Home Tags Guests

Tag: guests

Malmaison Hotel du Vin keeps guests connected with unlimited WiFi

London, 13th March 2017: Malmaison Hotel du Vin, the leading lifestyle hotel brands, announce significant investment into upgrading its wireless network infrastructure.

To manage the upgrade, the group has enlisted the services of Airangel. One of the UK’s leading enterprise guest WiFi solutions firms, it provides safe and secure WiFi that is easy to deploy, simple to manage and allows guests to get online quickly with the minimum amount of effort.

The investment reinforces the... Source: RealWire

How to not do presidential opsec: Crisis management over dinner in...

Trump's response to N. Korea missile was posted on Facebook by Mar-a-Lago guests.

Ransomware avalanche at Alpine hotel puts room keycards on ice

If at first you succeed, try, try again, think extortionists A top Austrian hotel coughed up thousands in ransom to cybercrooks, who hacked its computer system and locked guests out of their rooms until the money was paid.…

Big Blue’s BigInsights has big-ish bugs

Guests gain XSSive privileges in IBM's Hadoopery IBM has patched twin cross-site scripting (XSS) vulnerabilities in its Hadoop-probing InfoSphere BigInsights platform.…

RHBA-2017:0115-2: qemu-kvm-rhev bug fix update

Updated qemu-kvm-rhev packages that fix several bugs are now available for RedHat Virtualization Hypervisor 7. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

The qemu-kvm-rhev packages prov...

Hackers Target Sundance Film Festival

Local and online box offices were temporarily knocked offline Saturday.

America's largest independent film festival became the target of a cyber attack over the weekend.

The Sundance Film Festival kicked off Friday in Park City, Utah, with movie premieres, midnight showings, and a network failure.

"Sundance Film Festival has been subject to a cyberattack, causing network outages that have shut down our box office," a spokesman told Variety, adding that "all screenings will still take place as planned."

The official Twitter account on Saturday promised that "our team is working hard to get our systems back up [as soon as possible]." Within an hour, the Salt Lake City and Gateway box offices were "back up and running," and online ticketing for future shows was quickly restored.

Update: The Salt Lake City Box Office is back up and running. #SLC #Sundance

— SundanceFilmFestival (@sundancefest) January 21, 2017

Update: Online ticketing for future shows is back up. #Sundance

— SundanceFilmFestival (@sundancefest) January 21, 2017

Update: The Festival Box Office at Gateway in #ParkCity is now up and running. #Sundance

— SundanceFilmFestival (@sundancefest) January 21, 2017

"Our artist's [sic] voices will be heard and the show will go on," the organizers tweeted.

The hack, according to Variety, occurred around noon MT (2 p.m. ET)—shortly after comedian Chelsea Handler led a Women's March in Park City in protest of Donald Trump. It was also the same day as several big premieres, including films about war, terrorism, Chinese dissonance, doping in sports, and race and class in America.

It remains unclear whether the incidents were related, or how many Festival guests were affected by the box office interruptions. The Sundance Institute did not immediately respond to PCMag's request for comment.

This month's showcase includes the premiere of Dear Angelica, the first animated experience created entirely in virtual reality, according to Oculus, whose in-house Story Studio produced the movie—available for Rift owners to download from the Oculus app store.

RHBA-2017:0071-1: qemu-kvm bug fix update

Updated qemu-kvm packages that fix two bugs are now available for Red HatEnterprise Linux 7. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-spacecomponent for running virtual machines using KVM.This update fixes the following bugs:* Previously, Red Hat Enterprise Linux 5.11 guests failed to shut down, andstopped at the "system halted" status. A patch has been applied to fix this bug,and Red Hat Enterprise Linux 5.11 guests shut down as expected. (BZ#1392027)* Previously, using the qemu-kvm system_reset utility when no space was left onon the host caused the qemu-kvm service to terminate with a segmentation fault.The underlying source code has been modified to fix this bug. As a result, theqemu-kvm process stays active, and guest systems can be reset without an error.(BZ#1393042)Users of qemu-kvm are advised to upgrade to these updated packages, which fixthese bugs. After installing this update, shut down all running virtualmachines. Once all virtual machines have shut down, start them again for thisupdate to take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux Server (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   PPC: qemu-img-1.5.3-126.el7_3.1.ppc64.rpmFile outdated by:  RHSA-2017:0083     MD5: d464baa9ee046b6c5d9e8d4aed4a7ddfSHA-256: 54816ab4ab5df9b5e6e50f4e99fc6a21f49706f3fe6cd0392bfc541d416afa95 qemu-kvm-debuginfo-1.5.3-126.el7_3.1.ppc64.rpmFile outdated by:  RHSA-2017:0083     MD5: dba1c8f2f0c9378ec056d8003d0f135bSHA-256: fda38f948a9a0859d1c205eb9963989df12766d205c546ac22e38701a1d930cb   PPC64LE: qemu-img-1.5.3-126.el7_3.1.ppc64le.rpmFile outdated by:  RHSA-2017:0083     MD5: 6ea2e38bcf6b05c2a0505ec2abe8aea3SHA-256: 835afd80efecb6d78c13a3a2f15ef6ae7a325a2a05dee9e5fa2105e2c4aa250b qemu-kvm-debuginfo-1.5.3-126.el7_3.1.ppc64le.rpmFile outdated by:  RHSA-2017:0083     MD5: cd307d65d1c92d3eec94a790cf9f20c8SHA-256: 5f15dd8d762e579f922d8cd348bdb956d2554772814a700aa27ef55dcdfdc0c8   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: qemu-kvm-1.5.3-126.el7_3.1.src.rpmFile outdated by:  RHSA-2017:0083     MD5: 27a098746e552ce9de469b1ad8357ccaSHA-256: 85db53a4153d3e9a754cdda8c979a612aff81195e7fb187ead3db47a26b12b28   x86_64: qemu-img-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 96262d28abacd418014429530a905ff3SHA-256: 8184e1269873f7b0ab8eece8ce0bec4240fda38e7054ee3c8b5ab53d60a09034 qemu-kvm-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: dc27d7ba4746519fcf3664eeb1937ed3SHA-256: 6582b0e9cbb135e2a8a66c3ef69ab9c12150504d12889fad392da1e076f88a61 qemu-kvm-common-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 3f195b06e7ea720981d681e4e258ecb8SHA-256: 194b60da4a18f6064afc45b6c06ab9662bfbf96d5a0cd1fc4e3a10300222e84e qemu-kvm-debuginfo-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 6b61ab6be0725d692d8af0d87e913bdaSHA-256: 6fe8d563b7f0468c46980d86277cf9714676522988a54c887b49b69199ca1789 qemu-kvm-tools-1.5.3-126.el7_3.1.x86_64.rpmFile outdated by:  RHSA-2017:0083     MD5: 33819524139c4d15673d9a55006ce1fdSHA-256: b3823fe92ed041cfe4ec994820a7df7898c0541149b2bc663a782d759a034da6   (The unlinked packages above are only available from the Red Hat Network) 1392027 - shutdown rhel 5.11 guest failed and stop at "system halted"1393042 - system_reset should clear pending request for error (IDE) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2017:0027-1: openvswitch bug fix update

Attention: RHN Hosted will reach the end of its service life on July 31, 2017.Customers will be required to migrate existing systems to Red Hat Subscription Management prior to this date.Learn more here Details An updated openvswitch package that fixes multiple bugs is now available. Open vSwitch provides standard network bridging functions andsupport for the OpenFlow protocol for remote per-flow control oftraffic.Bugs fixed in these updated packages include:* Do not wake up when there is no db connection (#1397504)* Use instant sending instead of queue (#1397481)* DPDK vhost: workaround stale vring base (#1397196)* Do not restart the service after a package upgrade (#1397045)* Fixed to not require SSSE3 if DPDK is not used (#1397048)* Applied the systemd backports (#1397049)* Fixed missing close calls for tnl ports (#1397050) Solution Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258 Updated packages Red Hat Virtualization ( v.4 for RHEL 7) SRPMS: openvswitch-2.5.0-22.git20160727.el7fdp.src.rpm     MD5: dec02656d4e107cafea152a2206c4aa5SHA-256: d7913545abcc2f0102a42467376d3530894730f5d22aa2c8b5b72582364e094f   x86_64: openvswitch-2.5.0-22.git20160727.el7fdp.x86_64.rpm     MD5: 26b4b86cbac2f8cd4d0afc4952b1a173SHA-256: 5bf8e3e1f1609c89baa10deb1a6de1df2ef03d5e8c7204f3133d676bf3d02034 openvswitch-devel-2.5.0-22.git20160727.el7fdp.x86_64.rpm     MD5: c1d458d0173bde202fa5edcfb6085df4SHA-256: a7c354bb99fbf51587f1c751ec400eeca328fe9812e231fd4db3643d0b625432 openvswitch-test-2.5.0-22.git20160727.el7fdp.noarch.rpm     MD5: a3b45a1d3453c76d20d2f61651a8abeaSHA-256: 4376df2ffdaf5428349794f9e47a216fa6f53faca9741b2d32f781d9c81d054f python-openvswitch-2.5.0-22.git20160727.el7fdp.noarch.rpm     MD5: 081ef358ea78d23a1f4fa05749a1933bSHA-256: ec9e8d713bfd00fba83655de348c63417c2f85c53984196e2fe93f612d4bf00e   (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 1397045 - [fdProd] yum update of openvswitch 2.5 from 2.4 causes restart of openvswitch service that can disrupt network connectivity1397048 - [fdProd] OVS fails if SSSE3 is not supported1397049 - [fdProd] [OVS] systemd ordering of OVS service causes hang during restart when there is NFS mount over OVS1397050 - [fdProd] OvS rtnetlink race condition1397196 - [fdProd] OVS daemon crashed when guests running pktgen over OVS-dpdk bond1397481 - [fdProd] latency regression1397504 - [fdProd] ovs-vswitchd takes 100% CPU time These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/

RHSA-2016:2962-1: Important: kernel security and bug fix update

An update for kernel is now available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A use-after-free vulnerability was found in the kernels socket recvmmsgsubsystem.

This may allows remote attackers to corrupt memory and may allowexecution of arbitrary code.

This corruption takes place during the errorhandling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)Bug Fix(es):* Previously, guest virtual machines (VMs) on a Hyper-V server cluster got insome cases rebooted during the graceful node failover test, because the hostkept sending heartbeat packets independently of guests responding to them.

Thisupdate fixes the bug by properly responding to all the heartbeat messages in thequeue, even if they are pending.

As a result, guest VMs no longer get rebootedunder the described circumstances. (BZ#1391167) Red Hat Enterprise Linux (v. 5 server) SRPMS: kernel-2.6.18-417.el5.src.rpm     MD5: 4283c50e1a723ddc186ac3f49dcd7d00SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae   IA-32: kernel-2.6.18-417.el5.i686.rpm     MD5: bb944ac235b5ca2fc2061144c1b5f08dSHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb kernel-PAE-2.6.18-417.el5.i686.rpm     MD5: 7b9f6e09489554062456a615e25f0630SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm     MD5: f9016bb5143a48556359c32903ba473aSHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc kernel-PAE-devel-2.6.18-417.el5.i686.rpm     MD5: ec97f1c345b9a15ff815543c4b9f484aSHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400 kernel-debug-2.6.18-417.el5.i686.rpm     MD5: f0b0d829e80765c0d70e5c273fb18532SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878 kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 7e8691ab43cd599a963dd69b3f5853d6SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774 kernel-debug-devel-2.6.18-417.el5.i686.rpm     MD5: 974b760d657b1bfb101e6e13cd4dd372SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47 kernel-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 84217c363e695b4612041ce45b984cf5SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c kernel-debuginfo-common-2.6.18-417.el5.i686.rpm     MD5: 2649996e4544ee7ea50d1620b6562352SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef kernel-devel-2.6.18-417.el5.i686.rpm     MD5: 53a61e0bdb479f061db8c01eab3c492cSHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.i386.rpm     MD5: 663994d90e10d5975d87b21d9aa24063SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692 kernel-xen-2.6.18-417.el5.i686.rpm     MD5: 9e601ffa9436b8d5d602d8dfb8ac5628SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 4f2c346c65b7826c3f315b0e71a63af0SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5 kernel-xen-devel-2.6.18-417.el5.i686.rpm     MD5: d7402b006fe49104c2bbfda929c45532SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b   IA-64: kernel-2.6.18-417.el5.ia64.rpm     MD5: 7e47451f92c89524f33e4038b41a06c7SHA-256: 3014a80b82b27dfa97cbf55ef55d1e2f3248b030ca7271d13d2442c0bfca9639 kernel-debug-2.6.18-417.el5.ia64.rpm     MD5: 0455bf805ae4a8883596c4c0ae27b4baSHA-256: 1fa665f0c9b0355bcb0f0fa753fe75774e030cee4e9763412ac338f9a888c635 kernel-debug-debuginfo-2.6.18-417.el5.ia64.rpm     MD5: 8df7d6570bedc8c7df41d1b07896ef8fSHA-256: 5f96e8557fe252c0648a431275124aa799ca5ea93fe0492eed50e6dfccf7ff4f kernel-debug-devel-2.6.18-417.el5.ia64.rpm     MD5: b81da843259cb09426320d01532987c7SHA-256: 4bf8020f398eab3e4a38f31638806a176c77dfe45bdeed7e9c42d8f7b73db409 kernel-debuginfo-2.6.18-417.el5.ia64.rpm     MD5: db94264290fe35ebf2328ac9ea897c48SHA-256: c3812826acaa2d0c555feb066fbef8427b960f804caf5445bcb9533480949c2c kernel-debuginfo-common-2.6.18-417.el5.ia64.rpm     MD5: 67a185a5a35ab276fd1ff2ba9d5b21b7SHA-256: 51a1210e6a5d890f22a7849eadf76639150ffe4ce37914deca2169e1d537072c kernel-devel-2.6.18-417.el5.ia64.rpm     MD5: 3df3b9e57127ed87cbb7e689153098caSHA-256: b20b36fb75d2d616800165ea6372e3176add8d0dc609828880711cb523f2c5d6 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.ia64.rpm     MD5: af94ef5b11ae1b54dcf8999b9ed98ce5SHA-256: f44c2e763d2e801f77b22d490260832fd4e0a356fc6331e53daa6676b7f56d5d kernel-xen-2.6.18-417.el5.ia64.rpm     MD5: 82ba7cd9006e25bdecb8ff1d8814b221SHA-256: bf86b4ad9c3007cf6dd65240821e9eab231fead49787b194338a716ae595e5eb kernel-xen-debuginfo-2.6.18-417.el5.ia64.rpm     MD5: f30b693eb1fbe21e9bf861fa66c257f8SHA-256: 555bd486c735662d6963a9838a53cd4616a28e01b3f81a689ede438bd0d5abcd kernel-xen-devel-2.6.18-417.el5.ia64.rpm     MD5: a0e6d40dcd8f42dc14e3b177d7f105aeSHA-256: 420601aa5da611f105fbcdd03ce2a847282f931bc126d37b92ec9a675e85c6e5   PPC: kernel-2.6.18-417.el5.ppc64.rpm     MD5: ff7e18cc1bd707f1894a454704871bd0SHA-256: b11eb0b05b660c6899265977a88293065c4373eb4a2ab2d296abb679401a0cb6 kernel-debug-2.6.18-417.el5.ppc64.rpm     MD5: cd978e7dde536f805a5ded685bbee1e7SHA-256: eafb8e04795a6a89f3d6aba404144344efeccec35bd3dba1775db5301425b1e9 kernel-debug-debuginfo-2.6.18-417.el5.ppc64.rpm     MD5: 75ad5a4e56b19cb8df4daba4d162475dSHA-256: 7243086506781eb3e2957a1f99e7fcb08971002d82f2783fd386d90d03e9df70 kernel-debug-devel-2.6.18-417.el5.ppc64.rpm     MD5: 53a4c5bdd3e6ffd5fb5bb00e109fff59SHA-256: 7a61cc02ca3c7ca72985b8a251ed7d2e50771bb8aa3ecef424a41020d1cac80e kernel-debuginfo-2.6.18-417.el5.ppc64.rpm     MD5: 9ec962b636c810983307cc4dce7032c9SHA-256: d40f2e1234d3543e43e4745bd26f041680f6f88b92ea10a0f2643696099b4c7a kernel-debuginfo-common-2.6.18-417.el5.ppc64.rpm     MD5: f6e1467258c690c9df567aedaba23533SHA-256: ac12bf953bed6868a63123321098735b4c6400a414eca87f4c6e9655d3a9540d kernel-devel-2.6.18-417.el5.ppc64.rpm     MD5: 7ffd212e07a4cb887e8b9fd9acc182e5SHA-256: c270974da1cd73d99bbad4044d90ec5d9f45bc19d97c584aad2d23ff5b1cc395 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.ppc.rpm     MD5: 046ac592d7bf7bb54521cdceff7c8739SHA-256: e7202e0b1cd8034a012110bd583a4d7ff7b8928055a228a344648ef35efce76e kernel-headers-2.6.18-417.el5.ppc64.rpm     MD5: e2e6fd6320d98b2f3b87d11be02f48e1SHA-256: a6fa3c2ad51c1335c470ec1b798c4f7751f043f04a1b0108347205b2a67e2cd5 kernel-kdump-2.6.18-417.el5.ppc64.rpm     MD5: bc74a3290013c789f2b48d8b5f629943SHA-256: f3e4be9dc783d3ae2448f06dcde90ba34078deb375665bb651ae898d9f5a8c57 kernel-kdump-debuginfo-2.6.18-417.el5.ppc64.rpm     MD5: 17c7d7ebcf83df645cdc9367b0e41481SHA-256: dbae6a913737083c15accd4183e413b0cc2f4a5a4df1a0d9f09d94e15ddcbc17 kernel-kdump-devel-2.6.18-417.el5.ppc64.rpm     MD5: 3ea2f143432588110a56af82dddec8c7SHA-256: 514d3aba1839f5e5cd0803aae7a21dcfc55c7c636d5836e2c17183131e52e2b5   s390x: kernel-2.6.18-417.el5.s390x.rpm     MD5: ede1de60dafef9c92cb5a09bfb3fca50SHA-256: c4077989884d658a1e36ddb8d14d3b58a229162b4aea47540d9d81c5fb0d882b kernel-debug-2.6.18-417.el5.s390x.rpm     MD5: 1f4be3d76d87be74fa21a19560d87d47SHA-256: fd4b9fc46c6dba6ed3d79c220492b9cb8ebe6a72f764a8778e72e814329b95a0 kernel-debug-debuginfo-2.6.18-417.el5.s390x.rpm     MD5: a5bca4f20326c273abea3107fbc7fe1dSHA-256: 2a15116d66a7b4bca57503aab44141e03d92c7812d1b40288287d3f0f7b45a8c kernel-debug-devel-2.6.18-417.el5.s390x.rpm     MD5: 66bb6b0565bbbb35868362f943727e99SHA-256: 3559b4e8f238d975b3fe6b015be0d366d942dff0fcab125ee299cf87c66dcbea kernel-debuginfo-2.6.18-417.el5.s390x.rpm     MD5: 4a068f590d12ccedc1b321355ec17eb5SHA-256: eeefa8904b06a4f25a8a277fe7464b55ada2bf21922db7f6dbe7b8220fe68292 kernel-debuginfo-common-2.6.18-417.el5.s390x.rpm     MD5: 924c6be198499b65e39915ff7686bd78SHA-256: cc1499f45de64772383e6d24dc39d17e3e864010217c36b8c7f8311346785b7d kernel-devel-2.6.18-417.el5.s390x.rpm     MD5: 4d1086c73a4c087f9c9a944f79fbdd2eSHA-256: 59a659fbb1a1570b2d452217962f795e5184f9aeddc659f14a26b5d86a33863b kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.s390x.rpm     MD5: 280ac8c543abc23417365b56ef5723eeSHA-256: 3aab5af416a7b21f3a157992e5a0d83cc3106579a5ef46f9f9d63f8220d7ee20 kernel-kdump-2.6.18-417.el5.s390x.rpm     MD5: 2f1ff67d6558c3b2408072ae48912ec9SHA-256: 9153696399fea10b9300f40577e498937919ac95cd821f320b9588842af3c6f9 kernel-kdump-debuginfo-2.6.18-417.el5.s390x.rpm     MD5: 5ce517795316b7ff41a2843e9e9edc83SHA-256: 2480ea5a5f66da7354cb1c36ae7f269912696ed6d1013a84971d4e8042b4e695 kernel-kdump-devel-2.6.18-417.el5.s390x.rpm     MD5: d6a020feedfbd72c222d9a116cbe3343SHA-256: d4618cb122854ff60aca29b866778f90d4b1362c9ebe5f114dd42266226ad0f2   x86_64: kernel-2.6.18-417.el5.x86_64.rpm     MD5: c24b71dacf966c2b69a5a75f91be918cSHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38 kernel-debug-2.6.18-417.el5.x86_64.rpm     MD5: ab9aa06254d17c4c9548b1ea7804ef19SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: c188e6ea712aa61762e3ed7b87f9a161SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa kernel-debug-devel-2.6.18-417.el5.x86_64.rpm     MD5: 94fb13187d4b899c2049b939e68560adSHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531 kernel-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: ac108d9259693dfae83706a8c49579bfSHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm     MD5: 606c7830ccb272249f5aab62ec7e0efcSHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c kernel-devel-2.6.18-417.el5.x86_64.rpm     MD5: e2aa6bf6f609c1835d99e39fee2a4290SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.x86_64.rpm     MD5: 5d1275a9c97dbdb1e54056396ff88037SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7 kernel-xen-2.6.18-417.el5.x86_64.rpm     MD5: 8f5ce4954dbc2116ced9725d3548d9cdSHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965 kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: f2a4f4836f82189f922b3d2e86ba1b7cSHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2 kernel-xen-devel-2.6.18-417.el5.x86_64.rpm     MD5: a6412f869bb51a8267a9706e4262b33bSHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: kernel-2.6.18-417.el5.src.rpm     MD5: 4283c50e1a723ddc186ac3f49dcd7d00SHA-256: dc5cc9198cf6f9b1ca25c4d9c3ec341649f562a7283d06373ee7ed5d8a14c7ae   IA-32: kernel-2.6.18-417.el5.i686.rpm     MD5: bb944ac235b5ca2fc2061144c1b5f08dSHA-256: 6ea22df7be6594c2281dc6318d2144ebc04f8317e820117a961ded8ef66445eb kernel-PAE-2.6.18-417.el5.i686.rpm     MD5: 7b9f6e09489554062456a615e25f0630SHA-256: 52fd33be241fde923cc7ba4d31bcd94cea34edb739187869556b62d010d8756f kernel-PAE-debuginfo-2.6.18-417.el5.i686.rpm     MD5: f9016bb5143a48556359c32903ba473aSHA-256: a835e2e578a1dad090229dce5a8071b7932d207fafd66422983180797a1f1adc kernel-PAE-devel-2.6.18-417.el5.i686.rpm     MD5: ec97f1c345b9a15ff815543c4b9f484aSHA-256: 596189af5e5f641600cf3a49e53820bc79e4dc32f0ecba9713ca9afc047dd400 kernel-debug-2.6.18-417.el5.i686.rpm     MD5: f0b0d829e80765c0d70e5c273fb18532SHA-256: 4f25680fde7320643b269a203de9df022484cd1824ef0cc69978edf1cbc46878 kernel-debug-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 7e8691ab43cd599a963dd69b3f5853d6SHA-256: 0a050e15525cff972664564a4d950fa397bfe95bc5da23cca292ffebb3775774 kernel-debug-devel-2.6.18-417.el5.i686.rpm     MD5: 974b760d657b1bfb101e6e13cd4dd372SHA-256: ccdae634a1c27144ddfd3d9d62ccb23241f8660f03862cda7834902d3fff7c47 kernel-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 84217c363e695b4612041ce45b984cf5SHA-256: 5c726ec72edc577d847d0cb1f2765a615378170c5a005b537e6458ca0617955c kernel-debuginfo-common-2.6.18-417.el5.i686.rpm     MD5: 2649996e4544ee7ea50d1620b6562352SHA-256: 07d75ba791986d54262bdf7af086474a4dd4a4d221f6b9b4be2aa45e1ed3e4ef kernel-devel-2.6.18-417.el5.i686.rpm     MD5: 53a61e0bdb479f061db8c01eab3c492cSHA-256: e682ff313dce46f095420eb9f4f0249248785cede1387315d16909c2874e71b8 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.i386.rpm     MD5: 663994d90e10d5975d87b21d9aa24063SHA-256: 4df342da49b769e60e6c6c6a9812fdb738f4c6e231bcbce10c03c267bdb71692 kernel-xen-2.6.18-417.el5.i686.rpm     MD5: 9e601ffa9436b8d5d602d8dfb8ac5628SHA-256: 7236cefb71ca1ed729ee423bee1ec549d065c0117c58e9d23f3985a42eba2c0f kernel-xen-debuginfo-2.6.18-417.el5.i686.rpm     MD5: 4f2c346c65b7826c3f315b0e71a63af0SHA-256: 1a03025737f3a2cb4179a5a45f01945b45cc79b8796a61bf9a63c3b7ab2dc4f5 kernel-xen-devel-2.6.18-417.el5.i686.rpm     MD5: d7402b006fe49104c2bbfda929c45532SHA-256: fc618b2169dfce782e0153a76146688ae9842bd41d34367bb41405b3d3c4231b   x86_64: kernel-2.6.18-417.el5.x86_64.rpm     MD5: c24b71dacf966c2b69a5a75f91be918cSHA-256: 6118209329e9b366ab97200a87737e9feda7c47a1c2261bc66ed7000966aab38 kernel-debug-2.6.18-417.el5.x86_64.rpm     MD5: ab9aa06254d17c4c9548b1ea7804ef19SHA-256: 8207bc083e33680b984425b269cfddf6a337a8a73006f91848108f193e0a740b kernel-debug-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: c188e6ea712aa61762e3ed7b87f9a161SHA-256: daf217c7140707964bfd895d92e0749fc75647f0b14ab9120a221856f1303daa kernel-debug-devel-2.6.18-417.el5.x86_64.rpm     MD5: 94fb13187d4b899c2049b939e68560adSHA-256: c3cc69fc738092a39ae1605aa98a0766af604f11142f3306b22e01391519a531 kernel-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: ac108d9259693dfae83706a8c49579bfSHA-256: 06d44532c4167b796d1cb8337c29ff7be6559bac7c65b945b65bbbc39ad0660c kernel-debuginfo-common-2.6.18-417.el5.x86_64.rpm     MD5: 606c7830ccb272249f5aab62ec7e0efcSHA-256: d15227aec97941660253d23d6b49811032228f17457a703eea9c40f372a4dc4c kernel-devel-2.6.18-417.el5.x86_64.rpm     MD5: e2aa6bf6f609c1835d99e39fee2a4290SHA-256: ac2cfe3276190d33b65c5f0cab52cd46ab04dd1d9fea8bec4d46f4002f15a029 kernel-doc-2.6.18-417.el5.noarch.rpm     MD5: 753ec2bac578f7e334c27b50c0b44dc3SHA-256: 6ad8d252638db759f49c6bb7a17a4e1e1d0f12732bd2cdff6f37a8c79e5f0cbe kernel-headers-2.6.18-417.el5.x86_64.rpm     MD5: 5d1275a9c97dbdb1e54056396ff88037SHA-256: 2759ae78d3133f8831e8a35d6737886bd6b51a99df6fa6d3867910168cc856c7 kernel-xen-2.6.18-417.el5.x86_64.rpm     MD5: 8f5ce4954dbc2116ced9725d3548d9cdSHA-256: 18273f99b61e5e55db90f3eb331446a929399930931ead2f86d28246d2905965 kernel-xen-debuginfo-2.6.18-417.el5.x86_64.rpm     MD5: f2a4f4836f82189f922b3d2e86ba1b7cSHA-256: 9d95a5d7eebd160cc9b881da56ed392dd21806a6dfbca0c17559395006740ab2 kernel-xen-devel-2.6.18-417.el5.x86_64.rpm     MD5: a6412f869bb51a8267a9706e4262b33bSHA-256: 56c116f4d3ac12fee5da396c0f4682b25b3fd8814cac8f52b50008d4dbc5c983   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Preparing For The Future Of Online Threats

Gaze into the crystal balls of a panel of forward-thinking security experts during Dark Reading's virtual event, tomorrow, Nov. 15. Where will cybercrime be in three years? In five? And what new exploits will attackers be using and vulnerabilities will they be seeing? Join me and a panel of industry security thought leaders as we ponder the future of online attacks – and how your organization can prepare today for tomorrow’s new exploits. My guests include Cheryl Biswas, cybersecurity analyst for threat intel at KPMG; Keith Brogan, managing director, Deloitte Cyber Risk Services; Thom Bailey, head of product marketing for endpoint, Sophos Central, and security analytics, Sophos; and Brian NeSmith, co-founder and CEO, Arctic Wolf. We’ll be tackling a range of critical questions and issues, among them, Where the new battlegrounds are in terms of actors - hackers, criminals, nation states - and threats; How to build a security organization and integrate actionable intelligence into daily operations; What technology breakthroughs are on the horizon and how that will change cyber defense; Future-proofing the human failures in online attacks.   I hope you’ll join me tomorrow, November 15, from 3:45pm – 4:30pm ET for the "The Future Of The Online Threat" panel during Dark Reading's virtual event, Rethinking Your Enterprise IT Security Strategy.
It’s free to register and you can chat online with the panelists immediately after the session. For more information on keynote speakers and other discussion topics, check out the information below: Dark Reading's all-day virtual event Nov. 15 offers an in-depth look at myths surrounding data defense and how to put business on a more effective security path.  Related Content: Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ...
View Full Bio More Insights

RHBA-2016:2678-1: qemu-kvm bug fix update

Updated qemu-kvm packages that fix one bug are now available for Red HatEnterprise Linux 7. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

The qemu-kvm packages provide the user-spacecomponent for running virtual machines using KVM.This update fixes the following bug:* After applying the fix for security issue CVE-2016-3712, the installation ofcertain guests on Red Hat Enterprise Linux was not possible due to unmodifiableregisters.

This update introduces a new register set to be used instead of vgaregisters in these guests.

As a result, the vga registers no longer cause theguest installation to fail. (BZ#1347527)* Previously, calling the Streaming SIMD Extensions 4 (SSE4) version of thestrstr() function returned incorrect results due to missing support forstrstr().

This update adds this support, and calling SSE4 strstr() now returnscorrect results. (BZ#1366535)* The fix for CVE-2016-5403 caused migrating guest instances to fail with a"Virtqueue size exceeded" error message. With this update, the value of thevirtualization queue is recalculated after the migration, and the describedproblem no longer occurs. (BZ#1380306)* Previously, the "virsh dump" command failed when both the --memory-only and--format options were used.

This update fixes the underlying code, and "virshdump" works as expected in the described circumstances. (BZ#1382645)Users of qemu-kvm are advised to upgrade to these updated packages, which fixthis bug.

After installing this update, shut down all running virtual machines.Once all virtual machines have shut down, start them again for this update totake effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux HPC Node EUS (v. 7.2) SRPMS: qemu-kvm-1.5.3-105.el7_2.10.src.rpm     MD5: 30dd409b98ab0d6d53f93e10a8b98bd1SHA-256: 608d300dd98a6e32370bd623ae05745147c2fba6617bf130a1beb14010538d20   x86_64: libcacard-1.5.3-105.el7_2.10.i686.rpm     MD5: e07bbcd035581c72dd02375bd3702e3dSHA-256: 0757662a305b4c18076f5c93e982df6c6da4a251d390e5fc4f5609c35bf9c7b8 libcacard-1.5.3-105.el7_2.10.x86_64.rpm     MD5: eb8025a004c1ad80659645958d0dbe73SHA-256: c4cf72148f242391bda7e2bbe4b07b164bc53341dfc4f806bb7394d8af898b2e libcacard-devel-1.5.3-105.el7_2.10.i686.rpm     MD5: 47028bc770c09717d3dd76597e4328c3SHA-256: d3d25fac6acf29eafdd51bc9ff087d06082fc24b632ed74590e163e7977d08d4 libcacard-devel-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 0fafe267ce11cb3d1b6c5a54d54176b8SHA-256: e3c97480616da513cfdab35809ad8151f4676aa9f6990785a5f4789429bbce05 libcacard-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: b36cd24bacb197f61021131b7211f176SHA-256: 585ac2487c1f278caba5f97fa461e74b624a269d263d5e30170e68fd2618e22e qemu-img-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 86b4aaa369339e0ae57e91c3ec4b6d0eSHA-256: 5e59a150302eb14adbf7cc2d6826adee9a9bf182c2c1e190221947599d5754b7 qemu-kvm-1.5.3-105.el7_2.10.x86_64.rpm     MD5: a93e050eda31ef6c4bed791a67864110SHA-256: 5c74936f412f8d8cd94a74139f82ee7eba47e97f5398ac093282d981b37f4192 qemu-kvm-common-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 21dabb982fbd7b1b847ae9809c2438acSHA-256: 755dc52591df0dd28402b4f15e4de69c116a1f96ff8bcd330a6357ae29ce8276 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.i686.rpm     MD5: 8c09ffed5c490b7af1892a433d990b5aSHA-256: 20207bf20a6b383e57ba28b2f61a61bfe256a0544c6abf77b670d16fb64e78d2 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 9b951049471f1c3e5fc9625d81d4dfa4SHA-256: 3bdd0f879edfd365a6a6ef3a40be6c1c8b35824194b8660721f0b84b494bdc3f qemu-kvm-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 3f7e749e4a66e00d52039cfb2e105634SHA-256: daf0adb15598d6e06c6b1df12a2ab3dce7f7899b4a9c8899bf61c72af48708ec   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: qemu-kvm-1.5.3-105.el7_2.10.src.rpm     MD5: 30dd409b98ab0d6d53f93e10a8b98bd1SHA-256: 608d300dd98a6e32370bd623ae05745147c2fba6617bf130a1beb14010538d20   x86_64: libcacard-1.5.3-105.el7_2.10.i686.rpm     MD5: e07bbcd035581c72dd02375bd3702e3dSHA-256: 0757662a305b4c18076f5c93e982df6c6da4a251d390e5fc4f5609c35bf9c7b8 libcacard-1.5.3-105.el7_2.10.x86_64.rpm     MD5: eb8025a004c1ad80659645958d0dbe73SHA-256: c4cf72148f242391bda7e2bbe4b07b164bc53341dfc4f806bb7394d8af898b2e libcacard-devel-1.5.3-105.el7_2.10.i686.rpm     MD5: 47028bc770c09717d3dd76597e4328c3SHA-256: d3d25fac6acf29eafdd51bc9ff087d06082fc24b632ed74590e163e7977d08d4 libcacard-devel-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 0fafe267ce11cb3d1b6c5a54d54176b8SHA-256: e3c97480616da513cfdab35809ad8151f4676aa9f6990785a5f4789429bbce05 libcacard-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: b36cd24bacb197f61021131b7211f176SHA-256: 585ac2487c1f278caba5f97fa461e74b624a269d263d5e30170e68fd2618e22e qemu-img-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 86b4aaa369339e0ae57e91c3ec4b6d0eSHA-256: 5e59a150302eb14adbf7cc2d6826adee9a9bf182c2c1e190221947599d5754b7 qemu-kvm-1.5.3-105.el7_2.10.x86_64.rpm     MD5: a93e050eda31ef6c4bed791a67864110SHA-256: 5c74936f412f8d8cd94a74139f82ee7eba47e97f5398ac093282d981b37f4192 qemu-kvm-common-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 21dabb982fbd7b1b847ae9809c2438acSHA-256: 755dc52591df0dd28402b4f15e4de69c116a1f96ff8bcd330a6357ae29ce8276 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.i686.rpm     MD5: 8c09ffed5c490b7af1892a433d990b5aSHA-256: 20207bf20a6b383e57ba28b2f61a61bfe256a0544c6abf77b670d16fb64e78d2 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 9b951049471f1c3e5fc9625d81d4dfa4SHA-256: 3bdd0f879edfd365a6a6ef3a40be6c1c8b35824194b8660721f0b84b494bdc3f qemu-kvm-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 3f7e749e4a66e00d52039cfb2e105634SHA-256: daf0adb15598d6e06c6b1df12a2ab3dce7f7899b4a9c8899bf61c72af48708ec   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: qemu-kvm-1.5.3-105.el7_2.10.src.rpm     MD5: 30dd409b98ab0d6d53f93e10a8b98bd1SHA-256: 608d300dd98a6e32370bd623ae05745147c2fba6617bf130a1beb14010538d20   PPC: libcacard-1.5.3-105.el7_2.10.ppc.rpm     MD5: a1306851825271c035b75e9922d81932SHA-256: adc471b512323f9223b6fb065ab128fd8116555efb069fff38be1b7e28214949 libcacard-1.5.3-105.el7_2.10.ppc64.rpm     MD5: 39fa761a8bfd0b052db766382cde0532SHA-256: e80e677444091f6925f50ffedcbfc1acd223fe29ee0ee2a5f58e4adf7b57bb35 libcacard-devel-1.5.3-105.el7_2.10.ppc.rpm     MD5: 951af6994235c9baf395f7ffe496d440SHA-256: 8621dcbefac8ecbe255fdf4e16729524af0f3b2e27275b9a5c9755cd85d9a3d0 libcacard-devel-1.5.3-105.el7_2.10.ppc64.rpm     MD5: 1f5675b7750d3d97215c1b37dfec58c3SHA-256: 669c5f9bc9eb7c92e489fa652c2b83094b07d6e3d87c214b7ad79fa1addce9dd libcacard-tools-1.5.3-105.el7_2.10.ppc64.rpm     MD5: 73ede1ffe7fcbc919acac679dbb8606cSHA-256: 48d1c4dc54372b6f8c1a9144af575a3124fd3f0a0bf584c5bdc6d42287280546 qemu-img-1.5.3-105.el7_2.10.ppc64.rpm     MD5: 2844f3f9e9d17c69c9c6d3b75158cf27SHA-256: acca8f501deedae389d20de4ccb84dcabb499cdd6c40c5d26a13e918680caef3 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.ppc.rpm     MD5: 3187accbcb85fe862714712f4bc31f9fSHA-256: 34b1ae3a81ba45dc2fd6ea8dfccc21a4df8eec134db1456c509549bff83dc39f qemu-kvm-debuginfo-1.5.3-105.el7_2.10.ppc64.rpm     MD5: 87fed68b2da6f7feab0a4cc2cbdc116fSHA-256: 12a25935946c83e2d3f49c0783584feda10d328a7b1ec97f9a111dadcf7a74ec   PPC64LE: libcacard-1.5.3-105.el7_2.10.ppc64le.rpm     MD5: f2fd26a262b35bd7d19424e5450ba533SHA-256: 2d1d5725e75f2e422163e85473773cdb129494f6f81e6cd7c9d3c14d2ba42a0d libcacard-devel-1.5.3-105.el7_2.10.ppc64le.rpm     MD5: 9402797f966f60ad6d1636575fcf5623SHA-256: 07d33ad7573b302c0eb1d4e5fd75e026f0ee26ab8ad74253b46469f814c676a1 libcacard-tools-1.5.3-105.el7_2.10.ppc64le.rpm     MD5: 6f51f1834772f5f5fe0f3660fff4e85fSHA-256: 5bf058bd42a94349ecaac4ec1b974ce1255531681caae76c9a3fade554722a54 qemu-img-1.5.3-105.el7_2.10.ppc64le.rpm     MD5: d05187798d965b346bdf613bacc0bb2eSHA-256: b39a824f1e2db67854062de8bdddcc03957dffba15e46dd8802259d91f81f656 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.ppc64le.rpm     MD5: 705ad3fa92202305851da73fa9264441SHA-256: f95d97bc70b6771e45f0b24d6526ffebafe340d73557db8728bce22a58927c21   x86_64: libcacard-1.5.3-105.el7_2.10.i686.rpm     MD5: e07bbcd035581c72dd02375bd3702e3dSHA-256: 0757662a305b4c18076f5c93e982df6c6da4a251d390e5fc4f5609c35bf9c7b8 libcacard-1.5.3-105.el7_2.10.x86_64.rpm     MD5: eb8025a004c1ad80659645958d0dbe73SHA-256: c4cf72148f242391bda7e2bbe4b07b164bc53341dfc4f806bb7394d8af898b2e libcacard-devel-1.5.3-105.el7_2.10.i686.rpm     MD5: 47028bc770c09717d3dd76597e4328c3SHA-256: d3d25fac6acf29eafdd51bc9ff087d06082fc24b632ed74590e163e7977d08d4 libcacard-devel-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 0fafe267ce11cb3d1b6c5a54d54176b8SHA-256: e3c97480616da513cfdab35809ad8151f4676aa9f6990785a5f4789429bbce05 libcacard-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: b36cd24bacb197f61021131b7211f176SHA-256: 585ac2487c1f278caba5f97fa461e74b624a269d263d5e30170e68fd2618e22e qemu-img-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 86b4aaa369339e0ae57e91c3ec4b6d0eSHA-256: 5e59a150302eb14adbf7cc2d6826adee9a9bf182c2c1e190221947599d5754b7 qemu-kvm-1.5.3-105.el7_2.10.x86_64.rpm     MD5: a93e050eda31ef6c4bed791a67864110SHA-256: 5c74936f412f8d8cd94a74139f82ee7eba47e97f5398ac093282d981b37f4192 qemu-kvm-common-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 21dabb982fbd7b1b847ae9809c2438acSHA-256: 755dc52591df0dd28402b4f15e4de69c116a1f96ff8bcd330a6357ae29ce8276 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.i686.rpm     MD5: 8c09ffed5c490b7af1892a433d990b5aSHA-256: 20207bf20a6b383e57ba28b2f61a61bfe256a0544c6abf77b670d16fb64e78d2 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 9b951049471f1c3e5fc9625d81d4dfa4SHA-256: 3bdd0f879edfd365a6a6ef3a40be6c1c8b35824194b8660721f0b84b494bdc3f qemu-kvm-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 3f7e749e4a66e00d52039cfb2e105634SHA-256: daf0adb15598d6e06c6b1df12a2ab3dce7f7899b4a9c8899bf61c72af48708ec   Red Hat Enterprise Linux Server TUS (v. 7.2) SRPMS: qemu-kvm-1.5.3-105.el7_2.10.src.rpm     MD5: 30dd409b98ab0d6d53f93e10a8b98bd1SHA-256: 608d300dd98a6e32370bd623ae05745147c2fba6617bf130a1beb14010538d20   x86_64: libcacard-1.5.3-105.el7_2.10.i686.rpm     MD5: e07bbcd035581c72dd02375bd3702e3dSHA-256: 0757662a305b4c18076f5c93e982df6c6da4a251d390e5fc4f5609c35bf9c7b8 libcacard-1.5.3-105.el7_2.10.x86_64.rpm     MD5: eb8025a004c1ad80659645958d0dbe73SHA-256: c4cf72148f242391bda7e2bbe4b07b164bc53341dfc4f806bb7394d8af898b2e libcacard-devel-1.5.3-105.el7_2.10.i686.rpm     MD5: 47028bc770c09717d3dd76597e4328c3SHA-256: d3d25fac6acf29eafdd51bc9ff087d06082fc24b632ed74590e163e7977d08d4 libcacard-devel-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 0fafe267ce11cb3d1b6c5a54d54176b8SHA-256: e3c97480616da513cfdab35809ad8151f4676aa9f6990785a5f4789429bbce05 libcacard-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: b36cd24bacb197f61021131b7211f176SHA-256: 585ac2487c1f278caba5f97fa461e74b624a269d263d5e30170e68fd2618e22e qemu-img-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 86b4aaa369339e0ae57e91c3ec4b6d0eSHA-256: 5e59a150302eb14adbf7cc2d6826adee9a9bf182c2c1e190221947599d5754b7 qemu-kvm-1.5.3-105.el7_2.10.x86_64.rpm     MD5: a93e050eda31ef6c4bed791a67864110SHA-256: 5c74936f412f8d8cd94a74139f82ee7eba47e97f5398ac093282d981b37f4192 qemu-kvm-common-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 21dabb982fbd7b1b847ae9809c2438acSHA-256: 755dc52591df0dd28402b4f15e4de69c116a1f96ff8bcd330a6357ae29ce8276 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.i686.rpm     MD5: 8c09ffed5c490b7af1892a433d990b5aSHA-256: 20207bf20a6b383e57ba28b2f61a61bfe256a0544c6abf77b670d16fb64e78d2 qemu-kvm-debuginfo-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 9b951049471f1c3e5fc9625d81d4dfa4SHA-256: 3bdd0f879edfd365a6a6ef3a40be6c1c8b35824194b8660721f0b84b494bdc3f qemu-kvm-tools-1.5.3-105.el7_2.10.x86_64.rpm     MD5: 3f7e749e4a66e00d52039cfb2e105634SHA-256: daf0adb15598d6e06c6b1df12a2ab3dce7f7899b4a9c8899bf61c72af48708ec   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2016:2673-1: qemu-kvm-rhev bug fix and enhancement update

Updated qemu-kvm-rhev packages that fix several bugs and add variousenhancements are now available for Red Hat Virtualization Hypervisor 7. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

Th...