<?xml-stylesheet type="text/xsl" href="updateinfo.xsl"?>
<updates><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0990-1</id><title>Libtdb Bug Fix Update</title><description>This update fixes the following bug:

* File _tdb_text.py is supposed to be packaged in the python-tdb subpackage, but was instead packaged in the main package libtdb. This update ensures that _tdb_text.py is packaged correctly.</description><release>Scientific Linux Fermi</release><issued date="2016-05-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-tdb" release="3.el6_8.2" src="libtdb-1.3.8-3.el6_8.2.src.rpm" version="1.3.8"><filename>python-tdb-1.3.8-3.el6_8.2.x86_64.rpm</filename><sum type="sha256">e1a09de8b3122449d6719c1fda70c908b0095f6e1b86029eac23ca6cb40cf6e9</sum></package><package arch="x86_64" name="libtdb-devel" release="3.el6_8.2" src="libtdb-1.3.8-3.el6_8.2.src.rpm" version="1.3.8"><filename>libtdb-devel-1.3.8-3.el6_8.2.x86_64.rpm</filename><sum type="sha256">b6c696b2819cc30475719239ad46d6efc8831ec664c0e3c2a73a4c8d27bdbfa9</sum></package><package arch="i686" name="libtdb" release="3.el6_8.2" src="libtdb-1.3.8-3.el6_8.2.src.rpm" version="1.3.8"><filename>libtdb-1.3.8-3.el6_8.2.i686.rpm</filename><sum type="sha256">8c79e3c2fb1ba2c811f94eeb420b7d153c5c2717dc7ac8169b258e9b346f3567</sum></package><package arch="i686" name="libtdb-devel" release="3.el6_8.2" src="libtdb-1.3.8-3.el6_8.2.src.rpm" version="1.3.8"><filename>libtdb-devel-1.3.8-3.el6_8.2.i686.rpm</filename><sum type="sha256">f0a2569d6f4047c7ac58295ebbbb84a4dff2dac6c83493a5fa6ac963888aab95</sum></package><package arch="x86_64" name="tdb-tools" release="3.el6_8.2" src="libtdb-1.3.8-3.el6_8.2.src.rpm" version="1.3.8"><filename>tdb-tools-1.3.8-3.el6_8.2.x86_64.rpm</filename><sum type="sha256">023e00b9985a42ed1793442de2ce2c988a6f90e32a30f8923b9a252bc79698e4</sum></package><package arch="x86_64" name="libtdb" release="3.el6_8.2" src="libtdb-1.3.8-3.el6_8.2.src.rpm" version="1.3.8"><filename>libtdb-1.3.8-3.el6_8.2.x86_64.rpm</filename><sum type="sha256">ca09082efda90826f57da7af1369f47e79528126014a4999cf6122c99ca5193e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0990" id="RHBA-2016:0990-1" title="Rhba-2016:0990-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329664" id="1329664" title="Tdb Mispackaged Tdb_Text.Py File" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0991-1</id><title>Openssh Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the ssh-copy-id utility was unable to copy the SSH key to machines that used a shell that did not recognize the "~/" notation for home directories, such as the SUNWbash shell on SunOS systems. Attempts to use ssh-copy-id failed with the following error message:

mkdir: Failed to make directory "~/.ssh"; No such file or directory    sh: ~/.ssh/authorized_keys: cannot create

The ssh-copy-id code has been modified to avoid using "~/" when referring to a home directory. As a result, copying SSH keys works as expected in the described situation.</description><release>Scientific Linux Fermi</release><issued date="2015-05-19 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="pam_ssh_agent_auth" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-118.1.el6_8.i686.rpm</filename><sum type="sha256">c6e6bcbfe0520909eafd884b135f25ef97800cfd75b7f059526031951d996d5a</sum></package><package arch="x86_64" name="openssh" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="5.3p1"><filename>openssh-5.3p1-118.1.el6_8.x86_64.rpm</filename><sum type="sha256">ca35d34ced68d7b15e5a2784ccee5d77c9c04726b64b0da9e7233a4541d0d5f5</sum></package><package arch="x86_64" name="openssh-server" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="5.3p1"><filename>openssh-server-5.3p1-118.1.el6_8.x86_64.rpm</filename><sum type="sha256">b3d3b69111763975a78d7c07f45b60fe4baf66a45828af449cc5c2da5aac2c90</sum></package><package arch="x86_64" name="openssh-askpass" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="5.3p1"><filename>openssh-askpass-5.3p1-118.1.el6_8.x86_64.rpm</filename><sum type="sha256">0f4fa1abcf3939abfd82eefb42e87a08a60f03beadca7b5ad3173c836a68cd96</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-118.1.el6_8.x86_64.rpm</filename><sum type="sha256">13f17faa914947fa1211b70177eb434c67a87b762a4a28d18143849f7164e49f</sum></package><package arch="x86_64" name="openssh-clients" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="5.3p1"><filename>openssh-clients-5.3p1-118.1.el6_8.x86_64.rpm</filename><sum type="sha256">328e68274b9a4f8da013606febfc1395b3dc87d2c8581b37b2b01df3304c9532</sum></package><package arch="x86_64" name="openssh-ldap" release="118.1.el6_8" src="openssh-5.3p1-118.1.el6_8.src.rpm" version="5.3p1"><filename>openssh-ldap-5.3p1-118.1.el6_8.x86_64.rpm</filename><sum type="sha256">269fd1a72ae268d5135849f232bfbf15c8fd5086bbe33c9b1d4ec5bcc17cd024</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0991" id="RHBA-2016:0991-1" title="Rhba-2016:0991-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329976" id="1329976" title="Ssh-Copy-Id Fails With Shells Unaware Of ~/" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0992-1</id><title>Samba Bug Fix Update</title><description>This update fixes the following bugs:

* With the latest security update, the Samba RPC server tried to verify header signings that are not supported by this Samba version. As a consequence, this process fails when a client with enabled header signing support connects. With this update the verification has been disabled and as a result, clients can successfully authenticate to Samba.

* With the latest security update, the smbd process tried to update the wrong Netlogon credentials for the Secure Channel connection against an Active Directory Domain Controller. As a consequence, users could no longer log on to a Samba member server. An update was applied, that generates the correct authentication tokens and as a result, users are now able to successfully authenticate to a Samba member server.

After installing this update, the smb service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-05-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-domainjoin-gui" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">8280deb1ce30a71a3ffb06b46b7f92ada93822c39116b22152a9bed3ac243314</sum></package><package arch="i686" name="samba-winbind-devel" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-35.el6_8.i686.rpm</filename><sum type="sha256">d2b91e978d1cb371391aaf91e20ec5c353ae8e37df74f03e2acf2a314cde5d4b</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">feba02b5c15c48ed0ca4a5f537252b11ae9ec624846746b2989ededde5a9e15a</sum></package><package arch="x86_64" name="samba-glusterfs" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">bccb5983d4f251550662695cd421c6be902873cfef2b076ed515c31277d8d3bc</sum></package><package arch="i686" name="samba-common" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-35.el6_8.i686.rpm</filename><sum type="sha256">87b295984aa681e1deffe8ecd8d06d0b34862a2defee785a606f2093690a6122</sum></package><package arch="x86_64" name="samba-winbind-clients" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">9dbd3da7d9ef21191de5b36755636c5fcd9c23fdceed1f95de440425c6f0b916</sum></package><package arch="i686" name="libsmbclient-devel" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-35.el6_8.i686.rpm</filename><sum type="sha256">60c7142d83658cb2dde6fdfe1df41a76a565a656b82293b1c8cade520142ec80</sum></package><package arch="x86_64" name="samba-doc" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">0c4ab9f31f331c3dbae34bbe133a6b1db1dd9849348a5a2522fcd33c682bff7c</sum></package><package arch="x86_64" name="samba-swat" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">c19943ad81343c97c95dcd143ae58a42ed078b3fee3cf1c89a83c03d5e2da6cb</sum></package><package arch="x86_64" name="samba-common" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">41d0e90abfb1dc038752eaa544f3d3869244912e30a8f0bdc37d788889b69047</sum></package><package arch="x86_64" name="libsmbclient-devel" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">7a6646faab2a81911122680103a905157fe8d05933b3cc415c0c2cbdf08cd4fe</sum></package><package arch="x86_64" name="libsmbclient" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">71fbb40050f25a3eee9c2b37de2e13906779a408459849a09f7311a8d4d2a2ac</sum></package><package arch="x86_64" name="samba-client" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">562481a480a858647cc025fe7b4254dc187e79d377d47768a9c96421d110c476</sum></package><package arch="i686" name="libsmbclient" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-35.el6_8.i686.rpm</filename><sum type="sha256">f0f438858712d4ce0e6021ab7f6782f4d984a553dfb371446d69e75359d5452d</sum></package><package arch="x86_64" name="samba-winbind" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">b179a780d5da80be56445435b01002b78ebd4265621b87a5d7fee572c7f2b63f</sum></package><package arch="x86_64" name="samba" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">ea224f5ad860b3c6816883832e4f9e5df785b0a999e7d97f3532f3c0155d3687</sum></package><package arch="i686" name="samba-winbind-clients" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-35.el6_8.i686.rpm</filename><sum type="sha256">2c5eccbce75d31aab216234714502abe37187019ab4f045df523e142e6a4b870</sum></package><package arch="x86_64" name="samba-winbind-devel" release="35.el6_8" src="samba-3.6.23-35.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-35.el6_8.x86_64.rpm</filename><sum type="sha256">9141d39f338c489754ae9853b4fc6f919c18637d9aa9982070124d6841a949a9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0992" id="RHBA-2016:0992-1" title="Rhba-2016:0992-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329967" id="1329967" title="Auth_Domain Fails To Create Schannel Connection To The Dc Because Netlogon Credentials Are Not Updated Correctly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329975" id="1329975" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0995-1</id><title>Dracut Bug Fix Update</title><description>This update fixes the following bug:

* A previous regression in dracut caused systems with iSCSI offloading or iSCSI Boot Firmware Table (iBFT) to stop booting in some cases. Consequently, freshly installed Scientific Linux 6.8 systems with "iscsi_firmware" on the kernel command line could be unable to boot. This update fixes the bug, and systems in the described scenario are able to boot.</description><release>Scientific Linux Fermi</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="dracut-kernel" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-kernel-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">17642998741daee2d9092d04400c27d97877a6a44df6502edbe97f21a76836a4</sum></package><package arch="noarch" name="dracut" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">755b97ea8f38cbb6f4a76b85eac4a2b5c117de343e15bc7270a2e28e17a14b03</sum></package><package arch="noarch" name="dracut-fips-aesni" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-fips-aesni-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">7e9f6bf09d401fe1120a23cd6e5ec1278761dc942a9f4add2f03c0ccd6a95dee</sum></package><package arch="noarch" name="dracut-generic" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-generic-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">41f165ab4da51641d88966489c7708879c496ca78180d90ec1f160f378976423</sum></package><package arch="noarch" name="dracut-network" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-network-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">0cd1fb15b22fd47d2c990b1dc95a7f855ff48c09937f1e80bd68dce010bfb6e9</sum></package><package arch="noarch" name="dracut-fips" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-fips-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">3efbb0877197e7eae1e59764d2d892198af29edb030bf3cfd58a925d0b32535a</sum></package><package arch="noarch" name="dracut-tools" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-tools-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">013a84a8fcfa3cc0e14eea50929788adfeaf218409e5b0d962480af8e36a895b</sum></package><package arch="noarch" name="dracut-caps" release="409.el6_8.2" src="dracut-004-409.el6_8.2.src.rpm" version="004"><filename>dracut-caps-004-409.el6_8.2.noarch.rpm</filename><sum type="sha256">11a7c1c68f94c27b5bcd72bc378984f30f459ef92caf03b4b87bbb24d30c6591</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0995" id="RHBA-2016:0995-1" title="Rhba-2016:0995-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331811" id="1331811" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:0998-1</id><title>Firefox Bug Fix Update</title><description>This update fixes the following bug:

* Previously, due to an expired Firefox Add-on certificate, add-ons were disabled and the user could not activate them. This update provides an exception which no longer verifies the sign-off timestamp, so that an add- on signed off by the Firefox certificate is a sufficient condition. As a result, add-ons are no longer disabled due to certificate expiration.

After installing the update, Firefox must be restarted for the changes to take effect.</description><release>Scientific Linux Fermi</release><issued date="2016-05-17 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_8" src="firefox-45.1.1-1.el6_8.src.rpm" version="45.1.1"><filename>firefox-45.1.1-1.el6_8.x86_64.rpm</filename><sum type="sha256">199f9b2a07ff4018eb5a3a17371364b2354c86dea199ec2dee5ac4c915b5aafc</sum></package><package arch="i686" name="firefox" release="1.el6_8" src="firefox-45.1.1-1.el6_8.src.rpm" version="45.1.1"><filename>firefox-45.1.1-1.el6_8.i686.rpm</filename><sum type="sha256">ea239a63ddc50dfd7621ad186c87c07483f1f0009b9770c41524afc7d230a557</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:0998" id="RHBA-2016:0998-1" title="Rhba-2016:0998-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333431" id="1333431" title="[Esr 45.1.1] Addons Installed From Mozilla Are Disabled After May 2Nd" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1005-1</id><title>Java-1.7.0-Openjdk Bug Fix And Enhancement Update</title><description>The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.</description><release>Scientific Linux Fermi</release><issued date="2016-05-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.6.4.el6_8" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.4.el6_8.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-1.7.0.101-2.6.6.4.el6_8.x86_64.rpm</filename><sum type="sha256">86f0eaba0ae6aff28dc02f275f5ce692336dcb8c748c999a162cd7a63059ca05</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.6.4.el6_8" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.4.el6_8.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.4.el6_8.x86_64.rpm</filename><sum type="sha256">d2a1e9ea746aa79b65d75267f104121cde9ee4d6e2caad11f1941521e90db584</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.6.4.el6_8" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.4.el6_8.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-src-1.7.0.101-2.6.6.4.el6_8.x86_64.rpm</filename><sum type="sha256">fdb408dfb6f98e1aa59baaed06ab1b7546677a3a0b1e45821fedfdab9bdf424a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.6.4.el6_8" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.4.el6_8.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.4.el6_8.x86_64.rpm</filename><sum type="sha256">d4cbb82d2ce52d082b2f10a5883e8020c860118ce0a7103a112d4a9632d98b75</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.6.4.el6_8" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.4.el6_8.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.4.el6_8.noarch.rpm</filename><sum type="sha256">d4d5d17810028370e9a9b1ac13cdee6dfeccf19379e2926848fa3de8032e7b17</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1005" id="RHBA-2016:1005-1" title="Rhba-2016:1005-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1006-1</id><title>Java-1.6.0-Openjdk Bug Fix And Enhancement Update</title><description>The java-1.6.0-openjdk packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Java Software Development Kit.</description><release>Scientific Linux Fermi</release><issued date="2016-05-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.11.1.el6_8" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.1.el6_8.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.1.el6_8.x86_64.rpm</filename><sum type="sha256">e87faa2251d44e4c13c62d512c3f4cfe1a744b961293aaffe7831be6d1c9bfaa</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.11.1.el6_8" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.1.el6_8.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-src-1.6.0.39-1.13.11.1.el6_8.x86_64.rpm</filename><sum type="sha256">0446481731d17a1d99f4681ab95f1708cc3ba167895381505a3b0148a0be7acf</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.11.1.el6_8" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.1.el6_8.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.1.el6_8.x86_64.rpm</filename><sum type="sha256">0842b58226d17410bacb73325fa28694a5273946265b8e94f58187bf180cfe0c</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.11.1.el6_8" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.1.el6_8.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.1.el6_8.x86_64.rpm</filename><sum type="sha256">2f8c0968256a5334540359a0b980295afe66147f4ccd17b4d8d3181f1ccd32bc</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.11.1.el6_8" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.1.el6_8.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-1.6.0.39-1.13.11.1.el6_8.x86_64.rpm</filename><sum type="sha256">fbf6265ce2068491d96dd6c6bed33d458c4fe9d1db1a6f5af1525770716d5f2a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1006" id="RHBA-2016:1006-1" title="Rhba-2016:1006-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1185-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bugs:

* When a transparent proxy application was running and the number of established connections on the computer exceeded one million, unrelated processes, such as curl or ssh, were unable to bind to a local IP on the box to initiate a connection. The provided patch fixes the cooperation of the REUSEADDR/NOREUSEADDR socket option, and thus prevents the local port from being exhausted. As a result, the aforementioned bug no longer occurs in the described scenario.

* Previously, packets including the Common IP Security Option (CIPSO) label tag type 5 with certain category ranges were not read correctly. As a consequence, these packets were interpreted with the fallback security label. The provided patch fixes the netlbl_secattr_catmap_setrng() function, and thus fixes this bug.

* When hot removing or adding devices from a RAID1 array, the raid1d daemon could deadlock and become unresponsive in the freeze_array() function. The provided patch includes bio_end_io_list writes in the nr_queued variable to prevent the aforementioned hang from occurring.

The system must be rebooted for this update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kernel-debug-devel" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">ce7550b65de08bdb57506b1e5e471d632e0b5378086f17dada93ab0f22f8acc8</sum></package><package arch="noarch" name="kernel-firmware" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-firmware-2.6.32-642.1.1.el6.noarch.rpm</filename><sum type="sha256">c394546b25a51a281f11c82bf79ad58c98d10f034affc23fbb85d4e2caf57a06</sum></package><package arch="x86_64" name="kernel" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">18e5f54e94f561c2903f4189b62379a0961579715e6006a9ac5914c1b962a154</sum></package><package arch="x86_64" name="kernel-debug" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">e452bc4640ec2c1149258edb5867a3addd193d2b035fbe0b1580c51c5900961b</sum></package><package arch="x86_64" name="perf" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>perf-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">79000de62f40ae3fd7301eb6b98a282ebe175e8d741f1462a6b44382e91c7f76</sum></package><package arch="noarch" name="kernel-doc" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-doc-2.6.32-642.1.1.el6.noarch.rpm</filename><sum type="sha256">51f8280169f834bd4c2b6cb6fbbff033a2402880107679970b0a3da4dae1200a</sum></package><package arch="i686" name="kernel-debug-devel" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-debug-devel-2.6.32-642.1.1.el6.i686.rpm</filename><sum type="sha256">6c7ec57056826ba15813c44eb82e7348e7287c90f1f6d5fd9db86e80983aa4a8</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-abi-whitelists-2.6.32-642.1.1.el6.noarch.rpm</filename><sum type="sha256">1abec81ff3050ff03dbc82a3dcf96a949b6d1476b4c720116ddd5be60727b2e2</sum></package><package arch="x86_64" name="kernel-devel" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-devel-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">0f8000f00799f7a03b801002406b098b0dd96b8d8f68e8fd47fa15d7485564a6</sum></package><package arch="x86_64" name="kernel-headers" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>kernel-headers-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">f085c50a341eec21b8e9e332aab4a0c4af44e19db1a440f68c73df60d5d7f08b</sum></package><package arch="x86_64" name="python-perf" release="642.1.1.el6" src="kernel-2.6.32-642.1.1.el6.src.rpm" version="2.6.32"><filename>python-perf-2.6.32-642.1.1.el6.x86_64.rpm</filename><sum type="sha256">c33f63e316617de5f57196fa10e3497b02d37e79851a535538c015219948f551</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1185" id="RHBA-2016:1185-1" title="Rhba-2016:1185-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333571" id="1333571" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333576" id="1333576" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333579" id="1333579" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1186-1</id><title>Hplip Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when booting with the "nousb" kernel parameter, the hp and hpfax back ends previously terminated unexpectedly with a segmentation fault. The upstream patch fixing the aforementioned segmentation fault has been applied, and hp and hpfax no longer crash in this scenario.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="hplip-libs" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hplip-libs-3.14.6-4.el6.1.i686.rpm</filename><sum type="sha256">ce2b2952e21ead7d50b925b29a4c724d0f861d1a5c675a3900a68ab6e1637ade</sum></package><package arch="x86_64" epoch="1" name="hpijs" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hpijs-3.14.6-4.el6.1.x86_64.rpm</filename><sum type="sha256">8f75ed1da188d2de5ac8442e3316d49acbcd6be87e6286e4a6753d9482aa040c</sum></package><package arch="x86_64" name="hplip-libs" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hplip-libs-3.14.6-4.el6.1.x86_64.rpm</filename><sum type="sha256">6c7870148200dbb2007406c9b4aa199d7ac179339b5f9960bb52386c76b1b81a</sum></package><package arch="x86_64" name="hplip" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hplip-3.14.6-4.el6.1.x86_64.rpm</filename><sum type="sha256">390f721a8d8ea6aa5056b4857556576e2d85e8f1aacd7a3231cba50c710c9266</sum></package><package arch="x86_64" name="hplip-gui" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hplip-gui-3.14.6-4.el6.1.x86_64.rpm</filename><sum type="sha256">4d3dd0f087d5771b115ab39332cfc0493ecd264e9be72bafb353a37fc56515ed</sum></package><package arch="i686" name="hplip-common" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hplip-common-3.14.6-4.el6.1.i686.rpm</filename><sum type="sha256">cf7cfe730b77b2cbb4b66b8c6cc246121d21b16e955ff320c5c6b991c1bf708a</sum></package><package arch="x86_64" name="hplip-common" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>hplip-common-3.14.6-4.el6.1.x86_64.rpm</filename><sum type="sha256">061a71b3686f0c890045cab28900177003830500483c97ee7ae4c1c479b2ec6e</sum></package><package arch="x86_64" name="libsane-hpaio" release="4.el6.1" src="hplip-3.14.6-4.el6.1.src.rpm" version="3.14.6"><filename>libsane-hpaio-3.14.6-4.el6.1.x86_64.rpm</filename><sum type="sha256">6b30f9a6b0d364d4232cb73be09f1c6ae38b5cc087bf1d1a0fb773b38f21269f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1186" id="RHBA-2016:1186-1" title="Rhba-2016:1186-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337108" id="1337108" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1230-1</id><title>Firefox Bug Fix Update</title><description>This update fixes the following bug:

* Previously, due to an expired Firefox Add-on certificate, add-ons were disabled and the user could not activate them. This update provides an exception which no longer verifies the sign-off timestamp, so that an add- on signed off by the Firefox certificate is a sufficient condition. As a result, add-ons are no longer disabled due to certificate expiration.

After installing the update, Firefox must be restarted for the changes to take effect.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="firefox" release="1.el6_7" src="firefox-45.1.1-1.el6_7.src.rpm" version="45.1.1"><filename>firefox-45.1.1-1.el6_7.i686.rpm</filename><sum type="sha256">cb56e8b54b3df6e6bde52775eba2858bc133691e521ab245e5fecb5ca123a83c</sum></package><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-45.1.1-1.el6_7.src.rpm" version="45.1.1"><filename>firefox-45.1.1-1.el6_7.x86_64.rpm</filename><sum type="sha256">fa16aead2d789d970f6736a6072eb0bd905829b63ac105ffab88f07871eafb40</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1230" id="RHBA-2016:1230-1" title="Rhba-2016:1230-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333430" id="1333430" title="[Esr 45.1.1] Addons Installed From Mozilla Are Disabled After May 2Nd" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1266-1</id><title>Tzdata Bug Fix Update</title><description>This update fixes the following bugs:

* In 2015, Egypt did not observe Daylight Savings Time (DST). However, in 2016, Egypt observes DST from July 7 at 24:00 to October 27 at 24:00. As a consequence of this change, the tzdata package had incorrect data regarding DST in Egypt in 2016. This has been fixed, and tzdata now has the correct data.</description><release>Scientific Linux Fermi</release><issued date="2016-06-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016e-1.el6.src.rpm" version="2016e"><filename>tzdata-java-2016e-1.el6.noarch.rpm</filename><sum type="sha256">e1a4af31a55615a2cecd4cfeecaf097374c0d5126930ca32cf81efaad4c3fe52</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016e-1.el6.src.rpm" version="2016e"><filename>tzdata-2016e-1.el6.noarch.rpm</filename><sum type="sha256">42427f93789cbf7a712c2b2842f7dde1645f624692e2fb9005af7381c487a2df</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1266" id="RHBA-2016:1266-1" title="Rhba-2016:1266-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334677" id="1334677" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342553" id="1342553" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346423" id="1346423" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346424" id="1346424" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1396-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the initscripts packages required lvm2 version 2.02.97-2 or newer, but used the --ignoreskippedcluster option with the vgchange command, which was introduced only in lvm2 2.02.100-5. With this update, initscripts requires lvm2 2.02.100-5 or newer, which ensures that the --ignoreskippedcluster option is available.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="debugmode" release="1.el6_8.1" src="initscripts-9.03.53-1.el6_8.1.src.rpm" version="9.03.53"><filename>debugmode-9.03.53-1.el6_8.1.x86_64.rpm</filename><sum type="sha256">4b6c7914ddaf3c318d2e23692716f9042f84eddfb810d87343491f25e6b725fe</sum></package><package arch="x86_64" name="initscripts" release="1.el6_8.1" src="initscripts-9.03.53-1.el6_8.1.src.rpm" version="9.03.53"><filename>initscripts-9.03.53-1.el6_8.1.x86_64.rpm</filename><sum type="sha256">e48f96f2d302fc2420d4830dfcfc8a6b0f004de97603f25c95dd22381eb65dd5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1396" id="RHBA-2016:1396-1" title="Rhba-2016:1396-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345895" id="1345895" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1397-1</id><title>Nss-Softokn Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the Advanced Encryption Standard (AES) lacked a test to determine if the operating system (OS) supported Advanced Vector Extensions (AVX). As a consequence, segmentation faults occurred when certain applications used the libfreeblpriv3.so library after updating to Scientific Linux 6.8. With this update, libfreeblpriv3.so verifies if the OS supports AVX. As a result, segmentation faults no longer occur in the described scenario.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="nss-softokn" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-23.3.el6_8.i686.rpm</filename><sum type="sha256">f4b42ab12fa89d9d929ebeb69ff2b34f53dc901537ba06e8f19f7aa9fd3c736a</sum></package><package arch="i686" name="nss-softokn-devel" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-23.3.el6_8.i686.rpm</filename><sum type="sha256">b840d0df975863add496842bde80753b2f4d5b265f8988490a31a4b08637b6c7</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-23.3.el6_8.x86_64.rpm</filename><sum type="sha256">fc8558fdde0faeae1f894185faec1f20581b86c6af1f2705a612f5b768ca1ae2</sum></package><package arch="x86_64" name="nss-softokn" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-3.14.3-23.3.el6_8.x86_64.rpm</filename><sum type="sha256">ccc65e39ea88261355dffe940a3eb117fb2cd1529e3b70c63a6787224404c339</sum></package><package arch="i686" name="nss-softokn-freebl" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-3.14.3-23.3.el6_8.i686.rpm</filename><sum type="sha256">25fbc7a5e0d4d53a04e2df87d424012a7e35b36647f8710323428d86569a0fba</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-23.3.el6_8.i686.rpm</filename><sum type="sha256">3d08c61bff297be64a5e0026e1d66d5d143d8d2a30987342a72537fd63998622</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-freebl-devel-3.14.3-23.3.el6_8.x86_64.rpm</filename><sum type="sha256">342e7c1151c97f16efb1fc3ff0debc1e5ba5bd65b0fa853bedb16b975222577b</sum></package><package arch="x86_64" name="nss-softokn-devel" release="23.3.el6_8" src="nss-softokn-3.14.3-23.3.el6_8.src.rpm" version="3.14.3"><filename>nss-softokn-devel-3.14.3-23.3.el6_8.x86_64.rpm</filename><sum type="sha256">b16f551bd83a9cf2d35cc5ca8d41c69216dd1710788f36cdf71c6dd896c67a51</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1397" id="RHBA-2016:1397-1" title="Rhba-2016:1397-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337821" id="1337821" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1398-1</id><title>Yum Bug Fix Update</title><description>This update fixes the following bug:

* Previously, a /var/run/yum.pid file was left on the disk after running the "yum --downloadonly" command. Consequently, under certain circumstances, the "yum" command failed because the yum utility incorrectly assumed that another instance of "yum" was already running. With this update, /var/run/yum.pid is correctly removed after running "yum --downloadonly", and the described problem no longer occurs.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="yum" release="75.el6_8" src="yum-3.2.29-75.el6_8.src.rpm" version="3.2.29"><filename>yum-3.2.29-75.el6_8.noarch.rpm</filename><sum type="sha256">2bd37847a254ca46e317df7d652984613212459c214a21be4eb1bf30bdd2d386</sum></package><package arch="noarch" name="yum-cron" release="75.el6_8" src="yum-3.2.29-75.el6_8.src.rpm" version="3.2.29"><filename>yum-cron-3.2.29-75.el6_8.noarch.rpm</filename><sum type="sha256">f72054a613c925c110ca6465630fb9f2ee5e57772ac84cc06ef0f55da5c21882</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1398" id="RHBA-2016:1398-1" title="Rhba-2016:1398-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337912" id="1337912" title="Yum Downloadonly Does Not Reliably Remove Lock Files" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1399-1</id><title>Autofs Bug Fix Update</title><description>This update fixes the following bug:

* If an autofs mount reached a shutdown state, and a mount request arrived and was processed before the mount-handling thread read the shutdown notification, the mount-handling thread exited without cleaning up the autofs mount. As a consequence, the main program never reached its exit condition and entered an infinite loop, as the autofs-managed mount was left mounted. To  the exit condition check now takes place after each request is processed, and cleanup operations are now performed if an autofs mount has reached its shutdown state. As a result, the autofs daemon now exits as expected at shutdown.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="autofs" release="123.el6_8" src="autofs-5.0.5-123.el6_8.src.rpm" version="5.0.5"><filename>autofs-5.0.5-123.el6_8.x86_64.rpm</filename><sum type="sha256">8939a3e1dd4faa5862b9332a293d39afda31d1251bb4df66ee258d8cae06182a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1399" id="RHBA-2016:1399-1" title="Rhba-2016:1399-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333777" id="1333777" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1400-1</id><title>Mdadm Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, if an IMSM RAID array was interrupted during a reshape operation, the mdadm utility in some cases became unresponsive, and it was impossible to stop the container. Additionally, the new container size was registered not after the reshape finished, but only once the array has been reassembled. With this update, container reshapes finish successfully, and updated container sizes are registered immediately.

* Previously, mdadm in some cases terminated unexpectedly with a segmentation fault when reshaping multiple IMSM volumes created from NVMe drives. With this update, multi-volume IMSM reshapes finish successfully.

* Previously, mdadm in some cases terminated unexpectedly with a segmentation fault if trying to assemble an array which included a device with a device name longer than 15 characters. With this update, mdadm assembles arrays correctly even when an array uses device names longer than 15 characters.

* Previously, when IMSM RAID arrays ran a reshape operation, a race condition allowed launching a second reshape on the same array, before the first operation had completed. With this update, the race condition has been fixed, and the second reshape operation can start only once the first operation has completed.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="mdadm" release="1.el6_8.5" src="mdadm-3.3.4-1.el6_8.5.src.rpm" version="3.3.4"><filename>mdadm-3.3.4-1.el6_8.5.x86_64.rpm</filename><sum type="sha256">8800e3e104cb23b20211756e1b0a588a4edef7a7ed433ec8525fb9cd0355e642</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1400" id="RHBA-2016:1400-1" title="Rhba-2016:1400-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331331" id="1331331" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334956" id="1334956" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347808" id="1347808" title="Like Mdadm --Detail --Scan Causes Sigabrt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348544" id="1348544" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1401-1</id><title>Rgmanager Bug Fix Update</title><description>This update fixes the following bugs:

* With central processing mode enabled, when quorum was dissolved and regained, the rgmanager daemon stopped working on a surviving cluster node. With this update, the configuration tree is repopulated after quorum is regained. As a result, clustered services start up on the surviving cluster node as expected in the described scenario.

* On cluster nodes where rgmanager was running, when the cman service was stopped before rgmanager, rgmanager could exit unexpectedly. With this update, the cpg_lock()function has been fixed and rgmanager exits more gracefully in the described scenario.

* When the clustat utility was run shortly after rgmanager started but before it completely finished initializing, the rgmanager daemon was susceptible to unexpected termination. This bug has been fixed and rgmanager now starts without crashing in this scenario.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="rgmanager" release="26.el6_8.3" src="rgmanager-3.0.12.1-26.el6_8.3.src.rpm" version="3.0.12.1"><filename>rgmanager-3.0.12.1-26.el6_8.3.x86_64.rpm</filename><sum type="sha256">908b48bafadaf4a9f9955bbbef5cdcf245f4b955246c868d88114a80b14dd662</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1401" id="RHBA-2016:1401-1" title="Rhba-2016:1401-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335412" id="1335412" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343345" id="1343345" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344640" id="1344640" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1402-1</id><title>Xorg-X11-Server Bug Fix Update</title><description>This update fixes the following bug:

* The X server update in Scientific Linux 6.8 included two behavior changes relative to version 6.7. By default, the X server did not listen for connections over TCP, and refused indirect GLX contexts. This update restores the defaults to those of version 6.7. In addition, it adds the "+iglx", "-iglx" options to explicitly control indirect GLX context support: "+iglx" to allow creating indirect GLX contexts, "-iglx" to disallow it. The default behavior is to allow creating indirect GLX contexts.

To control indirect GLX contexts when using a display manager like GDM that does not allow arbitrary modification to the X server's command line, use the "AllowIndirectGLX" option in the ServerFlags section of xorg.conf:

Section "ServerFlags"     Option "AllowIndirectGLX" "on" # or "off" EndSection</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="xorg-x11-server-Xephyr" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xephyr-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">5655cba9319be21a3d84dd7cbcde44e433d46131a98f3238534354c863c440ae</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-devel-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">33f3d043f76c3d226396a7f544e325fd7afd0fa5ffc081a74fe5c3706f35c58c</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xvfb-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">6738b543b5cc59718aabca16b07dffd9e1068a65234f91cee045694bd51c6e2c</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-common-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">125805459d5f60f0a7a499477285065d565086ac88853def7ec27ef9c7528525</sum></package><package arch="noarch" name="xorg-x11-server-source" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-source-1.17.4-9.5.sl6.noarch.rpm</filename><sum type="sha256">3bc4cd0acf8fa3e88b5e9044d69a6c0388904def84e39afc079d3831c50252f9</sum></package><package arch="i686" name="xorg-x11-server-devel" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-devel-1.17.4-9.5.sl6.i686.rpm</filename><sum type="sha256">f1669001e641828161b6d1f832ee6d42f4a610216a855678305a10338bce93b3</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xnest-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">b7519e7e83d609704a55ef51404cc50360030277769fe1203dc88a12dbb6a0dd</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xdmx-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">ca211822bdef8ef18d5cb4441e66c0ec9a4d95bc1a287113f7fc408a2e839ee2</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="9.5.sl6" src="xorg-x11-server-1.17.4-9.5.sl6.src.rpm" version="1.17.4"><filename>xorg-x11-server-Xorg-1.17.4-9.5.sl6.x86_64.rpm</filename><sum type="sha256">6113a4bf155d3f3c983f3b83af92a09099f85dc2f5947ec72cab79c560cff5b1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1402" id="RHBA-2016:1402-1" title="Rhba-2016:1402-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339111" id="1339111" title="Indirect Rendering Has Been Disabled By Default In 1.17" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341512" id="1341512" title="Revert Behavior Change &apos;-Nolisten Tcp&apos; Made In 1.17" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1403-1</id><title>Sendmail Bug Fix Update</title><description>This update fixes the following bug:

* Previously the NUL (0x00) characters were not handled correctly by the Sendmail's Multi-Purpose Internet Mail Extensions (MIME) conversion functions. As a consequence, emails containing NUL characters could be truncated or they were not sent properly. An upstream patch has been backported which ensures that the affected functions now process all characters correctly. Emails containing NUL characters are now sent properly.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="sendmail-devel" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-devel-8.14.4-9.el6_8.1.x86_64.rpm</filename><sum type="sha256">89c708b645f9dfd1be26aa61f9bd868a10ab6ffc0affbc3bc7fe545f412a747e</sum></package><package arch="noarch" name="sendmail-cf" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-cf-8.14.4-9.el6_8.1.noarch.rpm</filename><sum type="sha256">8e4aa00a86384fb59da019729eb059dedbaa6b1666f4ec5ee1928536dc13f755</sum></package><package arch="i686" name="sendmail-milter" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-milter-8.14.4-9.el6_8.1.i686.rpm</filename><sum type="sha256">109dc9ae98a50054f0998e9c07b99b82b07ee8b8acbe2824fa19541bb53ac023</sum></package><package arch="noarch" name="sendmail-doc" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-doc-8.14.4-9.el6_8.1.noarch.rpm</filename><sum type="sha256">0b642bc3d08900d0b57c067b2fc7756483aed4dae9881b85fef1ac17d287fac6</sum></package><package arch="x86_64" name="sendmail" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-8.14.4-9.el6_8.1.x86_64.rpm</filename><sum type="sha256">ff08547a34f379876af442d70778b7b9699965f26a3e9cb419b741f50b4da1a9</sum></package><package arch="x86_64" name="sendmail-milter" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-milter-8.14.4-9.el6_8.1.x86_64.rpm</filename><sum type="sha256">5d5cb62b76c8f5fdd4d01ad76faf6dacf227dcef1d4b43973baf775c4e315f3e</sum></package><package arch="i686" name="sendmail-devel" release="9.el6_8.1" src="sendmail-8.14.4-9.el6_8.1.src.rpm" version="8.14.4"><filename>sendmail-devel-8.14.4-9.el6_8.1.i686.rpm</filename><sum type="sha256">4ec5871b6401e144897b68e14e593f0fe8560596f3be420abfda054fc1a52da2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1403" id="RHBA-2016:1403-1" title="Rhba-2016:1403-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340366" id="1340366" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1404-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, when a simple paged results slot in a connection was discarded due to an error such as "SIZELIMIT_EXCEEDED", the discarded slot was not cleaned up properly. Subsequent searches which reused this slot then returned 0 instead of the actual search result. With this update, discarded simple paged results slots are cleaned up correctly, and searches return correct results even with reused slots.

* When running the db2index script with no options, the script failed to handle on-disk Replica Update Vector (RUV) entries because these entries have no parent entries. The existing RUV was skipped and a new one was generated instead, which subsequently caused the next replication to fail due to an ID mismatch. This update fixes handling of RUV entries in db2index, and running this script without specifying any options no longer causes replication failures.

* When a user password was reset by an administrator, the old password was previously not stored in the user's password history. This allowed the user to reuse the same password after the reset. With this update, resetting a password also stores it in password history, and the user must use a different password.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base" release="75.el6_8" src="389-ds-base-1.2.11.15-75.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-75.el6_8.x86_64.rpm</filename><sum type="sha256">02d9cb264cc7da02919098550d9e729df27e1223564dfd78f715c9e232534cf0</sum></package><package arch="i686" name="389-ds-base-devel" release="75.el6_8" src="389-ds-base-1.2.11.15-75.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-75.el6_8.i686.rpm</filename><sum type="sha256">ca7f29909c0e68e10ef2909f63cda30964e5599ee292a9ee8f40b4ad68d0e739</sum></package><package arch="x86_64" name="389-ds-base-libs" release="75.el6_8" src="389-ds-base-1.2.11.15-75.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-75.el6_8.x86_64.rpm</filename><sum type="sha256">7c154d51ffdb1d724b8f5781e7ef432288bc2c7ed3c2a84f6c9284cb5607e093</sum></package><package arch="i686" name="389-ds-base-libs" release="75.el6_8" src="389-ds-base-1.2.11.15-75.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-75.el6_8.i686.rpm</filename><sum type="sha256">38595dbbbadfd135f063070dbc4a41d5ab8e1c40532e8ba9647faec8d65129a6</sum></package><package arch="x86_64" name="389-ds-base-devel" release="75.el6_8" src="389-ds-base-1.2.11.15-75.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-75.el6_8.x86_64.rpm</filename><sum type="sha256">1201b5c6c983be4ddf801d1777b57104c327617f01070ff6b8cc1de93f4208a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1404" id="RHBA-2016:1404-1" title="Rhba-2016:1404-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335108" id="1335108" title="Paged Results Search Returns The Blank List Of Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342382" id="1342382" title="Running Db2Index With No Options Breaks Replication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342614" id="1342614" title="Password History Is Not Updated When An Admin Resets The Password" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1405-1</id><title>Lftp Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the lftp utility did not download symbolic links through SFTP. The underlying source code has been fixed, and lftp now downloads symbolic links as expected.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="lftp" release="6.el6_8.2" src="lftp-4.0.9-6.el6_8.2.src.rpm" version="4.0.9"><filename>lftp-4.0.9-6.el6_8.2.x86_64.rpm</filename><sum type="sha256">75c48c35dfdda0982f9b299c075845e07dfafb2cd2b56f148424fe085f3d65e5</sum></package><package arch="i686" name="lftp" release="6.el6_8.2" src="lftp-4.0.9-6.el6_8.2.src.rpm" version="4.0.9"><filename>lftp-4.0.9-6.el6_8.2.i686.rpm</filename><sum type="sha256">4026e372a68ae894f7424972ce86781c93c3574a75f024f34f797ea09aa1125a</sum></package><package arch="noarch" name="lftp-scripts" release="6.el6_8.2" src="lftp-4.0.9-6.el6_8.2.src.rpm" version="4.0.9"><filename>lftp-scripts-4.0.9-6.el6_8.2.noarch.rpm</filename><sum type="sha256">fa3d0045c393c557df6022bfd32e560d8f855ade2ef67c15adad790745346201</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1405" id="RHBA-2016:1405-1" title="Rhba-2016:1405-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343360" id="1343360" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1407-1</id><title>Sssd Bug Fix Update</title><description>This update fixes the following bugs:

* If an Active Directory (AD) user with a disabled user account attempts to log in, Identity Management (IdM) is expected to deny access. Previously, the login attempt succeeded when the user used a login method other than the standard password login, such as an SSH key. To fix this problem, IdM no longer checks only the IdM-specific account lockout attributes, but also the AD lockout attributes. As a result, an AD user with a disabled user account is no longer permitted to log in with an SSH key.

* On systems where the adcli package was not installed and SSSD was running with the AD provider, the AD provider sometimes created a new process using the fork() function, but starting the adcli code using the exec() function failed. Consequently, the forked process was not killed. The number of the sssd_be processes increased, which eventually exhausted system resources. This update modifies the AD provider to ensure that on systems without adcli, fork() is not called to clone sssd_be. As a result, SSSD no longer forks the processes, which prevents exhausting the system resources.

* Every execution of the keytab renewal task previously leaked a file descriptor, which eventually exhausted system resources. Now, the AD provider properly closes both ends of the two-way pipe opened to communicate with the helper adcli process. Running the keytab renewal task no longer allocates new system resources.

* The SSSD NFS ID mapping plug-in requires the libnfsidmap library. Installing the sssd-common package previously also installed libnfsidmap, which then installed a number of additional NFS packages as dependencies. However, only systems that install and configure NFS packages explicitly can make use of the SSSD NFS ID mapping plug-in. With this update, sssd- common no longer includes libnfsidmap as a dependency, which prevents the mentioned packages from being installed unnecessarily by default.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="python-sss-murmur" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>python-sss-murmur-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">0cd089104073da5b31bee4d5d2dc6038c84884b23a64672804ca148ba30a4ba7</sum></package><package arch="i686" name="libsss_idmap-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_idmap-devel-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">15e1541782c35a40bb3dc2e7c1e098d9c93b0498384e587c0d244f0ccd8ddde1</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-devel-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">9398920eb72972fc86bd92f2f84b1f7992a0059d8e5bc3c60536ef72387d9c30</sum></package><package arch="x86_64" name="sssd-tools" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-tools-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">bad1254519e550a67779e926b491e62da66a50c3f60c4d16fa9738798fa13858</sum></package><package arch="x86_64" name="sssd-common" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-common-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">24268ba5982c75c9d502f114abcb74ddd4e264ec304b551fc970d260629e146c</sum></package><package arch="i686" name="libsss_nss_idmap" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">918ae90a35df3b245c070cbe1e6c916462f897e57d51a956adeb0430c45f5873</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-devel-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">a1523e353aaa6f05eca56522fe1fa90b403e1bb08970ec313d5a1be8a2a0a57c</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libipa_hbac-devel-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">7194e433b4a8d9a89e4e3c04813025ff7ebd5004c5ca4a977d1eb171c65d8a48</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>python-libsss_nss_idmap-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">9b6dbf6746e926c978725c000765d1da9e3821c237835633c5f713db9cd0b755</sum></package><package arch="x86_64" name="libipa_hbac" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libipa_hbac-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">60e315c8108f80e0d9512921711b1323c3d0189feb9a50e746b44174f89f2620</sum></package><package arch="x86_64" name="sssd" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">c5d7ebcfbd759c796fca46ae7fad6ed30958de1368c97d3b7b8477e69f8ea8e9</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">a4fff41d85167ca75c33fe1a2f7ff0572a702754388018b61090bb063a9b62d7</sum></package><package arch="x86_64" name="sssd-client" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-client-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">6af0856957297e370366a4d5bd4f0ac819f7a3d95723f0b18b7f5fc9bfbf7439</sum></package><package arch="i686" name="libsss_idmap" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_idmap-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">a18bddc93c24991cf0c652c33dd6e4dbac680a8594a3add25fc63cd378391867</sum></package><package arch="i686" name="libsss_simpleifp" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_simpleifp-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">1d569100c5db5d06c523986b512f56c705a222cb51decff8c6a50c660f96306b</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_idmap-devel-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">bad7f95601cd4959de636f647f536c074a7c7b77f6815ef30f4b851bceb423e7</sum></package><package arch="i686" name="libipa_hbac-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libipa_hbac-devel-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">ca1bcde35b279f7689bee3903e630b596b98753b5bcca5203737564d1dadbe0d</sum></package><package arch="x86_64" name="sssd-common-pac" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-common-pac-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">aaf2496d71f9b0bbed2710c198479e27603e3acec68489c75f9a59417b11b185</sum></package><package arch="x86_64" name="python-libipa_hbac" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>python-libipa_hbac-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">94132855aa76eacaec1838b42bf01602520e66c51f6bb045c800c70a15ebdcee</sum></package><package arch="x86_64" name="sssd-krb5-common" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-krb5-common-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">bf75272f9ee4492343fd67983b5f12fbb47ddb1516970a39b2017b79d8368b1a</sum></package><package arch="x86_64" name="sssd-dbus" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-dbus-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">012b2a5f7149ee744f6c6a2fb2fecdbf079d7333f2f0ae0dc270dea15f9d9ca7</sum></package><package arch="x86_64" name="libsss_idmap" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_idmap-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">8b956f1c3ed85162a857e8894e91d23c0921587d2ea53e2145e1a3a3d5de0d6c</sum></package><package arch="x86_64" name="sssd-proxy" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-proxy-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">a024edf5d9652f9898d141db943e8e4e4b4437c6335a5871bbfdeaf113273e54</sum></package><package arch="i686" name="sssd-client" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-client-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">309e764c33bf135e18ced0a2c4e329b302f60b702f5e05678f5419cea49fa79f</sum></package><package arch="i686" name="libipa_hbac" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libipa_hbac-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">85939882bab45be269e94c6bde4ca095c4520dd14e6c578860f6db3007144545</sum></package><package arch="x86_64" name="sssd-ipa" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-ipa-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">f021232a2c8d54f6e8d56cf6f8232cf040dac0524bd52f0d5c524935b8d6d9bb</sum></package><package arch="x86_64" name="sssd-ad" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-ad-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">a1d0424de316b9268d5b8683236763a7cf435b351d938ece1ccfb5d67b5b792e</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_simpleifp-devel-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">b1fa4df90d94f22fc50cba01aa690f32748d787d8c98415c1d9a21d8caca492e</sum></package><package arch="x86_64" name="libsss_simpleifp" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_simpleifp-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">09348822d74a8e61fb66b11b1985ab89a900e5772eb0fdae28fee025883393f0</sum></package><package arch="noarch" name="python-sssdconfig" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>python-sssdconfig-1.13.3-22.el6_8.4.noarch.rpm</filename><sum type="sha256">e62e45d92352b80ef48e1368bc6dc53843aa56fd7f84841f99497cb03069db3f</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>libsss_simpleifp-devel-1.13.3-22.el6_8.4.i686.rpm</filename><sum type="sha256">08d885c15c6cf2f635fa9fb25aa730731e9e073fbb3439011ff8a8d168961b05</sum></package><package arch="x86_64" name="sssd-krb5" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-krb5-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">96282a8285c919e8a582f81296e1b5c00e9cb8d3da91ee2ee687d698a3ede29f</sum></package><package arch="x86_64" name="python-sss" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>python-sss-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">1be55d96df1174ab5dca4d40791ab1a67b4bbddd8e8d9f5ce9bf684ad7dffb41</sum></package><package arch="x86_64" name="sssd-ldap" release="22.el6_8.4" src="sssd-1.13.3-22.el6_8.4.src.rpm" version="1.13.3"><filename>sssd-ldap-1.13.3-22.el6_8.4.x86_64.rpm</filename><sum type="sha256">4c6db8027ded15aa242e9271a41cfe78bd1bcb36b880d5fc02acd8cc4a527569</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1407" id="RHBA-2016:1407-1" title="Rhba-2016:1407-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342058" id="1342058" title="In Ipa-Ad Trust Environment Access Is Granted To Ad User Even If The User Is Disabled On Ad." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343638" id="1343638" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344657" id="1344657" title="The Ad Keytab Renewal Task Leaks A File Descriptor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348538" id="1348538" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1408-1</id><title>Tar Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when creating a PAX-format archive, the tar utility arbitrarily restricted the size of the representation of a sparse file to be less than 8 GB. An upstream patch has been backported to fix the bug. As a result, archiving of large sparse files is now handled properly.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="2" name="tar" release="15.el6_8" src="tar-1.23-15.el6_8.src.rpm" version="1.23"><filename>tar-1.23-15.el6_8.x86_64.rpm</filename><sum type="sha256">ff67a17a63c06966c0933b80ddf664a582351b049f86ee0e313d611329ccedb2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1408" id="RHBA-2016:1408-1" title="Rhba-2016:1408-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346666" id="1346666" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1409-1</id><title>Java-1.8.0-Openjdk Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, a list of elliptic curves provided by an OpenJDK Secure Sockets Layer (SSL) server to a client included some elliptic curves that were not supported. As a consequence, the connection failed when the client selected an unsupported elliptic curve from the list. This update fixes the list of elliptic curves reported by OpenJDK to match the ones OpenJDK can provide. As a result, the connection no longer fails in the described situation.

All running instances of OpenJDK Java must be restarted for the update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-src-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">0a84f06f71811748e2a0e455305f140fb1ffc730d1a510762bc54465cbe03c15</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">423c7cf43df03dc5592fbd9c990dd803cd10f13184a0e5eb7d077edc5b7eecab</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-debug-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">ddb0570f7e8f7db4f051f2197948e1ded43452894fed050f48c22b4554701d41</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">524e699959ea3f4a8d7ec39d79d66cc77dd6fab9851a45cad950384958ec3156</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">4447fbb8b994369edc9eb6afa9d7185d6e13726a55e5165aa3324b592774b6b5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">d6b12ecfd09c27a30aa9f50d73f6681be57a8a9246541217ca0dd576ccb05729</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-demo-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">b2f848ba7d955e6011366adaacd095f0f98f0c032d1f623ca772f1e32cff11dd</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-javadoc-1.8.0.91-3.b14.el6_8.noarch.rpm</filename><sum type="sha256">9ad8420de681ca9b0c893b15c174f562e07ab71235016f92eb3b3ad51a291e18</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-headless-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">3e5360f8e5788bda98f5bfd7b25d1aeefebe571d5026f5addcab43f36db178e9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-devel-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">b871dc5da8afd6064225435a5adc8087bd287299eaedb611db9b01eab4ef6702</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-src-debug-1.8.0.91-3.b14.el6_8.x86_64.rpm</filename><sum type="sha256">5916f0067257b0c8d047cf090779834e219ad03c0639567e0782ffd8846f711d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b14.el6_8" src="java-1.8.0-openjdk-1.8.0.91-3.b14.el6_8.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.91-3.b14.el6_8.noarch.rpm</filename><sum type="sha256">2076137672daefae42a65069e80bfc6dceaa49344e52b17ecfc55e10645c5ec9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1409" id="RHBA-2016:1409-1" title="Rhba-2016:1409-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348525" id="1348525" title="Openjdk Should Report The Elliptic Curves Supported By Nss, Not The Sunec Library" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1410-1</id><title>Libcgroup Bug Fix Update</title><description>This update fixes the following bug:

* Previously, cgconfigparser was unable to load configuration generated by cgsnapshot if both memory.limit_in_bytes and memory.memsw.limit_in_bytes parameters of a cgroup were set to non-default values. It was caused by the fact that the parameters were generated in incorrect order. This update fixes the underlying source code to ensure cgsnapshot will generate the parameters in correct order and the resulting configuration will be loadable by cgconfigparser.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libcgroup-pam" release="18.el6_8" src="libcgroup-0.40.rc1-18.el6_8.src.rpm" version="0.40.rc1"><filename>libcgroup-pam-0.40.rc1-18.el6_8.i686.rpm</filename><sum type="sha256">8239317dd45583466e9e2dfbe6a33c709bd30934fd192ed8a0bdd6eb40e7b489</sum></package><package arch="i686" name="libcgroup-devel" release="18.el6_8" src="libcgroup-0.40.rc1-18.el6_8.src.rpm" version="0.40.rc1"><filename>libcgroup-devel-0.40.rc1-18.el6_8.i686.rpm</filename><sum type="sha256">b6f543ee68c61daf4187fdd498ace6e8d07b5a5c1d507543522bbb11a9951dae</sum></package><package arch="i686" name="libcgroup" release="18.el6_8" src="libcgroup-0.40.rc1-18.el6_8.src.rpm" version="0.40.rc1"><filename>libcgroup-0.40.rc1-18.el6_8.i686.rpm</filename><sum type="sha256">f49e6303c39f2fdc62a8bf7f907c855e9fede78accc6335b7ee2db0d42689632</sum></package><package arch="x86_64" name="libcgroup" release="18.el6_8" src="libcgroup-0.40.rc1-18.el6_8.src.rpm" version="0.40.rc1"><filename>libcgroup-0.40.rc1-18.el6_8.x86_64.rpm</filename><sum type="sha256">3a1f234565d218e4f6bc50a814318578d14364d92d4106b532e8b438a23eab7b</sum></package><package arch="x86_64" name="libcgroup-pam" release="18.el6_8" src="libcgroup-0.40.rc1-18.el6_8.src.rpm" version="0.40.rc1"><filename>libcgroup-pam-0.40.rc1-18.el6_8.x86_64.rpm</filename><sum type="sha256">146df9c4fc1721d519824aa690474b4d5f400c65f9952ebbf21a1b297cf58e86</sum></package><package arch="x86_64" name="libcgroup-devel" release="18.el6_8" src="libcgroup-0.40.rc1-18.el6_8.src.rpm" version="0.40.rc1"><filename>libcgroup-devel-0.40.rc1-18.el6_8.x86_64.rpm</filename><sum type="sha256">995eb77588fcdad16f62b50326bb07128bb670505ec73f99083b925a39c81b9e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1410" id="RHBA-2016:1410-1" title="Rhba-2016:1410-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348919" id="1348919" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1411-1</id><title>Nfs-Utils Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the rpc.mountd service became unresponsive in the write() system call when rpc.mountd received an excessive amount of requests and the read() function was not used for reading them. Consequently, NFS mounts were not created. With this update, rpc.mountd uses non-blocking mode on the write() system calls. Now, rpc.mountd times out and the NFS mounts are no longer blocked.

* Previously, the source code contained logic to unconditionally delete existing on-disk monitor records when the rpc.statd service received a new request to monitor the same host name. As a consequence, rpc.statd logged a harmless error message if the monitor file did not already exist: "Failed to delete: could not stat original file /var/lib/nfs/statd/sm/[...]: No such file or directory". A patch has been applied to  and the harmless error message no longer appears in the described situation.

After installing this update, the nfs service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="nfs-utils" release="70.el6_8.1" src="nfs-utils-1.2.3-70.el6_8.1.src.rpm" version="1.2.3"><filename>nfs-utils-1.2.3-70.el6_8.1.x86_64.rpm</filename><sum type="sha256">f99baca763c6bc2ec475fe1ed62b57317152a7b5cb29ea3c4d7b55869ca164b8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1411" id="RHBA-2016:1411-1" title="Rhba-2016:1411-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350702" id="1350702" title="Back Port Of Bz 1163891 Required As Rpc.Mountd Can Be Blocked By A Bad Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351259" id="1351259" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1412-1</id><title>Squid Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when squid received exactly enough data to fill the 16KB input buffer for server response, it could fail to expand the buffer to 64 KB which would normally be expected. This resulted in squid crashing at seemingly random times. This update improves squid's memory allocation code so that the buffer can correctly expand even when completely full, which prevents these crashes.

After installing this update, the squid service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="7" name="squid" release="16.el6_8.5" src="squid-3.1.23-16.el6_8.5.src.rpm" version="3.1.23"><filename>squid-3.1.23-16.el6_8.5.x86_64.rpm</filename><sum type="sha256">5183cd2fcc616c64824dcde42d995c52af708bbc64871daa11159d27a27a4375</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1412" id="RHBA-2016:1412-1" title="Rhba-2016:1412-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351313" id="1351313" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1659-1</id><title>Udev Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the udev daemon reset permissions on a device node on both "change" and "add" kernel sysfs events. After a "change" event was generated for an underlying block device, permissions on a virtual disk of a virtual machine (VM) were reset. Consequently, a qemu process accessing the virtual disk encountered a "Permission denied" error, which caused problems during live migrations of VMs. The udev service has been patched, and it now sets permissions on a device node only on "add" events or in cases when udev created a new device node. The behavior of the udev service is now similar to Scientific Linux 7.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libgudev1-devel" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libgudev1-devel-147-2.73.el6_8.1.x86_64.rpm</filename><sum type="sha256">002e9ce3181e99848f70d53b33befeb29ae051bc4188d764239ea78e611253b6</sum></package><package arch="x86_64" name="libudev-devel" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libudev-devel-147-2.73.el6_8.1.x86_64.rpm</filename><sum type="sha256">c051f8c9d0bc1849bb766db8ec062798f09f6ea7ad1716647ebba71e8d2586cc</sum></package><package arch="i686" name="libudev-devel" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libudev-devel-147-2.73.el6_8.1.i686.rpm</filename><sum type="sha256">2023ce3d9421b77e3440df98140be79af2fd5f69809751d9ebde0253de6e4e0b</sum></package><package arch="i686" name="libgudev1-devel" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libgudev1-devel-147-2.73.el6_8.1.i686.rpm</filename><sum type="sha256">2ceb45821176274480a4d4ecdb08959faba3914de6668be4fcb9e577fe97a3fb</sum></package><package arch="x86_64" name="libgudev1" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libgudev1-147-2.73.el6_8.1.x86_64.rpm</filename><sum type="sha256">5184cdde552d73e4d19e2d480c67c908b90dacaf6fab475470ce2363256b8d1f</sum></package><package arch="x86_64" name="libudev" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libudev-147-2.73.el6_8.1.x86_64.rpm</filename><sum type="sha256">6a70026831b2a4882428705b9c47dfdc861f06ff869d62f86808076e3bee594f</sum></package><package arch="x86_64" name="udev" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>udev-147-2.73.el6_8.1.x86_64.rpm</filename><sum type="sha256">58969bdb6734f08760af1b85e1566903214fd235095e681374fd0775f61a63f0</sum></package><package arch="i686" name="libgudev1" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libgudev1-147-2.73.el6_8.1.i686.rpm</filename><sum type="sha256">39fcc43c79253f110e18da7dea0ff71e7ec66963cae542aac9be399893a82f8f</sum></package><package arch="i686" name="libudev" release="2.73.el6_8.1" src="udev-147-2.73.el6_8.1.src.rpm" version="147"><filename>libudev-147-2.73.el6_8.1.i686.rpm</filename><sum type="sha256">682aed402d6875f4eef3e0f28e819873eeeea30624b38ce8ce170922412d23be</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1659" id="RHBA-2016:1659-1" title="Rhba-2016:1659-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362038" id="1362038" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1661-1</id><title>Pki-Core Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, installing the pki-common subpackage caused mode 0755 to be set on the /usr/sbin/ system directory. As a consequence, the default 0555 permissions on /usr/sbin/ were, erroneously, overridden. With this update, the default permissions on /usr/sbin/ are no longer overridden in the described situation.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pki-symkey" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-symkey-9.0.3-50.el6_8.x86_64.rpm</filename><sum type="sha256">c331b88cc3d91a7758378c0d9d641a1e1e7cd664af49f5492566903c52b89180</sum></package><package arch="noarch" name="pki-util" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-util-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">1ad1f04d4b066ab7c1f0f3e9651620670563ebe3a87a9a58c5e647f821bc841c</sum></package><package arch="noarch" name="pki-setup" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-setup-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">d0d4fe2ea287677d935108d14926eebd0406d70c5d250e1457df1ee330d5f1b6</sum></package><package arch="noarch" name="pki-silent" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-silent-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">d1a8ea053d6373f899f9c1cf20b7e329ba1d452ffe12d7ec632dd7a71f17a8f8</sum></package><package arch="x86_64" name="pki-native-tools" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-native-tools-9.0.3-50.el6_8.x86_64.rpm</filename><sum type="sha256">fd510938260194d0caa3f692992d7023788240e5211328325839517ebd9b9519</sum></package><package arch="noarch" name="pki-util-javadoc" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-util-javadoc-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">b18d77b4f7a2473300b3dfc1ad1bcd1f7bb6f71b90e4b8722a360bac4d16e20a</sum></package><package arch="noarch" name="pki-selinux" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-selinux-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">7ac6829ce557a91a77010e38e19e789611a727689f562af6826b60dc8c5168e1</sum></package><package arch="noarch" name="pki-java-tools" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-java-tools-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">639e11de9b01a2065f67809a3129ff2cf3bf7989daf91b704cbe1daef7a5ecb1</sum></package><package arch="noarch" name="pki-common-javadoc" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-common-javadoc-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">41cb104da1aff46a2466e7a28fca73fa32722562aea8e3ebbaa3a4da2459b64b</sum></package><package arch="noarch" name="pki-common" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-common-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">798194307f8f18e7eaabda5952138a5d778ed18f09189a799e8214f9cd23a3b7</sum></package><package arch="noarch" name="pki-ca" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-ca-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">b3f41167524b51c11f6e93a0eb760d5ed71a6b412b5909034c349e4df215b8e8</sum></package><package arch="noarch" name="pki-java-tools-javadoc" release="50.el6_8" src="pki-core-9.0.3-50.el6_8.src.rpm" version="9.0.3"><filename>pki-java-tools-javadoc-9.0.3-50.el6_8.noarch.rpm</filename><sum type="sha256">a450b041c5ba1961084fa1c47b509731937f8d769315c42e5942427e16f9c22d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1661" id="RHBA-2016:1661-1" title="Rhba-2016:1661-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1355963" id="1355963" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1662-1</id><title>Pacemaker Bug Fix Update</title><description>This update fixes the following bug:

* When stopping the cluster on all nodes by running "pcs cluster stop --all", resources that require the Distributed Lock Manager (DLM), such as Global File System 2 (GFS2) or clustered logical volumes, in some cases lost quorum before they were able to shut down. As a consequence, the stop operation became unresponsive. With this update, "pcs cluster stop --all" stops the cman service on all nodes only after Pacemaker has stopped those nodes. As a result, quorum is maintained while all resources are stopping, and the stop operation no longer hangs in the described situation.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pacemaker-libs" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-libs-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">c050586e252b26ab89b683257b973670462ffce961cd8ec72b3720e18c8e696b</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-libs-devel-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">ddd79869709a7b724262c816ff7d31733ec80ca2a63e11a13424658a02e89508</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-cluster-libs-1.1.14-8.el6_8.1.i686.rpm</filename><sum type="sha256">694977ea548e37c999974ea29562cafba5c9f33594e4d63dd3fad1a00b83f872</sum></package><package arch="x86_64" name="pacemaker-cts" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-cts-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">e542e1d81cdfa8d52bcbe6a5b22c896014d63ef18610fe608bb9da8370907177</sum></package><package arch="i686" name="pacemaker-libs-devel" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-libs-devel-1.1.14-8.el6_8.1.i686.rpm</filename><sum type="sha256">dc961274607f5477425387ea689380ac9de5f242db01e5f725dd278e59b5d264</sum></package><package arch="x86_64" name="pacemaker-doc" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-doc-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">a84c78363cbf01d2e317b759898b34d1fbfd49a250dc34bb70db96c602b5dee3</sum></package><package arch="x86_64" name="pacemaker" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">5d5e7af12c1880fd08d3a39967eee954f26f78029b3f2fb3ac8c74887838ff57</sum></package><package arch="i686" name="pacemaker-libs" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-libs-1.1.14-8.el6_8.1.i686.rpm</filename><sum type="sha256">b86238d422e0198cfe10ce0ad7715e2b36e91701e1a6e68fd36fed32ce5f9b48</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-cluster-libs-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">bb4f3e057d6d736199549425c445f4c0d61c70cde6a59623b37e6bc6406e57c9</sum></package><package arch="x86_64" name="pacemaker-remote" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-remote-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">92327909c194942ba8e8ade518750fc26ee20593fdcf3c6abb18c6396781f2d0</sum></package><package arch="x86_64" name="pacemaker-cli" release="8.el6_8.1" src="pacemaker-1.1.14-8.el6_8.1.src.rpm" version="1.1.14"><filename>pacemaker-cli-1.1.14-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">d9211ec55328fff19fee8a36c648876d87c188e842fe07c630168a8bc8b1b608</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1662" id="RHBA-2016:1662-1" title="Rhba-2016:1662-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1355738" id="1355738" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1663-1</id><title>Avahi Bug Fix Update</title><description>This update fixes the following bug:

* Due to invalid packets on the network generated by non-compliant mDNS implementations, the avahi-daemon service generated "Invalid response packet from host" log messages for every invalid response packet. A patch has been applied to prevent avahi-daemon from generating log messages with regard to invalid DNS packets. As a result, log files no longer contain the described log messages.

After installing the update, avahi-daemon will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="avahi-ui" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-ui-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">f57999a2a4dae95e026c9e81ebece5e2416ef8300bfbb13a1efd3567144c9c88</sum></package><package arch="i686" name="avahi" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">3d8a037362f128328b098cf09cf1d6d2bf4e872fad276e92f9398f3cf7667511</sum></package><package arch="i686" name="avahi-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">2047ab1986a7b838b23fea7b56e8e854e416b183961d0f87ab6c46ee5be1f821</sum></package><package arch="x86_64" name="avahi-gobject-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-gobject-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">009daa9bc6289f8323c31a9424dde17cf963233edf18fa5249a913cdec701f1c</sum></package><package arch="i686" name="avahi-gobject-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-gobject-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">7addf4d2bcfac5732db0ed05b88f35e82c0b9cefe969342a208a91f344b5016b</sum></package><package arch="i686" name="avahi-compat-libdns_sd-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-libdns_sd-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">06483fe3d0e0c755973216e517a719781503069a8ad7cef00330b8f969659181</sum></package><package arch="i686" name="avahi-libs" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-libs-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">d5975e1ae9003a866104a5c69e853a9aa0eb76a52ec16c0e3b1245a54c265f60</sum></package><package arch="i686" name="avahi-qt4-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt4-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">aa2305dac5b206f8b856db00c3ac67eed08c04f30ce69d7f4ed99f8ee837f18c</sum></package><package arch="x86_64" name="avahi-compat-howl-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-howl-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">6ceaf205b4e8c0beb7afb3111dd6d2a61b9fb0c0657420255fb5b121b55b0833</sum></package><package arch="x86_64" name="avahi-qt3-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt3-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">ff742be95e511f18dfc5776f8d38210e3d1070ff0d85436cf122222b61de51f1</sum></package><package arch="x86_64" name="avahi-glib-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-glib-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">e5ba84c4c058a409c82631d6eb1f12ac013455b9da08c8149ff8fa015118c302</sum></package><package arch="i686" name="avahi-compat-libdns_sd" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-libdns_sd-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">e2d8c5e106ac0bd2db3b909aa4aed63905ff555d303a4b53e370630fe2dd6216</sum></package><package arch="x86_64" name="avahi-qt4-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt4-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">992d9d828e922331225f9846794b09fcb6f6cd191be42c5c5286b86ea35990a9</sum></package><package arch="x86_64" name="avahi-ui-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-ui-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">67d726205c2ad6a4e4bcfbfdb94dc84f6ed87fe263201cfea3d6a10f3e5927d5</sum></package><package arch="x86_64" name="avahi-compat-libdns_sd" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-libdns_sd-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">5cdc27c0be9729522a5e9c861088d446ad7dbf22afea1d45e0e0a4b67258e590</sum></package><package arch="i686" name="avahi-qt3" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt3-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">0f560172481ad6f5322fc9123fa74f097af31adabbd47096c20f22e5abbd4088</sum></package><package arch="x86_64" name="avahi-libs" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-libs-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">1d6a330dee4be71229ca1ad5e92360b72f53e44b18a9aa55f2014a812662502b</sum></package><package arch="x86_64" name="avahi-qt4" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt4-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">d237e61ac89d8a039473c9a505aa9bdae48944b46c104377b075a7ac707f03a1</sum></package><package arch="x86_64" name="avahi-ui-tools" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-ui-tools-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">936c5d4623c65da33720120605f96bc51bfa39fac126cf82bebf1e729e68342d</sum></package><package arch="x86_64" name="avahi-gobject" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-gobject-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">3b98f7a82ac5bb8533607bf31ec9c4149c01f6a7e43d3381096c4352a4c2450d</sum></package><package arch="x86_64" name="avahi-compat-libdns_sd-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-libdns_sd-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">d43841634457342253ee168c73fb7f50e8c0890d127f17fc0db9dd782468eb2b</sum></package><package arch="x86_64" name="avahi-tools" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-tools-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">9f3648a331c2304dcff7d15b94986def3db7f53bd9047863b1364e7dfd27fc5a</sum></package><package arch="i686" name="avahi-compat-howl" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-howl-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">02d72880002720a63d970e7cc07010d330457f5477a55615e0870347324e3d62</sum></package><package arch="x86_64" name="avahi-ui" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-ui-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">8fda8ef72b052df0d60e7f0d873773d3207d555874c3ac5f3b269ccb7b7b6837</sum></package><package arch="i686" name="avahi-ui-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-ui-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">d5b5afe6a2a0f60839954606a92310cd61ed566cf33715ee1a708faabcf4b9ea</sum></package><package arch="x86_64" name="avahi-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-devel-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">66b097d213555da25959327c7d70efc166b0d8c59747689feefd508166f06fb3</sum></package><package arch="i686" name="avahi-glib" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-glib-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">c92395a7b8ca7c4b217e08785ad47fc4fedc28461c3c8bb9af380fe73c7f843c</sum></package><package arch="x86_64" name="avahi-qt3" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt3-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">225cc35e6d8766d62d63cf0444980eccf2f7b2f091532b3c09b92a0b4c17918f</sum></package><package arch="x86_64" name="avahi-compat-howl" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-howl-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">19c5df70cc0a8887b389df7813bec51a0266cb9d4a5b227cce2df90c84d9ba65</sum></package><package arch="i686" name="avahi-qt3-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt3-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">615c7cb4449a52bc629843f299d3f8b8ca1c65caa9c664031e24ba95e73bff67</sum></package><package arch="x86_64" name="avahi-dnsconfd" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-dnsconfd-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">e2585f1b3db95fe8eee01e55b0c5970f89160fcfc0e6f9295033c2598a1fb289</sum></package><package arch="i686" name="avahi-qt4" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-qt4-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">ebd4042376d00bfee9f187644c2994f8b853215638ac1e1b260fe30305a35f29</sum></package><package arch="i686" name="avahi-glib-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-glib-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">45beb7a7ca816a3a63213d805e6964e8ff7e4f0a4453c41879213126eee3b924</sum></package><package arch="i686" name="avahi-gobject" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-gobject-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">3505b40a2463ffc3055b4941b2f0cc5e092ff0d6a079a9ea8e8c24a36263d05e</sum></package><package arch="i686" name="avahi-compat-howl-devel" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-compat-howl-devel-0.6.25-15.el6_8.1.i686.rpm</filename><sum type="sha256">f6a32898b451b0864e5734cf2e457ce0a5106c7f1a014d8a32097e7fa92a859d</sum></package><package arch="x86_64" name="avahi-autoipd" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-autoipd-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">006a06ba2aa41f07fa3857772bfb523a0594f11d429dc5028a2faab85379b8c2</sum></package><package arch="x86_64" name="avahi" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">7b30ef9ed37c7ce53f63123a8b145ece5ea0c9efe1a3eaf1b1d6558719403188</sum></package><package arch="x86_64" name="avahi-glib" release="15.el6_8.1" src="avahi-0.6.25-15.el6_8.1.src.rpm" version="0.6.25"><filename>avahi-glib-0.6.25-15.el6_8.1.x86_64.rpm</filename><sum type="sha256">caa43b03916b924877aabdce1aa9824becd2b6ddb848c315d7396ba6e5739561</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1663" id="RHBA-2016:1663-1" title="Rhba-2016:1663-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357125" id="1357125" title="Syslog Filled With &apos;Invalid Response Packet From Host&apos; Messages" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1665-1</id><title>Pcs Bug Fix Update</title><description>This update fixes the following bug:

* When stopping the cluster on all nodes by running "pcs cluster stop --all", resources that require the Distributed Lock Manager (DLM), such as Global File System 2 (GFS2) or clustered logical volumes, in some cases lost quorum before they were able to shut down. As a consequence, the stop operation became unresponsive. With this update, "pcs cluster stop --all" stops the cman service on all nodes only after Pacemaker has stopped those nodes. As a result, quorum is maintained while all resources are stopping, and the stop operation no longer hangs in the described situation.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="pcs" release="7.el6_8.1" src="pcs-0.9.148-7.el6_8.1.src.rpm" version="0.9.148"><filename>pcs-0.9.148-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">cede97c329d58c411cb593a3c052806ace6208cdc6cfce23ba1c4073d515ca28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1665" id="RHBA-2016:1665-1" title="Rhba-2016:1665-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357819" id="1357819" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1666-1</id><title>Tcsh Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the output of the "jobs" built-in command was displayed to standard error instead of standard output. This bug has been fixed, and the output of "jobs" is now correctly displayed to stdout.

* This update fixes several regressions in the tcsh command language interpreter:

- When browsing command history using the &amp;lt;Ctrl+P&amp;gt; or &amp;lt;UpArrow&amp;gt; keys, backslashes are now shown correctly  - A backslash now correctly escapes user-defined aliases; this fixes git-completion  - The output of the "time" built-in command is now correctly captured when used with the "setenv" built-in command</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="tcsh" release="35.el6_8.1" src="tcsh-6.17-35.el6_8.1.src.rpm" version="6.17"><filename>tcsh-6.17-35.el6_8.1.x86_64.rpm</filename><sum type="sha256">00c5451d96890210d570100c557bcbde744252f6be943e165fd1edd154f2c3fa</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1666" id="RHBA-2016:1666-1" title="Rhba-2016:1666-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357126" id="1357126" title="Tcsh: Quoted Backslashes Gets Repeated When Taken From History" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357127" id="1357127" title="Output Of Tcsh Builtin Command &apos;Jobs&apos; Now Goes To Stderror." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1667-1</id><title>Cronie Bug Fix Update</title><description>* Previously, getpwnam() failures were not handled as temporary failures. Consequently, cron jobs failed to be executed not only during downtime of the server providing user identity, but also after the server was running again. With this update, all getpwnam() failures are handled as temporary. As a result, cron jobs are executed after user identity server downtime.

* Previously, when cronie was set to redirect cron job output to syslog using the "-s" flag, the output loop exited prematurely. Consequently, the output was truncated after the first character. With this update, the output loop no longer exits prematurely. As a result, cron job output is logged correctly now.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="cronie-noanacron" release="16.el6_8.2" src="cronie-1.4.4-16.el6_8.2.src.rpm" version="1.4.4"><filename>cronie-noanacron-1.4.4-16.el6_8.2.x86_64.rpm</filename><sum type="sha256">29f61b2f189118efa1f6766576b32a45382e0288e3d95dd49d1434dc2bf72e7a</sum></package><package arch="x86_64" name="cronie" release="16.el6_8.2" src="cronie-1.4.4-16.el6_8.2.src.rpm" version="1.4.4"><filename>cronie-1.4.4-16.el6_8.2.x86_64.rpm</filename><sum type="sha256">6856e93cc20ca55a9465a69c9e90cbeb05775d3bb21722e30a428e31ea00285b</sum></package><package arch="x86_64" name="cronie-anacron" release="16.el6_8.2" src="cronie-1.4.4-16.el6_8.2.src.rpm" version="1.4.4"><filename>cronie-anacron-1.4.4-16.el6_8.2.x86_64.rpm</filename><sum type="sha256">8f3efb260595935d8a50a6e811bea5e2f194971989ba5004afdf7d58d06d73e1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1667" id="RHBA-2016:1667-1" title="Rhba-2016:1667-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358803" id="1358803" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358804" id="1358804" title="Cronie Has A Bug When Run With Syslog Flag" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1668-1</id><title>Net-Snmp Bug Fix Update</title><description>This update fixes the following bug:

* Previously, all the SNMPv1 and SNMPv2c responses that followed an SNMPv3 message were checked against the last recorded SNMPv3 "max message size" property. As a consequence, an SNMPv3 request with a small "max message size" could lead to SNMPv1 and SNMPv2c bulk requests timing out. With this update, the session maximum message size is checked only for SNMPv3 requests, and the SNMPv1 and SNMPv2c response is no longer timed out.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="net-snmp-devel" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-57.el6_8.1.x86_64.rpm</filename><sum type="sha256">04e0abc1ca773838eee2cb411bc8e5492425829e33aa496aa00e24d2fe0df329</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-devel-5.5-57.el6_8.1.i686.rpm</filename><sum type="sha256">365e8cd92aeedf5bd16ca0e561d1feac4befb03dfcb1b99efd48b616e89f1595</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-57.el6_8.1.x86_64.rpm</filename><sum type="sha256">936665d592ce19b36742e9069aed1f856c5d8a60e912dc56c4a420565740b466</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-perl-5.5-57.el6_8.1.x86_64.rpm</filename><sum type="sha256">bbe4dabf8b9e9761218a094753ee22926d933ed176bcbacd06b13af0bb5fae5c</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-libs-5.5-57.el6_8.1.i686.rpm</filename><sum type="sha256">0469c7a851bc66b7bc68f52c6b6ca9427a11a55a645164ea3b49b5b551d8e405</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-5.5-57.el6_8.1.x86_64.rpm</filename><sum type="sha256">d7c400467b62b9aaf78330c88ca4229148aaca9e949e29af63ee9ba1dd6fabc6</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-utils-5.5-57.el6_8.1.x86_64.rpm</filename><sum type="sha256">ccdbdc9ab07769ad5ba2a497443c8e4e216d137c42f8f9f76313142abb350a55</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="57.el6_8.1" src="net-snmp-5.5-57.el6_8.1.src.rpm" version="5.5"><filename>net-snmp-python-5.5-57.el6_8.1.x86_64.rpm</filename><sum type="sha256">99e868973f9126ff1277f0d22a62f5d11c579a2784b306c24a8549ba4db7a964</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1668" id="RHBA-2016:1668-1" title="Rhba-2016:1668-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363606" id="1363606" title="Snmp Response: Too Long" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1669-1</id><title>Samba Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the winbind process leaked memory on each user login when using offline logins with cached credentials. As a consequence, the memory allocated to that process continued to grow. When the system run out of memory, the kernel out-of-memory (OOM) killer terminated the leaking process or all winbind processes. If the leaking process was terminated, the user had to retry logging in and a new process was started automatically. However, if all winbind processes were terminated, winbind- provided users could not log in and the service has to be manually started again. A patch has been applied and winbind no longer leaks memory.

After installing this update, the smb service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="samba-client" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-client-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">4cf8d8ec8b368d3e98b60a687f1d8abe58c110b5877ae6447048bb61623085f4</sum></package><package arch="i686" name="samba-winbind-devel" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-36.el6_8.i686.rpm</filename><sum type="sha256">dcd27140aa2117c1db08f12bf513387960ae8aaa5aa8514980c8c65598e487fa</sum></package><package arch="x86_64" name="samba-winbind-clients" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">78244d4b7136d134bc99354642282189423dd0be5cd68910c53777dd93917356</sum></package><package arch="x86_64" name="samba" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">b99e123b32d2e147e683e4ac2045eeb026f6a8d96aef54d3fb771281b0b2c87a</sum></package><package arch="x86_64" name="samba-common" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">6cc4b3c356f1cba522b643096775839f69d8c2f0038db704668b10682fec7ae5</sum></package><package arch="x86_64" name="libsmbclient" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">ac2932064f47ff101ca88709ad4b6a8b56c562484732bb13c168eb64680ab4d1</sum></package><package arch="x86_64" name="samba-glusterfs" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-glusterfs-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">36931f7e291b4d02ec04fec44fc30f68a430edf4a9ed3e9265a2e93efb46054f</sum></package><package arch="i686" name="samba-common" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-common-3.6.23-36.el6_8.i686.rpm</filename><sum type="sha256">863643c9de7ce2fd657e17a120a9490a3afde8c9211efb8f577d66f52df70139</sum></package><package arch="x86_64" name="samba-domainjoin-gui" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-domainjoin-gui-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">c4b27f5b889cf2f87f08a9d237d675d97323fd47c2df3ee7d46d0a2f202e4054</sum></package><package arch="x86_64" name="samba-winbind-devel" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-devel-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">c8842af40bb3f4afe1a4ecc6db298000c483a26527a252015fe33d47cf8ff8eb</sum></package><package arch="i686" name="libsmbclient" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-3.6.23-36.el6_8.i686.rpm</filename><sum type="sha256">2df1db83880bdeb8911409b06cb5afa03f55d231b81b58c1e8a670d833f818d0</sum></package><package arch="x86_64" name="samba-doc" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-doc-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">632bba20908a6d94f2b2e8c3587a259491e42e7cc03af8700ef709d26ee90924</sum></package><package arch="i686" name="libsmbclient-devel" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-36.el6_8.i686.rpm</filename><sum type="sha256">7f29f8da8c175bcc81c3ec38081ec406f805bc9ab6446aa286a0afffc613ae72</sum></package><package arch="x86_64" name="samba-winbind" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">20a01d46c8763ce1f3984d3b540099ee5e3daa37fdde6f48722279b73a141041</sum></package><package arch="x86_64" name="samba-swat" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-swat-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">14df15939aabaad4663d43a27a65c77bf2d2935d20ef2142fc634340e11da424</sum></package><package arch="i686" name="samba-winbind-clients" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-clients-3.6.23-36.el6_8.i686.rpm</filename><sum type="sha256">a7b86ef82ed91af748f97d45ccc19a8783c33014048ff30c82bafaab32a4c2d6</sum></package><package arch="x86_64" name="libsmbclient-devel" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>libsmbclient-devel-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">61f075fae79e8fe84aa0b417af977860693679cf8f74652f6ffd4101298f17f7</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="36.el6_8" src="samba-3.6.23-36.el6_8.src.rpm" version="3.6.23"><filename>samba-winbind-krb5-locator-3.6.23-36.el6_8.x86_64.rpm</filename><sum type="sha256">4220eec87b759cf5766a22a03b7651ccb8d0e4e33889fbb9feab20695d537d7f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1669" id="RHBA-2016:1669-1" title="Rhba-2016:1669-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364363" id="1364363" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1670-1</id><title>Lvm2 Bug Fix Update</title><description>This update fixes the following bug:

* LVM2 handled automatic updates from a previous physical volume (PV) header extension version to the latest one at an incorrect time: when a new PV header could be written, but the volume group (VG) metadata write operation could still fail. Also, the PV header rewrite operation at an incorrect time could cause the VG metadata write operation to fail. As a consequence, VG metadata failure led to a new PV header being written with no VG metadata. With this update, the code that handles automatic PV header extension updates is ordered correctly. As a result, when using later versions of LVM2 tools that automatically update earlier versions of PV header extensions, the described failure no longer occurs.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="device-mapper-event" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-event-1.02.117-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">2616a4286f5efba8bad69d8fd4b82f9a6425bd63fbcdbecb7ad929391adcaf23</sum></package><package arch="i686" name="lvm2-devel" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>lvm2-devel-2.02.143-7.el6_8.1.i686.rpm</filename><sum type="sha256">edd9cf2995134a9964f46417c63494593578e0326a3f80821d45bf2bcad25b04</sum></package><package arch="i686" name="device-mapper-event-libs" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-event-libs-1.02.117-7.el6_8.1.i686.rpm</filename><sum type="sha256">ca54896bc7a7f28eefbd9fa74cd424d2ba7e832dc103401dbfabe72112d284c0</sum></package><package arch="x86_64" name="cmirror" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>cmirror-2.02.143-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">f5113d43c88a04e2c42d64c1f8593e02945bd56a6a318d88162788de02046993</sum></package><package arch="x86_64" name="device-mapper-event-libs" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-event-libs-1.02.117-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">007a197ef171e1fe48fb9ff0065d0808874031f03ce97148b4faa167aede8b34</sum></package><package arch="x86_64" name="lvm2" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>lvm2-2.02.143-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">594329d0a154e6f0d3beda24153502abddff84cd40cc1556964d58579700a437</sum></package><package arch="x86_64" name="lvm2-devel" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>lvm2-devel-2.02.143-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">45350443dc5b414a302e006658fd59c46d447724fd89fd4de20f6e292fe70f58</sum></package><package arch="x86_64" name="device-mapper-libs" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-libs-1.02.117-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">36c0490b84e05dea1927e3baf3e71a78eb3e4923f9efab76a56d91004d714a3b</sum></package><package arch="x86_64" name="device-mapper" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-1.02.117-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">f1f3c2812f4da23ab42297817e000be4008cc10049a63e5971e06ec368227a42</sum></package><package arch="i686" name="device-mapper-event-devel" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-event-devel-1.02.117-7.el6_8.1.i686.rpm</filename><sum type="sha256">663639dcb7bd1447d53c628799b83d64ad71328ead56bb35016ec2023dbd968d</sum></package><package arch="x86_64" name="device-mapper-devel" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-devel-1.02.117-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">371e6801219e74d473ae4459f8035debdc40d654611eb627f51674d28744cd26</sum></package><package arch="x86_64" name="lvm2-libs" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>lvm2-libs-2.02.143-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">9788ce0a2ca13af5dc03fcbaf58994ddf9b929734acff81a034e93f014503908</sum></package><package arch="x86_64" name="lvm2-cluster" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>lvm2-cluster-2.02.143-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">ce27bf92e4b217ef70c28fce8a0e70e6fab91fc6cfe99437a82fd593a0d7771a</sum></package><package arch="i686" name="device-mapper-devel" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-devel-1.02.117-7.el6_8.1.i686.rpm</filename><sum type="sha256">eac9ecf55f239d93362695900a813b238fd4c925893377a692c85a27a6dc9b59</sum></package><package arch="i686" name="lvm2-libs" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="2.02.143"><filename>lvm2-libs-2.02.143-7.el6_8.1.i686.rpm</filename><sum type="sha256">a2bf9a5201a907b85787d5470b18ac514939175f68350c374733647f85818d0e</sum></package><package arch="x86_64" name="device-mapper-event-devel" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-event-devel-1.02.117-7.el6_8.1.x86_64.rpm</filename><sum type="sha256">7d659706bdc871ee4d2225733a178e2eca66a0ff100c3abac9d2e47744c90fb5</sum></package><package arch="i686" name="device-mapper-libs" release="7.el6_8.1" src="lvm2-2.02.143-7.el6_8.1.src.rpm" version="1.02.117"><filename>device-mapper-libs-1.02.117-7.el6_8.1.i686.rpm</filename><sum type="sha256">8c1d6ad9c1700919b49771289c50654ead5a5d18a7406bb2fabe3c4f8eb3f4b7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1670" id="RHBA-2016:1670-1" title="Rhba-2016:1670-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366531" id="1366531" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1819-1</id><title>Udev Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the udev device manager applied permission changes only on add events. As a consequence, using the VDSM service to connect to storage pools failed. This update ensures that udev changes permissions on all appropriate events, which enables VDSM to connect to storage pools properly.</description><release>Scientific Linux Fermi</release><issued date="2016-09-20 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libudev" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libudev-147-2.73.el6_8.2.x86_64.rpm</filename><sum type="sha256">b8f6c0000341dddcb7da5adecf3e37fc5517b37f2ccce3efa823cbd7f8b4a1b7</sum></package><package arch="x86_64" name="udev" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>udev-147-2.73.el6_8.2.x86_64.rpm</filename><sum type="sha256">494253b9a720a3c191d31ed88389b6ca7addded7e98dd1704232e30126018c9e</sum></package><package arch="x86_64" name="libgudev1" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libgudev1-147-2.73.el6_8.2.x86_64.rpm</filename><sum type="sha256">862f53542859dc3c80ef884149c37dad08f74fb23007eb50f94efb277ae551c1</sum></package><package arch="i686" name="libgudev1-devel" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libgudev1-devel-147-2.73.el6_8.2.i686.rpm</filename><sum type="sha256">d12e5f6828b61e1cc763a4c230a9d89f4f16e676138d0737f9fd93b3267e01d5</sum></package><package arch="i686" name="libgudev1" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libgudev1-147-2.73.el6_8.2.i686.rpm</filename><sum type="sha256">aee6b0e42366b45451146c62dea80bb8755dca502fd23354ebc2c289c1434287</sum></package><package arch="i686" name="libudev-devel" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libudev-devel-147-2.73.el6_8.2.i686.rpm</filename><sum type="sha256">cc6686b294aa9a4302d570bf197902defeecccaf5724540d3ef2c3666f4809ab</sum></package><package arch="i686" name="libudev" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libudev-147-2.73.el6_8.2.i686.rpm</filename><sum type="sha256">8b1166f7ab53ad497e068fab6f68df5ed1ce642a4ba365e611b3bebd2122bf22</sum></package><package arch="x86_64" name="libgudev1-devel" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libgudev1-devel-147-2.73.el6_8.2.x86_64.rpm</filename><sum type="sha256">c4751ed8c45feafbc6427640fbf41e5f8a15667e29eaba852cc437af8b019832</sum></package><package arch="x86_64" name="libudev-devel" release="2.73.el6_8.2" src="udev-147-2.73.el6_8.2.src.rpm" version="147"><filename>libudev-devel-147-2.73.el6_8.2.x86_64.rpm</filename><sum type="sha256">65ab62e816805af8548c620398da08a276ff0db614e33db6927a65d64ec1ca45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1819" id="RHBA-2016:1819-1" title="Rhba-2016:1819-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371457" id="1371457" title="[Rhel6.8.Z] Udev Applies Permission Changes Only On Add Events" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:1999-1</id><title>Iscsi-Initiator-Utils Bug Fix Update</title><description>This update fixes the following bug:

* Discovery of iSCSI storage targets using the Internet Storage Name Service (iSNS) protocol did not properly bind the discovered target portal to offloading iSCSI Host Bus Adapter (HBA) interfaces. As a consequence, iSNS discovery failed when performed by offloading iSCSI HBAs. With this update, iSNS binds the target portal as expected, and thus ensures that offloading iSCSI HBAs enables iSNS discovery.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="iscsi-initiator-utils" release="22.el6_8" src="iscsi-initiator-utils-6.2.0.873-22.el6_8.src.rpm" version="6.2.0.873"><filename>iscsi-initiator-utils-6.2.0.873-22.el6_8.x86_64.rpm</filename><sum type="sha256">71d2cb8c395b46d171de8e3593e3168a0dd0203b91c3534abbb068519ac8cdb7</sum></package><package arch="x86_64" name="iscsi-initiator-utils-devel" release="22.el6_8" src="iscsi-initiator-utils-6.2.0.873-22.el6_8.src.rpm" version="6.2.0.873"><filename>iscsi-initiator-utils-devel-6.2.0.873-22.el6_8.x86_64.rpm</filename><sum type="sha256">24dd7a137988538fa6b43736b97a5fb677142dbf566625e3532d3cfcc443bb4a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1999" id="RHBA-2016:1999-1" title="Rhba-2016:1999-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365615" id="1365615" title="Isns Discovery Support Through Offloaded Ifaces" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2000-1</id><title>Grep Bug Fix Update</title><description>This update fixes the following bug:

* In the past, the "grep -r PATTERN" command incorrectly read from the standard input instead of recursively scanning the current directory for files containing the PATTERN. This has been fixed in a past update. However, the new correct behavior broke some scripts that assumed the old functionality.

This update introduces a backward compatibility environment variable GREP_LEGACY_R. If set to '1', it makes grep behave the old incorrect way, and can be used to make the old scripts work again.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="grep" release="5.el6_8" src="grep-2.20-5.el6_8.src.rpm" version="2.20"><filename>grep-2.20-5.el6_8.x86_64.rpm</filename><sum type="sha256">99b8d1fef95c0874c334922d07a90c1a109d33abd28b740213f30cef9f227dc8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2000" id="RHBA-2016:2000-1" title="Rhba-2016:2000-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367309" id="1367309" title="Grep -R Has Been Broken In Rhel 6.7" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2001-1</id><title>Nfs-Utils Bug Fix Update</title><description>This update fixes the following bug:

* Due to an incorrectly used variable in the find_keytab_entry() function, the rpc.gssd service terminated unexpectedly with a segmentation fault when reading the /etc/krb5.keytab file. A patch has been applied to  and rpc.gssd no longer crashes in the described situation.

After installing this update, the nfs service will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="nfs-utils" release="70.el6_8.2" src="nfs-utils-1.2.3-70.el6_8.2.src.rpm" version="1.2.3"><filename>nfs-utils-1.2.3-70.el6_8.2.x86_64.rpm</filename><sum type="sha256">1bde3013f8e210f05c77b71af9bf462c951f13102c4acbeaab6b06651600df07</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2001" id="RHBA-2016:2001-1" title="Rhba-2016:2001-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363837" id="1363837" title="Cthon - Rpc.Gssd Crash Reading Krb5.Keytab In Find_Keytab_Entry()" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2002-1</id><title>Ipa Bug Fix Update</title><description>This update fixes the following bug: * Previously, "ipa-replica-prepare" command used the "/root/cacert.p12" certificate to prepare a replication file. This file was generated during the Identity Management (IdM) installation and never subsequently updated. As a consequence, if the certificate has been already expired, the "ipa-replica-install" command failed. With this update, latest certificate is exported from LDAP to prepare a replication file. As a result, "ipa-replica-install" finishes successfully.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="ipa-server-trust-ad" release="50.el6_8.3" src="ipa-3.0.0-50.el6_8.3.src.rpm" version="3.0.0"><filename>ipa-server-trust-ad-3.0.0-50.el6_8.3.x86_64.rpm</filename><sum type="sha256">c6b34061e35ee648acff22d1bbe1b0618696d7d47ee8fc42fca54f4b2390db24</sum></package><package arch="x86_64" name="ipa-admintools" release="50.el6_8.3" src="ipa-3.0.0-50.el6_8.3.src.rpm" version="3.0.0"><filename>ipa-admintools-3.0.0-50.el6_8.3.x86_64.rpm</filename><sum type="sha256">5370ade7b6782b8d1db8d8337911d2baa81fc37150c70eb13381eb154c1e74c5</sum></package><package arch="x86_64" name="ipa-server" release="50.el6_8.3" src="ipa-3.0.0-50.el6_8.3.src.rpm" version="3.0.0"><filename>ipa-server-3.0.0-50.el6_8.3.x86_64.rpm</filename><sum type="sha256">67eb1ea0ea4d13114c2fcd8024fe5dfafaa95fe8fc149945cfbb3e4f070e1dde</sum></package><package arch="x86_64" name="ipa-server-selinux" release="50.el6_8.3" src="ipa-3.0.0-50.el6_8.3.src.rpm" version="3.0.0"><filename>ipa-server-selinux-3.0.0-50.el6_8.3.x86_64.rpm</filename><sum type="sha256">db403ace9552aadc7e317250c5c9009959873147e12c3b32b78347619d54fcb0</sum></package><package arch="x86_64" name="ipa-python" release="50.el6_8.3" src="ipa-3.0.0-50.el6_8.3.src.rpm" version="3.0.0"><filename>ipa-python-3.0.0-50.el6_8.3.x86_64.rpm</filename><sum type="sha256">27cf30d49ebc91ba581c239810beac086c2a7c2f5c59a1578882a98823325186</sum></package><package arch="x86_64" name="ipa-client" release="50.el6_8.3" src="ipa-3.0.0-50.el6_8.3.src.rpm" version="3.0.0"><filename>ipa-client-3.0.0-50.el6_8.3.x86_64.rpm</filename><sum type="sha256">aae114f1b741b862d4b15a9ec4bbc944b4f360b4f6f9e1b6b0f97b927bbbc326</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2002" id="RHBA-2016:2002-1" title="Rhba-2016:2002-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369470" id="1369470" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2003-1</id><title>Lftp Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the code of the lftp utility could not handle packets that were not in the correct order. Consequently, when mirroring a directory, the lftp utility became unresponsive after downloading one file. With this update, the bug has been fixed, and the entire directory is mirrored successfully.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="lftp-scripts" release="6.el6_8.3" src="lftp-4.0.9-6.el6_8.3.src.rpm" version="4.0.9"><filename>lftp-scripts-4.0.9-6.el6_8.3.noarch.rpm</filename><sum type="sha256">2f207eccad34cc75354d2e5b4b903bee80a59c5578548557de3295091e77b8e2</sum></package><package arch="i686" name="lftp" release="6.el6_8.3" src="lftp-4.0.9-6.el6_8.3.src.rpm" version="4.0.9"><filename>lftp-4.0.9-6.el6_8.3.i686.rpm</filename><sum type="sha256">8073d0436c2f3bbfd949d58b0fe67fe73d6c60382fa06739fbf43bb28590b94a</sum></package><package arch="x86_64" name="lftp" release="6.el6_8.3" src="lftp-4.0.9-6.el6_8.3.src.rpm" version="4.0.9"><filename>lftp-4.0.9-6.el6_8.3.x86_64.rpm</filename><sum type="sha256">9f740f95dcc91c8a4ddf49651c666df6c45a1ad47e9a0ce374b2287bb6a2e5bf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2003" id="RHBA-2016:2003-1" title="Rhba-2016:2003-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371565" id="1371565" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2005-1</id><title>Libtirpc Bug Fix Update</title><description>This update fixes the following bug:

* Previously, threads interacting specifically with the libtirpc library were locked into a single lock within libtirpc. As a consequence, a race condition causing a deadlock situation occurred, which led to a decrease or a stop of network traffic. The underlying source code has been modified, and problems with network traffic no longer occur due to this bug.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libtirpc" release="11.el6_8" src="libtirpc-0.2.1-11.el6_8.src.rpm" version="0.2.1"><filename>libtirpc-0.2.1-11.el6_8.i686.rpm</filename><sum type="sha256">5623fd1470bf51d8c1abaf0710e0d17c5032973881455e0893bc1cc919ddfd77</sum></package><package arch="x86_64" name="libtirpc-devel" release="11.el6_8" src="libtirpc-0.2.1-11.el6_8.src.rpm" version="0.2.1"><filename>libtirpc-devel-0.2.1-11.el6_8.x86_64.rpm</filename><sum type="sha256">a398e3b8e8d8fa4af797e029dd248f72f9fc531da397f7a9af6c880db1338ecc</sum></package><package arch="x86_64" name="libtirpc" release="11.el6_8" src="libtirpc-0.2.1-11.el6_8.src.rpm" version="0.2.1"><filename>libtirpc-0.2.1-11.el6_8.x86_64.rpm</filename><sum type="sha256">0faafd8efb6b77f1e440de5a51c58adeb255716bfa780cbf2e71033064cc43ca</sum></package><package arch="i686" name="libtirpc-devel" release="11.el6_8" src="libtirpc-0.2.1-11.el6_8.src.rpm" version="0.2.1"><filename>libtirpc-devel-0.2.1-11.el6_8.i686.rpm</filename><sum type="sha256">fdec5842ebf26fec5360bbda205c699072bf4c092afc04bbf0457910a460107e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2005" id="RHBA-2016:2005-1" title="Rhba-2016:2005-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375529" id="1375529" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2748-1</id><title>Util-Linux-Ng Bug Fix Update</title><description>This update fixes the following bug:

* Previously, after updating the util-linux-ng packages to version 2.17.2 on Scientific Linux 6.8, a corresponding kernel update was not pulled due to a missing RPM dependency in the util-linux-ng spec file. As a consequence, a telnet corruption occurred, and a kernel update with a subsequent reboot was required. This update adds the missing dependency, and the described problem no longer occurs after updating util-linux-ng.</description><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="libblkid" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libblkid-2.17.2-12.24.el6_8.1.i686.rpm</filename><sum type="sha256">ed7e34f10e573b9b2757df24c6d826d1fad595fccb9f7229029ff56053226548</sum></package><package arch="x86_64" name="libuuid-devel" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libuuid-devel-2.17.2-12.24.el6_8.1.x86_64.rpm</filename><sum type="sha256">fb7b91d0d5e891ecde49a3b853df1b3b43d70094feef31535400f8fa85c1f26d</sum></package><package arch="i686" name="libuuid" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libuuid-2.17.2-12.24.el6_8.1.i686.rpm</filename><sum type="sha256">0d3a9e6474f95c38585573becbd7fe108b5e22e4c3884d2ed386b846cc97582e</sum></package><package arch="x86_64" name="uuidd" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>uuidd-2.17.2-12.24.el6_8.1.x86_64.rpm</filename><sum type="sha256">c55d2eea79a1bb30d0cf483825abc84d75390e69d33e12b980b607c7e9fd1eb7</sum></package><package arch="x86_64" name="libuuid" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libuuid-2.17.2-12.24.el6_8.1.x86_64.rpm</filename><sum type="sha256">c88060827b4e6ec762ec228c3ca0fff28acc37952331a550ef40a61946efd240</sum></package><package arch="x86_64" name="util-linux-ng" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>util-linux-ng-2.17.2-12.24.el6_8.1.x86_64.rpm</filename><sum type="sha256">9d3b07760e6fb867c58b4b3ce807663b901cab2d6dfed8ccbe7740024d971456</sum></package><package arch="i686" name="libuuid-devel" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libuuid-devel-2.17.2-12.24.el6_8.1.i686.rpm</filename><sum type="sha256">0ad5735dd15c5477ba32d65a055b4fc46c5c1e8a53d24ae0b74993584b8cacaa</sum></package><package arch="i686" name="util-linux-ng" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>util-linux-ng-2.17.2-12.24.el6_8.1.i686.rpm</filename><sum type="sha256">a02fec0ae37e82061f141dc2d96de982e7ee5757c2e7f47a3f7d34c97cb072bc</sum></package><package arch="x86_64" name="libblkid" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libblkid-2.17.2-12.24.el6_8.1.x86_64.rpm</filename><sum type="sha256">8dc96d9f8abe92840754b54dafdb1d2ff7523d509cd46870d08ce535c1de824b</sum></package><package arch="i686" name="libblkid-devel" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libblkid-devel-2.17.2-12.24.el6_8.1.i686.rpm</filename><sum type="sha256">fb3dc617770ebcb541ac54734a40429842f8663e7a8160c9f78d42348b5072ce</sum></package><package arch="x86_64" name="libblkid-devel" release="12.24.el6_8.1" src="util-linux-ng-2.17.2-12.24.el6_8.1.src.rpm" version="2.17.2"><filename>libblkid-devel-2.17.2-12.24.el6_8.1.x86_64.rpm</filename><sum type="sha256">ab9235b3808ff31ac1cebe50b02b51f8fe5e13ea499915ccf832dcc25adb8028</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2748" id="RHBA-2016:2748-1" title="Rhba-2016:2748-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349192" id="1349192" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2767-1</id><title>Wpa_Supplicant Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the wpa_supplicant service stopped responding to Extensible Authentication Protocol (EAP) Identity Request packets after wpa_supplicant was reloaded, that is after receiving the SIGHUP signal. As a consequence, clients using IEEE802.1x-port-based authentication lost connectivity until wpa_supplicant was restarted. With this update, the client is deauthenticated after reconfiguration. As a result, clients using IEEE802.1x-port-based authentication no longer lose connectivity in the described situation.</description><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="8.el6_8.1" src="wpa_supplicant-0.7.3-8.el6_8.1.src.rpm" version="0.7.3"><filename>wpa_supplicant-0.7.3-8.el6_8.1.x86_64.rpm</filename><sum type="sha256">9d1cfeabba5758513f8d812642a39b6f215e6cd85f2715a29835acce51d105f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2767" id="RHBA-2016:2767-1" title="Rhba-2016:2767-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372333" id="1372333" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2768-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the HTTPS back end was unable to handle a request with an absoluteURI. Consequently, when the ProxyRemote directive was configured, request processing failed. This bug has been fixed, and requests are handled correctly in the described situation.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="mod_ssl" release="54.sl6.1" src="httpd-2.2.15-54.sl6.1.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-54.sl6.1.x86_64.rpm</filename><sum type="sha256">010460a38eb950903add45cc7371f1a0abce82084bd6e89611ab8ee9e2eed31d</sum></package><package arch="noarch" name="httpd-manual" release="54.sl6.1" src="httpd-2.2.15-54.sl6.1.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-54.sl6.1.noarch.rpm</filename><sum type="sha256">8863ff195af566cedc09642046cab93a931b944d4c4cd37acc94f4c668da3090</sum></package><package arch="x86_64" name="httpd-tools" release="54.sl6.1" src="httpd-2.2.15-54.sl6.1.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-54.sl6.1.x86_64.rpm</filename><sum type="sha256">800cb40fdcbde239359032c7a02eda703eda15bbbacb3fe1fabf2c4754d2de3c</sum></package><package arch="i686" name="httpd-devel" release="54.sl6.1" src="httpd-2.2.15-54.sl6.1.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-54.sl6.1.i686.rpm</filename><sum type="sha256">31ceccc284e9382b223ad7ac85d5b7a689385cf98a0be638f7efd6b8c3ad0f6b</sum></package><package arch="x86_64" name="httpd-devel" release="54.sl6.1" src="httpd-2.2.15-54.sl6.1.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-54.sl6.1.x86_64.rpm</filename><sum type="sha256">b0f4b0dd41dfcf52c3d76fe0f31d84982527d387405842c495ab27bffc4aaf2d</sum></package><package arch="x86_64" name="httpd" release="54.sl6.1" src="httpd-2.2.15-54.sl6.1.src.rpm" version="2.2.15"><filename>httpd-2.2.15-54.sl6.1.x86_64.rpm</filename><sum type="sha256">c9a9ab19863079e7be6b5716ff15367042c266f58267d9c22477aa51f7236e4d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2768" id="RHBA-2016:2768-1" title="Rhba-2016:2768-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374729" id="1374729" title="Proxyremote With Https Backend Sends Requests With Absoluteuri Instead Of Abs_Path" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2770-1</id><title>Kexec-Tools Bug Fix Update</title><description /><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kexec-tools-eppic" release="300.el6_8.1" src="kexec-tools-2.0.0-300.el6_8.1.src.rpm" version="2.0.0"><filename>kexec-tools-eppic-2.0.0-300.el6_8.1.x86_64.rpm</filename><sum type="sha256">ae8b594667147380e522143e502108a6fe09bfb586ad846c03441ad572a91cda</sum></package><package arch="x86_64" name="kexec-tools" release="300.el6_8.1" src="kexec-tools-2.0.0-300.el6_8.1.src.rpm" version="2.0.0"><filename>kexec-tools-2.0.0-300.el6_8.1.x86_64.rpm</filename><sum type="sha256">0a9a7f41e41a5106e0aa4bf83f2e31d5dde181c6cade0dcdb3d12f8aca99fd67</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2770" id="RHBA-2016:2770-1" title="Rhba-2016:2770-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375890" id="1375890" title="Kdump Fails To Start Due To The Customer Using A Tap Device On Openvpn." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2772-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the SELinux policy prevented the GlusterFS volumes configured for the Remote Direct Memory Access (RDMA) transport from the File System in User Space (FUSE) mounting. With this update, a patch has been applied that fixes this bug, and the SELinux denial no longer occurs in the described situation.

* Prior to this update, SELinux did not allow the HugeTLBfs memory management feature for the Apache web server. As a consequence, PHP7 in FastCGI Process Manager (FPM) mode did not work properly. The selinux- policy packages have been updated, and HugeTLBfs is now available.

* Previously, with SELinux in enforcing mode, it was not possible to create a UNIX Domain Socket on the Red Hat Gluster Storage volumes. As a consequence, the user could not store containers on the volumes. The relevant policy module has been updated, and the user is now able to store containers on the Red Hat Storage Gluster volumes.</description><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="selinux-policy-minimum" release="292.el6_8.2" src="selinux-policy-3.7.19-292.el6_8.2.src.rpm" version="3.7.19"><filename>selinux-policy-minimum-3.7.19-292.el6_8.2.noarch.rpm</filename><sum type="sha256">143df9a89bb66391e0f64d932217d102830a4f0c59ff5fbe5f71bc2ee18d8695</sum></package><package arch="noarch" name="selinux-policy-mls" release="292.el6_8.2" src="selinux-policy-3.7.19-292.el6_8.2.src.rpm" version="3.7.19"><filename>selinux-policy-mls-3.7.19-292.el6_8.2.noarch.rpm</filename><sum type="sha256">a25a31158b44866ddd504273ab1543341edbfd4656459afbec1e74c454ec381b</sum></package><package arch="noarch" name="selinux-policy-targeted" release="292.el6_8.2" src="selinux-policy-3.7.19-292.el6_8.2.src.rpm" version="3.7.19"><filename>selinux-policy-targeted-3.7.19-292.el6_8.2.noarch.rpm</filename><sum type="sha256">cc49682e0b9da207f793ea340795e2db6a94b5e66a0d896395bf2c94278ff5be</sum></package><package arch="noarch" name="selinux-policy" release="292.el6_8.2" src="selinux-policy-3.7.19-292.el6_8.2.src.rpm" version="3.7.19"><filename>selinux-policy-3.7.19-292.el6_8.2.noarch.rpm</filename><sum type="sha256">1934f1ba9b7caae10200d93e9300bf788f3e671f2a2d5abed02e9b99eb8900a4</sum></package><package arch="noarch" name="selinux-policy-doc" release="292.el6_8.2" src="selinux-policy-3.7.19-292.el6_8.2.src.rpm" version="3.7.19"><filename>selinux-policy-doc-3.7.19-292.el6_8.2.noarch.rpm</filename><sum type="sha256">11299856c3785bcbd5abf4d2a8e52d0ce71a9bb74b31e569ba6c8634a713a180</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2772" id="RHBA-2016:2772-1" title="Rhba-2016:2772-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388582" id="1388582" title="[Rhel6] Selinux Prevents Fuse Mounting Of Rdma Transport Type Volumes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393253" id="1393253" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393267" id="1393267" title="[Selinux]: Cases In Pynfs Test Suite Fails Because Of Selinux Errors." type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2773-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when the ProxyErrorOverride directive was enabled, the mod_cluster load balancer returned the 503 status code on subsequent requests for about one second. This caused failover, which then propagated through the instances. Additionaly, this bug could be used for the denial of service (DoS) attack. With this update, the requests in the described scenario are now handled correctly with the 200 status code.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="mod_ssl" release="55.sl6.2" src="httpd-2.2.15-55.sl6.2.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-55.sl6.2.x86_64.rpm</filename><sum type="sha256">71b059aa5b1cfb143623c72176f7604ccf075b7c119f0e2e12c0362445d4e939</sum></package><package arch="noarch" name="httpd-manual" release="55.sl6.2" src="httpd-2.2.15-55.sl6.2.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-55.sl6.2.noarch.rpm</filename><sum type="sha256">d6a0c2bdfe6e051d2d73caff249f1808e355048bc0240c24c12c6d8a17666fa5</sum></package><package arch="i686" name="httpd-devel" release="55.sl6.2" src="httpd-2.2.15-55.sl6.2.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-55.sl6.2.i686.rpm</filename><sum type="sha256">344cf887efdffdef2c76fc95eff2830c8257fc1f2ffcce7b287aa87e0bb340b1</sum></package><package arch="x86_64" name="httpd-tools" release="55.sl6.2" src="httpd-2.2.15-55.sl6.2.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-55.sl6.2.x86_64.rpm</filename><sum type="sha256">7a5949f4642927a648915974fc8606cbeefcde65eff2e59d0d95733da9604f64</sum></package><package arch="x86_64" name="httpd" release="55.sl6.2" src="httpd-2.2.15-55.sl6.2.src.rpm" version="2.2.15"><filename>httpd-2.2.15-55.sl6.2.x86_64.rpm</filename><sum type="sha256">a68c3890ccf31a7c4a518fea86684f6ad86761fad77d67a7830e6224d39a23b4</sum></package><package arch="x86_64" name="httpd-devel" release="55.sl6.2" src="httpd-2.2.15-55.sl6.2.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-55.sl6.2.x86_64.rpm</filename><sum type="sha256">1488b5a9074b757e5f1b58e5841640d201032837be8eb5fec267742456fcab81</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2773" id="RHBA-2016:2773-1" title="Rhba-2016:2773-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391517" id="1391517" title="When Proxyerroroverride Is On, Modcluster Return  503 Status Code On Subsequent Requests" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2016:2944-1</id><title>Chrony Bug Fix Update</title><description>This update fixes the following bug:

* When chronyd was configured with the smoothtime directive and the leaponly option to perform a server leap smear, the direction of smoothing could be determined incorrectly due to numerical errors in floating point operations. This consequently caused an assertion failure and chronyd terminated unexpectedly. A patch has been applied, which ensures that the direction is calculated and applied correctly when small offsets are employed in a time update.</description><release>Scientific Linux Fermi</release><issued date="2016-12-13 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="chrony" release="2.el6_8" src="chrony-2.1.1-2.el6_8.src.rpm" version="2.1.1"><filename>chrony-2.1.1-2.el6_8.x86_64.rpm</filename><sum type="sha256">610a243abfe32c4309df202a5e0c80bfc95c19214d6ef1225da3e0a4f7e43d68</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2944" id="RHBA-2016:2944-1" title="Rhba-2016:2944-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401533" id="1401533" title="Chronyd Crashes When Performing Server Leap Smear" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0032-1</id><title>Java-1.8.0-Openjdk Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, the Eclipse Compiler for Java (ECJ) could not be used with Tomcat Servlet Container and the OpenJDK 8 class library. As a consequence, using Tomcat to compile JavaServer Pages (JSP) failed. This update modifies the OpenJDK 8 code and prevents it from using features that caused the failure. As a result, Tomcat now compiles JSP more reliably.

All running instances of OpenJDK Java must be restarted for the update to take effect.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">9b3775389e4db646254e634376da0a8ed21b51f7de5b366670d914f6f260dec5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">b1098f8524472cb71a5e1dd8bab771fa225497060e4684af4bd6ad5e37466f78</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">785e43b3f014191b323a871602d88a713435d0d09a4a944f2c351de4d601c6b5</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el6_8.noarch.rpm</filename><sum type="sha256">e1f5c3f3d51f0ead09a037e00349cce541a0bcca23f025e5cec3d9f7703c840d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">4c086372263e5fd08c1ec97bd36590255dc8ef8836d690e5ff6eeeedfd537d5f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">f90a71ab737cadf59338e294925e9e407b060fe6d43e942dea668b7ff319a1cb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">b41e38070d4abc61a558767bd2c0a5928ea2641116630983041b88d3409060a9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">2e3b0886406a9668035a1dafcce87678d3dc35bdd2b9d16db496314d16b482fb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el6_8.noarch.rpm</filename><sum type="sha256">ae1a12b51edae0cd0d75bcc862c8ca9ee0478fb36e26be74e56f65050db81237</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">2a055ec74c5bb35ceabddfef57b81059817972453298d07698b02becdb7980cf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">eb429a172c177cd728e9f044bb4a338421fbc7c67e8795771c31df98782e00c5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b15.el6_8" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el6_8.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el6_8.x86_64.rpm</filename><sum type="sha256">cd7b88dff3f480f1d0202fa5c74738376bc2338eacd4a829ef13337d52e1394e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0032" id="RHBA-2017:0032-1" title="Rhba-2017:0032-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393047" id="1393047" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0033-1</id><title>Orbit2 Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when logging in and out, linc socket files accumulated in the /tmp/orbit-[username]/ directory. Consequently, the /tmp file system quickly became full, which in some cases caused processes running on the system to fail. As a result, the described failures no longer occur.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="ORBit2-devel" release="6.el6_8" src="ORBit2-2.14.17-6.el6_8.src.rpm" version="2.14.17"><filename>ORBit2-devel-2.14.17-6.el6_8.i686.rpm</filename><sum type="sha256">d7d69df69131b61ca06cbbe00f8274107e74d1dbcc97a82f909958df27565cb1</sum></package><package arch="x86_64" name="ORBit2" release="6.el6_8" src="ORBit2-2.14.17-6.el6_8.src.rpm" version="2.14.17"><filename>ORBit2-2.14.17-6.el6_8.x86_64.rpm</filename><sum type="sha256">ce58ed626f6f74393ec53afd0cf02757f855ffdda6c40b5214270a68b7ab21d8</sum></package><package arch="x86_64" name="ORBit2-devel" release="6.el6_8" src="ORBit2-2.14.17-6.el6_8.src.rpm" version="2.14.17"><filename>ORBit2-devel-2.14.17-6.el6_8.x86_64.rpm</filename><sum type="sha256">fd94a05d2b35972b10fbd028c762473c498430a68302d7b211d2950bc9374ebc</sum></package><package arch="i686" name="ORBit2" release="6.el6_8" src="ORBit2-2.14.17-6.el6_8.src.rpm" version="2.14.17"><filename>ORBit2-2.14.17-6.el6_8.i686.rpm</filename><sum type="sha256">4df177d8c7c0e3a2d79c8b907fe05fc0828f29449bdeb1b1d0dd95288a14c6e5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0033" id="RHBA-2017:0033-1" title="Rhba-2017:0033-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391976" id="1391976" title="Too Many Socket Files In /Tmp/Orbit-User Folder" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0034-1</id><title>389-Ds-Base Security, Bug Fix, And Enhancement Update</title><description>389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.

This update fixes the following bug:

* Previously, the referential integrity plug-in performed add, modify, and delete operations more slowly than necessary. This update fixes the bug and improves performance of these operations significantly.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="389-ds-base-devel" release="85.el6_8" src="389-ds-base-1.2.11.15-85.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-85.el6_8.x86_64.rpm</filename><sum type="sha256">95cdb9a60040098fc26e549939ba878c0284fa108d6ed0899217833acb4b1640</sum></package><package arch="x86_64" name="389-ds-base-libs" release="85.el6_8" src="389-ds-base-1.2.11.15-85.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-85.el6_8.x86_64.rpm</filename><sum type="sha256">627c5a713ceba8e01a68c507dcd1f61f229b4603e1614696fd5589ce4bbe7ba3</sum></package><package arch="i686" name="389-ds-base-devel" release="85.el6_8" src="389-ds-base-1.2.11.15-85.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-devel-1.2.11.15-85.el6_8.i686.rpm</filename><sum type="sha256">3628879eeac7b62c2a0430610bb97982709c6da2cd6b805c4c370aa9c51e1d69</sum></package><package arch="x86_64" name="389-ds-base" release="85.el6_8" src="389-ds-base-1.2.11.15-85.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-1.2.11.15-85.el6_8.x86_64.rpm</filename><sum type="sha256">09464f99601b7d46b78fc6b9755e04a65ed8f5741ff1c85e931ce5bff9628db7</sum></package><package arch="i686" name="389-ds-base-libs" release="85.el6_8" src="389-ds-base-1.2.11.15-85.el6_8.src.rpm" version="1.2.11.15"><filename>389-ds-base-libs-1.2.11.15-85.el6_8.i686.rpm</filename><sum type="sha256">a897c8f9f58a41be932f48ecca7e267b3caa3a7d2e1ff42e3861d645552cb560</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0034" id="RHBA-2017:0034-1" title="Rhba-2017:0034-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393007" id="1393007" title="Ds9 Backport 47411 - Replace Substring Search With Plain Search In Referint Plugin" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0035-1</id><title>Db4 Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the db4 utility did not free unused mutexes properly when running the db_verify command and exited with an error. With this update, the mutexes are properly freed and the db4 utility does not run out of resources for new mutexes.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="db4-tcl" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-tcl-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">504f9adea0d049d1fac012f51d9a305992bee5859677c81e3b6f459e43191646</sum></package><package arch="x86_64" name="db4-cxx" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-cxx-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">cad8aa716822c66f3fff92509a30a51ea1cc71219ecada9b9e292f1bb49f0ea4</sum></package><package arch="i686" name="db4-devel" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-devel-4.7.25-20.el6_8.1.i686.rpm</filename><sum type="sha256">62e3ef1c3e058e4109683e6be6ecdcc2341761ee3964dcb02851401f98e43e1c</sum></package><package arch="x86_64" name="db4-devel" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-devel-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">2a5f0822abc2a23480fe375bcecaa2b16b5b2e448bf5701edc9d7d4c58bf8d7d</sum></package><package arch="x86_64" name="db4-java" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-java-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">6e71e3354ef11260c93346af151d1c4af3557f80bad782ad3e0921d824ba2165</sum></package><package arch="x86_64" name="db4-utils" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-utils-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">6fd74e4564420d5b0d77f50b7315949db492ae35e2e91f7ea1c5d8a18a9d37bb</sum></package><package arch="x86_64" name="db4-devel-static" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-devel-static-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">2fdc0854d34e275a5e5b3a92d89933ee855f62d2a892ec5b8410038310569b93</sum></package><package arch="x86_64" name="db4" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-4.7.25-20.el6_8.1.x86_64.rpm</filename><sum type="sha256">8bf937557856c0c221546c52ef05fabadc2b5819297da4cbe382c3c813f3dba1</sum></package><package arch="i686" name="db4" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-4.7.25-20.el6_8.1.i686.rpm</filename><sum type="sha256">9ae402a4c41fff9f8b9891de9bc36264160fce530fb942d5173daff909b7421b</sum></package><package arch="i686" name="db4-cxx" release="20.el6_8.1" src="db4-4.7.25-20.el6_8.1.src.rpm" version="4.7.25"><filename>db4-cxx-4.7.25-20.el6_8.1.i686.rpm</filename><sum type="sha256">d6c6b1dbbe4db23cb8418c97f856ec56a5171453278c8f45945408644551e1c4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0035" id="RHBA-2017:0035-1" title="Rhba-2017:0035-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395599" id="1395599" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0037-1</id><title>Rdma Bug Fix Update</title><description>This update fixes the following bug:

* Previously, due to a bug in the rdma package, the dracut utility failed to insert the mlx4_en module into the system's initial RAM file system (initramfs) when using the kernel-rt package. This update fixes the bug, and the mlx4_en module is now inserted correctly.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="rdma" release="2.el6_8" src="rdma-6.8_4.1-2.el6_8.src.rpm" version="6.8_4.1"><filename>rdma-6.8_4.1-2.el6_8.noarch.rpm</filename><sum type="sha256">2f0c40a39cc7b7a40d7aba3953c912c73012bd2a4976fbe38c8003028703c091</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0037" id="RHBA-2017:0037-1" title="Rhba-2017:0037-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401858" id="1401858" title="Dracut Fails To Insert Mlx4_En Module In Initramfs For Kernel-Rt" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0038-1</id><title>Bash Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when bash expanded a parameter stored in a string that exceeded the memory allocation limit for string expansion, it crashed with a segmentation fault error. With this update, the string expansion code has been updated, and bash now exits gracefully with an error message instead of crashing when a string is too long to expand.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="bash" release="41.el6_8" src="bash-4.1.2-41.el6_8.src.rpm" version="4.1.2"><filename>bash-4.1.2-41.el6_8.x86_64.rpm</filename><sum type="sha256">534ce769d61c66e44775942ae2b13d9109d52f198da67cf38b7a8c7fb5de38e5</sum></package><package arch="x86_64" name="bash-doc" release="41.el6_8" src="bash-4.1.2-41.el6_8.src.rpm" version="4.1.2"><filename>bash-doc-4.1.2-41.el6_8.x86_64.rpm</filename><sum type="sha256">36acb56c0355c436115b138238acc1f6b96a9f2c07c8b9c6abb9b5d019941717</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0038" id="RHBA-2017:0038-1" title="Rhba-2017:0038-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403215" id="1403215" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0039-1</id><title>Httpd Bug Fix Update</title><description>This update fixes the following bug:

* Previously, when the rotatelogs utility was executed with the "-p" option, defunct processes were created for the program specified by the option after the logs rotation. A patch has been applied to prevent creation of defunct processes, and the described problem no longer occurs.

After installing the updated packages, the httpd daemon will be restarted automatically.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="httpd" release="56.sl6.3" src="httpd-2.2.15-56.sl6.3.src.rpm" version="2.2.15"><filename>httpd-2.2.15-56.sl6.3.x86_64.rpm</filename><sum type="sha256">d6860a379f4024073c2093dd03258623bf530890b5492e93382830a2b8301bf2</sum></package><package arch="x86_64" name="httpd-tools" release="56.sl6.3" src="httpd-2.2.15-56.sl6.3.src.rpm" version="2.2.15"><filename>httpd-tools-2.2.15-56.sl6.3.x86_64.rpm</filename><sum type="sha256">392c9d4a41d9cf43206f08883d4803a58271b13fefb094507d39d83c3749899c</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="56.sl6.3" src="httpd-2.2.15-56.sl6.3.src.rpm" version="2.2.15"><filename>mod_ssl-2.2.15-56.sl6.3.x86_64.rpm</filename><sum type="sha256">72ab08a1ab76b6f49eaf8442bca422acf01b96d32bd71ae4c3bcf13411239401</sum></package><package arch="noarch" name="httpd-manual" release="56.sl6.3" src="httpd-2.2.15-56.sl6.3.src.rpm" version="2.2.15"><filename>httpd-manual-2.2.15-56.sl6.3.noarch.rpm</filename><sum type="sha256">6e63256f1c770cb810dcac25eecd3316c32334c195f7cc58f4348bfe1e70d7f4</sum></package><package arch="i686" name="httpd-devel" release="56.sl6.3" src="httpd-2.2.15-56.sl6.3.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-56.sl6.3.i686.rpm</filename><sum type="sha256">f809a5d2b9b22c3cf916737fc88f68132fcf419f20858d1b3a7b2665c25053b7</sum></package><package arch="x86_64" name="httpd-devel" release="56.sl6.3" src="httpd-2.2.15-56.sl6.3.src.rpm" version="2.2.15"><filename>httpd-devel-2.2.15-56.sl6.3.x86_64.rpm</filename><sum type="sha256">4fd26ef1da9ab98bf0b59f69175d91ec5912ba2fd4cb7716b3aae1dcf75a6386</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0039" id="RHBA-2017:0039-1" title="Rhba-2017:0039-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403212" id="1403212" title="Rotatelogs: Creation Of Zombie Processes When -P Is Used" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0040-1</id><title>Lftp Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the code of the lftp utility could not handle packets that were not in the correct order. Consequently, when mirroring a directory, the lftp utility became unresponsive after downloading one file. With this update, the bug has been fixed, and the entire directory is mirrored successfully.</description><release>Scientific Linux Fermi</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="lftp" release="6.el6_8.4" src="lftp-4.0.9-6.el6_8.4.src.rpm" version="4.0.9"><filename>lftp-4.0.9-6.el6_8.4.i686.rpm</filename><sum type="sha256">ff4eec545e6ad1350b50af0ff566717444ccb1bcf2007b3215634aa1078fd0dd</sum></package><package arch="noarch" name="lftp-scripts" release="6.el6_8.4" src="lftp-4.0.9-6.el6_8.4.src.rpm" version="4.0.9"><filename>lftp-scripts-4.0.9-6.el6_8.4.noarch.rpm</filename><sum type="sha256">26a2f6831c6b72756a17d02bd4f6cd1f783ae54dad1606f17a28edbc17f91fde</sum></package><package arch="x86_64" name="lftp" release="6.el6_8.4" src="lftp-4.0.9-6.el6_8.4.src.rpm" version="4.0.9"><filename>lftp-4.0.9-6.el6_8.4.x86_64.rpm</filename><sum type="sha256">aef8bb6351d1f0fa2bca21812f62a6dc4ed4f538c0629bae3212eefb25e4a50a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0040" id="RHBA-2017:0040-1" title="Rhba-2017:0040-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404588" id="1404588" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0302-1</id><title>Sssd And Ding-Libs Bug Fix Update</title><description>The ding-libs packages contain a set of libraries used by the System Security Services Daemon (SSSD) and other projects and provide functions to manipulate filesystem pathnames (libpath_utils), a hash table to manage storage and access time properties (libdhash), a data type to collect data in a hierarchical structure (libcollection), a dynamically growing, reference-counted array (libref_array), and a library to process configuration files in initialization format (INI) into a library collection data structure (libini_config).

This update fixes the following bugs:

* Previously, the ding-libs library failed to read lines from *.ini files that do not match the "key = value" format. As a consequence, the System Security Services Daemons (SSSD) failed to read group policy objects (GPO) from *.ini files without an equal sign in attributes. The ding-libs library has been enhanced and now provides a flag to ignores lines in *.ini files that do not match the "key = value" format. Additionally, a patch has been applied to SSSD to use the new flag in the ding-libs library. As a result, SSSD no longer fails to process GPOs in the mentioned situation.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="libipa_hbac" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libipa_hbac-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">b0da744fb694c38cf6159c88c49f1e3c73472d21acd15f4507dc9b14afc4b7eb</sum></package><package arch="x86_64" name="sssd-ad" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-ad-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">ba00f22bf9e6d81fc8b0c3d99faa25dbf87312ecc8617d39d77576dcf6d7953e</sum></package><package arch="x86_64" name="libcollection-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">75e1cd902f65e82e0bd5a64ddbc8258672177d4a68781c520ec99373e3c827c5</sum></package><package arch="x86_64" name="libbasicobjects-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">82a3de78b8684072fbee9f2752c3425f0b96417679218f3c386e048e47136a29</sum></package><package arch="x86_64" name="libsss_idmap" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_idmap-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">4426b3785b1cd1789c44eb5db75c921f0caf6985c56274b3fa45d2673fc698ea</sum></package><package arch="i686" name="libsss_idmap" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_idmap-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">16d1f35e65aff007cf5e2f89ff98bdcc4920e922558f3da6ccef3dfa1a2a00ab</sum></package><package arch="i686" name="libipa_hbac" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libipa_hbac-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">6bbff2dd528824876de1080e951dc780b1ff24c615e8c3e17c461e4999a8b9d5</sum></package><package arch="x86_64" name="libbasicobjects" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">5522d8e4a6594ccf5d19e248dbedc2908453b6ce7b8cab92762f2912bacdfbae</sum></package><package arch="x86_64" name="libpath_utils" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">5356e1f4a5ba1a8ba6ec5fe9d5c5d2867993b640fd0360c02712f7c86d68cff9</sum></package><package arch="i686" name="libdhash-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-11.el6_8.1.i686.rpm</filename><sum type="sha256">1f0fbfc829f578beb84126271fa978df332c5daf56a74761f24e735a5949feb9</sum></package><package arch="i686" name="libipa_hbac-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libipa_hbac-devel-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">76bd30e8621b91d043d923aac960bc40b470f864e60a54f31ad0d330ae89ecef</sum></package><package arch="x86_64" name="sssd-krb5" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-krb5-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">29d6c923ff03c47b0611c97100886e052b02ba231b7d9b8faad9d3216e909a71</sum></package><package arch="x86_64" name="python-sss" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>python-sss-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">88839ce21c04753ec369c4fcaa12a5305a9374a56623f7bc23e99e77a055a31a</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_idmap-devel-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">b37287502753c56d3908a1a225baaade43acc9bec2ed74a46006719e62346e40</sum></package><package arch="x86_64" name="libini_config-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="1.1.0"><filename>libini_config-devel-1.1.0-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">4dae095ed33e369d6b4021965835fb8a4c3124f6c4b99374dc2f7f5616cd957d</sum></package><package arch="x86_64" name="sssd-ldap" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-ldap-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">cb812f03ae6512a9cd43f3fd457d62c8a9891bfa9070cdefab1461fa456764a1</sum></package><package arch="i686" name="libpath_utils-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-11.el6_8.1.i686.rpm</filename><sum type="sha256">afdf48dd930dbbc851c2817842836d9ff56948dbc2a1b8c4182d02bb8e6c99ce</sum></package><package arch="x86_64" name="sssd-client" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-client-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">933dade1dbaa02409daae4c49578ec2498dd5c54b26b214a9953230f4938b2a9</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-devel-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">0e96793fdf9112784631bebb5b3ed86b10e2f40d6563f9a3a7e969bed17b19a2</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-devel-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">4192229ea846e0f38cb06587e1b8665850679561048f69841bd0e488c458707d</sum></package><package arch="x86_64" name="sssd-krb5-common" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-krb5-common-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">8fe27fe55fb4a4ec0d407525304072fabb623c126d3809796f934545c518156d</sum></package><package arch="i686" name="libcollection" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-11.el6_8.1.i686.rpm</filename><sum type="sha256">20605e783ad0a9f84326a48d777f48c4bdc433c1d0ff6116af867d2a54974d13</sum></package><package arch="i686" name="libsss_idmap-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_idmap-devel-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">1424b1197652cdfe06ee2a71acffb65a8c24693bcae2f7ef501ab8b1a7f6c950</sum></package><package arch="x86_64" name="sssd-proxy" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-proxy-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">5b2487c628dea266407a327ab46d80dfc36abe568b3efc9d734c817afccd22f9</sum></package><package arch="noarch" name="python-sssdconfig" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>python-sssdconfig-1.13.3-22.el6_8.6.noarch.rpm</filename><sum type="sha256">b9f7f034d25742812988749f615271d14d16ffc50394cfb1ec5ed37596a9b68f</sum></package><package arch="i686" name="libbasicobjects" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-11.el6_8.1.i686.rpm</filename><sum type="sha256">6d4af3ab5549a9a417628cc69ba5e41dc1d0139d109f8dadbca34af042293f17</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>python-libsss_nss_idmap-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">416d8de2987f9260de7a54f0dc4f367d8fac327f5da7774dc15786e414db5995</sum></package><package arch="x86_64" name="libref_array-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.4"><filename>libref_array-devel-0.1.4-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">565f020f1852510ee6f17c23daff1b5bbe243592d7a0b76ae2795f02e325e491</sum></package><package arch="x86_64" name="sssd" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">b390ab3f90a5a8a5bf20b80e1dc9e2db5fb6c81206cd1c80d08f56103b5a8ee4</sum></package><package arch="i686" name="sssd-client" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-client-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">e3fb3e1565f93dd5616f5b6113541d304a54bd3bb835dcddc910ba48abe290d3</sum></package><package arch="i686" name="libini_config" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="1.1.0"><filename>libini_config-1.1.0-11.el6_8.1.i686.rpm</filename><sum type="sha256">42b6a7548c675e2bf50b0d350992f80b98b36e727260988d0af79fcf8d9020e5</sum></package><package arch="i686" name="libcollection-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-11.el6_8.1.i686.rpm</filename><sum type="sha256">5c5538a68ecedd6bd0f6431cb839b943f0b63d4942bf842a0febad4b7b6160e3</sum></package><package arch="i686" name="libref_array" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.4"><filename>libref_array-0.1.4-11.el6_8.1.i686.rpm</filename><sum type="sha256">72e46aca3fa9bd677d0147450739598d60546032a1feda7ec74f8b0ec5c25c63</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-devel-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">ade35cdabb77d32f0b7eaeb64c47a5470d7c0014cfef06f1f9238b6eac03fd26</sum></package><package arch="x86_64" name="libsss_simpleifp" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">776894942f30abf75831c61131fc66a623b65c18a7ad5c521cd3ea3670f3d494</sum></package><package arch="x86_64" name="libcollection" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">d1cd1f6327f6c87f072d406a9ad04a4b1d78964ce9f9c17d0180deedb59ea35e</sum></package><package arch="x86_64" name="libini_config" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="1.1.0"><filename>libini_config-1.1.0-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">3ac1a2fc39e053b4912be151b0f0ee5c70d5aad892dcac1665a97aaaa57821e9</sum></package><package arch="i686" name="libdhash" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-11.el6_8.1.i686.rpm</filename><sum type="sha256">7f4afb6b83f8d70449d97492cfd94e893e458bdacdd715d7a16a0b8f8f1b3bf9</sum></package><package arch="x86_64" name="python-libipa_hbac" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>python-libipa_hbac-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">db7a58573a87e92770d6f34e12b9db87c9ff5b6ca636ed9f0e983de73e36d32f</sum></package><package arch="i686" name="libref_array-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.4"><filename>libref_array-devel-0.1.4-11.el6_8.1.i686.rpm</filename><sum type="sha256">028130853ac7e477bbed038df924d8939ca821eb03a0cd3e0cff0a03565273e0</sum></package><package arch="x86_64" name="sssd-dbus" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-dbus-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">0a6192ed7749ad715fb5afd9dfdc53f032b348fd8546612094f68ada6fcdced7</sum></package><package arch="i686" name="libsss_simpleifp" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">d3200421f1839d887af4c376345fb0a121d861998d2a20083480809859b863da</sum></package><package arch="i686" name="libsss_nss_idmap" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">3c84f84b488b1aa3ee0a2ceaea9d582ab044c4b0061d5523919a8bae7e8b9349</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libipa_hbac-devel-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">9edd417b42cc55cb2aa25e6233d9434e848de29113d3f8977602dc21d9e3d47f</sum></package><package arch="i686" name="libini_config-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="1.1.0"><filename>libini_config-devel-1.1.0-11.el6_8.1.i686.rpm</filename><sum type="sha256">8b4e16e982f4f067f601744ad899712299073e86c042a6fdf4a09e52f8cf777b</sum></package><package arch="i686" name="libbasicobjects-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-11.el6_8.1.i686.rpm</filename><sum type="sha256">d1bbe071cda01742fdb10741906ba4208ed2654ef8d49e7fd6c0e4cc397a52fd</sum></package><package arch="x86_64" name="sssd-ipa" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-ipa-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">87323e8d887f7d72cc3d7710d1e66c339feecd88780b8fd8721b05182944ca05</sum></package><package arch="x86_64" name="libpath_utils-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">b2b3273eb7d66119284ba02f1f5cb3d84f5e822321a364c34afe8a802de48d44</sum></package><package arch="x86_64" name="sssd-tools" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-tools-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">34062ea42c3617cf9d851e15602c83928c23b92a105a3df52a1045c6f72a9ffa</sum></package><package arch="x86_64" name="sssd-common" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-common-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">77fecba2e69373f24c380354107b6192ac42470b233928c0b1119d7c9843dfb6</sum></package><package arch="x86_64" name="libref_array" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.1.4"><filename>libref_array-0.1.4-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">1edd27a3a890ca4ce827c6e97861e7883872f991e3b8dbf56a544d1faf08958a</sum></package><package arch="i686" name="libpath_utils" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-11.el6_8.1.i686.rpm</filename><sum type="sha256">641b44c01591f839173acf107be5a22605d7f70d964a047168b3e4e97a62af20</sum></package><package arch="x86_64" name="sssd-common-pac" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>sssd-common-pac-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">5f27dda828f284dc8a84804b26cb17f1c2850effa82d548dec5226c255c405d8</sum></package><package arch="x86_64" name="libdhash" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">19fcd5f2d70825749aa5ab5a1897b66869f699b74627c48cc458ae0f63967bef</sum></package><package arch="x86_64" name="libdhash-devel" release="11.el6_8.1" src="ding-libs-0.4.0-11.el6_8.1.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-11.el6_8.1.x86_64.rpm</filename><sum type="sha256">d8559fc804e3ca5a992468738d8f1a6e48edb0adb8ce32488550218e56203f0a</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_simpleifp-devel-1.13.3-22.el6_8.6.i686.rpm</filename><sum type="sha256">3c0b3ca0b4894ee0596be8a68019aa31f7f649037d001e3b564d290fdd822fbf</sum></package><package arch="x86_64" name="python-sss-murmur" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>python-sss-murmur-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">5b2fef3bd7bb37a284141507d1a7e920731e8f339d7474b6c5f5d1db45f837bd</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="22.el6_8.6" src="sssd-1.13.3-22.el6_8.6.src.rpm" version="1.13.3"><filename>libsss_nss_idmap-1.13.3-22.el6_8.6.x86_64.rpm</filename><sum type="sha256">48f8318112250b91ce50899ce8ca6c4302f117bec43f14621ebc562ac8122f1c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0302" id="RHBA-2017:0302-1" title="Rhba-2017:0302-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379582" id="1379582" title="Ding-Libs Don&apos;T Parse Lines Without An Equal Sign" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0304-1</id><title>Gnome-Settings-Daemon Bug Fix Update</title><description>This update fixes the following bug:

* Previously, gnome-settings-daemon did not recognize certain smart cards correctly. As a consequence, gnome-settings-daemon failed to notice insertion and removal events from affected smart cards. The bug has been fixed, and these events are now handled properly.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="i686" name="gnome-settings-daemon-devel" release="35.el6_8.2" src="gnome-settings-daemon-2.28.2-35.el6_8.2.src.rpm" version="2.28.2"><filename>gnome-settings-daemon-devel-2.28.2-35.el6_8.2.i686.rpm</filename><sum type="sha256">d9931b24f550b652aca827808e6257023072108851d9c456a5a1927e32768d8a</sum></package><package arch="x86_64" name="gnome-settings-daemon-devel" release="35.el6_8.2" src="gnome-settings-daemon-2.28.2-35.el6_8.2.src.rpm" version="2.28.2"><filename>gnome-settings-daemon-devel-2.28.2-35.el6_8.2.x86_64.rpm</filename><sum type="sha256">acaccf0966f9488d91b608d5627a962bbf8f38ca170906e5f3cae305d748d33d</sum></package><package arch="x86_64" name="gnome-settings-daemon" release="35.el6_8.2" src="gnome-settings-daemon-2.28.2-35.el6_8.2.src.rpm" version="2.28.2"><filename>gnome-settings-daemon-2.28.2-35.el6_8.2.x86_64.rpm</filename><sum type="sha256">a67f3200cbfe340c962934e0a382807a0a0d96c12d1a663cf12c7b4cff0aff96</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0304" id="RHBA-2017:0304-1" title="Rhba-2017:0304-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400134" id="1400134" title="Smartcard: Lock-On-Remove Fails With Gemalto/Safenet Etoken 4100 And Safenet Authentication Client" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0305-1</id><title>Kexec-Tools Bug Fix Update</title><description>This update fixes the following bug:

* When the kmod-hpsa packages were upgraded on a running Scientific Linux 6.7 system that boots from a Logical Unit Number (LUN) controlled by the hpsa kernel module, running the mkdumprd command before a reboot caused an infinite loop. This update fixes the depsolve_modlist() function to resolve the dependencies for the hpsa kernel module list. As a result, running mkdumprd no longer causes an infinite loop to occur.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kexec-tools-eppic" release="300.el6_8.2" src="kexec-tools-2.0.0-300.el6_8.2.src.rpm" version="2.0.0"><filename>kexec-tools-eppic-2.0.0-300.el6_8.2.x86_64.rpm</filename><sum type="sha256">9176a5c4e926826e01142e619200197a7986d4b2f45b1f0043eec5139af325a4</sum></package><package arch="x86_64" name="kexec-tools" release="300.el6_8.2" src="kexec-tools-2.0.0-300.el6_8.2.src.rpm" version="2.0.0"><filename>kexec-tools-2.0.0-300.el6_8.2.x86_64.rpm</filename><sum type="sha256">a2cf875da98063d6217f09bf3bf99a9c7cba08c68431ac202d2c34676a339da8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0305" id="RHBA-2017:0305-1" title="Rhba-2017:0305-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0308-1</id><title>Gpxe Bug Fix Update</title><description>This update fixes the following bug:

* Due to a problem with IP fragment reassembly in the gPXE boot loader, gPXE was not able to receive fragmented IP traffic, used for example on networks with a small maximum transmission unit (MTU). With this update, the IP fragment reassembly is fixed, and gPXE can successfully receive fragmented IP traffic.

In addition, this update adds the following enhancement:

* The gPXE boot loader is now able to handle 802.1q VID 0 frames, which enables pre-boot execution environment (PXE) booting on networks that use the VLAN 0 signal ID.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="gpxe-roms-qemu" release="6.15.el6_8.1" src="gpxe-0.9.7-6.15.el6_8.1.src.rpm" version="0.9.7"><filename>gpxe-roms-qemu-0.9.7-6.15.el6_8.1.noarch.rpm</filename><sum type="sha256">c467963ab46322e56e472e2651acf1eacd0004d838d36cd3efabbe891601c423</sum></package><package arch="noarch" name="gpxe-roms" release="6.15.el6_8.1" src="gpxe-0.9.7-6.15.el6_8.1.src.rpm" version="0.9.7"><filename>gpxe-roms-0.9.7-6.15.el6_8.1.noarch.rpm</filename><sum type="sha256">b7f48f5a2935ed3d639fe6d6b9d7286469f34bdea20bae8ef74111dc321ac645</sum></package><package arch="noarch" name="gpxe-bootimgs" release="6.15.el6_8.1" src="gpxe-0.9.7-6.15.el6_8.1.src.rpm" version="0.9.7"><filename>gpxe-bootimgs-0.9.7-6.15.el6_8.1.noarch.rpm</filename><sum type="sha256">7b260a9612d7f49b4e32da4f1d23b0d8e94a13911b94c21ec62f839bed612c78</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0308" id="RHBA-2017:0308-1" title="Rhba-2017:0308-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0311-1</id><title>Util-Linux-Ng Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the util-linux-ng packages had the kernel as a strict RPM dependency. Consequently, util-linux-ng could only be installed along with the kernel, which is unacceptable when installing inside a container. This update removes util-linux-ng RPM dependency on the kernel, which fixes this bug.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="uuidd" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>uuidd-2.17.2-12.24.el6_8.3.x86_64.rpm</filename><sum type="sha256">c61fbf80bf80f8c03befaf1b2859e2144cb69412fdd02df6e31ef0c14baf9187</sum></package><package arch="x86_64" name="util-linux-ng" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>util-linux-ng-2.17.2-12.24.el6_8.3.x86_64.rpm</filename><sum type="sha256">bb74ed9bcc36fdeca2d6b7ddb52044d87991cad1271532838a7fc0594eea91eb</sum></package><package arch="x86_64" name="libuuid" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libuuid-2.17.2-12.24.el6_8.3.x86_64.rpm</filename><sum type="sha256">05433b8228d422a0aa7a53b5299292f9be81f5ff4f3ff52379f1097ee86f44c5</sum></package><package arch="i686" name="util-linux-ng" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>util-linux-ng-2.17.2-12.24.el6_8.3.i686.rpm</filename><sum type="sha256">cb14bff01fd94fb57c80c05c04ebe3db9dabab36bc42135936e108745db7f887</sum></package><package arch="i686" name="libblkid" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libblkid-2.17.2-12.24.el6_8.3.i686.rpm</filename><sum type="sha256">8b3226ebcb7f52b11192d7b8d4e3dea863726e656514f780e329a91cead2a942</sum></package><package arch="i686" name="libuuid" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libuuid-2.17.2-12.24.el6_8.3.i686.rpm</filename><sum type="sha256">b5f4dc060c62b6468957f9812aaeb1c627ed15afaef244b4b2857a1a261f3ef7</sum></package><package arch="x86_64" name="libblkid" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libblkid-2.17.2-12.24.el6_8.3.x86_64.rpm</filename><sum type="sha256">e567ae5d88bb6b71ebeb46a62b7b8ad022bd51d1cafc1a83d50e6e353756325e</sum></package><package arch="i686" name="libblkid-devel" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libblkid-devel-2.17.2-12.24.el6_8.3.i686.rpm</filename><sum type="sha256">62d8b4e64170250f4c261c9ef7f11fa70571fcbaa890a8eb128991a086e606e5</sum></package><package arch="x86_64" name="libuuid-devel" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libuuid-devel-2.17.2-12.24.el6_8.3.x86_64.rpm</filename><sum type="sha256">a219bd5633d9e0d3f6f87fd86694f6802947a10a5c894f70badd6da606fc6700</sum></package><package arch="x86_64" name="libblkid-devel" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libblkid-devel-2.17.2-12.24.el6_8.3.x86_64.rpm</filename><sum type="sha256">07335a5de1b8f4ec01fb89f2010753f46702602af4f1273c2d9b9f2694d010f0</sum></package><package arch="i686" name="libuuid-devel" release="12.24.el6_8.3" src="util-linux-ng-2.17.2-12.24.el6_8.3.src.rpm" version="2.17.2"><filename>libuuid-devel-2.17.2-12.24.el6_8.3.i686.rpm</filename><sum type="sha256">f52673d02f640d9b674be262aceed9351e8d365618eb8ca384c7b972c7b13b88</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0311" id="RHBA-2017:0311-1" title="Rhba-2017:0311-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0312-1</id><title>Lldpad Bug Fix Update</title><description>This update fixes the following bug:

* Previously, Fibre Channel over Ethernet (FCoE) interfaces did not activate after start. As a consequence, the interfaces needed to be activated manually. The bug has been fixed, and all interface now activate automatically after start.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="lldpad-libs" release="10.el6_8" src="lldpad-0.9.46-10.el6_8.src.rpm" version="0.9.46"><filename>lldpad-libs-0.9.46-10.el6_8.x86_64.rpm</filename><sum type="sha256">42c578a296d3fab025c91e694a04b753944106581f777f4da44f5e9bb7ad46bb</sum></package><package arch="x86_64" name="lldpad" release="10.el6_8" src="lldpad-0.9.46-10.el6_8.src.rpm" version="0.9.46"><filename>lldpad-0.9.46-10.el6_8.x86_64.rpm</filename><sum type="sha256">26746f898e1e8637fd918598a8785836304b7d2f39db5406d2e13254796ce658</sum></package><package arch="i686" name="lldpad-devel" release="10.el6_8" src="lldpad-0.9.46-10.el6_8.src.rpm" version="0.9.46"><filename>lldpad-devel-0.9.46-10.el6_8.i686.rpm</filename><sum type="sha256">b535fae3adf2550288f6f1791354dd06440ffa6e1d34fd71747d5da99624debe</sum></package><package arch="i686" name="lldpad-libs" release="10.el6_8" src="lldpad-0.9.46-10.el6_8.src.rpm" version="0.9.46"><filename>lldpad-libs-0.9.46-10.el6_8.i686.rpm</filename><sum type="sha256">99fb50d0a2359aab2ce019ebbe88e8e20d77554c2e56f9130b914e2fac45323e</sum></package><package arch="x86_64" name="lldpad-devel" release="10.el6_8" src="lldpad-0.9.46-10.el6_8.src.rpm" version="0.9.46"><filename>lldpad-devel-0.9.46-10.el6_8.x86_64.rpm</filename><sum type="sha256">1915994f37b8cea5c00d88af6de38e0f6194b45916503f192142cdb4427e39d1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0312" id="RHBA-2017:0312-1" title="Rhba-2017:0312-1" type="self" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="1.4"><id>SLBA-2017:0313-1</id><title>Initscripts Bug Fix Update</title><description>This update fixes the following bug:

* In Scientific Linux version 6.7 and 6.8, executing the ifdown command on a local loopback device failed to remove the device. A patch has been applied, and the removal of an existing loopback device using ifdown now succeeds.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="initscripts" release="1.el6_8.2" src="initscripts-9.03.53-1.el6_8.2.src.rpm" version="9.03.53"><filename>initscripts-9.03.53-1.el6_8.2.x86_64.rpm</filename><sum type="sha256">5cbef8ef2a12d5ceffe4f3289c5b5f81fc8a5cf4b3576c5f4a8a62eb4479e810</sum></package><package arch="x86_64" name="debugmode" release="1.el6_8.2" src="initscripts-9.03.53-1.el6_8.2.src.rpm" version="9.03.53"><filename>debugmode-9.03.53-1.el6_8.2.x86_64.rpm</filename><sum type="sha256">50836d6115111ab8477db6dba17d7d748f53583fe8ce5753dfcc191992279bfd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0313" id="RHBA-2017:0313-1" title="Rhba-2017:0313-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420053" id="1420053" title="Ifdown On Lo Alias Does Not Work" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:0683-1</id><title>Tzdata</title><description>This update adds the following enhancements:

* Asia/Magadan will switch from UTC+10 to UTC+11 on April 24, 2016 at 02:00.

* America/Caracas will switch from UTC-0430 to UTC-04 on May 01, 2016 at 02:30.

* New zone Asia/Tomsk, split off from Asia/Novosibirsk. It covers Tomsk Oblast, Russia, which will switch from UTC+06 to UTC+07 on May 29, 2016 at 02:00.</description><release>Scientific Linux Fermi</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="tzdata-java" release="1.el6" src="tzdata-2016d-1.el6.src.rpm" version="2016d"><filename>tzdata-java-2016d-1.el6.noarch.rpm</filename><sum type="sha256">b72e66822289ec86634a58254c10abbf736bd689dfa8d4a55f3ec82ff9469230</sum></package><package arch="noarch" name="tzdata" release="1.el6" src="tzdata-2016d-1.el6.src.rpm" version="2016d"><filename>tzdata-2016d-1.el6.noarch.rpm</filename><sum type="sha256">3a7d2866fe4e8248ab873f448c080c24a6b72883797e54dd1e772acbd9f53e49</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0683" id="RHEA-2016:0683-1" title="Rhea-2016:0683-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326484" id="1326484" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326486" id="1326486" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326490" id="1326490" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326491" id="1326491" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:2004-1</id><title>Perl-Net-Ssleay Enhancement Update</title><description>This update adds the following enhancement:

* The Perl Net:SSLeay module has been updated to support explicit specification of the TLS protocol version, which can be used for improving security. To restrict TLS version to 1.1 or 1.2, set the "Net::SSLeay::ssl_version" variable to '11' or '12' respectively.</description><release>Scientific Linux Fermi</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="perl-Net-SSLeay" release="10.el6_8.1" src="perl-Net-SSLeay-1.35-10.el6_8.1.src.rpm" version="1.35"><filename>perl-Net-SSLeay-1.35-10.el6_8.1.x86_64.rpm</filename><sum type="sha256">b4fc88916bb870ac6681e7e6afb709f5b4fc31cbdcbb3ea0d50b98099e5f5afd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2004" id="RHEA-2016:2004-1" title="Rhea-2016:2004-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375183" id="1375183" title="Backport Patches To Allow Net::Ssleay To Support Tlsv1.1, Tlsv1.2" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2016:2769-1</id><title>Perl-Io-Socket-Ssl Enhancement Update</title><description>This update adds the following enhancement:

* The Perl Net:SSLeay module has been updated to support explicit specification of the TLS protocol versions 1.1 or 1.2 to improve security, and the IO::Socket::SSL module has been updated accordingly. When a new IO::Socket::SSL object is created, it is now possible to restrict the TLS version to 1.1 or 1.2 by setting the "SSL_version" option to 'TLSv1_1' or 'TLSv1_2' respectively. Alternatively, 'TLSv11' and 'TLSv12' can be used. Note that these values are case-sensitive.</description><release>Scientific Linux Fermi</release><issued date="2016-11-29 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="noarch" name="perl-IO-Socket-SSL" release="3.el6_8.2" src="perl-IO-Socket-SSL-1.31-3.el6_8.2.src.rpm" version="1.31"><filename>perl-IO-Socket-SSL-1.31-3.el6_8.2.noarch.rpm</filename><sum type="sha256">2cadd8174fa639598b68cc7b3855e8cf9915b545b169b18bef405cd5a3a8f442</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2769" id="RHEA-2016:2769-1" title="Rhea-2016:2769-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375525" id="1375525" title="[Rfe]Allow Io::Socket::Ssl To Support Tlsv1.1, Tlsv1.2" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2017:0188-1</id><title>New Packages: Kmod-Rtsx_Pci</title><description>The kmod-rtsx_pci packages contain the Realtek card reader RTS5250S SD4.0 driver kernel module. These packages add support for the Realtek RTS5250S card reader.

The PCI ID supported by these packages: 10EC:525A

The kernel modules delivered by this erratum have been made available as part of the Red Hat Driver Update Program, which provides updated kernel modules that add support for selected devices in advance of the next Scientific Linux minor update release. We strongly recommend that  these kernel modules are used only to enable the specific hardware mentioned in this erratum. For all other devices that require this driver, partners and customers are recommended to continue to use the driver that is shipped in the latest Scientific Linux kernel.</description><release>Scientific Linux Fermi</release><issued date="2017-02-07 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="kmod-rtsx_pci" release="1.el6_8" src="rtsx_pci-642-1.el6_8.src.rpm" version="642"><filename>kmod-rtsx_pci-642-1.el6_8.x86_64.rpm</filename><sum type="sha256">cd262b4bac6fac45e9941c4bde7f296169b7fa1d4a7537559095670f26f644f3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:0188" id="RHEA-2017:0188-1" title="Rhea-2017:0188-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1410849" id="1410849" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="1.4"><id>SLEA-2017:0310-1</id><title>Resource-Agents Enhancement Update</title><description>This update adds the following enhancement:

* The "SAPHana" and "SAPHanaTopology" resource agents have been updated to upstream version 0.152.17, which improves their reliability and fixes several bugs.</description><release>Scientific Linux Fermi</release><issued date="2017-02-28 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="resource-agents" release="34.el6_8.3" src="resource-agents-3.9.5-34.el6_8.3.src.rpm" version="3.9.5"><filename>resource-agents-3.9.5-34.el6_8.3.x86_64.rpm</filename><sum type="sha256">61c24d08854feeef953d535535528e99e2294d6b1f85e5f8e1b8a17b0ab1ef74</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:0310" id="RHEA-2017:0310-1" title="Rhea-2017:0310-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413096" id="1413096" type="bugzilla" /></references></update><update from="LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="1.4"><id>SLSA-2016:0695-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.1.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2805, CVE-2016-2806, CVE-2016-2807, CVE-2016-2808, CVE-2016-2814)</description><severity>critical</severity><release>Scientific Linux Fermi</release><issued date="2016-05-10 00:00:00" /><pkglist><collection short="SLF6"><name>Scientific Linux Fermi 6</name><package arch="x86_64" name="firefox" release="1.el6_7" src="firefox-45.1.0-1.el6_7.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el6_7.x86_64.rpm</filename><sum type="sha256">e1a8896294604abd3ae497571cc3110a42949b38677a422d3c30471c747cc29d</sum></package><package arch="i686" name="firefox" release="1.el6_7" src="firefox-45.1.0-1.el6_7.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el6_7.i686.rpm</filename><sum type="sha256">f8d450d7c4917ad6cbcb888e8e6f2fa18f84ebcf30bb4960a04453daa34abe39</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" id="CVE-2016-2806" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" id="CVE-2016-2808" title="Mozilla: Write To Invalid Hashmap Entry Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" id="CVE-2016-2814" title="Mozilla: Buffer Overflow In Libstagefright With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0695" id="RHSA-2016:0695-1" title="Rhsa-2016:0695-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330270" id="1330270" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330280" id="1330280" title="Mozilla: Buffer Overflow In Libstagefright With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330286" id="1330286" title="Mozilla: Write To Invalid Hashmap Entry Through " type="bugzilla" /></references></update></updates>