdf3420527081ffebacSHA-256: aae4bf3c6daa3da992449d2896de78102cd21c2c1db78b69ef5344bea8fa4b34   x86_64: chromium-browser-49.0.2623.75-1.el6.x86_64.rpm     MD5: b81d1aac5a429c38970e20e8286bfb23SHA-256: ae3d3c1deeac4a0fdad14c9c4d88a58b2ccd3809c2f0d44259ae244705caa232 chromium-browser-debuginfo-49.0.2623.75-1.el6.x86_64.rpm     MD5: 4020df0e4764c1931e29e6c2e08ebe3cSHA-256: 8b49ffa212b4af02f2b2bd55d36b7b010d7d122167286e584914ed7979fd55b0   (The unlinked packages above are only available from the Red Hat Network) 1314214 - CVE-2016-1630 chromium-browser: same-origin bypass in Blink1314215 - CVE-2016-1631 chromium-browser: same-origin bypass in Pepper Plugin1314216 - CVE-2016-1632 chromium-browser: bad cast in Extensions1314217 - CVE-2016-1633 chromium-browser: use-after-free in Blink1314218 - CVE-2016-1634 chromium-browser: use-after-free in Blink1314219 - CVE-2016-1635 chromium-browser: use-after-free in Blink1314220 - CVE-2016-1636 chromium-browser: SRI Validation Bypass1314221 - CVE-2016-1637 chromium-browser: information leak in Skia1314222 - CVE-2016-1638 chromium-browser: WebAPI Bypass1314224 - CVE-2016-1639 chromium-browser: use-after-free in WebRTC1314225 - CVE-2016-1640 chromium-browser: origin confusion in Extensions UI1314226 - CVE-2016-1641 chromium-browser: use-after-free in Favicon1314227 - CVE-2016-1642 chromium-browser: various fixes from internal audits These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: