<?xml-stylesheet type="text/xsl" href="updateinfo.xsl"?>
<updates><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="stable" type="bugfix" version="1.4"><id>DFCT0001362</id><title>Yum Autoupdate Ignoring Exclusions</title><description>So it turns out that the problem here is the script does not take account of the possibility that there may be a COMMENTED-OUT excludes line in /etc/yum.conf.
    </description><release>Scientific Linux</release><issued date="2015-08-25 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" epoch="5" name="yum-autoupdate" release="6.7" src="yum-autoupdate-2-6.7.src.rpm" version="2"><filename>yum-autoupdate-2-6.7.noarch.rpm</filename><sum type="sha256">e4d6e55f4cc3da9b726848c5376c57cffbd53f9e719990935197c2f6fb34d439</sum></package></collection></pkglist><references><reference href="https://fermi.service-now.com/" id="DFCT0001362" title="Yum Autoupdate Ignoring Exclusions" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1465-1</id><title>Glibc Bug Fix Update</title><description>This update fixes the following bug:

* A race condition in the malloc API family of functions could cause a deadlock leading to gluster NFS and Fuse mounts becoming unresponsive while running large amounts of I/O. The race condition in malloc has been removed and gluster NFS and Fuse mounts no longer hang in the described situation.</description><release>Scientific Linux</release><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="glibc-utils" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">37b47e7cfe23f8140515dcf72666c3bf45cc86a9b98a235862b00453b8bb8168</sum></package><package arch="x86_64" name="glibc-devel" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">c1aaed4812bd4a170ee26734162dbc9873776aaf07098ff54a0d1991b5beaf70</sum></package><package arch="x86_64" name="glibc-common" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-common-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">d62da1d74751248eb28747b53169b158d0ff9464496dfdae3ab8ecde5986e212</sum></package><package arch="x86_64" name="nscd" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>nscd-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">017334a01723d47b6d5e7dde6cbb058181664643064e10cb6ba29f63fbaf37e5</sum></package><package arch="x86_64" name="glibc" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">e3697e71e999b0ab6a55a7508b7626dfba9efc13312f8383570f1800f4a2e378</sum></package><package arch="x86_64" name="glibc-headers" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">da04c42cefabd1ed22ff446ab4278f0932597844f0b0c3748e092a4114979cc1</sum></package><package arch="i686" name="glibc-static" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-static-2.12-1.166.el6_7.1.i686.rpm</filename><sum type="sha256">c4e28fc4cb15cfdbd600b3d1d39c7df5b0600042ab3f74a449a36b9f3bebbbe7</sum></package><package arch="i686" name="glibc" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-2.12-1.166.el6_7.1.i686.rpm</filename><sum type="sha256">9ee81b8085f85fce5f550270c10f155f5d2016ea5621b2d8dbdca190d956c082</sum></package><package arch="i686" name="glibc-devel" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.166.el6_7.1.i686.rpm</filename><sum type="sha256">247ae9f748a0921469d017505c3d4751f8178a6d962de0abf43d922f189729eb</sum></package><package arch="x86_64" name="glibc-static" release="1.166.el6_7.1" src="glibc-2.12-1.166.el6_7.1.src.rpm" version="2.12"><filename>glibc-static-2.12-1.166.el6_7.1.x86_64.rpm</filename><sum type="sha256">90a84fe70f28d1a96a0535005aba0bfd835a8b23cc70a5246627089146bc1edb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1465" id="RHBA-2015:1465-1" title="Rhba-2015:1465-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244002" id="1244002" title="Nfs And Fuse Mounts Hang While Running Io - Malloc/Free Deadlock" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1466-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bug:

* The Deterministic Random Bit Generator (DRBG) module needs to be loaded before crypto ciphers can be used. However, older versions of dracut did not include DRBG in the initramfs image which could use crypto ciphers for disk encryption. As a consequence, if disk encryption was in use, the boot process failed. With this update, dependency on newer versions of dracut has been added which includes DRBG in initramfs, and system boot now succeeds.

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2015-08-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kernel-devel" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">e9ecab6a119f067575880b92c871ec044798f2b667228e3ff6e862c88488ac19</sum></package><package arch="x86_64" name="python-perf" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">d0fba7a9fcf68de23d26b4982ab188c0aebcf96c730a535b30fb4f005d8bac6c</sum></package><package arch="x86_64" name="kernel-debug" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">85bafad1df42c3d7dc6f463e7b2860f0f199d2d3f6f018a5458da3f74d67454f</sum></package><package arch="x86_64" name="kernel-headers" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">ef06ae0486181245e663c0e8a6ab111e35e1c3169542d5f6fc860c2b205e8e14</sum></package><package arch="noarch" name="kernel-firmware" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.1.1.el6.noarch.rpm</filename><sum type="sha256">665acfc1ae68deeb0b7971cdbef070d1596603fdfc6151fb45eace543d20065d</sum></package><package arch="x86_64" name="kernel" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">8d5383d4f93edc9c3b9ede175a57678b02452fb1d6548b17da9fde85b78adae5</sum></package><package arch="noarch" name="kernel-doc" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.1.1.el6.noarch.rpm</filename><sum type="sha256">00a0c1f20d97dac01622f0ec85359110b05ecccc80c2314c08cc82ece58897a8</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">1cfdb86d42eaba57a78f937a443df7a83d5cd42f34dfff6037fc1258d531ad23</sum></package><package arch="x86_64" name="perf" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.1.1.el6.x86_64.rpm</filename><sum type="sha256">3c62c788cd07bc42339572ccc7f8ab11bfd5768394e66e979d8f53d32dc99a2f</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.1.1.el6" src="kernel-2.6.32-573.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.1.1.el6.noarch.rpm</filename><sum type="sha256">9950a1f34843fc7365c8752e81a1de2f59ac26a05984c13afcb0f31136bab18b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1466" id="RHBA-2015:1466-1" title="Rhba-2015:1466-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241518" id="1241518" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1467-1</id><title>Java-1.7.0-Openjdk Bug Fix And Enhancement Update</title><description>All running instances of OpenJDK Java must be restarted for the update to take effect.</description><release>Scientific Linux</release><issued date="2015-08-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.1.3.el6_7" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_7.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-demo-1.7.0.85-2.6.1.3.el6_7.x86_64.rpm</filename><sum type="sha256">a2201917d83178e8817c5826f3bd37becca555756b33f64b003434c46e3e4e13</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.1.3.el6_7" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_7.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-javadoc-1.7.0.85-2.6.1.3.el6_7.noarch.rpm</filename><sum type="sha256">c571d21188a77f0a16aefb9bfa2d06f4ca685fdcf1dc02f9be4f22387ddeb7af</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.1.3.el6_7" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_7.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_7.x86_64.rpm</filename><sum type="sha256">cf4d1a92d4c9269c8863279f11b999d5fb3faec4361cbfab39409150370987cd</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.1.3.el6_7" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_7.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-devel-1.7.0.85-2.6.1.3.el6_7.x86_64.rpm</filename><sum type="sha256">d92e43a44cdb76cc8b1d40bbb5f8f0c3cbb74dd2e9939d8297352188383f6024</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.1.3.el6_7" src="java-1.7.0-openjdk-1.7.0.85-2.6.1.3.el6_7.src.rpm" version="1.7.0.85"><filename>java-1.7.0-openjdk-src-1.7.0.85-2.6.1.3.el6_7.x86_64.rpm</filename><sum type="sha256">7cf121f3bc135e8decad343f4f83e8cded8cfa0012859775f11f9d3b8343ef1f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1467" id="RHBA-2015:1467-1" title="Rhba-2015:1467-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1468-1</id><title>Java-1.8.0-Openjdk Bug Fix And Enhancement Update</title><description>All running instances of OpenJDK Java must be restarted for the update to take effect.</description><release>Scientific Linux</release><issued date="2015-08-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">654af7439eb3655bda1df33e68a07e0926852225482e7668399b9c9d0a558baf</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-javadoc-1.8.0.51-1.b16.el6_7.noarch.rpm</filename><sum type="sha256">562622a5159140fb41f5c562ef89f8d0dec87cec1997ad3ea0a677bfa8a20688</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-src-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">d06052e1df0dc723ee622763c62d6ce790f83e149239f94adc638f3c7d74cec6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">dbfb90b08d2445eb5d365d02b774b27ba6277f90e74165e75d823f8b4c19e77c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-demo-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">f3e7025fbb5a531600022a537347a4beb4862e1080944bf164ce82e6ac110846</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-headless-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">3555264619ff902637be64bf23bcf125a00e0b56211970cb7c4865d6b466c548</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-debug-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">f2ad7e44e53d705aec78b28acfd1db19fddd3027ddcf8525b36884b8a8b1e6b7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">54ecba5bb98b7d2b9f76cec3322c7807577ad5ae764e25ab82ab050ee048d1b8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">e4dcecb7763ce1cd7967289945bc09f058852a08d1aaa929bd5dff52f550528b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-src-debug-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">48e1c1e9ce8a53e7b8f3aae7a20066f84480ba42f2d7ef3ba57c6ca917cac714</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-1.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-devel-1.8.0.51-1.b16.el6_7.x86_64.rpm</filename><sum type="sha256">ae337013571b8daa48549f1a7767c42fbc1b5e58eda622d1da42b2a4ea5d080d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1468" id="RHBA-2015:1468-1" title="Rhba-2015:1468-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1469-1</id><title>Cluster Bug Fix Update</title><description>This update fixes the following bug:

* Under certain circumstances, large quantities of uevent messages sent from the kernel were capable of flooding the gfs_controld and dlm_controld daemons, causing them to lose a part of the messages. In some cases, this caused the recovery process of Global File System (GFS) mount points and Distributed Lock Manager (DLM) lockspaces to become unresponsive, and the system therefore needed to be rebooted. With this update, gfs_controld and dlm_controld handle large amounts of uevent messages more reliably. As a result, the recovery of GFS mount points and DLM lockspaces no longer hangs.</description><release>Scientific Linux</release><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="cman" release="73.el6.1" src="cluster-3.0.12.1-73.el6.1.src.rpm" version="3.0.12.1"><filename>cman-3.0.12.1-73.el6.1.x86_64.rpm</filename><sum type="sha256">43f95a0a8a88cac18bd00cfaecac3eb02bf86e6d6f7b9a08215315d00df83cfa</sum></package><package arch="i686" name="clusterlib" release="73.el6.1" src="cluster-3.0.12.1-73.el6.1.src.rpm" version="3.0.12.1"><filename>clusterlib-3.0.12.1-73.el6.1.i686.rpm</filename><sum type="sha256">081c3017f985ee213e23690de88d351ae4c757b6aeba6a9c2c43db691df5335e</sum></package><package arch="x86_64" name="gfs2-utils" release="73.el6.1" src="cluster-3.0.12.1-73.el6.1.src.rpm" version="3.0.12.1"><filename>gfs2-utils-3.0.12.1-73.el6.1.x86_64.rpm</filename><sum type="sha256">a88cc392769314115245f258d2f2847edd3bb1c2304d91286c89419b17a0a009</sum></package><package arch="i686" name="clusterlib-devel" release="73.el6.1" src="cluster-3.0.12.1-73.el6.1.src.rpm" version="3.0.12.1"><filename>clusterlib-devel-3.0.12.1-73.el6.1.i686.rpm</filename><sum type="sha256">6961c23111d31ff9489576f41f6e013cd5c9768dfbaa37d2fe68fe3292e1a17e</sum></package><package arch="x86_64" name="clusterlib" release="73.el6.1" src="cluster-3.0.12.1-73.el6.1.src.rpm" version="3.0.12.1"><filename>clusterlib-3.0.12.1-73.el6.1.x86_64.rpm</filename><sum type="sha256">214e81554fbd4108ba130086502448a4d99c77d8e182c66cdf01866a5f3a670f</sum></package><package arch="x86_64" name="clusterlib-devel" release="73.el6.1" src="cluster-3.0.12.1-73.el6.1.src.rpm" version="3.0.12.1"><filename>clusterlib-devel-3.0.12.1-73.el6.1.x86_64.rpm</filename><sum type="sha256">c6a3a19cbbd25402bf7c6636ffa6b4ddcc43041790f9248bc460c80030d333f6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1469" id="RHBA-2015:1469-1" title="Rhba-2015:1469-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233535" id="1233535" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1234443" id="1234443" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1470-1</id><title>Lvm2 Bug Fix Update</title><description>This update fixes the following bug:

* If an exclusively activated RAID logical volume (LV) with a snapshot was being altered and, at the same time, other Logical Volume Manager (LVM) commands were run, I/O and LVM commands in some cases terminated unexpectedly. For example, this happened if the "pvs" command was run at the same time as a repair operation of the RAID LV. With this update, LVM commands no longer attempt to read LVs while they are being altered, and I/O and LVM commands no longer hang in the aforementioned situation.</description><release>Scientific Linux</release><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="device-mapper-event-devel" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.1.i686.rpm</filename><sum type="sha256">4f53e2fcf31d4b63602b2f7598b727f2541f62d72f1fbe26a7fe16c0ddc4fc8b</sum></package><package arch="i686" name="device-mapper-devel" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.1.i686.rpm</filename><sum type="sha256">137b139caa1e29ee686cd157b40b0e0eec5f6038cdb5c1cf155002598a4ea814</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">d007f0c70adc264ff048bfe4ae6600b3c0508884379fd7bc0863755eca1e4167</sum></package><package arch="x86_64" name="lvm2-libs" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">73552aca7115e6d226f5af75b0aa1836123fa647405db321a8d7643d7e836576</sum></package><package arch="x86_64" name="cmirror" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>cmirror-2.02.118-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">3bf6e4c60e8c4a3698e90ea797faeecbcd7f905593eccd1d3a04e0adfe7c98ec</sum></package><package arch="x86_64" name="lvm2-devel" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">81d16a55451a859a7bc21a4ab37765a48f8fd88c7a14b14aaed9d84ff6d9da68</sum></package><package arch="i686" name="device-mapper-libs" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.1.i686.rpm</filename><sum type="sha256">96f58a393efb0b990803c3fe2a5e27910964f0122327894115316f737d2859c9</sum></package><package arch="i686" name="device-mapper-event-libs" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.1.i686.rpm</filename><sum type="sha256">b85b5ebf5b38578bdb702d373d4aa2cad8d5bc90908e29e5066866f3dec4a199</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">081126d4b72ea2ea9baf4e4060b186dfc98118e096259e63df36ef1ad1943d41</sum></package><package arch="x86_64" name="device-mapper-devel" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">d02e312cf49d6973d683b2f3a5fa7ba897a434843d213935c96ec0b9e271042a</sum></package><package arch="x86_64" name="device-mapper" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-1.02.95-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">5c06613abe417fb39dbc92f1e9d47c6292f3ce9ecd66d4c621fbe012cb967c13</sum></package><package arch="x86_64" name="device-mapper-event" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-event-1.02.95-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">f585b1c190f754c80644574d9a3b47cc5711fb07ef4ff23bbec631953c616491</sum></package><package arch="x86_64" name="lvm2" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>lvm2-2.02.118-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">626f0241ec8d5e0d73389d5cfc4733dc0904ba96a8d5c33fe8be807f9a2fe561</sum></package><package arch="x86_64" name="device-mapper-libs" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">6a4ea8fd78e23f6aac3ed998ec74a96acb61dec170d8305867f20161a783ede9</sum></package><package arch="i686" name="lvm2-libs" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.1.i686.rpm</filename><sum type="sha256">db7de4350cb3ea43ad421050bd227b725ccb767f27b596ff3f3e3d90c21ada6e</sum></package><package arch="x86_64" name="lvm2-cluster" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>lvm2-cluster-2.02.118-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">c32f539ef99500e05c9656ff05c8dfd42333d26d75f1a54f7bcf54e788ccc478</sum></package><package arch="i686" name="lvm2-devel" release="3.el6_7.1" src="lvm2-2.02.118-3.el6_7.1.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.1.i686.rpm</filename><sum type="sha256">b2a7c5df7cec5daba9a97f7882b14e8e97557a977ce1f72ef6f8c3c329fa38b0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1470" id="RHBA-2015:1470-1" title="Rhba-2015:1470-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1236690" id="1236690" title="Device Failure On Exclusively Active Raid W/ Snapshot (On Top Of Cluster Vg) Leads To Deadlock" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1607-1</id><title>Dovecot Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when the posix_fallocate() function was used to grow the mbox file size, the file size grew in 4 kB blocks, in the GFS2 file system producing extra NULL characters. Consequently, no mail clients could read the mail in mailbox with NULLs at the head. This update implements a new file-growing function to grow the mbox size without unwanted side effects, and mail clients can now read received mail as expected.</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="dovecot-devel" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-19.el6.1.x86_64.rpm</filename><sum type="sha256">e6fe32fcb15af350eac179e7b06177af4ec361ee8844dc2a96eb4c0e16545445</sum></package><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-pgsql-2.0.9-19.el6.1.x86_64.rpm</filename><sum type="sha256">7a903f252c74a0fd3d283ac754584a0c9152285975ae56a12dbcece3bc240d57</sum></package><package arch="i686" epoch="1" name="dovecot-devel" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-19.el6.1.i686.rpm</filename><sum type="sha256">7c096c47b273e8983a50a2dad22742bbb5f62f49927bf9ed009e4acd8eed614a</sum></package><package arch="x86_64" epoch="1" name="dovecot-mysql" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-mysql-2.0.9-19.el6.1.x86_64.rpm</filename><sum type="sha256">6647bbf402e9cc632674b5ab034f686213f90a6daefa413b8107fe43e54cf5ae</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-19.el6.1.x86_64.rpm</filename><sum type="sha256">6881142ee991a62333acac09092b150c4daf702414d19e436509bdc46d1b52b4</sum></package><package arch="i686" epoch="1" name="dovecot" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-19.el6.1.i686.rpm</filename><sum type="sha256">a2ab35c28e0d7f9f4bb7202415c85f7884e36b29caf258b394288e4a5587655c</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="19.el6.1" src="dovecot-2.0.9-19.el6.1.src.rpm" version="2.0.9"><filename>dovecot-pigeonhole-2.0.9-19.el6.1.x86_64.rpm</filename><sum type="sha256">51c0c489158d8b94b32b10fad0572fdc1c8efcd7f8ef1b9a375b087500102792</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1607-1" id="RHBA-2015:1607-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1609-1</id><title>Ksh Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the gcc utility optimized out a non-NULL test in the ksh implementation of the strdup() function. This caused an unexpected termination when ksh was executed in a clean chroot environment. With this update, ksh compilation parameters have been updated to prevent optimizing out a non-NULL test, and ksh no longer crashes in clean chroot environments.</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="ksh" release="28.el6.1" src="ksh-20120801-28.el6.1.src.rpm" version="20120801"><filename>ksh-20120801-28.el6.1.x86_64.rpm</filename><sum type="sha256">c2645ff9ce44767da17831343d88d1356301c1f4b5f354824d8d1f1a0a327649</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1609-1" id="RHBA-2015:1609-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1610-1</id><title>Openssh Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the implementation of openssh-clients did not adhere to RFC 4253, The Secure Shell (SSH) Transport Layer Protocol, as in some cases, a language tag  was not sent for the SSH_MSG_DISCONNECT message. As a consequence, when connected to the server from a Scientific Linux 6 ssh- client and disconnected by closing the session, the server kept the session (TCP socket) open until it timed out. This bug has been fixed by adding correct parameters for the SSH_MSG_DISCONNECT message, which makes the server close the session as expected.</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="openssh-askpass" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-112.el6_7.x86_64.rpm</filename><sum type="sha256">5b5987f2aa7cb73d62408235196eb91508787bb456917b43095f2f5f9fb99e8e</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-112.el6_7.i686.rpm</filename><sum type="sha256">8a5be8ee77bfc4f9dde493ad5d177a74bec94011664eed61d7968905066aba84</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-112.el6_7.x86_64.rpm</filename><sum type="sha256">0eaaa99ad0ad0056c6b3a9ab1545eba4daf3df7946e8f5557abd6f5f7a708a55</sum></package><package arch="x86_64" name="openssh-server" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-112.el6_7.x86_64.rpm</filename><sum type="sha256">37ed7adade45bcacd5a735ec35dcb5ecec8d64c79c4429ea483582914369ccf3</sum></package><package arch="x86_64" name="openssh" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="5.3p1"><filename>openssh-5.3p1-112.el6_7.x86_64.rpm</filename><sum type="sha256">d53f8d2eb0c961f86a183ac3ddab212b461042486391b8a077bfa3d8651419c7</sum></package><package arch="x86_64" name="openssh-clients" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-112.el6_7.x86_64.rpm</filename><sum type="sha256">b564c5c51ce4bcc73fcc245ffd912080ca513b8ebc300ad67c6dbeca52e355fc</sum></package><package arch="x86_64" name="openssh-ldap" release="112.el6_7" src="openssh-5.3p1-112.el6_7.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-112.el6_7.x86_64.rpm</filename><sum type="sha256">536856246f36b534c531e766581fee9ecd7a5d817b336bbd54845d887e385095</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1610-1" id="RHBA-2015:1610-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1614-1</id><title>Sudo Bug Fix Update</title><description>This update fixes the following bug:

* Previously, all of the groups a user belongs to were incorrectly enumerated by the sudo utility when the sudo command was used. As a consequence, when user information was stored externally, sudo attempts took a long time to complete. The underlying source code has been fixed, and sudo now executes significantly faster in the described circumstances.</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="sudo-devel" release="20.el6_7" src="sudo-1.8.6p3-20.el6_7.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-20.el6_7.x86_64.rpm</filename><sum type="sha256">c12e053d9c493f5d4fa9ce468c08d710e75cd8f005a5b71105d3df7191917e97</sum></package><package arch="x86_64" name="sudo" release="20.el6_7" src="sudo-1.8.6p3-20.el6_7.src.rpm" version="1.8.6p3"><filename>sudo-1.8.6p3-20.el6_7.x86_64.rpm</filename><sum type="sha256">8d5f76eedd982106bd92326201e5c24cf62b984e8a5cf67a9666262579c62ae4</sum></package><package arch="i686" name="sudo-devel" release="20.el6_7" src="sudo-1.8.6p3-20.el6_7.src.rpm" version="1.8.6p3"><filename>sudo-devel-1.8.6p3-20.el6_7.i686.rpm</filename><sum type="sha256">f3e86e02971130ab379775a3f2b5083c9eb1af0075e514a18e82a544acbd5a3e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1614-1" id="RHBA-2015:1614-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1615-1</id><title>Lvm2 Bug Fix Update</title><description>This update fixes the following bugs:

* Prior to this update, using the lvm utility when the persistent cache file was outdated caused devices that were stored in the persistent cache to unintentionally bypass logical volume manager (LVM) filters set in the LVM configuration. As a consequence, RHEV hosts in some cases failed to start with an outdated cache file. This update fixes LVM's internal cache handling so that the filters are applied properly, and the described problem no longer occurs.

* When extending a logical volume (LV) where the amount of data stripes was previously lowered, the LV terminated unexpectedly with a segmentation fault due to an error in stripe position detection. With this update, the behavior of a number of functions related to stripe detection has been adjusted to prevent the bug, and the described crash no longer occurs.</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="device-mapper-event" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-event-1.02.95-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">4742b56ea81d45e371d6ca9c9ab1e1cf23c4ffbcaeed7d7a91ed0d413bb65d50</sum></package><package arch="x86_64" name="device-mapper-libs" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">c855789e1bb1431cf7826891d942d8af1960cf452614b7b041261c323f8865f6</sum></package><package arch="i686" name="device-mapper-libs" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.2.i686.rpm</filename><sum type="sha256">e210b6d36bb40c0cdc14fea7226a69d382e39c7efcf5158290f973b5a5d85c13</sum></package><package arch="x86_64" name="lvm2-cluster" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>lvm2-cluster-2.02.118-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">e0ccb485b38c3a3835eeb4cf0964bf44d59348d1dab53f44e682687a83572fe9</sum></package><package arch="x86_64" name="lvm2" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>lvm2-2.02.118-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">1c6460ca8c42575e6bc4c20bbdab6e38325150ed6ed1d12c63447441c44127dd</sum></package><package arch="i686" name="device-mapper-devel" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.2.i686.rpm</filename><sum type="sha256">762537aea25d71c9a94269d8895dd1d5bc949aa290e5eab8316595be1e4bdf1d</sum></package><package arch="x86_64" name="cmirror" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>cmirror-2.02.118-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">f7847c20d6e63e264374e4c159148d604af7604cdf67d4795f6ece4e3cd4f0ef</sum></package><package arch="i686" name="device-mapper-event-libs" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.2.i686.rpm</filename><sum type="sha256">fe2f1a30d2ab519e6551dd5e5bf6a535220bc4420942c62fbb11ff34b820e9b5</sum></package><package arch="x86_64" name="device-mapper" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-1.02.95-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">26a13d931795e1a1d5ccfb0be0506784393861eb3c00b96586998a7a01fdadb2</sum></package><package arch="i686" name="lvm2-libs" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.2.i686.rpm</filename><sum type="sha256">ddc353ea40ac6f929ef055436396eb57c031ecc8c879fc290d223742821e8a9d</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">4dbc5d9ed6d7aa5f2f7c5f9cea0f4d349a7a98bf3c2c856297993bc23fcca523</sum></package><package arch="i686" name="lvm2-devel" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.2.i686.rpm</filename><sum type="sha256">33e3adcedc698360237440954e7681bfa7d0a4a6978a2854f593878655d7c442</sum></package><package arch="x86_64" name="lvm2-devel" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">7dff5e7fcca9524c337e68156f15743ea959a0fbadb470e3301297128709de67</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">5bf3cb91af34f85a39ec9ae3dd7545dc17424ff2879211b9a1d255c90716c6ea</sum></package><package arch="x86_64" name="lvm2-libs" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">cb7652a7f8d7bb8f1a4cbfe9300d43dc564e22e552421152a215ed6787f37055</sum></package><package arch="x86_64" name="device-mapper-devel" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.2.x86_64.rpm</filename><sum type="sha256">633a0f5765dd632df1ee2b000358263669511b87ee6b8e98875025692580f391</sum></package><package arch="i686" name="device-mapper-event-devel" release="3.el6_7.2" src="lvm2-2.02.118-3.el6_7.2.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.2.i686.rpm</filename><sum type="sha256">3d65b1dafd3eb86d42b022e26d3ba3ba7477ae3ed1d919943bf935cafe12ecd5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1615-1" id="RHBA-2015:1615-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1655-1</id><title>Lvm2 Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, an incorrect persistent cache file, /etc/lvm/cache/.cache, was generated that contained entries only for devices that were enumerated on the command line, ignoring all the other devices. As a consequence, subsequent Logical Volume Manager (LVM) commands using this cache file caused some devices to be ignored by LVM. With this update, the persistent cache file is handled correctly even if reporting commands are used, enabling subsequent commands to detect other devices successfully.

* Prior to this update, using the lvm utility when the persistent cache file was outdated caused devices that were stored in the persistent cache to unintentionally bypass Logical Volume Manager (LVM) filters set in the LVM configuration. As a consequence, RHEV hosts in some cases failed to start with an outdated cache file. This update fixes LVM internal cache handling so that the filters are applied properly, and the described problem no longer occurs.</description><release>Scientific Linux</release><issued date="2015-09-01 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="device-mapper-devel" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-devel-1.02.90-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">c416c6bb980b6e763eba7ae7f7f884fd7c2e17f53b4f1df378dc9d5250b5380d</sum></package><package arch="x86_64" name="device-mapper" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-1.02.90-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">cf34d60efc0b8e32de645725576d06b1c2a0ba9923088b22a342312ceb80c7eb</sum></package><package arch="x86_64" name="device-mapper-event" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-event-1.02.90-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">277ae303cf9d815258c09e07e54dcf303b8bca5061433e8a4bcd48d77b06711c</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-event-libs-1.02.90-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">35d20a38f1bb2471ad8ae00484c85bbc3cfe8d939da14280ff1f0b593595d04f</sum></package><package arch="x86_64" name="cmirror" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>cmirror-2.02.111-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">286529f356c2e601bd56175ba54cdcb9d5ffacee99fe1939b0fd3a29f8b9d24c</sum></package><package arch="x86_64" name="lvm2" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>lvm2-2.02.111-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">48406d30296be9274c7b6a2e3c145d60abf7e29d0db7dc06a76d043f26636b93</sum></package><package arch="x86_64" name="lvm2-libs" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>lvm2-libs-2.02.111-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">6a5288efbd8dcd951469927deda90ad0397bc519ff79378c04bc89eea9b926cf</sum></package><package arch="x86_64" name="lvm2-cluster" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>lvm2-cluster-2.02.111-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">ab39f5cc0178ac9a6c631349c34757e548cadbf48660c76119575ed87a0e937e</sum></package><package arch="i686" name="device-mapper-libs" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-libs-1.02.90-2.el6_6.5.i686.rpm</filename><sum type="sha256">fbee4f7c2ee1fc5d2ada499b60eab01476cf9f84431b7aae099cea9183db90e9</sum></package><package arch="x86_64" name="lvm2-devel" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>lvm2-devel-2.02.111-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">eced939317f8d4742558aae85ca1035d3c4be94efe96a04577e7f5b1af9f76d3</sum></package><package arch="x86_64" name="device-mapper-libs" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-libs-1.02.90-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">2a02a520f67b537c7de7b503d4ac057f5e234325e114ba8c0cf719487bf036dd</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-event-devel-1.02.90-2.el6_6.5.x86_64.rpm</filename><sum type="sha256">2dcf7c2cab335340c4f9db9135dc032e8480290ca6cfe2d5295caac6fc4c840c</sum></package><package arch="i686" name="lvm2-devel" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>lvm2-devel-2.02.111-2.el6_6.5.i686.rpm</filename><sum type="sha256">16c68b3f1b82730e024d997448383f46612e954ee38ae8c77a9425f16b70d49f</sum></package><package arch="i686" name="device-mapper-devel" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-devel-1.02.90-2.el6_6.5.i686.rpm</filename><sum type="sha256">c570ea22bbbb9799792d3ea25b86de72a23eea9a371ef949528f32039b539706</sum></package><package arch="i686" name="device-mapper-event-libs" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-event-libs-1.02.90-2.el6_6.5.i686.rpm</filename><sum type="sha256">fdff2f02062ee4c903e73ea68e931232b442e8148b1da3fb8b765b158560c55a</sum></package><package arch="i686" name="lvm2-libs" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="2.02.111"><filename>lvm2-libs-2.02.111-2.el6_6.5.i686.rpm</filename><sum type="sha256">436b263f61a6b0f288c341a4e27e55bd80c882fe53d1ffaab26626a74477683e</sum></package><package arch="i686" name="device-mapper-event-devel" release="2.el6_6.5" src="lvm2-2.02.111-2.el6_6.5.src.rpm" version="1.02.90"><filename>device-mapper-event-devel-1.02.90-2.el6_6.5.i686.rpm</filename><sum type="sha256">a2ea0c0726be7fed7b6bf3275b6770a4c2920f4b80c84c9af22530bf778b4487</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1655" id="RHBA-2015:1655-1" title="Rhba-2015:1655-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1232054" id="1232054" title="Pvdisplay -C -O Pv_Uuid &amp;Lt;Device&amp;Gt; Modifies .Cache, Preventing System From Booting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248030" id="1248030" title="Bad .Cache File Prevents Rhev Host From Functioning After Reboot" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1711-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* Due to SELinux preventing the Chromium browser from using the setcap access on a process, the Chromium process previously terminated unexpectedly and the sandbox initialization failed. This update allows the chrome_sandbox_t domain to use setcap access, and Chromium no longer crashes in the described scenario.</description><release>Scientific Linux</release><issued date="2015-09-08 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="selinux-policy-mls" release="279.el6_7.5" src="selinux-policy-3.7.19-279.el6_7.5.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6_7.5.noarch.rpm</filename><sum type="sha256">9403d6a0d7eb14301aa9d0e6efe2591c7bc573ab9ec54efde8b2d7f872e55267</sum></package><package arch="noarch" name="selinux-policy-targeted" release="279.el6_7.5" src="selinux-policy-3.7.19-279.el6_7.5.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6_7.5.noarch.rpm</filename><sum type="sha256">afbbeff18dec9e9dfce943d66902907fe3f2aecd0295858655813233211b466c</sum></package><package arch="noarch" name="selinux-policy-doc" release="279.el6_7.5" src="selinux-policy-3.7.19-279.el6_7.5.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6_7.5.noarch.rpm</filename><sum type="sha256">c712c48da79c8efb11eb5d55678508d290b6e952ed5a62bf73f48671d754b92c</sum></package><package arch="noarch" name="selinux-policy" release="279.el6_7.5" src="selinux-policy-3.7.19-279.el6_7.5.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6_7.5.noarch.rpm</filename><sum type="sha256">d407c7768b566c59f541eb916c72c02418193b8169b981163fc8ef028f1f4f9f</sum></package><package arch="noarch" name="selinux-policy-minimum" release="279.el6_7.5" src="selinux-policy-3.7.19-279.el6_7.5.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6_7.5.noarch.rpm</filename><sum type="sha256">0a4a56d16e5aa7c56c38d59e1e536c4cf322238cb3857f6aa3ceb2679f5365eb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1711" id="RHBA-2015:1711-1" title="Rhba-2015:1711-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1258392" id="1258392" title="Selinux Is Preventing Chromium From Using The Setcap Access On A Process" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1809-1</id><title>Db4 Bug Fix Update</title><description>This update fixes the following bug:

* Previously, using multiple processes to access the same database in some cases caused the database to become corrupted. This update fixes the way the by-process memory is managed, and access by multiple processes thus no longer causes the database to become corrupted.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="db4" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-4.7.25-20.el6_7.i686.rpm</filename><sum type="sha256">738ee01425f62a2ec7664e87a0b09a87824087c626906322d525c2d59794b21c</sum></package><package arch="x86_64" name="db4-tcl" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-tcl-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">eb8dd18fe521a51ef84b0ec2a8ff74e9060af5df30d37fdf8afd3c4069510c44</sum></package><package arch="x86_64" name="db4-devel-static" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-devel-static-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">6adbaf699d49859fc59c0213552124a52a548d99551a74c5c1bfa6866ddce401</sum></package><package arch="i686" name="db4-cxx" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-cxx-4.7.25-20.el6_7.i686.rpm</filename><sum type="sha256">3c10fcfbb5f5d7c10cd0f41fe20d97c2b55a4f15ea1d207270f5cc9045b5f9ff</sum></package><package arch="x86_64" name="db4-devel" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-devel-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">0d6a57c030e0a8e55f7073dd6ef1191a1f13587e34d4b77a414086ed3469ce2e</sum></package><package arch="x86_64" name="db4" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">69dcf57a91e156b10aad194061cbcf84f9044d890440ed5a787f71e9502ab034</sum></package><package arch="x86_64" name="db4-java" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-java-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">980d7fc64e690af5ef206e925f9db85370e2787fb3a1245d5b3b5b5fba3540e1</sum></package><package arch="x86_64" name="db4-cxx" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-cxx-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">24d9d102d6a59a27f28d11b498bd9c18819dc2596bff5d054384d130fc3b8077</sum></package><package arch="i686" name="db4-devel" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-devel-4.7.25-20.el6_7.i686.rpm</filename><sum type="sha256">aa7241b4f1fd361309c89c2a8a03e0e4c0590754c03aa401be78f054ea407831</sum></package><package arch="x86_64" name="db4-utils" release="20.el6_7" src="db4-4.7.25-20.el6_7.src.rpm" version="4.7.25"><filename>db4-utils-4.7.25-20.el6_7.x86_64.rpm</filename><sum type="sha256">1ad1d5b8895b6ea0b8e481d5f469a5bd9c795d26a7d4e6a195252d36938e87f7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1809" id="RHBA-2015:1809-1" title="Rhba-2015:1809-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253608" id="1253608" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1810-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the rc.sysinit script incorrectly applied file system quotas before checking for an SELinux label. As a consequence, the relabel operation in certain cases failed due to quotas preventing some files from being changed. With this update, rc.sysinit applies file system quotas after checking for an SELinux label, and the described problem no longer occurs.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="initscripts" release="1.el6_7.1" src="initscripts-9.03.49-1.el6_7.1.src.rpm" version="9.03.49"><filename>initscripts-9.03.49-1.el6_7.1.x86_64.rpm</filename><sum type="sha256">36a9c227c96249fd8258d4555e596d588e3b3074a53b29d85b6804f7828f1417</sum></package><package arch="x86_64" name="debugmode" release="1.el6_7.1" src="initscripts-9.03.49-1.el6_7.1.src.rpm" version="9.03.49"><filename>debugmode-9.03.49-1.el6_7.1.x86_64.rpm</filename><sum type="sha256">902965ea2d0e720f992aad6cacae6b66aa557f9cfd400f790f8c38b102c384c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1810" id="RHBA-2015:1810-1" title="Rhba-2015:1810-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253333" id="1253333" title="Rc.Sysinit Applies Quotas Before Checking For The Selinux Relabel" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1811-1</id><title>Bash Bug Fix Update</title><description>This update fixes the following bug:

* Due to the signal handler function calling certain signal-unsafe functions such as malloc(), the Bash shell in some cases became unresponsive after it received a signal. This update ensures that the signal handler no longer calls signal-unsafe functions, which prevents the described bug from occurring.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="bash" release="33.el6_7.1" src="bash-4.1.2-33.el6_7.1.src.rpm" version="4.1.2"><filename>bash-4.1.2-33.el6_7.1.x86_64.rpm</filename><sum type="sha256">c974f1e7c79cecbb7adc59133a074094d593ead17f3b5efdd52ba112a401ba8f</sum></package><package arch="x86_64" name="bash-doc" release="33.el6_7.1" src="bash-4.1.2-33.el6_7.1.src.rpm" version="4.1.2"><filename>bash-doc-4.1.2-33.el6_7.1.x86_64.rpm</filename><sum type="sha256">9bad9e878e455ca2d02c40b1e2b725d370d8d2a9035ddb62a86ad3cafc8ef3ae</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1811" id="RHBA-2015:1811-1" title="Rhba-2015:1811-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254165" id="1254165" title="Bash Hangs When Receive Some Signal. There Is A Bug In Trap Signal Handling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1812-1</id><title>Procps Bug Fix Update</title><description>This update fixes the following bug:

* With introduction of the human readable switch in the "free" tool, the layout generator had to be modified to support the new feature, which, however, affected printing of values longer than the column width. The values were truncated to prevent the layout from breakage when the values became longer than the reserved space in the columns. As a consequence, the output could not be used in custom scripts. With this update the values longer than the column width are no longer truncated, and the output of the "free" tool can now be used in custom scripts as intended.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="procps" release="34.el6_7" src="procps-3.2.8-34.el6_7.src.rpm" version="3.2.8"><filename>procps-3.2.8-34.el6_7.i686.rpm</filename><sum type="sha256">c5636ed885cb2ddf3650e9862797351588b7fc1c9550ec1d29f455d13589e1b5</sum></package><package arch="x86_64" name="procps-devel" release="34.el6_7" src="procps-3.2.8-34.el6_7.src.rpm" version="3.2.8"><filename>procps-devel-3.2.8-34.el6_7.x86_64.rpm</filename><sum type="sha256">9a0fc5a681b29d6169e33be6b9c9767412602f79ea0c4878621f2434f419fa8a</sum></package><package arch="x86_64" name="procps" release="34.el6_7" src="procps-3.2.8-34.el6_7.src.rpm" version="3.2.8"><filename>procps-3.2.8-34.el6_7.x86_64.rpm</filename><sum type="sha256">6c820a77b8acfd511d22efef0f7f3ff157fe690b3458281d638aa91b433b864f</sum></package><package arch="i686" name="procps-devel" release="34.el6_7" src="procps-3.2.8-34.el6_7.src.rpm" version="3.2.8"><filename>procps-devel-3.2.8-34.el6_7.i686.rpm</filename><sum type="sha256">abf81303e169ee89a90b8df846a23273a64fbbf6b433665cfb1b743a12b5de92</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1812" id="RHBA-2015:1812-1" title="Rhba-2015:1812-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262819" id="1262819" title="Free:  Values Truncated To The Column Width" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1815-1</id><title>Texlive-Texmf Bug Fix Update</title><description>This update fixes the following bug:

* Running the latex command could previously result in a format file error, as the formats of the latex.fmt file and the pdftex.pool file did not match. This bug has been fixed, and the latex command can now be run successfully in this situation.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="texlive-texmf-latex" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-latex-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">f7ab23a16c977c1412183cf306de6e45b09fb3b2fda00781fc31709c61e8a2e1</sum></package><package arch="noarch" name="texlive-texmf-east-asian" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-east-asian-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">6488d466ee9ed67384c3cd3837339e140a36398d69e7116baa71fde2673038ba</sum></package><package arch="noarch" name="texlive-texmf-fonts" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-fonts-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">dacc24ace9c9eaf877217a5a448675ca0af16c35db73e2b8ccdd114c6bbd8cce</sum></package><package arch="noarch" name="texlive-texmf" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">9f1a4a92ee238ea74be155ea88a168b46da1dffa84608c750903b283a01cbb04</sum></package><package arch="noarch" name="texlive-texmf-afm" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-afm-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">985d374b91e45680b02da63d487802a999b51bb295841cc9a0f85815f17f2071</sum></package><package arch="noarch" name="texlive-texmf-doc" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-doc-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">d4ee05223afaaa59878fe91f5c2055976150998288d63f04fed8625e2fc75869</sum></package><package arch="noarch" name="texlive-texmf-context" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-context-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">8e98d9aa368dc3405dc484ef479ab4b4ca8df91d81ef9ceb4f7c789760542857</sum></package><package arch="noarch" name="texlive-texmf-dvips" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-dvips-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">5fdff20089fb45e2668773fb9a82bb0114fb12fc511c8caa363a10d9a49971de</sum></package><package arch="noarch" name="texlive-texmf-xetex" release="39.el6_7" src="texlive-texmf-2007-39.el6_7.src.rpm" version="2007"><filename>texlive-texmf-xetex-2007-39.el6_7.noarch.rpm</filename><sum type="sha256">a47257b18939b8882afd4eb798c81f7cc8411f33acd795d233d6a007a465673f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1815" id="RHBA-2015:1815-1" title="Rhba-2015:1815-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256868" id="1256868" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1816-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, when the user deleted an attribute without a value on the master server, the change was not replicated to other servers. The regression that caused this bug has been fixed. Now, after the user deletes an attribute without a value on the master server, the attribute is removed on all replicated servers as well.

* Previously, when the user attempted to add multiple class of service (CoS) definitions, Directory Server only added the first definition. This update fixes a regression in the CoS cache that caused this problem. As a result, Directory Server adds all CoS definitions as expected.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="389-ds-base" release="62.el6_7" src="389-ds-base-1.2.11.15-62.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-62.el6_7.x86_64.rpm</filename><sum type="sha256">59c2745fb7c62fcccd91c88bd4003799e7baa6b8bc978ba2fa6ebbdef5964437</sum></package><package arch="x86_64" name="389-ds-base-devel" release="62.el6_7" src="389-ds-base-1.2.11.15-62.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-62.el6_7.x86_64.rpm</filename><sum type="sha256">9e6f4f517f4e0c3dbbc9d84f54f8b1a7896eb5fcbf977b48db4cd22b844efb3f</sum></package><package arch="x86_64" name="389-ds-base-libs" release="62.el6_7" src="389-ds-base-1.2.11.15-62.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-62.el6_7.x86_64.rpm</filename><sum type="sha256">df8758558e7684d358c3a677f7406e46047f01c24b328fe9944428f11f2073b1</sum></package><package arch="i686" name="389-ds-base-devel" release="62.el6_7" src="389-ds-base-1.2.11.15-62.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-62.el6_7.i686.rpm</filename><sum type="sha256">4ec6fa84f55b30dc1a1c54d9ea45883fccdf443ef48e5210c15dfebd7cbbacaf</sum></package><package arch="i686" name="389-ds-base-libs" release="62.el6_7" src="389-ds-base-1.2.11.15-62.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-62.el6_7.i686.rpm</filename><sum type="sha256">3589240a705aa515c39cd23b110d89bb15041c20a2d50179afc67736cdfac1ce</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1816" id="RHBA-2015:1816-1" title="Rhba-2015:1816-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257776" id="1257776" title="Replication Not Working For &apos;Delete: Attr&apos;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260004" id="1260004" title="Regression -- Cos Cache Doesn&apos;T Properly Mark Vattr Cache As Invalid When There Are Multiple Suffixes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1817-1</id><title>Fence-Agents Bug Fix Update</title><description>This update fixes the following bugs:

* The "timeout" option was incorrectly mapped when the fence agent for Intelligent Platform Management Interface (IPMI) replaced it with a set of new options. Consequently, users were not able to connect to the fencing device. The mapping has been corrected, and the problem no longer occurs.

* Previously, the fence agent for HP Integrated Lights-Out (iLO) required the tls1.0 argument in order to use TLS1.0 instead of SSL v3. With this update, TLS1.0 is used automatically when connection over SSL v3 fails.

* Due to a regression, the fence_ipmilan agent from fence- agents-3.1.5-48.el6 accepted the deprecated "-i" option for specifying the IPMI address. Consequently, Beaker's power scripts were broken, and the following error occurred:

ERROR:root:Parse error: option -i not recognized

Now, "-i" is no longer accepted as a valid option.

* The fence agent for DM Multipath lost Small Computer System Interface (SCSI) keys when the node was not rebooted using cluster methods. With this update, keys are properly regenerated after each reboot in this situation.

* Prior to this update, the fence agent for IBM RSA was not able to connect to hardware when using the telnet protocol. A patch has been applied to  and it is now possible to log in to IBM RSA in this situation.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="fence-agents" release="8.el6_7.1" src="fence-agents-4.0.15-8.el6_7.1.src.rpm" version="4.0.15"><filename>fence-agents-4.0.15-8.el6_7.1.x86_64.rpm</filename><sum type="sha256">7dbdbd3038a1eb376e8f99f2bfaecede10caa31cd146495f8617285b383fc42b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1817" id="RHBA-2015:1817-1" title="Rhba-2015:1817-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257183" id="1257183" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257569" id="1257569" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257812" id="1257812" title="Fence_Ipmilan No Longer Understands (Deprecated) -I Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257814" id="1257814" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257818" id="1257818" title="Login To Ibm Rsa Fails" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1818-1</id><title>Compat-Sap-C++ Bug Fix And Enhancement Update</title><description>The compat-sap-c++ packages have been upgraded to upstream version 4.8, which provides a number of bug fixes and enhancements over the previous version.

Users of compat-sap-c++ are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="compat-sap-c++" release="16.el6" src="compat-sap-c++-4.8.2-16.el6.src.rpm" version="4.8.2"><filename>compat-sap-c++-4.8.2-16.el6.x86_64.rpm</filename><sum type="sha256">801baf413f75d56e5122cb1e97b6182fb4ccc1b1ed07751f8b51c06e78ffaf28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1818" id="RHBA-2015:1818-1" title="Rhba-2015:1818-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1198501" id="1198501" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1820-1</id><title>Rng-Tools  Bug Fix Update</title><description>This update fixes the following bug:

* A recent update of rng-tools removed the "-i" and "-t" options from the rngd daemon, which caused scripts that make use of these options to fail. This update adds these options back to maintain backward compatibility. Note that the "-t" option exists only to prevent script failures and has no functionality as the new rngd has no use for it.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="rng-tools" release="2.el6_7" src="rng-tools-5-2.el6_7.src.rpm" version="5"><filename>rng-tools-5-2.el6_7.x86_64.rpm</filename><sum type="sha256">d0cd675bca3b5c4283401b54d2b66c9d89e285953c60bdf3cf3cfd2e2fa0df4a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1820" id="RHBA-2015:1820-1" title="Rhba-2015:1820-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259457" id="1259457" title="The Removal Of &apos;-I&apos; And &apos;-T&apos; Causes Existing Rngd Environment To Fail That Make Use Of Those Options" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1822-1</id><title>Glibc Bug Fix Update</title><description>This update fixes the following bugs:

* The malloc function in the glibc libraries was previously enhanced to use a provably safe allocator when corruption was detected. However, this could lead to hangs in some applications when memory consumption was high. This update fixes the allocator to correctly release locks it acquires so that applications no longer hang in the described scenario.

* When memory consumption was high, an unexpected termination could occur in the pvalloc function. This update fixes the glibc libraries to prevent the crash from occurring.

* Prior to this update, providing an invalid value to the M_MMAP_THRESHOLD mallopt option could lead to dynamic threshold being disabled. As a consequence, the allocator performance declined. The glibc libraries have been updated to avoid this situation, and the allocator performance is again optimal.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="glibc-common" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-common-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">dc620a80054e282125425404c4c903bf226fd4eb7cd7ed64c229d90561016584</sum></package><package arch="x86_64" name="nscd" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>nscd-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">7a7ef542f0cf90ce5f84f9aa39b72b62c2fb20ad83212b690d68efd6aa8326f9</sum></package><package arch="x86_64" name="glibc-static" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-static-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">5b36b328e7766e8a11386ac967f61f918925827bcce350ae5cc589da4ca70d3d</sum></package><package arch="x86_64" name="glibc-headers" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-headers-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">f74f3a1a2feda74a624cffcfc09155dfc3dfba6d2744cf34eb1c3e02675f8734</sum></package><package arch="i686" name="glibc-static" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-static-2.12-1.166.el6_7.3.i686.rpm</filename><sum type="sha256">3e6783c79f85cd6584950507027294a511548d21524121e8cdb350711e06dd81</sum></package><package arch="x86_64" name="glibc-devel" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">db67c438d9936160b2bacaf0646e9a6a8a85dd3f318440458e39e3b745ad6cd7</sum></package><package arch="x86_64" name="glibc" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">18c9c00e41e4a5e571ac76fdb23a87a7f9b20ebc88cba48c446f78a2308a7397</sum></package><package arch="i686" name="glibc-devel" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-devel-2.12-1.166.el6_7.3.i686.rpm</filename><sum type="sha256">0da4657186f9b63440b77d4b39153cf591a086064bd5c96bcc38577cd15d8baf</sum></package><package arch="i686" name="glibc" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-2.12-1.166.el6_7.3.i686.rpm</filename><sum type="sha256">3f23e30486d66187393ff4beef2d0a01c0743a294b810eeedfc50ebaadb90ed4</sum></package><package arch="x86_64" name="glibc-utils" release="1.166.el6_7.3" src="glibc-2.12-1.166.el6_7.3.src.rpm" version="2.12"><filename>glibc-utils-2.12-1.166.el6_7.3.x86_64.rpm</filename><sum type="sha256">e38072f317d4c083a737ef3728f8a5cb64249e074a3439c786fa2d171edfbcbe</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1822" id="RHBA-2015:1822-1" title="Rhba-2015:1822-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256812" id="1256812" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256890" id="1256890" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256891" id="1256891" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1823-1</id><title>Lvm2 Bug Fix Update</title><description>This update fixes the following bug:

* When the /etc/lvm/cache/.cache file contained an entry that did not exist, the code processed an uninitialized structure which led to unreliable behavior. As a consequence, an error message referencing an undefined (major, minor) pair was returned. With this update, non-existent devices are handled correctly while processing the .cache file, and the aforementioned error message is no longer generated.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="lvm2-cluster" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>lvm2-cluster-2.02.118-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">6a9e5864846df6c0f7f9e4afc94a2e4a1a1e0273e7a717b17f19c2de5d12e0f7</sum></package><package arch="i686" name="lvm2-libs" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.3.i686.rpm</filename><sum type="sha256">8b3ae4c88b8c1ea53c76bdd24a4b9383fc890a5bc2b622489eb36997faffb2f9</sum></package><package arch="i686" name="device-mapper-libs" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.3.i686.rpm</filename><sum type="sha256">3ec005da116218b30c27b8252d05676d08f10563c3d26329585cd9f774628ca2</sum></package><package arch="x86_64" name="lvm2-libs" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">13e51ecfa00c615023c4a5f217dd0e9580df0c37e6f49ced0ff005e3bd040d52</sum></package><package arch="x86_64" name="device-mapper-devel" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">e1d98df1323220e3a554dd79eec95c47b9c631f06c315c36e655b927a7533bc3</sum></package><package arch="x86_64" name="device-mapper-libs" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">50a03b423ce36674e1f1823ce261965f0560847c6be166b1eba6b35bf92a9e0a</sum></package><package arch="i686" name="device-mapper-devel" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.3.i686.rpm</filename><sum type="sha256">377fcf9598ee848b0df5f88a326960c383d57d1bcb19ff735b6fd9095625a1a0</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">1348ef0fc531e9a4e7d237547f65f6930a808c28abba78d4cf853d1abd37e2ae</sum></package><package arch="i686" name="device-mapper-event-libs" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.3.i686.rpm</filename><sum type="sha256">b84dae5d10fb1b9ad5928174e939f026124d5fc3b5cb1a02c8a1220fc1f923da</sum></package><package arch="x86_64" name="device-mapper" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-1.02.95-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">2cb3163164b973098dcde709c406bacf79b684bb547d3ba280b5d71de681704a</sum></package><package arch="x86_64" name="lvm2-devel" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">8a0497a9bb87b4214f6fa9a7aca4188e1fe9d9cf5ae4108fc945422a481382e8</sum></package><package arch="x86_64" name="device-mapper-event" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-event-1.02.95-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">f32ea3c7fff2f97ad59f967a50195a52f6a6a02f4d8784cfcffc176c459cf97d</sum></package><package arch="i686" name="device-mapper-event-devel" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.3.i686.rpm</filename><sum type="sha256">a3defec39dded0d06db3cbb80a1184b87dc15be70c500579f2382490444e9fa6</sum></package><package arch="i686" name="lvm2-devel" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.3.i686.rpm</filename><sum type="sha256">d56100a7c46975c3e0f156fa59a509f60ea3dddd459bc7db46cf062b2c762cec</sum></package><package arch="x86_64" name="cmirror" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>cmirror-2.02.118-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">174bb397b1a7cd047b429d4838c5fc4be3668aac42edeae4e96bc4ad6f2cc46a</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">0f2de69aa11209fe0abaf903d9445f4edb6706cf47425e52698896ec1f4ebc6d</sum></package><package arch="x86_64" name="lvm2" release="3.el6_7.3" src="lvm2-2.02.118-3.el6_7.3.src.rpm" version="2.02.118"><filename>lvm2-2.02.118-3.el6_7.3.x86_64.rpm</filename><sum type="sha256">48029e16f00060494fb37767b68edc121a5b7e2ef6a5cde1655b3738d0d7b54e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1823" id="RHBA-2015:1823-1" title="Rhba-2015:1823-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261071" id="1261071" title="Reproducible Lvm Errors On A Few Systems When .Cache File Contains A Device That Is No Longer On The System" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1824-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, symlink creation failed when running the qpidd service. Consequently, an attempt to create a durable queue with qpidd reported a misleading error, and the queue was not properly created. The SELinux code preventing the symlink creation has been changed, and qpidd now creates a durable queue as expected.

* When manually upgrading a linear-store Empty File Pool (EFP) to the new partitioning structure, after changing the owner and group of created files in the qls/ directory, the qpidd service previously returned a permission denied error when attempting to access the migrated journal file. The corresponding SELinux rule has been updated, and qpidd is able to access the migrated journal file as expected.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="selinux-policy-mls" release="279.el6_7.6" src="selinux-policy-3.7.19-279.el6_7.6.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-279.el6_7.6.noarch.rpm</filename><sum type="sha256">0f47223faac7a698f8592ba19ff404783f1abd91997df7894a45bbe47cb5002b</sum></package><package arch="noarch" name="selinux-policy-minimum" release="279.el6_7.6" src="selinux-policy-3.7.19-279.el6_7.6.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-279.el6_7.6.noarch.rpm</filename><sum type="sha256">81063d29c440c42cb215df6d9656d32381af308bc987337e23c046d5920d64ac</sum></package><package arch="noarch" name="selinux-policy" release="279.el6_7.6" src="selinux-policy-3.7.19-279.el6_7.6.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-279.el6_7.6.noarch.rpm</filename><sum type="sha256">15b76a2c676b24be4172fe1fa17301b6cdec17681a9ef0326dc64ad1dd1e70b5</sum></package><package arch="noarch" name="selinux-policy-doc" release="279.el6_7.6" src="selinux-policy-3.7.19-279.el6_7.6.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-279.el6_7.6.noarch.rpm</filename><sum type="sha256">9a80e848c16bdb9b0b36389787cc89b09a2a840bcc5eed54e3036e353e3e8727</sum></package><package arch="noarch" name="selinux-policy-targeted" release="279.el6_7.6" src="selinux-policy-3.7.19-279.el6_7.6.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-279.el6_7.6.noarch.rpm</filename><sum type="sha256">ea9b82fe5425125a4046aebdae77589df638a34944c4e74e67b1cb62e8b8459d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1824" id="RHBA-2015:1824-1" title="Rhba-2015:1824-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257318" id="1257318" title="[Linearstore] Symlink Creation Fails When Running Broker As A Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257319" id="1257319" title="Selinux Prevents Qpidd From Starting After Update Mrgm 3.1 To Mrgm 3.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1825-1</id><title>Ksh Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the ksh shell terminated unexpectedly with a segmentation fault when attempting to reset or modify certain signal traps. With this update, ksh no longer attempts to free memory used for a string literal, which prevents the described problem from occurring.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="ksh" release="28.el6_7.3" src="ksh-20120801-28.el6_7.3.src.rpm" version="20120801"><filename>ksh-20120801-28.el6_7.3.x86_64.rpm</filename><sum type="sha256">22247d42d7607af48fac90ce4bca13040709cfb883dc5c96b88fcdfb1c281b9e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1825" id="RHBA-2015:1825-1" title="Rhba-2015:1825-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252896" id="1252896" title="Serious Problem With Correction Of #1117404 [Rhel-6.7.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1826-1</id><title>Nss_Compat_Ossl Bug Fix Update</title><description>This update fixes the following bug:

* When establishing a secure connection, the nss_compat_ossl service previously requested the Network Security Services (NSS) library to initiate an SSL 2.0 handshake with the remote server. However, because NSS no longer supports the SSL 2.0 protocol, the handshake failed. With this update, nss_compat_ossl no longer uses SSL 2.0, and secure connections can be properly established using SSL 3.0, TLS 1.0, or their later versions.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="nss_compat_ossl-devel" release="2.el6_7" src="nss_compat_ossl-0.9.6-2.el6_7.src.rpm" version="0.9.6"><filename>nss_compat_ossl-devel-0.9.6-2.el6_7.i686.rpm</filename><sum type="sha256">036aaddca94b0ba3b570029f92a7059b4984359e6e87d7c29c14092866200d5c</sum></package><package arch="x86_64" name="nss_compat_ossl-devel" release="2.el6_7" src="nss_compat_ossl-0.9.6-2.el6_7.src.rpm" version="0.9.6"><filename>nss_compat_ossl-devel-0.9.6-2.el6_7.x86_64.rpm</filename><sum type="sha256">75fe6f74125ba2f77067fb8bca12e221ecceba39a0178a575e2536179d015e77</sum></package><package arch="x86_64" name="nss_compat_ossl" release="2.el6_7" src="nss_compat_ossl-0.9.6-2.el6_7.src.rpm" version="0.9.6"><filename>nss_compat_ossl-0.9.6-2.el6_7.x86_64.rpm</filename><sum type="sha256">457e59cd6138165466d61d274e3e05f50a1466e4900b08e0703e62a362a667c6</sum></package><package arch="i686" name="nss_compat_ossl" release="2.el6_7" src="nss_compat_ossl-0.9.6-2.el6_7.src.rpm" version="0.9.6"><filename>nss_compat_ossl-0.9.6-2.el6_7.i686.rpm</filename><sum type="sha256">19bb818f61b386f1706d3e423b0a68a07cbccff1e987a3d526e0b236b8a40850</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1826" id="RHBA-2015:1826-1" title="Rhba-2015:1826-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252649" id="1252649" title="Elinks Sends Sslv2 Style Hello" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1827-1</id><title>Kernel Bug Fix Update</title><description>Bugs:

* A previous change in the get_swap_page() locking removed the use of the swap_lock spinlock. This could cause nr_swap_pages corruption and invalid SwapFree information in the /proc/meminfo file, where the size of SwapFree could exceed the size of SwapTotal. This update uses an atomic variable for nr_swap_pages, and the size of SwapFree in /proc/meminfo is now correct.

* When logging in as a user and trying to mount a share using the "cd" command, the UID and GID autofs additional variables previously took incorrect values, taking root UID and GID instead of user's UID and GID. The bug in the assignment of uid and gid mount requests has been fixed, and UID and GID now get the correct values with autofs configuration on Scientific Linux 6.7.

* Previously, the attach_task_by_pid() function in some cases raced with the exiting thread and tried to lock or unlock the already freed group_rwsem member of the signal_struct list. As a consequence, a kernel crash could occur. This update adds the cgroup_threadgroup_rwsem variable, which fixes this bug and prevents the kernel crash from occurring in this scenario.

* Previously, the vmxnet3 driver napi poll implementation used rx descriptor count for the napi poll budget. This allowed to return from napi poll halfway through recieving a fragmented packet if the budget threshold was reached. This behavior caused a kernel panic(BUG_ON) if previous napi poll ended with skb allocation failure and the end of packet was not reached. This bug has been fixed by only counting whole received packets in the napi poll rather than the rx descriptor count. As a result, the aforementioned kernel panic no longer occurs.

* Due to the renaming of the VLAN_GROUP_ARRAY_LEN preprocessor macro, the kernel API for 3rd party modules changed in an incompatible way. As a consequence, compiling the vmxnet3 driver in vmware-tools failed. This update adds a definition of the VLAN_GROUP_ARRAY_LEN macro, and vmxnet3 now succeeds to compile.

* Due to the incorrect length of the FCP_RSP_INFO field, parts of the field could be copied, and "st" and "sg" drivers thus did not work correctly. With this update, the FCP protocol related code has been updated, and "st" and "sg" now work as expected.

* Previously, driving the crypto adapter under high pressure workload with long running cryptographic requests led to performance degradations of the crypto adapter or, in some cases, the crypto adapter entered recovery mode. As a consequence, an Adjunct Processor (AP) queue reset was triggered to recover and reinitialize the AP queue. Due to the different hardware behavior, the reset could be delayed and interrupts were not re- enabled. Now, the RAPQ (queue reset) and AQIC (interrupt control) commands are treated fully asynchronously, and the device driver checks the reset and interrupt states so that it can handle the AP queue reinitialization properly.

* Prior to this update, multiple instances trying to copy the same file triggered a race condition in the perf buildid-cache that could truncate system libraries and other files. With this update, unique temporary files are used when copying to the buildid directory to prevent the aforementioned race condition from occurring.

* If a bonding VLAN interface entered promiscuous mode while it was inactive, the slave interfaces previously did not enter promiscuous mode automatically even after the bonding VLAN interface became active again. With this update, the flag changes are always propagated to interfaces, and slave interfaces thus enter promiscuous mode as expected.

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kernel-devel" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">27cbae0e4db5328d95856f6a355f071559a36a4c55f2afdb3750608abb26f815</sum></package><package arch="x86_64" name="perf" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">badd32bbf1a7ee5bba0c22de70a26c040e05090a000b1a7c9706d59bbf0fc34d</sum></package><package arch="noarch" name="kernel-firmware" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.7.1.el6.noarch.rpm</filename><sum type="sha256">0a7a012c852a5f4a3de358848d7a2688eb8e3dbd8703fb242cd2f89c8b77ebca</sum></package><package arch="noarch" name="kernel-doc" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.7.1.el6.noarch.rpm</filename><sum type="sha256">75ed67e00a16b648a2f611d0e459c8733efe985a7bad2976f1fb5dffec0bcbe3</sum></package><package arch="x86_64" name="kernel-debug" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">75c64e4aa0131f44523e8d682063d58679e8b47bf822b35c42b6da25642352c5</sum></package><package arch="x86_64" name="kernel-headers" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">1ddd33a5b6f919771b7d49064f19c5d7860eff2a1d762b4f8ebb195d4679ad3f</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">0c81a09d8dfde8413434e79e668bce7aa5f0cf7c1ab038e478717270d6b76b92</sum></package><package arch="x86_64" name="python-perf" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">3156819b5ef47d9e16406996f7304867d2d7acbd5c925b4f44564036afca7e4a</sum></package><package arch="x86_64" name="kernel" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.7.1.el6.x86_64.rpm</filename><sum type="sha256">df145728dd4a2a93178992355447095a6f50fc68c007eecb96273d5f01e6f7d7</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.7.1.el6" src="kernel-2.6.32-573.7.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.7.1.el6.noarch.rpm</filename><sum type="sha256">5ab67946fa727f464305d57800ed80dcae81c6567b1a4050df0e77e67a0576fe</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1827" id="RHBA-2015:1827-1" title="Rhba-2015:1827-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242145" id="1242145" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1246081" id="1246081" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1246092" id="1246092" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253728" id="1253728" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253729" id="1253729" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253733" id="1253733" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253734" id="1253734" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1258581" id="1258581" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259362" id="1259362" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1828-1</id><title>Java-1.8.0-Openjdk Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the automatically generated name for the installation directory for java-1.8.0-openjdk was not consistent with installation directory names for java-1.6.0-openjdk and java-1.7.0-openjdk. As a consequence, applications and automated tools that expected a consistent Java naming pattern failed when interacting with java-1.8.0-openjdk. With this update, java-1.8.0-openjdk installation directory follows the same pattern as the previous versions, which prevents the described problem. Note that due to the changes in the path structure, it is now impossible to revert to a version of java-1.8.0-openjdk prior to this update.

All running instances of OpenJDK Java must be restarted for the update to take effect.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">701dab9f5fcc67d083505a358df3172bd6757fc93fbcebc8d1c370e144cdedff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-src-debug-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">fed8286c3c9586442868a00ccd01cba2b9bbe62f37aa2a2413ee307670401c2d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">ed73b7c906e4689da0c9155948c56ace22cddc2378d1c417f28aa67ab315b048</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-headless-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">b2d425b55fa0dfb6037a819db6b3ff334102676c90535305a4ea5d890987726b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-javadoc-1.8.0.51-3.b16.el6_7.noarch.rpm</filename><sum type="sha256">79e33f3bbb45e768be0bb8ec5dd019ed5d1a92fd0d55d50768236ff9d2825557</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-debug-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">c3bddc315c527bb3e95123ed309009bf24609a887dc8bc588113598469f932f9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">2246e07a2e736fd1fb6bd126d92b17079bf329f1ef49fa652d0fcdcdd35a3c94</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-devel-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">17b5d80004c1c096924b9f756175234600443e4be18ce64b50a77683594dd9da</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">80ad009d068cabf0210fba38d7b71b9b6639c4957406b90cff964501508afcc6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-src-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">cd46d687debb765df0df888048a233ec548f2da987abd2d71bfac6d52e51d80e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b16.el6_7" src="java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.src.rpm" version="1.8.0.51"><filename>java-1.8.0-openjdk-demo-1.8.0.51-3.b16.el6_7.x86_64.rpm</filename><sum type="sha256">4b01f5f24a125e11b81cb3b9397e34c03473a56c01677a3934fe718b70375576</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1828" id="RHBA-2015:1828-1" title="Rhba-2015:1828-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254197" id="1254197" title="Inconsistent Directory Naming And Alternatives Handling Between Java 6/7 And 8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1829-1</id><title>Freeradius Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when using the Extensible Authentication Protection (EAP) to authenticate clients that use the TLS 1.2 protocol, such as systems with iOS 9 or Windows 7, the connection with the authentication server could not be established and the operation thus failed. This update ensures that Microsoft Point-to-Point Encryption (MPPE) keys are calculated correctly when TLS 1.2 is used, which prevents the described problem from occurring.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="freeradius-krb5" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-krb5-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">915fa4369b4d1253ca0f9921a1ff7648cace1be47500a393221a834915a9b6c1</sum></package><package arch="x86_64" name="freeradius-mysql" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-mysql-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">4a1801972fd366d1fa91f2b7964b5a3cb1090ea25eb2a8b47e842bf3d0212184</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-unixODBC-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">ef395286f805fd5e546fc3b7507fd60b91a3f15aa9aec55a2a781dd73c786012</sum></package><package arch="x86_64" name="freeradius" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">a4d9f218367d913a0842581f542efce45fe79dc26d01649b33cfa4a39b501c51</sum></package><package arch="x86_64" name="freeradius-ldap" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-ldap-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">f5772ab6982f9be7e4376912d4be39bed070f015526a9e5404eb672a52742d77</sum></package><package arch="x86_64" name="freeradius-utils" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-utils-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">0e40a6082e5e47123a9c85495b4b7d2b66e19b910ecb6c366b239c838a4f04d9</sum></package><package arch="x86_64" name="freeradius-postgresql" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-postgresql-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">e90b4d0fd7283a3427df2bb450820a71926451d5fffaa163ad91e9fe1ef1160b</sum></package><package arch="x86_64" name="freeradius-python" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-python-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">444daa4f0b5c03104a7e3a78cb4e839e44f86821e981d33aa83bb82359b053aa</sum></package><package arch="x86_64" name="freeradius-perl" release="6.el6_7" src="freeradius-2.2.6-6.el6_7.src.rpm" version="2.2.6"><filename>freeradius-perl-2.2.6-6.el6_7.x86_64.rpm</filename><sum type="sha256">1cc6d5b4d6c558a3fb4700315382b3a5bec0a433715a48b113c3358bc7e890c4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1829" id="RHBA-2015:1829-1" title="Rhba-2015:1829-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254176" id="1254176" title="Freeradius 2.2.6 Miscalculates Mppe Keys With Tls 1.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1830-1</id><title>Texlive Bug Fix Update</title><description>This update fixes the following bug:

* Running the latex command when the .aux file was non-writable could previously result in erasing the input .tex file. This bug has been fixed, and the .tex file now remains intact in the aforementioned scenario.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="texlive-context" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-context-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">65d5c9d2a455ff5c70e16032330c0ef34ed413a0d97b24a85373f76912b13cf5</sum></package><package arch="x86_64" name="texlive-east-asian" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-east-asian-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">7bc3070e874ec9496e8ffc5915611443934022569bacce56b2db5e6ea4d3948a</sum></package><package arch="x86_64" name="texlive-dvips" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-dvips-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">e196c4a325c8929760398a15d9a4246904dece98e51fabdf39d85183b0e3c7cc</sum></package><package arch="x86_64" name="texlive-utils" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-utils-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">ef86d3cc727be26375bf353bd77df02953a680e757b352a7c0be618b4d811bb4</sum></package><package arch="x86_64" name="kpathsea" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>kpathsea-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">88245ae9b922fc7983d8abf789978e2da26ba859961786f8f1882555e0933d75</sum></package><package arch="i686" name="kpathsea-devel" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>kpathsea-devel-2007-60.el6_7.i686.rpm</filename><sum type="sha256">b8ea3d43e0d78b683a8fb90c4470a27c0a71d189ea97154897fc117da80b503d</sum></package><package arch="x86_64" name="texlive-latex" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-latex-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">e41335e2cb70b68bbdf4511b8667adb80991cae3832f833538514c9141eecd31</sum></package><package arch="x86_64" name="kpathsea-devel" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>kpathsea-devel-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">fb50d3fec820490b9b1ac30049a5d3d5532ff7049912d9fbab780c700342c632</sum></package><package arch="x86_64" name="mendexk" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2.6e"><filename>mendexk-2.6e-60.el6_7.x86_64.rpm</filename><sum type="sha256">8fbdeca2a1fed657e5417ab32e79b2e7721bde821a445f59a04d9e2fbf9aec94</sum></package><package arch="x86_64" name="texlive-xetex" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-xetex-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">656ed67895b1ddfc08b8db2c581a41036ff5aaac3deec2cbb43a6ec60e017a41</sum></package><package arch="i686" name="kpathsea" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>kpathsea-2007-60.el6_7.i686.rpm</filename><sum type="sha256">0dbf14a14e2e2e98b87dc15ff48d7fc32f79fe8766ee4369a323c45433cadb0f</sum></package><package arch="x86_64" name="texlive-afm" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-afm-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">0dea9b5d4db67d44f1de970d6890477e4ee8b52f782d89ae54604f3367e35be9</sum></package><package arch="x86_64" name="texlive-dviutils" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-dviutils-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">8d5da161240db7d721698ca7c08e0fb05ed55b94ae819d105cf9e1c69de897b0</sum></package><package arch="x86_64" name="texlive" release="60.el6_7" src="texlive-2007-60.el6_7.src.rpm" version="2007"><filename>texlive-2007-60.el6_7.x86_64.rpm</filename><sum type="sha256">04ae5200976a560a851279ffc402dc49f65e67a7b6869f9855837f67b1998226</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1830" id="RHBA-2015:1830-1" title="Rhba-2015:1830-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255013" id="1255013" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1831-1</id><title>Dovecot Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the dovecot server could terminate unexpectedly when executing a search for emails not containing a nonexistent sequence. To an upstream patch has been backported and applied, and dovecot no longer crashes in this situation.</description><release>Scientific Linux</release><issued date="2015-09-29 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="dovecot-devel" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-19.el6_7.2.x86_64.rpm</filename><sum type="sha256">c2a48fa84a825ba9cebc07bec3e9d84b9d929b2b0b44d5b1ebe4b1c03c0687b7</sum></package><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-pgsql-2.0.9-19.el6_7.2.x86_64.rpm</filename><sum type="sha256">c13f18ae2425b6e455ad426ef58215ef52fb4c7304c9f8411b9dfe9cc67c9a6d</sum></package><package arch="x86_64" epoch="1" name="dovecot-mysql" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-mysql-2.0.9-19.el6_7.2.x86_64.rpm</filename><sum type="sha256">da4d691e3a9f9d07bc38d9b83a49c40834b098f7efd8ab336cc227c399f95fd9</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-pigeonhole-2.0.9-19.el6_7.2.x86_64.rpm</filename><sum type="sha256">abe9827f161eeefe2b2c80ba1935bbad989b46221289b5f239a61e27b35fbe64</sum></package><package arch="i686" epoch="1" name="dovecot-devel" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-devel-2.0.9-19.el6_7.2.i686.rpm</filename><sum type="sha256">1a8cfc976096a2981ff3ffc113a380a57c4e889cee07f8e9745586cc1eeede30</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-19.el6_7.2.x86_64.rpm</filename><sum type="sha256">7d19cd4da2eed35d9d7b3b1acdd4cb29962428fe19e104e37caa2773569016d0</sum></package><package arch="i686" epoch="1" name="dovecot" release="19.el6_7.2" src="dovecot-2.0.9-19.el6_7.2.src.rpm" version="2.0.9"><filename>dovecot-2.0.9-19.el6_7.2.i686.rpm</filename><sum type="sha256">a3c858da6c034d3d0244caa166cbc10617b24889106c18a5e6670a6bcb2b3fe3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1831" id="RHBA-2015:1831-1" title="Rhba-2015:1831-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256413" id="1256413" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1992-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bugs:

* The memory used by the defragmentation engine is accounted for per CPU. However, on systems with numerous CPUs, the per-CPU caches could deviate from reality, thus causing the defragmentation engine to discard old fragments too early. This update adds a fix to minimize this discrepancy, and old fragments are now discarded in time.

* Previously, reloading or removing edac modules on a system using the i7core_edac module could lead to a number of returned warning messages and a subsequent kernel crash. The underlying source code has been patched, and the kernel no longer crashes when operating with edac modules.

* Due to a regression, packets counter detected only the number of normally processed completions (packets), not the erroneous ones. As these packets were thus never acknowledged, the firmware kept returning interrupt requests (IRQs). A patch has been provided to  and all packets are now counted as expected.

* Unlikely conditions in the nfs_clear_inode() function can cause a kernel panic due to the use of the BUG_ON() macro. An upstream patch replacing the BUG_ON() macro with WARN_ON_ONCE() in this function has been provided to avoid this panic and the kernel panic no longer occurs in this situation.

* Previously, a bridge interface could exist on top of a bonded interface, which was above a physical interface with the large receive offload (LRO) flag still on. Bridge interfaces are incompatible with LRO enabled on any underlying devices, which caused network communications on the bridge, such as that from a Virtual Machine (VM) to fail to function properly. This update makes sure devices underneath a bridge all get LRO disabled, and a VM now connects via a bridged interface successfully.

* During a KVM guest shutdown, if a virtio device generated interrupts, the virtio driver sometimes could not correctly handle or clear the interrupt. As a consequence, the system became busy, continuously processing the same interrupt, leading to an incomplete shutdown of the KVM guest. This bug has been fixed, and the guest now shuts down properly.

* After adjusting the extent size with the xfs_fio utility and running the fio command with the configuration file provided, the XFS file system became corrupted. This update makes sure the extent size hints can round up extents past the maximum extent length, and the XFS file system now preserves fio operations.

* At a process or thread exit, when the Linux kernel undoes any SysV semaphore operations done previously (the ones done using semop with the SEM_UNDO flag), there was a possible flaw and race with another process or thread removing the same semaphore set where the operations occurred, leading to possible use of in-kernel-freed memory and then to possible unpredictable behaviour. This bug could be noticed with software which uses IPC SysV semaphores, such as IBM DB2, which for example in certain cases could lead to a situation where its processes or utilities could get incorrectly stalled in some IPC semaphore operation or syscall after the race or problem happened. A patch has been provided to  and the kernel now behaves as expected in the aforementioned scenario..

* On a system with a bonded interface, the user could not specify a custom MAC address for the bond. A patch has been provided to  and custom MAC addresses can be specified again in the aforementioned situation.

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kernel-headers" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">414d632df642215484612a1961f918d272dd2680ce46d3f9229a11b87e64310a</sum></package><package arch="noarch" name="kernel-firmware" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.8.1.el6.noarch.rpm</filename><sum type="sha256">cd05c55aa4d8b4b37ca69e6a1a5937c5ca1df9145c0b3fc4fc3cb22bf1b49299</sum></package><package arch="x86_64" name="perf" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">f88a60140224f83a3b9ce5eb9a40db3bc2a2772e30b5b61a633992e53a6642ff</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.8.1.el6.noarch.rpm</filename><sum type="sha256">2c7609fe0d2e4ffc4b4fc99244581725ef1bb1ba63edc1fec43de21709d1735a</sum></package><package arch="x86_64" name="kernel-debug" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">7fab59895918039def66abf2cdb3bb40c0af814713971e784344c6746f57e146</sum></package><package arch="noarch" name="kernel-doc" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.8.1.el6.noarch.rpm</filename><sum type="sha256">e397e9ded3945a3a590abb524aac3e221fabe1eaba02fdb8098929025eb15162</sum></package><package arch="x86_64" name="python-perf" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">4dfaa5c1c82f51a640d5abc8299f9fd7c94858043b2d4f718d53f9fc76ce26d6</sum></package><package arch="x86_64" name="kernel-devel" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">01ca8911693c501fc65da24806456454ff22cc3ab2162f3733733af127b65fd5</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">b542963c1ed323cf3af3d020c0cbb2ccfce3f7e0b690b253f6409991428f45de</sum></package><package arch="x86_64" name="kernel" release="573.8.1.el6" src="kernel-2.6.32-573.8.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.8.1.el6.x86_64.rpm</filename><sum type="sha256">ba4f85a25f51731cadb71fd18d413632c5f6e46e5b3c9d7f1c691bb3696b67a0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1992" id="RHBA-2015:1992-1" title="Rhba-2015:1992-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1246088" id="1246088" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255492" id="1255492" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260535" id="1260535" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266364" id="1266364" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266366" id="1266366" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266369" id="1266369" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266372" id="1266372" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266373" id="1266373" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266374" id="1266374" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1993-1</id><title>Openldap Bug Fix Update</title><description>* A patch fixing a deadlock occurring during SSL_ForceHandshake when getting connection to replica was not applied correctly due to impossibility to test the issue reliably. As a consequence, sending a number of parallel update requests to the server could cause a deadlock. This fix provides correct implementation of the patch, and the deadlock no longer occurs in the described scenario.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="openldap-servers-sql" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-servers-sql-2.4.40-7.el6_7.x86_64.rpm</filename><sum type="sha256">c2b4a9e82b515394f05ea813414f9f22f32dc943f3e84a0d3666c6b6958c7902</sum></package><package arch="x86_64" name="openldap-clients" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-clients-2.4.40-7.el6_7.x86_64.rpm</filename><sum type="sha256">bb8b1dad33bfd32695dde985c82f7e095cb75f2f00f648855eafe03604cedcc8</sum></package><package arch="x86_64" name="openldap-servers" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-servers-2.4.40-7.el6_7.x86_64.rpm</filename><sum type="sha256">203b13110e49e2277c5e6b19fc5a9c4febca6f96e7d251bf0c67a0c109efce6d</sum></package><package arch="x86_64" name="openldap" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-2.4.40-7.el6_7.x86_64.rpm</filename><sum type="sha256">abf43c50c1c48314d836d255fc6c3b024fc52213d6513af48f63382fc86ff81b</sum></package><package arch="i686" name="openldap" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-2.4.40-7.el6_7.i686.rpm</filename><sum type="sha256">d27a7a8cc5ee8a81aa6a5a65f6719f3557110ce75fc650b0a5a1157d597e3754</sum></package><package arch="i686" name="openldap-devel" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-devel-2.4.40-7.el6_7.i686.rpm</filename><sum type="sha256">bec9931ff9cd9f28cfe05ffb9fee431968a97bf49403c4b61970da5b5298641e</sum></package><package arch="x86_64" name="openldap-devel" release="7.el6_7" src="openldap-2.4.40-7.el6_7.src.rpm" version="2.4.40"><filename>openldap-devel-2.4.40-7.el6_7.x86_64.rpm</filename><sum type="sha256">05124fe54f28ab884613a79cef0c9db5a6b650e52935ad3932f5335d83e47d5f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1993" id="RHBA-2015:1993-1" title="Rhba-2015:1993-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267501" id="1267501" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1994-1</id><title>Logrotate Bug Fix Update</title><description>This update fixes the following bug:

* Previously, logrotate ignored the "maillast" directive when compression was in use. Consequently, when compression and the "maillast" directive were used, the name of the rotated file was in the email subject instead of the name of the file removed by logrotate. Logrotate has been amended to respect "maillast" as expected, even when compression is used. As a result, logrotate sets the subject to the file which is going to be removed by logrotate in the described case.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="logrotate" release="25.el6_7" src="logrotate-3.7.8-25.el6_7.src.rpm" version="3.7.8"><filename>logrotate-3.7.8-25.el6_7.x86_64.rpm</filename><sum type="sha256">b83fc9624d88ba6add5a0c672225b218e157ad9e225451fc93fbd8e899e9d305</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1994" id="RHBA-2015:1994-1" title="Rhba-2015:1994-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267557" id="1267557" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1995-1</id><title>Resource-Agents Bug Fix Update</title><description>This update includes the following bug fixes:

* Prior to this update, the option name=&amp;lt;remote hostname" could not correctly map to a universally unique identifier (UUID) causing logs to be filled with error messages. The mapping has been amended, and error messages are no longer generated in this situation.

* In environments where hostname did not match the cluster node name, the hanaRemoteHost parameter was not handled correctly, and the resource could fail to run properly. With this update, the problem has been resolved, and the replication works as expected.

* This update also addresses previously incorrect return code that could cause the agent to fail to communicate with the Pacemaker cluster manager. The code has been fixed, and the agent can now communicate without problems.

* Prior to this update, incorrect string parsing of the site names could cause incorrect calculation of the hanaRemoteHost value. The problem has been addressed by changing the string parsing code, and the parsing is now correct.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="resource-agents" release="24.el6_7.1" src="resource-agents-3.9.5-24.el6_7.1.src.rpm" version="3.9.5"><filename>resource-agents-3.9.5-24.el6_7.1.x86_64.rpm</filename><sum type="sha256">790835f92383dbef5d47f54fcde1c775c493302e267b505543872268fa404aaa</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1995" id="RHBA-2015:1995-1" title="Rhba-2015:1995-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267459" id="1267459" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1998-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* When multiple replica update vector (RUV) updates were skipped in fractional replication, RUV was not updated at the end of the session. The next session then restarted evaluating the same skipped updates. To fix the problem, a system subentry has been added, which is occasionally updated even when no applicable changes can be replicated at the time of the update. This prevents the unnecessary replays.

* Previously, Directory Server did not correctly handle requesting searches for simple paged results asynchronously in a persistent connection. If one of the requests was abandoned, the ns-slapd service sometimes terminated unexpectedly. A patch has been applied to fix the problem, and ns-slapd no longer crashes in the described situation.

* Directory Server previously did not properly handle freeing search result objects. A delay occurred between freeing an object and providing the freed information to the paged results handle. If the handle was released because of a timeout during the delay, a double free error occurred, which caused the ns-slapd service to terminate unexpectedly. This update eliminates the mentioned delay, thus preventing the double free error. As a result, ns-slapd no longer crashes in this situation.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="389-ds-base-libs" release="65.el6_7" src="389-ds-base-1.2.11.15-65.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-65.el6_7.x86_64.rpm</filename><sum type="sha256">9a403302b4091f930c786b0ee75ef44eaa7250b7df1bf8a2b86ace1ce3c1dcaf</sum></package><package arch="x86_64" name="389-ds-base-devel" release="65.el6_7" src="389-ds-base-1.2.11.15-65.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-65.el6_7.x86_64.rpm</filename><sum type="sha256">0b7c62336b61cae73d0050e21d2472c8f14b48d71273e047593cf0a7241caa1e</sum></package><package arch="x86_64" name="389-ds-base" release="65.el6_7" src="389-ds-base-1.2.11.15-65.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-65.el6_7.x86_64.rpm</filename><sum type="sha256">5f4e2d37d99e3593f09ebd6a129e6e7a0699f054505e3a9ff48ec691262805da</sum></package><package arch="i686" name="389-ds-base-libs" release="65.el6_7" src="389-ds-base-1.2.11.15-65.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-65.el6_7.i686.rpm</filename><sum type="sha256">cec1c32355ca840b94909fd0193339abd0f3604e02b70de7fa7a3f6e4d2d997c</sum></package><package arch="i686" name="389-ds-base-devel" release="65.el6_7" src="389-ds-base-1.2.11.15-65.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-65.el6_7.i686.rpm</filename><sum type="sha256">b760ba9b588a226231e81f45ad1a95a062f1e8840ad1336e6d5c0bb3642df85e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1998" id="RHBA-2015:1998-1" title="Rhba-2015:1998-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265972" id="1265972" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268204" id="1268204" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268772" id="1268772" title="Ns-Slapd Crash Double Free In Pagedresults_Cleanup" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:1999-1</id><title>Ipmitool Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the ipmitool depended unconditionally on the OpenIPMI package which is not necessary for the correct functionality of impitool. With this update the redundant dependency on OpenIMPI has been removed.

After installing this update, the IPMI event daemon (ipmievd) will be restarted automatically.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="ipmitool" release="29.el6_7" src="ipmitool-1.8.11-29.el6_7.src.rpm" version="1.8.11"><filename>ipmitool-1.8.11-29.el6_7.x86_64.rpm</filename><sum type="sha256">cf25055daf2554ec94a955ca9d04a784e16a2d208e868fa0d727673c28fa3cda</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:1999" id="RHBA-2015:1999-1" title="Rhba-2015:1999-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269875" id="1269875" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2000-1</id><title>Libvirt Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the cgroup memory node limits were applied to allocations in a KVM. As a consequence, the KVM module could not allocate memory from the Direct Memory Access (DMA) zones unless the nodes were included in the limits set by the libvirt library, which led to a Quick Emulator (QEMU) process failure. With this update, the cgroup limits are applied after the KVM allocates the memory, and the QEMU process now starts as expected.

* Due to a change in the method libvirt used to get and set interface MAC addresses, attempts to assign Cisco Virtual Machine Fabric Extender (VM- FEX) interfaces to a virtual machine (VM) using 802.11Qbh MacVTap mode failed. This change has been reverted, and Cisco VM-FEX interfaces can once again be assigned to VMs.

After installing the updated packages, libvirtd will be restarted automatically.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="libvirt-devel" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-54.el6_7.2.i686.rpm</filename><sum type="sha256">30159464f56555fe9ff5968b606b8252e3b1c0bdde9cbc7e77007063ca580f67</sum></package><package arch="x86_64" name="libvirt-devel" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-54.el6_7.2.x86_64.rpm</filename><sum type="sha256">4f979d0e31d96ef4f5a7420fce4a903ad8c4b196dcb1bd37957ef52cae9887c2</sum></package><package arch="x86_64" name="libvirt" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-54.el6_7.2.x86_64.rpm</filename><sum type="sha256">90821577b0e4274eacde0d9d173e50a0eb92bd41cf602abab8dd99279beff81f</sum></package><package arch="i686" name="libvirt-client" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-54.el6_7.2.i686.rpm</filename><sum type="sha256">7ee43e33a62e9728733a2e02b9ec2240b9f2fcd39f31b753ab078cda215f6a2d</sum></package><package arch="x86_64" name="libvirt-client" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-54.el6_7.2.x86_64.rpm</filename><sum type="sha256">917fc1b9fde2dadc78dc50c31f64704d0257b84c82a0dfdbaacaf16bfafbe370</sum></package><package arch="x86_64" name="libvirt-python" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-54.el6_7.2.x86_64.rpm</filename><sum type="sha256">2852398fe0f1f7f33456972dfb04c790a93bc9f92d167470a620adcfc82f0e86</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="54.el6_7.2" src="libvirt-0.10.2-54.el6_7.2.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-54.el6_7.2.x86_64.rpm</filename><sum type="sha256">c66664230ae31b551d7e50c7c7ec19b2076d696eddc1a70f5d97577ed4cec07c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2000" id="RHBA-2015:2000-1" title="Rhba-2015:2000-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265970" id="1265970" title="Qemu Process Can&apos;T Start If Memory Nodeset Excludes Numa Node 0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266039" id="1266039" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2002-1</id><title>Tmpwatch Bug Fix Update</title><description>* Some files necessary for the operation of the SAP HANA database manager do not have their access times modified during normal operations. Previously, the tmpwatch utility removed such files after 10 days, which caused SAP HANA to fail. This update excludes these files from the tmpwatch check, and thus allow SAP HANA to work uninterrupted for longer periods.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="tmpwatch" release="5.el6_7" src="tmpwatch-2.9.16-5.el6_7.src.rpm" version="2.9.16"><filename>tmpwatch-2.9.16-5.el6_7.x86_64.rpm</filename><sum type="sha256">a789f0eb142c7e640ead0419e4ba19c07cdd94d626321735bc1c1468aef64b88</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2002" id="RHBA-2015:2002-1" title="Rhba-2015:2002-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271783" id="1271783" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2003-1</id><title>Gawk Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the gawk utility by default used the POSIX definition when searching for the range patterns of given regular expressions. For example, the regular expression "[A-Z]" also matched lowercase characters. However, this behavior was not intuitive and could be confusing for the users. With this update, gawk matches only uppercase characters when searching for affected regular expressions. The previous behavior can be enabled if needed by using the --posix parameter.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="gawk" release="10.el6_7.3" src="gawk-3.1.7-10.el6_7.3.src.rpm" version="3.1.7"><filename>gawk-3.1.7-10.el6_7.3.x86_64.rpm</filename><sum type="sha256">2ebe75c158ef5f54ed25f2230f5a8315ebecffa6ad6205a96b16fa0722000a0f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2003" id="RHBA-2015:2003-1" title="Rhba-2015:2003-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271701" id="1271701" title="Awk Matches Lowercase When Searching For Uppercase Range" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2004-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* Due to a typo in the source code, the "WOWLAN=" option in the ifcfg file was never applied, and therefore the wake-on-wlan functionality did not work. This update fixes the typo, and as a result wake-on-wlan works as expected.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="initscripts" release="1.el6_7.2" src="initscripts-9.03.49-1.el6_7.2.src.rpm" version="9.03.49"><filename>initscripts-9.03.49-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">5d0dbab0f672c22a3fc22a2db5ce2dbacff1b8af96d5c1c5de0e5b6bd3cd619f</sum></package><package arch="x86_64" name="debugmode" release="1.el6_7.2" src="initscripts-9.03.49-1.el6_7.2.src.rpm" version="9.03.49"><filename>debugmode-9.03.49-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">406b085b5af81dcbf0ec38ead2d24db75a9590be4c03b802c4727b94ac6327d3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2004" id="RHBA-2015:2004-1" title="Rhba-2015:2004-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272353" id="1272353" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2007-1</id><title>Zsh Bug Fix Update</title><description>This update fixes the following bug:

* Previously, signal handlers were enabled during the execution of the malloc() function in the implementation of the lexsave() function. If a signal was received during the execution of malloc() and its handler attempted to allocate or free memory, the zsh process ended in deadlock and became unresponsive. To  signal handlers are no longer enabled during the execution of malloc(), but are queued for processing upon the return from malloc() instead, and therefore the deadlock no longer occurs.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="zsh-html" release="4.el6_7.1" src="zsh-4.3.11-4.el6_7.1.src.rpm" version="4.3.11"><filename>zsh-html-4.3.11-4.el6_7.1.x86_64.rpm</filename><sum type="sha256">66bd2fdf9bba86b4bd01950e9e66a9caab6dd662393ad9f7ac644509ae5527a4</sum></package><package arch="x86_64" name="zsh" release="4.el6_7.1" src="zsh-4.3.11-4.el6_7.1.src.rpm" version="4.3.11"><filename>zsh-4.3.11-4.el6_7.1.x86_64.rpm</filename><sum type="sha256">2b94b0c83d5f6b0003732c9a8c3b9816c578952c3b2810d00b8feb37feba62c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2007" id="RHBA-2015:2007-1" title="Rhba-2015:2007-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273805" id="1273805" title="Malloc() Signal Leak In Lexsave()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2008-1</id><title>Fence-Agents Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the fence agent for HP Brocade switches failed to enable and disable ports. Consequently, fencing was not working correctly when requested. This bug has been fixed, and the fence agent is now able to fence nodes as expected.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="fence-agents" release="8.el6_7.2" src="fence-agents-4.0.15-8.el6_7.2.src.rpm" version="4.0.15"><filename>fence-agents-4.0.15-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">0b4d50d54acfdee30bad3241ee640fd410a94e887d50e21dab3e9fe01e1271ae</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2008" id="RHBA-2015:2008-1" title="Rhba-2015:2008-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277072" id="1277072" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2009-1</id><title>Sdl Bug Fix Update</title><description>This update fixes the following bug:

* After updating the SDL library, some programs previously failed with the following error:

symbol lookup error: /usr/lib64/libSDL-1.2.so.0: undefined symbol: _XGetRequest after updating SDL

This update adds the dynamic symbol for _XGetRequest, and the aforementioned error no longer occurs.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="SDL-devel" release="7.el6_7.1" src="SDL-1.2.14-7.el6_7.1.src.rpm" version="1.2.14"><filename>SDL-devel-1.2.14-7.el6_7.1.i686.rpm</filename><sum type="sha256">b0c3fb920e7d29f3ca4f45284725a7baa989c6a165bd81482173a8f668266bef</sum></package><package arch="i686" name="SDL" release="7.el6_7.1" src="SDL-1.2.14-7.el6_7.1.src.rpm" version="1.2.14"><filename>SDL-1.2.14-7.el6_7.1.i686.rpm</filename><sum type="sha256">5821ca0497a9bc0f1ab7129dc00cd0dcd4f23a9e374bff26031afe5e82c54c4d</sum></package><package arch="x86_64" name="SDL-static" release="7.el6_7.1" src="SDL-1.2.14-7.el6_7.1.src.rpm" version="1.2.14"><filename>SDL-static-1.2.14-7.el6_7.1.x86_64.rpm</filename><sum type="sha256">3d1855b4b151ab4a076bf3c80c0dc37006bbec380b2aa7518336bfe9b812aac2</sum></package><package arch="x86_64" name="SDL-devel" release="7.el6_7.1" src="SDL-1.2.14-7.el6_7.1.src.rpm" version="1.2.14"><filename>SDL-devel-1.2.14-7.el6_7.1.x86_64.rpm</filename><sum type="sha256">8939dbcf68bb0246ba78e6baee0c6b01aa5ea53f5470a368a0c8e1dd3a52fb99</sum></package><package arch="x86_64" name="SDL" release="7.el6_7.1" src="SDL-1.2.14-7.el6_7.1.src.rpm" version="1.2.14"><filename>SDL-1.2.14-7.el6_7.1.x86_64.rpm</filename><sum type="sha256">5551ed0e05c9acb61f56c13fd520ded04baa90f771bdfdc962ba1fb02d527854</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2009" id="RHBA-2015:2009-1" title="Rhba-2015:2009-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277636" id="1277636" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2010-1</id><title>Pacemaker Bug Fix Update</title><description>This update fixes the following bug:

* When a peer left the cluster, the Cluster Information Base (CIB) in some cases triggered a use-after-free memory issue. As a consequence, undefined behavior or segmentation faults occurred. This update fixes the bug, thus preventing the described problems.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="pacemaker-libs" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-libs-1.1.12-8.el6_7.2.i686.rpm</filename><sum type="sha256">e181c21dbe68f0ec5df813fd8303c4da834e377aaecf6de841468c533921d917</sum></package><package arch="x86_64" name="pacemaker" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">709392cc16d6fbfd003285f99dfbca6c5162666f580874f5b2b075137ccc9a9a</sum></package><package arch="x86_64" name="pacemaker-doc" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-doc-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">8245ad31b84ca3b1ecf156d9221f654c7937b717fab84f7abe8b35aa5a0b61ab</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-cluster-libs-1.1.12-8.el6_7.2.i686.rpm</filename><sum type="sha256">371c07ccd2907b7735a659eae8f190b98cc162c7554f22f67abf94c724f44173</sum></package><package arch="x86_64" name="pacemaker-libs" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-libs-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">b9898acafd3c58f4fea11bff52f43eb737aa2d53e59414c69c0549cb46582b22</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-libs-devel-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">d9afdd50046b5c06efe44b8f727860930afd69f5fe59eeb75b7d3f0386865d0c</sum></package><package arch="x86_64" name="pacemaker-cts" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-cts-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">3deb8581d56fd84bca562be175e7d02c9db63ec5816358da639d04386f092f35</sum></package><package arch="i686" name="pacemaker-libs-devel" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-libs-devel-1.1.12-8.el6_7.2.i686.rpm</filename><sum type="sha256">e069c039a9f6d82abe8b67ae597ff8bfa32b518790c8116b9ec7c75f7eae4ed1</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-cluster-libs-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">b5651a0fa225a3ead826cd658092ee927fe49eec2c2d6c12ddd8c9fecafa94a6</sum></package><package arch="x86_64" name="pacemaker-remote" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-remote-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">3d0b1150a01086f7a451dc43ad4fb9c238d8e0ec6652d4f1d0b55c5883eb3261</sum></package><package arch="x86_64" name="pacemaker-cli" release="8.el6_7.2" src="pacemaker-1.1.12-8.el6_7.2.src.rpm" version="1.1.12"><filename>pacemaker-cli-1.1.12-8.el6_7.2.x86_64.rpm</filename><sum type="sha256">6bd47394222e8c98699baa72154d694c9527108e6d7d49730247ef29a81fee22</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2010" id="RHBA-2015:2010-1" title="Rhba-2015:2010-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249474" id="1249474" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2011-1</id><title>Grep Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the "egrep" and "fgrep" shell wrappers were incorrectly displayed as "grep" and not as "egrep" and "fgrep" respectively in the output of the "ps" command. This update replaces "egrep" and "fgrep" shell wrappers by symlinks, and "egrep" and "fgrep" are now listed correctly in the "ps" output.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="grep" release="3.el6_7.1" src="grep-2.20-3.el6_7.1.src.rpm" version="2.20"><filename>grep-2.20-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">c84b6a42c2c29703f615e07fc8e5efd04bfef7cd72e72278f2556beeb6dc51ac</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2011" id="RHBA-2015:2011-1" title="Rhba-2015:2011-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263252" id="1263252" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2012-1</id><title>Postfix Bug Fix Update</title><description>This update fixes the following bug:

* Previously, Postfix did not use long integers for the message_size_limit, mailbox_size_limit, and virtual_mailbox_limit configuration parameters. Consequently, on 64-bit systems this prevented the user from setting limits higher than 2 GB. With this update, Postfix uses long integers, thus fixing this bug.

After installing this update, the postfix service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="2" name="postfix-perl-scripts" release="6.el6_7.1" src="postfix-2.6.6-6.el6_7.1.src.rpm" version="2.6.6"><filename>postfix-perl-scripts-2.6.6-6.el6_7.1.x86_64.rpm</filename><sum type="sha256">9fe17db8449ce8fd02ace4b4a58c9438d3c7b2384227e1c9ba8c039811f023f5</sum></package><package arch="x86_64" epoch="2" name="postfix" release="6.el6_7.1" src="postfix-2.6.6-6.el6_7.1.src.rpm" version="2.6.6"><filename>postfix-2.6.6-6.el6_7.1.x86_64.rpm</filename><sum type="sha256">069c7769f4961995c1d141ae1cbedaa8c5daa5c767c53544ac6931ce85bf8018</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2012" id="RHBA-2015:2012-1" title="Rhba-2015:2012-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263265" id="1263265" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2013-1</id><title>Kdebase-Workspace Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the krunner screensaver filled the "~/.xsession-errors" file with the following messages when the display did not have DPMS enabled:

Xlib: extension "DPMS" missing on display

Now, the krunner screensaver checks whether the display has DPMS support enabled, which prevents logging the messages in this situation.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kdebase-workspace-libs" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-libs-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">26136043020bb21cba259ebe2374947a65396cb32c2fc187661ea961680e9bce</sum></package><package arch="i686" name="kdebase-workspace-libs" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-libs-4.3.4-32.el6_7.i686.rpm</filename><sum type="sha256">9f9cab27a47da5f4ea6f6a449e0ddc25ad4230a5a3bf0b063abdfb591b8455b5</sum></package><package arch="i686" name="kdebase-workspace-devel" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-devel-4.3.4-32.el6_7.i686.rpm</filename><sum type="sha256">efdc78315948a4283f10c7f2c4f27384846da5eff5ec5fba7ef177fa8d09e951</sum></package><package arch="x86_64" name="ksysguardd" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>ksysguardd-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">cd7c044e8dcc359a17a506d9892a9de55156235cc2fad36735cfe964c1a07812</sum></package><package arch="x86_64" name="kdebase-workspace" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">de62fa1a46c40fd1ddfd74fb90aa08b0f4401853bbeb764d256c6a637cbffda2</sum></package><package arch="x86_64" name="kdm" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdm-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">ffdadae06f7462b1ebf18028d66704068dd0acb85d3dcb7b7e6181e6046d1d8d</sum></package><package arch="x86_64" name="kdebase-workspace-devel" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-devel-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">5fe4d9587b8f9f2f0424fbae991ade6761153679462d54b702fbf7b9e408f3ab</sum></package><package arch="x86_64" name="kdebase-workspace-akonadi" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-akonadi-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">404af5793d816413dee38c691d3cfb7d461bfa31a000b4dc8630eaee18c99610</sum></package><package arch="noarch" name="kdebase-workspace-wallpapers" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-wallpapers-4.3.4-32.el6_7.noarch.rpm</filename><sum type="sha256">efd902ae0a5561b6a3f016e5d083c840184e95a29292d08f60ce40ce9b2e9c16</sum></package><package arch="noarch" name="oxygen-cursor-themes" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>oxygen-cursor-themes-4.3.4-32.el6_7.noarch.rpm</filename><sum type="sha256">391ac83283779a4a21893474eba1fbcbc44769e780b198a6890076c132fa9887</sum></package><package arch="x86_64" name="kdebase-workspace-python-applet" release="32.el6_7" src="kdebase-workspace-4.3.4-32.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-python-applet-4.3.4-32.el6_7.x86_64.rpm</filename><sum type="sha256">1b4fa75642c1432217abf552e92d0cd5e67034769e6ad1ccf8dd3a6a713cbf92</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2013" id="RHBA-2015:2013-1" title="Rhba-2015:2013-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263559" id="1263559" title="Krunner Screensaver Fill Up Logs When Display Does Not Have Dpms Enabled" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2014-1</id><title>Zip Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the code of the zipnote utility used an incorrect variable when calling the fclose() function. This caused memory corruption and abnormal termination of the process. Consequently, zipnote failed to update the archive. An upstream fix has been applied to the zip source code, and zipnote now works as expected.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="zip" release="1.el6_7.1" src="zip-3.0-1.el6_7.1.src.rpm" version="3.0"><filename>zip-3.0-1.el6_7.1.x86_64.rpm</filename><sum type="sha256">de08453813d0d639fa12d4bcecd8eca572d3cc2b9721b44e6d4cb5511f7fa99c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2014" id="RHBA-2015:2014-1" title="Rhba-2015:2014-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263664" id="1263664" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2015-1</id><title>System-Config-Lvm Bug Fix Update</title><description>This update fixes the following bug:

* Previously, executing the system-config-lvm command more than once could lead to data corruption. With this update, only the first instance of system-config-lvm is executed, which prevents data corruption in this situation.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="system-config-lvm" release="17.el6_7.1" src="system-config-lvm-1.1.12-17.el6_7.1.src.rpm" version="1.1.12"><filename>system-config-lvm-1.1.12-17.el6_7.1.noarch.rpm</filename><sum type="sha256">e6505d0967f7b6e163ff07022a72724dad21195c4e6c20f9b3b8fcbcbe5a05ef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2015" id="RHBA-2015:2015-1" title="Rhba-2015:2015-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264357" id="1264357" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2016-1</id><title>Cronie Bug Fix Update</title><description>This update fixes the following bug:

* The temporary files created by the "crontab -" command were misdetected by the crond service, which incorrectly considered them regular cron job files. Consequently, crond performed unnecessary searches for false user names and reported user lookup failures to the system log. The cron utility is now fixed to use temporary files' names that are ignored by crond as expected, thus fixing this bug.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="cronie-noanacron" release="15.el6_7.1" src="cronie-1.4.4-15.el6_7.1.src.rpm" version="1.4.4"><filename>cronie-noanacron-1.4.4-15.el6_7.1.x86_64.rpm</filename><sum type="sha256">21a8cac3ec77342a53b73408c1017fb8f61dacf3b6f193687937c5659b471bd9</sum></package><package arch="x86_64" name="cronie-anacron" release="15.el6_7.1" src="cronie-1.4.4-15.el6_7.1.src.rpm" version="1.4.4"><filename>cronie-anacron-1.4.4-15.el6_7.1.x86_64.rpm</filename><sum type="sha256">6fbdbd1e5969f1b3db86142c7d239e9665a2489773c817626f7b9c76f0e35470</sum></package><package arch="x86_64" name="cronie" release="15.el6_7.1" src="cronie-1.4.4-15.el6_7.1.src.rpm" version="1.4.4"><filename>cronie-1.4.4-15.el6_7.1.x86_64.rpm</filename><sum type="sha256">2fed191502bd5f68e55bd33fca368fdda0022830f9aa6c5c8319bd5d5b489d27</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2016" id="RHBA-2015:2016-1" title="Rhba-2015:2016-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265162" id="1265162" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2017-1</id><title>Coreutils Bug Fix Update</title><description>This update fixes the following bugs:

* The "su" command was incorrectly evaluating exit statuses of its child processes. Consequently, when a program ran by the "su" utility was killed, an incorrect error message, "Killed (core dumped)", was reported. With this update, the message has been amended, and "su" prints the correct message, "Killed", when its child process is killed, thus fixing this bug.

* Prior to this update, the "ls" command did not use any optimization for expensive system calls getting Access Control Lists (ACL), SELinux, and extending attributes. This led to wasting of resources on file systems, where these attributes are not supported. With this update, the syscall result is now cached on file systems, and no other system calls for gathering attributes are required for the device if it lacks support for the specific feature.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="coreutils-libs" release="37.el6_7.3" src="coreutils-8.4-37.el6_7.3.src.rpm" version="8.4"><filename>coreutils-libs-8.4-37.el6_7.3.x86_64.rpm</filename><sum type="sha256">12a33ed23a571edb994bf8a4c769f8ba36e18d6a9308d1d64d87016f0b0b4187</sum></package><package arch="x86_64" name="coreutils" release="37.el6_7.3" src="coreutils-8.4-37.el6_7.3.src.rpm" version="8.4"><filename>coreutils-8.4-37.el6_7.3.x86_64.rpm</filename><sum type="sha256">993107049ce50bc130186417b8e8498cbf3a21493343346d888e1470416d26ae</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2017" id="RHBA-2015:2017-1" title="Rhba-2015:2017-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266380" id="1266380" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273823" id="1273823" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2018-1</id><title>Perl Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when uploading a file with the Net::FTP Perl module in text mode, the line endings in the uploaded file were garbled. An upstream fix that corrects end-of-line normalization from local to network virtual terminal encoding when uploading data to an FTP server has been applied. Now, line endings in files uploaded with the Net::FTP Perl module in text mode are preserved.</description><release>Scientific Linux</release><issued date="2015-11-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="perl-Params-Check" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.26"><filename>perl-Params-Check-0.26-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">abb6af69c75358db09f238d27a5b479875349d15e4ac201e91db0502ec4bbacc</sum></package><package arch="x86_64" epoch="4" name="perl-libs" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-libs-5.10.1-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">0478737ae1b53db2f27494c105497f02d4113f08476dce58b289a93b4f714986</sum></package><package arch="x86_64" name="perl-ExtUtils-Embed" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.28"><filename>perl-ExtUtils-Embed-1.28-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">4b0c512c1db93ab0ff4472fd14677b3e432b893ad9c5edf9e49902b0ff630e12</sum></package><package arch="x86_64" epoch="1" name="perl-Module-Loaded" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.02"><filename>perl-Module-Loaded-0.02-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">8caa9cb6cf898f185e93fd81139b07de9a3808d3a985a434a82f179f8d6e0c72</sum></package><package arch="x86_64" epoch="1" name="perl-Pod-Escapes" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.04"><filename>perl-Pod-Escapes-1.04-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">65aed96ad68cc0069806f90a8ed9027dd0c2897135b39b99eb5c8b178fb51086</sum></package><package arch="x86_64" name="perl-Module-Load-Conditional" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.30"><filename>perl-Module-Load-Conditional-0.30-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">491ae657698de462caa79f93baa696a2d9c557a0b0c5d5d6fa37e7899cbc0d36</sum></package><package arch="x86_64" epoch="1" name="perl-Digest-SHA" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.47"><filename>perl-Digest-SHA-5.47-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">c5b82eb22a177782c3ca93f132659b8bb64d7e79f895b9e5d1c6fb408a99db6f</sum></package><package arch="x86_64" epoch="1" name="perl-IPC-Cmd" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.56"><filename>perl-IPC-Cmd-0.56-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">e284cd363acbe026f2f469fc16cbfdd7d627d2dc575db23df3e49587b0ec048e</sum></package><package arch="x86_64" epoch="1" name="perl-Module-Load" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.16"><filename>perl-Module-Load-0.16-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">3b57055cde3465b20b5fc91b6449fa75944abe8a72e3e9d02a66809e5757d725</sum></package><package arch="x86_64" epoch="1" name="perl-ExtUtils-ParseXS" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.2003.0"><filename>perl-ExtUtils-ParseXS-2.2003.0-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">eaecf93368db9bbf3343845332b81c27d54b76197eefa3349104973185c75ea5</sum></package><package arch="x86_64" epoch="1" name="perl-Compress-Raw-Zlib" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.021"><filename>perl-Compress-Raw-Zlib-2.021-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">0ead3cb45389804b348c3f353af0001c17ad75acac71d17ed06896a624eb6d13</sum></package><package arch="x86_64" epoch="1" name="perl-parent" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.221"><filename>perl-parent-0.221-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">7b23752b1a21cd5158ecf6d05de677e1755e8c9cb2e336a974925c860a4ff527</sum></package><package arch="i686" epoch="4" name="perl-devel" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-devel-5.10.1-141.el6_7.1.i686.rpm</filename><sum type="sha256">82ec87fd2d14d65306739c7d39e181ce7233061614f868be4bc018f294b9968e</sum></package><package arch="x86_64" name="perl-Compress-Zlib" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.021"><filename>perl-Compress-Zlib-2.021-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">0f59825cfb61545960a7fb2cc8ae899b32ef91c3645dab24127f1a93fe9ede57</sum></package><package arch="x86_64" epoch="1" name="perl-Parse-CPAN-Meta" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.40"><filename>perl-Parse-CPAN-Meta-1.40-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">680fab55823fd86ad8fd63c91975454ad09e418f50e2acfba2f90a6154cb3494</sum></package><package arch="x86_64" name="perl-Term-UI" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.20"><filename>perl-Term-UI-0.20-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">393d7ccd69e7c305a20aecc0323034c3407e0139a1e586c7ccab8799d470973b</sum></package><package arch="x86_64" epoch="1" name="perl-IO-Zlib" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.09"><filename>perl-IO-Zlib-1.09-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">5ed926198fcd91297613e7c42b4b1aca10d9429070e3fac1bba7f0f5499e2ada</sum></package><package arch="x86_64" epoch="1" name="perl-Package-Constants" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.02"><filename>perl-Package-Constants-0.02-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">ec9c8ea4f941c9fea96352b40dfc658a57d8dae7a94d6c9e873ffea42044f538</sum></package><package arch="x86_64" epoch="1" name="perl-Module-Build" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.3500"><filename>perl-Module-Build-0.3500-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">938adfdedcc1740bf50a5703ed17f802c15b38e0f2d1f09a95109eea69bcd18b</sum></package><package arch="x86_64" epoch="1" name="perl-Archive-Extract" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.38"><filename>perl-Archive-Extract-0.38-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">016cb02c3edb774f0d7c6bf2b26603262dd876693411f5d0fb27f71e39d8f21b</sum></package><package arch="x86_64" epoch="1" name="perl-Module-Pluggable" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="3.90"><filename>perl-Module-Pluggable-3.90-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">dd58cd9dc8c1edac8195fd9ded3669ef720ad5f2d677dc6d4e04eb4d202e21b3</sum></package><package arch="x86_64" name="perl-IO-Compress-Zlib" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.021"><filename>perl-IO-Compress-Zlib-2.021-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">9cde8f29a6eefd5e8a749b3417c9da8214050bbc9bc02d855efc8ba1a79a2b10</sum></package><package arch="x86_64" name="perl-Module-CoreList" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.18"><filename>perl-Module-CoreList-2.18-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">fb31195b19ec5392b7239944cd64f8dcebc3c36640fb7c43dd73c1559475298e</sum></package><package arch="x86_64" name="perl-Archive-Tar" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.58"><filename>perl-Archive-Tar-1.58-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">34d04f0e9b9f9dc9dc7623392bec5ca90eca3fe1f9f28d00b23b73b056b90d1e</sum></package><package arch="x86_64" epoch="1" name="perl-Log-Message" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.02"><filename>perl-Log-Message-0.02-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">3f0fc3861c0c162a57c93793807adaef40cf0266612e0a1bf35dd8e2ae917a18</sum></package><package arch="x86_64" name="perl-Test-Simple" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.92"><filename>perl-Test-Simple-0.92-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">faac3140168a4b6a7fbb094b2363ce9d78f698e601cae6f87846a2e8e5742193</sum></package><package arch="x86_64" name="perl-core" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-core-5.10.1-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">ebb127c97dc38ee551dfe022556d6f84f317629fa954ee4047d2269b774dd09f</sum></package><package arch="x86_64" epoch="1" name="perl-Object-Accessor" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.34"><filename>perl-Object-Accessor-0.34-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">85b6e61cf549d95d3f859635f8eea3dee6dd16b776194f43d72247b5260dbb08</sum></package><package arch="x86_64" epoch="1" name="perl-Pod-Simple" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="3.13"><filename>perl-Pod-Simple-3.13-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">949619afe1d7beded3cdcea5dfde6f98192b0c8c3e0fcb6927a36dced7921737</sum></package><package arch="i686" epoch="4" name="perl-libs" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-libs-5.10.1-141.el6_7.1.i686.rpm</filename><sum type="sha256">126b89a9a78e97b3ac582f88ae713a6a215456fa4789e1b52aec3deabdef14de</sum></package><package arch="x86_64" epoch="1" name="perl-ExtUtils-CBuilder" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.27"><filename>perl-ExtUtils-CBuilder-0.27-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">747808a07377dd991432afb0cf6c250af472bbdcfb7494f4f4f3f99f1f9ebac2</sum></package><package arch="x86_64" name="perl-ExtUtils-MakeMaker" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="6.55"><filename>perl-ExtUtils-MakeMaker-6.55-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">5f5ae7fe7f3ca346551341798c56965210426ad10e5df297274a1f05f96285b5</sum></package><package arch="x86_64" name="perl-CPANPLUS" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.88"><filename>perl-CPANPLUS-0.88-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">6ca58240936f8f0bbd92c3cfdcbc7b8fc768f45e7e07da1e50ba99267424b8a5</sum></package><package arch="x86_64" epoch="4" name="perl-Time-HiRes" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.9721"><filename>perl-Time-HiRes-1.9721-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">a813e71d6749215d9609ced68fb0eca3da9d8fcb01ba5d8ff721a7afcfd1f46f</sum></package><package arch="x86_64" name="perl-File-Fetch" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.26"><filename>perl-File-Fetch-0.26-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">49f810720495a297a4bdb18175f56745f9c6336915991577cf1598000c5e9755</sum></package><package arch="x86_64" epoch="4" name="perl" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-5.10.1-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">e787d20017015ad8371134750c0648b009c95f67f09f72f2e36f5f238f176acc</sum></package><package arch="x86_64" name="perl-IO-Compress-Bzip2" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.021"><filename>perl-IO-Compress-Bzip2-2.021-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">6a3381c1fadccd08873014a122f9527874a47ccd6ca68e5f406fb3ec65691d8c</sum></package><package arch="x86_64" name="perl-Compress-Raw-Bzip2" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.021"><filename>perl-Compress-Raw-Bzip2-2.021-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">3ea92d751fb02681af831980dc108dbc7a05a904f07fb3d3d6d59fd20d3b35cb</sum></package><package arch="x86_64" epoch="4" name="perl-devel" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-devel-5.10.1-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">71547af71d730bb28d493f7941d810cdc1f8373e7b3222be6062bb218cefa6f8</sum></package><package arch="x86_64" name="perl-CGI" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="3.51"><filename>perl-CGI-3.51-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">e41b459a6fa7acb2820eeeb62b3498249f461b16ac81e110fada561466a9be64</sum></package><package arch="x86_64" epoch="1" name="perl-Locale-Maketext-Simple" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.18"><filename>perl-Locale-Maketext-Simple-0.18-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">afdccbd6b30f0a7648de90631657b1444a48c62c257506414c67a520ca67da76</sum></package><package arch="x86_64" epoch="4" name="perl-suidperl" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="5.10.1"><filename>perl-suidperl-5.10.1-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">6ee6e482056a490babe7c35739176f43745cc28016f5ba8139c218ec6dafe473</sum></package><package arch="x86_64" name="perl-Test-Harness" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="3.17"><filename>perl-Test-Harness-3.17-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">fea6534fabbadd1be2decc969d103efc4d03b1d38f3da61745fa1d62508507fd</sum></package><package arch="x86_64" name="perl-Time-Piece" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.15"><filename>perl-Time-Piece-1.15-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">6b8b16afae6a293fe5de06e23ba13766ed4af53230a73ce9c6956df3b7fb1a5a</sum></package><package arch="x86_64" name="perl-Log-Message-Simple" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.04"><filename>perl-Log-Message-Simple-0.04-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">6eeec4b52934d5a29e4c5ed8480de2946cc7d36b46ed6c46a28d199d77a1d9fc</sum></package><package arch="x86_64" epoch="3" name="perl-version" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="0.77"><filename>perl-version-0.77-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">f55b13883fd58a80989a2c8f8c5ad80b30abbe80de97899d3d4ad1843f073944</sum></package><package arch="x86_64" name="perl-IO-Compress-Base" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="2.021"><filename>perl-IO-Compress-Base-2.021-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">7a27a7e1bb1b086b8cf95e0f2a9b55c96585a852167dee5136648c1a41ec9ca1</sum></package><package arch="x86_64" name="perl-CPAN" release="141.el6_7.1" src="perl-5.10.1-141.el6_7.1.src.rpm" version="1.9402"><filename>perl-CPAN-1.9402-141.el6_7.1.x86_64.rpm</filename><sum type="sha256">f63846c6b1f484f3ffb7c55f5928336682bdb86bb3e247b10011790c85a67ba2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2018" id="RHBA-2015:2018-1" title="Rhba-2015:2018-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267920" id="1267920" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2510-1</id><title>Environment-Modules Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the helper scripts shipped with environment-modules incorrectly handled environmental variables that were prefixed or suffixed with a delimiter other than the colon character. Consequently, generated modules contained environment variables with incorrect values. This update enhances the logic of the helper scripts, and modules are now generated with the correct environment variables.</description><release>Scientific Linux</release><issued date="2015-11-24 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="environment-modules" release="3.el6" src="environment-modules-3.2.10-3.el6.src.rpm" version="3.2.10"><filename>environment-modules-3.2.10-3.el6.x86_64.rpm</filename><sum type="sha256">cec6d22b7b264f5929b690c685859227701bb3a8e0fae9af95326e27c03f4615</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2510" id="RHBA-2015:2510-1" title="Rhba-2015:2510-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180139" id="1180139" title="Createmodule Scripts Incorrectly Handles Env Vars Prefixed/Suffixed Without Colon" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2511-1</id><title>Passwd Bug Fix Update</title><description>This update fixes the following bug:

* When updating a password using the "passwd --stdin" command, the command accepted only 79 characters and then silently ignored the rest of the input. Consequently, the command did not update the password correctly, and subsequent authentication attempts using such incorrectly updated password failed. With this update, "passwd --stdin" accepts passwords up to 511 characters and does not silently truncate longer input. Instead, the command now refuses passwords longer than 511 characters, and displays a message to inform the user that the supplied password exceeds the limit.</description><release>Scientific Linux</release><issued date="2015-11-24 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="passwd" release="7.el6" src="passwd-0.77-7.el6.src.rpm" version="0.77"><filename>passwd-0.77-7.el6.x86_64.rpm</filename><sum type="sha256">deabd7d2c29b922a08d2b90e0a805274825a715821301060bceec93fce6272ea</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2511" id="RHBA-2015:2511-1" title="Rhba-2015:2511-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1187105" id="1187105" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2629-1</id><title>Rsyslog7 Bug Fix Update</title><description>This update fixes the following bug:

* Previously, a bug in the code that handled the creation of directory structures could in rare situations prevent directories from being created. If a path to a log file was created dynamically, and multiple concurrent writes attempted to create such a path, an error that prevented the path and the log file from being created could occur. The source code has been patched to account for such scenarios, and concurrent directory creation now works as expected.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="rsyslog7-gnutls" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-gnutls-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">453648b2fd92c6058d90b9a7b5c6052285297519c80f91d2dcf19a3cd1944bf0</sum></package><package arch="x86_64" name="rsyslog7-pgsql" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-pgsql-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">b4689cce0f6865412482c23589bf41009790ffce7714c9d3b44b2734b5447475</sum></package><package arch="x86_64" name="rsyslog7-elasticsearch" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-elasticsearch-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">36ff563fd1ea4c54723420633b13e6c08862990409ad802d5df733304bfb361a</sum></package><package arch="x86_64" name="rsyslog7-mysql" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-mysql-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">eb3d34e7e8d820db7d8256559165e4ac9331d21f0a63c2d194b66550d9934047</sum></package><package arch="x86_64" name="rsyslog7-snmp" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-snmp-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">5cba0315c4c126f958958b90ab018ebfe50b1441611ff6613833c6c10550ada6</sum></package><package arch="x86_64" name="rsyslog7" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">8ea9585c4ed0c3b3319ac599c6dc9d7d095a92e0ee308f4cc1f84658148ddb4b</sum></package><package arch="x86_64" name="rsyslog7-gssapi" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-gssapi-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">d36e85c42b01b6c8b5add705e31dcfb9c39fdc4b11e77eafcb076cd08289cec4</sum></package><package arch="x86_64" name="rsyslog7-relp" release="3.el6_7.1" src="rsyslog7-7.4.10-3.el6_7.1.src.rpm" version="7.4.10"><filename>rsyslog7-relp-7.4.10-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">2760c8d0fd1a4d32b38d304ce1640a96a979bee3983eb258fd24c81ad37e1b46</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2629" id="RHBA-2015:2629-1" title="Rhba-2015:2629-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285790" id="1285790" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2631-1</id><title>Crash Bug Fix Update</title><description>This update fixes the following bug:

* Due to a bug, the crash utility failed to correctly read some firmware memory in sadump vmcore formats. With this update, the crash utility always succeeds in reading memory and obtains correct data in sadump vmcore formats.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="crash" release="3.el6_7" src="crash-7.1.0-3.el6_7.src.rpm" version="7.1.0"><filename>crash-7.1.0-3.el6_7.x86_64.rpm</filename><sum type="sha256">fae2a51388760be140a0f1881b6060a0affc96cd6505bfb904c36ac52cc35488</sum></package><package arch="i686" name="crash-devel" release="3.el6_7" src="crash-7.1.0-3.el6_7.src.rpm" version="7.1.0"><filename>crash-devel-7.1.0-3.el6_7.i686.rpm</filename><sum type="sha256">7f077600610e23df44afef59b47c7bd4ab63164474ce90071f3cb48b28740e7b</sum></package><package arch="x86_64" name="crash-devel" release="3.el6_7" src="crash-7.1.0-3.el6_7.src.rpm" version="7.1.0"><filename>crash-devel-7.1.0-3.el6_7.x86_64.rpm</filename><sum type="sha256">2c4dea0f88ee2243176bf85fea69c5239a10eb6630a6d868ca9104c62782bd0f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2631" id="RHBA-2015:2631-1" title="Rhba-2015:2631-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1284762" id="1284762" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2632-1</id><title>Pcs Bug Fix Update</title><description>The pcs packages provide a command-line tool to configure and manage the Pacemaker and Corosync tools.

This update fixes the following bug:

* When the user opened the Cluster Properties page in the GUI, the values were not displayed. This update fixes the way the Cluster Properties' values are read from a cluster, and Cluster Properties values are thus displayed in the described situation.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="pcs" release="9.el6_7.2" src="pcs-0.9.139-9.el6_7.2.src.rpm" version="0.9.139"><filename>pcs-0.9.139-9.el6_7.2.x86_64.rpm</filename><sum type="sha256">452b55b6935cee950d0485ff890cbe0ce5887e561ec84ca4772e63da47c0b4c8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2632" id="RHBA-2015:2632-1" title="Rhba-2015:2632-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283239" id="1283239" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2633-1</id><title>Libvirt Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, the libvirt library was logging the "VIR_ERR_NO_DOMAIN_METADATA" error code with "error" priority rather than the "debug" priority usual for this kind of message. As a consequence, if the metadata APIs were used heavily with potentially missing metadata entries, the system log was flooded with irrelevant messages. With this update, severity of the code has been lowered to "debug", thus fixing this bug.

After installing the updated packages, libvirtd will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="libvirt-lock-sanlock" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-54.el6_7.3.x86_64.rpm</filename><sum type="sha256">60e06f583642f9d3465c9b153a7480448a2744308868855ad14a5010402cd901</sum></package><package arch="i686" name="libvirt-client" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-54.el6_7.3.i686.rpm</filename><sum type="sha256">3eaaa610025de248b6acda045bc6431d20e918e3f0bbd60c15117e94cb51e4a6</sum></package><package arch="x86_64" name="libvirt-python" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-54.el6_7.3.x86_64.rpm</filename><sum type="sha256">7e6cec657dcf07a41a918e781b187ecbf1013d4f1a5bf6b3e796d28cd0e7dc5c</sum></package><package arch="x86_64" name="libvirt-client" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-54.el6_7.3.x86_64.rpm</filename><sum type="sha256">de0dd6b72ad56d29f7b030c275b44baedd80e7cad5c7eb3931769b3a70866fd1</sum></package><package arch="x86_64" name="libvirt-devel" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-54.el6_7.3.x86_64.rpm</filename><sum type="sha256">40eb564c75e4296843279b65794d7eb7e45e42a5bc05807c15df27c185b68695</sum></package><package arch="x86_64" name="libvirt" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-54.el6_7.3.x86_64.rpm</filename><sum type="sha256">7e49bb853f84b0077c36601006fed96543199663154f10cd1fed0ed7f9dcda60</sum></package><package arch="i686" name="libvirt-devel" release="54.el6_7.3" src="libvirt-0.10.2-54.el6_7.3.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-54.el6_7.3.i686.rpm</filename><sum type="sha256">4ebc2db5bafc06f095d411b7e8b3c3ebd320f97636b132a569ed00153be38372</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2633" id="RHBA-2015:2633-1" title="Rhba-2015:2633-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277235" id="1277235" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2634-1</id><title>Ipa Bug Fix Update</title><description>This update fixes the following bugs:

* Identity Management (IdM) clients that are views-enabled are unconditionally looking for a views-related attribute. If the attribute was not available, earlier versions of IdM returned a different error code than later versions, which was not handled as expected on the client side. Consequently, Active Directory (AD) user's group membership resolution failed, as the lookup request failed after not being able to dereference the view name. To  if the LDAP_UNAVAILABLE_CRITICAL_EXTENSION(12) or LDAP_PROTOCOL_ERROR(2) error is returned, the error is ignored and the client assumes the server is not views-aware. As a result, AD user's group membership resolution no longer fails when a Scientific Linux 7 client is enrolled to a Scientific Linux 6 server.

* Previously, the Network Security Services (NSS) library was not successfully shut down because several certificate objects that were created by using the NSS library were not properly dereferenced. A subsequent initialization of the NSS library in another part of the installer previously failed because the library was not cleaned. As a consequence, the user was prevented from installing an IdM server with a CA certificate signed by an external authority. A patch has been backported to  and the installation of an IdM server with a CA certificate signed by an external authority no longer fails.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="ipa-server-trust-ad" release="47.el6_7.1" src="ipa-3.0.0-47.el6_7.1.src.rpm" version="3.0.0"><filename>ipa-server-trust-ad-3.0.0-47.el6_7.1.x86_64.rpm</filename><sum type="sha256">de64c0b91a643dd5dbbc456fbd2b323a539d3bf89f9255fd562bc4fc061ac74b</sum></package><package arch="x86_64" name="ipa-server" release="47.el6_7.1" src="ipa-3.0.0-47.el6_7.1.src.rpm" version="3.0.0"><filename>ipa-server-3.0.0-47.el6_7.1.x86_64.rpm</filename><sum type="sha256">0f1511fb8a32eeb41b98195d4e22efd3bc2608eec8312e760b0eb5b698618b5c</sum></package><package arch="x86_64" name="ipa-admintools" release="47.el6_7.1" src="ipa-3.0.0-47.el6_7.1.src.rpm" version="3.0.0"><filename>ipa-admintools-3.0.0-47.el6_7.1.x86_64.rpm</filename><sum type="sha256">15dd2ed05f16fec73f68434fc4bdb2d18ddae157259ede1e8dbd47a6d0cd538e</sum></package><package arch="x86_64" name="ipa-client" release="47.el6_7.1" src="ipa-3.0.0-47.el6_7.1.src.rpm" version="3.0.0"><filename>ipa-client-3.0.0-47.el6_7.1.x86_64.rpm</filename><sum type="sha256">3736c61140683520bf9cd7aebcc2fe335edd4552e33848ba8453c3cfba6fe5eb</sum></package><package arch="x86_64" name="ipa-python" release="47.el6_7.1" src="ipa-3.0.0-47.el6_7.1.src.rpm" version="3.0.0"><filename>ipa-python-3.0.0-47.el6_7.1.x86_64.rpm</filename><sum type="sha256">0c246bc09a604f543dced32e7aa3b585b85362148bf5694300986807073c2d6b</sum></package><package arch="x86_64" name="ipa-server-selinux" release="47.el6_7.1" src="ipa-3.0.0-47.el6_7.1.src.rpm" version="3.0.0"><filename>ipa-server-selinux-3.0.0-47.el6_7.1.x86_64.rpm</filename><sum type="sha256">dbf4a3f395ba693aa1d1d3cc17807b7cc19cfa13080f31523c8be3eefab1d18c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2634" id="RHBA-2015:2634-1" title="Rhba-2015:2634-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280207" id="1280207" title="Unable To Resolve Group Memberships For Ad Users When Using Sssd-1.12.2-58.El7_1.6.X86_64 Client In Combination With Ipa-Server-3.0.0-42.El6.X86_64 With Ad Trust" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280208" id="1280208" title="Ipa-Server-Install With Externally Signed Ca Fails With Nss Error (Sec_Error_Busy)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2635-1</id><title>Lvm2 Bug Fix Update</title><description>This update fixes the following bug:

* Due to a deadlock caused by improper locking into memory for the lvremove utility, taking a snapshot of the logical volume (LV) containing the root file system previously caused several Scientific Linux 6.7 systems and applications to become unresponsive when using lvremove to remove the snapshot. This update fixes the deadlock, and taking a snapshot of the LV containing the root file system now proceeds successfully.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="device-mapper-libs" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">9c7ec8f7438c98ac349d80e3bffd7b3a138dfb819ff2ee2c3f4370c16b42211c</sum></package><package arch="i686" name="device-mapper-devel" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.4.i686.rpm</filename><sum type="sha256">bc7b40b59137a5fc35f2f9010504f3e42bed3eec7f59e4c8dd8f855d3bdbcf85</sum></package><package arch="x86_64" name="cmirror" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>cmirror-2.02.118-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">ed8c41339beaa4cd2c65dda0043fa260bf2217841c95b472d07b82165d8e8390</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">4ae47941889b6088ea1415fc1a0389042a5bc916114e746ea9a057354b213610</sum></package><package arch="i686" name="lvm2-devel" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.4.i686.rpm</filename><sum type="sha256">fd00798703aa9894a7a3296a7498644ebf460d8710aa1d7f318bcd048d2f23a0</sum></package><package arch="i686" name="device-mapper-event-devel" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-event-devel-1.02.95-3.el6_7.4.i686.rpm</filename><sum type="sha256">4d6aea45653e76134e8f33cbb8e1138ec2460c9ddd790d1205641b3962e02d04</sum></package><package arch="x86_64" name="lvm2-devel" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>lvm2-devel-2.02.118-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">0a7b285beaa71b9978e01b84dba1b8017cbc484ac2e5b42d435604583bb24e1e</sum></package><package arch="i686" name="device-mapper-event-libs" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.4.i686.rpm</filename><sum type="sha256">c2c364b709d3faf3731f4084b669d511934d072a7f0dc6eef0e78dd12f313fc7</sum></package><package arch="x86_64" name="device-mapper" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-1.02.95-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">247fc581e3c19417bfa1e9592927efb0638757ea7e59de2a121d2ead8f18ac50</sum></package><package arch="x86_64" name="device-mapper-event" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-event-1.02.95-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">cbbe084027acd73e904f71a68d1d26a4c2834b366d19febb4ba0b699c14cf5a2</sum></package><package arch="x86_64" name="lvm2-libs" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">c8eec42d7b4c30ab55f170403822b4b07b9a191d7fbb2e747e041b7e5e471977</sum></package><package arch="x86_64" name="lvm2" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>lvm2-2.02.118-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">3093f01b944b0e6d4d6bad5ddb67213832aa81be44c970871673ddd18c8f0073</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-event-libs-1.02.95-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">64067a3dbc39963f06c104ea71b8a1dcea0e56d2a8f88cec8318581a4c356155</sum></package><package arch="x86_64" name="device-mapper-devel" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-devel-1.02.95-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">dea5d32eed51c50448df90518bbb4fe162827fd19fe4d34210c49032140dfb46</sum></package><package arch="x86_64" name="lvm2-cluster" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>lvm2-cluster-2.02.118-3.el6_7.4.x86_64.rpm</filename><sum type="sha256">2b7a2b546be1817d3095655017ecfe7c7892ac95a3bcd1afae2fedc05e899c1b</sum></package><package arch="i686" name="device-mapper-libs" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="1.02.95"><filename>device-mapper-libs-1.02.95-3.el6_7.4.i686.rpm</filename><sum type="sha256">75af1e21c170d0a62f90aa3fe3e7d450ca48b46565709e7b3f5b1033a829da0a</sum></package><package arch="i686" name="lvm2-libs" release="3.el6_7.4" src="lvm2-2.02.118-3.el6_7.4.src.rpm" version="2.02.118"><filename>lvm2-libs-2.02.118-3.el6_7.4.i686.rpm</filename><sum type="sha256">05c1b3a84c3545e7e7e8fe16297b3b04853b5fee9776d0ed44926e274366fc0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2635" id="RHBA-2015:2635-1" title="Rhba-2015:2635-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279983" id="1279983" title="Deadlock When Removing Snapshot Of Root Lv From Lvremove Failing To Mlock() Itself Into Memory" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2638-1</id><title>Logrotate Bug Fix Update</title><description>This update fixes the following bug:

* Because of an unneeded check in logrotate's code, logrotate was not able, when using the "olddir" directive, to rotate the log files that pointed to a directory located on a different physical file system than the one storing the original log file. The check in logrotate's code has been fixed, and logs are now rotated in the mentioned case when the "copytruncate" or "copy" directives are used together with the "olddir" directive.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="logrotate" release="26.el6_7" src="logrotate-3.7.8-26.el6_7.src.rpm" version="3.7.8"><filename>logrotate-3.7.8-26.el6_7.x86_64.rpm</filename><sum type="sha256">54fb78a759e39015f940bde45ab147502286a94807804e08be8a65b94a4bb9f5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2638" id="RHBA-2015:2638-1" title="Rhba-2015:2638-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279392" id="1279392" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2639-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* Previously, if IP address 127.x.x.x was present in the ethX interface after running the "ifdown ethX" command, this IP address was not removed from ethX. This update makes sure "ifdown" removes such an address, thus fixing this bug.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="debugmode" release="1.el6_7.3" src="initscripts-9.03.49-1.el6_7.3.src.rpm" version="9.03.49"><filename>debugmode-9.03.49-1.el6_7.3.x86_64.rpm</filename><sum type="sha256">d6156928168fed3b4348802ed6cefe4239fbac89b807a9962bd47685a8935146</sum></package><package arch="x86_64" name="initscripts" release="1.el6_7.3" src="initscripts-9.03.49-1.el6_7.3.src.rpm" version="9.03.49"><filename>initscripts-9.03.49-1.el6_7.3.x86_64.rpm</filename><sum type="sha256">82beea25780150bd6b2ce1652ba97b7f2e719912b55dc320dd538290ba43ed77</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2639" id="RHBA-2015:2639-1" title="Rhba-2015:2639-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279935" id="1279935" title="Ip Address 127.X.X.X Is Not Removed From Ethx Interface During &apos;Ifdown Ethx&apos;" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2640-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* When multiple replica update vector (RUV) updates were skipped in fractional replication, RUV was not updated at the end of the session. The next session then restarted evaluating the same skipped updates. To fix the problem, a system subentry has been added, which is occasionally updated even when no applicable changes can be replicated at the time of the update. This prevents the unnecessary replays.

* Previously, Directory Server did not correctly handle requesting searches for simple paged results asynchronously in a persistent connection. As a consequence, if one of the requests was abandoned, the ns-slapd service sometimes terminated unexpectedly. A patch has been applied to fix the problem, and ns-slapd no longer crashes in the described situation.

* Directory Server previously did not properly handle the freeing of search result objects. A delay occurred between freeing an object and providing the freed information to the paged results handle. If the handle was released because of a timeout during the delay, a double free error occurred, which caused the ns-slapd service to terminate unexpectedly. This update eliminates the mentioned delay, thus preventing the double free error. As a result, ns-slapd no longer crashes in this situation.

* Previously, after the cleanAllRUV task finished, the change log still contained entries from the cleaned Replica ID. As a consequence, the replica update vector (RUV) could contain undesirable data, and the RUV element could be missing the replica URL. Now, cleanAllRUV cleans the change log completely as expected.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="389-ds-base" release="68.el6_7" src="389-ds-base-1.2.11.15-68.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-68.el6_7.x86_64.rpm</filename><sum type="sha256">3422c2cdb9e33449513750d50eb375cc4470876cb8ac1a438066f5e7dedcda62</sum></package><package arch="x86_64" name="389-ds-base-devel" release="68.el6_7" src="389-ds-base-1.2.11.15-68.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-68.el6_7.x86_64.rpm</filename><sum type="sha256">6ac3fb11749f3ed7a83004ddd6e3ef463028969103615ac399ddbd184fb90266</sum></package><package arch="x86_64" name="389-ds-base-libs" release="68.el6_7" src="389-ds-base-1.2.11.15-68.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-68.el6_7.x86_64.rpm</filename><sum type="sha256">ebd8a6fef47c683fde9c3ffabdf16468072a98c427a4f4d8e99418fd9605011e</sum></package><package arch="i686" name="389-ds-base-devel" release="68.el6_7" src="389-ds-base-1.2.11.15-68.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-68.el6_7.i686.rpm</filename><sum type="sha256">0365240eddfe6428db04e18302ec6aca96d5c9c1ab16d04ceb22d1ad79ddf76b</sum></package><package arch="i686" name="389-ds-base-libs" release="68.el6_7" src="389-ds-base-1.2.11.15-68.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-68.el6_7.i686.rpm</filename><sum type="sha256">aaf69e05b11f937478ba89558533c7ff2f78c3f0452cb8d2bd843f05e5119e0c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2640" id="RHBA-2015:2640-1" title="Rhba-2015:2640-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272327" id="1272327" title="Cleanallruv Should Completely Clean Changelog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273132" id="1273132" title="Many Attrlist_Replace Errors In Connection With Cleanallruv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278696" id="1278696" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279564" id="1279564" title="Deadlock In Mep Delete Post Op" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2641-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

This led to exhaustion of free scoreboard slots on httpd reloads, and the following error message started to frequently appear in the error log:

ap_get_scoreboard_lb(53) failed in child NNNN for worker http://W.X.Y.Z/

This update fixes the mod_proxy module to use correct scoreboard slots for the inherited mod_proxy workers. As a result, after graceful restart, the proper scoreboard slots are used, and the aforementioned error message no longer appears in this scenario.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="httpd-tools" release="47.sl6.1" src="httpd-2.2.15-47.sl6.1.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-47.sl6.1.x86_64.rpm</filename><sum type="sha256">e849c7c8662d686c154cc9cbc6fa3fb49843b7d80471145c62407d13570c5bc5</sum></package><package arch="i686" name="httpd-devel" release="47.sl6.1" src="httpd-2.2.15-47.sl6.1.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.1.i686.rpm</filename><sum type="sha256">a9d185c7676267c84893f6f2f61f5774ab49c9298a5f500ab46236809aa1d130</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="47.sl6.1" src="httpd-2.2.15-47.sl6.1.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-47.sl6.1.x86_64.rpm</filename><sum type="sha256">b4daec22435bbd44770a173ebfd4d815a5febf226c2d2dc8bc85a24f03c1e878</sum></package><package arch="noarch" name="httpd-manual" release="47.sl6.1" src="httpd-2.2.15-47.sl6.1.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-47.sl6.1.noarch.rpm</filename><sum type="sha256">95fa4efeebfadf345625d28fc04e044cdd5cbb9561b2b11a4c4b0e61fcc49984</sum></package><package arch="x86_64" name="httpd-devel" release="47.sl6.1" src="httpd-2.2.15-47.sl6.1.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.1.x86_64.rpm</filename><sum type="sha256">f9c200e13ba0b4e9bdeb360aae0e590bbd66a4557e778ba963d182aa1f33691a</sum></package><package arch="x86_64" name="httpd" release="47.sl6.1" src="httpd-2.2.15-47.sl6.1.src.rpm" version="2.2.15"><filename>httpd-2.2.15-47.sl6.1.x86_64.rpm</filename><sum type="sha256">1b70f58e2e3c9a35110dfdaef91f57fca79def4d64a6cb896e78db9b44ebced7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2641" id="RHBA-2015:2641-1" title="Rhba-2015:2641-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1149906" id="1149906" title="Mixed Up Mod_Proxy_Balancer Jvmroutes Causing Sticky Session Breaks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277918" id="1277918" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2642-1</id><title>Samba Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, Samba did not correctly verify whether signing was required, and when the&#160;client attempted to reconnect after the session expired, the STATUS_ACCES_DENIED message was displayed. Now, the&#160;message no longer appears in this situation, and users are allowed to reconnect.

* When an&#160;incorrect option was passed from the&#160;pluggable authentication module&#160;(PAM) configuration file to the&#160;&quot;pam_winbind&quot; module, unexpected termination of the&#160;&quot;pam_winbind&quot; module when printing an&#160;error message could occur, leading to a&#160;segmentation fault in the&#160;application performing the&#160;PAM operation. The&#160;&quot;pam_winbind&quot; module has been patched and no longer crashes in these circumstances, but logs an&#160;error informing the&#160;user that the&#160;passed option is not recognized.

After installing this update, the&#160;smb service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="libsmbclient-devel" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">8372424a6982c6922060ea075e5a82057f243a820b134e35d4a975042c35ac1a</sum></package><package arch="x86_64" name="samba-winbind-devel" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">527043f6e7794592535c2c72f5ba269437e0b52f186a4b67d9327c1ae4148b75</sum></package><package arch="i686" name="libsmbclient" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-21.el6_7.i686.rpm</filename><sum type="sha256">17f70d84b256b5f1f71f20b95b6dc51ea2313bbda56f7ca994c4dd6a70103928</sum></package><package arch="x86_64" name="samba-glusterfs" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">5e5deb3215d025b2bea69103c194226ffb660724f89fe29f9fd8f0a05d973dd4</sum></package><package arch="x86_64" name="samba" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">00d5f083a872ce3a4fe120b7716f4b066a0386e23a2d868ce7054d42fbedb9df</sum></package><package arch="x86_64" name="samba-winbind-clients" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">9f57d0e8564229c24459eace2a89c4fb4949c74dfabc2002dfca6874213a09cf</sum></package><package arch="x86_64" name="libsmbclient" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">fcba8cec9eccc3df4b82102f33bb97c021a3750fd99d7e7e85b44fbe9eefcbf1</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">a7a8e537af5aef9bd21d000fc8b1d3b0ca37dbecc2553a5e35d425512d360cf8</sum></package><package arch="x86_64" name="samba-doc" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">1b85e5d02e8dee2c7fdfe41f6db81fb87ef19e253636e14769f90f5f38952ffc</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">6098e6dffa54c073d060f857ffc7385dc6e3e7641ec29c7d2407b0fe578e9c88</sum></package><package arch="i686" name="samba-common" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-21.el6_7.i686.rpm</filename><sum type="sha256">98f1523cf49300000a4a8e3e3c48c318ababb02410dfaeed4e8c8447536cd51d</sum></package><package arch="i686" name="samba-winbind-devel" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-21.el6_7.i686.rpm</filename><sum type="sha256">94d279516acb9c18bcd730322cc404d1a10980929dc42f58e9b050692d95dcd5</sum></package><package arch="x86_64" name="samba-client" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">c8323c9b9a7fa9d517a14656397695e3f4ccbbf90ca0eb1d3d5e3cd5319d65bd</sum></package><package arch="x86_64" name="samba-winbind" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">b17e07e7f4f59661f2f9eae30c7a580f9868ffbc0fbe0e459b137b72b2ce1bf2</sum></package><package arch="x86_64" name="samba-common" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">6ed130d261eb73e5a7625da854a742705b7de8fa0c5031c75481e36a5933bffa</sum></package><package arch="i686" name="libsmbclient-devel" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-21.el6_7.i686.rpm</filename><sum type="sha256">16eceb1dbbd303acb297c0f5935549337af07f449f93ddb90b0e077c36056792</sum></package><package arch="i686" name="samba-winbind-clients" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-21.el6_7.i686.rpm</filename><sum type="sha256">be627fb7978a053158258237dad95905485ba988f09f055d834795baedb44d50</sum></package><package arch="x86_64" name="samba-swat" release="21.el6_7" src="samba-3.6.23-21.el6_7.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-21.el6_7.x86_64.rpm</filename><sum type="sha256">1379507e6bd7b42da554b712676df0194e8d9af6836eab8067e0e728efded72b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2642" id="RHBA-2015:2642-1" title="Rhba-2015:2642-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264343" id="1264343" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265762" id="1265762" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2643-1</id><title>Procps Bug Fix Update</title><description>This update fixes the following bug:

* With the introduction of VmFlags in the kernel smaps interface, the pmap tool could no longer reliably process the content due to format differences of the VmFlags entry. As a consequence, pmap reported incorrect values of totals to the user. The underlying source code has been patched, and pmap now works as expected.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="procps" release="35.el6_7" src="procps-3.2.8-35.el6_7.src.rpm" version="3.2.8"><filename>procps-3.2.8-35.el6_7.i686.rpm</filename><sum type="sha256">abe26df0fea9d4dbc958c2e4980cf9bfa17b3b79d88c5433e7295c23699f6104</sum></package><package arch="i686" name="procps-devel" release="35.el6_7" src="procps-3.2.8-35.el6_7.src.rpm" version="3.2.8"><filename>procps-devel-3.2.8-35.el6_7.i686.rpm</filename><sum type="sha256">9bdc02ea9f3226d61f1fb33de6ac6aa942f82d729c511a3627281c68364279d9</sum></package><package arch="x86_64" name="procps-devel" release="35.el6_7" src="procps-3.2.8-35.el6_7.src.rpm" version="3.2.8"><filename>procps-devel-3.2.8-35.el6_7.x86_64.rpm</filename><sum type="sha256">d19b9d0889bd2fd26e28088942d7a0d09729ee49028771569ab73bfaffbc1dc7</sum></package><package arch="x86_64" name="procps" release="35.el6_7" src="procps-3.2.8-35.el6_7.src.rpm" version="3.2.8"><filename>procps-3.2.8-35.el6_7.x86_64.rpm</filename><sum type="sha256">7836034662315d846825002bcf15cd3eb9ca92bc1d68ac3e0b869fd2b60d5f38</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2643" id="RHBA-2015:2643-1" title="Rhba-2015:2643-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277512" id="1277512" title="Pmap Produces Ludicrous Output On Shared Memory Using Programs Due To Bogus Parsing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2646-1</id><title>Perl-Ldap Bug Fix Update</title><description>This update fixes the following bugs:

* When using the Net::LDAPS Perl module to connect to an LDAP server without specifying the list of allowed SSL ciphers, the SSL client offered and accepted all SSL ciphers, even those that were not enabled by default by the underlying cryptographic (OpenSSL) library. To  the Net::LDAP source code and documentation have been modified not to request all ciphers by default. As a result, Perl LDAP clients use the default OpenSSL cipher list if not specified otherwise.

* Previously, when using a Perl LDAP client with the Simple Authentication and Security Layer (SASL) mechanism, the LDAP server could receive corrupted LDAP queries. The Net::LDAP Perl module has been fixed to pass the actual query length to the syswrite() function instead of fixed 1,500 bytes. This can be redefined by other protocol layers like SASL authentication implementation. As a result, the Net::LDAP client no longer corrupts sent LDAP queries.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" epoch="1" name="perl-LDAP" release="2.el6" src="perl-LDAP-0.40-2.el6.src.rpm" version="0.40"><filename>perl-LDAP-0.40-2.el6.noarch.rpm</filename><sum type="sha256">9f0dca378c45480e088168efb3dc33484385cadf7d29095ccd5ecb28b92488b6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2646" id="RHBA-2015:2646-1" title="Rhba-2015:2646-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1090966" id="1090966" title="Net::Ldap Should Not Set Ciphers To &apos;All&apos; If Not Requested Explicitly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104069" id="1104069" title="Perl-Ldap Sets Wrong Length For Function _Sendmesg" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2647-1</id><title>Dvd+Rw-Tools Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the Blu-ray Discs Recordable (BD-R) were recongized inconsistently either as Sequential Recording Mode (SRM) discs or SRM with an option for Pseudo-Overwrite (SRM+POW) discs. Consequently, dvd+rw-tools attempted incorrect operations on the discs, which resulted into error messages and failed status codes. With this update, BD-R discs are correctly recognized as SRM+POW discs, and the problem no longer occurs.

Users of dvd+rw-tools are advised to upgrade to these updated packages</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="dvd+rw-tools" release="7.el6" src="dvd+rw-tools-7.1-7.el6.src.rpm" version="7.1"><filename>dvd+rw-tools-7.1-7.el6.x86_64.rpm</filename><sum type="sha256">8a261a3f0d3b7596d83ae8ac703dbd5dd2b47d08244c2525c4f5af56c00cd896</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2647" id="RHBA-2015:2647-1" title="Rhba-2015:2647-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227127" id="1227127" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2648-1</id><title>Unzip Bug Fix And Enhancement Update</title><description>This update fixes the following bug:

* Previously, the initialization of the symbolic link flag was missing in the information about an entry. Consequently, if an archive contained more than 16,384 entries and one of the entries was a symbolic link, some other entries could be mistakenly presented as symbolic links as well. With this update, the missing initialization of the symbolic link flag has been added. As a result, regular files are not evaluated as symbolic links anymore.

In addition, this update adds the following enhancement:

* With this update, unzip supports also non-Latin and non-Unicode encodings. This prevents creating files with incorrect names. The new encodings can be specified using the "-O" and "-I" options.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="unzip" release="4.el6" src="unzip-6.0-4.el6.src.rpm" version="6.0"><filename>unzip-6.0-4.el6.x86_64.rpm</filename><sum type="sha256">ac1b79b0e009ee27e8b82ec258091e41877bcd0d31ddc489a46bb2d901293889</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2648" id="RHBA-2015:2648-1" title="Rhba-2015:2648-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=740012" id="740012" title="Unzip Creates A Link Instead Of Extracting The File For Some .Zip Archives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=885540" id="885540" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2654-1</id><title>Udev Bug Fix Update</title><description>This update fixes the following bugs:

* Module autoloading was previously turned on for every device, even if a driver for the device was already loaded, because Intelligent Platform Management Interface (IPMI) devices required this setting. Consequently, too many modprobe instances were executed. This update allows modprobe for IPMI devices only if a driver is already loaded, and module autoloading thus works as expected. Now, all other drivers are not accessed again, which results in a decrease in workload.

* Previously, the modprobe execution could be done in parallel with an infinite number of other modprobe executions, which led to hundreds of modprobes running in parallel. This update limits the maximum number of workers which are spawned additionally to the count governed by the max_childs setting.  Note that it is highly recommended to adjust the size of the kernel log buffer when logging to a serial console (log_buf_len=4M on kernel command line), as affected systems are able to boot even without any fixes now provided.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="libgudev1-devel" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libgudev1-devel-147-2.63.el6_7.1.i686.rpm</filename><sum type="sha256">a374badc1aea21e044a0577f714fa65759fdf5c0f76230e010738ce01901e384</sum></package><package arch="x86_64" name="libgudev1-devel" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libgudev1-devel-147-2.63.el6_7.1.x86_64.rpm</filename><sum type="sha256">9f6c40e5944df517539e6d5cef0599abd637348fbf73a4148bbd8c469d1409cb</sum></package><package arch="x86_64" name="libudev-devel" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libudev-devel-147-2.63.el6_7.1.x86_64.rpm</filename><sum type="sha256">4f62966bf1097f0adf4be62545f2854ebb2b7c2195daf9ea7382f0ced127a688</sum></package><package arch="i686" name="libudev-devel" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libudev-devel-147-2.63.el6_7.1.i686.rpm</filename><sum type="sha256">9e630719fad3fec8e93644cbc810e7e90db15bb7f477ac1f50e141cffabb8acb</sum></package><package arch="i686" name="libgudev1" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libgudev1-147-2.63.el6_7.1.i686.rpm</filename><sum type="sha256">ec3cbf57e0bad1c42fda27d276a5ce4a9bfbd4c5fecd39b400c6ea60ce835948</sum></package><package arch="i686" name="libudev" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libudev-147-2.63.el6_7.1.i686.rpm</filename><sum type="sha256">57c85558cec02637bdd2164cb4519b284fdb91ca7c1575c4a9860b95bcaffb90</sum></package><package arch="x86_64" name="libudev" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libudev-147-2.63.el6_7.1.x86_64.rpm</filename><sum type="sha256">f34d5083b4e1b057e9fe341d404d18a450caa00e0296ba7fd714482ab636decf</sum></package><package arch="x86_64" name="udev" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>udev-147-2.63.el6_7.1.x86_64.rpm</filename><sum type="sha256">7f22194d6f18e66511cd13ed81055a66617951261353a59f06432880b340bd2c</sum></package><package arch="x86_64" name="libgudev1" release="2.63.el6_7.1" src="udev-147-2.63.el6_7.1.src.rpm" version="147"><filename>libgudev1-147-2.63.el6_7.1.x86_64.rpm</filename><sum type="sha256">b1b93f2eb9ac5126a360bf2bf2e4a309fb2111d8d970379b37265cdf1dfa0c31</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2654" id="RHBA-2015:2654-1" title="Rhba-2015:2654-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281467" id="1281467" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281469" id="1281469" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2015:2668-1</id><title>Watchdog Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the output of the "service watchdog start" command contained a redundant "[  OK  ]" string. With this update, this bug has been fixed.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="watchdog" release="5.el6" src="watchdog-5.6-5.el6.src.rpm" version="5.6"><filename>watchdog-5.6-5.el6.x86_64.rpm</filename><sum type="sha256">125ae5a54f2b41b04041ad5abed3e2ed2174215843347d5fb5ec3957654e79ba</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2015:2668" id="RHBA-2015:2668-1" title="Rhba-2015:2668-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263040" id="1263040" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0020-1</id><title>Logwatch Bug Fix Update</title><description>This update fixes the following bug:

* Due to insufficient logic in the source code, Logwatch failed to run if there were too many empty files to process. This update fixes the logic to skip empty files, as there is nothing in them to process. As a result, the described failure no longer occurs.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="logwatch" release="54.el6" src="logwatch-7.3.6-54.el6.src.rpm" version="7.3.6"><filename>logwatch-7.3.6-54.el6.noarch.rpm</filename><sum type="sha256">51e38cbdfdc1fd20e0ece4ef6d280961829cfd275e841029589d17bc3692e30a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0020" id="RHBA-2016:0020-1" title="Rhba-2016:0020-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921409" id="921409" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0021-1</id><title>Freeipmi Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the freeipmi utility exited with an error if it caught a signal while running the select() system call. With this update, select() gets called repeatedly if it returns EINTR until no interruption occurs. As a result, the program completes its action successfully.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="freeipmi" release="7.el6" src="freeipmi-1.2.1-7.el6.src.rpm" version="1.2.1"><filename>freeipmi-1.2.1-7.el6.x86_64.rpm</filename><sum type="sha256">c09a7e0874b974396e4368ddc2e1b16767fc7dd830eaa5d20e8cdd32a749c2a1</sum></package><package arch="x86_64" name="freeipmi-ipmidetectd" release="7.el6" src="freeipmi-1.2.1-7.el6.src.rpm" version="1.2.1"><filename>freeipmi-ipmidetectd-1.2.1-7.el6.x86_64.rpm</filename><sum type="sha256">2a10061cb160c167e614628ddd3cd16b16fc1662791b0bf30c740f21d44b1dcc</sum></package><package arch="i686" name="freeipmi-devel" release="7.el6" src="freeipmi-1.2.1-7.el6.src.rpm" version="1.2.1"><filename>freeipmi-devel-1.2.1-7.el6.i686.rpm</filename><sum type="sha256">4861c690fce7c481286bef27cd5d7f197778c54e89144fbbda3d0dcd345cb256</sum></package><package arch="i686" name="freeipmi" release="7.el6" src="freeipmi-1.2.1-7.el6.src.rpm" version="1.2.1"><filename>freeipmi-1.2.1-7.el6.i686.rpm</filename><sum type="sha256">99301aee4fef25650d42149b6b009cd1c1bd491b24ef9e2733ea52e34c87ab95</sum></package><package arch="x86_64" name="freeipmi-bmc-watchdog" release="7.el6" src="freeipmi-1.2.1-7.el6.src.rpm" version="1.2.1"><filename>freeipmi-bmc-watchdog-1.2.1-7.el6.x86_64.rpm</filename><sum type="sha256">f9ef7e50c5924c365b1ad84eb175f132c57d75c8c7ea426cc47f71eac6b05b5b</sum></package><package arch="x86_64" name="freeipmi-devel" release="7.el6" src="freeipmi-1.2.1-7.el6.src.rpm" version="1.2.1"><filename>freeipmi-devel-1.2.1-7.el6.x86_64.rpm</filename><sum type="sha256">1e4ed9e4a690ff8bd0afa19de00b0e96ea058bf9df31027f02940effe51aede1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0021" id="RHBA-2016:0021-1" title="Rhba-2016:0021-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1197096" id="1197096" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0022-1</id><title>Libcanberra Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, on connection errors, libcanberra attempted to reconnect indefinitely to the PulseAudio sound server. This caused the Metacity window manager to consume 100% of the CPU. With this update, libcanberra attempts to reconnect only once. As a result, Metacity no longer consumes 100% of the CPU.

* Previously, object lifetime was managed incorrectly and objects were used after they were destroyed. Consequently, random segmentation faults appeared when canceling sound playback, or when the stream finished playback. With this update, libcanberra checks whether objects are alive before operating on them. Additionally, object lifetime management in callbacks has been improved. As a result, such random segmentation faults no longer occur.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="libcanberra-gtk2" release="3.el6" src="libcanberra-0.22-3.el6.src.rpm" version="0.22"><filename>libcanberra-gtk2-0.22-3.el6.x86_64.rpm</filename><sum type="sha256">a3babdcf9c3699f2304c8461d6b3104380ff2bdd60304830ebcfece0343c7e90</sum></package><package arch="i686" name="libcanberra-gtk2" release="3.el6" src="libcanberra-0.22-3.el6.src.rpm" version="0.22"><filename>libcanberra-gtk2-0.22-3.el6.i686.rpm</filename><sum type="sha256">0821f6a4545bd3873556c1042cc75fec412d538e14579805404a3bb5b443a8b8</sum></package><package arch="x86_64" name="libcanberra-devel" release="3.el6" src="libcanberra-0.22-3.el6.src.rpm" version="0.22"><filename>libcanberra-devel-0.22-3.el6.x86_64.rpm</filename><sum type="sha256">290446456c3c7f78cff91c0a99499ed2021e48de2647b23fa497dd7067d001b0</sum></package><package arch="x86_64" name="libcanberra" release="3.el6" src="libcanberra-0.22-3.el6.src.rpm" version="0.22"><filename>libcanberra-0.22-3.el6.x86_64.rpm</filename><sum type="sha256">4a100a10b1ed9d3b7ce8ced6495dc85021867bbae0ae7d9251b65a1f6df8c240</sum></package><package arch="i686" name="libcanberra-devel" release="3.el6" src="libcanberra-0.22-3.el6.src.rpm" version="0.22"><filename>libcanberra-devel-0.22-3.el6.i686.rpm</filename><sum type="sha256">3b846ad0ef3a6b8940744717158a182be9ebbafb7fab67c37a6e281a4b8d4ac4</sum></package><package arch="i686" name="libcanberra" release="3.el6" src="libcanberra-0.22-3.el6.src.rpm" version="0.22"><filename>libcanberra-0.22-3.el6.i686.rpm</filename><sum type="sha256">e7d7c10257a7270646272af10546f57faa9d951fe505cb03e340ed26aee9f467</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0022" id="RHBA-2016:0022-1" title="Rhba-2016:0022-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=860576" id="860576" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921169" id="921169" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0038-1</id><title>Findutils Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, while searching, the "find" utility did not use the file type information that the kernel interface for listing directories provides for each directory entry. This necessitated additional stat() system calls to obtain the file type, which caused a significant slowdown when traversing large NFS directories. With this update, "find" uses the file type information provided by the kernel. As a result, "find" uses fewer stat() system calls and traverses large NFS directories much faster.

* Previously, if the "find" utility was run with the -execdir option, it did not close file descriptors after using them. Consequently, the limit of open file descriptors was exceeded. With this update, "find" releases unused file descriptors. As a result, "find -execdir" no longer excessively consumes file descriptors.</description><release>Scientific Linux</release><issued date="2016-01-19 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="findutils" release="8.el6" src="findutils-4.4.2-8.el6.src.rpm" version="4.4.2"><filename>findutils-4.4.2-8.el6.x86_64.rpm</filename><sum type="sha256">d5596e88f9947d70d082b465ad112386d0bf2cdc1f0c6bf0d0e9a4847e4a3fd3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0038" id="RHBA-2016:0038-1" title="Rhba-2016:0038-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223557" id="1223557" title="&apos;Find -Execdir&apos; Opens Too Many File Descriptors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=883285" id="883285" title="Find Command Is Too Slow With &apos;-Type F&apos; Option Due To Excessive Newfstatat System Calls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0039-1</id><title>Ibus Bug Fix Update</title><description>The Intelligent Input Bus (IBus) is an input method framework for multilingual input in Unix-like operating systems.

This update fixes the following bug:

* Previously, using the im-chooser configuration utility to disable the IBus caused the IBus plug-in to be unloaded and the plug-in object to be unreferred. Consequently, the Firefox browser terminated unexpectedly. This update fixes this bug.</description><release>Scientific Linux</release><issued date="2016-01-19 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="ibus-libs" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-libs-1.3.4-9.el6.i686.rpm</filename><sum type="sha256">ec6bf1402eff7e55619eba7ca19e09a9d3a1d6c5427f928eb04ee7c94282c38d</sum></package><package arch="x86_64" name="ibus-gtk" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-gtk-1.3.4-9.el6.x86_64.rpm</filename><sum type="sha256">17214259f938e309cfef34fce0bbbed0ddfe65b2f10f2883f04960fab7a44f89</sum></package><package arch="x86_64" name="ibus-devel-docs" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-devel-docs-1.3.4-9.el6.x86_64.rpm</filename><sum type="sha256">f64b98ed924d3b125fb8b280454dc6847657ae566c7fc0b21c70611221f50453</sum></package><package arch="i686" name="ibus-devel" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-devel-1.3.4-9.el6.i686.rpm</filename><sum type="sha256">e3f92f12d6124daf195c77baa484cd10a563eda020c6d21417121e2f6ec80d31</sum></package><package arch="x86_64" name="ibus-devel" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-devel-1.3.4-9.el6.x86_64.rpm</filename><sum type="sha256">d96274b06ae068db17cc003e9d32713933cfb08cc1b041e9533173ff19667833</sum></package><package arch="x86_64" name="ibus-libs" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-libs-1.3.4-9.el6.x86_64.rpm</filename><sum type="sha256">fa949a312d91ce361abbba292d5ecdba9047cc775d52a850ab2e574652e2fb55</sum></package><package arch="i686" name="ibus-gtk" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-gtk-1.3.4-9.el6.i686.rpm</filename><sum type="sha256">257afb639c663d5a7020d4705ab37a061c0e58598458ddbf2ccf6c2217466061</sum></package><package arch="x86_64" name="ibus" release="9.el6" src="ibus-1.3.4-9.el6.src.rpm" version="1.3.4"><filename>ibus-1.3.4-9.el6.x86_64.rpm</filename><sum type="sha256">df24ea6b65dbe1402a1ffa8cd18dc12d6d29052b82448b09413eed90118fa10b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0039" id="RHBA-2016:0039-1" title="Rhba-2016:0039-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1245288" id="1245288" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0110-1</id><title>Paps Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the paps utility did not use the correct size for A4 pages, which caused problems with other utilities and drivers.  This bug has been fixed, and paps now uses the correct size for A4.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="paps-libs" release="13.el6.3" src="paps-0.6.8-13.el6.3.src.rpm" version="0.6.8"><filename>paps-libs-0.6.8-13.el6.3.i686.rpm</filename><sum type="sha256">84c5373cc8a6467208d3a80ac05202946eabf9f965cd0e48fbaaf7be666cf377</sum></package><package arch="x86_64" name="paps-devel" release="13.el6.3" src="paps-0.6.8-13.el6.3.src.rpm" version="0.6.8"><filename>paps-devel-0.6.8-13.el6.3.x86_64.rpm</filename><sum type="sha256">71f51111109614f933747290cade4edcdd0fd6225988d419dda7e6e985bf787a</sum></package><package arch="i686" name="paps-devel" release="13.el6.3" src="paps-0.6.8-13.el6.3.src.rpm" version="0.6.8"><filename>paps-devel-0.6.8-13.el6.3.i686.rpm</filename><sum type="sha256">976e18bb0ed38abcc02d376b70c9bccabbc33eaa272af0c0d40f61003b8c88cb</sum></package><package arch="x86_64" name="paps-libs" release="13.el6.3" src="paps-0.6.8-13.el6.3.src.rpm" version="0.6.8"><filename>paps-libs-0.6.8-13.el6.3.x86_64.rpm</filename><sum type="sha256">951e8f02864ee22237b61d572a37c70c21dff3efcaace60836435d2e73bb99c6</sum></package><package arch="x86_64" name="paps" release="13.el6.3" src="paps-0.6.8-13.el6.3.src.rpm" version="0.6.8"><filename>paps-0.6.8-13.el6.3.x86_64.rpm</filename><sum type="sha256">277d1bf4bb34edcba9075afa5426089e6aab6aa5f59153949de857ada9475a2b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0110" id="RHBA-2016:0110-1" title="Rhba-2016:0110-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1214939" id="1214939" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0111-1</id><title>Pango Bug Fix Update</title><description>This update fixes the following bug:

* Due to a bug in the pango packages, an error message was displayed when upgrading from Scientific Linux 6.3 to 6.4. This bug has been fixed, and the error message is no longer displayed.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="pango" release="11.el6" src="pango-1.28.1-11.el6.src.rpm" version="1.28.1"><filename>pango-1.28.1-11.el6.x86_64.rpm</filename><sum type="sha256">bc2fb21892c63243c50936ee6e5e1351bf26684e39803f4b249c388db4589a61</sum></package><package arch="x86_64" name="pango-devel" release="11.el6" src="pango-1.28.1-11.el6.src.rpm" version="1.28.1"><filename>pango-devel-1.28.1-11.el6.x86_64.rpm</filename><sum type="sha256">6b05c2d3699ad29d9d8d8c9df1cc3dca005e19082e1ff4c1cbe582ebfacf922e</sum></package><package arch="i686" name="pango-devel" release="11.el6" src="pango-1.28.1-11.el6.src.rpm" version="1.28.1"><filename>pango-devel-1.28.1-11.el6.i686.rpm</filename><sum type="sha256">8240800ed7e65a14bd46459bdd42feb2a00ab64686bf47e3ef416a9083d822a8</sum></package><package arch="i686" name="pango" release="11.el6" src="pango-1.28.1-11.el6.src.rpm" version="1.28.1"><filename>pango-1.28.1-11.el6.i686.rpm</filename><sum type="sha256">8c3e29456aeb8273fa980c698e80e152fdc9d81d12e8d03e95eac9a751534b44</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0111" id="RHBA-2016:0111-1" title="Rhba-2016:0111-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=895383" id="895383" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0112-1</id><title>Cups-Pk-Helper Bug Fix Update</title><description>This update fixes the following bugs:

* There were no translations of policy descriptions and messages in the cups-pk-helper packages, so text was displayed without localization. Translations have been added, and now the displayed text is properly localized.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="cups-pk-helper" release="13.el6" src="cups-pk-helper-0.0.4-13.el6.src.rpm" version="0.0.4"><filename>cups-pk-helper-0.0.4-13.el6.x86_64.rpm</filename><sum type="sha256">75e56b6968556114a56b7fb3eb4c126f167020fd36d8261d6381526511839198</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0112" id="RHBA-2016:0112-1" title="Rhba-2016:0112-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=814555" id="814555" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=814562" id="814562" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0113-1</id><title>Pulseaudio Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, due to incomplete enumeration of the available devices, the capture device on certain M-Audio Fasttrack Pro sound cards was not properly detected. With this update, an extra parameter has been added to the profile description to perform a more thorough check for available devices. As a result, the previously missing device now appears as an available input device in the sound preferences.

* Previously, an error in a configuration file caused the mixer settings to be ignored, and the software volume was used instead of the hardware mixer. Consequently, the kernel could not recognize whether the device was muted and so could not correctly control the mute signal light. With this update, the configuration file has been fixed, and hardware volumes are used again. As a result, the kernel can now recognize when the device is muted and set the mute signal light accordingly.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="pulseaudio-module-bluetooth" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-module-bluetooth-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">290ded2f26f7badd47b49d6b781b057e6351f9ba14e1df8e4a01f75fbc72e454</sum></package><package arch="x86_64" name="pulseaudio-libs" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">1cde18b69eca65a571bde81a8bafbd20921e31f9916bbdc113cd02d4de04746a</sum></package><package arch="i686" name="pulseaudio-libs" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-0.9.21-24.el6.i686.rpm</filename><sum type="sha256">e32ef782e40cc5a94cd868f4ebf9b2459f20b2443df8abad8615ca85559c5730</sum></package><package arch="x86_64" name="pulseaudio-libs-devel" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-devel-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">dba23200cdf405dfee326a0ce4e9324005565e0d5a225c545b88f81583cd8997</sum></package><package arch="x86_64" name="pulseaudio-esound-compat" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-esound-compat-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">6a2245d66a6a1640f4d2ec86cf3b7f9d3a48297e4c8dce139baa86302501482b</sum></package><package arch="i686" name="pulseaudio-libs-devel" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-devel-0.9.21-24.el6.i686.rpm</filename><sum type="sha256">cd27e2cb998f2efca98dd7bec67ed704412c1147926a71cda5d3245fd6a28f66</sum></package><package arch="x86_64" name="pulseaudio-module-gconf" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-module-gconf-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">9d52abf65eff21da09bce511ec2557387d24482e402a4716d189bccd1c4d98b4</sum></package><package arch="x86_64" name="pulseaudio-module-x11" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-module-x11-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">2935520d9663f2ef80dddff4b761c5c55547914e2b1c3e10f4a9c1e3f3c30504</sum></package><package arch="x86_64" name="pulseaudio-module-zeroconf" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-module-zeroconf-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">ddaa99224d539e3d4168f4a2c35c8e917c7ab799df9c4248469cff4e07a9d7bb</sum></package><package arch="x86_64" name="pulseaudio-libs-zeroconf" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-zeroconf-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">2f52272279644753e0958a41c83ff083c55b753ef39ed7792c4ef1c07b042834</sum></package><package arch="x86_64" name="pulseaudio-libs-glib2" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-glib2-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">94efba47725176a2c5f964890510ca442f0a604a18a18908fd2a592a49704fa3</sum></package><package arch="x86_64" name="pulseaudio-utils" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-utils-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">c6923abf06af853d2d9241d8e76d9389af62204c8a1470f2c784412c4288b9e2</sum></package><package arch="i686" name="pulseaudio-utils" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-utils-0.9.21-24.el6.i686.rpm</filename><sum type="sha256">c9326e0f2386692e66203e0f3616bb2b29e883a9ba09c24c6a616c9ea795b113</sum></package><package arch="x86_64" name="pulseaudio" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">7d8302613a987482c0ca21248d56ff7f190f138332a24c8a554bc072120bf520</sum></package><package arch="i686" name="pulseaudio-libs-glib2" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-glib2-0.9.21-24.el6.i686.rpm</filename><sum type="sha256">b86a9f83ed3f7f3bf8c06dfacd1d78fdd67cfd1bf16f913aefe42bab1745cb6f</sum></package><package arch="x86_64" name="pulseaudio-gdm-hooks" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-gdm-hooks-0.9.21-24.el6.x86_64.rpm</filename><sum type="sha256">aaf41530842b7c22750440317e83626c5241e2548c0d069562f40f7352425c3f</sum></package><package arch="i686" name="pulseaudio-libs-zeroconf" release="24.el6" src="pulseaudio-0.9.21-24.el6.src.rpm" version="0.9.21"><filename>pulseaudio-libs-zeroconf-0.9.21-24.el6.i686.rpm</filename><sum type="sha256">e3bd60bd70dc5c90a4b710656a8ad3cbfe983a053b0ca352670cab31dbbc055d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0113" id="RHBA-2016:0113-1" title="Rhba-2016:0113-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1191623" id="1191623" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=656998" id="656998" title="M-Audio Fast Track Pro Needs Special Profiles" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0114-1</id><title>Gedit Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the 'Character Encodings' dialog window contained an invalid keyboard shortcut when using Simplified Chinese localization. This has been fixed and the dialog now uses the correct keyboard shortcut.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="gedit-devel" release="4.el6" src="gedit-2.28.4-4.el6.src.rpm" version="2.28.4"><filename>gedit-devel-2.28.4-4.el6.x86_64.rpm</filename><sum type="sha256">6710f26b5385cf9f33c3046845126c050048c1abed8f250979f3a61eeca2de62</sum></package><package arch="i686" epoch="1" name="gedit-devel" release="4.el6" src="gedit-2.28.4-4.el6.src.rpm" version="2.28.4"><filename>gedit-devel-2.28.4-4.el6.i686.rpm</filename><sum type="sha256">22153d0957a356a837cfc9b19d51d5b1f3212922c75c953299a985b7c8d4a2b1</sum></package><package arch="x86_64" epoch="1" name="gedit" release="4.el6" src="gedit-2.28.4-4.el6.src.rpm" version="2.28.4"><filename>gedit-2.28.4-4.el6.x86_64.rpm</filename><sum type="sha256">3e2c0d3ccaf1df8f239732549f1a913b516f82f0fd78e4f50e20feae6f3b3d64</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0114" id="RHBA-2016:0114-1" title="Rhba-2016:0114-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=902624" id="902624" title="[Zh_Cn] Invalid Hotkey (&amp;Amp;V) In &apos;Character Codings&apos; Dialog Of Gedit." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0115-1</id><title>Urw-Fonts Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the urw-fonts package did not require the xorg-x11-font- utils package, which provides the mkfontscale and mkfontdir utilities. Consequently, the index of scalable font files could not be created. With this update, xorg-x11-font-utils is required, and the index is now created as expected.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="urw-fonts" release="11.el6" src="urw-fonts-2.4-11.el6.src.rpm" version="2.4"><filename>urw-fonts-2.4-11.el6.noarch.rpm</filename><sum type="sha256">5ded9314bf7b16e4d0a7e127a1b0c5dda7cf1a967128b7e331fbfea1b634b27e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0115" id="RHBA-2016:0115-1" title="Rhba-2016:0115-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299856" id="1299856" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0134-1</id><title>Firefox Bug Fix Update</title><description>This update fixes the following bug:

* Due to a bug, the customization UI did not work, and the following error message was displayed in the Browser Console:

Custom widget with id loop-button does not return a valid node

With this update, the "loop.enabled" option is set to true. As a result, the UI can now be customized, and the error message no longer occurs.

After installing the update, Firefox must be restarted for the changes to take effect.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="firefox" release="2.el6_7" src="firefox-38.6.0-2.el6_7.src.rpm" version="38.6.0"><filename>firefox-38.6.0-2.el6_7.x86_64.rpm</filename><sum type="sha256">af514c2fe87f6076907125e4b8735f0f9091b9cc34815151bb3fbe0907c956ce</sum></package><package arch="i686" name="firefox" release="2.el6_7" src="firefox-38.6.0-2.el6_7.src.rpm" version="38.6.0"><filename>firefox-38.6.0-2.el6_7.i686.rpm</filename><sum type="sha256">103cd8032055fbd2296c83242902a66a31592646340e27dde231ceb699abdecd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0134" id="RHBA-2016:0134-1" title="Rhba-2016:0134-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302749" id="1302749" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0135-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when an alias interface was brought down using the ifdown command, the LABEL variable was not set due to a typo in the ifdown-eth script. Consequently, instead of removing just addresses belonging to the alias interface, all IP addresses on the device were removed. This bug has been fixed, and the script now correctly removes only IP addresses of the alias interface in this scenario.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="debugmode" release="1.el6_7.4" src="initscripts-9.03.49-1.el6_7.4.src.rpm" version="9.03.49"><filename>debugmode-9.03.49-1.el6_7.4.x86_64.rpm</filename><sum type="sha256">37c878772947a08c473e4045c6720f958869b7dd408b6d582ee491d7e15107a1</sum></package><package arch="x86_64" name="initscripts" release="1.el6_7.4" src="initscripts-9.03.49-1.el6_7.4.src.rpm" version="9.03.49"><filename>initscripts-9.03.49-1.el6_7.4.x86_64.rpm</filename><sum type="sha256">87514f57213b47a0c2b32471c75910a3c0457aa59de64ef785a1d9f0430fb877</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0135" id="RHBA-2016:0135-1" title="Rhba-2016:0135-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300971" id="1300971" title="Ifdown On An Alias Interface Removes All Ip Addresses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0136-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when writing an error message about an incorrect HTTP interim response code to a log file, the httpd daemon used a NULL pointer instead of a pointer to the real request. As a consequence, httpd could terminate unexpectedly with a segmentation fault if the back-end server sent incorrect interim response code. With this update, the correct HTTP request pointer is passed to the httpd logging code, and httpd no longer crashes in this scenario.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="mod_ssl" release="47.sl6.3" src="httpd-2.2.15-47.sl6.3.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-47.sl6.3.x86_64.rpm</filename><sum type="sha256">22de1879fca2b5ad2bb01d7137eba3d0b7ebd482841171f337d34535c7b8cafa</sum></package><package arch="x86_64" name="httpd-tools" release="47.sl6.3" src="httpd-2.2.15-47.sl6.3.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-47.sl6.3.x86_64.rpm</filename><sum type="sha256">2e9a8ae0b6e9a56d70e30355b58300929b340a1c863d7717084c76ed08467e65</sum></package><package arch="i686" name="httpd-devel" release="47.sl6.3" src="httpd-2.2.15-47.sl6.3.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.3.i686.rpm</filename><sum type="sha256">b6546ff72610edca0b2e501be752d8f20cb06098739c0148b1224aa53eac454e</sum></package><package arch="x86_64" name="httpd" release="47.sl6.3" src="httpd-2.2.15-47.sl6.3.src.rpm" version="2.2.15"><filename>httpd-2.2.15-47.sl6.3.x86_64.rpm</filename><sum type="sha256">09ff9f65925a68423abbf7ecd54fdb17e065ac727d3f5d75876c9cedfef4da89</sum></package><package arch="x86_64" name="httpd-devel" release="47.sl6.3" src="httpd-2.2.15-47.sl6.3.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.3.x86_64.rpm</filename><sum type="sha256">58335fe9442e2e15ce806a14a2c6474219c8e153af71b0d674b1d7f34e4c0ed2</sum></package><package arch="noarch" name="httpd-manual" release="47.sl6.3" src="httpd-2.2.15-47.sl6.3.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-47.sl6.3.noarch.rpm</filename><sum type="sha256">ae245e1b0f6819063c9ce0284778576bd8621f18a4d9fa3682eada95d2bc9399</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0136" id="RHBA-2016:0136-1" title="Rhba-2016:0136-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300707" id="1300707" title="Backport Request For Bug 52315 - Null Pointer In Log.C Caused By Ap_Send_Interim_Response() In Protocol.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0137-1</id><title>Virt-Manager Bug Fix Update</title><description>This update fixes the following bug:

* When the libvirtd service was stopped while an active connection to libvirtd was established in the virt-manager application, an error message dialogue was previously triggered. This caused problems with certain Red Hat certification tests. With this update, the error message dialogue is not displayed in the described circumstances, and the error is only printed to the debugging log. As a result, the libvirtd active connection closes without causing Red Hat certification test failures.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="virt-manager" release="29.el6_7.1" src="virt-manager-0.9.0-29.el6_7.1.src.rpm" version="0.9.0"><filename>virt-manager-0.9.0-29.el6_7.1.x86_64.rpm</filename><sum type="sha256">57a1a4a4d52d7f10bc87162de504cdc7dae501d3614b70d3e2a8ac4153cb4fdc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0137" id="RHBA-2016:0137-1" title="Rhba-2016:0137-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300620" id="1300620" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0138-1</id><title>Sg3_Utils Bug Fix Update</title><description>This update fixes the following bugs:

* The rescan-scsi-bus.sh tool misinterpreted SCSI device types that were described using more than one word, for example, "Medium Changer" or "Optical Device". Consequently, when the script was run on systems that had such device types attached, the script printed multiple misleading error messages. With this update, device types described with multiple words are handled correctly, and the proper device type description is returned to the user without any errors.

* When running the rescan-scsi-bus.sh script, due to incorrect syntax in redirecting output to the /dev/null device file while executing the /bin/rm utility, the redirection did not happen but /dev/null was instead interpreted as a file to be removed. As a consequence, running rescan- scsi-bus.sh with the "--update" option removed /dev/null during execution. This bug has been fixed, and /dev/null is no longer removed by rescan- scsi-bus.sh.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="sg3_utils-devel" release="9.el6_7" src="sg3_utils-1.28-9.el6_7.src.rpm" version="1.28"><filename>sg3_utils-devel-1.28-9.el6_7.x86_64.rpm</filename><sum type="sha256">3418e411b28cd6e5b3fa8e31132032e0bcc1770f1746e360d2b0b70c10397df8</sum></package><package arch="i686" name="sg3_utils-libs" release="9.el6_7" src="sg3_utils-1.28-9.el6_7.src.rpm" version="1.28"><filename>sg3_utils-libs-1.28-9.el6_7.i686.rpm</filename><sum type="sha256">18826caa8727040a2b7ab90f425ebc25ae7c74f0d3551d800bd69b64373fee8d</sum></package><package arch="i686" name="sg3_utils-devel" release="9.el6_7" src="sg3_utils-1.28-9.el6_7.src.rpm" version="1.28"><filename>sg3_utils-devel-1.28-9.el6_7.i686.rpm</filename><sum type="sha256">49976cbade5b756916203d59f18acf6ca495a6806650b34809d009517392babb</sum></package><package arch="x86_64" name="sg3_utils" release="9.el6_7" src="sg3_utils-1.28-9.el6_7.src.rpm" version="1.28"><filename>sg3_utils-1.28-9.el6_7.x86_64.rpm</filename><sum type="sha256">1e959a3fc4c3f060f7baea909bcffd0a4ea68a0ee45699b3befa400124460463</sum></package><package arch="x86_64" name="sg3_utils-libs" release="9.el6_7" src="sg3_utils-1.28-9.el6_7.src.rpm" version="1.28"><filename>sg3_utils-libs-1.28-9.el6_7.x86_64.rpm</filename><sum type="sha256">30186ff272a7a88e472a7d425beac8b07354a63faeb062ce0c82f89fc2a0e083</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0138" id="RHBA-2016:0138-1" title="Rhba-2016:0138-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291579" id="1291579" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300338" id="1300338" title="Running &apos;Rescan-Scsi-Bus -U&apos; Deletes /Dev/Null" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0139-1</id><title>Cluster Bug Fix Update</title><description>This update fixes the following bug:

* A cluster using an unsupported configuration that did not use the CMAN cluster manager and did not list node names explicitly could fail to start due to being "unable to find votes" even if the number of votes was explicitly configured. Note that this bug does not affect anyone using CMAN, and that the applied patch does not fix the bug itself. Instead, this update enables users with unsupported configurations to convert to CMAN conveniently.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="gfs2-utils" release="73.el6_7.2" src="cluster-3.0.12.1-73.el6_7.2.src.rpm" version="3.0.12.1"><filename>gfs2-utils-3.0.12.1-73.el6_7.2.x86_64.rpm</filename><sum type="sha256">98600b721f0bd691bc08fee2c602d0d01aeb509fd4b8899fded8aa005c733c90</sum></package><package arch="i686" name="clusterlib-devel" release="73.el6_7.2" src="cluster-3.0.12.1-73.el6_7.2.src.rpm" version="3.0.12.1"><filename>clusterlib-devel-3.0.12.1-73.el6_7.2.i686.rpm</filename><sum type="sha256">c0fc07107de46e7a9bf8104baff795eca7e9f543f1d1e4369a0ea94db75e0492</sum></package><package arch="x86_64" name="clusterlib" release="73.el6_7.2" src="cluster-3.0.12.1-73.el6_7.2.src.rpm" version="3.0.12.1"><filename>clusterlib-3.0.12.1-73.el6_7.2.x86_64.rpm</filename><sum type="sha256">f9173d70b9d3a05a689379b36cf6b576cd0a17ba306a5d342e0bc4818061c8e8</sum></package><package arch="x86_64" name="clusterlib-devel" release="73.el6_7.2" src="cluster-3.0.12.1-73.el6_7.2.src.rpm" version="3.0.12.1"><filename>clusterlib-devel-3.0.12.1-73.el6_7.2.x86_64.rpm</filename><sum type="sha256">3c0b8c420ba48f3b77717933d28f4bcb25aa36d6aefe9f160398c5b417514330</sum></package><package arch="i686" name="clusterlib" release="73.el6_7.2" src="cluster-3.0.12.1-73.el6_7.2.src.rpm" version="3.0.12.1"><filename>clusterlib-3.0.12.1-73.el6_7.2.i686.rpm</filename><sum type="sha256">7e44928c8c023d93fad5fa779955046e0d9572da2484c05273a612ac88f0c2d5</sum></package><package arch="x86_64" name="cman" release="73.el6_7.2" src="cluster-3.0.12.1-73.el6_7.2.src.rpm" version="3.0.12.1"><filename>cman-3.0.12.1-73.el6_7.2.x86_64.rpm</filename><sum type="sha256">cde2c23a87e4318d5b93443a3d6ecb18bdbc369622e010564ce1404d76cd0390</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0139" id="RHBA-2016:0139-1" title="Rhba-2016:0139-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298455" id="1298455" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0140-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the mod_ssl module sent TLS warning messages when a TLS handshake was received with an unrecognized host name in the Server Name Indication (SNI) hint. As a consequence, some TLS clients failed to operate correctly when receiving the TLS warning message, preventing access to the web site. With this update, mod_ssl has been fixed to no longer send TLS warning messages, as recommended by RFC 6066. As a result, errors and failures of certain TLS clients no longer occur in the described scenario.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="httpd-devel" release="47.sl6.2" src="httpd-2.2.15-47.sl6.2.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.2.i686.rpm</filename><sum type="sha256">afe9c98c1463d57483415059d897087aecfba9ef393cd02ebd37130a4e8da388</sum></package><package arch="x86_64" name="httpd-devel" release="47.sl6.2" src="httpd-2.2.15-47.sl6.2.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.2.x86_64.rpm</filename><sum type="sha256">1df4cf2842273ddc9e791979f85c892c9c486494f448202af7b8e015a9004406</sum></package><package arch="x86_64" name="httpd-tools" release="47.sl6.2" src="httpd-2.2.15-47.sl6.2.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-47.sl6.2.x86_64.rpm</filename><sum type="sha256">bf656d00ad34ec8d22659af34ed6fdc2cc7fa69eb42474fc0477fed1dab814a6</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="47.sl6.2" src="httpd-2.2.15-47.sl6.2.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-47.sl6.2.x86_64.rpm</filename><sum type="sha256">c821970f44e6cbef1a162b17aec2edeeb3abfb6469fa1a08b7772e8fa6dc1cb9</sum></package><package arch="noarch" name="httpd-manual" release="47.sl6.2" src="httpd-2.2.15-47.sl6.2.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-47.sl6.2.noarch.rpm</filename><sum type="sha256">a9afd81686442a8528acdcfb1795d05222169495e262ea1ce1f9c9bb00805af0</sum></package><package arch="x86_64" name="httpd" release="47.sl6.2" src="httpd-2.2.15-47.sl6.2.src.rpm" version="2.2.15"><filename>httpd-2.2.15-47.sl6.2.x86_64.rpm</filename><sum type="sha256">ae98995615c3c2194e07366c03a184dbe35d50b253062f458d3c957dd9dbb563</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0140" id="RHBA-2016:0140-1" title="Rhba-2016:0140-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297372" id="1297372" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0141-1</id><title>Php Bug Fix Update</title><description>This update fixes the following bug:

* Previously, certain data was incorrectly buffered as garbage. Consequently, this could cause a PHP application to terminate unexpectedly with a segmentation fault when the garbage collector was running on nested data. With this update, the correct buffer taint has been set, and the garbage collector now runs as expected.

After installing the updated packages, the httpd daemon must be restarted for the update to take effect.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="php-zts" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-zts-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">3d7fef9bd99cbb37708c1247b83bc953038609f96d2be95f88b6f95afca40e14</sum></package><package arch="x86_64" name="php-dba" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-dba-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">d4535e818045d77971bb82f3b0583dc85e9060412cd878a65b2d8b21a8ca4c77</sum></package><package arch="x86_64" name="php-embedded" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-embedded-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">a516049f139808c2f2c3fa0db9c1524f45ed8ffddd92af13e9f7873485cd7bd7</sum></package><package arch="x86_64" name="php-ldap" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-ldap-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">49fdb7366ed4af21f27acd54cf854a3b1e061aea877a42f1d3ba922ab5808c05</sum></package><package arch="x86_64" name="php-xmlrpc" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-xmlrpc-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">a03781da60e8532e082c3f5b90d7d6138c2fe4349952e34f3c9070b0ef03a4e0</sum></package><package arch="x86_64" name="php-pspell" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-pspell-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">99ac244794199458afac667a337d0f5b28e24f0eabe9384a854e88628e44cc4b</sum></package><package arch="x86_64" name="php-process" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-process-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">76d5cdec9e0db0926f764b3b620eb332c2841a4a36be1ba10d71ef98dc24bc5b</sum></package><package arch="x86_64" name="php-xml" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-xml-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">84ef65f0ddc623f53168e63eba7f85d9a9ff35d88ee3ef88342b33c48b001581</sum></package><package arch="x86_64" name="php-common" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-common-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">1553334c2d5466c91174343a8291dd5439f4d7417693fa8841dc72abd3d7c5a8</sum></package><package arch="x86_64" name="php-recode" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-recode-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">c42507bea271dd213bd514d73c32541b39efba7876c12ad37d100694aa016fc4</sum></package><package arch="x86_64" name="php-fpm" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-fpm-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">68c2ae652784e2cabceb04e68d212804c7c500574bc5c0d19cccea1a41f4a4d1</sum></package><package arch="x86_64" name="php-enchant" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-enchant-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">5d5eabe31d228b9fcb6356a7eacf162d1913360639bb775daea9453396be30c7</sum></package><package arch="x86_64" name="php-mysql" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-mysql-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">cfdf9c1b7a62a2c915ead146bf470cec71b3d10b0e3ca9b2ec5bdcc363316eda</sum></package><package arch="x86_64" name="php-imap" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-imap-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">c39601bd4995cbfcf43b49364140bd789907b86dd16432577583abf163d3ede1</sum></package><package arch="x86_64" name="php" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">9a836b58a67ccc75b3d2e7c6237ccbee7be4a6102b016de8c3d86f37b81b5d4b</sum></package><package arch="x86_64" name="php-pgsql" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-pgsql-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">98cc9b2048592679005821612049ac4d8e375eab7f406ab5f7172a71c5a205c8</sum></package><package arch="x86_64" name="php-odbc" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-odbc-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">dcb0d664f47e6f3ed0040dc90c0edc6d7ffb1398da96c324536e2425e360d191</sum></package><package arch="x86_64" name="php-mbstring" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-mbstring-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">673135a434132eaae69a331e0814833e1af8d0637306ccbe0620db6e75107a9f</sum></package><package arch="x86_64" name="php-gd" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-gd-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">7a57eb24718b39cc9fb2e969ed8c0b028e3eed25c9cb330d4ebbb18776b6c724</sum></package><package arch="x86_64" name="php-tidy" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-tidy-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">1fcf93a72b2dd8754dd69fec7eb419334a79e8e68c2d0eee46c5e6a288efed40</sum></package><package arch="x86_64" name="php-soap" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-soap-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">d41366800f87afcc556098aee0f51374734f3282bf3dafac0e2085efdf86d766</sum></package><package arch="x86_64" name="php-pdo" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-pdo-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">a91405c08768fc2c57c66e65f5bf7b37b7812477ae313caf2f567f1d6c81a975</sum></package><package arch="x86_64" name="php-cli" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-cli-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">e0545b91fc8fde4231ba2de047b3b76e5f7e8f979eb18a16783b050785076743</sum></package><package arch="x86_64" name="php-snmp" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-snmp-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">d1335d694d40b1110066920e94ef282670893227638dd15d07a76636c6f7d8bb</sum></package><package arch="x86_64" name="php-intl" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-intl-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">864675eb00d9e3ccd266ef2aa2266a73332eb268612b0286ab0c7fc7ef2874ad</sum></package><package arch="x86_64" name="php-devel" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-devel-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">ba614aa4321cbbfd9ae79e002dd7342e661b0463ab58aeb0cbfa958de017be4e</sum></package><package arch="x86_64" name="php-bcmath" release="46.el6_7.1" src="php-5.3.3-46.el6_7.1.src.rpm" version="5.3.3"><filename>php-bcmath-5.3.3-46.el6_7.1.x86_64.rpm</filename><sum type="sha256">ec9c024a049da1ce869c0e5a57678c5057dfe7f716c74637091ebbdabcba7018</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0141" id="RHBA-2016:0141-1" title="Rhba-2016:0141-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293568" id="1293568" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0142-1</id><title>Librdmacm Enhancement Update</title><description>This update adds the following enhancement:

* Previously, if librdmacm was installed on a system with no RDMA hardware present, it could, in some circumstances, output superfluous warning and error messages to the standard error stream (stderr). With this update, librdmacm no longer outputs warning and error messages to stderr.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="librdmacm" release="1.1.el6_7" src="librdmacm-1.0.19.1-1.1.el6_7.src.rpm" version="1.0.19.1"><filename>librdmacm-1.0.19.1-1.1.el6_7.i686.rpm</filename><sum type="sha256">d831607482732f5a80570f6ae2e24ad5bc92b399431244389acd5cb0eca6c79a</sum></package><package arch="x86_64" name="librdmacm" release="1.1.el6_7" src="librdmacm-1.0.19.1-1.1.el6_7.src.rpm" version="1.0.19.1"><filename>librdmacm-1.0.19.1-1.1.el6_7.x86_64.rpm</filename><sum type="sha256">ddc0ec7bcc140bef4cbfb6c585b86f6234fac591607a72b5004fff08ec5edb23</sum></package><package arch="x86_64" name="librdmacm-devel" release="1.1.el6_7" src="librdmacm-1.0.19.1-1.1.el6_7.src.rpm" version="1.0.19.1"><filename>librdmacm-devel-1.0.19.1-1.1.el6_7.x86_64.rpm</filename><sum type="sha256">e7379fc69816cdc399faae95646f4c79bc608724b685f348a8c039ed7030d802</sum></package><package arch="i686" name="librdmacm-devel" release="1.1.el6_7" src="librdmacm-1.0.19.1-1.1.el6_7.src.rpm" version="1.0.19.1"><filename>librdmacm-devel-1.0.19.1-1.1.el6_7.i686.rpm</filename><sum type="sha256">644170b90870e4f34439a26f11941fb3cabf0c12d54d3994a66d9d2ebb6ea688</sum></package><package arch="x86_64" name="librdmacm-utils" release="1.1.el6_7" src="librdmacm-1.0.19.1-1.1.el6_7.src.rpm" version="1.0.19.1"><filename>librdmacm-utils-1.0.19.1-1.1.el6_7.x86_64.rpm</filename><sum type="sha256">5017a5eae29d86a60bdb15553ee1221a9b579037a7990e15443666200d78130e</sum></package><package arch="x86_64" name="librdmacm-static" release="1.1.el6_7" src="librdmacm-1.0.19.1-1.1.el6_7.src.rpm" version="1.0.19.1"><filename>librdmacm-static-1.0.19.1-1.1.el6_7.x86_64.rpm</filename><sum type="sha256">c3ae59171fbfee9fa3a2dd6b2cb1f516636ea27b43def8cddaa5abb5e9525480</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0142" id="RHBA-2016:0142-1" title="Rhba-2016:0142-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296408" id="1296408" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0143-1</id><title>Kdelibs Bug Fix Update</title><description>This update fixes the following bug:

* Hovering the mouse cursor over an item in the taskbar sometimes caused the plasma-desktop to terminate unexpectedly. The underlying source code has been modified to  and the plasma-desktop no longer crashes in the described situation.

The desktop must be restarted (log out, then log back in) for this update to take effect.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><restart_suggested>true</restart_suggested><relogin_suggested>true</relogin_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" epoch="6" name="kdelibs" release="24.el6_7" src="kdelibs-4.3.4-24.el6_7.src.rpm" version="4.3.4"><filename>kdelibs-4.3.4-24.el6_7.i686.rpm</filename><sum type="sha256">8612992107141242b0ce2da045bcd4d3faa650d4b1eedd175495889b658499dc</sum></package><package arch="x86_64" epoch="6" name="kdelibs" release="24.el6_7" src="kdelibs-4.3.4-24.el6_7.src.rpm" version="4.3.4"><filename>kdelibs-4.3.4-24.el6_7.x86_64.rpm</filename><sum type="sha256">9f9c8259848b2fd34ac09658832406e2e6f38953c1bf92c132ff39c75a40079e</sum></package><package arch="i686" epoch="6" name="kdelibs-devel" release="24.el6_7" src="kdelibs-4.3.4-24.el6_7.src.rpm" version="4.3.4"><filename>kdelibs-devel-4.3.4-24.el6_7.i686.rpm</filename><sum type="sha256">9aa5260472879fcda89daf25b5db6247d6039a07ddb1d091e50b0465459715e9</sum></package><package arch="noarch" epoch="6" name="kdelibs-apidocs" release="24.el6_7" src="kdelibs-4.3.4-24.el6_7.src.rpm" version="4.3.4"><filename>kdelibs-apidocs-4.3.4-24.el6_7.noarch.rpm</filename><sum type="sha256">d7619712d7c18e7d56a34af6af71801a64b286ffb0a1aa922bdfe74b1ca1b96d</sum></package><package arch="x86_64" epoch="6" name="kdelibs-devel" release="24.el6_7" src="kdelibs-4.3.4-24.el6_7.src.rpm" version="4.3.4"><filename>kdelibs-devel-4.3.4-24.el6_7.x86_64.rpm</filename><sum type="sha256">bb7d2eced96a8a7632fcfaf0351e3403012d8f73c7002158db7ee75268396b25</sum></package><package arch="x86_64" epoch="6" name="kdelibs-common" release="24.el6_7" src="kdelibs-4.3.4-24.el6_7.src.rpm" version="4.3.4"><filename>kdelibs-common-4.3.4-24.el6_7.x86_64.rpm</filename><sum type="sha256">d2df97a3063cdce952747f2a83fc6dd7d271f6b45f6380cb4c60c4758601221c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0143" id="RHBA-2016:0143-1" title="Rhba-2016:0143-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293573" id="1293573" title="Plasma-Desktop Sometimes Crashes While Hovering Over Application Icon In Taskbar" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0144-1</id><title>Chkconfig Bug Fix Update</title><description>This update fixes the following bug:

* Free functions from the libselinux library do not handle NULL pointers. Prior to this update, chkconfig incorrectly handled calls for free functions provided by libselinux on systems where no SELinux policy package was installed. Consequently, chkconfig could terminate unexpectedly with a segmentation fault. This bug has been fixed, and chkconfig no longer crashes if no SELinux policy packages are installed.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="ntsysv" release="5.el6_7.2" src="chkconfig-1.3.49.3-5.el6_7.2.src.rpm" version="1.3.49.3"><filename>ntsysv-1.3.49.3-5.el6_7.2.x86_64.rpm</filename><sum type="sha256">946bd778df9d974d94e3b92af9b5f5b1d34495335dabb0f24388f91c4d411097</sum></package><package arch="x86_64" name="chkconfig" release="5.el6_7.2" src="chkconfig-1.3.49.3-5.el6_7.2.src.rpm" version="1.3.49.3"><filename>chkconfig-1.3.49.3-5.el6_7.2.x86_64.rpm</filename><sum type="sha256">e616c904383ca0aac336b52897a3a076d30caadcc809153645a4ae6eaceb3987</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0144" id="RHBA-2016:0144-1" title="Rhba-2016:0144-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293653" id="1293653" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0145-1</id><title>Kexec-Tools Bug Fix Update</title><description>This update fixes the following bug:

* In crash dumps, sadump formats associate each bit in a bitmap with a physical memory page in an opposite order to the kdump-compressed format. The makedumpfile tool was previously treating the sadump and kdump formats the same, causing pages in sadump formats to be incorrectly indexed with an offset of 7 bytes. Consequently, makedumpfile could fail to copy some parts of a crash dump. With this update, makedumpfile treats sadump formats correctly and succeeds in copying memory in sadump vmcore formats.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kexec-tools" release="286.el6_7.1" src="kexec-tools-2.0.0-286.el6_7.1.src.rpm" version="2.0.0"><filename>kexec-tools-2.0.0-286.el6_7.1.x86_64.rpm</filename><sum type="sha256">222a39dd5d28aa7b245560d3ae03db9b2bcd6d0deb04b3b69665e82888452dc6</sum></package><package arch="x86_64" name="kexec-tools-eppic" release="286.el6_7.1" src="kexec-tools-2.0.0-286.el6_7.1.src.rpm" version="2.0.0"><filename>kexec-tools-eppic-2.0.0-286.el6_7.1.x86_64.rpm</filename><sum type="sha256">580494010b5bedec664abb39f4c00b6c3d71f2e4d11c068d605e422bed2ba080</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0145" id="RHBA-2016:0145-1" title="Rhba-2016:0145-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290723" id="1290723" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0146-1</id><title>Libgovirt Bug Fix Update</title><description>This update fixes the following bugs:

* When multiple ISO domains with the same name were found in REST requests, incorrect memory handling was causing applications using the libgovirt library to crash. This update improves memory handling of REST requests and applications using libgovirt no longer crash due to memory corruption.

* A legacy path used by libgovirt to allow remote-viewer to access oVirt/RHEV REST API was causing authentication failures in REST API requests, resulting in the CDRom menu missing from remote-viewer. With this update, libgovirt uses the correct path for processing requests and the CDRom menu now correctly appears in remote-viewer.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="libgovirt" release="1.el6_7.2" src="libgovirt-0.3.2-1.el6_7.2.src.rpm" version="0.3.2"><filename>libgovirt-0.3.2-1.el6_7.2.i686.rpm</filename><sum type="sha256">87545f6029d8f254d6db30dc3c731d7366e18f5042b555c6c619ff026ae3509e</sum></package><package arch="i686" name="libgovirt-devel" release="1.el6_7.2" src="libgovirt-0.3.2-1.el6_7.2.src.rpm" version="0.3.2"><filename>libgovirt-devel-0.3.2-1.el6_7.2.i686.rpm</filename><sum type="sha256">94c204017669587c6febb89cc946c3cedbe35af5425c46c2063433a820f012df</sum></package><package arch="x86_64" name="libgovirt-devel" release="1.el6_7.2" src="libgovirt-0.3.2-1.el6_7.2.src.rpm" version="0.3.2"><filename>libgovirt-devel-0.3.2-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">47e5babe01c17fd7d32556ed310339272c2fabb6c70191a647c1905168b935bb</sum></package><package arch="x86_64" name="libgovirt" release="1.el6_7.2" src="libgovirt-0.3.2-1.el6_7.2.src.rpm" version="0.3.2"><filename>libgovirt-0.3.2-1.el6_7.2.x86_64.rpm</filename><sum type="sha256">14ae5472531b69cf2db082262895030ec98409cf0437097c78c565fb099d94ff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0146" id="RHBA-2016:0146-1" title="Rhba-2016:0146-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296683" id="1296683" title="Remote-Viewer Crash After Login To Vm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297810" id="1297810" title="Libgovirt Needs To Access /Ovirt-Engine/Api/ Rather Than /Api/" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0147-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, when several values of the same attribute were deleted using the ldapmodify command, and at least one of them was added again during the same operation, the equality index was not updated. As a consequence, an exact search for the re-added attribute value did not return the entry. The logic of the index code has been modified to update the index if at least one of the values in the entry changes, and the exact search for the re-added attribute value now returns the correct entry.

* Previously, if a simple paged results search failed in the back end, the simple paged results slot was not released. Consequently, the simple paged results slots in a connection object could be accumulated. With this update, the simple paged results slot is released correctly when a search fails, and unused simple paged results slots are no longer left in a connection object.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="389-ds-base-libs" release="69.el6_7" src="389-ds-base-1.2.11.15-69.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-69.el6_7.i686.rpm</filename><sum type="sha256">2b06fc586b5069cf47a8731e0ba418a8ceb19afbfbc8018e251a2bcc12e4098a</sum></package><package arch="i686" name="389-ds-base-devel" release="69.el6_7" src="389-ds-base-1.2.11.15-69.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-69.el6_7.i686.rpm</filename><sum type="sha256">f4ee3fb6e4e8b2107ca5c54d84ee713e43d3450e597663825826c84e632d3ac3</sum></package><package arch="x86_64" name="389-ds-base-libs" release="69.el6_7" src="389-ds-base-1.2.11.15-69.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-69.el6_7.x86_64.rpm</filename><sum type="sha256">82b87c6b5c041551c05a5c83914ffe8d6e43d6963d80f8489d5ed7e97a182b0a</sum></package><package arch="x86_64" name="389-ds-base" release="69.el6_7" src="389-ds-base-1.2.11.15-69.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-69.el6_7.x86_64.rpm</filename><sum type="sha256">8294a085e3dd1f510c0ad97a92dfc5ede1bf47abd2b0d32e62ab5e67b8fc5c0f</sum></package><package arch="x86_64" name="389-ds-base-devel" release="69.el6_7" src="389-ds-base-1.2.11.15-69.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-69.el6_7.x86_64.rpm</filename><sum type="sha256">16aac5ba5765e6b38c3293567970bbe5079fb5da71d4740cc469da6ec3433b04</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0147" id="RHBA-2016:0147-1" title="Rhba-2016:0147-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289844" id="1289844" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290722" id="1290722" title="Simplepagedresults -- In The Search Error Case, Simple Paged Results Slot Was Not Released." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0148-1</id><title>Poppler Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the pdftops utility of Poppler converted PDF files with embedded PostScript Type 1 fonts in the Printer Font Binary (PFB) format together with the PFB headers. As a consequence, incorrect PostScript files were produced from such conversions. Poppler has been fixed to recognize the PFB headers and exclude them from the conversion, and the described problem no longer occurs.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="poppler-qt-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt-devel-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">24cc49f684ebd41c2603b44b8b35f9e080bf48e2eef568da5156e663b9991c25</sum></package><package arch="i686" name="poppler-qt4-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt4-devel-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">18421606797a638a2797dc6dd535ba9d0f565a146ff489eaaf56865d210d7848</sum></package><package arch="x86_64" name="poppler-glib" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-glib-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">e820ca4c1859ed67cafc27d11bd50eff794c16071c1605dbabf9edd207ae0c49</sum></package><package arch="x86_64" name="poppler-glib-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-glib-devel-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">a613326bd59f1bbefa271204eb8ef0b4b3d67db88e5bb22eb23f045fecd0c3a0</sum></package><package arch="i686" name="poppler-glib" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-glib-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">daa51852a4e9a8bc925b3faa5cca5eb05ace8934b4d20a64f70a3565f3fdcef9</sum></package><package arch="i686" name="poppler-qt4" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt4-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">f4d3c7d685bbf888a0b59499d477862458a06b1e8db895326ef5d2a243c91f16</sum></package><package arch="x86_64" name="poppler-qt4" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt4-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">75b3ebe55eb618135d83c8109e641a0f3fe9c2c0bb56bdd6b491129cf8d46aa3</sum></package><package arch="i686" name="poppler-glib-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-glib-devel-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">db5513e383e0c914d00f0d06aa4e81e1e2520120af083c0148140519781687b4</sum></package><package arch="i686" name="poppler-qt" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">e149777d77fc4c53d382b3d57e09bdacbfc4238057f0898f46a27d892da7e811</sum></package><package arch="x86_64" name="poppler-qt4-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt4-devel-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">ea0d80b6067fe977b603bb756b076f046c6ab0efce13f67a8ef50e81483fe9be</sum></package><package arch="x86_64" name="poppler-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-devel-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">251df622defdf4a5d7c2eace1464bd7d614d7814f1dcc42acd8daae8c2111d7e</sum></package><package arch="i686" name="poppler-qt-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt-devel-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">7d2539d2c60e7f08a8eec142330aa68f0171d24aa40e6c24ea99a406e0fc36d4</sum></package><package arch="i686" name="poppler-devel" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-devel-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">86dccc87eebc8f01763655f58c1a7e2ec8e684454240fb1ef48cc2ca618c85c5</sum></package><package arch="x86_64" name="poppler" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">1b0f8ac1c6bba35b8273df3b8d73a898cac99d3be49222baf31d903fc79fcc60</sum></package><package arch="x86_64" name="poppler-qt" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-qt-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">138b5e84d96c46712f8a4472c05e4b8220c86d61d32a8f52e2ab14570ebcadde</sum></package><package arch="i686" name="poppler" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-0.12.4-5.el6_7.1.i686.rpm</filename><sum type="sha256">2f189bedd56e5a1a2eb2bc9515cf9fefdaf72ad8a0ebd66e187fbbbafa3970a2</sum></package><package arch="x86_64" name="poppler-utils" release="5.el6_7.1" src="poppler-0.12.4-5.el6_7.1.src.rpm" version="0.12.4"><filename>poppler-utils-0.12.4-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">8933f7112c75789f40180730993c72285ccf6b0f2472b55128810e20bd512f13</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0148" id="RHBA-2016:0148-1" title="Rhba-2016:0148-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289489" id="1289489" title="/Usr/Bin/Pdftops Generates Invalid Postscript File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0149-1</id><title>Dnsmasq Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when restarting the dnsmasq service from Red Hat Satellite, Red Hat Satellite executed the restart script in an untypical environment without the standard file descriptors. The dnsmasq service attempted to use the /dev/null file descriptors for socket communication, reported errors, and consumed resources. With this update, socket operations work as expected, and dnsmasq runs in the described environment without problems.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="dnsmasq-utils" release="16.el6_7" src="dnsmasq-2.48-16.el6_7.src.rpm" version="2.48"><filename>dnsmasq-utils-2.48-16.el6_7.x86_64.rpm</filename><sum type="sha256">0a9939e6aaf05b1a1b9a09584b40144d4a87a7814bc1831943763c07563a9da5</sum></package><package arch="x86_64" name="dnsmasq" release="16.el6_7" src="dnsmasq-2.48-16.el6_7.src.rpm" version="2.48"><filename>dnsmasq-2.48-16.el6_7.x86_64.rpm</filename><sum type="sha256">6c52ffb33af89a52332af2eac54dd52d45697f520d35825c34e172f0d3f0a5d6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0149" id="RHBA-2016:0149-1" title="Rhba-2016:0149-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290098" id="1290098" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0150-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bugs:

* Attempting to use the request_key() function to add a key into a revoked keyring was causing a resource leak in the kernel error path. Keys which were allocated and then failed became stuck in memory and were impossible for the garbage collector to remove. With this update, the reference count on failed keys correctly reaches 0 in this situation, allowing the garbage collector to remove them.

* A bug in the ipr driver on IBM Power Systems (ppc64) could result in backwards memory buffer indexing and cause a kernel crash when running the Hardware Test Exerciser (HTX) test suite. With this update, ipr memory buffer indexing uses a bit mask operation instead of modulo, causing low bits to be masked off so that backwards indexing is no longer possible.

* Resetting an ixgbe or vmxnet3 adapter while sending a message over netconsole or netpoll at the same time could previously cause a kernel crash. This update adds mutual exclusion between the core adapter reset path and the netpoll transmit path, and the crash no longer occurs.

* When removing a directory while a reference was held to that directory by a reference to a negative child dentry, the directory dentry was previously not killed. In addition, once the negative child dentry was killed, unlinked and unused dentry was present in the cache. As a consequence, deadlock could be caused by forcing the dentry eviction while the file system in question was frozen. With this update, all unused dentries are unhashed and evicted just after a successful directory removal, which avoids the deadlock, and the system no longer hangs in the aforementioned scenario.

* Previously, an unusual forking pattern could cause the anon_vma_chain and anon_vma slab memory to grow infinitely even though the number of processes involved stayed low. As a consequence, a kernel panic occurred. The provided patch adds a heuristic which reuses existing anon_vma instead of forking a new one and adds the anon_vma-&amp;gt;degree counter which makes sure the count of anon_vmas is not bigger than twice the count of vmas. As a result, the kernel panic no longer occurs in this situation.

* A race condition was found in hash table invalidation code between inode invalidation and inode clearing code in the GFS2 file system. In some circumstances, two processes could attempt to free the same memory, resulting in a kernel panic. This update adds a "spin_lock" to the hash table invalidation code allowing only a single process to attempt to free a specific memory page, which prevents the race condition from occurring.

* Due to a timer expiry issue, the scheduler tick previously stopped for too long when the ksoftirqd daemon for hrtimer was blocked by a running process. This update adds the force_hrtimer_reprogram kernel parameter. If "force_hrtimer_reprogram=1" is used on the kernel command line, the reprogramming of all expired timers is forced, which prevents this bug.

* The kernel was incorrectly assigning multicast groups for the nl80211 protocol, causing problems with nl80211 wireless drivers. For example, preventing hostapd from starting and initializing wireless devices in Access Point mode. This update fixes multicast group assignments for nl80211 and allows wireless devices to be managed correctly.

* Large Receive Offload (LRO) flag disabling was not being propagated downwards from above devices in vlan and bond hierarchy, breaking the flow of traffic. This problem has been fixed and LRO flags now propagate correctly.

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="kernel-doc" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-573.18.1.el6.noarch.rpm</filename><sum type="sha256">c3bd8bc5379fe015cff3ce64b8b8b6bd2bb7676d97081a72019ae3d237c5983e</sum></package><package arch="x86_64" name="kernel" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">7e145e70f1900b6699108f4ae0d7624560c9816f3499175b304e4d1ff54b8a5c</sum></package><package arch="x86_64" name="perf" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">e1bb0598afffd5e9234aec4a5fad07a7deaf7c102f38796f07930a5e0a566157</sum></package><package arch="x86_64" name="kernel-devel" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">90869c66d559f6eac799c795730c581c1da3ffb6c8612101c229b2943b583163</sum></package><package arch="x86_64" name="python-perf" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">d20b20de8bce32a85fa05fdc271b73aca074c6eed4f8341b0fb7dead2df0df88</sum></package><package arch="x86_64" name="kernel-debug-devel" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">fbae721b3a67619c52ade60254d5093a31e1bee68493a1d8f0bf1ba671e93659</sum></package><package arch="x86_64" name="kernel-headers" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">dbc4ca54926cce92fce16efec41ec4ad2d360d6f6f0f5212d69f8e836dda57a2</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-573.18.1.el6.noarch.rpm</filename><sum type="sha256">033e1d3d9e9dcbfd835218f47ceb3330536392cb1ee157abc7b95a0999afbe15</sum></package><package arch="noarch" name="kernel-firmware" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-573.18.1.el6.noarch.rpm</filename><sum type="sha256">847a40501c09c4e18cf01acf72ad477677fdb4291cb964040365891a013786b8</sum></package><package arch="x86_64" name="kernel-debug" release="573.18.1.el6" src="kernel-2.6.32-573.18.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-573.18.1.el6.x86_64.rpm</filename><sum type="sha256">4e3a17172531dc46a0103293de4e22fb2cddf901d6224f42205fb1c747ded6df</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0150" id="RHBA-2016:0150-1" title="Rhba-2016:0150-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259008" id="1259008" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259870" id="1259870" title="Incomplete Nl80211 Backport Broke Hostapd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280211" id="1280211" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1282621" id="1282621" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285693" id="1285693" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288093" id="1288093" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288095" id="1288095" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292082" id="1292082" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1295370" id="1295370" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0151-1</id><title>Pki-Core Bug Fix Update</title><description>This update fixes the following bug:

*  When getting a token from the security domain for a Dogtag 9 system, an attempt is made to reach the Representational State Transfer (REST) interfaces first. If it fails with a 404 error, the raised exception is tracked and an attempt to reach the old interfaces is made. This exception was changed from the deprecated ClientResponseFailure to a PKIException error. Prior to this update, this change was not reflected in the pki-core code. Consequently, it was impossible to upgrade an IPA server from Scientific Linux 6 to Scientific Linux 7. The code catching the exception has been modified accordingly, and the upgrade of the IPA server no longer fails.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="pki-common" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-common-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">ea2f7904effcceaa7d6a0e7a8272dc8c2b478dcbe676c1478c070a2216ce860a</sum></package><package arch="noarch" name="pki-setup" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-setup-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">e958b4e2d02f990ff69230aa10736023da97736d19a7b27456ce333e64088d6a</sum></package><package arch="noarch" name="pki-ca" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-ca-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">aff7626d02381fa113125448383f57856f3e05333e67a2062f78e92c90b84275</sum></package><package arch="noarch" name="pki-java-tools-javadoc" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-java-tools-javadoc-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">28d8e39f270358dc0abda01b1fbcc17e0567d99e1685b4bd93687808728550c2</sum></package><package arch="noarch" name="pki-selinux" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-selinux-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">f36f26965908efbf2c06d51336c5d0f84cdbad60a4152de0dc16a4a58280a001</sum></package><package arch="noarch" name="pki-silent" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-silent-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">68c7db06b80aac5c0b4a3dfd3cddcae0a72cd16c985ea985cf6261aed24e8b1f</sum></package><package arch="noarch" name="pki-util" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-util-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">b1a35acc3fea4b31bcb75136378c09ffa7e13e4eff1a5d221326e39d47fbaaca</sum></package><package arch="noarch" name="pki-util-javadoc" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-util-javadoc-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">96f34a6ba53085ba92137e8c81a12ead238c0aabe071e9fc04e54a7f373a595a</sum></package><package arch="noarch" name="pki-common-javadoc" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-common-javadoc-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">c8b155e429f6b40e0c2b8b1bbc008ee61b5793146a5535fc2e1c5432bbd59f1c</sum></package><package arch="x86_64" name="pki-symkey" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-symkey-9.0.3-45.el6_7.x86_64.rpm</filename><sum type="sha256">290f4540a2a5ca0b64980c30df7d268e3e6dbfed7791f786a4f095235c042b10</sum></package><package arch="x86_64" name="pki-native-tools" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-native-tools-9.0.3-45.el6_7.x86_64.rpm</filename><sum type="sha256">e5318179bdd578f1fc4468ed25e446fe07dfbcc9585812be4d064d9c19b4f142</sum></package><package arch="noarch" name="pki-java-tools" release="45.el6_7" src="pki-core-9.0.3-45.el6_7.src.rpm" version="9.0.3"><filename>pki-java-tools-9.0.3-45.el6_7.noarch.rpm</filename><sum type="sha256">3cb12efbecfed49256752e5a6521a1bcaa3104b9c9d56767af5d112d1f01ef60</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0151" id="RHBA-2016:0151-1" title="Rhba-2016:0151-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291747" id="1291747" title="Unable To Clone Ipa With External Ca" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0153-1</id><title>Sssd Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, after using the ipa-winsync-migrate command to migrate users from WinSync to the Identity Management (IdM) trust solution, retrieving an Active Directory (AD) user failed. Also, the SSSD debugging logs contained the following error message:

[sysdb_add_user] (0x0400): Error: 17 (File exists)

A patch has been applied to address this bug. As a result, AD users are retrieved as expected, and the error no longer occurs in the described situation.

* Previously, when the internal cache-cleanup task, which is supposed to remove expired entries from the cache, removed a user entry, the group object that the user was a member of was not marked for a refresh on the next lookup. As a consequence, when such a group was looked up after the SSSD cache was cleaned up, its members were displayed incorrectly. With this update, when a user object is removed from the cache, all groups the user was a member of are marked as expired, which enforces an LDAP lookup the next time this group is requested. As a result, group memberships are always up-to-date even with the cache cleanup operation in place.

* When a user was added into the "ignore" list using the "filter_users" or "filter_groups" options while the "default_domain_suffix" option was in effect, adding the user into the internal negative cache failed. Consequently, as the entries were not present in the negative cache, the entries that were supposed to be ignored were still looked up on the remote server. With this update, "default_domain_suffix" is handled correctly, and users added into the filter_users and filter_groups lists are never looked up from the remote server in the described situation.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="libipa_hbac-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">230bc13db748f4edfb70ff0983fac075a4fc50bbd7ef574de09aaa3b122d760d</sum></package><package arch="x86_64" name="sssd-ipa" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-ipa-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">9b466950046c647711c549c3a30cb75de275267728182bcbec42aa06fc18f789</sum></package><package arch="x86_64" name="sssd-tools" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-tools-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">0ead85ee558b1785a676a0b8a93b464b4a91ec9e4fd2dc5eb1de6a0623fa59a8</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">27db6207928d6ee3fd89a0250e87a705de5cf93199c8a749d2547add3136b6ee</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">7dd4105430c407bc2eb98f35c3f8059c0911b1e566be6eae70d566db13ba7da0</sum></package><package arch="i686" name="libipa_hbac" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">c01893aa4d34863eff98074c1f280f06b342efc80319226cb45cfef8950e4b27</sum></package><package arch="x86_64" name="sssd" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">54cdac3b9a734085f348fba81a0c4b318481782c007c03991d0c9270d8fa1845</sum></package><package arch="x86_64" name="sssd-ldap" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-ldap-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">2bab3da8437d42ddc4869bb98e2a8918352c462c805303456a3b1025626932a3</sum></package><package arch="i686" name="libsss_nss_idmap" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">b0afc8ea19353f0b0b5d06acab87d2752486da9410f553ef2ac795b173ebff97</sum></package><package arch="x86_64" name="libipa_hbac-python" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libipa_hbac-python-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">689b9c91cc7ee9809c01d5bbd3383a5c90aed7e60ec2a3801c0abf015092d9ad</sum></package><package arch="x86_64" name="libsss_simpleifp" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">7a77439ed36c4b61f23b5e699c5322f8f88fa0e285856c447a566d8f633fd2c0</sum></package><package arch="x86_64" name="sssd-common" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-common-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">a2de6517eadb7c141f94f40417b85c7a83d9eddf093cb76cbf13551643dd98f2</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">e3368f4b5a00cbee5b16371343b0ff83bf6e9aeef1c73d65ec56928ea270775f</sum></package><package arch="i686" name="libsss_idmap-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">d9a751b7405bdf38135ab0724240ca42ce423b1823556a02cc19f86791114b7d</sum></package><package arch="x86_64" name="sssd-common-pac" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-common-pac-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">a35ab52492529de5eb8b26aec2d1d010e302cdad711ae09cbe187159e5be244c</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">e0f8e0348ab50283937fbe56d7ae4f152a2dcb70f0dfd9d05230fb71c6da1982</sum></package><package arch="x86_64" name="libsss_nss_idmap-python" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-python-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">37e395a58dd905287709f31514240b01855a0c6576789177e2e87b4c9269d859</sum></package><package arch="x86_64" name="libipa_hbac" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">d8b451447258cfa1bf7c73fe7a315c339c3f3577b82c2d119b12569746167391</sum></package><package arch="x86_64" name="sssd-krb5-common" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-krb5-common-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">539af5fa877ce0ff49617d10967b76e14ba079a603606a2ece0c4d5821323ef3</sum></package><package arch="noarch" name="python-sssdconfig" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>python-sssdconfig-1.12.4-47.el6_7.7.noarch.rpm</filename><sum type="sha256">210d475ada331781d2d010a117ce26fac41d8525185072e297d0afb7d25d8a08</sum></package><package arch="x86_64" name="sssd-proxy" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-proxy-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">bddbc5d25412daf548dbf0838194e62037419400808bdea862f2cdd1cacda0c7</sum></package><package arch="i686" name="sssd-client" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">88c0220df5fb7432307b3875ff33106cc7052878690d81fb4844f3004e40c692</sum></package><package arch="x86_64" name="sssd-ad" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-ad-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">7ae34552267e73192ffb0f930fcbe101177dec83a626e646c5d3c2dc5c44d97f</sum></package><package arch="x86_64" name="sssd-krb5" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-krb5-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">c24beb918a79619732ad8dcbca43e893b57a8a58373511299125592ea82591e5</sum></package><package arch="x86_64" name="sssd-dbus" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-dbus-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">1f554855f28416440068de5b1802561380037b351478c330f9b9af7dfe87559e</sum></package><package arch="i686" name="libsss_idmap" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">ab06f35840222569ddf6caa5114aef443720748b75da288745b66f5e094b3506</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">d364cca60eae5fe032a052a1fb8478dec472044fa7270dd36aaa73d27e4a5ae3</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">51506316df8336eaae2b55e94e120aaeb985cd063fa00b6a10ffbab2fbd45c1f</sum></package><package arch="x86_64" name="sssd-client" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">bd69840f256800f1efe9d35adc92c5fcd5bd66a473758002e9a67fbd2b0e75a7</sum></package><package arch="i686" name="libsss_simpleifp" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6_7.7.i686.rpm</filename><sum type="sha256">52f31d5eba6c762a72499bfab4c3365effe4596f948fb152b5ce26e743b6a149</sum></package><package arch="x86_64" name="libsss_idmap" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">79bb85db0264177f3e7feeca5fa8164b7b2e8555652716453d0752d0306d29ef</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="47.el6_7.7" src="sssd-1.12.4-47.el6_7.7.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6_7.7.x86_64.rpm</filename><sum type="sha256">dabcfb7b7eb58f982ed2793f6c1257ac6bda0ec446594c892e9668547003f035</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0153" id="RHBA-2016:0153-1" title="Rhba-2016:0153-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290456" id="1290456" title="Sssd: [Sysdb_Add_User] (0X0400): Error: 17 (File Exists)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291158" id="1291158" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298252" id="1298252" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0268-1</id><title>Ptlib Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the spec file incorrectly defined ptlib's plug-in directory. Consequently, some applications that use ptlib, for example Ekiga, searched for plug-ins in the wrong path and failed to access the plug-ins. With this update, the path has been fixed, and the applications can now find and access the necessary plug-ins.</description><release>Scientific Linux</release><issued date="2016-03-01 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="ptlib-devel" release="5.el6" src="ptlib-2.6.5-5.el6.src.rpm" version="2.6.5"><filename>ptlib-devel-2.6.5-5.el6.x86_64.rpm</filename><sum type="sha256">68c8fa754a0dd07015285f376ab3f96e5b0c33e5dd5bb4815f1bfc3ed48d0fec</sum></package><package arch="i686" name="ptlib" release="5.el6" src="ptlib-2.6.5-5.el6.src.rpm" version="2.6.5"><filename>ptlib-2.6.5-5.el6.i686.rpm</filename><sum type="sha256">359497cf7eda8bb649cd17213126e722bec14859bee2bb69d12642eb8dbf8cc8</sum></package><package arch="i686" name="ptlib-devel" release="5.el6" src="ptlib-2.6.5-5.el6.src.rpm" version="2.6.5"><filename>ptlib-devel-2.6.5-5.el6.i686.rpm</filename><sum type="sha256">a888915b2f37a30906445472d9495cb45f8f9bc4dd7cc9db358b66cf6d88942a</sum></package><package arch="x86_64" name="ptlib" release="5.el6" src="ptlib-2.6.5-5.el6.src.rpm" version="2.6.5"><filename>ptlib-2.6.5-5.el6.x86_64.rpm</filename><sum type="sha256">f3a3506fac71b7100cc5160aa5e6f541d22f8b08ed2653443424f6fc95071751</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0268" id="RHBA-2016:0268-1" title="Rhba-2016:0268-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0298-1</id><title>Findutils Bug Fix Update</title><description>This update fixes the following bug:

* Previously, calls of the stat() function were not handled correctly when they failed. Consequently, if a stat() call failed, the "find" utility terminated unexpectedly due to assertion failure. With this update, when stat() fails, "find" prints a non-fatal error message and continues the traversal. As a result, "find" no longer terminates incorrectly if stat() fails.</description><release>Scientific Linux</release><issued date="2016-03-08 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="findutils" release="9.el6" src="findutils-4.4.2-9.el6.src.rpm" version="4.4.2"><filename>findutils-4.4.2-9.el6.x86_64.rpm</filename><sum type="sha256">e75985b19cef30b90e7165485df8fc2e81782796810deb0e151143422f315e4a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0298" id="RHBA-2016:0298-1" title="Rhba-2016:0298-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305063" id="1305063" title="Find Command Crashes On Assertion Failure After Stat() Failure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0468-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* Prior to this update, fixing a deadlock in the asynchronous simple paged results requests caused another self deadlock due to a regression. To address this problem, a simple PR_Lock on a connection object has been replaced with a re-entrant PR_Monitor. As a result, the self deadlock no longer occurs.

* When a replace operation for a nonexisting attribute was performed without providing new values, the entry was stored with incorrect metadata: an empty deleted value without an attribute deletion change state number (CSN). This entry could then result in memory corruption and cause the server to terminate unexpectedly. To fix this bug, additional space to store metadata is now allocated and the server no longer crashes in this scenario.

* Previously, a keep alive entry was being created at too many opportunities during replication, potentially causing a race condition when adding the entry to the replica changelog and resulting in operations being dropped from the replication. With this update, unnecessary keep alive entry creation has been eliminated, and missing replication no longer occurs.

* When a callback at BE_TXN in the backend add function failed on a cached entry, the function was attempting to free the entry twice instead of removing it from the cache and then freeing it. This update adds remove and free code to the backend add function and the function no longer attempts to free cached entries twice.

* Keep alive entries are used to prevent skipped updates from being evaluated several times in a fractional replication. If a large number of updates is skipped, these entries can be updated very frequently. Before the keep alive entries are updated, it is tested that they exist. Previously, the test was being logged at a "Fatal" log level, so it was always logged no matter which log level had been set. As a consequence, error logs were filled with unnecessary messages. With this update, the log level for keep alive entry creation has been changed from "Fatal" to "Replication debugging" (8192), and the error log file is no longer filled with "Fatal" messages.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="389-ds-base" release="72.el6_7" src="389-ds-base-1.2.11.15-72.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm</filename><sum type="sha256">c2d71eb754142d77aef4c37398437509f76e5087ddec933b9ca309a20971ed68</sum></package><package arch="i686" name="389-ds-base-devel" release="72.el6_7" src="389-ds-base-1.2.11.15-72.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm</filename><sum type="sha256">0e88197c9e1a02c0174848ad31ae8bf05111386a96f7ad110a6955777fdb05af</sum></package><package arch="x86_64" name="389-ds-base-libs" release="72.el6_7" src="389-ds-base-1.2.11.15-72.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm</filename><sum type="sha256">5473150d8867648644b1c90c85dd7f8cc1828368e4a6fa1624540fda22442303</sum></package><package arch="i686" name="389-ds-base-libs" release="72.el6_7" src="389-ds-base-1.2.11.15-72.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm</filename><sum type="sha256">45e4c0f62220aea2b8826d2f984ce3656bc482f8c3b9196a460fe93dac1f2a7a</sum></package><package arch="x86_64" name="389-ds-base-devel" release="72.el6_7" src="389-ds-base-1.2.11.15-72.el6_7.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm</filename><sum type="sha256">70b46a618fa3dc80548a56b56093602dea4ced722c206936f678c19763233973</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0468" id="RHBA-2016:0468-1" title="Rhba-2016:0468-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298095" id="1298095" title="1.2.11.15-68.El6_7 Ns-Slapd Crash In Ipa Context - C_Mutex Lock Memory Corruption And Self Locks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306572" id="1306572" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309962" id="1309962" title="Keep Alive Entries Can Break Replication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314241" id="1314241" title="Double Free While Adding Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314729" id="1314729" title="Change Severity Of Some Messages Related To &amp;Quot;Keep Alive&amp;Quot; Entries" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0469-1</id><title>Haproxy Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when haproxy was configured to use peer host names, a bug caused host names longer than 32 characters to be truncated. As a consequence, the haproxy configuration files became invalid. This bug has now been fixed, and host names specified as peers can now safely exceed 32 characters.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="haproxy" release="2.el6_7.2" src="haproxy-1.5.4-2.el6_7.2.src.rpm" version="1.5.4"><filename>haproxy-1.5.4-2.el6_7.2.x86_64.rpm</filename><sum type="sha256">98a6fc36e327bbf91703f82d4ab92e6744ff8970ad1bc48e9157fd2987ac310e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0469" id="RHBA-2016:0469-1" title="Rhba-2016:0469-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300386" id="1300386" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0471-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

* Due to a race condition in the termination of httpd child processes during a graceful restart, a child process could exit earlier than the main httpd process expected. Consequently, the main httpd process could try to communicate with an already exited child process, which could lead to a long delay when gracefully restarting httpd. With this update, httpd has been fixed to handle the described situation correctly, it no longer tries to communicate with exited child processes, and a graceful restart is no longer delayed.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="httpd-manual" release="47.sl6.4" src="httpd-2.2.15-47.sl6.4.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-47.sl6.4.noarch.rpm</filename><sum type="sha256">659fe4a137aa75925f448e5be9bd43c54fcef523906a575b135adb5e2d5f5bd7</sum></package><package arch="x86_64" name="httpd-devel" release="47.sl6.4" src="httpd-2.2.15-47.sl6.4.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.4.x86_64.rpm</filename><sum type="sha256">d68e374a35f2e11de44096cdc1f597831a2f37f58a27817ac430faeea6daf296</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="47.sl6.4" src="httpd-2.2.15-47.sl6.4.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-47.sl6.4.x86_64.rpm</filename><sum type="sha256">43f9c3964a5233ce74ee937b72cfbfe4c521ff7029d8fcab8cb3e811393840e2</sum></package><package arch="x86_64" name="httpd" release="47.sl6.4" src="httpd-2.2.15-47.sl6.4.src.rpm" version="2.2.15"><filename>httpd-2.2.15-47.sl6.4.x86_64.rpm</filename><sum type="sha256">b2fcce49dc7a3bc96beba512ce10e0079dd52a960c0d9f4b17cde5ae84f3c2e5</sum></package><package arch="x86_64" name="httpd-tools" release="47.sl6.4" src="httpd-2.2.15-47.sl6.4.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-47.sl6.4.x86_64.rpm</filename><sum type="sha256">768612036aaa91dd115fbdc33a708701ac0e716f01bbe14f2e347f217218c62c</sum></package><package arch="i686" name="httpd-devel" release="47.sl6.4" src="httpd-2.2.15-47.sl6.4.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-47.sl6.4.i686.rpm</filename><sum type="sha256">4057d95794d71eb5d7620ebb3da809a81965be9c597d372fcd4f0f22c3502f42</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0471" id="RHBA-2016:0471-1" title="Rhba-2016:0471-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304712" id="1304712" title="Backport Fix For Issue With Graceful Restart Taking Very Long Time Sometimes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0472-1</id><title>Crash Bug Fix Update</title><description>This update fixes the following bug:

* For the sadump-related formats, the default value of "zero-excluded" mode in the "crash" utility was previously "disabled". As a consequence, the crash utility could fail to open sadump format vmcores. This update changes the default value of "zero-excluded" to "enabled", and "crash" now succeeds in reading excluded pages on sadump-related formats as intended.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="crash" release="3.el6_7.1" src="crash-7.1.0-3.el6_7.1.src.rpm" version="7.1.0"><filename>crash-7.1.0-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">bd678145ab51bbf5ec2cb0c52020c4c2dcb799a30f41e3fad11702872142ba36</sum></package><package arch="x86_64" name="crash-devel" release="3.el6_7.1" src="crash-7.1.0-3.el6_7.1.src.rpm" version="7.1.0"><filename>crash-devel-7.1.0-3.el6_7.1.x86_64.rpm</filename><sum type="sha256">5c70fc3b25dac8e33916a11a52fe4b93306d562e00ccdf1a1b07039b58ba5d83</sum></package><package arch="i686" name="crash-devel" release="3.el6_7.1" src="crash-7.1.0-3.el6_7.1.src.rpm" version="7.1.0"><filename>crash-devel-7.1.0-3.el6_7.1.i686.rpm</filename><sum type="sha256">e0e0190dea925edbdbbb0df8cd8249d781ac9b2c83c655d0f16eb6edd3bdd394</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0472" id="RHBA-2016:0472-1" title="Rhba-2016:0472-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304709" id="1304709" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0473-1</id><title>Kexec-Tools Bug Fix Update</title><description>This update fixes the following bug:

* On RHEV using a real interface for one of its physical interfaces, when a new guest is created, RHEV creates a new vnet for it dynamically, and adds "vnet" to the "rhevm" bridge. Previously, when the network was configured in the kdump.config file, the mkdumprd service failed when handling the "rhevm" bridge because there was no ifcfg-vnet file created for its vnet bridge member. With this update, mkdumprd ignores any "vnet" in the bridge, and mkdumprd thus works properly. As a result, the bridge and kdump on RHEV work as expected, and mkdumprd no longer fails on RHEV hosts with running VMs.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kexec-tools-eppic" release="286.el6_7.2" src="kexec-tools-2.0.0-286.el6_7.2.src.rpm" version="2.0.0"><filename>kexec-tools-eppic-2.0.0-286.el6_7.2.x86_64.rpm</filename><sum type="sha256">c01833a9c8b999fdc000e92207f0fa5c34499a8b6f640d97a0d1e2e0fcea3353</sum></package><package arch="x86_64" name="kexec-tools" release="286.el6_7.2" src="kexec-tools-2.0.0-286.el6_7.2.src.rpm" version="2.0.0"><filename>kexec-tools-2.0.0-286.el6_7.2.x86_64.rpm</filename><sum type="sha256">e7e4467cc64c900ae19062bc46534b48a1e47a063084a65e33271d71122f43d4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0473" id="RHBA-2016:0473-1" title="Rhba-2016:0473-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305481" id="1305481" title="Mkdumprd Fails On Rhev Hosts With Running Vms" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0474-1</id><title>Sssd Bug Fix Update</title><description>This update fixes the following bug:

* When SSSD requested a non-existing netgroup, the sssd_nss process memory usage increased as expected, but then continued growing. With this update, the netgroup entry is removed from the negative cache after an expected timeout period elapses. As a result, the sssd_nss memory usage does not continue growing unnecessarily in the described situation.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="sssd-ldap" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-ldap-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">16ed9167440e6dfd2e9af6477a185860143c3b5afd951cffb86f121c91074bca</sum></package><package arch="i686" name="libsss_simpleifp" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">3b653368dbdfa6b089bc58d0c09d78f6a3f76adcab6543379a905feae51607b3</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">dc9e72548a2fcc7d927b4c2f1dba5372c82d5c9f9aba850d598ae474837b0931</sum></package><package arch="i686" name="sssd-client" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">46794e58428fdf226a5cb0a1c2cfd052950b79303fc03710309f0ae16c29a022</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">c551f1457c4d78a9715458b08cb16b9c768c1fdba138411a49fef9d80602ab93</sum></package><package arch="x86_64" name="sssd-client" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-client-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">7ef17bf6002b2e4446a0ebffaadf0f09027535217631af48d9ce61aa6f7cc367</sum></package><package arch="x86_64" name="libsss_idmap" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">475464b52a08c673d0d77a7ca1bb0db0161f4832094ff7a140285fcac50c9a04</sum></package><package arch="x86_64" name="sssd-common-pac" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-common-pac-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">74c89f654dae4e55a927728c96afc9adb53387ed4304bc6bd8767d4a25d99a43</sum></package><package arch="i686" name="libipa_hbac" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">8b86cef78ad0756dd230bbe398270e6b4b3ea031c2a7fd21e470e5172114d1bf</sum></package><package arch="x86_64" name="libipa_hbac-python" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libipa_hbac-python-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">2c3caa617ed9199b50181705eb333294969b3386f48e77b9511412dcc6dd7abc</sum></package><package arch="x86_64" name="libipa_hbac" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libipa_hbac-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">71941319e3bc4785cb7dc8efd4993cca8bebd7b8b076d00741909ffded67b6c3</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">27ad4fcdd45a4ab1468e50019b303c60b46e895768d9236028fad324bff156af</sum></package><package arch="x86_64" name="sssd" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">f357761434d51c3bfccc95c750ecccace022160cf76b8f88de86b14ef4a5580c</sum></package><package arch="x86_64" name="libsss_simpleifp" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_simpleifp-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">b3335f93dc5135a883b3bc0ce00a6a1b806c5dcdd574543dad11e58e168ff895</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">0bef5b807a94bde80b73ba6b1617a7a1f49760511a3cdb09d835d85d174bd6f6</sum></package><package arch="x86_64" name="sssd-tools" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-tools-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">d9726d443eca32011aa4c82721d917900fd17dadbdc526e3d1abca31b2dd2b9e</sum></package><package arch="i686" name="libipa_hbac-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libipa_hbac-devel-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">0b6989d169f20cd3a1d20221701b39a5586ed092e3656f6f7e8ae81dd7b69968</sum></package><package arch="x86_64" name="sssd-common" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-common-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">f2117782febf7f6cca99a2ab237cc9bf2141c01c5cbb0180b8578bd13715b92c</sum></package><package arch="x86_64" name="sssd-krb5" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-krb5-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">71ec83c180baef192c158aaf47ccc188d44f7281943f68c8d4d2422a190fc389</sum></package><package arch="i686" name="libsss_nss_idmap" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">7b16d9d304e17dafb967958c0b7c5028b738ff6db2e60503c5eebd2776a2872c</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_simpleifp-devel-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">e5ea1fdb43882de8dbf06e931a8413380e6c4878ef850f94974e77a9b20b0089</sum></package><package arch="x86_64" name="sssd-proxy" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-proxy-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">0a13f7339779d7fb172edb701417c2c92cbf49896d44b9565d40d0d15c63bc1a</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-devel-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">27c0096164cef75eef7b735a296f998ad8041fdfd0c30727f39556354bae7c1b</sum></package><package arch="noarch" name="python-sssdconfig" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>python-sssdconfig-1.12.4-47.el6_7.8.noarch.rpm</filename><sum type="sha256">a76bea16af2d62c783caedc021fa0b0da99a17f059fed538eeb412d1bd7a2e43</sum></package><package arch="x86_64" name="sssd-krb5-common" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-krb5-common-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">eec008f34d71cc58addf96d5972f6c9a13549c16b18b5060078b3f98a9e0a5b9</sum></package><package arch="x86_64" name="sssd-ipa" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-ipa-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">c95fcbabe113434af32256fec40be4c3f3ca20582972829c69c038a65c16c101</sum></package><package arch="i686" name="libsss_idmap-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">d01db236ecc81bdfb7f95e2c5601c56863fdadd1b2834996b7604fae68a04990</sum></package><package arch="x86_64" name="libsss_nss_idmap-python" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_nss_idmap-python-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">64eb89487cefba11ef9afa08b901c0dadb78560e1a4fcc4d426f5bdc2b526064</sum></package><package arch="x86_64" name="sssd-dbus" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-dbus-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">5194f562cb1bc4ef2ae2f0557f331b457cfc4f3fc7d34e5a4278a99ed5364e3d</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_idmap-devel-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">28c692e25b0fa08fdb8a6780a2ea1a695ea8c0584e534eb40dab1e9159473e42</sum></package><package arch="x86_64" name="sssd-ad" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>sssd-ad-1.12.4-47.el6_7.8.x86_64.rpm</filename><sum type="sha256">64da9353ee865e42d40b5b3b3cf088270e8f1a7e90aabe2b18c679de0fed6d11</sum></package><package arch="i686" name="libsss_idmap" release="47.el6_7.8" src="sssd-1.12.4-47.el6_7.8.src.rpm" version="1.12.4"><filename>libsss_idmap-1.12.4-47.el6_7.8.i686.rpm</filename><sum type="sha256">d88dda1412f71ac49fd47f8f7ec76c249daf341710f4df8df69fa0bd14ebdb20</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0474" id="RHBA-2016:0474-1" title="Rhba-2016:0474-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305447" id="1305447" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0476-1</id><title>Glusterfs Bug Fix Update</title><description>This update fixes the following bug:

* When installing the glusterfs packages on Scientific Linux 6, the glusterfs-logrotate and glusterfs-georep-logrotate files were previously installed with several global logrotate options. Consequently, the global options affected the default settings in the /etc/logrotate.conf file. The glusterfs RPMs have been rebuilt to prevent the default settings from being overridden. As a result, global settings in /etc/logrotate.conf continue to function as configured without being overridden by settings from glusterfs logrotate files.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="glusterfs-api" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-api-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">dd347d2c3ba469381045760a5ded22343f5cf80f0aa2d9771d2f3abf15138187</sum></package><package arch="x86_64" name="glusterfs-server" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-server-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">d931bfc58eefe3f5bb731bbd7210ffa612883d199d4a36bb9087bef8e7f295ff</sum></package><package arch="x86_64" name="glusterfs-api-devel" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-api-devel-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">a765f4893a4ac6c52dd4201d62bce9488168cd28076b3f196656194ccd5f5a2d</sum></package><package arch="x86_64" name="glusterfs-geo-replication" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-geo-replication-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">f1c8ebf91e999aa55c49d445fb31f3ad6d12564f7a6fecc368c64ac2bc846e92</sum></package><package arch="x86_64" name="glusterfs" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">52dc020d68ebf2996a2d7fc35adade8a712d249767b59b5d6bd74b31d8376e1a</sum></package><package arch="x86_64" name="glusterfs-devel" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-devel-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">67e8e8aee84c66dffd385775cc431256f629187401b33c260a49e99b9a8748f9</sum></package><package arch="x86_64" name="glusterfs-libs" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-libs-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">4da6dce2cf4ca1897abd460d78b837a6e1918a9bfa13b1ff761cce8978a09d5a</sum></package><package arch="noarch" name="glusterfs-resource-agents" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-resource-agents-3.6.0.55-1.el6.noarch.rpm</filename><sum type="sha256">941c73964550bb9529a23f87090a1467fe6ac3fbac6444c2bc9961a00325d209</sum></package><package arch="x86_64" name="glusterfs-rdma" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-rdma-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">dec99e034293429832c941701bf6d671f18a6f4b6548a98ad641c089c70bbe1d</sum></package><package arch="x86_64" name="glusterfs-fuse" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-fuse-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">bc48a0e21be10c143326d59082067dedabdc68f43681034273010b783a132aca</sum></package><package arch="x86_64" name="glusterfs-cli" release="1.el6" src="glusterfs-3.6.0.55-1.el6.src.rpm" version="3.6.0.55"><filename>glusterfs-cli-3.6.0.55-1.el6.x86_64.rpm</filename><sum type="sha256">f8c6f5bb990c73edd89bacf1fd220a11171037af78b409ae3f9cc35f915a8d14</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0476" id="RHBA-2016:0476-1" title="Rhba-2016:0476-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305493" id="1305493" title="Glusterfs Logrotate Config File Clobbers Defaults [Rhel-6]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0477-1</id><title>Virt-Who Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when the Candlepin server needed to process a high amount of network requests, the virt-who utility in some cases stopped responding and logged a "NetworkException: Network error code: 429" message in the /var/log/rhsm/rhsm.log file. With this update, virt-who resends the given request later if the mentioned network exception occurs, which ensures that virt-who continues working in this scenario.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="virt-who" release="10.3.el6_7" src="virt-who-0.12-10.3.el6_7.src.rpm" version="0.12"><filename>virt-who-0.12-10.3.el6_7.noarch.rpm</filename><sum type="sha256">04e06bf5e8c59ae8bc787ca5d32c0a287bd058d7fa42a6eea599c446b01e1e65</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0477" id="RHBA-2016:0477-1" title="Rhba-2016:0477-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306956" id="1306956" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0480-1</id><title>Grub Bug Fix Update</title><description>This update fixes the following bug:

* Previously, GRUB read files stored on the ext4 file system inefficiently. As a consequence, loading of the initial RAM file system (initramfs), which is necessary for booting, took an excessive amount of time if the initramfs was fragmented on more than five extents. With this update, GRUB detects extents that have been already processed and does not read such extents repeatedly. As a result, loading times of fragmented files on the ext4 file system are now significantly lower.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" epoch="1" name="grub" release="94.el6_7.1" src="grub-0.97-94.el6_7.1.src.rpm" version="0.97"><filename>grub-0.97-94.el6_7.1.x86_64.rpm</filename><sum type="sha256">fa8dbfcd0937bf542ce2f9a03f1fe065c26d441bbd8a0de80fc922ac7e826a29</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0480" id="RHBA-2016:0480-1" title="Rhba-2016:0480-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311474" id="1311474" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0481-1</id><title>Mysql Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when the rotate_relay_log() function was called, an unresolved concurrent access to a shared resource occurred. As a consequence, MySQL terminated unexpectedly with a segmentation fault. To fix this bug, a mutex lock on the resource is now used during the rotate_relay_log() call, and MySQL no longer crashes in this scenario.

After installing this update, the MySQL server daemon (mysqld) will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="mysql-embedded" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-embedded-5.1.73-5.el6_7.1.i686.rpm</filename><sum type="sha256">8c209f3693991791942cfcc554fc091c56362ebfa16c5eee7dcc00aad3e2e22f</sum></package><package arch="x86_64" name="mysql-libs" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-libs-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">51a4fbe024afb59cd3b5991321af1c7e478a09ee08a87a708cc6a0b42751c27e</sum></package><package arch="x86_64" name="mysql" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">9e29878a461b9555b0b1cedebb3e468d7b25ba7d47916a7646629bd1f4434e85</sum></package><package arch="i686" name="mysql-libs" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-libs-5.1.73-5.el6_7.1.i686.rpm</filename><sum type="sha256">8e28beb8898f437e5bfee91d71e7e54550e22e8ee18b0af04e7984f8320ca312</sum></package><package arch="x86_64" name="mysql-embedded-devel" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-embedded-devel-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">b6c0d50cd3fa4144b87d59fb99077cc8c7d0ea16c002e6f28c48eed0695f3077</sum></package><package arch="i686" name="mysql-embedded-devel" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-embedded-devel-5.1.73-5.el6_7.1.i686.rpm</filename><sum type="sha256">06c768b48fa8368995082f5a7c202175e406dc64cf3d855bae15f50776ab5d54</sum></package><package arch="x86_64" name="mysql-devel" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-devel-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">09e3d751e4ae0b2b91e0bc7b352571fa3eccaf800089c78cb1a901f7a58d26e4</sum></package><package arch="x86_64" name="mysql-embedded" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-embedded-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">83846aee2086608f3571d0e11b58bc8671e6da1e7a7d1394807c6bd70b291ceb</sum></package><package arch="x86_64" name="mysql-bench" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-bench-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">5c42c5ea8804ce9cf90c1fe91105f185a552571e2892c733778900eb27374a16</sum></package><package arch="i686" name="mysql-devel" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-devel-5.1.73-5.el6_7.1.i686.rpm</filename><sum type="sha256">3a29a774e7203759ddcdac6b6cb23b2b95293ab3741301a6adba327628aee953</sum></package><package arch="x86_64" name="mysql-test" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-test-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">e0885cb0c715a34c29d5bee21ef04f634f9c266b377a6cd8ab07806412370baf</sum></package><package arch="x86_64" name="mysql-server" release="5.el6_7.1" src="mysql-5.1.73-5.el6_7.1.src.rpm" version="5.1.73"><filename>mysql-server-5.1.73-5.el6_7.1.x86_64.rpm</filename><sum type="sha256">1c8d89ac0170756e35813681dd2e45cb8b0e8841d3c58a8f9f7f11104ab3a302</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0481" id="RHBA-2016:0481-1" title="Rhba-2016:0481-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312274" id="1312274" title="Mysql Is Crashing In Reload_Acl_And_Cache At The Time Of Calling Rotate_Relay_Log." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0483-1</id><title>Libvirt Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, the libvirt service in some cases removed the password for the SPICE client from the domain XML file after modifying the file and restoring the domain. As a consequence, anyone was able to connect to the SPICE client without password authentication. With this update, the code that updates XML configuration of a saved domain uses correct internal options to avoid removing passwords. As a result, users can change the XML file of a saved domain without the risk of losing set- up passwords.

After installing the updated packages, libvirtd will be restarted automatically.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="libvirt-lock-sanlock" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-lock-sanlock-0.10.2-54.el6_7.6.x86_64.rpm</filename><sum type="sha256">11bc01ade1717bbfb6a8d61eeac763a292a062c4ac4194dcfa701aaa20674562</sum></package><package arch="x86_64" name="libvirt" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-0.10.2-54.el6_7.6.x86_64.rpm</filename><sum type="sha256">15ebcb6b9244e3e875bfb04a39e516438830d84115b154a9a387f61e1016850c</sum></package><package arch="x86_64" name="libvirt-client" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-54.el6_7.6.x86_64.rpm</filename><sum type="sha256">d446524bbd6f026d88a21559f5099b6b3f93b22fe00cb971c6d0a14902cb8a1e</sum></package><package arch="x86_64" name="libvirt-python" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-python-0.10.2-54.el6_7.6.x86_64.rpm</filename><sum type="sha256">475080f1abb9c817958e6a219c3a6f8892cce6eab7ac056526e4c8e85b24b4db</sum></package><package arch="i686" name="libvirt-devel" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-54.el6_7.6.i686.rpm</filename><sum type="sha256">e41d57168996c8158af1018b99237ce9ef1b09d01a025914fbe10d26451ec310</sum></package><package arch="x86_64" name="libvirt-devel" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-devel-0.10.2-54.el6_7.6.x86_64.rpm</filename><sum type="sha256">367775972b021b54a225b93c158953fd3659fe64827e467d49884388b59eaa96</sum></package><package arch="i686" name="libvirt-client" release="54.el6_7.6" src="libvirt-0.10.2-54.el6_7.6.src.rpm" version="0.10.2"><filename>libvirt-client-0.10.2-54.el6_7.6.i686.rpm</filename><sum type="sha256">033b485d20cfa0e565b926d7ad418ab27565987e1e77a7d0f16a2ee55dd36371</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0483" id="RHBA-2016:0483-1" title="Rhba-2016:0483-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310747" id="1310747" title="Passwords Disappear From Domain Xml Passed To Virdomainrestoreflags Or Virdomainsaveimagedefinexml" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0484-1</id><title>Sg3_Utils Bug Fix Update</title><description>This update fixes the following bug:

* Previously, due to a bug, the rescan-scsi-bus.sh script did not ignore white space properly when scanning the SCSI bus. As a consequence, drives were occasionally remounted in read-only mode. This has been fixed, and white spaces are now properly ignored, resulting in these drives remaining correctly mounted.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="sg3_utils-libs" release="10.el6_7" src="sg3_utils-1.28-10.el6_7.src.rpm" version="1.28"><filename>sg3_utils-libs-1.28-10.el6_7.i686.rpm</filename><sum type="sha256">d1f8217b941b6ef2e37b52573dd185d8568fcd1cab139183672fc5bd13a95f99</sum></package><package arch="x86_64" name="sg3_utils" release="10.el6_7" src="sg3_utils-1.28-10.el6_7.src.rpm" version="1.28"><filename>sg3_utils-1.28-10.el6_7.x86_64.rpm</filename><sum type="sha256">b6f513684f64c5f84c4d7ffd1418ea772ea3d723686e1cfd1ca69cc5f7fc41de</sum></package><package arch="x86_64" name="sg3_utils-devel" release="10.el6_7" src="sg3_utils-1.28-10.el6_7.src.rpm" version="1.28"><filename>sg3_utils-devel-1.28-10.el6_7.x86_64.rpm</filename><sum type="sha256">a3d84d371ba3de3d97408598b88043f16b438cf68bc384700f6c744ed08c7630</sum></package><package arch="i686" name="sg3_utils-devel" release="10.el6_7" src="sg3_utils-1.28-10.el6_7.src.rpm" version="1.28"><filename>sg3_utils-devel-1.28-10.el6_7.i686.rpm</filename><sum type="sha256">d073606c2c4025de3a53dd396d57ad4c5d26c5fff1fc3cd1dcf0b1158a7ac19a</sum></package><package arch="x86_64" name="sg3_utils-libs" release="10.el6_7" src="sg3_utils-1.28-10.el6_7.src.rpm" version="1.28"><filename>sg3_utils-libs-1.28-10.el6_7.x86_64.rpm</filename><sum type="sha256">0e79af92958c445d947c48e93e8b4710828606416ae8493abb890d264771c3e4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0484" id="RHBA-2016:0484-1" title="Rhba-2016:0484-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314887" id="1314887" title="Rescan-Scsi-Bus.Sh Removing And Re-Adding Disks It Probably Shouldn&amp;#39;T" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0485-1</id><title>Libcgroup Bug Fix Update</title><description>This update fixes the following bug:

* Previously, if any group-based rules were defined in the /etc/cgrules.conf file and a user became invalid before the cgrulesengd service could handle a process the user created, cgrulesengd became unresponsive and started consuming excessive resources. This update fixes the underlying source code, and thus ensures that cgrulesengd works as expected in the described scenario.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" name="libcgroup" release="17.el6_7" src="libcgroup-0.40.rc1-17.el6_7.src.rpm" version="0.40.rc1"><filename>libcgroup-0.40.rc1-17.el6_7.i686.rpm</filename><sum type="sha256">e19c0feab56514acd1eda691273d1897885a2d304e778e4495567d5cd834ef4d</sum></package><package arch="x86_64" name="libcgroup-pam" release="17.el6_7" src="libcgroup-0.40.rc1-17.el6_7.src.rpm" version="0.40.rc1"><filename>libcgroup-pam-0.40.rc1-17.el6_7.x86_64.rpm</filename><sum type="sha256">c25246ab293d97975186fe7a7d51bbd031a663366d029926e91f48cfca697566</sum></package><package arch="x86_64" name="libcgroup-devel" release="17.el6_7" src="libcgroup-0.40.rc1-17.el6_7.src.rpm" version="0.40.rc1"><filename>libcgroup-devel-0.40.rc1-17.el6_7.x86_64.rpm</filename><sum type="sha256">5e5b70e99b91477237facac4f82c7694799526166f3ed56a9189601c47129b76</sum></package><package arch="i686" name="libcgroup-pam" release="17.el6_7" src="libcgroup-0.40.rc1-17.el6_7.src.rpm" version="0.40.rc1"><filename>libcgroup-pam-0.40.rc1-17.el6_7.i686.rpm</filename><sum type="sha256">d205f937f9f1f51c5fa4983dcfee6ee7ef978847142333fbb3ff13be4d14e6f1</sum></package><package arch="i686" name="libcgroup-devel" release="17.el6_7" src="libcgroup-0.40.rc1-17.el6_7.src.rpm" version="0.40.rc1"><filename>libcgroup-devel-0.40.rc1-17.el6_7.i686.rpm</filename><sum type="sha256">0d5508e47656af89cf83e3d0aa3b497886e7fa36b61930c049287e555455b6b8</sum></package><package arch="x86_64" name="libcgroup" release="17.el6_7" src="libcgroup-0.40.rc1-17.el6_7.src.rpm" version="0.40.rc1"><filename>libcgroup-0.40.rc1-17.el6_7.x86_64.rpm</filename><sum type="sha256">e0170d1d31844c58443d6ffcce8b16cbb640a8cd472e3087a68bc33545691b61</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0485" id="RHBA-2016:0485-1" title="Rhba-2016:0485-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314825" id="1314825" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0486-1</id><title>Zsh Bug Fix Update</title><description>This update fixes the following bug:

* Previously, if the zsh process received a signal during the execution of a memory allocation function and the signal handler attempted to allocate or free memory, zsh entered a deadlock and became unresponsive. With this update, signal handlers are no longer enabled while handling the global state of zsh or while using the heap memory allocator, which ensures that the described deadlock no longer occurs.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="zsh-html" release="4.el6_7.2" src="zsh-4.3.11-4.el6_7.2.src.rpm" version="4.3.11"><filename>zsh-html-4.3.11-4.el6_7.2.x86_64.rpm</filename><sum type="sha256">2566aa32cb69793d62bd1f6e45ed80d4fa2d1fba3ed385cf79ddc3eefb860c9b</sum></package><package arch="x86_64" name="zsh" release="4.el6_7.2" src="zsh-4.3.11-4.el6_7.2.src.rpm" version="4.3.11"><filename>zsh-4.3.11-4.el6_7.2.x86_64.rpm</filename><sum type="sha256">764f053562044b7878af73184fee0aa2637ceec390a0a23244fb938a0558e4b8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0486" id="RHBA-2016:0486-1" title="Rhba-2016:0486-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316945" id="1316945" title="Bld_Eprog() Signal Leak" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0487-1</id><title>Vsftpd Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when a quota was set on a NFS shared disk and the vsftpd daemon tried to upload a file bigger than the disk quota, the error code was available only after closing the file but vsftpd did not check for this error. As a consequence, vsftpd did not inform the client application that file had not been uploaded correctly. With this update, vsftpd checks the error code of the close() function and then sends the error code to the client. As a result, when a disk quota on a NFS share is exceeded, the client is now informed about the file not being uploaded correctly.

The vsftpd daemon must be restarted for this update to take effect.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="vsftpd" release="14.el6_7.1" src="vsftpd-2.2.2-14.el6_7.1.src.rpm" version="2.2.2"><filename>vsftpd-2.2.2-14.el6_7.1.x86_64.rpm</filename><sum type="sha256">13ad9eccbff57c7b0cbc508d71159458e384d85d16c5b84f5cbb8a5982436ba1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0487" id="RHBA-2016:0487-1" title="Rhba-2016:0487-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299343" id="1299343" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0488-1</id><title>Kdebase Bug Fix Update</title><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="i686" epoch="6" name="kdebase-devel" release="7.el6_7" src="kdebase-4.3.4-7.el6_7.src.rpm" version="4.3.4"><filename>kdebase-devel-4.3.4-7.el6_7.i686.rpm</filename><sum type="sha256">bac75562f22a90f1bf304fe6eb34da2a38af799a9abd72c43a7b6abb6cff5224</sum></package><package arch="x86_64" epoch="6" name="kdebase-libs" release="7.el6_7" src="kdebase-4.3.4-7.el6_7.src.rpm" version="4.3.4"><filename>kdebase-libs-4.3.4-7.el6_7.x86_64.rpm</filename><sum type="sha256">6368b13de805e540bca21290c0d1f89ad9ce763d501b6d186aac94d66aa89dae</sum></package><package arch="i686" epoch="6" name="kdebase-libs" release="7.el6_7" src="kdebase-4.3.4-7.el6_7.src.rpm" version="4.3.4"><filename>kdebase-libs-4.3.4-7.el6_7.i686.rpm</filename><sum type="sha256">453dad120c6f6d5047011a5e4590fbb419157137f78fdce884cf5928ca61d52d</sum></package><package arch="x86_64" epoch="6" name="kdebase" release="7.el6_7" src="kdebase-4.3.4-7.el6_7.src.rpm" version="4.3.4"><filename>kdebase-4.3.4-7.el6_7.x86_64.rpm</filename><sum type="sha256">bf86348e2fc87216d9e70b6e8cdf240e8b85857f428b1a7601918db49aa16540</sum></package><package arch="x86_64" epoch="6" name="kdebase-devel" release="7.el6_7" src="kdebase-4.3.4-7.el6_7.src.rpm" version="4.3.4"><filename>kdebase-devel-4.3.4-7.el6_7.x86_64.rpm</filename><sum type="sha256">5ca0f2d5cfe3ef4b76e545cbc9f894e33a8846ec3e6650374a40d52ca63b1ca7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0488" id="RHBA-2016:0488-1" title="Rhba-2016:0488-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305833" id="1305833" title="System Wide Plasma-Desktop-Appletsrc Settings Not Reflected In User Profile" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0713-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* On certain file systems, Scientific Linux 6 previously terminated unexpectedly during the shutdown or reboot sequence due to a race condition. This update adds the "sleep 1" command to the shutdown sequence, which prevents the race condition from occurring.</description><release>Scientific Linux</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="initscripts" release="1.el6_7.5" src="initscripts-9.03.49-1.el6_7.5.src.rpm" version="9.03.49"><filename>initscripts-9.03.49-1.el6_7.5.x86_64.rpm</filename><sum type="sha256">a39ea2803c2c356d46bc1862d2a80228a28447b7a090777ee92e243c9e3ef85d</sum></package><package arch="x86_64" name="debugmode" release="1.el6_7.5" src="initscripts-9.03.49-1.el6_7.5.src.rpm" version="9.03.49"><filename>debugmode-9.03.49-1.el6_7.5.x86_64.rpm</filename><sum type="sha256">db8de852a3bc6f0989cf7a8ebf73aa6ee9f6847ded88d97100bf948d014e8ce3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0713" id="RHBA-2016:0713-1" title="Rhba-2016:0713-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315697" id="1315697" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0714-1</id><title>Mod_Nss Bug Fix Update</title><description>This update fixes the following bug:

* Previously, mod_nss ignored the NSSProtocol setting when the NSS FIPS mode was enabled. A patch has been applied, and NSSProtocol is no longer ignored in this situation.

The httpd service must be restarted for this update to take effect.</description><release>Scientific Linux</release><issued date="2016-05-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="mod_nss" release="2.el6_7" src="mod_nss-1.0.10-2.el6_7.src.rpm" version="1.0.10"><filename>mod_nss-1.0.10-2.el6_7.x86_64.rpm</filename><sum type="sha256">7e73805c4e661d0abce82ebab37ff9ff0182d16551dbd43c41042f884afc0328</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0714" id="RHBA-2016:0714-1" title="Rhba-2016:0714-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322304" id="1322304" title="Nssprotocol Is Ignored When Nssfips Is Enabled." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0717-1</id><title>Kdebase-Workspace Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the Plasma Desktop environment terminated unexpectedly when trying to access a nonexistent task in the Task Manager. This has been fixed, and Plasma Desktop no longer crashes in the described scenario.</description><release>Scientific Linux</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kdebase-workspace-akonadi" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-akonadi-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">33c70b69bd52c662bf876e74ae601107cd7a669fd3f124684fcf8bc92e57d9b9</sum></package><package arch="i686" name="kdebase-workspace-devel" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-devel-4.3.4-33.el6_7.i686.rpm</filename><sum type="sha256">c2480894db311cd6521301e8184a60514f1f309db16ed12fd926f5e3fabdd62e</sum></package><package arch="x86_64" name="ksysguardd" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>ksysguardd-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">9a77278789cccead159be917cd27c164892ec7cf1df13af53a56b7bb1582e2e7</sum></package><package arch="x86_64" name="kdebase-workspace" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">90d79cf72464e2a57d0475bf6bba92bba28b25a90836c4f1363577e2477b36e7</sum></package><package arch="x86_64" name="kdebase-workspace-devel" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-devel-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">f0b37a68f3e6299fae1073deadf601f1d42d4c55bc29387119fd805a911e6a52</sum></package><package arch="x86_64" name="kdm" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdm-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">4ca64d48cbb8e076ae37a4cefd5511bee12ceeb44b651ab70d48dcc568392f7c</sum></package><package arch="x86_64" name="kdebase-workspace-libs" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-libs-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">85ecb4e8316e1d1d1a2873b8dfcea3870bcd40edb1c4a7cd0899993741b4f9dc</sum></package><package arch="x86_64" name="kdebase-workspace-python-applet" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-python-applet-4.3.4-33.el6_7.x86_64.rpm</filename><sum type="sha256">6b2df125f3d803df58e93a2d815cac940edaa98df2be8dcc94f95abf104634fb</sum></package><package arch="noarch" name="oxygen-cursor-themes" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>oxygen-cursor-themes-4.3.4-33.el6_7.noarch.rpm</filename><sum type="sha256">f73bc7e8d4af367857f00e4706e2aff567f5eecfa48f5edf91ff8d225b3da679</sum></package><package arch="i686" name="kdebase-workspace-libs" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-libs-4.3.4-33.el6_7.i686.rpm</filename><sum type="sha256">f95275ab8d48b3ffbbfd71e627136cbc2547d937864c89fa91b0b7861c370183</sum></package><package arch="noarch" name="kdebase-workspace-wallpapers" release="33.el6_7" src="kdebase-workspace-4.3.4-33.el6_7.src.rpm" version="4.3.4"><filename>kdebase-workspace-wallpapers-4.3.4-33.el6_7.noarch.rpm</filename><sum type="sha256">4074a95582f2c6c483f39788c6e86688470a2d45c8a64e15b2bc4d5cf03b0d3e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0717" id="RHBA-2016:0717-1" title="Rhba-2016:0717-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320510" id="1320510" title="Plasma-Desktop Crashes In Taskmanager::Taskitem::Task" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:1464-1</id><title>New Packages: Kmod-Oracleasm</title><description>Oracle ASM (Automated Storage Management)  is a data volume manager for Oracle databases. ASMLib is an optional utility that can be used on Linux systems to manage Oracle ASM devices. ASMLib consists of the following components:

- kmod-oracleasm (an open-source (GPL) kernel module package) - oracleasm- support (an open-source (GPL) utilities package) - oracleasmlib (a proprietary library package)

ASM features and functionality are available without ASMLib. In addition, the use of ASMLib does not affect database performance.

This enhancement update adds the kmod-oracleasm packages to Scientific Linux 6.

Scientific Linux 6 customers who use ASMLib can obtain the other two components, oracleasmlib and oracleasm-support, using the instructions here:

Note that Red Hat is continuing to develop fully open-source alternatives to ASMLib. Red Hat has provided a reference architecture for Oracle RAC clusters using upstream-accepted technologies such as dm-multipath and udev.  This reference architecture is available at:</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-oracleasm" release="5.el6_7" src="oracleasm-2.0.8-5.el6_7.src.rpm" version="2.0.8"><filename>kmod-oracleasm-2.0.8-5.el6_7.x86_64.rpm</filename><sum type="sha256">1a4425e605a9b255c5436ca10a43c4d3703d8fefffae46a6614988494f6f22c8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1464-1" id="RHEA-2015:1464-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:1600-1</id><title>New Packages: Kmod-Iwlwifi</title><description>The kmod-iwlwifi packages provide kernel modules for controlling the Intel Dual Band Wireless-AC 7265.

This enhancement update adds the kmod-iwlwifi packages to Scientific Linux 6.</description><issued date="2015-08-21 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-iwlwifi_dup" release="1.el6_6" src="iwlwifi_dup-0.1_rh1-1.el6_6.src.rpm" version="0.1_rh1"><filename>kmod-iwlwifi_dup-0.1_rh1-1.el6_6.x86_64.rpm</filename><sum type="sha256">970a6f81f175580638c41a1bf80c09fc6150ab16ca469c1f82edd08a7ca74e6a</sum></package><package arch="x86_64" name="kmod-iwlwifi_dup-firmware" release="1.el6_6" src="iwlwifi_dup-0.1_rh1-1.el6_6.src.rpm" version="0.1_rh1"><filename>kmod-iwlwifi_dup-firmware-0.1_rh1-1.el6_6.x86_64.rpm</filename><sum type="sha256">e90d7e99feb1fe33a1ea970dd5dbaf6685eea6a1b0a241698caf4f6ffb0f6b47</sum></package><package arch="x86_64" name="kmod-cfg80211_dup" release="1.el6_6" src="cfg80211_dup-0.1_rh1-1.el6_6.src.rpm" version="0.1_rh1"><filename>kmod-cfg80211_dup-0.1_rh1-1.el6_6.x86_64.rpm</filename><sum type="sha256">0f1f0715634f646c6df7bb9dfa45e3b2467b36585fba4ba73c729eaa7667f71c</sum></package><package arch="x86_64" name="kmod-mac80211_dup" release="1.el6_6" src="mac80211_dup-0.1_rh1-1.el6_6.src.rpm" version="0.1_rh1"><filename>kmod-mac80211_dup-0.1_rh1-1.el6_6.x86_64.rpm</filename><sum type="sha256">1d72d7bfc4887b3a93ce65373bd60034d7794d93f3f6fe1d544998e6fd99b62a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1600-1" id="RHEA-2015:1600-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:1625-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancement:</description><issued date="2015-08-18 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2015f-1.el6.src.rpm" version="2015f"><filename>tzdata-2015f-1.el6.noarch.rpm</filename><sum type="sha256">29bb780962570ad2116cb76509c92060793374b4c2a9dc76bf4641b6ea2d5cbc</sum></package><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2015f-1.el6.src.rpm" version="2015f"><filename>tzdata-java-2015f-1.el6.noarch.rpm</filename><sum type="sha256">01d9cc1100b2e29e26986b395ef37180ab5e9cffd51fffb70a214f9a55516509</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1625-1" id="RHEA-2015:1625-1" title="Upstream Announcement" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:1863-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2015g, which provides a number of enhancements over the previous version. Namely:

* Turkey's 2015 fall-back transition is scheduled for November 8, not October 25. * Norfolk moves from +1130 to +1100 on October 4, 2015 at 02:00 local time. * Fiji's 2016 fall-back transition is scheduled for January 17, not January 24. * Fort Nelson, British Columbia will not fall back on November 1, 2015. Also, British Colombia has effectively been on MST (-0700) since it advanced its clocks on March 8, 2015.</description><release>Scientific Linux</release><issued date="2015-10-13 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="tzdata-java" release="2.el6" src="tzdata-2015g-2.el6.src.rpm" version="2015g"><filename>tzdata-java-2015g-2.el6.noarch.rpm</filename><sum type="sha256">09107c65790967117273498713d15a45b55d6a88f4d8537382371f2c3a6e75d6</sum></package><package arch="noarch" name="tzdata" release="2.el6" src="tzdata-2015g-2.el6.src.rpm" version="2015g"><filename>tzdata-2015g-2.el6.noarch.rpm</filename><sum type="sha256">4d19f56655023dce35c92f2fb582ad05095bd976093b9c76b2a89fdad6cc6d01</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:1863" id="RHEA-2015:1863-1" title="Rhea-2015:1863-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265766" id="1265766" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267710" id="1267710" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267712" id="1267712" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267716" id="1267716" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:2630-1</id><title>Networkmanager-Openswan Enhancement Update</title><description>This update adds the following enhancement:

* In addition to Openswan, the NetworkManager-openswan VPN plug-in now also supports Libreswan.</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="NetworkManager-openswan" release="10.el6_7" src="NetworkManager-openswan-0.8.0-10.el6_7.src.rpm" version="0.8.0"><filename>NetworkManager-openswan-0.8.0-10.el6_7.x86_64.rpm</filename><sum type="sha256">dff1b5f10a5c911a52203bcdf02a0aa6fc5392c9627ac815c53dcf06220da289</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:2630" id="RHEA-2015:2630-1" title="Rhea-2015:2630-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1284759" id="1284759" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2015:2637-1</id><title>New Packages: Kmod-Oracleasm</title><description>Oracle ASM (Automated Storage Management)  is a data volume manager for Oracle databases. ASMLib is an optional utility that can be used on Linux systems to manage Oracle ASM devices. ASMLib consists of the following components:

- kmod-oracleasm (an open-source (GPL) kernel module package) - oracleasm- support (an open-source (GPL) utilities package) - oracleasmlib (a proprietary library package)

ASM features and functionality are available without ASMLib. In addition, the use of ASMLib does not affect database performance.

This enhancement update adds the kmod-oracleasm packages to Scientific Linux 6.

Scientific Linux 6 customers who use ASMLib can obtain the other two components, oracleasmlib and oracleasm-support, using the instructions here:

Note that Red Hat is continuing to develop fully open-source alternatives to ASMLib. Red Hat has provided a reference architecture for Oracle RAC clusters using upstream-accepted technologies such as dm-multipath and udev.  This reference architecture is available at:</description><release>Scientific Linux</release><issued date="2016-01-12 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-oracleasm" release="6.el6_7" src="oracleasm-2.0.8-6.el6_7.src.rpm" version="2.0.8"><filename>kmod-oracleasm-2.0.8-6.el6_7.x86_64.rpm</filename><sum type="sha256">6d47363d53c8ac1af3b8a9b870a5628c35c17013b9096a76544472a645565307</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2015:2637" id="RHEA-2015:2637-1" title="Rhea-2015:2637-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279998" id="1279998" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0028-1</id><title>Wget Enhancement Update</title><description>This update adds the following enhancement:

* Additional unit tests are now run when building the wget packages, which ensures more reliable functionality of the packages after installation.</description><release>Scientific Linux</release><issued date="2016-01-19 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="wget" release="8.el6" src="wget-1.12-8.el6.src.rpm" version="1.12"><filename>wget-1.12-8.el6.x86_64.rpm</filename><sum type="sha256">cca30c61b9fd2c6bf9c2da20e33f2a4ad10cb990677da3c4cce9875a0983f863</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0028" id="RHEA-2016:0028-1" title="Rhea-2016:0028-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1295847" id="1295847" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0044-1</id><title>New Packages: Kmod-Igb</title><description>The kmod-igb packages contain the Intel I354 NIC (i354 with Marvell 1512 PHY) kernel module.

This enhancement update adds the kmod-igb packages to Scientific Linux 6.</description><release>Scientific Linux</release><issued date="2016-01-19 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-igb" release="1.el6_7" src="igb-5.2.15_k-1.el6_7.src.rpm" version="5.2.15_k"><filename>kmod-igb-5.2.15_k-1.el6_7.x86_64.rpm</filename><sum type="sha256">4d9ad5862c33ca5eb3bcf05111feab59b5d79baf2310a6f9509f323faf79a686</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0044" id="RHEA-2016:0044-1" title="Rhea-2016:0044-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288432" id="1288432" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0240-1</id><title>Acpid Enhancement Update</title><description>This update adds the following enhancement:

* This update introduces the /etc/sysconfig/acpid configuration file, in which the "--logevents" option can be specified for the acpid service. With this option enabled, the syslog daemon logs all events and actions performed by acpid.</description><release>Scientific Linux</release><issued date="2016-02-23 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="acpid" release="3.el6" src="acpid-1.0.10-3.el6.src.rpm" version="1.0.10"><filename>acpid-1.0.10-3.el6.x86_64.rpm</filename><sum type="sha256">840c11c6751d38c3fc7125218d75b7ee8ea33352c6caba67ad1f31593b593797</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0240" id="RHEA-2016:0240-1" title="Rhea-2016:0240-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1015033" id="1015033" title="Acpid Doesn&apos;T Have Its Own Entry In The /Etc/Sysconfig Directory" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0470-1</id><title>Ca-Certificates Bug Fix And</title><description>The ca-certificates package has been upgraded to upstream version 2.6, which provides a number of bug fixes and enhancements over the previous version. Notably, the package now contains the following modifications:

The certificate store has been upgraded to include the changes contained in version 2.6 of the CA certificate list published by the Mozilla Foundation at the mozilla.org website as part of the Network Security Services (NSS) version 3.21. However, for compatibility reasons, several root CA certificates with an RSA key size of 1024 bits have been kept as trusted.

Mozilla previously removed trust from several legacy CA certificates containing 1024-bit RSA keys. This version of the ca-certificates package modifies the Mozilla list to keep these legacy CA certificates trusted by default. These modifications have been made to ensure compatibility with existing PKI deployments and with software based on OpenSSL or GnuTLS.

The ca-certificates package also includes the "ca-legacy" command, which can be used to disable the mentioned compatibility modifications. Refer to the ca-legacy(8) manual page for more information on how to use the command.

Users who intend to disable the legacy modifications are also advised to refer to the following Knowledge Base article, which provides details about these modifications and the potential consequences of disabling them:

Note that using the unified CA store is required to be able to use the "ca-legacy" command. See the update-ca-trust(8) manual page to learn how to enable the unified CA store.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="noarch" name="ca-certificates" release="65.0.1.el6_7" src="ca-certificates-2015.2.6-65.0.1.el6_7.src.rpm" version="2015.2.6"><filename>ca-certificates-2015.2.6-65.0.1.el6_7.noarch.rpm</filename><sum type="sha256">0e3d6af02c784d568a6043f722156b300c22f5431d595968c4f7360dfefed54e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0470" id="RHEA-2016:0470-1" title="Rhea-2016:0470-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299863" id="1299863" title="Rebase Rhel 6.7.Z To Ca-Certificates 2.6 (From Nss 3.21) In Preparation For Firefox 45." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0479-1</id><title>New Packages: Kmod-Sdhci</title><description>The kmod-sdhci packages contain the Secure Digital Host Controller Interface (SDHCI) core driver kernel module. These packages add support for the O2Micro card reader Id 8520.

The kernel modules delivered by this erratum have been made available as part of the Red Hat Driver Update Program, which provides updated kernel modules that add support for selected devices in advance of the next Scientific Linux minor update release. We strongly recommend that these kernel modules be only used when it is necessary to enable the specific hardware mentioned in this erratum. Partners and customers should continue to use the driver that is shipped in the latest Scientific Linux kernel for all other devices that require this driver.</description><release>Scientific Linux</release><issued date="2016-03-22 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-sdhci" release="1.el6_7" src="sdhci-0.1_rh1-1.el6_7.src.rpm" version="0.1_rh1"><filename>kmod-sdhci-0.1_rh1-1.el6_7.x86_64.rpm</filename><sum type="sha256">49a0a1cd8adc02cc0c28791e1e19d328cd2cd9681804148f087f26b9db59f588</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0479" id="RHEA-2016:0479-1" title="Rhea-2016:0479-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302115" id="1302115" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0609-1</id><title>New Packages: Kmod-Bnx2X</title><description>The kmod-bnx2x packages contain the QLogic NetXtreme II 10GbE Networking kernel module.

The kernel modules delivered by this erratum have been made available as part of the Red Hat Driver Update Program, which provides updated kernel modules that add support for selected devices in advance of the next Scientific Linux minor update release. We strongly recommend that these kernel modules be only used when it is necessary to enable the specific hardware mentioned in this erratum. Partners and customers should continue to use the driver that is shipped in the latest Scientific Linux kernel for all other devices that require this driver.</description><release>Scientific Linux</release><issued date="2016-04-19 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-bnx2x-firmware" release="1.el6_7" src="bnx2x-1.712.30_0-1.el6_7.src.rpm" version="1.712.30_0"><filename>kmod-bnx2x-firmware-1.712.30_0-1.el6_7.x86_64.rpm</filename><sum type="sha256">7ba9d64df816f4bc4e2813fa5b35f182ac4ed3aab3e1080c60b0a1a572bb48ba</sum></package><package arch="x86_64" name="kmod-bnx2x" release="1.el6_7" src="bnx2x-1.712.30_0-1.el6_7.src.rpm" version="1.712.30_0"><filename>kmod-bnx2x-1.712.30_0-1.el6_7.x86_64.rpm</filename><sum type="sha256">1a8098bc8e88a3681b4de117837f130b1758c5b0c9e3eec30998fe4b0229ffb4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0609" id="RHEA-2016:0609-1" title="Rhea-2016:0609-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316622" id="1316622" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0682-1</id><title>New Packages: Kmod-Qla2Xxx</title><description>The kmod-qla2xxx packages contain the QLogic Fibre Channel HBA Driver core driver kernel module. The new PCI ID supported by this package is 1077:2261.

* This enhancement update adds the kmod-qla2xxx packages to Scientific Linux 6.

The kernel modules delivered by this erratum have been made available as part of the Red Hat Driver Update Program, which provides updated kernel modules that add support for selected devices in advance of the next Scientific Linux minor update release.

We strongly recommend that these kernel modules are only used when it is necessary to enable the specific hardware mentioned in this erratum. Partners and customers should not install these packages if they use other hardware.</description><release>Scientific Linux</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SL6"><name>Scientific Linux 6</name><package arch="x86_64" name="kmod-qla2xxx" release="1.el6_7" src="qla2xxx-8.07.00.26.06.8_k-1.el6_7.src.rpm" version="8.07.00.26.06.8_k"><filename>kmod-qla2xxx-8.07.00.26.06.8_k-1.el6_7.x86_64.rpm</filename><sum type="sha256">806f4d719bb81c37e463375e67f97b8af0ea2f95670f3e34e54259ec2c151376</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0682" id="RHEA-2016:0682-1" title="Rhea-2016:0682-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320866" id="1320866" type="bugzilla" /></references></update></updates>