Home Tags Md5

Tag: md5

XPan, I am your father

While we have previously written on the now infamous XPan ransomware family, some of it’s variants are still affecting users primarily located in Brazil.

This sample is what could be considered as the “father” of other XPan ransomware variants.

A considerable amount of indicators within the source code depict the early origins of this sample.

Old Malware Tricks To Bypass Detection in the Age of Big...

Kaspersky Lab has been tracking a targeted attack actor’s activities in Japan and South Korea recently.

This attacker has been using the XXMM malware toolkit, which was named after an original project path revealed through a pdb string inside the… Read Full Article

ATMitch: remote administration of ATMs

In February 2017, we published research on fileless attacks against enterprise networks.

This second paper is about the methods and techniques that were used by the attackers in the second stage of their attacks against financial organizations – basically enabling remote administration of ATMs.

PetrWrap: the new Petya-based ransomware used in targeted attacks

This year we found a new family of ransomware used in targeted attacks against organizations.

After penetrating an organization's network the threat actors used the PsExec tool to install ransomware on all endpoints and servers in the organization.

The next interesting fact about this ransomware is that the threat actors decided to use the well-known Petya ransomware to encrypt user data.

At death’s door for years, widely used SHA1 function is now...

Algorithm underpinning Internet security falls to first-known collision attack.

New(ish) Mirai Spreader Poses New Risks

A cross-platform win32-based Mirai spreader and botnet is in the wild and previously discussed publicly. However, there is much information confused together, as if an entirely new IoT bot is spreading to and from Windows devices.

This is not the case.
Instead, an accurate assessment is that a previously active Windows botnet is spreading a Mirai bot variant.

KopiLuwak: A New JavaScript Payload from Turla

A new, unique JavaScript payload is now being used by Turla in targeted attacks.

This new payload, dubbed KopiLuwak, is being delivered using embedded macros within Office documents.

RHSA-2017:0190-1: Critical: firefox security update

An update for firefox is now available for Red Hat Enterprise Linux 5, Red HatEnterprise Linux 6, and Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Mozilla Firefox is an open source web browser.This update upgrades Firefox to version 45.7.0 ESR.Security Fix(es):* Multiple flaws were found in the processing of malformed web content. A webpage containing malicious content could cause Firefox to crash or, potentially,execute arbitrary code with the privileges of the user running Firefox.(CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380,CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)Red Hat would like to thank the Mozilla project for reporting these issues.Upstream acknowledges Jann Horn, Muneaki Nishimura, Nils, Armin Razmjou,Christian Holler, Gary Kwong, André Bargull, Jan de Mooij, Tom Schuster, andOriol, Rh0, Nicolas Grégoire, and Jerri Rice as the original reporters. Red Hat Enterprise Linux (v. 5 server) SRPMS: firefox-45.7.0-1.el5_11.src.rpm     MD5: 2b1dec6ead6378170de4bc8a7684043fSHA-256: e76106926213b88f14d6e1032bc6cf7a443dd36c20fe860eac94e526c49baa61   IA-32: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632   PPC: firefox-45.7.0-1.el5_11.ppc64.rpm     MD5: 8b25ba172ad088253983c0df0bcf17c5SHA-256: 36389c08ccb8e1362dde937e65ea12326228ce32c552eeeeaddedf83b10cca00 firefox-debuginfo-45.7.0-1.el5_11.ppc64.rpm     MD5: b85a6bc7bec3d6d863f8bfdaa4710f72SHA-256: 83f4042c1f550793634cf60a0dfeae96451562accb1aa3d8997d63975c6493ec   s390x: firefox-45.7.0-1.el5_11.s390x.rpm     MD5: adcf2bbf86d194fa27d53fcdf69a2546SHA-256: 5303f6b6d26a3194eae69ae23139ae3d6c678355ad8118464ea93c18c40b9420 firefox-debuginfo-45.7.0-1.el5_11.s390x.rpm     MD5: 82103fbf027df425402f65f9aa04683bSHA-256: a3235e409b16349d799fab84aa7c58edb0320c10cacaff413b38fda47bbfce76   x86_64: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-45.7.0-1.el5_11.x86_64.rpm     MD5: 6d04b3beec9bd3c885f60507668393caSHA-256: 3fc61aa258633191a6fdb97a601f5cffbdf8d782c2809bda3e80f3156359a3e0 firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632 firefox-debuginfo-45.7.0-1.el5_11.x86_64.rpm     MD5: 7e0442cef583cf3eafe949a7bdc65c62SHA-256: 82358fd4a0f3c6b532f65410dc5c075c82d6708cad49f6bedc31d6512d8312ea   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: firefox-45.7.0-1.el5_11.src.rpm     MD5: 2b1dec6ead6378170de4bc8a7684043fSHA-256: e76106926213b88f14d6e1032bc6cf7a443dd36c20fe860eac94e526c49baa61   IA-32: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632   x86_64: firefox-45.7.0-1.el5_11.i386.rpm     MD5: ec834a3d41b6149891d5fcc29dbb4019SHA-256: 60dacc641e98b617aefff4cea75e5c87c58fe379cd9a5ae3bdce6b2cff0a744d firefox-45.7.0-1.el5_11.x86_64.rpm     MD5: 6d04b3beec9bd3c885f60507668393caSHA-256: 3fc61aa258633191a6fdb97a601f5cffbdf8d782c2809bda3e80f3156359a3e0 firefox-debuginfo-45.7.0-1.el5_11.i386.rpm     MD5: 58b8ddf14b04d58a69d9a8559d6c640eSHA-256: d544789304de861b6491d64e4cda052eeda4b3e67727bf275a2f4e51cdfa8632 firefox-debuginfo-45.7.0-1.el5_11.x86_64.rpm     MD5: 7e0442cef583cf3eafe949a7bdc65c62SHA-256: 82358fd4a0f3c6b532f65410dc5c075c82d6708cad49f6bedc31d6512d8312ea   Red Hat Enterprise Linux Desktop (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   IA-32: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Desktop (v. 7) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Server (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   IA-32: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00   PPC: firefox-45.7.0-1.el6_8.ppc64.rpm     MD5: 069e4d823d63aef85ba7ca2d517d1bf2SHA-256: 62d4942969861419d190e8eeaf4459212b004e81929cd8014000d788b6857942 firefox-debuginfo-45.7.0-1.el6_8.ppc64.rpm     MD5: da598e8f60df66a59c858f8c11724f9fSHA-256: c3d0e0be7ee2d1894f4f82cc79bd8c4952dafc55db3199d60fc5a5b904154eb7   s390x: firefox-45.7.0-1.el6_8.s390x.rpm     MD5: 4da0b635699941fcdf51d5b721aaaf5dSHA-256: e7162344260685a638e0dc6f6926e7c68c801216ed12ef9014cff2b9d0fc94bd firefox-debuginfo-45.7.0-1.el6_8.s390x.rpm     MD5: 586724a7fe10e97b0b20ddfa66e5100bSHA-256: 6172b8ed83851ba2adc69e9ec8191f9be4137f2e2b839773075cdb696fc73227   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Server (v. 7) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   PPC: firefox-45.7.0-1.el7_3.ppc64.rpm     MD5: 84f58bd190215a79e84c57e657362164SHA-256: 8fd176f5ee79ec47777ca389793f5c985fb93e4e1c7df1bef980fb84e2cf25b1 firefox-debuginfo-45.7.0-1.el7_3.ppc64.rpm     MD5: 42ea902950f1abe079daa22a4f7e180fSHA-256: 98324d749df96c7269bc4f594b0358a6382026d5b33bb674e74186436171d81d   PPC64LE: firefox-45.7.0-1.el7_3.ppc64le.rpm     MD5: a26021d328466ae57dcb69b6036c3633SHA-256: 9bfa70ed36ccdac48b14280b06fcdd0a2fdc6689e3d280b9194635dac364572b firefox-debuginfo-45.7.0-1.el7_3.ppc64le.rpm     MD5: dfb22651c1cec514c1c8f846a02bd092SHA-256: ef981d61acb85dbd0cb8ef4bfb94db14ce220687d894cc463d52d1114246be3f   s390x: firefox-45.7.0-1.el7_3.s390x.rpm     MD5: 88229dd866fcfef6faa5c70238a1d43fSHA-256: f5bdb8710b8b5c355aef7f140c727ec5306409e9f746d5a9de23ec20467e5b6e firefox-debuginfo-45.7.0-1.el7_3.s390x.rpm     MD5: 5fd8d473955c6a0427670310b9e476d6SHA-256: 2e3883f704972ba8034b92986592c6e3b70fa5cdd17450cfbe6ed7db0b15d426   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: firefox-45.7.0-1.el6_8.src.rpm     MD5: b2ea4596f2a8691e2cfbaad9171ba813SHA-256: 1e452af6d20a4ce0b75316fb040faa7144c6bc63214e6d8fb612fd47c2e4d47d   IA-32: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00   x86_64: firefox-45.7.0-1.el6_8.i686.rpm     MD5: ee5356e13ab405f60c3ced7486255afdSHA-256: b6dac4a873a64d8d9d96505bfb263e2ee1af73ac67a624a208c4b1ee915e98b1 firefox-45.7.0-1.el6_8.x86_64.rpm     MD5: 787c92bb87ac309cb73419a6b6344466SHA-256: 3d1138e5b8c522795a37908ad737ae7688a93861ab4c2f7294464758b1486f76 firefox-debuginfo-45.7.0-1.el6_8.i686.rpm     MD5: 452a51627b460333aa05c30f421a559aSHA-256: 71a1d75e9826d8ed817931db1d5ffd261c9a34949070c3314d81a1de4cb70d00 firefox-debuginfo-45.7.0-1.el6_8.x86_64.rpm     MD5: 0d9ea1818ce93e6bee0c830c360c56cdSHA-256: 6c126b3470d298070da7a6f5f955aa36d1c6ba3252cd0ea05f17d722eb94b7b0   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: firefox-45.7.0-1.el7_3.src.rpm     MD5: 1fd5dd8baf285bd69a349c75269d2d63SHA-256: 32f2c9602dfbd29b243c717ed65c72413911abc7c90fb9fd9c298b87dbbbdbe1   x86_64: firefox-45.7.0-1.el7_3.i686.rpm     MD5: 093621500570e2ed1fc3290697713d5cSHA-256: 042b611ca212fe22b6b99d95486fd0c15a8ce9abdda802dcc478804a658a6e86 firefox-45.7.0-1.el7_3.x86_64.rpm     MD5: a9d9528b1c92190adb5f994801c99d76SHA-256: cd21ad7f5a7a75449df379832e08f513424a1f87d6e9d7e977c2c58e7edb0e7d firefox-debuginfo-45.7.0-1.el7_3.i686.rpm     MD5: 4cb4d719145315c7883dbf685b13f8e2SHA-256: 7b19e89d7be73ac77683343f4bc251d98e66b6812c984621e48a18a8ffdc0a13 firefox-debuginfo-45.7.0-1.el7_3.x86_64.rpm     MD5: 43c4571a807ffd84f950256ea595e58dSHA-256: 16ef9346047b8142e15f3ef0b0201329fd372ea6b9e768c05ba4c33792a2a071   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHEA-2017:0188-1: new packages: kmod-rtsx_pci

New kmod-rtsx_pci packages are now available for Red Hat Enterprise Linux 6. The kmod-rtsx_pci packages contain the Realtek card reader RTS5250S SD4.0 driverkernel module.

These packages add support for the Realtek RTS5250S card reader.The PCI ID supported by these packages: 10EC:525AThe kernel modules delivered by this erratum have been made available aspart of the Red Hat Driver Update Program, which provides updated kernelmodules that add support for selected devices in advance of the next RedHat Enterprise Linux minor update release. We strongly recommend thatthese kernel modules are used only to enable the specific hardware mentioned inthis erratum.

For all other devices that require this driver, partners andcustomers are recommended to continue to use the driver that is shipped in thelatest Red Hat Enterprise Linux kernel. (BZ#1410849)All users who require kmod-rtsx_pci are advised to install these new packages. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   IA-32: kmod-rtsx_pci-642-1.el6_8.i686.rpm     MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb rtsx_pci-debuginfo-642-1.el6_8.i686.rpm     MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   Red Hat Enterprise Linux Server (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   IA-32: kmod-rtsx_pci-642-1.el6_8.i686.rpm     MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb rtsx_pci-debuginfo-642-1.el6_8.i686.rpm     MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: rtsx_pci-642-1.el6_8.src.rpm     MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546   IA-32: kmod-rtsx_pci-642-1.el6_8.i686.rpm     MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb rtsx_pci-debuginfo-642-1.el6_8.i686.rpm     MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58   x86_64: kmod-rtsx_pci-642-1.el6_8.x86_64.rpm     MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8 rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm     MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2017:0184-1: Important: mysql security update

Red Hat Enterprise Linux Desktop (v. 6) SRPMS: mysql-5.1.73-8.el6_8.src.rpm     MD5: 373c8f5fe65433635301c939a69267ddSHA-256: 67da88bc7ae795fcc4b3cffe2163df54da43c22a43bbdd7496dd0734a940c85b   IA-32: mysql-5.1.73-8.el6_8.i686.rpm     MD5: 25c4bc53a9b9fdfa0ee1e9bee6aae6cdSHA-256: 130b32b85e62a21406095e8f5b5a8487d00794b58967764efd6f7701a337b4be mysql-bench-5.1.73-8.el6_8.i686.rpm     MD5: dec163ce1d668fcf108e944b87e77376SHA-256: fb54abaa15ddd416e60de9b511bcbc7eba56df54e42ff1bb773cc1db9074aca5 mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-server-5.1.73-8.el6_8.i686.rpm     MD5: d423ecc150742ca04ac93544a2fc93e7SHA-256: 728cbc24bbd5f67e699c8393d5fa6d0c5fb6869a2d3d7f228355859254c3f9cb mysql-test-5.1.73-8.el6_8.i686.rpm     MD5: e84f1283d073885429e0148ccf93f614SHA-256: a1c07af6d502b380f9b3b5acb089a2ef605cb005d149c8532e4af03ec9a44403   x86_64: mysql-5.1.73-8.el6_8.x86_64.rpm     MD5: 337bdd9b82da2a0cab920f0e2e1fdf8eSHA-256: 47d953245f0c085e18b0ed746dbd2c71476d42cb8567f5dde631353626a8b46d mysql-bench-5.1.73-8.el6_8.x86_64.rpm     MD5: ecce6ded2753982add68579608e114dbSHA-256: 5485d664daf44a536aec73b51d5379ec4d00b7583c6eec3e09987b20299e317e mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm     MD5: 0638b8e12caa67225a0682ea9ec4a36fSHA-256: e717ec786cb37d1645a10954893892a697637218b7d0c09c0ff9d921c412b89a mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: a02bd4757f502bb4f7af11892a27aa6aSHA-256: 14317eac4d897bdcff3bce57844d9c26b5f6656452caa295a2b5a0119fe840e6 mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-5.1.73-8.el6_8.x86_64.rpm     MD5: 6d2cedf88dec239bdf54556896ca7b54SHA-256: 605ec0ef1a6eec8966f72a69b0f1cf8df451d0ff28e62a11dd9375fdeb48a27c mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: e9b832771e3bb5ce5218d77a2be7c1baSHA-256: a581e25d701ba4cae911641d23318074c94f33eedf3db764d19916191d775e82 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-libs-5.1.73-8.el6_8.x86_64.rpm     MD5: 61e29952c5bfaec1afd55f96acd0860eSHA-256: af3fb18384ee8421e71f19709b94e511752ba4ffd3a8e0b08275dd09e92fc3c5 mysql-server-5.1.73-8.el6_8.x86_64.rpm     MD5: a6ae2ebea82baf675cbaa7fa34ed20baSHA-256: 70e37b2ccc5458c515c86301b746f5ca343f762da81b27b155d152a1f12752b6 mysql-test-5.1.73-8.el6_8.x86_64.rpm     MD5: d8684075a634f210aa46951e5e217212SHA-256: 2682532c3261efee2ed09590b5faa8c661388d487ed7dd996cb85c86cf6d328f   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: mysql-5.1.73-8.el6_8.src.rpm     MD5: 373c8f5fe65433635301c939a69267ddSHA-256: 67da88bc7ae795fcc4b3cffe2163df54da43c22a43bbdd7496dd0734a940c85b   x86_64: mysql-5.1.73-8.el6_8.x86_64.rpm     MD5: 337bdd9b82da2a0cab920f0e2e1fdf8eSHA-256: 47d953245f0c085e18b0ed746dbd2c71476d42cb8567f5dde631353626a8b46d mysql-bench-5.1.73-8.el6_8.x86_64.rpm     MD5: ecce6ded2753982add68579608e114dbSHA-256: 5485d664daf44a536aec73b51d5379ec4d00b7583c6eec3e09987b20299e317e mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm     MD5: 0638b8e12caa67225a0682ea9ec4a36fSHA-256: e717ec786cb37d1645a10954893892a697637218b7d0c09c0ff9d921c412b89a mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: a02bd4757f502bb4f7af11892a27aa6aSHA-256: 14317eac4d897bdcff3bce57844d9c26b5f6656452caa295a2b5a0119fe840e6 mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-5.1.73-8.el6_8.x86_64.rpm     MD5: 6d2cedf88dec239bdf54556896ca7b54SHA-256: 605ec0ef1a6eec8966f72a69b0f1cf8df451d0ff28e62a11dd9375fdeb48a27c mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: e9b832771e3bb5ce5218d77a2be7c1baSHA-256: a581e25d701ba4cae911641d23318074c94f33eedf3db764d19916191d775e82 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-libs-5.1.73-8.el6_8.x86_64.rpm     MD5: 61e29952c5bfaec1afd55f96acd0860eSHA-256: af3fb18384ee8421e71f19709b94e511752ba4ffd3a8e0b08275dd09e92fc3c5 mysql-server-5.1.73-8.el6_8.x86_64.rpm     MD5: a6ae2ebea82baf675cbaa7fa34ed20baSHA-256: 70e37b2ccc5458c515c86301b746f5ca343f762da81b27b155d152a1f12752b6 mysql-test-5.1.73-8.el6_8.x86_64.rpm     MD5: d8684075a634f210aa46951e5e217212SHA-256: 2682532c3261efee2ed09590b5faa8c661388d487ed7dd996cb85c86cf6d328f   Red Hat Enterprise Linux Server (v. 6) SRPMS: mysql-5.1.73-8.el6_8.src.rpm     MD5: 373c8f5fe65433635301c939a69267ddSHA-256: 67da88bc7ae795fcc4b3cffe2163df54da43c22a43bbdd7496dd0734a940c85b   IA-32: mysql-5.1.73-8.el6_8.i686.rpm     MD5: 25c4bc53a9b9fdfa0ee1e9bee6aae6cdSHA-256: 130b32b85e62a21406095e8f5b5a8487d00794b58967764efd6f7701a337b4be mysql-bench-5.1.73-8.el6_8.i686.rpm     MD5: dec163ce1d668fcf108e944b87e77376SHA-256: fb54abaa15ddd416e60de9b511bcbc7eba56df54e42ff1bb773cc1db9074aca5 mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-server-5.1.73-8.el6_8.i686.rpm     MD5: d423ecc150742ca04ac93544a2fc93e7SHA-256: 728cbc24bbd5f67e699c8393d5fa6d0c5fb6869a2d3d7f228355859254c3f9cb mysql-test-5.1.73-8.el6_8.i686.rpm     MD5: e84f1283d073885429e0148ccf93f614SHA-256: a1c07af6d502b380f9b3b5acb089a2ef605cb005d149c8532e4af03ec9a44403   PPC: mysql-5.1.73-8.el6_8.ppc64.rpm     MD5: edd7e0daf35867e3881931c3540a9fefSHA-256: d6d777fd0eb9a6fc19299304e5ce43e9fe0e8970bbd9f1d13568129685ad8446 mysql-bench-5.1.73-8.el6_8.ppc64.rpm     MD5: 2ef8c65ba7d7e174371a59a4dd755811SHA-256: 9c942d91ba889aa91f784f930e3bbff557bcc1047d7dda92e7879e5e34c71481 mysql-debuginfo-5.1.73-8.el6_8.ppc.rpm     MD5: 6a2e9ff60bea3b367484c3029f70cc06SHA-256: 32c6a30db51f38de315a7cd551c00c9e453e7b41703bec2f6450fbf24be92c45 mysql-debuginfo-5.1.73-8.el6_8.ppc64.rpm     MD5: 84fd2495ea021c69c3e3b7d90f5339bcSHA-256: ad3397f8fba5201b0ef944711fd71be9956085a0202aff95dcd64db780306955 mysql-devel-5.1.73-8.el6_8.ppc.rpm     MD5: ba4318ea8cfecc2e10b2ea7a7866f3e7SHA-256: 81349e7c30004546ddde8a9050fefaee212e54f192cef0c5cc91d7a75a7a567e mysql-devel-5.1.73-8.el6_8.ppc64.rpm     MD5: c0e838669809c555ff355b073bebc057SHA-256: 6478c13049da064fef89f0e38e9c7868fbe8dfd11da8cc4a889013660a170b7a mysql-embedded-5.1.73-8.el6_8.ppc.rpm     MD5: 5bc018caed022ea4f1bd7f46efadabf7SHA-256: e2645714f674f5655644598f3103c28135d9d8ce734e1c5588347b8114b4c9e7 mysql-embedded-5.1.73-8.el6_8.ppc64.rpm     MD5: 257c0bdcb34fc016bae8feb634f55693SHA-256: 49f5205824f828fec4b17a38e273008fb87d6fb96a6105ef522928b37981688c mysql-embedded-devel-5.1.73-8.el6_8.ppc.rpm     MD5: 1f4a61ed2a4ec381cf4247e989ffb505SHA-256: 01805ab4547b17e9c65dd2d1e4815aa4064059cbbf2002f1e43be02b0d76253f mysql-embedded-devel-5.1.73-8.el6_8.ppc64.rpm     MD5: c92b82d639a8f5c9ff31d81a6d4a72f5SHA-256: a2d6aa50345fa4070ac3ce6ad597124234a02abe2f90bd0970cd5a50ca99b294 mysql-libs-5.1.73-8.el6_8.ppc.rpm     MD5: b54b32783da47443f3ce8f54efe60126SHA-256: 8eeeec39bb163ac8e413b4aa894c42100a96692ea6f584077421be6bdc074275 mysql-libs-5.1.73-8.el6_8.ppc64.rpm     MD5: 792ff13f92f35837add71fab56e49279SHA-256: f5a2618988c301808ebcabe75d019e0aa4e82c49f9493c8db630ef8816e2b067 mysql-server-5.1.73-8.el6_8.ppc64.rpm     MD5: 3f802fb075e91276e1ae77a24988cd9eSHA-256: 5144f0ab7d39cc391dc747860d2d3b07254f3f5f9fce87c1583035d46c5cae35 mysql-test-5.1.73-8.el6_8.ppc64.rpm     MD5: d67081ea40c8ff9e8179f09da66d71f5SHA-256: 56061c47c3435df91f457ecd00b37f05a5d51b3f2a9922ccec35f4dc0dd9e900   s390x: mysql-5.1.73-8.el6_8.s390x.rpm     MD5: d2a0ba06964839ce6ac7a597204c5c3fSHA-256: 0c6dcb61815177d8f082fe142406bcd1fa84958eff2b7681f866903d5e56e4b9 mysql-bench-5.1.73-8.el6_8.s390x.rpm     MD5: 7f1b339c7906add3becfebee15c3f518SHA-256: 4fd8aea03086eea242f709231235dacc357b5a74af2061d07da6576f23f85e8d mysql-debuginfo-5.1.73-8.el6_8.s390.rpm     MD5: 85f8d409c914fba399e876ff1b272e3cSHA-256: 80a00963ae816a1ef4ccca7fb9463a754862f45708855abb685509c7fee9a808 mysql-debuginfo-5.1.73-8.el6_8.s390x.rpm     MD5: 470e6a95b6abe229b5115c34b7a0dcbfSHA-256: de2b6d7fa4bfa3718385b3d626d503f8e32ab6dea9748ffe38947027e492336c mysql-devel-5.1.73-8.el6_8.s390.rpm     MD5: f5fa6aa6f77afe02bdf05eed70a6e660SHA-256: 6edbc4b69b86f3bf8b9dd058bd66aed64462f1a7f06e87799e57c230926d0899 mysql-devel-5.1.73-8.el6_8.s390x.rpm     MD5: 326d865dfcb13e00506a334fc08bd7acSHA-256: 13b5907143f0164a72fe927cdbb1988852a766a13393b88ede6d68ae6edb76fe mysql-embedded-5.1.73-8.el6_8.s390.rpm     MD5: df2c751dfb06fab6c17666cf38ad12f5SHA-256: fad064698f120f6fa64cffea35dc6d74a8f5c747dcbf5b39b5dbc9a55ea0da7d mysql-embedded-5.1.73-8.el6_8.s390x.rpm     MD5: 371b3880a05246a91e50da8eb9f54165SHA-256: c2cbe96a897d023185a89567047ccd8e35e18d8896d874c946b94cbc2433af87 mysql-embedded-devel-5.1.73-8.el6_8.s390.rpm     MD5: be81d0c95f12b0e83efc4f312b9a0046SHA-256: f651195c3e22c271f0d3267ae6f8729a964e742ececa2a44876a25faf2e022a6 mysql-embedded-devel-5.1.73-8.el6_8.s390x.rpm     MD5: 542e6ccc35c9a664b4d608bcef3b7210SHA-256: 85d6d1259ab832a54a08055a2b5d7f8e7b46d304cfedc5ebc5c39309cc8195b1 mysql-libs-5.1.73-8.el6_8.s390.rpm     MD5: d615de0b5b158e42edb90356475d70e6SHA-256: 4e9895086d2b08f388dc0ec423b696a8e133a45d970e2d6990b337fc5b0804c1 mysql-libs-5.1.73-8.el6_8.s390x.rpm     MD5: 78029b4a086126c911c9e9ed3e08c77bSHA-256: 82c123472d048daa21374ebfe74537b6001e5a731961e83b7bf247dbfc879734 mysql-server-5.1.73-8.el6_8.s390x.rpm     MD5: 61f8a86122f5177944fef8eb42ae4a2aSHA-256: 36f44dd7703dfc305423ae91d86f9543705abfd59f52401272d6d075da68213a mysql-test-5.1.73-8.el6_8.s390x.rpm     MD5: 27398b9c7b9ec2fbefabb3b17bd756faSHA-256: a28bf649b313f18ae1f1c499f6dcc96be1abe3bed4ecbb0967d112c976d23bc9   x86_64: mysql-5.1.73-8.el6_8.x86_64.rpm     MD5: 337bdd9b82da2a0cab920f0e2e1fdf8eSHA-256: 47d953245f0c085e18b0ed746dbd2c71476d42cb8567f5dde631353626a8b46d mysql-bench-5.1.73-8.el6_8.x86_64.rpm     MD5: ecce6ded2753982add68579608e114dbSHA-256: 5485d664daf44a536aec73b51d5379ec4d00b7583c6eec3e09987b20299e317e mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm     MD5: 0638b8e12caa67225a0682ea9ec4a36fSHA-256: e717ec786cb37d1645a10954893892a697637218b7d0c09c0ff9d921c412b89a mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: a02bd4757f502bb4f7af11892a27aa6aSHA-256: 14317eac4d897bdcff3bce57844d9c26b5f6656452caa295a2b5a0119fe840e6 mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-5.1.73-8.el6_8.x86_64.rpm     MD5: 6d2cedf88dec239bdf54556896ca7b54SHA-256: 605ec0ef1a6eec8966f72a69b0f1cf8df451d0ff28e62a11dd9375fdeb48a27c mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: e9b832771e3bb5ce5218d77a2be7c1baSHA-256: a581e25d701ba4cae911641d23318074c94f33eedf3db764d19916191d775e82 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-libs-5.1.73-8.el6_8.x86_64.rpm     MD5: 61e29952c5bfaec1afd55f96acd0860eSHA-256: af3fb18384ee8421e71f19709b94e511752ba4ffd3a8e0b08275dd09e92fc3c5 mysql-server-5.1.73-8.el6_8.x86_64.rpm     MD5: a6ae2ebea82baf675cbaa7fa34ed20baSHA-256: 70e37b2ccc5458c515c86301b746f5ca343f762da81b27b155d152a1f12752b6 mysql-test-5.1.73-8.el6_8.x86_64.rpm     MD5: d8684075a634f210aa46951e5e217212SHA-256: 2682532c3261efee2ed09590b5faa8c661388d487ed7dd996cb85c86cf6d328f   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: mysql-5.1.73-8.el6_8.src.rpm     MD5: 373c8f5fe65433635301c939a69267ddSHA-256: 67da88bc7ae795fcc4b3cffe2163df54da43c22a43bbdd7496dd0734a940c85b   IA-32: mysql-5.1.73-8.el6_8.i686.rpm     MD5: 25c4bc53a9b9fdfa0ee1e9bee6aae6cdSHA-256: 130b32b85e62a21406095e8f5b5a8487d00794b58967764efd6f7701a337b4be mysql-bench-5.1.73-8.el6_8.i686.rpm     MD5: dec163ce1d668fcf108e944b87e77376SHA-256: fb54abaa15ddd416e60de9b511bcbc7eba56df54e42ff1bb773cc1db9074aca5 mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-server-5.1.73-8.el6_8.i686.rpm     MD5: d423ecc150742ca04ac93544a2fc93e7SHA-256: 728cbc24bbd5f67e699c8393d5fa6d0c5fb6869a2d3d7f228355859254c3f9cb mysql-test-5.1.73-8.el6_8.i686.rpm     MD5: e84f1283d073885429e0148ccf93f614SHA-256: a1c07af6d502b380f9b3b5acb089a2ef605cb005d149c8532e4af03ec9a44403   x86_64: mysql-5.1.73-8.el6_8.x86_64.rpm     MD5: 337bdd9b82da2a0cab920f0e2e1fdf8eSHA-256: 47d953245f0c085e18b0ed746dbd2c71476d42cb8567f5dde631353626a8b46d mysql-bench-5.1.73-8.el6_8.x86_64.rpm     MD5: ecce6ded2753982add68579608e114dbSHA-256: 5485d664daf44a536aec73b51d5379ec4d00b7583c6eec3e09987b20299e317e mysql-debuginfo-5.1.73-8.el6_8.i686.rpm     MD5: 0d8c86e806732f7d365b91ee63456574SHA-256: b8ae5f5e8daac69737ce30bdf108707966e064263945230086ff93dda1d3bdd8 mysql-debuginfo-5.1.73-8.el6_8.x86_64.rpm     MD5: 0638b8e12caa67225a0682ea9ec4a36fSHA-256: e717ec786cb37d1645a10954893892a697637218b7d0c09c0ff9d921c412b89a mysql-devel-5.1.73-8.el6_8.i686.rpm     MD5: 86c99a70d3be27bf20d1aa25f1f03f06SHA-256: 30cdd65cbca08b9954af6032bbe181ab65e723410f04d92c865eafc82c3070ef mysql-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: a02bd4757f502bb4f7af11892a27aa6aSHA-256: 14317eac4d897bdcff3bce57844d9c26b5f6656452caa295a2b5a0119fe840e6 mysql-embedded-5.1.73-8.el6_8.i686.rpm     MD5: ae3b3f09053ddd3fd3c536d2ff046551SHA-256: 173fc5aa14a98ff9ed91431dc7d3868c7cf203ea7bbf23195f3fdb5ef8a0648f mysql-embedded-5.1.73-8.el6_8.x86_64.rpm     MD5: 6d2cedf88dec239bdf54556896ca7b54SHA-256: 605ec0ef1a6eec8966f72a69b0f1cf8df451d0ff28e62a11dd9375fdeb48a27c mysql-embedded-devel-5.1.73-8.el6_8.i686.rpm     MD5: 6fbadbe2c33198100640fc03d5e8c158SHA-256: 6afa88cc945e35cb90ad57a7e7994f8fcb8900751b740b895de6922ca5005d44 mysql-embedded-devel-5.1.73-8.el6_8.x86_64.rpm     MD5: e9b832771e3bb5ce5218d77a2be7c1baSHA-256: a581e25d701ba4cae911641d23318074c94f33eedf3db764d19916191d775e82 mysql-libs-5.1.73-8.el6_8.i686.rpm     MD5: b1e51a68b8ef5ce285ff53643542c191SHA-256: ceb87c2a11f29b7a56ff557687f67d115b520843be12666ce33654404b28678d mysql-libs-5.1.73-8.el6_8.x86_64.rpm     MD5: 61e29952c5bfaec1afd55f96acd0860eSHA-256: af3fb18384ee8421e71f19709b94e511752ba4ffd3a8e0b08275dd09e92fc3c5 mysql-server-5.1.73-8.el6_8.x86_64.rpm     MD5: a6ae2ebea82baf675cbaa7fa34ed20baSHA-256: 70e37b2ccc5458c515c86301b746f5ca343f762da81b27b155d152a1f12752b6 mysql-test-5.1.73-8.el6_8.x86_64.rpm     MD5: d8684075a634f210aa46951e5e217212SHA-256: 2682532c3261efee2ed09590b5faa8c661388d487ed7dd996cb85c86cf6d328f   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2017:0183-1: Moderate: squid34 security update

An update for squid34 is now available for Red Hat Enterprise Linux 6.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The squid34 packages provide version 3.4 of Squid, a high-performance proxycaching server for web clients, supporting FTP, Gopher, and HTTP data objects.Security Fix(es):* It was found that squid did not properly remove connection specific headerswhen answering conditional requests using a cached request.

A remote attackercould send a specially crafted request to an HTTP server via the squid proxy andsteal private data from other connections. (CVE-2016-10002) For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, the squid service will be restarted automatically.Red Hat Enterprise Linux Server (v. 6) SRPMS: squid34-3.4.14-9.el6_8.4.src.rpm     MD5: 12a0d226d4a77c2bba9c6c3aad3526b1SHA-256: 6081a19508cf6df653984a3a708d9d9fbe5476f694716b0a418f67f35cc16759   IA-32: squid34-3.4.14-9.el6_8.4.i686.rpm     MD5: e418d78e1962340f821373e8869eca13SHA-256: a40e3ede3029a6c26e7ee97c7e42002c3bfb6ced9da84d4fc55caff863a10b4e squid34-debuginfo-3.4.14-9.el6_8.4.i686.rpm     MD5: a5670f9269cd9c22e3e433b28cf7390aSHA-256: 0eb94349aa4a4554a5b554ac66781da1e0de42f70892908f862b0e9d63170d20   PPC: squid34-3.4.14-9.el6_8.4.ppc64.rpm     MD5: f45eb1db4fde644774bbf0d48078b45bSHA-256: 7d9b019661e7806ff12743a62c7d6dd71c81647ecfcbd5c215849cbe8e555ee3 squid34-debuginfo-3.4.14-9.el6_8.4.ppc64.rpm     MD5: 798fa1d3e64e1683ea8054efe308d5b5SHA-256: aa30d82f35732ea9c2bc730dc263eaacdefc5a0a7e75195537e641fec755b076   s390x: squid34-3.4.14-9.el6_8.4.s390x.rpm     MD5: 82836ee0d1a3aecc0d513bf07913bbfbSHA-256: c07d50e07bc5eb8da7be8611161404b36660fc6c5674eb9bdc9f8d89dbe3cfe4 squid34-debuginfo-3.4.14-9.el6_8.4.s390x.rpm     MD5: e63f0a84a768fbe9398464678c9f7e3fSHA-256: fe01f0e09e6d63c04dfa8eca70066a9cbcbbad7aec3f2f4e64f05154fbcf2ae2   x86_64: squid34-3.4.14-9.el6_8.4.x86_64.rpm     MD5: e2e2ce3d64c34fc66f476967d6f24018SHA-256: 3e4c0424a96b58737398a6c3dfb87a61dac044a59bb5190fa5f6553d2d6b3ae1 squid34-debuginfo-3.4.14-9.el6_8.4.x86_64.rpm     MD5: 8815e2edac2c76636548f97458c1c8b8SHA-256: baf6e3c713e230039af70b2aae3c1ea487bcdad5702b8960878b573bddd12822   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: squid34-3.4.14-9.el6_8.4.src.rpm     MD5: 12a0d226d4a77c2bba9c6c3aad3526b1SHA-256: 6081a19508cf6df653984a3a708d9d9fbe5476f694716b0a418f67f35cc16759   IA-32: squid34-3.4.14-9.el6_8.4.i686.rpm     MD5: e418d78e1962340f821373e8869eca13SHA-256: a40e3ede3029a6c26e7ee97c7e42002c3bfb6ced9da84d4fc55caff863a10b4e squid34-debuginfo-3.4.14-9.el6_8.4.i686.rpm     MD5: a5670f9269cd9c22e3e433b28cf7390aSHA-256: 0eb94349aa4a4554a5b554ac66781da1e0de42f70892908f862b0e9d63170d20   x86_64: squid34-3.4.14-9.el6_8.4.x86_64.rpm     MD5: e2e2ce3d64c34fc66f476967d6f24018SHA-256: 3e4c0424a96b58737398a6c3dfb87a61dac044a59bb5190fa5f6553d2d6b3ae1 squid34-debuginfo-3.4.14-9.el6_8.4.x86_64.rpm     MD5: 8815e2edac2c76636548f97458c1c8b8SHA-256: baf6e3c713e230039af70b2aae3c1ea487bcdad5702b8960878b573bddd12822   (The unlinked packages above are only available from the Red Hat Network) 1405941 - CVE-2016-10002 squid: Information disclosure in HTTP request processing These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2017:0182-1: Moderate: squid security update

An update for squid is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. Squid is a high-performance proxy caching server for web clients, supportingFTP, Gopher, and HTTP data objects.Security Fix(es):* It was found that squid did not properly remove connection specific headerswhen answering conditional requests using a cached request.

A remote attackercould send a specially crafted request to an HTTP server via the squid proxy andsteal private data from other connections. (CVE-2016-10002) For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, the squid service will be restarted automatically.Red Hat Enterprise Linux Server (v. 7) SRPMS: squid-3.5.20-2.el7_3.2.src.rpm     MD5: ebf952ba92c00b888451a52bb7b8c3a5SHA-256: 22a0dbcc8103e95d81f2cbf8db3fb3eadde36cea2ac42a73f1ba176e6a9c1d44   PPC: squid-3.5.20-2.el7_3.2.ppc64.rpm     MD5: 2a3d862bacd0824551c7e141495e13d2SHA-256: cbaddb0cff4c6cd16353d01a1883d2569c65bb314c15d9b2c1658714abbbb03e squid-debuginfo-3.5.20-2.el7_3.2.ppc64.rpm     MD5: 4f138dc20d023a3e01b9a0d59390da26SHA-256: d7be5207d875bbd53c8f65e6f7ed9afd101ff7d17e944705fd31e3aa0afe6ec5 squid-migration-script-3.5.20-2.el7_3.2.ppc64.rpm     MD5: 8afe6da19052d4db521936d73a85ca9dSHA-256: 5b9aad11e56b1490eb9ec1870e4bb67099df4bc1ca10ea04d9b0f8e86ce34118 squid-sysvinit-3.5.20-2.el7_3.2.ppc64.rpm     MD5: 904866bdcd6aacf6d79a51cac1d0ed0aSHA-256: 80bfe5e8a71f94b6bf5db89c0452bc9ceca52cab33d83c852bd4547eb2273755   PPC64LE: squid-3.5.20-2.el7_3.2.ppc64le.rpm     MD5: ad6c2d4f85dc57d3a16ae4f6d7d42916SHA-256: 857ff93488d606ccbed83fcb81c5b4274d17a3b2825071f7fb506863eed6dd4f squid-debuginfo-3.5.20-2.el7_3.2.ppc64le.rpm     MD5: 21cf61f021e31485dd34154dd4c27a30SHA-256: 05ebbf280eb9a4ea6900e1241a8e33a1ebce6291393e8dcb6968e5519f359567 squid-migration-script-3.5.20-2.el7_3.2.ppc64le.rpm     MD5: f78e87aeb6643034edfd5079d0b2ed72SHA-256: bc80cd0dbe4e7f97baf43714b6e633c163cef25beed369833df17c88582d3295 squid-sysvinit-3.5.20-2.el7_3.2.ppc64le.rpm     MD5: 1bef6bf6213e5afab35f18565b7f53e3SHA-256: 5f24b228015069f04e5e0e7d9dc6a97160dc635fb6e5c10a046f547fd59cd6d2   s390x: squid-3.5.20-2.el7_3.2.s390x.rpm     MD5: a46efaa014f3b6bceec49fb0b4c2a0ebSHA-256: 90cb3c9649b5b250d44ec0b323e9fa0f36001859ff82f6bdedf784d942ca7e48 squid-debuginfo-3.5.20-2.el7_3.2.s390x.rpm     MD5: 80e85d14cddc0a64353c23ecc3d2ae1dSHA-256: 5ee1753ac8fcd8cb1e52168f0b2b7559f59e9a54372bcf35fa56a6b71d100792 squid-migration-script-3.5.20-2.el7_3.2.s390x.rpm     MD5: b17afd30ef00453c88f1a3b79d165d83SHA-256: dae03004aad0e4d3208399b8c7eb9b337edb7fc86dcb6eb5bd1b418134ce49bd squid-sysvinit-3.5.20-2.el7_3.2.s390x.rpm     MD5: b7daa06d54604e9e477f266a5baaec2bSHA-256: 289234e6f6ef675d9fa028cf7409b4a5821e01e6f15b6230f710982c3c652cdd   x86_64: squid-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 2c7c3f5668c6c26032dfe6f1b95b56b6SHA-256: 002d154505a2b24ca43de544397071405befd0d3284209f50c7686dd46b60378 squid-debuginfo-3.5.20-2.el7_3.2.x86_64.rpm     MD5: aa7a15c215b7011d0fca2e9a9da7da47SHA-256: 449704de29cb40c70e8e8e2734667996b8cb4eb43f1f54cc827d8104d4518879 squid-migration-script-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 7440b80d03cc62fcbe0e41710de58cd4SHA-256: d2560c09073ade3db7688cff6f81a6c72e97d25f32d2ea9e7233ed62f6a85a6e squid-sysvinit-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 72abe56ebc0b4fb2b6c98d6d1b9c12cbSHA-256: 3ddfb0987861903a7ebe7facf1800e6122c0361018e8a8659c2bdda78d749d83   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: squid-3.5.20-2.el7_3.2.src.rpm     MD5: ebf952ba92c00b888451a52bb7b8c3a5SHA-256: 22a0dbcc8103e95d81f2cbf8db3fb3eadde36cea2ac42a73f1ba176e6a9c1d44   x86_64: squid-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 2c7c3f5668c6c26032dfe6f1b95b56b6SHA-256: 002d154505a2b24ca43de544397071405befd0d3284209f50c7686dd46b60378 squid-debuginfo-3.5.20-2.el7_3.2.x86_64.rpm     MD5: aa7a15c215b7011d0fca2e9a9da7da47SHA-256: 449704de29cb40c70e8e8e2734667996b8cb4eb43f1f54cc827d8104d4518879 squid-migration-script-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 7440b80d03cc62fcbe0e41710de58cd4SHA-256: d2560c09073ade3db7688cff6f81a6c72e97d25f32d2ea9e7233ed62f6a85a6e squid-sysvinit-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 72abe56ebc0b4fb2b6c98d6d1b9c12cbSHA-256: 3ddfb0987861903a7ebe7facf1800e6122c0361018e8a8659c2bdda78d749d83   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: squid-3.5.20-2.el7_3.2.src.rpm     MD5: ebf952ba92c00b888451a52bb7b8c3a5SHA-256: 22a0dbcc8103e95d81f2cbf8db3fb3eadde36cea2ac42a73f1ba176e6a9c1d44   x86_64: squid-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 2c7c3f5668c6c26032dfe6f1b95b56b6SHA-256: 002d154505a2b24ca43de544397071405befd0d3284209f50c7686dd46b60378 squid-debuginfo-3.5.20-2.el7_3.2.x86_64.rpm     MD5: aa7a15c215b7011d0fca2e9a9da7da47SHA-256: 449704de29cb40c70e8e8e2734667996b8cb4eb43f1f54cc827d8104d4518879 squid-migration-script-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 7440b80d03cc62fcbe0e41710de58cd4SHA-256: d2560c09073ade3db7688cff6f81a6c72e97d25f32d2ea9e7233ed62f6a85a6e squid-sysvinit-3.5.20-2.el7_3.2.x86_64.rpm     MD5: 72abe56ebc0b4fb2b6c98d6d1b9c12cbSHA-256: 3ddfb0987861903a7ebe7facf1800e6122c0361018e8a8659c2bdda78d749d83   (The unlinked packages above are only available from the Red Hat Network) 1405941 - CVE-2016-10002 squid: Information disclosure in HTTP request processing These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: